id
stringlengths 5
16
| query
stringlengths 1
382
| pos
stringlengths 7
5.09k
| neg
stringlengths 23
5.09k
| qp
float64 0.4
1
| qn
float64 0.34
0.91
| margin
float64 0.02
0.3
|
---|---|---|---|---|---|---|
2004.07628
|
On the local \'etale fundamental group of KLT threefold singularities
|
Let $S$ be KLT threefold singularity over an algebraically closed field of
positive characteristic $p>5$. We prove that its local \'etale fundamental
group is tame. If $S$ is further rational, we show that it is finite and that
every finite unipotent torsor over a big open of $S$ is the restriction of
finite unipotent torsor over $S$.
|
We extend our previous theory of etale parallel transport to a larger class
of slope zero vector bundles on p-adic curves. The new class is stable under
pullback by ramified coverings. We also construct p-adic representations of a
central extension of the fundamental group for certain bundles of non-zero
slope.
| 0.892958 | 0.777992 | 0.114966 |
2004.07630
|
Four Pages Are Indeed Necessary for Planar Graphs
|
An embedding of a graph in a book consists of a linear order of its vertices
along the spine of the book and of an assignment of its edges to the pages of
the book, so that no two edges on the same page cross. The book thickness of a
graph is the minimum number of pages over all its book embeddings. Accordingly,
the book thickness of a class of graphs is the maximum book thickness over all
its members. In this paper, we address a long-standing open problem regarding
the exact book thickness of the class of planar graphs, which previously was
known to be either three or four. We settle this problem by demonstrating
planar graphs that require four pages in any of their book embeddings, thus
establishing that the book thickness of the class of planar graphs is four.
|
We reconsider density matrices of graphs as defined in [quant-ph/0406165].
The density matrix of a graph is the combinatorial laplacian of the graph
normalized to have unit trace. We describe a simple combinatorial condition
(the "degree condition") to test separability of density matrices of graphs.
The condition is directly related to the PPT-criterion. We prove that the
degree condition is necessary for separability and we conjecture that it is
also sufficient. We prove special cases of the conjecture involving nearest
point graphs and perfect matchings. We observe that the degree condition
appears to have value beyond density matrices of graphs. In fact, we point out
that circulant density matrices and other matrices constructed from groups
always satisfy the condition and indeed are separable with respect to any
split. The paper isolates a number of problems and delineates further
generalizations.
| 0.850957 | 0.712828 | 0.138129 |
2004.07631
|
Emergence of molecular friction in liquids: bridging between the
atomistic and hydrodynamic pictures
|
Friction in liquids arises from conservative forces between molecules and
atoms. Although the hydrodynamics at the nanoscale is subject of intense
research and despite the enormous interest in the non-Markovian dynamics of
single molecules and solutes, the onset of friction from the atomistic scale so
far could not be demonstrated. Here, we fill this gap based on
frequency-resolved friction data from high-precision simulations of three
prototypical liquids, including water. Combining with rigorous theoretical
arguments, we show that friction in liquids emerges abruptly at a
characteristic frequency, beyond which viscous liquids appear as
non-dissipative, elastic solids; as a consequence, its origin is non-local in
time. Concomitantly, the molecules experience Brownian forces that display
persistent correlations and long-lasting memory. A critical test of the
generalised Stokes-Einstein relation, mapping the friction of single molecules
to the viscoelastic response of the macroscopic sample, disproves the relation
for Newtonian fluids, but substantiates it exemplarily for water and a
moderately supercooled liquid. The employed approach is suitable to yield novel
insights into vitrification mechanisms and the intriguing mechanical properties
of soft materials.
|
We describe an overall picture of galactic-scale star formation. Recent
high-resolution magneto-hydrodynamical simulations of two-fluid dynamics with
cooling/heating and thermal conduction have shown that the formation of
molecular clouds requires multiple episodes of supersonic compression. This
finding enables us to create a scenario in which molecular clouds form in
interacting shells or bubbles on a galactic scale. First we estimate the
ensemble-averaged growth rate of molecular clouds over a timescale larger than
a million years. Next we perform radiation hydrodynamics simulations to
evaluate the destruction rate of magnetized molecular clouds by the stellar FUV
radiation. We also investigate the resultant star formation efficiency within a
cloud which amounts to a low value (a few percent) if we adopt the power-law
exponent -2.5 for the mass distribution of stars in the cloud. We finally
describe the time evolution of the mass function of molecular clouds over a
long timescale (>1Myr) and discuss the steady state exponent of the power-law
slope in various environments.
