id
stringlengths
5
16
query
stringlengths
1
382
pos
stringlengths
7
5.09k
neg
stringlengths
23
5.09k
qp
float64
0.4
1
qn
float64
0.34
0.91
margin
float64
0.02
0.3
2004.07298
Mixing properties of generalized $T, T^{-1}$ transformations
We study mixing properties of generalized $T, T^{-1}$ transformation. We discuss two mixing mechanisms. In the case the fiber dynamics is mixing, it is sufficient that the driving cocycle is small with small probability. In the case the fiber dynamics is only assumed to be ergodic, one needs to use the shearing properties of the cocycle. Applications include the Central Limit Theorem for sufficiently fast mixing systems and the estimates on deviations of ergodic averages.
We obtain sufficient conditions under which the limit of a sequence of functions exhibits a particular dynamical behaviour at a point like expansivity, shadowing, mixing, sensitivity and transitivity. We provide examples to show that the set of all expansive, positively expansive and sensitive points are neither open nor closed in general. We also observe that the set of all transitive and mixing points are closed but not open in general. We give examples to show that properties like expansivity, sensitivity, shadowing, transitivity and mixing at a point need not be preserved under uniform convergence and properties like topological stability and $\alpha$-persistence at a point need not be preserved under pointwise convergence.
0.891378
0.768271
0.123107
2004.07299
Asymptotic realization of the super-BMS algebra at spatial infinity
Explicit boundary conditions are given at spatial infinity for four-dimensional supergravity, which provide a realization of the super-BMS algebra of Awada, Gibbons and Shaw. The results are then generalized to the $N$- extended super-BMS algebras.
Different classes of exact solutions for the BHT massive gravity theory are constructed and analyzed. We focus in the special case of the purely quadratic Lagrangian, whose field equations are irreducibly of fourth order and are known to admit asymptotically locally flat black holes endowed with gravitational hair. The first class corresponds to a Kerr-Schild deformation of Minkowski spacetime along a covariantly constant null vector. As in the case of General Relativity, the field equations linearize so that the solution can be easily shown to be described by four arbitrary functions of a single null coordinate. These solutions can be regarded as a new sort of pp-waves. The second class is obtained from a deformation of the static asymptotically locally flat black hole, that goes along the spacelike (angular) Killing vector. Remarkably, although the deformation is not of Kerr-Schild type, the field equations also linearize, and hence the generic solution can be readily integrated. It is neither static nor spherically symmetric, being described by two integration constants and two arbitrary functions of the angular coordinate. In the static case it describes "black flowers" whose event horizons break the spherical symmetry. The generic time-dependent solution appears to describe a graviton that moves away from a black flower. Despite the asymptotic behaviour of these solutions at null infinity is relaxed with respect to the one for General Relativity, the asymptotic symmetries coincide. However, the algebra of the conserved charges corresponds to BMS$_{3}$, but devoid of central extensions. The "dynamical black flowers" are shown to possess a finite energy. The surface integrals that define the global charges also turn out to be useful in the description of the thermodynamics of solutions with event horizons.
0.880882
0.721101
0.159781
2004.07300
Gumbel-softmax-based Optimization: A Simple General Framework for Optimization Problems on Graphs
In computer science, there exist a large number of optimization problems defined on graphs, that is to find a best node state configuration or a network structure such that the designed objective function is optimized under some constraints. However, these problems are notorious for their hardness to solve because most of them are NP-hard or NP-complete. Although traditional general methods such as simulated annealing (SA), genetic algorithms (GA) and so forth have been devised to these hard problems, their accuracy and time consumption are not satisfying in practice. In this work, we proposed a simple, fast, and general algorithm framework based on advanced automatic differentiation technique empowered by deep learning frameworks. By introducing Gumbel-softmax technique, we can optimize the objective function directly by gradient descent algorithm regardless of the discrete nature of variables. We also introduce evolution strategy to parallel version of our algorithm. We test our algorithm on three representative optimization problems on graph including modularity optimization from network science, Sherrington-Kirkpatrick (SK) model from statistical physics, maximum independent set (MIS) and minimum vertex cover (MVC) problem from combinatorial optimization on graph. High-quality solutions can be obtained with much less time consuming compared to traditional approaches.
We present a model development framework and numerical solution approach to the general problem-class of packing convex objects into optimized convex containers. Specifically, here we discuss the problem of packing ovals (egg-shaped objects, defined here as generalized ellipses) into optimized regular polygons in $\mathbb{R}^2$. Our solution strategy is based on the use of embedded Lagrange multipliers, followed by nonlinear (global-local) optimization. The numerical results are attained using randomized starting solutions refined by a single call to a local optimization solver. We obtain credible, tight packings for packing 4 to 10 ovals into regular polygons with 3 to 10 sides in all (224) test problems presented here, and for other similarly difficult packing problems.
0.874224
0.711521
0.162703
2004.07301
ESResNet: Environmental Sound Classification Based on Visual Domain Models
Environmental Sound Classification (ESC) is an active research area in the audio domain and has seen a lot of progress in the past years. However, many of the existing approaches achieve high accuracy by relying on domain-specific features and architectures, making it harder to benefit from advances in other fields (e.g., the image domain). Additionally, some of the past successes have been attributed to a discrepancy of how results are evaluated (i.e., on unofficial splits of the UrbanSound8K (US8K) dataset), distorting the overall progression of the field. The contribution of this paper is twofold. First, we present a model that is inherently compatible with mono and stereo sound inputs. Our model is based on simple log-power Short-Time Fourier Transform (STFT) spectrograms and combines them with several well-known approaches from the image domain (i.e., ResNet, Siamese-like networks and attention). We investigate the influence of cross-domain pre-training, architectural changes, and evaluate our model on standard datasets. We find that our model out-performs all previously known approaches in a fair comparison by achieving accuracies of 97.0 % (ESC-10), 91.5 % (ESC-50) and 84.2 % / 85.4 % (US8K mono / stereo). Second, we provide a comprehensive overview of the actual state of the field, by differentiating several previously reported results on the US8K dataset between official or unofficial splits. For better reproducibility, our code (including any re-implementations) is made available.
Separating an audio scene into isolated sources is a fundamental problem in computer audition, analogous to image segmentation in visual scene analysis. Source separation systems based on deep learning are currently the most successful approaches for solving the underdetermined separation problem, where there are more sources than channels. Traditionally, such systems are trained on sound mixtures where the ground truth decomposition is already known. Since most real-world recordings do not have such a decomposition available, this limits the range of mixtures one can train on, and the range of mixtures the learned models may successfully separate. In this work, we use a simple blind spatial source separation algorithm to generate estimated decompositions of stereo mixtures. These estimates, together with a weighting scheme in the time-frequency domain, based on confidence in the separation quality, are used to train a deep learning model that can be used for single-channel separation, where no source direction information is available. This demonstrates how a simple cue such as the direction of origin of source can be used to bootstrap a model for source separation that can be used in situations where that cue is not available.
0.872159
0.714248
0.157911
2004.07302
Uniqueness Criteria for the Oseen Vortex in the 3d Navier-Stokes Equations
In this paper, we consider the uniqueness of solutions to the 3d Navier-Stokes equations with initial vorticity given by $\omega_0 = \alpha e_z \delta_{x = y = 0}$, where $\delta_{x=y= 0}$ is the one dimensional Hausdorff measure of an infinite, vertical line and $\alpha \in \mathbb R$ is an arbitrary circulation. This initial data corresponds to an idealized, infinite vortex filament. One smooth, mild solution is given by the self-similar Oseen vortex column, which coincides with the heat evolution. Previous work by Germain, Harrop-Griffiths, and the first author implies that this solution is unique within a class of mild solutions that converge to the Oseen vortex in suitable self-similar weighted spaces. In this paper, the uniqueness class of the Oseen vortex is expanded to include any solution that converges to the initial data in a sufficiently strong sense. This gives further evidence in support of the expectation that the Oseen vortex is the only possible mild solution that is identifiable as a vortex filament. The proof is a 3d variation of a 2d compactness/rigidity argument in $t \searrow 0$ originally due to Gallagher and Gallay.
In this paper we study the stochastic Navier-Stokes equation with artificial compressibility. The main results of this work are the existence and uniqueness theorem for strong solutions and the limit to incompressible flow. These results are obtained by utilizing a local monotonicity property of the sum of the Stokes operator and the nonlinearity.
0.899301
0.761921
0.137381
2004.07303
Surface Drinfeld Torsors I : Higher Genus Associators
We develop a higher genus version of Drinfeld associators by means of operad theory. We start by introducing a framed version of rational associators and Grothendieck-Teichm\"uller groups and show that their definition is independent of the framing data. Next, we define a framed version of the universal KZ connection and we use it to show that over the complex numbers, the rational framed Drinfeld torsor is not empty. Next, we concentrate on the higher genus version of this story. We define an operad module of framed parenthesized higher genus braidings in prounipotent groupoids and we define its chord diagram counterpart. We then use these operadic modules to operadicly define higher genus associators and Grothendieck-Teichm\"uller groups, which again do not depend on the framing data. Finally, we compare our results in the genus $1$ case with those appearing in the litterature.
In this paper, we prove a quantitative equidistribution theorem for Gross points over the rational function field $\mathbb{F}_q(t)$. We apply this result to prove that the reduction map from CM Drinfeld modules to supersingular Drinfeld modules is surjective. Our proofs rely crucially on a period formula of F.-T. Wei and J. Yu, and a Lindel\"of-type bound for central values of Rankin-Selberg L-functions associated to twists of automorphic forms of Drinfeld-type by ideal class group characters.
0.851767
0.735872
0.115895
2004.07304
Tensor-to-Scalar Transition in the Nucleon-Nucleon Interaction Mapped by $^{12}$C(e,e$^\prime$pn) Measurements
The strong nuclear interaction is probed at short-distance and high-momenta using new measurements of the $^{12}$C$(e,e'p)$ and $^{12}$C$(e,e'pn)$ reactions, at high-$Q^2$ and $x_B>1$. The data span a missing-momentum range of 300-850 MeV/c and is predominantly sensitive to the dominant proton-neutron short-range correlated (SRC) pairs and complements previous $^{12}$C$(e,e'pp)$ measurements. The data are well reproduced by theoretical calculations using the Generalized Contact Formalism with both chiral and phenomenological nucleon-nucleon ($NN$) interaction models. This agreement, observed here for the first time, suggests that the measured high missing-momentum protons up to $850$ MeV/c belonged to SRC pairs. The measured $^{12}$C$(e,e'pn)$ / $^{12}$C$(e,e'p)$ ratio is consistent with a decrease in the fraction of proton-neutron SRC pairs with increasing missing-momentum. This confirms the transition from an isospin-dependent tensor $NN$ interaction at $\sim 400$ MeV/c to an isospin-independent scalar interaction at high-momentum around $\sim 800$ MeV/c.
We study incoherent DVCS on $^4$He in the $^4{\rm He}(e,e^{\prime}\gamma p)X$ reaction, which probes medium-modifications of the bound nucleon GPDs and elastic form factors. Assuming that the bound nucleon GPDs are modified in proportion to the corresponding bound nucleon elastic form factors, as predicted in the Quark-Meson Coupling model, we develop an approach to calculate various incoherent nuclear DVCS observables. As an example, we compute the beam-spin DVCS asymmetry, and predict the $x_B$- and $t$-dependence of the ratio of the bound to free proton asymmetries, $A_{\rm LU}^{p^{\ast}}(\phi)/A_{\rm LU}^{p}(\phi)$. We find that the deviation of $A_{\rm LU}^{p^{\ast}}(\phi)/A_{\rm LU}^{p}(\phi)$ from unity is as much as $\sim$ 6%.
0.85978
0.806515
0.053264
2004.07305
Internal Kinematics of M10 and M71
We present a study of the internal kinematics of two globular clusters, M10 (NGC 6254) and M71 (NGC 6838), using individual radial velocity (RV) measurements obtained from observations using the Hydra multi-object spectrograph on the WIYN 3.5 m telescope. We measured 120 RVs for stars in M10, of which 107 were determined to be cluster members. In M71, we measured 82 RVs and determined 78 of those measurements belonged to cluster members. Using the cluster members, we determine a mean RV of $75.9 \pm 4.0$ (s.d.) km s$^{-1}$ and $-22.9 \pm 2.2$ (s.d.) km s$^{-1}$ for M10 and M71, respectively. We combined the Hydra RV measurements with literature samples and performed a line-of-sight rotational analysis on both clusters. Our analysis has not revealed a statistically significant rotation in either of these clusters with the exception of the inner region (10\arcsec - 117\arcsec) of M10 for which we find hints of a marginally significant rotation with amplitude V$_{rot} = 1.14 \pm 0.18$ km s$^{-1}$. For M10, we calculate a central velocity dispersion of $\sigma_{0} = 5.44 \pm 0.61$ km s$^{-1}$, which gives a ratio of the amplitude of rotation to the central velocity dispersion $V_{rot}/\sigma_{0} = 0.21 \pm 0.04$. We also explored the rotation of the multiple stellar populations identified in M10 and M71 and found rotation (or lack thereof) in each population consistent with each other and the cluster global rotation signatures.
The scalar dipole polarizabilities, $\alpha_{E1}$ and $\beta_{M1}$, are fundamental properties related to the internal dynamics of the nucleon. The currently accepted values of the proton polarizabilities were determined by fitting to unpolarized proton Compton scattering cross section data. The measurement of the beam asymmetry $\Sigma_{3}$ in a certain kinematical range provides an alternative approach to the extraction of the scalar polarizabilities. At the Mainz Microtron (MAMI) the beam asymmetry was measured for Compton scattering below pion photoproduction threshold for the first time. The results are compared with model calculations and the influence of the experimental data on the extraction of the scalar polarizabilities is determined.
0.818147
0.683744
0.134402
2004.07306
A new approach to mod 2 decompositions of BSU(2) and BSO(3)
Dwyer, Miller and Wilkerson proved that at the prime 2, the classifying spaces of SU(2) and SO(3) can be obtained as a homotopy pushout of the classifying spaces of certain subgroups. In this paper we show explicitly how these decompositions arise from the fusion systems of SU(2) and SO(3) over maximal discrete 2-toral subgroups.
We obtain an asymptotic formula for the mean value of L-functions associated to cubic characters over F_q[t]. We solve this problem in the non-Kummer setting when q=2 (mod 3) and in the Kummer case when q=1 (mod 3). The proofs rely on obtaining precise asymptotics for averages of cubic Gauss sums over function fields, which can be studied using the theory of metaplectic Eisenstein series. In the non-Kummer setting we display some explicit cancellation between the main term and the dual term coming from the approximate functional equation of the L-functions.
0.733567
0.701098
0.032469
2004.07307
The arrow of time across five centuries of classical music
The concept of time series irreversibility -- the degree by which the statistics of signals are not invariant under time reversal -- naturally appears in non-equilibrium physics in stationary systems which operate away from equilibrium and produce entropy. This concept has not been explored to date in the realm of musical scores as these are typically short sequences whose time reversibility estimation could suffer from strong finite size effects which preclude interpretability. Here we show that the so-called Horizontal Visibility Graph method -- which recently was shown to quantify such statistical property even in non-stationary signals -- is a method that can estimate time reversibility of short symbolic sequences, thus unlocking the possibility of exploring such properties in the context of musical compositions. Accordingly, we analyse over 8000 musical pieces ranging from the Renaissance to the early Modern period and certify that, indeed, most of them display clear signatures of time irreversibility. Since by construction stochastic processes with a linear correlation structure (such as 1/f noise) are time reversible, we conclude that musical compositions have a considerably richer structure, that goes beyond the traditional properties retrieved by the power spectrum or similar approaches. We also show that musical compositions display strong signs of nonlinear correlations, that nonlinearity is correlated to irreversibility, and that these are also related to asymmetries in the abundance of musical intervals, which we associate to the narrative underpinning a musical composition. These findings provide tools for the study of musical periods and composers, as well as criteria related to music appreciation and cognition.
Audio Classical Composer Identification (ACC) is an important problem in Music Information Retrieval (MIR) which aims at identifying the composer for audio classical music clips. The famous annual competition, Music Information Retrieval Evaluation eXchange (MIREX), also takes it as one of the four training&testing tasks. We built a hybrid model based on Deep Belief Network (DBN) and Stacked Denoising Autoencoder (SDA) to identify the composer from audio signal. As a matter of copyright, sponsors of MIREX cannot publish their data set. We built a comparable data set to test our model. We got an accuracy of 76.26% in our data set which is better than some pure models and shallow models. We think our method is promising even though we test it in a different data set, since our data set is comparable to that in MIREX by size. We also found that samples from different classes become farther away from each other when transformed by more layers in our model.
0.841684
0.675053
0.166631
2004.07308
Hopf monoids of ordered simplicial complexes
We study ordered matroids and generalized permutohedra from a Hopf theoretic point of view. Our main object is a Hopf monoid in the vector species of extended generalized permutahedra equipped with an order of the coordinates; this monoid extends the Hopf monoid of generalized permutahedra studied by Aguiar and Ardila. Our formula for the antipode is cancellation-free and multiplicity-free, and is supported only on terms that are compatible with the local geometry of the polyhedron. Our result is part of a larger program to understand orderings on ground sets of simplicial complexes (for instance, on shifted and matroid independence complexes). In this vein, we show that shifted simplicial complexes and broken circuit complexes generate Hopf monoids that are expected to exhibit similar behavior.
It is known that there are finitely many simplicial complexes (up to isomorphism) with a given number of vertices. Translating to the language of $h$-vectors, there are finitely many simplicial complexes of bounded dimension with $h_1=k$ for any natural number $k$. In this paper we study the question at the other end of the $h$-vector: Are there only finitely many $(d-1)$-dimensional simplicial complexes with $h_d=k$ for any given $k$? The answer is no if we consider general complexes, but when focus on three cases coming from matroids: (i) independence complexes, (ii) broken circuit complexes, and (iii) order complexes of geometric lattices. We prove the answer is yes in cases (i) and (iii) and conjecture it is also true in case (ii).
0.907214
0.802723
0.104491
2004.07309
Algebras with matchings and link Floer homology
We explain how to use bordered algebras to compute a version of link Floer homology. As a corollary, we also give a fast computation of the Thuston polytope for links in the three-sphere.
In principle, Floer theory can be extended to define homotopy invariants of families of equivalent objects (e.g. Hamiltonian isotopic symplectomorphisms, 3-manifolds, Legendrian knots, etc.) parametrized by a smooth manifold B. The invariant of a family consists of a filtered chain homotopy type, which gives rise to a spectral sequence whose E^2 term is the homology of B with twisted coefficients in the Floer homology of the fibers. The filtered chain homotopy type also gives rise to a "family Floer homology" to which the spectral sequence converges. For any particular version of Floer theory, some analysis needs to be carried out in order to turn this principle into a theorem. This paper constructs the invariant in detail for the model case of finite dimensional Morse homology, and shows that it recovers the Leray-Serre spectral sequence of a smooth fiber bundle. We also generalize from Morse homology to Novikov homology, which involves some additional subtleties.
0.900735
0.837486
0.063249
2004.07310
Stability of doubly-intractable distributions
Doubly-intractable distributions appear naturally as posterior distributions in Bayesian inference frameworks whenever the likelihood contains a normalizing function $Z$. Having two such functions $Z$ and $\widetilde Z$ we provide estimates of the total variation and Wasserstein distance of the resulting posterior probability measures. As a consequence this leads to local Lipschitz continuity w.r.t. $Z$. In the more general framework of a random function $\widetilde Z$ we derive bounds on the expected total variation and expected Wasserstein distance. The applicability of the estimates is illustrated within the setting of two representative Monte Carlo recovery scenarios.
Non-convex optimization problems often arise from probabilistic modeling, such as estimation of posterior distributions. Non-convexity makes the problems intractable, and poses various obstacles for us to design efficient algorithms. In this work, we attack non-convexity by first introducing the concept of \emph{probable convexity} for analyzing convexity of real functions in practice. We then use the new concept to analyze an inference problem in the \emph{Correlated Topic Model} (CTM) and related nonconjugate models. Contrary to the existing belief of intractability, we show that this inference problem is concave under certain conditions. One consequence of our analyses is a novel algorithm for learning CTM which is significantly more scalable and qualitative than existing methods. Finally, we highlight that stochastic gradient algorithms might be a practical choice to resolve efficiently non-convex problems. This finding might find beneficial in many contexts which are beyond probabilistic modeling.
0.835065
0.73903
0.096035
2004.07311
Edge Computing For Smart Health: Context-aware Approaches, Opportunities, and Challenges
Improving efficiency of healthcare systems is a top national interest worldwide. However, the need of delivering scalable healthcare services to the patients while reducing costs is a challenging issue. Among the most promising approaches for enabling smart healthcare (s-health) are edge-computing capabilities and next-generation wireless networking technologies that can provide real-time and cost-effective patient remote monitoring. In this paper, we present our vision of exploiting multi-access edge computing (MEC) for s-health applications. We envision a MEC-based architecture and discuss the benefits that it can bring to realize in-network and context-aware processing so that the s-health requirements are met. We then present two main functionalities that can be implemented leveraging such an architecture to provide efficient data delivery, namely, multimodal data compression and edge-based feature extraction for event detection. The former allows efficient and low distortion compression, while the latter ensures high-reliability and fast response in case of emergency applications. Finally, we discuss the main challenges and opportunities that edge computing could provide and possible directions for future research.
As we are moving towards the Internet of Things (IoT) era, the number of connected physical devices is increasing at a rapid pace. Mobile edge computing is emerging to handle the sheer volume of produced data and reach the latency demand of computation-intensive IoT applications. Although the advance of mobile edge computing on service latency is studied solidly, security and efficiency on data usage in mobile edge computing have not been clearly identified. In this article, we examine the architecture of mobile edge computing and explore the potentials of utilizing mobile edge computing to enhance data analysis for IoT applications, while achieving data security and computational efficiency. Specifically, we first introduce the overall architecture and several promising edge-assisted IoT applications. We then study the security, privacy and efficiency challenges in data processing for mobile edge computing, and discuss the opportunities to enhance data security and improve computational efficiency with the assistance of edge computing, including secure data aggregation, secure data deduplication and secure computational offloading. Finally, several interesting directions on edge-empowered data analysis are presented for future research.
0.877511
0.755031
0.12248
2004.07312
RescueNet: Joint Building Segmentation and Damage Assessment from Satellite Imagery
Accurate and fine-grained information about the extent of damage to buildings is essential for directing Humanitarian Aid and Disaster Response (HADR) operations in the immediate aftermath of any natural calamity. In recent years, satellite and UAV (drone) imagery has been used for this purpose, sometimes aided by computer vision algorithms. Existing Computer Vision approaches for building damage assessment typically rely on a two stage approach, consisting of building detection using an object detection model, followed by damage assessment through classification of the detected building tiles. These multi-stage methods are not end-to-end trainable, and suffer from poor overall results. We propose RescueNet, a unified model that can simultaneously segment buildings and assess the damage levels to individual buildings and can be trained end-toend. In order to to model the composite nature of this problem, we propose a novel localization aware loss function, which consists of a Binary Cross Entropy loss for building segmentation, and a foreground only selective Categorical Cross-Entropy loss for damage classification, and show significant improvement over the widely used Cross-Entropy loss. RescueNet is tested on the large scale and diverse xBD dataset and achieves significantly better building segmentation and damage classification performance than previous methods and achieves generalization across varied geographical regions and disaster types.
This paper presents a localization technique using aerial imagery maps and LIDAR based ground reflectivity for autonomous vehicles in urban environments. Traditional localization techniques using LIDAR reflectivity rely on high definition reflectivity maps generated from a mapping vehicle. The cost and effort required to maintain such prior maps are generally very high because it requires a fleet of expensive mapping vehicles. In this work we propose a localization technique where the vehicle localizes using aerial/satellite imagery, eradicating the need to develop and maintain complex high-definition maps. The proposed technique has been tested on a real world dataset collected from a test track in Ann Arbor, Michigan. This research concludes that aerial imagery based maps provides real-time localization performance similar to state-of-the-art LIDAR based maps for autonomous vehicles in urban environments at reduced costs.
0.872167
0.668986
0.203181
2004.07313
Evaluation of Generalizability of Neural Program Analyzers under Semantic-Preserving Transformations
The abundance of publicly available source code repositories, in conjunction with the advances in neural networks, has enabled data-driven approaches to program analysis. These approaches, called neural program analyzers, use neural networks to extract patterns in the programs for tasks ranging from development productivity to program reasoning. Despite the growing popularity of neural program analyzers, the extent to which their results are generalizable is unknown. In this paper, we perform a large-scale evaluation of the generalizability of two popular neural program analyzers using seven semantically-equivalent transformations of programs. Our results caution that in many cases the neural program analyzers fail to generalize well, sometimes to programs with negligible textual differences. The results provide the initial stepping stones for quantifying robustness in neural program analyzers.
In functional programming, point-free relation calculi have been fruitful for general theories of program construction, but for specific applications pointwise expressions can be more convenient and comprehensible. In imperative programming, refinement calculi have been tied to pointwise expression in terms of state variables, with the curious exception of the ubiquitous but invisible heap. To integrate pointwise with point-free, de Moor and Gibbons extended lambda calculus with non-injective pattern matching interpreted using relations. This article gives a semantics of that language using ``ideal relations'' between partial orders, and a second semantics using predicate transformers. The second semantics is motivated by its potential use with separation algebra, for pattern matching in programs acting on the heap. Laws including lax beta and eta are proved in these models and a number of open problems are posed.
0.927958
0.715251
0.212707
2004.07314
Associative submanifolds and gradient cycles
We discuss a model for associative submanifolds in $G_{2}$-manifolds with K3 fibrations, in the adiabatic limit. The model involves graphs in a 3-manifold whose edges are locally gradient flow lines. We show that this model produces analogues of known singularity formation phenomena for associative submanifolds.
In this paper we study weakly irreducible holonomy representations of the normal connection of a spacelike submanifold in a pseudo-Riemannian space from. We associate screen representations to weakly irreducible normal holonomy groups and classify the screen representations having the Borel-Lichn\'erowicz property. In particular, we derive a classification of Lorentzian normal holonomy representations.
0.861085
0.759562
0.101523
2004.07315
Hard Synchrotron Spectra from Magnetically Dominated Plasma Turbulence
Synchrotron emission from astrophysical nonthermal sources usually assumes that the emitting particles are isotropic. By means of large-scale two- and three-dimensional particle-in-cell simulations, we demonstrate that the dissipation of magnetically-dominated ($\sigma_0\gg1$) turbulence in pair plasmas leads to strongly anisotropic particle distributions. At Lorentz factors $\sim \sigma_0 \gamma_{th0}$ (here, $\gamma_{th0}$ is the initial Lorentz factor), the particle velocity is preferentially aligned with the local magnetic field; instead, the highest energy particles are roughly isotropic. This energy-dependent anisotropy leads to a synchrotron spectral flux $\nu F_\nu\propto \nu^s$ that is much harder than for isotropic particles. Remarkably, for $\sigma_0\gg1$ we find that the solid-angle-averaged spectral slope in the slow cooling regime is $s\sim 0.5-0.7$ for a wide range of turbulence fluctuations, $0.25\lesssim \delta B_{\rm rms0}^2/B_0^2\lesssim 4$, despite significant variations in the power-law energy spectrum of nonthermal particles. This is because weaker turbulence levels imprint a stronger degree of anisotropy, thereby counteracting the effect of the steeper particle spectrum. The synchrotron spectral slope may be even harder, $s\gtrsim 0.7$, if the observer is in the plane perpendicular to the mean magnetic field. Our results are independent of domain size and dimensionality. Our findings may help explaining the origin of hard synchrotron spectra of astrophysical nonthermal sources, most notably the radio spectrum of Pulsar Wind Nebulae.
Plasma instabilities can be encountered in many branches of physics. This work focuses on relativistic plasmas with applications in theoretical astrophysics and particle accelerator physics. Even though these fields seem to be unrelated the underlying plasma physics processes are often very similar. Two plasma instabilities - the beam-beam instability and the coherent synchrotron radiation instability - are analyzed. The former severely limits the achievable luminosity in storage rings and is related to the two-stream instability which has been proposed as a candidate for the radiation mechanism of radio pulsars. The main emphasis is on coherent synchrotron radiation which can lead to prohibitive energy losses in bunch compressors. Coherent synchrotron radiation also makes up the intense emission of radio waves by pulsars. Simple models based on the linearized Vlasov equation and relativistic magnetohydrodynamics which allow to compute detailed spectra of the emitted radiation are developed.
0.85219
0.748542
0.103648
2004.07316
Modelling with Volna-OP2: Towards tsunami threat reduction
Accurate and efficient tsunami modelling is essential for providing tsunami forecasts and hazard assessments. Volna-OP2 is a finite volume solver of the nonlinear shallow water equations and its capabilities of producing both faster than real time ensembles and high resolution inundation studies are presented here. The code is massively parallelised and can utilise various high performance computing architectures. When an earthquake is detected there is always some uncertainty on the source parameters. Generating a faster than real time ensemble for maximum wave heights which captures this uncertainty would be of great benefit to tsunami warning centres. The 2003 Boumerdes earthquake (Algeria) acts as a test case for showing Volna-OP2's ability at rapidly forecasting regional maximum wave heights. Drawing on various earthquake sources proposed in the literature and scaling the magnitudes to mimic uncertainty on the source, 20 separate earthquake realisations are simulated for 4 hours real time in 97s on two Nvidia V100 GPUs. Further a reduced ensemble of the Lisbon 1755 tsunami with an emphasis on the effects to the Irish coastline is presented. Where again various earthquake sources have been drawn from the literature and simulated on a regional scale. Finally, a pilot study which builds upon the reduced ensemble results investigates the inundation of a Lisbon tsunami on key sections of the Irish coastline. The results of this pilot study highlight that the inundation is constrained to low-lying areas with maximum run-up heights of $\approx 3.4m$ being found.
Floods, tides and tsunamis are turbulent, yet conventional models are based upon depth averaging inviscid irrotational flow equations. We propose to change the base of such modelling to the Smagorinksi large eddy closure for turbulence in order to appropriately match the underlying fluid dynamics. Our approach allows for large changes in fluid depth to cater for extreme inundations. The key to the analysis underlying the approach is to choose surface and bed boundary conditions that accommodate a constant turbulent shear as a nearly neutral mode. Analysis supported by slow manifold theory then constructs a model for the coupled dynamics of the fluid depth and the mean turbulent lateral velocity. The model resolves the internal turbulent shear in the flow and thus may be used in further work to rationally predict erosion and transport in turbulent floods.
0.860048
0.733493
0.126554
2004.07317
An Evaluation of DNN Architectures for Page Segmentation of Historical Newspapers
One important and particularly challenging step in the optical character recognition (OCR) of historical documents with complex layouts, such as newspapers, is the separation of text from non-text content (e.g. page borders or illustrations). This step is commonly referred to as page segmentation. While various rule-based algorithms have been proposed, the applicability of Deep Neural Networks (DNNs) for this task recently has gained a lot of attention. In this paper, we perform a systematic evaluation of 11 different published DNN backbone architectures and 9 different tiling and scaling configurations for separating text, tables or table column lines. We also show the influence of the number of labels and the number of training pages on the segmentation quality, which we measure using the Matthews Correlation Coefficient. Our results show that (depending on the task) Inception-ResNet-v2 and EfficientNet backbones work best, vertical tiling is generally preferable to other tiling approaches, and training data that comprises 30 to 40 pages will be sufficient most of the time.
Most of the current methods for mining parallel texts from the web assume that web pages of web sites share same structure across languages. We believe that there still exists a non-negligible amount of parallel data spread across sources not satisfying this assumption. We propose an approach based on a combination of bivec (a bilingual extension of word2vec) and locality-sensitive hashing which allows us to efficiently identify pairs of parallel segments located anywhere on pages of a given web domain, regardless their structure. We validate our method on realigning segments from a large parallel corpus. Another experiment with real-world data provided by Common Crawl Foundation confirms that our solution scales to hundreds of terabytes large set of web-crawled data.
0.878108
0.668423
0.209685
2004.07318
Scaling of high-energy elastic scattering and the observation of Odderon
We provide a statistically significant observation of the elusive Odderon exchange, based on novel and model-independent analysis of the scaling properties of the differential cross sections of elastic $pp$ and $p\bar p$ scattering in the TeV energy range. We report the statistical significance of the observed Odderon signal at the level of 6.26$\sigma$.
Proton-proton total and elastic cross sections are considered in the Dakhno-Nikonov eikonal model [L.G. Dakhno, V.A. Nikonov, Eur. Phys. J. A8, 209 (1999)] at ultra-high energies. The model takes into account the quark structure of hadrons and the gluon structure of the supercritical pomeron that results in colour screening. The pomeron is considered as an input interaction term. The model gives a reasonably good description of the preLHC and LHC data for $pp$ collisions with a growth of the type $\ln^2s$ for total and elastic cross sections and $(\tau={\bf q}_\perp^2\ln^2s)$-scaling for diffractive scattering. We present parameters of the supercritical pomeron and provide predictions for the energy region $\sqrt{s}\sim 10^2-10^4$ TeV.
0.896892
0.771385
0.125507
2004.07321
Generating infinite monoids of cellular automata
For a group $G$ and a set $A$, let $\text{CA}(G;A)$ be the monoid of all cellular automata over $A^G$, and let $\text{ICA}(G;A)$ be its group of units. By establishing a characterisation of surjunctuve groups in terms of the monoid $\text{CA}(G;A)$, we prove that the rank of $\text{CA}(G;A)$ (i.e. the smallest cardinality of a generating set) is equal to the rank of $\text{ICA}(G;A)$ plus the relative rank of $\text{ICA}(G;A)$ in $\text{CA}(G;A)$, and that the latter is infinite when $G$ has an infinite decreasing chain of normal subgroups of finite index. Moreover, we study the monoid $\text{LCA}(G;V)$ of all linear cellular automata over $V^G$ and its group of units $\text{ILCA}(G;V)$. For any infinite abelian group $G$ and any vector space $V$, we show that $\text{LCA}(G;V)$ is not finitely generated, while for any finitely generated torsion-free nilpotent group $H$ and any field $\mathbb{F}$, we show that $\text{ILCA}(H;\mathbb{F})$ is finitely generated if and only if $\mathbb{F}$ is finite.
Hyphae within the mycelia of the ascomycetous fungi are compartmentalised by septa. Each septum has a pore that allows for inter-compartmental and inter-hyphal streaming of cytosol and even organelles. The compartments, however, have special organelles, Woronin bodies, that can plug the pores. When the pores are blocked, no flow of cytoplasm takes place. Inspired by the controllable compartmentalisation within the mycelium of the ascomycetous fungi we designed two-dimensional fungal automata. A fungal automaton is a cellular automaton where communication between neighbouring cells can be blocked on demand. We demonstrate computational universality of the fungal automata by implementing sandpile cellular automata circuits there. We reduce the Monotone Circuit Value Problem to the Fungal Automaton Prediction Problem. We construct families of wires, cross-overs and gates to prove that the fungal automata are P-complete.
0.81074
0.776237
0.034503
2004.07322
Regularity for $C^{1,\alpha}$ interface transmission problems
We study existence, uniqueness, and optimal regularity of solutions to transmission problems for harmonic functions with $C^{1,\alpha}$ interfaces. For this, we develop a new geometric stability argument based on the mean value property.
In this paper, we propose an accurate finite difference method to discretize the $d$-dimensional (for $d\ge 1$) tempered integral fractional Laplacian and apply it to study the tempered effects on the solution of problems arising in various applications. Compared to other existing methods, our method has higher accuracy and simpler implementation. Our numerical method has an accuracy of $O(h^\epsilon)$, for $u \in C^{0, \alpha+\epsilon} (\bar{\Omega})$ if $\alpha < 1$ (or $u \in C^{1, \alpha-1+\epsilon} (\bar{\Omega})$ if $\alpha \ge 1$) with $\epsilon > 0$, suggesting the minimum consistency conditions. The accuracy can be improved to $O(h^2)$, for $u \in C^{2, \alpha+\epsilon} (\bar{\Omega})$ if $\alpha < 1$ (or $u \in C^{3, \alpha - 1 + \epsilon} (\bar{\Omega})$ if $\alpha \ge 1$). Numerical experiments confirm our analytical results and provide insights in solving the tempered fractional Poisson problem. It suggests that to achieve the second order of accuracy, our method only requires the solution $u \in C^{1,1}(\bar{\Omega})$ for any $0<\alpha<2$. Moreover, if the solution of tempered fractional Poisson problems satisfies $u \in C^{p, s}(\bar{\Omega})$ for $p = 0, 1$ and $0<s \le 1$, our method has the accuracy of $O(h^{p+s})$. Since our method yields a (multilevel) Toeplitz stiffness matrix, one can design fast algorithms via the fast Fourier transform for efficient simulations. Finally, we apply it together with fast algorithms to study the tempered effects on the solutions of various tempered fractional PDEs, including the Allen-Cahn equation and Gray-Scott equations.
0.902533
0.713693
0.188841
2004.07323
The Maximum Distance Problem and Minimal Spanning Trees
Given a compact $E\subset \mathbb{R}^n$ and $s > 0$, the maximum distance problem asks to find a compact and connected subset of $\mathbb{R}^n$ of smallest one dimensional Hausdorff measure, whose $s$-neighborhood covers $E$. For $E\subset \mathbb{R}^2$, we prove that minimizing over minimal spanning trees that connect the centers of balls of radius $s$, which cover $E$, solves the maximum distance problem. The main difficulty in proving this result, is overcome by the proof of Lemma 3.5, which states that one is able to cover the $s$-neighborhood of a Lipschitz curve in $\mathbb{R}^2$, with a finite number balls of radius $s$, and connect their centers with another Lipschitz curve, $\Gamma_\ast$, where $\mathcal{H}^1(\Gamma_\ast)$ is arbitrarily close to $\mathcal{H}^1(\Gamma)$.
In this paper, our goal is to characterize two graph classes based on the properties of minimal vertex (edge) separators. We first present a structural characterization of graphs in which every minimal vertex separator is a stable set. We show that such graphs are precisely those in which the induced subgraph, namely, a cycle with exactly one chord is forbidden. We also show that deciding maximum such forbidden subgraph is NP-complete by establishing a polynomial time reduction from maximum induced cycle problem [1]. This result is of independent interest and can be used in other combinatorial problems. Secondly, we prove that a graph has the following property: every minimal edge separator induces a matching (that is no two edges share a vertex in common) if and only if it is a tree.
0.855054
0.825814
0.02924
2004.07324
Building a Multi-domain Neural Machine Translation Model using Knowledge Distillation
Lack of specialized data makes building a multi-domain neural machine translation tool challenging. Although emerging literature dealing with low resource languages starts to show promising results, most state-of-the-art models used millions of sentences. Today, the majority of multi-domain adaptation techniques are based on complex and sophisticated architectures that are not adapted for real-world applications. So far, no scalable method is performing better than the simple yet effective mixed-finetuning, i.e finetuning a generic model with a mix of all specialized data and generic data. In this paper, we propose a new training pipeline where knowledge distillation and multiple specialized teachers allow us to efficiently finetune a model without adding new costs at inference time. Our experiments demonstrated that our training pipeline allows improving the performance of multi-domain translation over finetuning in configurations with 2, 3, and 4 domains by up to 2 points in BLEU.
Recent work on end-to-end neural network-based architectures for machine translation has shown promising results for En-Fr and En-De translation. Arguably, one of the major factors behind this success has been the availability of high quality parallel corpora. In this work, we investigate how to leverage abundant monolingual corpora for neural machine translation. Compared to a phrase-based and hierarchical baseline, we obtain up to $1.96$ BLEU improvement on the low-resource language pair Turkish-English, and $1.59$ BLEU on the focused domain task of Chinese-English chat messages. While our method was initially targeted toward such tasks with less parallel data, we show that it also extends to high resource languages such as Cs-En and De-En where we obtain an improvement of $0.39$ and $0.47$ BLEU scores over the neural machine translation baselines, respectively.
0.885213
0.814166
0.071046
2004.07325
Experimental observation of magnetic dimers in diluted Yb:YAlO$_3$
We present a comprehensive experimental investigation of Yb magnetic dimers in Yb$_{0.04}$Y$_{0.96}$AlO$_3$, an Yb-doped Yttrium Aluminum Perovskite (YAP) YAlO$_3$ by means of specific heat, magnetization and high-resolution inelastic neutron scattering (INS) measurements. In our sample, the Yb ions are randomly distributed over the lattice and $\sim 7$\% of Yb ions form quantum dimers due to nearest-neighbor antiferromagnetic coupling along the $c$-axis. At zero field, the dimer formation manifests itself in an appearance of an inelastic peak at $\Delta \approx 0.2$~meV in the INS spectrum and a Schottky-like anomaly in the specific heat. The structure factor of the INS peak exhibits a cosine modulation along the $L$ direction, in agreement with the $c$-axis nearest-neighbor intra-dimer coupling. A careful fitting of the low-temperature specific heat shows that the excited state is a degenerate triplet, which indicates a surprisingly small anisotropy of the effective Yb-Yb exchange interaction despite the low crystal symmetry and anisotropic magnetic dipole contribution, in agreement with previous reports for the Yb parent compound, YbAlO$_3$ [arXiv:1904.11513, arXiv:1902.04112], and in contrast to Yb$_2$Pt$_2$Pb [arXiv:1606.01309, arXiv:1907.01067]. The obtained results are precisely reproduced by analytical calculations for the Yb dimers.
Susceptibility, ESR and magnetization measurements have been performed on si ngle crystals of an S=1 bond alternating chain compound: [Ni(333-tet)(\mu-NO _2)](ClO_4) (333-tet = N,N'-bis(3-aminopropyl)propane-1,3-diamine) and the c ompound doped with a small amount of Zn. We observed an anomalous angular de pendence in the Zn-doped sample. These behaviors are well explained by the m odel based on the VBS picture for the singlet-dimer phase. The picture impli es that the free spins of S=1 with a positive single-ion anisotropy are indu ced at the edges of the chains without forming the singlet-dimer.
0.888771
0.731041
0.157731
2004.07326
Modeling Hall viscosity in magnetic-skyrmion systems
Magnetic skyrmions are topologically stable objects that are made with a bunch of spins tightly arranged in a smooth fashion. Their topological nature provides unusual and complex transport properties, such as the skyrmion Hall effect. Extensive Hall data have further revealed asymmetry between skyrmion and antiskyrmion Hall angles, which cannot be accounted by known mechanisms. Here, we explain this asymmetry by utilizing another universal transport coefficient called `Hall viscosity,' extensively studied in quantum Hall systems. Hall viscosity is modeled in steady-state skyrmions motion by generalizing the Thiele equation with a transverse velocity component and is independent of the skyrmion charge. Our analyses, based on available asymmetric Hall angle data, reveal this transverse force amounts 3\% - 5.4\% of the force due to the skyrmion Hall effect. Further clarification of Hall viscosity will be essential for designing next generation storage devices properly, not to mention for our deeper understanding of fundamental properties of nature.
We observe the signature of zero-field ground-state skyrmions in BiSb topological insulator / MnGa bi-layers by using the topological Hall effect (THE). We observe a large critical interfacial Dzyaloshinskii-Moriya-Interaction energy (5.0 pJ/m) at the BiSb/MnGa interface that can be tailored by controlling the annealing temperature of the MnGa template. The THE was observed at room temperature even under absence of an external magnetic field, which gives the strong evidence for the existence of thermodynamically stable skyrmions in MnGa/BiSb bi-layers. Our results will give insight into the role of interfacial DMI tailored by suitable material choice and growth technique for generation of stable skyrmions at room temperature.