| 0.922246 | 0.664821 | 0.257425 |
2004.07632
|
Accurate electronic band gaps of two-dimensional materials from the
local modified Becke-Johnson potential
|
The electronic band structures of two-dimensional materials are significantly
different from those of their bulk counterparts, due to quantum confinement and
strong modifications of electronic screening. An accurate determination of
electronic states is a prerequisite to design electronic or optoelectronic
applications of two-dimensional materials, however, most of the theoretical
methods we have available to compute band gaps are either inaccurate,
computationally expensive, or only applicable to bulk systems. Here we show
that reliable band structures of nanostructured systems can now be efficiently
calculated using density-functional theory with the local modified
Becke-Johnson exchange-correlation functional that we recently proposed. After
re-optimizing the parameters of this functional specifically for
two-dimensional materials, we show, for a test set of almost 300 systems, that
the obtained band gaps are of comparable quality as those obtained using the
best hybrid functionals, but at a very reduced computational cost. These
results open the way for accurate high-throughput studies of band-structures of
two-dimensional materials and for the study of van der Waals heterostructures
with large unit cells.
|
We consider a spatially periodic (cosine) potential as a model for a
crystalline solid that interacts with a harmonically oscillating external
electric field. This problem is periodic both in space and time and can be
solved analytically using the Kramers-Henneberger co-moving frame. By analyzing
the stability of the closely related Mathieu-type differential equation, the
electronic band structure can be obtained. We demonstrate that by changing the
field intensity, the width of the zero-field band gaps can be drastically
modified, including the special case when the external field causes the band
gaps to disappear
| 0.88657 | 0.812405 | 0.074165 |
2004.07633
|
A Methodology for Creating Question Answering Corpora Using Inverse Data
Annotation
|
In this paper, we introduce a novel methodology to efficiently construct a
corpus for question answering over structured data. For this, we introduce an
intermediate representation that is based on the logical query plan in a
database called Operation Trees (OT). This representation allows us to invert
the annotation process without losing flexibility in the types of queries that
we generate. Furthermore, it allows for fine-grained alignment of query tokens
to OT operations. In our method, we randomly generate OTs from a context-free
grammar. Afterwards, annotators have to write the appropriate natural language
question that is represented by the OT. Finally, the annotators assign the
tokens to the OT operations. We apply the method to create a new corpus OTTA
(Operation Trees and Token Assignment), a large semantic parsing corpus for
evaluating natural language interfaces to databases. We compare OTTA to Spider
and LC-QuaD 2.0 and show that our methodology more than triples the annotation
speed while maintaining the complexity of the queries. Finally, we train a
state-of-the-art semantic parsing model on our data and show that our corpus is
a challenging dataset and that the token alignment can be leveraged to increase
the performance significantly.
|
This paper is focused on studying the view-manifold structure in the feature
spaces implied by the different layers of Convolutional Neural Networks (CNN).
There are several questions that this paper aims to answer: Does the learned
CNN representation achieve viewpoint invariance? How does it achieve viewpoint
invariance? Is it achieved by collapsing the view manifolds, or separating them
while preserving them? At which layer is view invariance achieved? How can the
structure of the view manifold at each layer of a deep convolutional neural
network be quantified experimentally? How does fine-tuning of a pre-trained CNN
on a multi-view dataset affect the representation at each layer of the network?
In order to answer these questions we propose a methodology to quantify the
deformation and degeneracy of view manifolds in CNN layers. We apply this
methodology and report interesting results in this paper that answer the
aforementioned questions.
| 0.852959 | 0.584043 | 0.268916 |
2004.07634
|
Exact projector Hamiltonian, local integrals of motion, and many-body
localization with topological order
|
In this work, we construct an exact projector Hamiltonian with interactions,
which is given by a sum of mutually commuting operators called stabilizers. The
model is based on the recently studied Creutz-ladder of fermions, in which
flat-band structure and strong localization are realized. These stabilizers are
local intergals of motion from which many-body localization (MBL) is realized.