0.880505
0.779947
0.100558
2004.07327
Astronomical masers and Dicke's superradiance
We consider the radiation properties and processes of a gas with a population inversion using the formalism based on the Maxwell-Bloch equations. We focus on the maser action and Dicke's superradiance to establish their relationship in the overall radiation process during the temporal evolution of the system as a function of position. We show that the maser action and superradiance are not competing phenomena but are rather complementary, and define two distinct limits for the intensity of radiation. Masers characterise the quasi-steady state limit, when the population inversion density and the polarisation amplitude vary on time-scales longer than those of non-coherent processes affecting their evolution (e.g., collisions), while superradiance defines the fast transient regime taking place when these conditions are reversed. We show how a transition from a maser regime to superradiance will take place whenever a critical threshold for the column density of the population inversion is reached, at which point a strong level of coherence is established in the system and a powerful burst of radiation can ensue during the transient regime. This critical level also determines the spatial region where a transition from the unsaturated to the saturated maser regimes will take place; superradiance can thus be seen as the intermediary between the two. We also quantify the gain in radiation intensity attained during the superradiance phase relative to the two maser regimes, and show how the strong coherence level during superradiance is well suited to explain observations that reveal intense and fast radiation flares in maser-hosting regions.
Motivated by recent experiments with superradiant Bose-Einstein Condensate (BEC) we consider simple microscopic models describing rigorously the interference of the two cooperative phenomena, BEC and radiation, in thermodynamic equilibrium. Our resuts in equilibrium confirm the presence of the observed superradiant light scattering from BEC: (a) the equilibrium superradiance exists only below a certain transition temperature; (b) there is superradiance and matter-wave (BEC) enhancement due to the coherent coupling between light and matter.
0.780578
0.730182
0.050397
2004.07328
The Reduced Proper Motion selected halo: methods and description of the catalogue
The Gaia mission has provided the largest ever astrometric chart of the Milky Way. Using it to map the Galactic halo is helpful for disentangling its merger history. The identification of halo stars in Gaia DR2 with reliable distance estimates requires special methods because such stars are typically farther away and scarce. We apply the reduced proper motion (RPM) method to identify halo main sequence stars on the basis of Gaia photometry and proper motions. Using the colour-absolute-magnitude relation for this type of stars, we calculate photometric distances. Our selection results in a set of $\sim10^7$ tentative main sequence halo stars with typical distance uncertainties of $7\%$ and with median velocity errors of 20 km/s. The median distance of our sample is $\sim 4.4$ kpc, with the faintest stars located at $\sim 16$ kpc. The spatial distribution of the stars in our sample is centrally concentrated. Visual inspection of the mean velocities of stars on the sky reveals large-scale patterns as well as clear imprints of the GD-1 stream and tentative hints of the Jhelum and Leiptr streams. Incompleteness and selection effects limit our ability to interpret the patterns reliably as well as to identify new substructures. We define a pseudo-velocity space by setting to zero the line-of-sight velocities of our sample stars. In this space, we recover several known structures such as the footprint of Gaia-Enceladus (i.e. the Gaia-Sausage) as well as the Helmi streams and some other retrograde substructures (Sequoia, Thamnos). We show that the two-point velocity correlation function reveals significant clustering on scales smaller than 100 km/s, of similar amplitude as found for the 6D Gaia halo sample. This clustering indicates the presence of nearby streams that are predominantly phase-mixed.
Recent results of microlensing surveys, show that 10-20% of the dark halo mass of the Milky Way consists of compact objects. The masses of these compact objects range from 0.1 to 1 solar mass. New theoretical cooling models for white dwarfs, and the detection of faint blue high proper motion objects, imply that ancient white dwarfs might make up part of this population. In this pilot project, using data from the C and D patches of the ESO Imaging Survey and data obtained at CTIO, we attempted to find such halo white dwarfs in the solar neighbourhood. With a time baseline of approximately one year between data sets and a limiting I-band magnitude of 23, we can find these high proper motion objects up to distances of 85 parsecs. In the 2.5 square degrees studied so far we have found three high proper motion candidates.
0.787812
0.767808
0.020004
2004.07329
Augmented Lagrangian preconditioners for the Oseen-Frank model of cholesteric liquid crystals
We propose a robust and efficient augmented Lagrangian-type preconditioner for solving linearizations of the Oseen-Frank model arising in cholesteric liquid crystals. By applying the augmented Lagrangian method, the Schur complement of the director block can be better approximated by the weighted mass matrix of the Lagrange multiplier, at the cost of making the augmented director block harder to solve. In order to solve the augmented director block, we develop a robust multigrid algorithm which includes an additive Schwarz relaxation that captures a pointwise version of the kernel of the semi-definite term. Furthermore, we prove that the augmented Lagrangian term improves the discrete enforcement of the unit-length constraint. Numerical experiments verify the efficiency of the algorithm and its robustness with respect to problem-related parameters (Frank constants and cholesteric pitch) and the mesh size.
The chiral structure of liquid crystalline phases arises due to the intrinsic chirality of the constituent mesogens. While it is seemingly straightforward to quantify the macroscopic chirality by using, for instance, the cholesteric pitch or the optical rotatory power, it is not as simple to quantify the chirality of a single molecule. I will discuss a systematic quantification of molecular chirality and show how the resulting chiral parameters may be used to predict macroscopic chiral structure.
0.937732
0.708889
0.228843
2004.07330
A New Constrained Optimization Model for Solving the Nonsymmetric Stochastic Inverse Eigenvalue Problem
The stochastic inverse eigenvalue problem aims to reconstruct a stochastic matrix from its spectrum. While there exists a large literature on the existence of solutions for special settings, there are only few numerical solution methods available so far. Recently, Zhao et al. (2016) proposed a constrained optimization model on the manifold of so-called isospectral matrices and adapted a modified Polak-Ribi\`ere-Polyak conjugate gradient method to the geometry of this manifold. However, not every stochastic matrix is an isospectral one and the model from Zhao et al. is based on the assumption that for each stochastic matrix there exists a (possibly different) isospectral, stochastic matrix with the same spectrum. We are not aware of such a result in the literature, but will see that the claim is at least true for $3 \times 3$ matrices. In this paper, we suggest to extend the above model by considering matrices which differ from isospectral ones only by multiplication with a block diagonal matrix with $2 \times 2$ blocks from the special linear group $SL(2)$, where the number of blocks is given by the number of pairs of complex-conjugate eigenvalues. Every stochastic matrix can be written in such a form, which was not the case for the form of the isospectral matrices. We prove that our model has a minimizer and show how the Polak-Ribi\`ere-Polyak conjugate gradient method works on the corresponding more general manifold. We demonstrate by numerical examples that the new, more general method performs similarly as the one from Zhao et al.
We study an optimal investment problem under contagion risk in a financial model subject to multiple jumps and defaults. The global market information is formulated as a progressive enlargement of a default-free Brownian filtration, and the dependence of default times is modeled by a conditional density hypothesis. In this Ito-jump process model, we give a decomposition of the corresponding stochastic control problem into stochastic control problems in the default-free filtration, which are determined in a backward induction. The dynamic programming method leads to a backward recursive system of quadratic backward stochastic differential equations (BSDEs) in Brownian filtration, and our main result proves, under fairly general conditions, the existence and uniqueness of a solution to this system, which characterizes explicitly the value function and optimal strategies to the optimal investment problem. We illustrate our solutions approach with some numerical tests emphasizing the impact of default intensities, loss or gain at defaults and correlation between assets. Beyond the financial problem, our decomposition approach provides a new perspective for solving quadratic BSDEs with a finite number of jumps.
0.849543
0.694611
0.154932
2004.07331
Shear-induced gelation of self-yielding active networks
Molecular-motor generated active stresses drive the cytoskeleton away from equilibrium, endowing it with tunable mechanical properties that are essential for diverse functions such as cell division and motility[1-5]. Designing analogous biomimetic systems is a key prerequisite for creating active matter that can emulate cellular functions[6-7]. These long-term goals requires understanding of how motor-generated stresses tune the mechanics of filamentous networks[8-11]. In microtubule-based active matter, kinesin motors generate extensile motion that leads to persistent breaking and reforming of the network links[12]. We study how such microscopic dynamics modifies the network's mechanical properties, uncovering that the network viscosity first increases with the imposed shear rate before transitioning back to a low-viscosity state. The non-monotonic shear-dependent viscosity can be controlled by tuning the speed of molecular motors. A two-state phenomenological model that incorporates liquid- and solid-like elements quantitatively relates the non-monotonic shear-rate-dependent viscosity to locally-measured flows. These studies show that rheology of extensile networks are different from previously studied active gels[13], where contractility enhances mechanical stiffness. Moreover, the flow induced gelation is not captured by continuum models of hydrodynamically interacting swimmers[14-21]. Observation of activity-dependent viscoelasticity necessitates the development of models for self-yielding of soft active solids whose intrinsic active stresses fluidize or stiffen the network.
The subject of this work is the instability mechanism of simple shear flows, like Hagen-Poiseuille pipe flow, which is a long-standing problem in fluid mechanics [1,2]. A possible analogy with phenomenological theory of ideal plasticity in solids is explored. It allows an extension of the Navier-Stokes equations making the simple shear flows unstable. Following von Mises [4], the existence of maximal allowed shear stress or "yield stress" in fluid is assumed. After the actual stresses have reached this value, a new physical mechanism will be activated attempting to reduce them. This mechanism results in a pressure-like force, which has to be added to the Navier-Stokes equations. The yield stress itself is a material constant, which does not depend on the Reynolds number of particular flow. It will be shown how to estimate its value from experimental data. To demonstrate how the character of flow changes if the additional force is taken into account, an unsteady flow in a 2D nozzle is presented. The momentum source was introduced in the Navier-Stokes equations through the user-defined function's interface offered by Fluent [6]. The initial data and the results of simulation are summarized in appendix.
0.847078
0.657031
0.190047
2004.07332
Tests for multivariate normality -- a critical review with emphasis on weighted $L^2$-statistics
This article gives a synopsis on new developments in affine invariant tests for multivariate normality in an i.i.d.-setting, with special emphasis on asymptotic properties of several classes of weighted $L^2$-statistics. Since weighted $L^2$-statistics typically have limit normal distributions under fixed alternatives to normality, they open ground for a neighborhood of model validation for normality. The paper also reviews several other invariant tests for this problem, notably the energy test, and it presents the results of a large-scale simulation study. All tests under study are implemented in the accompanying R-package mnt.
In this paper we consider the properties of the Pesaran (2004, 2015a) CD test for cross-section correlation when applied to residuals obtained from panel data models with many estimated parameters. We show that the presence of period-specific parameters leads the CD test statistic to diverge as length of the time dimension of the sample grows. This result holds even if cross-section dependence is correctly accounted for and hence constitutes an example of the Incidental Parameters Problem. The relevance of this problem is investigated both for the classical Time Fixed Effects estimator as well as the Common Correlated Effects estimator of Pesaran (2006). We suggest a weighted CD test statistic which re-establishes standard normal inference under the null hypothesis. Given the widespread use of the CD test statistic to test for remaining cross-section correlation, our results have far reaching implications for empirical researchers.
0.93155
0.737707
0.193844
2004.07333
Reinforcement Learning in a Physics-Inspired Semi-Markov Environment
Reinforcement learning (RL) has been demonstrated to have great potential in many applications of scientific discovery and design. Recent work includes, for example, the design of new structures and compositions of molecules for therapeutic drugs. Much of the existing work related to the application of RL to scientific domains, however, assumes that the available state representation obeys the Markov property. For reasons associated with time, cost, sensor accuracy, and gaps in scientific knowledge, many scientific design and discovery problems do not satisfy the Markov property. Thus, something other than a Markov decision process (MDP) should be used to plan / find the optimal policy. In this paper, we present a physics-inspired semi-Markov RL environment, namely the phase change environment. In addition, we evaluate the performance of value-based RL algorithms for both MDPs and partially observable MDPs (POMDPs) on the proposed environment. Our results demonstrate deep recurrent Q-networks (DRQN) significantly outperform deep Q-networks (DQN), and that DRQNs benefit from training with hindsight experience replay. Implications for the use of semi-Markovian RL and POMDPs for scientific laboratories are also discussed.
Reinforcement learning algorithms, though successful, tend to over-fit to training environments hampering their application to the real-world. This paper proposes $\text{W}\text{R}^{2}\text{L}$ -- a robust reinforcement learning algorithm with significant robust performance on low and high-dimensional control tasks. Our method formalises robust reinforcement learning as a novel min-max game with a Wasserstein constraint for a correct and convergent solver. Apart from the formulation, we also propose an efficient and scalable solver following a novel zero-order optimisation method that we believe can be useful to numerical optimisation in general. We empirically demonstrate significant gains compared to standard and robust state-of-the-art algorithms on high-dimensional MuJuCo environments.
0.855951
0.795371
0.06058
2004.07334
Visual explanation of country specific differences in Covid-19 dynamics
This report provides a visual examination of Covid-19 case and death data. In particular, it shows that country specific differences can too a large extend be explained by two easily interpreted parameters. Namely, the delay between reported cases and deaths and the fraction of cases observed. Furthermore, this allows to lower bound the actual total number of people already infected.
As the coronavirus disease 2019 (COVID-19) becomes a global pandemic, policy makers must enact interventions to stop its spread. Data driven approaches might supply information to support the implementation of mitigation and suppression strategies. To facilitate research in this direction, we present a machine-readable dataset that aggregates relevant data from governmental, journalistic, and academic sources on the county level. In addition to county-level time-series data from the JHU CSSE COVID-19 Dashboard, our dataset contains more than 300 variables that summarize population estimates, demographics, ethnicity, housing, education, employment and in come, climate, transit scores, and healthcare system-related metrics. Furthermore, we present aggregated out-of-home activity information for various points of interest for each county, including grocery stores and hospitals, summarizing data from SafeGraph. By collecting these data, as well as providing tools to read them, we hope to aid researchers investigating how the disease spreads and which communities are best able to accommodate stay-at-home mitigation efforts. Our dataset and associated code are available at https://github.com/JieYingWu/COVID-19_US_County-level_Summaries.
0.843374
0.770151
0.073223
2004.07335
Nontrivial upper bounds for the least common multiple of an arithmetic progression
In this paper, we establish some nontrivial and effective upper bounds for the least common multiple of consecutive terms of a finite arithmetic progression. Precisely, we prove that for any two coprime positive integers $a$ and $b$, with $b\geq 2$, we have \[\mathrm{lcm}\left(a,a+b,\dots,a+nb\right) \leq \left(c_1\cdot b\log b\right)^{n+\left\lfloor \frac{a}{b}\right\rfloor}~~~~(\forall n\geq b+1),\] where $c_1=41.30142$. If in addition $b$ is a prime number and $a<b$, then we prove that for any $n\geq b+1$, we have $\mathrm{lcm}\left(a,a+b,\dots,a+nb\right) \leq \left(c_2\cdot b^{\frac{b}{b-1}}\right)^n$, where $c_2=12.30641$. Finally, we apply those inequalities to estimate the arithmetic function $M$ defined by $M(n):=\frac{1}{\varphi(n)}\sum_{\substack{1\leq\ell\leq n \\ \ell \wedge n=1}}\frac{1}{\ell}$ ($\forall n \geq 1$), as well as some values of the generalized Chebyshev function $\theta(x;k,\ell)$.
For families of $K3$ surfaces, we establish a sufficient criterion for real or complex multiplication. Our criterion is arithmetic in nature. It may show, at first, that the generic fibre of the family has a nontrivial endomorphism field. Moreover, the endomorphism field does not shrink under specialisation. As an application, we present two explicit families of $K3$ surfaces having real multiplication by $\bbQ(\sqrt{2})$ and $\bbQ(\sqrt{5})$, respectively.
0.895481
0.722685
0.172796
2004.07336
Parasitic neutron beam monitoring: proof of concept on gamma monitoring of neutron chopper phases
Neutron beam monitors are an essential diagnostic component of neutron scattering facilities. They are used to measure neutron flux, calibrating experiments performed on the instruments, allowing measurement of facility performance, understanding of beam-line components (such as choppers), calibration of detectors and tracking of beam stability. Ideally beam monitors do not perturb the beam. Previous work shows commercial beam monitors attenuate the beam by few percent in the worst case due to the 1-2 mm thick Aluminium entrance and exit windows and the material inside. Parasitic methods of neutron beam diagnostics, where there is no beam monitor directly in the beam, would be preferable. This paper presents the concept of a parasitic method of monitoring the beam which can be used for neutron chopper phasing. This is achieved by placing a gamma detector close to a rotating chopper and measures a signal proportional to the flux absorbed by the chopper. Neutrons interact with the Boron absorber on the chopper disc lead to gamma emission at 480 keV. Detection of these gamma rays is used to determine the chopper phasing and timing. Potentially information on the flux of the beamline can be extracted. Results from a proof of concept implementation show that diagnosis of neutron chopper phases is feasible.
We report here the non-detection of gravitational waves from the merger of binary neutron star systems and neutron-star--black-hole systems during the first observing run of Advanced LIGO. In particular we searched for gravitational wave signals from binary neutron star systems with component masses $\in [1,3] M_{\odot}$ and component dimensionless spins $< 0.05$. We also searched for neutron-star--black-hole systems with the same neutron star parameters, black hole mass $\in [2,99] M_{\odot}$ and no restriction on the black hole spin magnitude. We assess the sensitivity of the two LIGO detectors to these systems, and find that they could have detected the merger of binary neutron star systems with component mass distributions of $1.35\pm0.13 M_{\odot}$ at a volume-weighted average distance of $\sim$ 70Mpc, and for neutron-star--black-hole systems with neutron star masses of $1.4M_\odot$ and black hole masses of at least $5M_\odot$, a volume-weighted average distance of at least $\sim$ 110Mpc. From this we constrain with 90% confidence the merger rate to be less than 12,600 Gpc$^{-3}$yr$^{-1}$ for binary-neutron star systems and less than 3,600 Gpc$^{-3}$yr$^{-1}$ for neutron-star--black-hole systems. We find that if no detection of neutron-star binary mergers is made in the next two Advanced LIGO and Advanced Virgo observing runs we would place significant constraints on the merger rates. Finally, assuming a rate of $10^{+20}_{-7}$Gpc$^{-3}$yr$^{-1}$ short gamma ray bursts beamed towards the Earth and assuming that all short gamma-ray bursts have binary-neutron-star (neutron-star--black-hole) progenitors we can use our 90% confidence rate upper limits to constrain the beaming angle of the gamma-ray burst to be greater than ${2.3^{+1.7}_{-1.1}}^{\circ}$ (${4.3^{+3.1}_{-1.9}}^{\circ}$).
0.911751
0.670657
0.241094
2004.07337
Nonequilibrium Solvent Polarization Effects in Real-Time Electronic Dynamics of Solute Molecules Subject to Time-Dependent Electric Fields: A New Feature of the Polarizable Continuum Model
We develop an extension of the time-dependent equation-of-motion formulation of the polarizable continuum model (EOM-TDPCM) to introduce nonequilibrium cavity field effects in quantum mechanical calculations of solvated molecules subject to time-dependent electric fields. This method has been implemented in Octopus, a state-of-the-art code for real-space, real-time time-dependent density functional theory (RT-TDDFT) calculations. To show the potential of our methodology, we perform EOM-TDPCM/RT-TDDFT calculations of trans-azobenzene in water and in other model solvents with shorter relaxation times. Our results for the optical absorption spectrum of trans-azobenzene show (i) that cavity field effects have a clear impact in the overall spectral shape and (ii) that an accurate description of the solute shape (as the one provided within PCM) is key to correctly account for cavity field effects.
We study the effect of spatially nonlocal correlations on the nonequilibrium dynamics of interacting fermions by constructing the nonequilibrium dynamical cluster theory, a cluster generalization of the nonequilibrium dynamical mean-field theory (DMFT). The formalism is applied to interaction quenches in the Hubbard model in one and two dimensions, and the results are compared with data from single-site DMFT, the time-dependent density matrix renormalization group, and lattice perturbation theory. Both in one and two dimensions the double occupancy quickly thermalizes, while the momentum distribution relaxes only on much longer time scales. For the two-dimensional square lattice we find a strongly momentum-dependent evolution of the momentum distribution around the Fermi energy, with a much faster relaxation near the momenta $(0,\pi)$ and $(\pi,0)$ than near $(\pi/2,\pi/2)$. This result is interpreted as reflecting the momentum-anisotropic quasiparticle lifetime of the marginal Fermi liquid. The method is further applied to the two-dimensional Hubbard model driven by a dc electric field, where the damping of the Bloch oscillation of the current is found to be less effective than predicted by DMFT and lattice perturbation theory.
0.866957
0.723077
0.14388
2004.07338
Effects of in-medium $k_T$ broadening on di-jet observables
We study the influence of in-medium transverse momentum broadening on observables of jet pairs produced in nuclear collisions. These dijets were obtained numerically via the Monte-Carlo simulations of nuclear collisions, where the partons within the colliding nuclei were described via unintegrated parton densities, and their subsequent propagation within the medium of a quark-gluon plasma (QGP). For jet-evolution in the QGP both, kicks transverse to the momentum of the incoming particle as well as medium induced radiation were considered. After favorable comparison of our results with experimental LHC-data on jet-quenching we make predictions for the decorrelation of dijets. In particular, we study deviations from a transverse momentum broadening that follows a Gaussian distribution.
We show the sensitivity of groomed jet substructure measurements to the finite resolution power of the QGP to disentangle multiple energetic partons, as produced by QCD jets, that traverse it simultaneously. We illustrate these effects by studying Soft Dropped observables within a hybrid strong/weak coupling model for jet-medium interactions. By analysing Monte-Carlo-generated jet data in heavy ion collisions, we show that the angular structure of these type of observables is sensitive to the value of the QGP resolution length.
0.885243
0.835932
0.049311
2004.07339
An Adaptive Intelligence Algorithm for Undersampled Knee MRI Reconstruction: Application to the 2019 fastMRI Challenge
Adaptive intelligence aims at empowering machine learning techniques with the additional use of domain knowledge. In this work, we present the application of adaptive intelligence to accelerate MR acquisition. Starting from undersampled k-space data, an iterative learning-based reconstruction scheme inspired by compressed sensing theory is used to reconstruct the images. We adopt deep neural networks to refine and correct prior reconstruction assumptions given the training data. The network was trained and tested on a knee MRI dataset from the 2019 fastMRI challenge organized by Facebook AI Research and NYU Langone Health. All submissions to the challenge were initially ranked based on similarity with a known groundtruth, after which the top 4 submissions were evaluated radiologically. Our method was evaluated by the fastMRI organizers on an independent challenge dataset. It ranked #1, shared #1, and #3 on respectively the 8x accelerated multi-coil, the 4x multi-coil, and the 4x single-coil track. This demonstrates the superior performance and wide applicability of the method.
A new iterative image reconstruction algorithm for electrical capacitance tomography (ECT) is proposed that is based on iterative soft thresholding of a total variation penalty and adaptive reweighted compressive sensing. This algorithm encourages sharp changes in the ECT image and overcomes the disadvantage of the $l_1$ minimization by equipping the total variation with an adaptive weighting depending on the reconstructed image. Moreover, the non-linear effect is also partially reduced due to the adoption of an updated sensitivity matrix. Simulation results show that the proposed algorithm recovers ECT images more precisely than existing state-of-the-art algorithms and therefore is suitable for the imaging of multiphase systems in industrial or medical applications.
0.888916
0.707186
0.18173
2004.07341
Wasserstein Adversarial Autoencoders for Knowledge Graph Embedding based Drug-Drug Interaction Prediction
Interaction between pharmacological agents can trigger unexpected adverse events. Capturing richer and more comprehensive information about drug-drug interactions (DDI) is one of the key tasks in public health and drug development. Recently, several knowledge graph embedding approaches have received increasing attention in the DDI domain due to their capability of projecting drugs and interactions into a low-dimensional feature space for predicting links and classifying triplets. However, existing methods only apply a uniformly random mode to construct negative samples. As a consequence, these samples are often too simplistic to train an effective model. In this paper, we propose a new knowledge graph embedding framework by introducing adversarial autoencoders (AAE) based on Wasserstein distances and Gumbel-Softmax relaxation for drug-drug interactions tasks. In our framework, the autoencoder is employed to generate high-quality negative samples and the hidden vector of the autoencoder is regarded as a plausible drug candidate. Afterwards, the discriminator learns the embeddings of drugs and interactions based on both positive and negative triplets. Meanwhile, in order to solve vanishing gradient problems on the discrete representation--an inherent flaw in traditional generative models--we utilize the Gumbel-Softmax relaxation and the Wasserstein distance to train the embedding model steadily. We empirically evaluate our method on two tasks, link prediction and DDI classification. The experimental results show that our framework can attain significant improvements and noticeably outperform competitive baselines.
Drug-drug interaction (DDI) is a vital information when physicians and pharmacists intend to co-administer two or more drugs. Thus, several DDI databases are constructed to avoid mistakenly combined use. In recent years, automatically extracting DDIs from biomedical text has drawn researchers' attention. However, the existing work utilize either complex feature engineering or NLP tools, both of which are insufficient for sentence comprehension. Inspired by the deep learning approaches in natural language processing, we propose a recur- rent neural network model with multiple attention layers for DDI classification. We evaluate our model on 2013 SemEval DDIExtraction dataset. The experiments show that our model classifies most of the drug pairs into correct DDI categories, which outperforms the existing NLP or deep learning methods.
0.917479
0.816226
0.101253
2004.07342
A mathematical for blood flow through an arterial bifurcation
The blood vascular system consists of blood vessels such as arteries, arterioles, capillaries and veins that convey blood throughout the body. The pressure difference which exists between the ends of the vessels provides the living force required to the flow of blood. In this study, we have used a model that is appropriate for use with blood flow simulation applications. We study the effect of decomposition of plaques and or tumour cells on the velocity profile, pressure of the incompressible, Newtonian fluid. We consider two different cases; vessels with bifurcation and without bifurcations and we display all the results through using Commercial software COMSOL Multiphysics 5.2.
Malfunction of the system which regulates the bloodflow in the brain is a major cause of stroke and dementia, costing many lives and many billions of pounds each year in the UK alone. This regulatory system, known as cerebral autoregulation, has been the subject of much experimental and mathematical investigation yet our understanding of it is still quite limited. One area in which our understanding is particularly lacking is that of the role of nitric oxide, understood to be a potent vasodilator. The interactions of nitric oxide with the better understood myogenic response remain un-modelled and poorly understood. In this thesis we present a novel model of the arteriolar control mechanism, comprising a mixture of well-established and new models of individual processes, brought together for the first time. We show that this model is capable of reproducing experimentally observed behaviour very closely and go on to investigate its stability in the context of the vasculature of the whole brain. In conclusion we find that nitric oxide, although it plays a central role in determining equilibrium vessel radius, is unimportant to the dynamics of the system and its responses to variation in arterial blood pressure. We also find that the stability of the system is very sensitive to the dynamics of Ca$^{2+}$ within the muscle cell, and that self-sustaining Ca$^{2+}$ waves are not necessary to cause whole-vessel radius oscillations consistent with vasomotion.
0.819489
0.739023
0.080466
2004.07343
Microscopic Mechanisms of Glass-Like Lattice Thermal Transport in Cubic Cu$_{12}$Sb$_{4}$S$_{13}$ Tetrahedrites
Materials based on cubic tetrahedrites (Cu$_{12}$Sb$_{4}$S$_{13}$) are useful thermoelectrics with unusual thermal and electrical transport properties, such as very low and nearly temperature-independent lattice thermal conductivity ($\kappa_{L}$). We explain the microscopic origin of the glass-like $\kappa_{L}$ in Cu$_{12}$Sb$_{4}$S$_{13}$ by explicitly treating anharmonicity up to quartic terms for both phonon energies and phonon scattering rates. We show that the strongly unstable phonon modes associated with trigonally coordinated Cu atoms are anharmonically stabilized above approximately $50$~K and continue hardening with increasing temperature, in accord with experimental data. This temperature induced hardening effect reduces scattering of heat carrying acoustic modes by reducing the available phase space for three-phonon processes, thereby balancing the conventional $\propto T$ increase in scattering due to phonon population and yielding nearly temperature-independent $\kappa_{L}$. Furthermore, we find that very strong four-phonon interactions lead to a qualitative breakdown of the conventional phonon-gas model and modify the dominant heat transport mechanism from the particle-like phonon wave packet propagation to incoherent tunneling described by off-diagonal terms in the heat-flux operator, which are typically prevailing in glasses and disordered crystals. Our work paves the way to a deeper understanding of glass-like thermal conductivity in complex crystals with strong anharmonicity.
Using molecular dynamics computer simulations we investigate how in silica the glass transition and the properties of the resulting glass depend on the cooling rate with which the sample is cooled. By coupling the system to a heat bath with temperature $T_b(t)$, we cool the system linearly in time, $T(t)=T_i-\gamma t$, where $\gamma$ is the cooling rate. We find that the glass transition temperature $T_g$ is in accordance with a logarithmic dependence on the cooling rate. In qualitative accordance with experiments, the density shows a local maximum, which becomes more pronounced with decreasing cooling rate. The enthalpy, density and the thermal expansion coefficient for the glass at zero temperature decrease with decreasing $\gamma$. We show that also microscopic quantities, such as the radial distribution function, the bond-bond angle distribution function, the coordination numbers and the distribution function for the size of the rings depend significantly on $\gamma$. We demonstrate that the cooling rate dependence of these microscopic quantities is significantly more pronounced than the one of macroscopic properties. Furthermore we show that these microscopic quantities, as determined from our simulation, are in good agreement with the ones measured in real experiments, thus demonstrating that the used potential is a good model for silica glass. The vibrational spectrum of the system also shows a significant dependence on the cooling rate and is in qualitative accordance with the one found in experiments. Finally we investigate the properties of the system at finite temperatures in order to understand the microscopic mechanism for the density anomaly. We show that the anomaly is related to a densification and subsequent opening of the tetrahedral network when the temperature is decreased, whereas
0.90487
0.747511
0.157359
2004.07344
From quasi-incompressible to semi-compressible fluids
A new concept of semi-compressible fluids is introduced for slightly compressible visco-elastic fluids (typically rather liquids than gasses) where mass density variations are negligible in some sense, while being directly controlled by pressure which is very small in comparison with the elastic bulk modulus. The physically consistent fully Eulerian models with specific dispersion of pressure-wave speed are devised. This contrasts to the so-called quasi-incompressible fluids which are described not physically consistently and, in fact, only approximate ideally incompressible ones in the limit. After surveying and modifying models for the quasi-incompressible fluids, we eventually devise some fully convective models complying with energy conservation and capturing phenomena as pressure-wave propagation with wave-length (and possibly also pressure) dependent velocity.
A general lattice Boltzmann method for simulation of fluids with tailored transport coefficients is presented. It is based on the recently introduced quasi-equilibrium kinetic models, and a general lattice Boltzmann implementation is developed. Lattice Boltzmann models for isothermal binary mixtures with a given Schmidt number, and for a weakly compressible flow with a given Prandtl number are derived and validated.
0.909349
0.772776
0.136573
2004.07345
Active-Region Tilt Angles from White-Light Images and Magnetograms: The Role of Magnetic Tongues
The presence of elongations in active region (AR) polarities, called magnetic tongues, are mostly visible during their emergence phase. AR tilts have been measured thoroughly using long-term white-light (WL) databases, sometimes combined with magnetic field information. Since the influence of magnetic tongues on WL tilt measurements has not been taken into account before, we aim to investigate their role in tilt-angle values and to compare them with those derived from LOS magnetograms. We apply four methods to compute the tilt angle of generally bipolar ARs: one applies the k-means algorithm to WL data, a second one includes the magnetic field sign of the polarities to WL data, and a third one uses the magnetic flux-weighted center of each polarity. The tilt values computed in any of these ways are affected by the presence of magnetic tongues. Therefore, we apply the newly developed Core Field Fit Estimator (CoFFE) method to separate the magnetic flux in the tongues from that in the AR core. We compare the four computed tilt-angle values, as well as these with the ones reported in long-term WL databases. For ARs with low magnetic flux tongues the different methods report consistent tilt-angle values. But for ARs with high flux tongues there are noticeable discrepancies between all methods indicating that magnetic tongues affect differently WL and magnetic data. However, in general, CoFFE achieves a better estimation of the main bipole tilt because it removes both the effect of tongues as well as the emergence of secondary bipoles when it occurs in between the main bipole magnetic polarities.
We compare the magnetic helicity in the 17-18 March 2013 interplanetary coronal mass ejection (ICME) flux-rope at 1 AU and in its solar counterpart. The progenitor coronal mass ejection (CME) erupted on 15 March 2013 from NOAA active region 11692 and associated with an M1.1 flare. We derive the source region reconnection flux using post-eruption arcade (PEA) method (Gopalswamy et al. 2017a) that uses the photospheric magnetogram and the area under the PEA. The geometrical properties of the near-Sun flux rope is obtained by forward-modeling of white-light CME observations. Combining the geometrical properties and the reconnection flux we extract the magnetic properties of the CME flux rope (Gopalswamy et al. 2017b). We derive the magnetic helicity of the flux rope using its magnetic and geometric properties obtained near the Sun and at 1 AU. We use a constant-{\alpha} force-free cylindrical flux rope model fit to the in situ observations in order to derive the magnetic and geometric information of the 1-AU ICME. We find a good correspondence in both amplitude and sign of the helicity between the ICME and the CME assuming a semi-circular (half torus) ICME flux rope with a length of {\pi} AU. We find that about 83% of the total flux rope helicity at 1 AU is injected by the magnetic reconnection in the low corona. We discuss the effect of assuming flux rope length in the derived value of the magnetic helicity. This study connecting the helicity of magnetic flux ropes through the Sun-Earth system has important implications for the origin of helicity in the interplanetary medium and the topology of ICME flux ropes at 1 AU and hence their space weather consequences.
0.856328
0.63693
0.219398
2004.07346
Online Multiserver Convex Chasing and Optimization
We introduce the problem of $k$-chasing of convex functions, a simultaneous generalization of both the famous k-server problem in $R^d$, and of the problem of chasing convex bodies and functions. Aside from fundamental interest in this general form, it has natural applications to online $k$-clustering problems with objectives such as $k$-median or $k$-means. We show that this problem exhibits a rich landscape of behavior. In general, if both $k > 1$ and $d > 1$ there does not exist any online algorithm with bounded competitiveness. By contrast, we exhibit a class of nicely behaved functions (which include in particular the above-mentioned clustering problems), for which we show that competitive online algorithms exist, and moreover with dimension-free competitive ratio. We also introduce a parallel question of top-$k$ action regret minimization in the realm of online convex optimization. There, too, a much rougher landscape emerges for $k > 1$. While it is possible to achieve vanishing regret, unlike the top-one action case the rate of vanishing does not speed up for strongly convex functions. Moreover, vanishing regret necessitates both intractable computations and randomness. Finally we leave open whether almost dimension-free regret is achievable for $k > 1$ and general convex losses. As evidence that it might be possible, we prove dimension-free regret for linear losses via an information-theoretic argument.
In this paper, we focus on a theory-practice gap for Adam and its variants (AMSgrad, AdamNC, etc.). In practice, these algorithms are used with a constant first-order moment parameter $\beta_{1}$ (typically between $0.9$ and $0.99$). In theory, regret guarantees for online convex optimization require a rapidly decaying $\beta_{1}\to0$ schedule. We show that this is an artifact of the standard analysis and propose a novel framework that allows us to derive optimal, data-dependent regret bounds with a constant $\beta_{1}$, without further assumptions. We also demonstrate the flexibility of our analysis on a wide range of different algorithms and settings.
0.834757
0.772609
0.062147
2004.07347
HybridQA: A Dataset of Multi-Hop Question Answering over Tabular and Textual Data
Existing question answering datasets focus on dealing with homogeneous information, based either only on text or KB/Table information alone. However, as human knowledge is distributed over heterogeneous forms, using homogeneous information might lead to severe coverage problems. To fill in the gap, we present \dataset, a new large-scale question-answering dataset that requires reasoning on heterogeneous information. Each question is aligned with a structured Wikipedia table and multiple free-form corpora linked with the entities in the table. The questions are designed to aggregate both tabular information and text information, i.e. lack of either form would render the question unanswerable. We test with three different models: 1) table-only model. 2) text-only model. 3) a hybrid model \model which combines both table and textual information to build a reasoning path towards the answer. The experimental results show that the first two baselines obtain compromised scores below 20\%, while \model significantly boosts EM score to over 50\%, which proves the necessity to aggregate both structure and unstructured information in \dataset. However, \model's score is still far behind human performance, hence we believe \dataset to an ideal and challenging benchmark to study question answering under heterogeneous information. The dataset and code are available at \url{https://github.com/wenhuchen/HybridQA}.
In this paper, we present a framework for Question Difficulty and Expertise Estimation (QDEE) in Community Question Answering sites (CQAs) such as Yahoo! Answers and Stack Overflow, which tackles a fundamental challenge in crowdsourcing: how to appropriately route and assign questions to users with the suitable expertise. This problem domain has been the subject of much research and includes both language-agnostic as well as language conscious solutions. We bring to bear a key language-agnostic insight: that users gain expertise and therefore tend to ask as well as answer more difficult questions over time. We use this insight within the popular competition (directed) graph model to estimate question difficulty and user expertise by identifying key hierarchical structure within said model. An important and novel contribution here is the application of "social agony" to this problem domain. Difficulty levels of newly posted questions (the cold-start problem) are estimated by using our QDEE framework and additional textual features. We also propose a model to route newly posted questions to appropriate users based on the difficulty level of the question and the expertise of the user. Extensive experiments on real world CQAs such as Yahoo! Answers and Stack Overflow data demonstrate the improved efficacy of our approach over contemporary state-of-the-art models. The QDEE framework also allows us to characterize user expertise in novel ways by identifying interesting patterns and roles played by different users in such CQAs.
0.834793
0.743128
0.091665
2004.07348
Learning 1-Dimensional Submanifolds for Subsequent Inference on Random Dot Product Graphs
A random dot product graph (RDPG) is a generative model for networks in which vertices correspond to positions in a latent Euclidean space and edge probabilities are determined by the dot products of the latent positions. We consider RDPGs for which the latent positions are randomly sampled from an unknown $1$-dimensional submanifold of the latent space. In principle, restricted inference, i.e., procedures that exploit the structure of the submanifold, should be more effective than unrestricted inference; however, it is not clear how to conduct restricted inference when the submanifold is unknown. We submit that techniques for manifold learning can be used to learn the unknown submanifold well enough to realize benefit from restricted inference. To illustrate, we test a hypothesis about the Fr\'{e}chet mean of a small community of vertices, using the complete set of vertices to infer latent structure. We propose test statistics that deploy the Isomap procedure for manifold learning, using shortest path distances on neighborhood graphs constructed from estimated latent positions to estimate arc lengths on the unknown $1$-dimensional submanifold. Unlike conventional applications of Isomap, the estimated latent positions do not lie on the submanifold of interest. We extend existing convergence results for Isomap to this setting and use them to demonstrate that, as the number of auxiliary vertices increases, the power of our test converges to the power of the corresponding test when the submanifold is known.
Bilinear systems emerge in a wide variety of fields as natural models for dynamical systems ranging from robotics to quantum dots. Analyzing controllability of such systems is of fundamental and practical importance, for example, for the design of optimal control laws, stabilization of unstable systems, and minimal realization of input-output relations. Tools from Lie theory have been adopted to establish controllability conditions for bilinear systems, and the most notable development was the Lie algebra rank condition (LARC). However, the application of the LARC may be computationally expensive for high-dimensional systems. In this paper, we present an alternative and effective algebraic approach to investigate controllability of bilinear systems. The central idea is to map Lie bracket operations of the vector fields governing the system dynamics to permutation multiplications on a symmetric group, so that controllability and controllable submanifolds can be characterized by permutation cycles. The method is further applicable to characterize controllability of systems defined on undirected graphs, such as multi-agent systems with controlled couplings between agents and Markov chains with tunable transition rates between states, which in turn reveals a graph representation of controllability through the graph connectivity.
0.887581
0.663716
0.223865
2004.07349
Regularization of backward time-fractional parabolic equations by Sobolev equations methods
It is well-known that backward parabolic equations in which the initial condition is to be determined from a measurement at a later time instant is ill-posed. In this paper, a regularization method for backward time-fractional parabolic equations by the Sobolev equations method is investigated. Error estimates of Holder type are obtained with a priori and a posteriori regularization parameter choice rules. The proposed regularization method results in a stable noniterative numerical scheme. The theoretical error estimates are confirmed with numerical tests for one and two dimensional equations.
We consider degenerate and singular parabolic equations with $p$-Laplacian structure in bounded nonsmooth domains when the right-hand side is a signed Radon measure with finite total mass. We develop a new tool that allows global regularity estimates for the spatial gradient of solutions to such parabolic measure data problems, by introducing the (intrinsic) fractional maximal function of a given measure.
0.952619
0.809122
0.143496
2004.07350
General Mapping between Complex Spatial and Temporal Frequencies Using the Analytical Continuation
This paper introduces an analytical technique to map the eigen-space complex frequencies (temporal frequencies $\Omega = \omega_\text{r}+j\omega_\text{i}$) to the complex propagation constant (spatial frequencies $\gamma=\alpha+j\beta$). The technique analytically finds the driven mode solutions from the eigen-mode analysis of the associated one-dimensional (1-D) periodic structure unit cell. Since the approach is based on the analyticity of the physical function $\Omega(\gamma)$, it is not only valid for simple canonical problems but also in principle for any physical problem. We apply this general technique on different practical problems including an unbounded lossy medium, rectangular waveguide, periodic dielectric slabs and a series fed patch (SFP) leaky-wave antenna and validate the mapped solutions with those based on either closed-form analytical solutions or numerical finite-element method (FEM) solutions.
In this work we study the qualitative properties of real analytic bounded maps defined in the infinite complex strip. The main tool is approximation by continued g-fractions of Wall. As an application, the ABC flow system is considered which is essential to the origin of the solar magnetic field.
0.72912
0.663597
0.065523
2004.07351
On the Design of Communication Efficient Federated Learning over Wireless Networks
Recently, federated learning (FL), as a promising distributed machine learning approach, has attracted lots of research efforts. In FL, the parameter server and the mobile devices share the training parameters over wireless links. As a result, reducing the communication overhead becomes one of the most critical challenges. Despite that there have been various communication-efficient machine learning algorithms in literature, few of the existing works consider their implementation over wireless networks. In this work, the idea of SignSGD is adopted and only the signs of the gradients are shared between the mobile devices and the parameter server. In addition, different from most of the existing works that consider Channel State Information (CSI) at both the transmitter side and the receiver side, only receiver side CSI is assumed. In such a case, an essential problem for the mobile devices is to select appropriate local processing and communication parameters. In particular, two tradeoffs are observed under a fixed total training time: (i) given the time for each communication round, the energy consumption versus the outage probability per communication round and (ii) given the energy consumption, the number of communication rounds versus the outage probability per communication round. Two optimization problems regarding the aforementioned two tradeoffs are formulated and solved. The first problem minimizes the energy consumption given the outage probability (and therefore the learning performance) requirement while the second problem optimizes the learning performance given the energy consumption requirement. Extensive simulations are performed to demonstrate the effectiveness of the proposed method.