All energy eigenstates are explicitly obtained even in the presence of local
disorders. All states are MBL states, that is, this system is a full many-body
localized (FMBL) system. We show that this system has a topological order and
stable gapless edge modes exist under the open boundary condition. By the
numerical study, we investigate stability of the FMBL and topological order.
|
In this chapter we discuss methods to calculate the entanglement of a system
using density-functional theory. We firstly introduce density-functional theory
and the local-density approximation (LDA). We then discuss the concept of the
`interacting LDA system'. This is characterised by an interacting many-body
Hamiltonian which reproduces, uniquely and exactly, the ground state density
obtained from the single-particle Kohn-Sham equations of density-functional
theory when the local-density approximation is used. We motivate why this idea
can be useful for appraising the local-density approximation in many-body
physics particularly with regards to entanglement and related quantum
information applications. Using an iterative scheme, we find the Hamiltonian
characterising the interacting LDA system in relation to the test systems of
Hooke's atom and helium-like atoms. The interacting LDA system ground state
wavefunction is then used to calculate the spatial entanglement and the results
are compared and contrasted with the exact entanglement for the two test
systems. For Hooke's atom we also compare the entanglement to our previous
estimates of an LDA entanglement. These were obtained using a combination of
evolutionary algorithm and gradient descent, and using an LDA-based
perturbative approach. We finally discuss if the position-space information
entropy of the density---which can be obtained directly from the system density
and hence easily from density-functional theory methods---can be considered as
a proxy measure for the spatial entanglement for the test systems.
| 0.851621 | 0.703756 | 0.147865 |
2004.07635
|
Local Search Trajectories over S-box Space
|
The study of S-box properties relations is an interesting problem. In this
work we develop and apply a local search method to create trajectories over
S-box space. These trajectories shows the existence of an strong linear
correlation between confusion coefficient variance, Transparency Order,
Modified Transparency Order and Revised Transparency Order, under the Hamming
Weight model. When the values of Confusion Coefficient Variance increases then
the values of Transparency Order, the values of Modified Transparency Order
beta zero, and the values of Revised Transparency Order beta zero, decreases,
reflecting the same theoretical resistance against to Side-Channel Attacks by
power consumption. As far as we know, it is the first time that Local Search
trajectories are used to discover relations between cryptography properties.
|
Trajectory-based approaches to quantum mechanics include the de Broglie-Bohm
interpretation and Nelson's stochastic interpretation. It is shown that the
usual route to establishing the validity of such interpretations, via a
decomposition of the Schroedinger equation into a continuity equation and a
modified Hamilton-Jacobi equation, fails for some quantum states. A very simple
example is provided by a quantum particle in a box, described by a wavefunction
initially uniform over the interior of the box. For this example there is no
corresponding continuity or modified Hamilton-Jacobi equation, and the
spacetime dependence of the wavefunction has a known fractal structure.
Examples with finite average energies are also constructed.
| 0.788944 | 0.65675 | 0.132194 |
2004.07636
|
Hcore-Init: Neural Network Initialization based on Graph Degeneracy
|
Neural networks are the pinnacle of Artificial Intelligence, as in recent
years we witnessed many novel architectures, learning and optimization
techniques for deep learning. Capitalizing on the fact that neural networks
inherently constitute multipartite graphs among neuron layers, we aim to
analyze directly their structure to extract meaningful information that can
improve the learning process. To our knowledge graph mining techniques for
enhancing learning in neural networks have not been thoroughly investigated. In
this paper we propose an adapted version of the k-core structure for the
complete weighted multipartite graph extracted from a deep learning
architecture. As a multipartite graph is a combination of bipartite graphs,
that are in turn the incidence graphs of hypergraphs, we design k-hypercore
decomposition, the hypergraph analogue of k-core degeneracy. We applied
k-hypercore to several neural network architectures, more specifically to
convolutional neural networks and multilayer perceptrons for image recognition
tasks after a very short pretraining. Then we used the information provided by
the hypercore numbers of the neurons to re-initialize the weights of the neural
network, thus biasing the gradient optimization scheme. Extensive experiments
proved that k-hypercore outperforms the state-of-the-art initialization
methods.
|
Weight initialization is important for faster convergence and stability of
deep neural networks training. In this paper, a robust initialization method is
developed to address the training instability in long short-term memory (LSTM)
networks. It is based on a normalized random initialization of the network
weights that aims at preserving the variance of the network input and output in
the same range. The method is applied to standard LSTMs for univariate time
series regression and to LSTMs robust to missing values for multivariate
disease progression modeling. The results show that in all cases, the proposed
initialization method outperforms the state-of-the-art initialization
techniques in terms of training convergence and generalization performance of
the obtained solution.