This paper presents a comprehensive literature review on applications of economic and pricing theory for resource management in the evolving fifth generation (5G) wireless networks. The 5G wireless networks are envisioned to overcome existing limitations of cellular networks in terms of data rate, capacity, latency, energy efficiency, spectrum efficiency, coverage, reliability, and cost per information transfer. To achieve the goals, the 5G systems will adopt emerging technologies such as massive Multiple-Input Multiple-Output (MIMO), mmWave communications, and dense Heterogeneous Networks (HetNets). However, 5G involves multiple entities and stakeholders that may have different objectives, e.g., high data rate, low latency, utility maximization, and revenue/profit maximization. This poses a number of challenges to resource management designs of 5G. While the traditional solutions may neither efficient nor applicable, economic and pricing models have been recently developed and adopted as useful tools to achieve the objectives. In this paper, we review economic and pricing approaches proposed to address resource management issues in the 5G wireless networks including user association, spectrum allocation, and interference and power management. Furthermore, we present applications of economic and pricing models for wireless caching and mobile data offloading. Finally, we highlight important challenges, open issues and future research directions of applying economic and pricing models to the 5G wireless networks.
0.875805
0.669666
0.206139
2004.07352
Ownership at Large -- Open Problems and Challenges in Ownership Management
Software-intensive organizations rely on large numbers of software assets of different types, e.g., source-code files, tables in the data warehouse, and software configurations. Who is the most suitable owner of a given asset changes over time, e.g., due to reorganization and individual function changes. New forms of automation can help suggest more suitable owners for any given asset at a given point in time. By such efforts on ownership health, accountability of ownership is increased. The problem of finding the most suitable owners for an asset is essentially a program comprehension problem: how do we automatically determine who would be best placed to understand, maintain, evolve (and thereby assume ownership of) a given asset. This paper introduces the Facebook Ownesty system, which uses a combination of ultra large scale data mining and machine learning and has been deployed at Facebook as part of the company's ownership management approach. Ownesty processes many millions of software assets (e.g., source-code files) and it takes into account workflow and organizational aspects. The paper sets out open problems and challenges on ownership for the research community with advances expected from the fields of software engineering, programming languages, and machine learning.
When a company undergoes a merger or transfers its ownership, the existing governing body has an opinion on which buyer should take over as the new owner. Similar situations occur while assigning the host of big sports tournaments, like the World Cup or the Olympics. In all these settings, the values of the external bidders are as important as the opinions of the internal experts. Motivated by such scenarios, we consider a social welfare maximizing approach to design and analyze truthful mechanisms in {\em hybrid social choice} settings, where payments can be imposed to the bidders, but not to the experts. Since this problem is a combination of mechanism design with and without monetary transfers, classical solutions like VCG cannot be applied, making this a novel mechanism design problem. We consider the simple but fundamental scenario with one expert and two bidders, and provide tight approximation guarantees of the optimal social welfare. We distinguish between mechanisms that use ordinal and cardinal information, as well as between mechanisms that base their decisions on one of the two sides (either the bidders or the expert) or both. Our analysis shows that the cardinal setting is quite rich and admits several non-trivial randomized truthful mechanisms, and also allows for closer-to-optimal welfare guarantees.
0.779363
0.70705
0.072312
2004.07353
The nucleus: Mining concepts from adjunctions
Categories are many things to many people. We like to think of category theory as the study of certain types of grammar: those that generate the languages of mathematical constructions. This view seems to explain why categories persist in many parts of mathematics despite the ongoing objections that they do not help solve hard problems. Grammars do not help us tell better stories, but they help us tell stories better, and understand them better. Moreover, a language has grammar whether the speakers are aware of it or not. A grammatical schema that generates many mathematical constructions is that of an adjunction. Lawvere noticed that all standard logical operations, quantifiers, and even the set-theoretic comprehension, can be viewed as adjunctions. Lambek observed that natural language grammars also decompose into certain adjunctions, spawning an entire branch of linguistics. Adjunctions are everywhere; all of category theory can be reconstructed in terms of adjunctions. If category theory is a grammar of mathematical constructions, then adjunctions are the one rule to rule them all. [snip] Any adjunction induces a monad and a comonad, which respectively display its algebraic and coalgebraic (analytic, state-dependent) aspects. The nucleus construction induces a monad over adjunctions themselves (or equivalently over the induced monads, or comonads), which distills both aspects. It is tight because it is idempotent. The two sides of a nuclear adjunction completely determine one another, as algebras and coalgebras, yet they remain distinct, like brackets.
The study of open charm meson production provides an efficient tool for detailed investigations of the properties of hot and dense matter formed in nucleus-nucleus collisions. The interpretation of the existing data from the CERN SPS suffers from a lack of knowledge on the total charm production rate. To overcome this limitation the heavy-ion programme of the NA61/SHINE experiment at CERN SPS has been expanded to allow for precise measurements of particles with a short lifetime. A new Small Acceptance Vertex Detector (SAVD) was designed and constructed to meet the challenges of open charm measurements in nucleus-nucleus collisions. SAVD was installed in December 2016 for data taking with Pb+Pb collisions at 150$A$ GeV/c. An exploratory set of collected data allowed to validate the general concept of the $D^0$ mesons detection via its $D^0 \rightarrow \pi^+ + K^-$ decay channel and delivered the first direct observation of open charm at SPS energies. In October and November of 2017 a large statistic data set has been taken for Xe+La at 150$A$, 75$A$, and 40$A$ GeV/c, these data are currently under intense analysis. The physics motivation behind the open charm measurements at the SPS energies will be discussed. Moreover, the concept of the SAVD hardware and status of the analysis will be shown. Also, the future plans of open charm measurements in the NA61/SHINE experiment related to the upgraded Vertex Detector will be presented.
0.724124
0.565577
0.158547
2004.07354
Efficient Algorithms for Battleship
We consider an algorithmic problem inspired by the Battleship game. In the variant of the problem that we investigate, there is a unique ship of shape $S \subset Z^2$ which has been translated in the lattice $Z^2$. We assume that a player has already hit the ship with a first shot and the goal is to sink the ship using as few shots as possible, that is, by minimizing the number of missed shots. While the player knows the shape $S$, which position of $S$ has been hit is not known. Given a shape $S$ of $n$ lattice points, the minimum number of misses that can be achieved in the worst case by any algorithm is called the Battleship complexity of the shape $S$ and denoted $c(S)$. We prove three bounds on $c(S)$, each considering a different class of shapes. First, we have $c(S) \leq n-1$ for arbitrary shapes and the bound is tight for parallelogram-free shapes. Second, we provide an algorithm that shows that $c(S) = O(\log n)$ if $S$ is an HV-convex polyomino. Third, we provide an algorithm that shows that $c(S) = O(\log \log n)$ if $S$ is a digital convex set. This last result is obtained through a novel discrete version of the Blaschke-Lebesgue inequality relating the area and the width of any convex body.
Recently, the security of Internet of Things (IoT) has been an issue of great concern. Physical layer security methods can help IoT networks achieve information-theoretical secrecy. Nevertheless, utilizing physical security methods, such as artificial noise (AN) may cost extra power, which leads to low secure energy efficiency. In this paper, the hybrid precoding technique is employed to improve the secure energy efficiency of the IoT network. A secure energy efficiency optimization problem is formulated for the IoT network. Due to the non-convexity of the problem and the feasible domain, the problem is firstly transformed into a tractable suboptimal form. Then a secure hybrid precoding energy efficient (SEEHP) algorithm is proposed to tackle the problem. Numerical results indicate that the proposed SEEHP algorithm achieves higher secure energy efficiency compared with three existing physical layer security algorithms, especially when the number of transmit antennas is large.
0.830153
0.609397
0.220756
2004.07355
Time-domain Wavefield Reconstruction Inversion in a TTI medium
We introduce a generalization of time-domain wavefield reconstruction inversion to anisotropic acoustic modeling. Wavefield reconstruction inversion has been extensively researched in recent years for its ability to mitigate cycle skipping. The original method was formulated in the frequency domain with acoustic isotropic physics. However, frequency-domain modeling requires sophisticated iterative solvers that are difficult to scale to industrial-size problems and more realistic physical assumptions, such as tilted transverse isotropy, object of this study. The work presented here is based on a recently proposed dual formulation of wavefield reconstruction inversion, which allows time-domain propagator that are suitable to both large scales and more accurate physics.
In this paper, we present an inverse problem of identifying the reaction coefficient for time fractional diffusion equations in two dimensional spaces by using boundary Neumann data. It is proved that the forward operator is continuous with respect to the unknown parameter. Because the inverse problem is often ill-posed, regularization strategies are imposed on the least fit-to-data functional to overcome the stability issue. There may exist various kinds of functions to reconstruct. It is crucial to choose a suitable regularization method. We present a multi-parameter regularization $L^{2}+BV$ method for the inverse problem. This can extend the applicability for reconstructing the unknown functions. Rigorous analysis is carried out for the inverse problem. In particular, we analyze the existence and stability of regularized variational problem and the convergence. To reduce the dimension in the inversion for numerical simulation, the unknown coefficient is represented by a suitable set of basis functions based on a priori information. A few numerical examples are presented for the inverse problem in time fractional diffusion equations to confirm the theoretic analysis and the efficacy of the different regularization methods.
0.857443
0.705075
0.152368
2004.07356
A Practical Response Adaptive Block Randomization Design with Analytic Type I Error Protection
Response adaptive randomization is appealing in confirmatory adaptive clinical trials from statistical, ethical, and pragmatic perspectives, in the sense that subjects are more likely to be randomized to better performing treatment groups based on accumulating data. The Doubly Adaptive Biased Coin Design (DBCD) is a popular solution due to its asymptotic normal property of final allocations, which further justifies its asymptotic type I error rate control. As an alternative, we propose a Response Adaptive Block Randomization (RABR) design with pre-specified randomization ratios for the control and high-performing groups to robustly achieve desired final sample size per group under different underlying responses, which is usually required in industry-sponsored clinical studies. We show that the usual test statistic has a controlled type I error rate. Our simulations further highlight the advantages of the proposed design over the DBCD in terms of consistently achieving final sample allocations and of power performance. We further apply this design to a Phase III study evaluating the efficacy of two dosing regimens of adjunctive everolimus in treating tuberous sclerosis complex but with no previous dose-finding studies in this indication.
In a previous paper (J. Comp. Phys. 230 (2011), 3668--3694), the authors proposed a new practical method for computing expected values of functionals of solutions for certain classes of elliptic partial differential equations with random coefficients. This method was based on combining quasi-Monte Carlo (QMC) methods for computing the expected values with circulant embedding methods for sampling the random field on a regular grid. It was found capable of handling fluid flow problems in random heterogeneous media with high stochastic dimension, but a convergence theory was missing. This paper provides a convergence analysis for the method in the case when the QMC method is a specially designed randomly shifted lattice rule. The convergence result depends on the eigenvalues of the underlying nested block circulant matrix and can be independent of the number of stochastic variables under certain assumptions. In fact the QMC analysis applies to general factorisations of the covariance matrix to sample the random field. The error analysis for the underlying fully discrete finite element method allows for locally refined meshes (via interpolation from a regular sampling grid of the random field). Numerical results on a non-regular domain with corner singularities in two spatial dimensions and on a regular domain in three spatial dimensions are included.
0.770593
0.687213
0.08338
2004.07357
Bounded Orbits of Quadratic Collatz-type Recursions
We characterize all bounded orbits of two similar Collatz-type quadratic mappings of the set of non-negative integers. In one case, where cycles of all possible lengths may occur, an orbit is bounded if and only if it reaches a cycle. For the other map we prove that every bounded orbit must reach 0 (in particular, there are no cycles).
The polynomial NARMAX (Nonlinear AutoRegressive Moving Average model with eXogenous input) is a model that represents the dynamics of physical systems. This polynomial contains information from the past of the inputs and outputs of the process, that is, it is a recursive model. In digital computers this generates the propagation of the rounding error. Our procedure is based on the estimation of the maximum value of the lower bound error considering an arbitrary number of pseudo-orbits produced from different natural interval extensions, and a posterior Lyapunov exponent calculation. We applied successfully our technique for two identified models of the systems: sine map and Duffing-Ueda oscillator
0.909649
0.741857
0.167792
2004.07358
Ab-initio electronic transport in narrow gap semiconductors using the Wigner distribution
Electronic transport properties of semiconductors with small band gaps are often not well described by semiclassical methods, such as the Boltzmann transport equation, because of the missing interaction between carriers whose band energy differences are closer than their linewidth. This limits accuracy of predictions for many topological insulators and materials with complex structure and disorder. We develop a new first-principles formalism that uses the Wigner transform to generalize semiclassical transport models to this regime by including additional quantum effects. We apply the formalism to Bi$_2$Se$_3$, and show that its bulk electronic transport properties at low doping concentrations are dominated by the Zener effect, a mechanism in which carriers transfer charge by tunnelling across the band gap.
Employing $ab$ $intito$ electronic structure calculations, we have investigated electronic and magnetic properties of the Zr-based quanternary Heusler alloys: ZrCoVIn, ZrFeVGe, ZrCoFeP, ZrCoCrBe and ZrFeCrZ (Z=In and Ga). Our $ab$ $intito$ calculation results show that all the alloys are (or nearly) spin-gapless semiconductors. All the alloys have large band gaps, indicating the stability of them at room temperature. The Slater-Pauling behaviours of these alloys are discussed as well. The values of Curie temperature of all the alloys are estimated. And it is found that the values of the Curie temperature for all our calculated quanternary Heusler alloys are higher than that of room temperature.
0.874818
0.730527
0.144291
2004.07359
Usable, Acceptable, Appropriable: Towards Practicable Privacy
A majority of the work on digital privacy and security has focused on users from developed countries who account for only around 20\% of the global population. Moreover, the privacy needs for population that is already marginalized and vulnerable differ from users who have privilege to access a greater social support system. We reflect on our experiences of introducing computers and the Internet to a group of sex-trafficking survivors in Nepal and highlight a few socio-political factors that have influenced the design space around digital privacy. These factors include the population's limited digital and text literacy skills and the fear of stigma against trafficked persons widely prevalent in Nepali society. We underscore the need to widen our perspective by focusing on practicable privacy, that is, privacy practices that are (1) usable, (2) acceptable, and (3) appropriable.
In survival analysis, regression models are used to understand the effects of explanatory variables (e.g., age, sex, weight, etc.) to the survival probability. However, for sensitive survival data such as medical data, there are serious concerns about the privacy of individuals in the data set when medical data is used to fit the regression models. The closest work addressing such privacy concerns is the work on Cox regression which linearly projects the original data to a lower dimensional space. However, the weakness of this approach is that there is no formal privacy guarantee for such projection. In this work, we aim to propose solutions for the regression problem in survival analysis with the protection of differential privacy which is a golden standard of privacy protection in data privacy research. To this end, we extend the Output Perturbation and Objective Perturbation approaches which are originally proposed to protect differential privacy for the Empirical Risk Minimization (ERM) problems. In addition, we also propose a novel sampling approach based on the Markov Chain Monte Carlo (MCMC) method to practically guarantee differential privacy with better accuracy. We show that our proposed approaches achieve good accuracy as compared to the non-private results while guaranteeing differential privacy for individuals in the private data set.
0.784785
0.710207
0.074578
2004.07360
Reconfiguring and ramping-up ventilator production in the face of COVID-19: Can robots help?
As the COVID-19 pandemic expands, the shortening of medical equipment is swelling. A key piece of equipment getting far-out attention has been ventilators. The difference between supply and demand is substantial to be handled with normal production techniques, especially under social distancing measures in place. The study explores the rationale of human-robot teams to ramp up production using advantages of both the ease of integration and maintaining social distancing. The paper presents a model for faster integration of collaborative robots and design guidelines for workstation. The scenarios are evaluated for an open source ventilator through continuous human-robot simulation and amplification of results in a discrete event simulation.
Lumen Social Robot is a humanoid robot development with the purpose that it could be a good friend to all people. In this year, the Lumen Social Robot is being developed into a guide in the exhibition and in the seminar of the Final Exam of undergraduate and graduate students in Electrical Engineering ITB, named Electrical Engineering Days 2015. In order to be the guide in that occasion, Lumen is supported by several things. They are Nao robot components, servers, and multiple processor systems. The image processing system is a processing application system that allows Lumen to recognize and determine an object from the image taken from the camera eye. The image processing system is provided with four modules. They are face detection module to detect a person's face, face recognition module to recognize a person's face, face tracking module to follow a person's face, and human detection module to detect humans based on the upper parts of person's body. Face detection module and human detection module are implemented by using the library harcascade.xml on EMGU CV. Face recognition module is implemented by adding the database for the face that has been detected and store it in that database. Face tracking module is implemented by using the Smooth Gaussian filter to the image. ----- Lumen Sosial Robot merupakan sebuah pengembangan robot humanoid agar dapat menjadi teman bagi banyak orang. Sistem pengolahan citra merupakan sistem aplikasi pengolah yang bertujuan Lumen dapat mengenali dan mengetahui suatu objek pada citra yang diambil dari camera mata Lumen. System pengolahan citra dilengkapi dengan empat buah modul, yaitu modul face detection untuk mendeteksi wajah seseorang, modul face recognition untuk mengenali wajah orang tersebut, modul face tracking untuk mengikuti wajah seseorang, dan modul human detection untuk mendeteksi manusia berdasarkan bagian tubuh atas orang
0.911038
0.636717
0.274321
2004.07361
Renormalization of group field theories for quantum gravity: new scaling results and some suggestions
We discuss motivation and goals of renormalization analyses of group field theory models of simplicial 4d quantum gravity, and review briefly the status of this research area. We present some new computations of perturbative GFT (spin foam) amplitudes, concerning in particular the scaling behaviour of radiative corrections to N-point functions. Finally, we single out key open issues and suggest a number of research directions for further progress in this area.
Building on recent advances in defining Wilsonian RG flows, and in particular the notion of scales, for background-independent theories, we present a first investigation of the renormalization of the 4d spin foam path integral for quantum gravity, both analytically and numerically. Focussing on a specific truncation of the model using a hypercubic lattice, we compute the RG flow and find strong indications for a phase transition, as well as an interesting interplay between the different observed phases and the (broken) diffeomorphism symmetry of the model. Most notably, it appears that the critical point between the phases, which is a fixed point of the RG flow, is precisely where broken diffeomorphism symmetry is restored, which suggests that it might allow for the definition a continuum limit of the quantum gravity theory.
0.90647
0.836373
0.070097
2004.07362
Hodge decompositions and Poincare duality models
We use Hodge decompositions to construct Poincare duality models and improve results of Lambrechts & Stanley in the simply-connected case. The main idea is the construction of a certain oriented extension of the Sullivan minimal model which admits a Hodge decomposition.
We show that the eigenspaces of the Laplacian $\Delta_k$ on $k$-forms on a compact K\"ahler manifold carry Hodge and Lefschetz decompositions. Among other consequences, we show that the positive part of the spectrum of $\Delta_k$ lies in the spectrum of $\Delta_{k+1}$.
0.960917
0.812091
0.148827
2004.07363
A detailed and direct proof of Skorohod-Wichura's theorem
The representation Skorohod theorem of weak convergence of random variables on a metric space goes back to Skorohod (1956) in the case where the metric space is the class of real-valued functions defined on [0,1] which are right-continuous and have left-hand limits when endowed with the Skorohod metric. Among the extensions of that to metric spaces, the version by Wichura (1970) seems to be the most fundamental. But the proof of Wichura seems to be destined to a very restricted public. We propose a more detailed proof to make it more accessible at the graduate level. However we do far more by simplifying it since important steps in the original proof are dropped, which leads to a direct proof that we hope to be more understandable to a larger spectrum of readers. The current version is more appropriate for different kinds of generalizations.
Given a Gaussian process $X$, its canonical geometric rough path lift $\mathbf{X}$, and a solution $Y$ to the rough differential equation (RDE) $\mathrm{d}Y_{t} = V\left (Y_{t}\right ) \circ \mathrm{d} \mathbf{X}_t$, we present a closed-form correction formula for $\int Y \circ \mathrm{d} \mathbf{X} - \int Y \, \mathrm{d} X$, i.e. the difference between the rough and Skorohod integrals of $Y$ with respect to $X$. When $X$ is standard Brownian motion, we recover the classical Stratonovich-to-It{\^o} conversion formula, which we generalize to Gaussian rough paths with finite $p$-variation, $p < 3$, and satisfying an additional natural condition. This encompasses many familiar examples, including fractional Brownian motion with $H > \frac{1}{3}$. To prove the formula, we first show that the Riemann-sum approximants of the Skorohod integral converge in $L^2(\Omega)$ by using a novel characterization of the Cameron-Martin norm in terms of higher-dimensional Young-Stieltjes integrals. Next, we append the approximants of the Skorohod integral with a suitable compensation term without altering the limit, and the formula is finally obtained after a re-balancing of terms.
0.830259
0.709188
0.121071
2004.07364
Microlocally accurate solution of the inverse source problem of thermoacoustic tomography
We consider the inverse source problem of thermo- and photoacoustic tomography, with data registered on an open surface partially surrounding the source of acoustic waves. Under the assumption of constant speed of sound we develop an explicit non-iterative reconstruction procedure that recovers the Radon transform of the sought source, up to an infinitely smooth additive error term. The source then can be found by inverting the Radon transform. Our analysis is microlocal in nature and does not provide a norm estimate on the error in the so obtained image. However, numerical simulations show that this error is quite small in practical terms. We also present an asymptotically fast implementation of this procedure for the case when the data are given on a circular arc in 2D.