| 0.812958 | 0.782248 | 0.03071 |
2004.07637
|
Renormalized Lindblad Driving: A Numerically-Exact Nonequilibrium
Quantum Impurity Solver
|
The accurate characterization of nonequilibrium strongly-correlated quantum
systems has been a longstanding challenge in many-body physics. Notable among
them are quantum impurity models, which appear in various nanoelectronic and
quantum computing applications. Despite their seeming simplicity, they feature
correlated phenomena, including emergent energy scales and non-Fermi-liquid
physics, requiring renormalization group treatment. This has typically been at
odds with the description of their nonequilibrium steady-state under finite
bias, which exposes their nature as open quantum systems. We present a novel
numerically-exact method for obtaining the nonequilibrium state of a general
quantum impurity coupled to metallic leads at arbitrary voltage or temperature
bias, which we call "RL-NESS" (Renormalized Lindblad-driven NonEquilibrium
Steady-State). It is based on coherently coupling the impurity to discretized
leads which are treated exactly. These leads are furthermore weakly coupled to
reservoirs described by Lindblad dynamics which impose voltage or temperature
bias. Going beyond previous attempts, we exploit a hybrid discretization scheme
for the leads together with Wilson's numerical renormalization group, in order
to probe exponentially small energy scales. The steady-state is then found by
evolving a matrix-product density operator via real-time Lindblad dynamics,
employing a dissipative generalization of the time-dependent density matrix
renormalization group. In the long-time limit, this procedure converges to the
steady-state at finite bond dimension due to the introduced dissipation, which
bounds the growth of entanglement. We test the method against the exact
solution of the noninteracting resonant level model. We demonstrate its power
using an interacting two-level model, for which it correctly reproduces the
known limits, and gives the full $I$-$V$ curve between them.
|
We illustrate how to calculate the finite-temperature linear-response
conductance of quantum impurity models from the Matsubara Green function. A
continued fraction expansion of the Fermi distribution is employed which was
recently introduced by Ozaki [Phys. Rev. B 75, 035123 (2007)] and converges
much faster than the usual Matsubara representation. We give a simplified
derivation of Ozaki's idea using concepts from many-body condensed matter
theory and present results for the rate of convergence. In case that the Green
function of some model of interest is only known numerically, interpolating
between Matsubara frequencies is much more stable than carrying out an analytic
continuation to the real axis. We demonstrate this explicitly by considering an
infinite tight-binding chain with a single site impurity as an exactly-solvable
test system, showing that it is advantageous to calculate transport properties
directly on the imaginary axis. The formalism is applied to the single impurity
Anderson model, and the linear conductance at finite temperatures is calculated
reliably at small to intermediate Coulomb interactions by virtue of the
Matsubara functional renormalization group. Thus, this quantum many-body method
combined with the continued fraction expansion of the Fermi function
constitutes a promising tool to address more complex quantum dot geometries at
finite temperatures.
| 0.894941 | 0.813239 | 0.081703 |
2004.07638
|
Uncertainty quantification for the BGK model of the Boltzmann equation
using multilevel variance reduced Monte Carlo methods
|
We propose a control variate multilevel Monte Carlo method for the kinetic
BGK model of the Boltzmann equation subject to random inputs. The method
combines a multilevel Monte Carlo technique with the computation of the optimal
control variate multipliers derived from local or global variance minimization
problems. Consistency and convergence analysis for the method equipped with a
second-order positivity-preserving and asymptotic-preserving scheme in space
and time is also performed. Various numerical examples confirm that the
optimized multilevel Monte Carlo method outperforms the classical multilevel
Monte Carlo method especially for problems with discontinuities.
|
We propose a multi-level method to increase the accuracy of machine learning
algorithms for approximating observables in scientific computing, particularly
those that arise in systems modeled by differential equations. The algorithm
relies on judiciously combining a large number of computationally cheap
training data on coarse resolutions with a few expensive training samples on
fine grid resolutions. Theoretical arguments for lowering the generalization
error, based on reducing the variance of the underlying maps, are provided and
numerical evidence, indicating significant gains over underlying single-level
machine learning algorithms, are presented. Moreover, we also apply the
multi-level algorithm in the context of forward uncertainty quantification and
observe a considerable speed-up over competing algorithms.
| 0.902105 | 0.823883 | 0.078223 |
2004.07639
|
Where can I drive? Deep Ego-Corridor Estimation for Robust Automated
Driving
|
Lane detection is an essential part of the perception module of any automated
driving (AD) or advanced driver assistance system (ADAS). So far, model-driven
approaches for the detection of lane markings proved sufficient. More recently,
however data-driven approaches have been proposed that show superior results.