Topological concepts open many new horizons for photonic devices, from integrated optics to lasers. The complexity of large scale topological devices asks for an effective solution of the inverse problem: how best to engineer the topology for a specific application? We introduce a novel machine learning approach to the topological inverse problem. We train a neural network system with the band structure of the Aubry-Andre-Harper model and then adopt the network for solving the inverse problem. Our application is able to identify the parameters of a complex topological insulator in order to obtain protected edge states at target frequencies. One challenging aspect is handling the multivalued branches of the direct problem and discarding unphysical solutions. We overcome this problem by adopting a self-consistent method to only select physically relevant solutions. We demonstrate our technique in a realistic topological laser design and by resorting to the widely available open-source TensorFlow library. Our results are general and scalable to thousands of topological components. This new inverse design technique based on machine learning potentially extends the applications of topological photonics, for example, to frequency combs, quantum sources, neuromorphic computing and metrology.
0.906471
0.654415
0.252056
2004.07365
Featureless adaptive optimization accelerates functional electronic materials design
Forward and inverse design of equilibrium materials properties have been accelerated with data-driven methods. Electronic materials exhibiting phase transitions between metastable states, such as metal-insulator transition (MIT) materials with abrupt electrical resistivity transformations, however, are challenging to decode. Conventional machine learning methods display limited predictive capability for MIT materials, because data scarcity and the absence of features impede model training. Here we demonstrate a discovery strategy based on multi-objective Bayesian optimization to directly circumvent these bottlenecks by utilizing latent variable Gaussian processes combined with high-fidelity electronic structure calculations for validation in the chalcogenide lacunar spinel family. We directly and simultaneously learn phase stability and band gap tunability from chemical composition alone to efficiently discover 12 superior compositions on the Pareto front. Previously unidentified electronic transitions also emerge from our featureless adaptive optimization engine (AOE). Our methodology readily generalizes to optimization of multiple properties, enabling co-design of complex multifunctional materials especially where prior data is sparse.
In this paper, we propose a novel design of dielectric laser-driven accelerator (DLA) utilizing evanescent electric field of racetrack ring resonator structures. Driven by laser light with the correctly designed optical phase window, sustained acceleration of electrons with controlled deflection is shown. Based on this design, we calculate an acceleration from 30 keV to 148.312 keV in 104.655 {\mu}m using a cascaded 11-stage racetrack ring resonators. This new idea poses a solution for on-chip integration of many DLA stages, while maintains high average accelerating gradients, providing a potential practical realization for "accelerator on a chip".
0.84045
0.603607
0.236843
2004.07366
Spatially Resolved Chandra Spectroscopy of the Large Magellanic Cloud Supernova Remnant N132D
We perform detailed spectroscopy of the X-ray brightest supernova remnant (SNR) in the Large Magellanic Cloud (LMC), N132D, using Chandra archival observations. By analyzing the spectra of the entire well-defined rim, we determine the mean abundances for O, Ne, Mg, Si, S and Fe for the local LMC environment. We find evidence of enhanced O on the north-western and S on the north-eastern blast wave. By analyzing spectra interior to the remnant, we confirm the presence of a Si-rich relatively hot plasma (> 1.5 kev) that is also responsible for the Fe K emission. Chandra images show that the Fe K emission is distributed throughout the interior of the southern half of the remnant but does not extend out to the blast wave. We estimate the progenitor mass to be $15\pm5\,M_{\odot}$ using abundance ratios in different regions that collectively cover a large fraction of the remnant, as well as from the radius of the forward shock compared with models of an explosion in a cavity created by stellar winds. We fit ionizing and recombining plasma models to the Fe K emission and find that the current data cannot distinguish between the two, hence the origin of the high-temperature plasma remains uncertain. Our analysis is consistent with N132D being the result of a core-collapse supernova in a cavity created by its intermediate mass progenitor.
We report on observations of the Large Magellanic Cloud with the Fermi Gamma-Ray Space Telescope. The LMC is clearly detected with the Large Area Telescope (LAT) and for the first time the emission is spatially well resolved in gamma-rays. Our observations reveal that the bulk of the gamma-ray emission arises from the 30 Doradus region. We discuss this result in light of the massive star populations that are hosted in this area and address implications for cosmic-ray physics. We conclude by exploring the scientific potential of the ongoing Fermi observations on the study of high-energy phenomena in massive stars.
0.870452
0.698129
0.172323
2004.07367
Ahlfors regularity and fractal dimension of Smale spaces
We prove that, up to topological conjugacy, every Smale space admits an Ahlfors regular Bowen measure. Bowen's construction of Markov partitions implies that Smale spaces are factors of topological Markov chains. The latter are equipped with Parry's measure which is Ahlfors regular. By extending Bowen's construction we create a tool for transferring the Ahlfors regularity of the Parry measure down to the Bowen measure of the Smale space. An essential part of our method uses a refined notion of approximation graphs over compact metric spaces. Our work has two main applications, the first one being new estimates for the Hausdorff, box-counting and Assouad dimensions for a large class of Smale spaces. The second is that we solve Bowen's equation for the topological pressure in a class of Smale spaces that includes Wieler solenoids.
This paper deals with the problem of finding bi-Lipschitz behavior in non-degenerate Lipschitz maps between metric measure spaces. Specifically, we study maps from (subsets of) Ahlfors regular PI spaces into sub-Riemannian Carnot groups. We prove that such maps have many bi-Lipschitz tangents, verifying a conjecture of Semmes. As a stronger conclusion, one would like to know whether such maps decompose into countably many bi-Lipschitz pieces. We show that this is true when the Carnot group is Euclidean. For general Carnot targets, we show that the existence of a bi-Lipschitz decomposition is equivalent to a condition on the geometry of the image set.
0.868567
0.738662
0.129905
2004.07368
A Study on the Challenges of Using Robotics Simulators for Testing
Robotics simulation plays an important role in the design, development, and verification and validation of robotic systems. Recent studies have shown that simulation may be used as a cheaper, safer, and more reliable alternative to manual, and widely used, process of field testing. This is particularly important in the context of continuous integration pipelines, where integrated automated testing is key to reducing costs while maintaining system safety. However, simulation and automated testing are not seeing the degree of widespread adoption in practice that their potential would motivate. Our goal in this paper is to develop a principled understanding of the ways developers use simulation in their process, and the challenges they face in doing so. This type of understanding can guide the development of more effective simulators and testing techniques for modern robotics development. To that end, we conduct a survey of 82 robotics developers from a diversity of backgrounds that addresses the current capabilities and limits of simulation technology in practice. We find that simulation is used by 85% of our participants for testing, and that many participants desire to use simulation as part of their test automation. We identify 10 high-level challenges that impede developers from using simulation for manual and automated testing, and general purposes. These challenges include the gap between simulation and reality, a lack of reproducibility, and considerable resource costs associated with using simulators. Finally, we outline avenues for improvement in the development of new simulators that can help simulation reach its potential as a means of verification and validation.
Reactive synthesis is an automated procedure to obtain a correct-by-construction reactive system from a given specification. GR(1) is a well-known fragment of linear temporal logic (LTL) where synthesis is possible using a polynomial symbolic algorithm. We conducted a case study to learn about the challenges that software engineers may face when using GR(1) synthesis for the development of a reactive robotic system. In the case study we developed two variants of a forklift controller, deployed on a Lego robot. The case study employs LTL specification patterns as an extension of the GR(1) specification language, an examination of two specification variants for execution scheduling, traceability from the synthesized controller to constraints in the specification, and generated counter strategies to support understanding reasons for unrealizability. We present the specifications we developed, our observations, and challenges faced during the case study.
0.904644
0.681639
0.223005
2004.07369
Raman Spectrum and Polarizability of Liquid Water from Deep Neural Networks
We introduce a scheme based on machine learning and deep neural networks to model the environmental dependence of the electronic polarizability in insulating materials. Application to liquid water shows that training the network with a relatively small number of molecular configurations is sufficient to predict the polarizability of arbitrary liquid configurations in close agreement with ab initio density functional theory calculations. In combination with a neural network representation of the interatomic potential energy surface,the scheme allows us to calculate the Raman spectra along 2-nanosecond classical trajectories at different temperatures for H2O and D2O. The vast gains in efficiency provided by the machine learning approach enable longer trajectories and larger system sizes relative to ab initio methods, reducing the statistical error and improving the resolution of the low-frequency Raman spectra. Decomposing the spectra into intramolecular and intermolecular contributions elucidates the mechanisms behind the temperature dependence of the low-frequency and stretch modes.
Autonomous vehicles are highly complex systems, required to function reliably in a wide variety of situations. Manually crafting software controllers for these vehicles is difficult, but there has been some success in using deep neural networks generated using machine-learning. However, deep neural networks are opaque to human engineers, rendering their correctness very difficult to prove manually; and existing automated techniques, which were not designed to operate on neural networks, fail to scale to large systems. This paper focuses on proving the adversarial robustness of deep neural networks, i.e. proving that small perturbations to a correctly-classified input to the network cannot cause it to be misclassified. We describe some of our recent and ongoing work on verifying the adversarial robustness of networks, and discuss some of the open questions we have encountered and how they might be addressed.
0.866038
0.664019
0.20202
2004.07370
F0-consistent many-to-many non-parallel voice conversion via conditional autoencoder
Non-parallel many-to-many voice conversion remains an interesting but challenging speech processing task. Many style-transfer-inspired methods such as generative adversarial networks (GANs) and variational autoencoders (VAEs) have been proposed. Recently, AutoVC, a conditional autoencoders (CAEs) based method achieved state-of-the-art results by disentangling the speaker identity and speech content using information-constraining bottlenecks, and it achieves zero-shot conversion by swapping in a different speaker's identity embedding to synthesize a new voice. However, we found that while speaker identity is disentangled from speech content, a significant amount of prosodic information, such as source F0, leaks through the bottleneck, causing target F0 to fluctuate unnaturally. Furthermore, AutoVC has no control of the converted F0 and thus unsuitable for many applications. In the paper, we modified and improved autoencoder-based voice conversion to disentangle content, F0, and speaker identity at the same time. Therefore, we can control the F0 contour, generate speech with F0 consistent with the target speaker, and significantly improve quality and similarity. We support our improvement through quantitative and qualitative analysis.
We describe a neural network-based system for text-to-speech (TTS) synthesis that is able to generate speech audio in the voice of many different speakers, including those unseen during training. Our system consists of three independently trained components: (1) a speaker encoder network, trained on a speaker verification task using an independent dataset of noisy speech from thousands of speakers without transcripts, to generate a fixed-dimensional embedding vector from seconds of reference speech from a target speaker; (2) a sequence-to-sequence synthesis network based on Tacotron 2, which generates a mel spectrogram from text, conditioned on the speaker embedding; (3) an auto-regressive WaveNet-based vocoder that converts the mel spectrogram into a sequence of time domain waveform samples. We demonstrate that the proposed model is able to transfer the knowledge of speaker variability learned by the discriminatively-trained speaker encoder to the new task, and is able to synthesize natural speech from speakers that were not seen during training. We quantify the importance of training the speaker encoder on a large and diverse speaker set in order to obtain the best generalization performance. Finally, we show that randomly sampled speaker embeddings can be used to synthesize speech in the voice of novel speakers dissimilar from those used in training, indicating that the model has learned a high quality speaker representation.
0.861912
0.79231
0.069602
2004.07371
Joint Traffic-Aware UAV Placement and Predictive Routing for Aerial Networks
Aerial networks, composed of Unmanned Aerial Vehicles (UAVs) acting as Wi-Fi access points or cellular base stations, are emerging as an interesting solution to provide on-demand wireless connectivity to users, when there is no network infrastructure available, or to enhance the network capacity. This article proposes a traffic-aware topology control solution for aerial networks that holistically combines the placement of UAVs with a predictive and centralized routing protocol. The synergy created by the combination of the UAV placement and routing solutions allows the aerial network to seamlessly update its topology according to the users' traffic demand, whilst minimizing the disruption caused by the movement of the UAVs. As a result, the Quality of Service (QoS) provided to the users is improved. The components of the proposed solution are described and evaluated individually in this article by means of simulation and an experimental testbed. The results show that all the components improve the QoS provided to the users when compared to the corresponding baseline solutions.
The paper considers physical layer security (PLS) of an untrusted unmanned aerial vehicle (UAV) network, where a multitude of UAVs communicate in full-duplex (FD) mode. A source-based jamming (SBJ) scheme is exploited for secure communication without utilizing any external jammers. Firstly, the optimal power allocation between the confidential signal and the jamming signal is derived to maximize the secrecy rate of each link between the source and the destination. Then, the best UAV selection scheme is proposed to maximize the overall secrecy rate of the network. The corresponding secrecy outage probability (SOP) and the average secrecy rate (ASR) of the network are analyzed based on the proposed UAV selection and the optimal power allocation schemes. Asymptotic results are also obtained to derive the achievable diversity order. Results are validated through numerical evaluations while providing useful network design insights such as locations and altitudes of the UAVs.
0.894276
0.702067
0.192209
2004.07372
Quantum Phases Drive the Dynamics of Macroscopic Quantum Tunneling Escape in Quantum Simulators
Mott tunneling dynamics are entirely distinct from the superfluid ones and ground state properties of quantum phases can predict highly non-equilibrium behavior. We consider quasi-bound state dynamics or tunneling escape in the Bose-Hubbard model from a behind a finite barrier, which can be realized in quantum simulators. In the superfluid regime we find that escape dynamics are wave-like and coherent, leading to interference patterns in the density with a non-exponential but still rapid decay process. Quantum entropy production peaks when about half the atoms have escaped. In contrast, in the Mott insulator regime we find the dynamics are atom-like and incoherent, with no interference fringes. Quantum entropy production peaks at double the value of the superfluid case and when only about one quarter of the atoms have escaped. Despite stronger repulsive interactions, tunneling is significantly slowed by the presence of a Mott gap, creating an effective extra barrier to overcome, and the decay process is nearly linear. Moreover, we introduce a new quantum tunneling rate, the fluctuation rate, which shows oscillatory interference between the trapped and the escaped atoms on short time scales beyond the constant waiting time known for single-particle tunneling before exponential decay ensues. The fluctuation rate is overall positive for the superfluid and initially negative for the Mott insulator, only turning positive in the latter case when about half the atoms have escaped. Finally, off-diagonal correlators show entirely different structure for the two quantum phases. In the superfluid case, the barrier height and interaction strength can be used to tune from pulsed to continuous-wave positive correlation emissions in the escape region. In the Mott insulator, negative correlations between the trap and the escape region emphasize emission one atom at a time.
The tunneling decay event of a metastable state in a fully connected quantum spin model can be simulated efficiently by path integral quantum Monte Carlo (QMC) [Isakov $et~al.$, Phys. Rev. Lett. ${\bf 117}$, 180402 (2016).]. This is because the exponential scaling with the number of spins of the thermally-assisted quantum tunneling rate and the Kramers escape rate of QMC are identical [Jiang $et~al.$, Phys. Rev. A ${\bf 95}$, 012322 (2017).], a result of a dominant instantonic tunneling path. In Ref. [1], it was also conjectured that the escape rate in open-boundary QMC is quadratically larger than that of conventional periodic-boundary QMC, therefore, open-boundary QMC might be used as a powerful tool to solve combinatorial optimization problems. The intuition behind this conjecture is that the action of the instanton in open-boundary QMC is a half of that in periodic-boundary QMC. Here, we show that this simple intuition---although very useful in interpreting some numerical results---deviates from the actual situation in several ways. Using a fully connected quantum spin model, we derive a set of conditions on the positions and momenta of the endpoints of the instanton, which remove the extra degrees of freedom due to open boundaries. In comparison, the half-instanton conjecture incorrectly sets the momenta at the endpoints to zero. We also found that the instantons in open-boundary QMC correspond to quantum tunneling events in the symmetric subspace (maximum total angular momentum) at all temperatures, whereas the instantons in periodic-boundary QMC typically lie in subspaces with lower total angular momenta at finite temperatures. This leads to a lesser than quadratic speedup at finite temperatures. We also outline the generalization of the instantonic tunneling method to many-qubit systems without permutation symmetry using spin-coherent-state path integrals.
0.856888
0.785678
0.07121
2004.07373
Improv practices in Mathematics Active Teaching
This article explores the parallels between improvisational theater (Improv) and teaching in an Active Learning environment. It presents the notions of Active Teaching as a natural complement to Active Learning, and discusses how unexpected situations give rise to valuable Teaching Moments. These Teaching Moments can be strategically utilized following the rules of Improv. This article presents some examples of this in the Mathematics classroom, as well as the implementation of an Improv Seminar in the Mathematics Department at the University of California, Santa Cruz.
Papert's (1980) work with Turtle Geometry offered an early and provocative vision of how digital technologies could be used with young learners. Since then, research on digital technology use has focused on the middle and high school levels. Given the increasing diversity of digital technologies, and their varied underlying pedagogical goals and design choices, Clements' (2002) claim that there is no single effect of the computer on mathematics achievement is as true now as it was a decade ago. However, many advances have been made in better articulating the range of design choices that are possible, their potential effect on the cognitive and affective dimensions on mathematics learning, and their varying demands on the teacher. The aim of this chapter is to summarise the research literature on the use of digital technologies in the teaching and learning of mathematics at the k-2 level. In particular, we focus on literature that contributes to our understanding of how the use of digital technologies affects and changes the teaching and learning of mathematics - that is, how different affordances and design choices impact on the way teachers and learners interact and express themselves mathematically. By digital technologies we refer to a range of tools including multi-purpose computer-based software programs, web-based applets, virtual manipulatives, programming languages, CD-ROMs, games, calculators, touchscreen applications and interactive whiteboards. The distinction between these various types is not always evident and, indeed, one goal of this chapter is to provide useful distinguishing features of these various technologies in order to help educators better evaluate and choose amongst them.
0.922234
0.723212
0.199021
2004.07374
Homological mirror symmetry for Milnor fibers of simple singularities
We prove homological mirror symmetry for Milnor fibers of simple singularities, which are among the log Fano cases of Conjecture 1.5 in arXiv:1806.04345. The proof is based on a relation between matrix factorizations and Calabi--Yau completions. As an application, we give an explicit computation of the symplectic cohomology group of the Milnor fiber of a simple singularity in all dimensions.
In this paper, we describe explicit relations in the symplectomorphism groups of toric hypersurfaces. To define the elements involved, we construct a proper stack of toric hypersurfaces with compactifying boundary representing toric hypersurface degenerations. Our relations arise through the study of the one dimensional strata of this stack. The results are then examined from the perspective of homological mirror symmetry where we view sequences of relations as maximal degenerations of Landau-Ginzburg models. We then study the B-model mirror to these degenerations, which gives a new mirror symmetry approach to the minimal model program.
0.950226
0.823975
0.126251
2004.07375
A Practical Introduction to Bayesian Estimation of Causal Effects: Parametric and Nonparametric Approaches
Substantial advances in Bayesian methods for causal inference have been developed in recent years. We provide an introduction to Bayesian inference for causal effects for practicing statisticians who have some familiarity with Bayesian models and would like an overview of what it can add to causal estimation in practical settings. In the paper, we demonstrate how priors can induce shrinkage and sparsity on parametric models and be used to perform probabilistic sensitivity analyses around causal assumptions. We provide an overview of nonparametric Bayesian estimation and survey their applications in the causal inference literature. Inference in the point-treatment and time-varying treatment settings are considered. For the latter, we explore both static and dynamic treatment regimes. Throughout, we illustrate implementation using off-the-shelf open source software. We hope the reader will walk away with implementation-level knowledge of Bayesian causal inference using both parametric and nonparametric models. All synthetic examples and code used in the paper are publicly available on a companion GitHub repository.
We present a common framework for Bayesian emulation methodologies for multivariate-output simulators, or computer models, that employ either parametric linear models or nonparametric Gaussian processes. Novel diagnostics suitable for multivariate covariance-separable emulators are developed and techniques to improve the adequacy of an emulator are discussed and implemented. A variety of emulators are compared for a humanitarian relief simulator, modelling aid missions to Sicily after a volcanic eruption and earthquake, and a sensitivity analysis is conducted to determine the sensitivity of the simulator output to changes in the input variables. The results from parametric and nonparametric emulators are compared in terms of prediction accuracy, uncertainty quantification and scientific interpretability.
0.926328
0.716284
0.210043
2004.07376
COVID-19 Antibody Test Certification: There's an app for that
As the Coronavirus Pandemic of 2019/2020 unfolds, a COVID-19 'Immunity Passport' has been mooted as a way to enable individuals, especially those in healthcare and other key industries, to return safely back to work at 'the right moment'. Despite a number of ethical, social, legal, and biological dilemmas (e.g. 'COVID-19 antibody testing' is itself unproven), verifiable test results could well become highly desirable, at least in certain key sectors. But a 'paper certificate' has a number of dilemmas of its own, including weak tamper-proofness and rather arcane and clumsy verifiability. To address many of the underlying issues involved in certification, and as a proof of concept for future pandemics, we have developed a prototype mobile phone app that facilitates instant verification of tamper-proof test results. Personally identifiable information is only stored at the user's discretion, and the app allows the end-user selectively to present only the specific test result with no other personal information revealed. Behind the scenes it relies upon (a) the 2019 World Wide Web Consortium standard called 'Verifiable Credentials', (b) Tim Berners-Lee's decentralised personal data platform 'Solid', and (c) a consortium Ethereum-based blockchain. These enable the aforementioned mixture of verifiability and privacy in a manner derived from public/private key pairs and digital signatures, generalised to avoid restrictive ownership of sensitive digital keys and/or data. We describe the underlying principles, ethical considerations, and a 9-step use case scenario.