These deep learning approaches typically propose a classification of the
free-space using for example semantic segmentation. While these examples focus
and optimize on unmarked inner-city roads, we believe that mapless driving in
complex highway scenarios is still not handled with sufficient robustness and
availability. Especially in challenging weather situations such as heavy rain,
fog at night or reflections in puddles, the reliable detection of lane markings
will decrease significantly or completely fail with low-cost video-only AD
systems. Therefore, we propose to specifically classify a drivable corridor in
the ego-lane on a pixel level with a deep learning approach. Our approach is
intentionally kept simple with only 660k parameters. Thus, we were able to
easily integrate our algorithm into an online AD system of a test vehicle. We
demonstrate the performance of our approach under challenging conditions
qualitatively and quantitatively in comparison to a state-of-the-art
model-driven approach. We see the current approach as a fallback method
whenever a model-driven approach cannot cope with a specific scenario. Due to
this, a fallback method does not have to fulfill the same requirements on
comfort in lateral control as the primary algorithm: Its task is to catch the
temporal shortcomings of the main perception task.
|
Safety, efficiency, privacy, and cybersecurity can be achieved jointly in
self-organizing networks of communicating vehicles of various automated driving
levels. The underlying approach, solutions and novel results are briefly
exposed. We explain why we are faced with a crucial choice regarding motorized
society and cyber surveillance.
| 0.813477 | 0.694854 | 0.118623 |
2004.07640
|
Smoluchowski equations for linker-mediated irreversible aggregation
|
In order to study linker-mediated aggregation of colloidal particles with
limited valence, we combine kinetic Monte Carlo simulations and an approximate
theory based on the Smoluchowski equations. We found that aggregation depends
strongly on two parameters, the ratio of the number of linkers and particles
and the ratio of their diffusion coefficients. These control parameters are
absent in single-species aggregation and provide a much greater variety and
control of the resulting structures. We show that aggregation is non-trivial
when two time scales of aggregation are present. Our aggregation dynamics
theory is in qualitative and quantitative agreement with kinetic Monte Carlo
simulations. Our results show how the optimal aggregation may be tuned through
the ratio of the linkers and particles and that of the diffusion coefficients.
|
A characterisation of the stochastic bounded generators of quantum
irreversible Master equations is given. This suggests the general form of
quantum stochastic evolution with respect to the Poisson (jumps), Wiener
(diffusion) or general Quantum Noise. The corresponding irreversible Heisenberg
evolution in terms of stochastic completely positive (CP) maps is found and the
general form of the stochastic completely dissipative (CD) operator equation is
discovered.
| 0.859686 | 0.692446 | 0.16724 |
2004.07641
|
A Spatiotemporal Epidemic Model to Quantify the Effects of Contact
Tracing, Testing, and Containment
|
We introduce a novel modeling framework for studying epidemics that is
specifically designed to make use of fine-grained spatiotemporal data.
Motivated by the current COVID-19 outbreak and the availability of data from
contact or location tracing technologies, our model uses marked temporal point
processes to represent individual mobility patterns and the course of the
disease for each individual in a population. We design an efficient sampling
algorithm for our model that can be used to predict the spread of infectious
diseases such as COVID-19 under different testing and tracing strategies,
social distancing measures, and business restrictions, given location or
contact histories of individuals. Building on this algorithm, we use Bayesian
optimization to estimate the risk of exposure of each individual at the sites
they visit, the percentage of symptomatic individuals, and the difference in
transmission rate between asymptomatic and symptomatic individuals from
historical longitudinal testing data. Experiments using measured COVID-19 data
and mobility patterns from T\"{u}bingen, a town in the southwest of Germany,
demonstrate that our model can be used to quantify the effects of tracing,
testing, and containment strategies at an unprecedented spatiotemporal
resolution. To facilitate research and informed policy-making, particularly in
the context of the current COVID-19 outbreak, we are releasing an open-source
implementation of our framework at https://github.com/covid19-model.
|
The basic reproductive number -- $R_0$ -- is one of the most common and most
commonly misapplied numbers in public health. Although often used to compare
outbreaks and forecast pandemic risk, this single number belies the complexity
that two different pathogens can exhibit, even when they have the same $R_0$.