Doctors and nurses in these weeks are busy in the trenches, fighting against a new invisible enemy: Covid-19. Cities are locked down and civilians are besieged in their own homes, to prevent the spreading of the virus. War-related terminology is commonly used to frame the discourse around epidemics and diseases. Arguably the discourse around the current epidemic will make use of war-related metaphors too,not only in public discourse and the media, but also in the tweets written by non-experts of mass communication. We hereby present an analysis of the discourse around #Covid-19, based on a corpus of 200k tweets posted on Twitter during March and April 2020. Using topic modelling we first analyze the topics around which the discourse can be classified. Then, we show that the WAR framing is used to talk about specific topics, such as the virus treatment, but not others, such as the effects of social distancing on the population. We then measure and compare the popularity of the WAR frame to three alternative figurative frames (MONSTER, STORM and TSUNAMI) and a literal frame used as control (FAMILY). The results show that while the FAMILY literal frame covers a wider portion of the corpus, among the figurative framings WAR is the most frequently used, and thus arguably the most conventional one. However, we conclude, this frame is not apt to elaborate the discourse around many aspects involved in the current situation. Therefore, we conclude, in line with previous suggestions, a plethora of framing options, or a metaphor menu, may facilitate the communication of various aspects involved in the Covid-19-related discourse on the social media, and thus support civilians in the expression of their feelings, opinions and ideas during the current pandemic.
0.801088
0.635105
0.165983
2004.07378
Decentralized Gaussian Filters for Cooperative Self-localization and Multi-target Tracking
Scalable and decentralized algorithms for Cooperative Self-localization (CS) of agents, and Multi-Target Tracking (MTT) are important in many applications. In this work, we address the problem of Simultaneous Cooperative Self-localization and Multi-Target Tracking (SCS-MTT) under target data association uncertainty, i.e., the associations between measurements and target tracks are unknown. Existing CS and tracking algorithms either make the assumption of no data association uncertainty or employ a hard-decision rule for measurement-to-target associations. We propose a novel decentralized SCS-MTT method for an unknown and time-varying number of targets under association uncertainty. Marginal posterior densities for agents and targets are obtained by an efficient belief propagation (BP) based scheme while data association is handled by marginalizing over all target-to-measurement association probabilities. Decentralized single Gaussian and Gaussian mixture implementations are provided based on average consensus schemes, which require communication only with one-hop neighbors. An additional novelty is a decentralized Gibbs mechanism for efficient evaluation of the product of Gaussian mixtures. Numerical experiments show the improved CS and MTT performance compared to the conventional approach of separate localization and target tracking.
We consider a cooperative Gaussian interference channel in which each receiver must decode its intended message locally, with the help of cooperation either at the receivers side or at the transmitter side. In the case of receiver cooperation, the receivers can process and share information through limited capacity backhaul links. In contrast to various previously considered distributed antenna architectures, where processing is utterly performed in a centralized fashion, the model considered in this paper aims to capture the essence of decentralized processing, allowing for a more general class of "interactive" interference management strategies. Focusing on the three-user case, we characterize the fundamental tradeoff between the achievable communication rates and the corresponding backhaul cooperation rate, in terms of degrees of freedom (DoF). Surprisingly, we show that the optimum communication-cooperation tradeoff per user remains the same when we move from two-user to three-user interference channels. In the absence of cooperation, this is due to interference alignment, which keeps the fraction of communication dimensions wasted for interference unchanged. When backhaul cooperation is available, we develop a new idea that we call cooperation alignment, which guarantees that the average (per user) backhaul load remains the same as we increase the number of users. In the case of transmitter cooperation, the transmitters can form their jointly precoded signals through an interactive protocol over the backhaul. In this case, we show that the optimal (per user) tradeoff between the achievable communication rates and the corresponding backhaul cooperation rate in the three-user case is the same as for receiver cooperation.
0.88815
0.707916
0.180234
2004.07379
Controlling valley splitting and Polarization of dark- and bi-excitons in monolayer WS$_2$ by a tilted magnetic field
We developed a comprehensive theoretical framework focusing on many-body effects of exciton species in monolayer WS$_2$, including bright and dark excitons, and intra- and inter-valley biexcitons, to investigate valley dynamics in monolayer WS$_2$ subjected to a tilted magnetic field B. In particular, the evolution of the exciton population densities and the many-body particle scatterings are considered to calculate the valley polarization (V P ) as a function of the magnetic field. We found valley splittings for the dark exciton and biexciton energy levels that are larger than those of bright excitons, of -0.23 meV/T. For example, -0.46 meV/T for dark excitons and -0.69 meV/T for bright-dark intra-valley biexcitons. Furthermore, inter-valley bright-dark excitons have an opposite valley energy splittings of +0.23 meV/T. For the samples pumped by linearly polarized light, V P exhibits distinct magnetic field dependence for different types of many-body particle states. Among them, the V P of the intra-valley bright-dark biexcitons increases with increasing magnetic field and reaches nearly 50% at B=65 T. The brightened dark exciton, on the other hand, exhibits vanishing VP, indicating long valley relaxation time. Remarkably, the inter-valley bright-dark biexciton shows unconventional behavior with an inverted VP. The opposite VP for intra- and inter-valley bright-dark biexcitons, coupled with their large valley splitting and long valley lifetime may facilitate their coherent manipulation for quantum computing.
We study the role of impurity scattering on the photoluminescence (PL) emission of polarized magnetoexcitons. We consider systems where both the electron and hole are confined on a ring structure (quantum rings) as well as on a type-II quantum dot. Despite their neutral character, excitons exhibit strong modulation of energy and oscillator strength in the presence of magnetic fields. Scattering impurities enhance the PL intensity on otherwise "dark" magnetic field windows and non-zero PL emission appears for a wide magnetic field range even at zero temperature. For higher temperatures, impurity-induced anticrossings on the excitonic spectrum lead to unexpected peaks and valleys on the PL intensity as function of magnetic field. Such behavior is absent on ideal systems and can account for prominent features in recent experimental results.
0.92908
0.798028
0.131052
2004.07380
Performance Analysis for Autonomous Vehicle 5G-Assisted Positioning in GNSS-Challenged Environments
Standalone Global Navigation Satellite Systems (GNSS) are known to provide positioning accuracy of a few meters in open sky conditions. This accuracy can drop significantly when the line-of-sight (LOS) paths to some GNSS satellites are obstructed, e.g., in urban canyons or underground tunnels. To overcome this issue, the general approach is usually to augment GNSS systems with other dedicated subsystems to help cover the gaps arising from obscured LOS. Positioning in 5G has attracted some attention lately, mainly due to the possibility to provide cm-level accuracy using 5G signals and infrastructure, effectively imposing no additional cost. In this paper, we study the hybridization of GNSS and 5G positioning in terms of achievable position and velocity error bounds. We focus on scenarios where satellite visibility is constrained by the environment geometry, and where the GNSS and 5G positioning systems fail to perform individually or provide a prohibitively large error.
We propose a method for off-road drivable area extraction using 3D LiDAR data with the goal of autonomous driving application. A specific deep learning framework is designed to deal with the ambiguous area, which is one of the main challenges in the off-road environment. To reduce the considerable demand for human-annotated data for network training, we utilize the information from vast quantities of vehicle paths and auto-generated obstacle labels. Using these autogenerated annotations, the proposed network can be trained using weakly supervised or semi-supervised methods, which can achieve better performance with fewer human annotations. The experiments on our dataset illustrate the reasonability of our framework and the validity of our weakly and semi-supervised methods.
0.861324
0.623433
0.237891
2004.07381
Optimal protocols for the most difficult repeated coordination games
This paper investigates repeated win-lose coordination games (WLC-games). We analyse which protocols are optimal for these games covering both the worst case and average case scenarios, i,e., optimizing the guaranteed and expected coordination times. We begin by analysing Choice Matching Games (CM-games) which are a simple yet fundamental type of WLC-games, where the goal of the players is to pick the same choice from a finite set of initially indistinguishable choices. We give a complete classification of optimal expected and guaranteed coordination times in two-player CM-games and show that the corresponding optimal protocols are unique in every case - except in the CM-game with four choices, which we analyse separately. Our results on CM-games are also essential for proving a more general result on the difficulty of all WLC-games: we provide a complete analysis of least upper bounds for optimal expected coordination times in all two-player WLC-games as a function of game size. We also show that CM-games can be seen as the most difficult games among all two-player WLC-games, as they turn out to have the greatest optimal expected coordination times.
Discrete optimization is a central problem in mathematical optimization with a broad range of applications, among which binary optimization and sparse optimization are two common ones. However, these problems are NP-hard and thus difficult to solve in general. Combinatorial search methods such as branch-and-bound and exhaustive search find the global optimal solution but are confined to small-sized problems, while coordinate descent methods such as coordinate gradient descent are efficient but often suffer from poor local minima. In this paper, we consider a hybrid method that combines the effectiveness of combinatorial search and the efficiency of coordinate descent. Specifically, we consider random strategy or/and greedy strategy to select a subset of coordinates as the working set, and then perform global combinatorial search over the working set based on the original objective function. In addition, we provide some optimality analysis and convergence analysis for the proposed method. Our method finds stronger stationary points than existing methods. Finally, we demonstrate the efficacy of our method on some sparse optimization and binary optimization applications. As a result, our method achieves state-of-the-art performance in terms of accuracy. For example, our method generally outperforms the well-known orthogonal matching pursuit method in sparse optimization. Keywords: Sparsity Optimization, Binary Optimization, Coordinate Descent, Combinatorial Search, Discrete Optimization, Convergence Analysis.
0.899832
0.676194
0.223638
2004.07383
Exploiting Categorical Structure Using Tree-Based Methods
Standard methods of using categorical variables as predictors either endow them with an ordinal structure or assume they have no structure at all. However, categorical variables often possess structure that is more complicated than a linear ordering can capture. We develop a mathematical framework for representing the structure of categorical variables and show how to generalize decision trees to make use of this structure. This approach is applicable to methods such as Gradient Boosted Trees which use a decision tree as the underlying learner. We show results on weather data to demonstrate the improvement yielded by this approach.
Spatiotemporal human representation based on 3D visual perception data is a rapidly growing research area. Based on the information sources, these representations can be broadly categorized into two groups based on RGB-D information or 3D skeleton data. Recently, skeleton-based human representations have been intensively studied and kept attracting an increasing attention, due to their robustness to variations of viewpoint, human body scale and motion speed as well as the realtime, online performance. This paper presents a comprehensive survey of existing space-time representations of people based on 3D skeletal data, and provides an informative categorization and analysis of these methods from the perspectives, including information modality, representation encoding, structure and transition, and feature engineering. We also provide a brief overview of skeleton acquisition devices and construction methods, enlist a number of public benchmark datasets with skeleton data, and discuss potential future research directions.
0.843091
0.598363
0.244728
2004.07384
Topological Descriptors for Parkinson's Disease Classification and Regression Analysis
At present, the vast majority of human subjects with neurological disease are still diagnosed through in-person assessments and qualitative analysis of patient data. In this paper, we propose to use Topological Data Analysis (TDA) together with machine learning tools to automate the process of Parkinson's disease classification and severity assessment. An automated, stable, and accurate method to evaluate Parkinson's would be significant in streamlining diagnoses of patients and providing families more time for corrective measures. We propose a methodology which incorporates TDA into analyzing Parkinson's disease postural shifts data through the representation of persistence images. Studying the topology of a system has proven to be invariant to small changes in data and has been shown to perform well in discrimination tasks. The contributions of the paper are twofold. We propose a method to 1) classify healthy patients from those afflicted by disease and 2) diagnose the severity of disease. We explore the use of the proposed method in an application involving a Parkinson's disease dataset comprised of healthy-elderly, healthy-young and Parkinson's disease patients.
Deep brain stimulation (DBS) is an effective therapy as an alternative to pharmaceutical treatments for Parkinson's disease (PD). Aside from factors such as instrumentation, treatment plans, and surgical protocols, the success of the procedure depends heavily on the accurate placement of the electrode within the optimal therapeutic targets while avoiding vital structures that can cause surgical complications and adverse neurologic effects. While specific surgical techniques for DBS can vary, interventional guidance with medical imaging has greatly contributed to the development, outcomes, and safety of the procedure. With rapid development in novel imaging techniques, computational methods, and surgical navigation software, as well as growing insights into the disease and mechanism of action of DBS, modern image guidance is expected to further enhance the capacity and efficacy of the procedure in treating PD. This article surveys the state-of-the-art techniques in image-guided DBS surgery to treat PD, and discuss their benefits and drawbacks, as well as future directions on the topic.
0.881507
0.69792
0.183587
2004.07386
Neuromorphic Event-Based Slip Detection and suppression in Robotic Grasping and Manipulation
Slip detection is essential for robots to make robust grasping and fine manipulation. In this paper, a novel dynamic vision-based finger system for slip detection and suppression is proposed. We also present a baseline and feature based approach to detect object slips under illumination and vibration uncertainty. A threshold method is devised to autonomously sample noise in real-time to improve slip detection. Moreover, a fuzzy based suppression strategy using incipient slip feedback is proposed for regulating the grip force. A comprehensive experimental study of our proposed approaches under uncertainty and system for high-performance precision manipulation are presented. We also propose a slip metric to evaluate such performance quantitatively. Results indicate that the system can effectively detect incipient slip events at a sampling rate of 2kHz ($\Delta t = 500\mu s$) and suppress them before a gross slip occurs. The event-based approach holds promises to high precision manipulation task requirement in industrial manufacturing and household services.
Bed-making is a universal home task that can be challenging for senior citizens due to reaching motions. Automating bed-making has multiple technical challenges such as perception in an unstructured environments, deformable object manipulation, obstacle avoidance and sequential decision making. We explore how DART, an LfD algorithm for learning robust policies, can be applied to automating bed making without fiducial markers with a Toyota Human Support Robot (HSR). By gathering human demonstrations for grasping the sheet and failure detection, we can learn deep neural network policies that leverage pre-trained YOLO features to automate the task. Experiments with a 1/2 scale twin bed and distractors placed on the bed, suggest policies learned on 50 demonstrations with DART achieve 96% sheet coverage, which is over 200% better than a corner detector baseline using contour detection.
0.855527
0.723189
0.132338
2004.07387
Continuously many bounded displacement non-equivalences in substitution tiling spaces
We consider substitution tilings in R^d that give rise to point sets that are not bounded displacement (BD) equivalent to a lattice and study the cardinality of BD(X), the set of distinct BD class representatives in the corresponding tiling space X. We prove a sufficient condition under which the tiling space contains continuously many distinct BD classes and present such an example in the plane. In particular, we show here for the first time that this cardinality can be greater than one.
An $n$-dimensional cross comprises $2n+1$ unit cubes: the center cube and reflections in all its faces. It is well known that there is a tiling of $R^{n}$ by crosses for all $n.$ AlBdaiwi and the first author proved that if $2n+1$ is not a prime then there are $2^{\aleph_{0}}$ \ non-congruent regular (= face-to-face) tilings of $R^{n}$ by crosses, while there is a unique tiling of $R^{n}$ by crosses for $n=2,3$. They conjectured that this is always the case if $2n+1$ is a prime. To support the conjecture we prove in this paper that also for $R^{5}$ there is a unique regular, and no non-regular, tiling by crosses. So there is a unique tiling of $R^{3}$ by crosses, there are $2^{\aleph_{0}}$ tilings of $R^{4},$ but for $R^{5}$ there is again only one tiling by crosses. We guess that this result goes against our intuition that suggests "the higher the dimension of the \ space, the more freedom we get".
0.903692
0.753327
0.150366
2004.07388
Transfer learning in large-scale ocean bottom seismic wavefield reconstruction
Achieving desirable receiver sampling in ocean bottom acquisition is often not possible because of cost considerations. Assuming adequate source sampling is available, which is achievable by virtue of reciprocity and the use of modern randomized (simultaneous-source) marine acquisition technology, we are in a position to train convolutional neural networks (CNNs) to bring the receiver sampling to the same spatial grid as the dense source sampling. To accomplish this task, we form training pairs consisting of densely sampled data and artificially subsampled data using a reciprocity argument and the assumption that the source-site sampling is dense. While this approach has successfully been used on the recovery monochromatic frequency slices, its application in practice calls for wavefield reconstruction of time-domain data. Despite having the option to parallelize, the overall costs of this approach can become prohibitive if we decide to carry out the training and recovery independently for each frequency. Because different frequency slices share information, we propose the use the method of transfer training to make our approach computationally more efficient by warm starting the training with CNN weights obtained from a neighboring frequency slices. If the two neighboring frequency slices share information, we would expect the training to improve and converge faster. Our aim is to prove this principle by carrying a series of carefully selected experiments on a relatively large-scale five-dimensional data synthetic data volume associated with wide-azimuth 3D ocean bottom node acquisition. From these experiments, we observe that by transfer training we are able t significantly speedup in the training, specially at relatively higher frequencies where consecutive frequency slices are more correlated.
Deep-Earth volatile cycles couple the mantle with near-surface reservoirs. Volatiles are emitted by volcanism and, in particular, from mid-ocean ridges, which are the most prolific source of basaltic volcanism. Estimates of volatile extraction from the asthenosphere beneath ridges typically rely on measurements of undegassed lavas combined with simple petrogenetic models of the mean degree of melting. Estimated volatile fluxes have large uncertainties; this is partly due to a poor understanding of how volatiles are transported by magma in the asthenosphere. Here, we assess the fate of mantle volatiles through numerical simulations of melting and melt transport at mid-ocean ridges. Our simulations are based on two-phase, magma/mantle dynamics theory coupled to idealised thermodynamic model of mantle melting in the presence of water and carbon dioxide. We combine simulation results with catalogued observations of all ridge segments to estimate a range of likely volatile output from the global mid-ocean ridge system. We thus predict global MOR crust production of 66-73 Gt/yr (22-24 km3/yr) and global volatile output of 52-110 Mt/yr, corresponding to mantle volatile contents of 100--200~ppm. We find that volatile extraction is limited: up to half of deep, volatile-rich melt is not focused to the axis but is rather deposited along the LAB. As these distal melts crystallise and fractionate, they metasomatise the base of the lithosphere, creating rheological heterogeneity that could contribute to the seismic signature of the LAB.
0.859581
0.659348
0.200234
2004.07389
Extended source imaging, a unifying framework for seismic & medical imaging
We present three imaging modalities that live on the crossroads of seismic and medical imaging. Through the lens of extended source imaging, we can draw deep connections among the fields of wave-equation based seismic and medical imaging, despite first appearances. From the seismic perspective, we underline the importance to work with the correct physics and spatially varying velocity fields. Medical imaging, on the other hand, opens the possibility for new imaging modalities where outside stimuli, such as laser or radar pulses, can not only be used to identify endogenous optical or thermal contrasts but that these sources can also be used to insonify the medium so that images of the whole specimen can in principle be created.
Telemedicine is well known application where enormous amount of medical data need to be transferred securely over network and manipulate effectively. Security of digital data, especially medical images, becomes important for many reasons such as confidentiality, authentication and integrity. Digital watermarking has emerged as a advanced technology to enhance the security of digital images. The insertion of watermark in medical images can authenticate it and guarantee its integrity. The watermark must be generally hidden does not affect the quality of the medical image. In this paper, we propose blind watermarking based on Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD), we compare the performance of this technique with watermarking based DWT and SVD. The proposed method DWT, DCT and SVD comparatively better than DWT and SVD method.
0.889314
0.624873
0.264441
2004.07390
Trakhtenbrot's Theorem in Coq, A Constructive Approach to Finite Model Theory
We study finite first-order satisfiability (FSAT) in the constructive setting of dependent type theory. Employing synthetic accounts of enumerability and decidability, we give a full classification of FSAT depending on the first-order signature of non-logical symbols. On the one hand, our development focuses on Trakhtenbrot's theorem, stating that FSAT is undecidable as soon as the signature contains an at least binary relation symbol. Our proof proceeds by a many-one reduction chain starting from the Post correspondence problem. On the other hand, we establish the decidability of FSAT for monadic first-order logic, i.e. where the signature only contains at most unary function and relation symbols, as well as the enumerability of FSAT for arbitrary enumerable signatures. All our results are mechanised in the framework of a growing Coq library of synthetic undecidability proofs.
This is a presentation of explicit methods to construct higher local class field theory by using topological K-groups, explicit symbols and a generalization of Neukirch-Hazewinkel's axiomatic approaches. The existence theorem is discussed as well.
0.801838
0.753815
0.048023
2004.07391
Mathematical assessment of the impact of non-pharmaceutical interventions on curtailing the 2019 novel Coronavirus
A novel Coronavirus pandemic emerged in December of 2019, causing devastating public health impact across the world. In the absence of a safe and effective vaccine or antivirals, strategies for mitigating the burden of the pandemic are focused on non-pharmaceutical interventions, such as social-distancing, contact-tracing, quarantine, isolation and the use of face-masks in public. We develop a new mathematical model for assessing the population-level impact of these mitigation strategies. Simulations of the model, using data relevant to COVID-19 transmission in the state of New York and the entire US, show that the pandemic will peak in mid and late April, respectively. The worst-case scenario projections for cumulative mortality are 105, 100 for New York state and 164, 000 for the entire US by the end of the pandemic. These numbers decrease by 80% and 64%, respectively, if adherence to strict social-distancing measures is improved and maintained until the end of May or June. This study shows that early termination of strict social-distancing measures could trigger a devastating second wave with burden similar to that projected before the onset of strict social-distance measures. The use of efficacious face-masks (efficacy greater than 70%) could lead to the elimination of the pandemic if at least 70% of the residents of New York state use such masks consistently (nationwide, a compliance of at least 80% will be required using such masks). The use of low efficacy masks, such as cloth masks (of efficacy less than 30%), could also lead to significant reduction of COVID-19 burden (albeit, they are not able to lead to elimination). Combining low efficacy masks with improved levels of the other anti-COVID-19 intervention strategies can lead to elimination of the pandemic. The mask coverage needed to eliminate COVID-19 decreases if the mask-use is combined with strict social-distancing.