Here, we show how to predict outbreak size using estimates of the distribution
of secondary infections, leveraging both its average $R_0$ and the underlying
heterogeneity. To do so, we reformulate and extend a classic result from random
network theory that relies on contact tracing data to simultaneously determine
the first moment ($R_0$) and the higher moments (representing the
heterogeneity) in the distribution of secondary infections. Further, we show
the different ways in which this framework can be implemented in the
data-scarce reality of emerging pathogens. Lastly, we demonstrate that without
data on the heterogeneity in secondary infections for emerging infectious
diseases like COVID-19, the uncertainty in outbreak size ranges dramatically.
Taken together, our work highlights the critical need for contact tracing
during emerging infectious disease outbreaks and the need to look beyond $R_0$
when predicting epidemic size.
| 0.846855 | 0.757242 | 0.089613 |
2004.07642
|
Towards Instance-Level Parser Selection for Cross-Lingual Transfer of
Dependency Parsers
|
Current methods of cross-lingual parser transfer focus on predicting the best
parser for a low-resource target language globally, that is, "at treebank
level". In this work, we propose and argue for a novel cross-lingual transfer
paradigm: instance-level parser selection (ILPS), and present a
proof-of-concept study focused on instance-level selection in the framework of
delexicalized parser transfer. We start from an empirical observation that
different source parsers are the best choice for different Universal POS
sequences in the target language. We then propose to predict the best parser at
the instance level. To this end, we train a supervised regression model, based
on the Transformer architecture, to predict parser accuracies for individual
POS-sequences. We compare ILPS against two strong single-best parser selection
baselines (SBPS): (1) a model that compares POS n-gram distributions between
the source and target languages (KL) and (2) a model that selects the source
based on the similarity between manually created language vectors encoding
syntactic properties of languages (L2V). The results from our extensive
evaluation, coupling 42 source parsers and 20 diverse low-resource test
languages, show that ILPS outperforms KL and L2V on 13/20 and 14/20 test
languages, respectively. Further, we show that by predicting the best parser
"at the treebank level" (SBPS), using the aggregation of predictions from our
instance-level model, we outperform the same baselines on 17/20 and 16/20 test
languages.
|
Input validation is the first line of defense against malformed or malicious
inputs. It is therefore critical that the validator (which is often part of the
parser) is free of bugs.
To build dependable input validators, we propose using parser generators for
context-free languages. In the context of network protocols, various works have
pointed at context-free languages as falling short to specify precisely or
concisely common idioms found in protocols. We review those assessments and
perform a rigorous, language-theoretic analysis of several common protocol
idioms. We then demonstrate the practical value of our findings by developing a
modular, robust, and efficient input validator for HTTP relying on context-free
grammars and regular expressions.
| 0.902742 | 0.727679 | 0.175063 |
2004.07643
|
Hereditary subshifts whose measure of maximal entropy has no Gibbs
property
|
We show that the measure of maximal entropy for the hereditary closure of a
$\mathscr{B}$-free subshift has the Gibbs property if and only if the Mirsky
measure of the subshift is purely atomic. This answers an open question asked
by Peckner. Moreover, we show that $\mathscr{B}$ is taut whenever the
corresponding Mirsky measure $\nu_\eta$ has full support. This is the converse
theorem to a recent result of Keller.
|
We prove that systems satisfying the specification property are saturated in
the sense that the topological entropy of the set of generic points of any
invariant measure is equal to the measure-theoretic entropy of the measure. We
study Banach valued Birkhoff ergodic averages and obtain a variational
principle for its topological entropy spectrum. As application, we examine a
particular example concerning with the set of real numbers for which the
frequencies of occurrences in their dyadic expansions of infinitely many words
are prescribed. This relies on our explicit determination of a maximal entropy
measure.
| 0.919797 | 0.818261 | 0.101536 |
2004.07644
|
Machine-learning-based methods for output only structural modal
identification
|
In this study, we propose a machine-learning-based approach to identify the
modal parameters of the output only data for structural health monitoring (SHM)
that makes full use of the characteristic of independence of modal responses
and the principle of machine learning. By taking advantage of the independence
feature of each mode, we use the principle of unsupervised learning, making the
training process of the deep neural network becomes the process of modal
separation. A self-coding deep neural network is designed to identify the
structural modal parameters from the vibration data of structures. The mixture
signals, that is, the structural response data, are used as the input of the
neural network. Then we use a complex cost function to restrict the training
process of the neural network, making the output of the third layer the modal
responses we want, and the weights of the last two layers are mode shapes. The
deep neural network is essentially a nonlinear objective function optimization
problem. A novel loss function is proposed to constrain the independent feature
with consideration of uncorrelation and non-Gaussianity to restrict the
designed neural network to obtain the structural modal parameters. A numerical
example of a simple structure and an example of actual SHM data from a
cable-stayed bridge are presented to illustrate the modal parameter
identification ability of the proposed approach. The results show the approach
s good capability in blindly extracting modal information from system
responses.
|
Multilayer perceptron is the most common used class of feed-forward
artificial neural network. It contains many applications in diverse fields such
as speech recognition, image recognition, and machine translation software. To
cater for the fast development of quantum machine learning, in this paper, we
propose a new model to study multilayer perceptron in quantum computer. This
contains the tasks to prepare the quantum state of the output signal in each
layer and to establish the quantum version of learning algorithm about the
weights in each layer. We will show that the corresponding quantum versions can
achieve at least quadratic speedup or even exponential speedup over the
classical algorithms. This provide us an efficient method to study multilayer
perceptron and its applications in machine learning in quantum computer.
Finally, as an inspiration, an exponential fast learning algorithm (based on
Hebb's learning rule) of Hopfield network will be proposed.
| 0.851963 | 0.638551 | 0.213412 |
2004.07645
|
Mathematical model of LoRaWAN channel access
|
While 3GPP has been developing NB-IoT, the market of Low Power Wide Area
Networks has been mastered by cheap and simple Sigfox and LoRa/LoRaWAN
technologies. Being positioned as having an open standard, LoRaWAN has
attracted also much interest from the research community. Specifically, many
papers address the efficiency of its PHY layer. However MAC is still
underinvestigated. Existing studies of LoRaWAN do not take into account the
acknowledgement and retransmission policy, which may lead to incorrect results.
In this paper, we carefully take into account the peculiarities of LoRaWAN
transmission retries and show that it is the weakest issue of this technology,
which significantly increases failure probability for retries. The main
contribution of the paper is a mathematical model which accurately estimates
how packet error rate depends on the offered load. In contrast to other papers,
which evaluate LoRaWAN capacity just as the maximal throughput, our model can
be used to find the maximal load, which allows reliable packet delivery.
|
Building on recent development by Padakandla and Pradhan, and by Lim, Feng,
Pastore, Nazer, and Gastpar, this paper studies the potential of structured
nested coset coding as a complete replacement for random coding in network
information theory. The roles of two techniques used in nested coset coding to
generate nonuniform codewords, namely, shaping and channel transformation, are
clarified and illustrated via the simple example of the two-sender multiple
access channel. While individually deficient, the optimal combination of
shaping and channel transformation is shown to achieve the same performance as
traditional random codes for the general two-sender multiple access channel.
The achievability proof of the capacity region is extended to the multiple
access channels with more than two senders, and with one or more receivers. A
quantization argument consistent with the construction of nested coset codes is
presented to prove achievability for their Gaussian counterparts. These results
open up new possibilities of utilizing nested coset codes with the same
generator matrix for a broader class of applications.
| 0.816395 | 0.727383 | 0.089012 |
2004.07646
|
Gap Statistics of the Sequence $\{\alpha\sqrt{n}\}$
|
The gaps in the sequence $\{\sqrt{n}\}$ were shown by Elkies-McMullen (2004)
to have a limiting distribution which is not the exponential distribution.
However it is conjectured that the distribution of gaps in the sequence
$\{\alpha\sqrt{n}\}$ is exponential, provided $\alpha^2$ is irrational. For
almost all values of $\alpha$, we prove an important step in this direction. In
particular, we show that all the correlations are Poissonian along a
subsequence. Therefore, our result implies that the gap distribution converges
to the exponential distribution along the same subsequence.