Coronavirus disease 2019 (COVID-19) is an ongoing pandemic infectious disease outbreak that has significantly harmed and threatened the health and lives of millions or even billions of people. COVID-19 has also negatively impacted the social and economic activities of many countries significantly. With no approved vaccine available at this moment, extensive testing of COVID-19 viruses in people are essential for disease diagnosis, virus spread confinement, contact tracing, and determining right conditions for people to return to normal economic activities. Identifying people who have antibodies for COVID-19 can also help select persons who are suitable for undertaking certain essential activities or returning to workforce. However, the throughputs of current testing technologies for COVID-19 viruses and antibodies are often quite limited, which are not sufficient for dealing with COVID-19 viruses' anticipated fast oscillating waves of spread affecting a significant portion of the earth's population. In this paper, we propose to use compressed sensing (group testing can be seen as a special case of compressed sensing when it is applied to COVID-19 detection) to achieve high-throughput rapid testing of COVID-19 viruses and antibodies, which can potentially provide tens or even more folds of speedup compared with current testing technologies. The proposed compressed sensing system for high-throughput testing can utilize expander graph based compressed sensing matrices developed by us \cite{Weiyuexpander2007}.
0.837921
0.747307
0.090613
2004.07392
Joint Supervised and Self-Supervised Learning for 3D Real-World Challenges
Point cloud processing and 3D shape understanding are very challenging tasks for which deep learning techniques have demonstrated great potentials. Still further progresses are essential to allow artificial intelligent agents to interact with the real world, where the amount of annotated data may be limited and integrating new sources of knowledge becomes crucial to support autonomous learning. Here we consider several possible scenarios involving synthetic and real-world point clouds where supervised learning fails due to data scarcity and large domain gaps. We propose to enrich standard feature representations by leveraging self-supervision through a multi-task model that can solve a 3D puzzle while learning the main task of shape classification or part segmentation. An extensive analysis investigating few-shot, transfer learning and cross-domain settings shows the effectiveness of our approach with state-of-the-art results for 3D shape classification and part segmentation.
Many machine learning algorithms assume that all input samples are independently and identically distributed from some common distribution on either the input space X, in the case of unsupervised learning, or the input and output space X x Y in the case of supervised and semi-supervised learning. In the last number of years the relaxation of this assumption has been explored and the importance of incorporation of additional information within machine learning algorithms became more apparent. Traditionally such fusion of information was the domain of semi-supervised learning. More recently the inclusion of knowledge from separate hypothetical spaces has been proposed by Vapnik as part of the supervised setting. In this work we are interested in exploring Vapnik's idea of master-class learning and the associated learning using privileged information, however within the unsupervised setting. Adoption of the advanced supervised learning paradigm for the unsupervised setting instigates investigation into the difference between privileged and technical data. By means of our proposed aRi-MAX method stability of the KMeans algorithm is improved and identification of the best clustering solution is achieved on an artificial dataset. Subsequently an information theoretic dot product based algorithm called P-Dot is proposed. This method has the ability to utilize a wide variety of clustering techniques, individually or in combination, while fusing privileged and technical data for improved clustering. Application of the P-Dot method to the task of digit recognition confirms our findings in a real-world scenario.
0.843206
0.664635
0.178571
2004.07393
Minimal quantum heat manager boosted by bath spectral filtering
We reveal the potentially important role of a general mechanism that has hitherto not been invoked in quantum heat management schemes, namely, spectral filtering of the coupling between the heat baths in the setup and the quantum system that controls the heat flow. Such filtering is enabled by interfaces between the system and the baths by means of harmonic-oscillator modes whose resonant frequencies and coupling strengths are used as control parameters of the system-bath coupling spectra. We show that this uniquely quantum-electrodynamic mechanism, here dubbed bath spectral filtering, boosts the performance of a minimal quantum heat manager comprised of two interacting qubits or an analogous optomechanical system, allowing this device to attain either perfect heat diode action or strongly enhanced heat transistor action.
We study the stochastic energetic exchanges in quantum heat engines. Due to microreversibility, these obey a fluctuation relation, called the heat engine fluctuation relation, which implies the Carnot bound: no machine can have an efficiency larger than Carnot's efficiency. The stochastic thermodynamics of a quantum heat engine (including the joint statistics of heat and work and the statistics of efficiency) is illustrated by means of an optimal two-qubit heat engine, where each qubit is coupled to a thermal bath and a two-qubit gate determines energy exchanges between the two qubits. We discuss possible solid state implementations with Cooper pair boxes and flux qubits, quantum gate operations, and fast calorimetric on-chip measurements of single stochastic events.
0.905926
0.781463
0.124463
2004.07394
Generalized Shortest Path-based Superpixels for Accurate Segmentation of Spherical Images
Most of existing superpixel methods are designed to segment standard planar images as pre-processing for computer vision pipelines. Nevertheless, the increasing number of applications based on wide angle capture devices, mainly generating 360{\deg} spherical images, have enforced the need for dedicated superpixel approaches. In this paper, we introduce a new superpixel method for spherical images called SphSPS (for Spherical Shortest Path-based Superpixels). Our approach respects the spherical geometry and generalizes the notion of shortest path between a pixel and a superpixel center on the 3D spherical acquisition space. We show that the feature information on such path can be efficiently integrated into our clustering framework and jointly improves the respect of object contours and the shape regularity. To relevantly evaluate this last aspect in the spherical space, we also generalize a planar global regularity metric. Finally, the proposed SphSPS method obtains significantly better performances than both planar and spherical recent superpixel approaches on the reference 360{\deg} spherical panorama segmentation dataset.
Geometric model fitting is a fundamental research topic in computer vision and it aims to fit and segment multiple-structure data. In this paper, we propose a novel superpixel-guided two-view geometric model fitting method (called SDF), which can obtain reliable and consistent results for real images. Specifically, SDF includes three main parts: a deterministic sampling algorithm, a model hypothesis updating strategy and a novel model selection algorithm. The proposed deterministic sampling algorithm generates a set of initial model hypotheses according to the prior information of superpixels. Then the proposed updating strategy further improves the quality of model hypotheses. After that, by analyzing the properties of the updated model hypotheses, the proposed model selection algorithm extends the conventional "fit-and-remove" framework to estimate model instances in multiple-structure data. The three parts are tightly coupled to boost the performance of SDF in both speed and accuracy, and SDF has the deterministic nature. Experimental results show that the proposed SDF has significant advantages over several state-of-the-art fitting methods when it is applied to real images with single-structure and multiple-structure data.
0.921305
0.780815
0.140491
2004.07395
Joint User Pairing and Association for Multicell NOMA: A Pointer Network-based Approach
In this paper, we investigate the joint user pairing and association problem for multicell non-orthogonal multiple access (NOMA) systems. We consider a scenario where the user equipments (UEs) are located in a multicell network equipped with multiple base stations. Each base station has multiple orthogonal physical resource blocks (PRBs). Each PRB can be allocated to a pair of UEs using NOMA. Each UE has the additional freedom to be served by any one of the base stations, which further increases the complexity of the joint user pairing and association algorithm design. Leveraging the recent success on using machine learning to solve numerical optimization problems, we formulate the joint user pairing and association problem as a combinatorial optimization problem. The solution is found using an emerging deep learning architecture called Pointer Network (PtrNet), which has a lower computational complexity compared to solutions based on iterative algorithms and has been proven to achieve near-optimal performance. The training phase of the PtrNet is based on deep reinforcement learning (DRL), and does not require the use of the optimal solution of the formulated problem as training labels. Simulation results show that the proposed joint user pairing and association scheme achieves near-optimal performance in terms of the aggregate data rate, and outperforms the random user pairing and association heuristic by up to 30%.
This article investigates the non-orthogonal multiple access (NOMA) enhanced unmanned aerial vehicle (UAV)-to-Everything (U2X) frameworks. A novel 3-Dimension framework for providing wireless services to randomly roaming NOMA receivers (Rxs) in the sphere space is proposed by utilizing stochastic geometry tools. In an effort to evaluate the performance of the proposed framework, we first derive closed-form expressions for the outage probability and the ergodic rate of paired NOMA Rxs. For obtaining more insights, we investigate the diversity order and the high signal-to-noise (SNR) slope of NOMA enhanced U2X frameworks. We also derive the spectrum efficiency in both NOMA and orthogonal multiple access (OMA) enhanced U2X frameworks. Our analytical results demonstrate that the diversity order and the high SNR slope of the proposed framework are $m$ and one, respectively. Numerical results are provided to confirm that: i) the proposed NOMA enhanced U2X frameworks have superior outage performance and spectrum efficiency compared with the OMA-enhanced U2X frameworks; and ii) for the case of fixed LoS probability, the outage performance of paired NOMA Rxs mainly depends on users with poor channel conditions.
0.901669
0.723068
0.178602
2004.07396
Global solutions to the spherically symmetric Einstein-scalar field system with a positive cosmological constant in Bondi coordinates
We consider a characteristic initial value problem, with initial data given on a future null cone, for the Einstein (massless) scalar field system with a positive cosmological constant, in Bondi coordinates. We prove that, for small data, this system has a unique global classical solution which is causally geodesically complete to the future and decays polynomially in radius and exponentially in Bondi time, approaching the de Sitter solution.
This topical review deals with a multidimensional gravitational model containing dilatonic scalar fields and antisymmetric forms. The manifold is chosen in the form M = M_0 x M_1 x ...x M_n, where M_i are Einstein spaces (i >0). The sigma-model approach and exact solutions in the model are reviewed and the solutions with p-branes (e.g. Majumdar-Papapetrou-type, cosmological, spherically symmetric, black-brane and Freund-Rubin-type ones) are considered.
0.895323
0.797896
0.097427
2004.07397
Determination of an Optimal Control Strategy for Vaccine Administration in COVID-19 Pandemic Treatment
During decades, mathematical models have been used to predict the behavior of physical and biologic systems, and to define strategies aiming the minimization of the effects regarding different types of diseases. In the present days, the development of mathematical models to simulate the dynamic behavior of novel coronavirus disease (COVID-19) is considered an important theme due to the quantity of infected people worldwide. In this work, the aim is to determine an optimal control strategy for vaccine administration in COVID-19 pandemic treatment considering real data from China. For this purpose, an inverse problem is formulated and solved in order to determine the parameters of the compartmental SIR (Susceptible-Infectious-Recovered) model. To solve such inverse problem, the Differential Evolution (DE) algorithm is employed. After this step, two optimal control problems (mono- and multi-objective) to determine the optimal strategy for vaccine administration in COVID-19 pandemic treatment are proposed. The first consists of minimizing the quantity of infected individuals during the treatment. The second considers minimizing together the quantity of infected individuals and the prescribed vaccine concentration during the treatment, i.e., a multi-objective optimal control problem. The solution of each optimal control problems is obtained using DE and Multi-Objective Differential Evolution (MODE) algorithms, respectively. The results regarding the proposed multi-objective optimal control problem provides a set of evidences from which an optimal strategy for vaccine administration can be chosen, according to a given criterion.
A common problem in Phase II clinical trials is the comparison of dose response curves corresponding to different treatment groups. If the effect of the dose level is described by parametric regression models and the treatments differ in the administration frequency (but not in the sort of drug) a reasonable assumption is that the regression models for the different treatments share common parameters. This paper develops optimal design theory for the comparison of different regression models with common parameters. We derive upper bounds on the number of support points of admissible designs, and explicit expressions for $D$-optimal designs are derived for frequently used dose response models with a common location parameter. If the location and scale parameter in the different models coincide, minimally supported designs are determined and sufficient conditions for their optimality in the class of all designs derived. The results are illustrated in a dose-finding study comparing monthly and weekly administration.
0.903389
0.711236
0.192153
2004.07398
Neuromorphic Eye-in-Hand Visual Servoing
Robotic vision plays a major role in factory automation to service robot applications. However, the traditional use of frame-based camera sets a limitation on continuous visual feedback due to their low sampling rate and redundant data in real-time image processing, especially in the case of high-speed tasks. Event cameras give human-like vision capabilities such as observing the dynamic changes asynchronously at a high temporal resolution ($1\mu s$) with low latency and wide dynamic range. In this paper, we present a visual servoing method using an event camera and a switching control strategy to explore, reach and grasp to achieve a manipulation task. We devise three surface layers of active events to directly process stream of events from relative motion. A purely event based approach is adopted to extract corner features, localize them robustly using heat maps and generate virtual features for tracking and alignment. Based on the visual feedback, the motion of the robot is controlled to make the temporal upcoming event features converge to the desired event in spatio-temporal space. The controller switches its strategy based on the sequence of operation to establish a stable grasp. The event based visual servoing (EVBS) method is validated experimentally using a commercial robot manipulator in an eye-in-hand configuration. Experiments prove the effectiveness of the EBVS method to track and grasp objects of different shapes without the need for re-tuning.
This submission is a report on RRAM based neuromorphic algorithms. This report basically gives an overview of the algorithms implemented on neuromorphic hardware with crossbar array of RRAM synapses. This report mainly talks about the work on deep neural network to spiking neural network conversion and its significance.
0.773421
0.68768
0.085742
2004.07400
Affordances in Robotic Tasks -- A Survey
Affordances are key attributes of what must be perceived by an autonomous robotic agent in order to effectively interact with novel objects. Historically, the concept derives from the literature in psychology and cognitive science, where affordances are discussed in a way that makes it hard for the definition to be directly transferred to computational specifications useful for robots. This review article is focused specifically on robotics, so we discuss the related literature from this perspective. In this survey, we classify the literature and try to find common ground amongst different approaches with a view to application in robotics. We propose a categorisation based on the level of prior knowledge that is assumed to build the relationship among different affordance components that matter for a particular robotic task. We also identify areas for future improvement and discuss possible directions that are likely to be fruitful in terms of impact on robotics practice.
In this paper, we consider the robot motion (or task) planning problem under some given time bounded high level specifications. We use metric interval temporal logic (MITL), a member of the temporal logic family, to represent the task specification and then we provide a constructive way to generate a timed automaton and methods to look for accepting runs on the automaton to find a feasible motion (or path) sequence for the robot to complete the task.
0.895969
0.71046
0.185509
2004.07401
Poisoning Attacks on Algorithmic Fairness
Research in adversarial machine learning has shown how the performance of machine learning models can be seriously compromised by injecting even a small fraction of poisoning points into the training data. While the effects on model accuracy of such poisoning attacks have been widely studied, their potential effects on other model performance metrics remain to be evaluated. In this work, we introduce an optimization framework for poisoning attacks against algorithmic fairness, and develop a gradient-based poisoning attack aimed at introducing classification disparities among different groups in the data. We empirically show that our attack is effective not only in the white-box setting, in which the attacker has full access to the target model, but also in a more challenging black-box scenario in which the attacks are optimized against a substitute model and then transferred to the target model. We believe that our findings pave the way towards the definition of an entirely novel set of adversarial attacks targeting algorithmic fairness in different scenarios, and that investigating such vulnerabilities will help design more robust algorithms and countermeasures in the future.
We study adversarial attacks that manipulate the reward signals to control the actions chosen by a stochastic multi-armed bandit algorithm. We propose the first attack against two popular bandit algorithms: $\epsilon$-greedy and UCB, \emph{without} knowledge of the mean rewards. The attacker is able to spend only logarithmic effort, multiplied by a problem-specific parameter that becomes smaller as the bandit problem gets easier to attack. The result means the attacker can easily hijack the behavior of the bandit algorithm to promote or obstruct certain actions, say, a particular medical treatment. As bandits are seeing increasingly wide use in practice, our study exposes a significant security threat.
0.842824
0.703744
0.13908
2004.07402
Optimal Control of Aquatic Diseases: A Case Study of Yemen's Cholera Outbreak
We propose a mathematical model for the transmission dynamics of some strains of the bacterium Vibrio cholerae, responsible for the cholera disease in humans. We prove that, when the basic reproduction number is equal to one, a transcritical bifurcation occurs for which the endemic equilibrium emanates from the disease-free point. A control function is introduced into the model, representing the distribution of chlorine water tablets for water purification. An optimal control problem is then proposed and analyzed, where the goal is to determine the fraction of susceptible individuals who should have access to chlorine water tablets in order to minimize the total number of new infections plus the total cost associated with the distribution of chlorine water tablets, over the considered period of time. Finally, we consider real data of the cholera outbreak in Yemen, from 27 April 2017 to 15 April 2018, choosing the values of the parameters of the uncontrolled model that fit the real data. Using our optimal control results, we show, numerically, that the distribution of chlorine water tablets could have stopped, in a fast way, the worst cholera outbreak that ever occurred in human history. Due to the critical situation of Yemen, we also simulate the case where only a small percentage of susceptible individuals has access to chlorine water tablets and obtain an optimal control solution that decreases, substantially, the maximum number of infective individuals attained at the outbreak.
Understanding individual decisions in a world where communications and information move instantly via cell phones and the internet, contributes to the development and implementation of policies aimed at stopping or ameliorating the spread of diseases. In this manuscript, the role of official social network perturbations generated by public health officials to slow down or stop a disease outbreak are studied over distinct classes of static social networks. The dynamics are stochastic in nature with individuals (nodes) being assigned fixed levels of education or wealth. Nodes may change their epidemiological status from susceptible, to infected and to recovered. Most importantly, it is assumed that when the prevalence reaches a pre-determined threshold level, P*, information, called awareness in our framework, starts to spread, a process triggered by public health authorities. Information is assumed to spread over the same static network and whether or not one becomes a temporary informer, is a function of his/her level of education or wealth and epidemiological status. Stochastic simulations show that threshold selection P* and the value of the average basic reproduction number impact the final epidemic size differentially. For the Erdos-Renyi and Small-world networks, an optimal choice for P* that minimize the final epidemic size can be identified under some conditions while for Scale-free networks this is not case.
0.876746
0.728637
0.148109
2004.07404
Neutrinoless Double Beta Decay from Lattice QCD: The Long-Distance $\pi^{-} \rightarrow \pi^{+} e^{-} e^{-}$ Amplitude
Neutrinoless double beta decay (\( 0 \nu \beta \beta \)) is a hypothetical nuclear decay mode with important implications. In particular, observation of this decay would demonstrate that the neutrino is a Majorana particle and that lepton number conservation is violated in nature. Relating experimental constraints on \(0 \nu \beta \beta\) decay rates to the neutrino masses requires theoretical input in the form of non-perturbative nuclear matrix elements which remain difficult to calculate reliably. This work marks a first step toward providing a general lattice QCD framework for computing long-distance \(0 \nu \beta \beta\) matrix elements in the case where the decay is mediated by a light Majorana neutrino. The relevant formalism is developed and then tested by computing the simplest such matrix element describing an unphysical \( \pi^{-} \rightarrow \pi^{+} e^{-} e^{-} \) transition on a series of domain wall fermion ensembles. The resulting lattice data is then fit to next-to-leading-order chiral perturbation theory, allowing a fully-controlled extraction of the low energy constant governing the transition rate, \(g_{\nu}^{\pi \pi}(\mu = 770 \,\, \mathrm{MeV}) = -10.78(12)_{\rm stat}(51)_{\rm sys}\). Finally, future prospects for calculations of more complicated processes, such as the phenomenologically important \(n^{0} n^{0} \rightarrow p^{+} p^{+} e^{-} e^{-}\) decay, are discussed.
By employing a framework for the quasi-two-body decays in the perturbative QCD (PQCD) factorization approach, we calculate the branching ratios of the decays $B_{(s)} \to D (\rho(1450),\rho(1700))\to D \pi \pi$ with $D=(D_{(s)}, \bar{D}_{(s)})$. The pion vector form factor $F_\pi$, acquired from a {\it BABAR} Collaboration analysis of $e^+ e^- \to \pi^+ \pi^-(\gamma)$ data, is involved in the two-pion distribution amplitudes $\Phi^{I=1}_{\pi\pi}$. The PQCD predictions for the branching ratios of the considered quasi-two-body decays are in the range of $10^{-10} \sim 10^{-4}$. The PQCD predictions for ${\cal B}(B^0\to \bar{D}^0 (\rho^0(1450),\rho^0(1700)) \to \bar{D}^0 \pi^+\pi^-)$ agree well with the measured values as reported by LHCb if one takes still large theoretical errors into account. Unlike the traditional way of the PQCD approach, one can extract the decay rates for the two-body decays $B_{(s)} \to D (\rho(1450),\rho(1700))$ from the results of the corresponding quasi-two-body decays. The PQCD predictions for ${\cal B}(B_{(s)} \to D \rho(1450))$ and ${\cal B}(B_{(s)} \to D \rho(770))$ are similar in magnitude: an interesting relation to be tested by future experimental measurements.
0.896378
0.810794
0.085584
2004.07405
Homology spheres bounding acyclic smooth manifolds and symplectic fillings
In this paper, we collect various structural results to determine when an integral homology $3$--sphere bounds an acyclic smooth $4$--manifold, and when this can be upgraded to a Stein embedding. In a different direction we study whether smooth embedding of connected sums of lens spaces in $\mathbb{C}^2$ can be upgraded to a Stein embedding, and determined that this never happens.
We show that there are contact 3-manifolds of support genus one which admit infinitely many Stein fillings, but do not admit arbitrarily large ones. These Stein fillings arise from genus-1 allowable Lefschetz fibrations with distinct homology groups, all filling a fixed minimal genus open book supporting the boundary contact 3-manifold. In contrast, we observe that there are only finitely many possibilities for the homology groups of Stein fillings of a given contact 3-manifold with support genus zero. We also show that there are 4-strand braids which admit infinitely many distinct Hurwitz classes of quasipositive factorizations, yielding in particular an infinite family of knotted complex analytic annuli in the 4-ball bounding the same transverse link up to transverse isotopy. These realize the smallest possible examples in terms of the number of boundary components a genus-1 mapping class and the number of strands a braid can have with infinitely many positive/quasipositive factorizations.
0.858975
0.801747
0.057228