|
In this paper we study the semiclassical limit for the pseudo-relativistic
Hartree equation $\sqrt{-\varepsilon^2 \Delta + m^2}u + V u = (I_\alpha *
|u|^{p})
|u|^{p-2}u$ in $\mathbb{R}^N$ where $m>0$, $2 \leq p < \frac{2N}{N-1}$, $V
\colon \mathbb{R}^N \to \mathbb{R}$ is an external scalar potential, $I_\alpha
(x) = \frac{c_{N,\alpha}}{|x|^{N-\alpha}}$ is a convolution kernel,
$c_{N,\alpha}$ is a positive constant and $(N-1)p-N<\alpha <N$. For $N=3$,
$\alpha=p=2$, our equation becomes the pseudo-relativistic Hartree equation
with Coulomb kernel.
| 0.883834 | 0.664787 | 0.219047 |
2004.07647
|
Unveiling the power spectra of $\delta$ Scuti stars with TESS. The
temperature, gravity, and frequency scaling relation
|
Thanks to high-precision photometric data legacy from space telescopes like
CoRoT and Kepler, the scientific community could detect and characterize the
power spectra of hundreds of thousands of stars. Using the scaling relations,
it is possible to estimate masses and radii for solar-type pulsators. However,
these stars are not the only kind of stellar objects that follow these rules:
$\delta$ Scuti stars seem to be characterized with seismic indexes such as the
large separation ($\Delta\nu$). Thanks to long-duration high-cadence TESS light
curves, we analysed more than two thousand of this kind of classical pulsators.
In that way, we propose the frequency at maximum power ($\nu_{\rm max}$) as a
proper seismic index since it is directly related with the intrinsic
temperature, mass and radius of the star. This parameter seems not to be
affected by rotation, inclination, extinction or resonances, with the exception
of the evolution of the stellar parameters. Furthermore, we can constrain
rotation and inclination using the departure of temperature produced by the
gravity-darkening effect. This is especially feasible for fast rotators as most
of $\delta$ Scuti stars seem to be.
|
We report the discovery of 31 blue, short period, pulsators made using data
taken as part of the Rapid Temporal Survey (RATS). We find they have periods
between 51-83 mins and full-amplitudes between 0.05-0.65 mag. Using the
period-luminosity relationship for short period pulsating stars we determine
their distance. Assuming they are pulsating in either the fundamental or first
over-tone radial mode the majority are located at a distance greater than 3kpc,
with several being more than 20 kpc distant. Most stars are at least 1 kpc from
the Galactic plane, with three being more than 10 kpc. One is located in the
direction of the Galactic anti-center and has Galactocentric distance of ~30
kpc and is ~20 kpc below the plane: they are therefore potential tracers of
Galactic structure. We have obtained low-resolution spectra for a small number
our targets and find they have temperatures between 7200--7900K and a metal
content less than Solar. The colours of the pulsators and the spectral fits to
those stars for which we have spectra indicate that they are either SX Phe or
delta Scuti stars. We estimate the number of SX Phe stars in our Galaxy and
find significantly fewer per unit mass than reported in massive globular
clusters or dwarf spheroidal galaxies.
| 0.855127 | 0.765673 | 0.089453 |
2004.07648
|
Entropy rate of product of independent processes
|
We provide explicit formulas for (relative) entropy rate of the
(multiplicative) product of bilateral, real, finitely-valued, stationary
independent processes $\mathbf{X}$, $\mathbf{Y}$, with $\mathbf{Y}$ ergodic,
taking values in $\{0,1\}$. We apply our results to a version of classical
Furstenberg's filtering problem where instead of the sum
$\mathbf{X}+\mathbf{Y}$ one considers the product $\mathbf{X}\cdot \mathbf{Y}.$
In particular, we give lower and upper bounds for the (relative) entropy rate,
answering open questions from a paper by Ku\l{}aga-Przymus, Lema\'{n}czyk and
Weiss (2015). A crucial role is played by processes that are not bilaterally
deterministic; we provide sufficient conditions that guarantee the absence of
this property.
|
We analyze the quantum process in which a cosmic string breaks in a de Sitter
(dS) background, and a pair of neutral or charged black holes is produced at
the ends of the string. The energy to materialize and accelerate the pair comes
from the positive cosmological constant and, in addition, from the string
tension. The compact saddle point solutions without conical singularities
(instantons) or with conical singularities (sub-maximal instantons) that
describe this process are constructed through the analytical continuation of
the dS C-metric. Then, we explicitly compute the pair creation rate of the
process. In particular, we find the nucleation rate of a cosmic string in a dS
background, and the probability that it breaks and a pair of black holes is
produced. Finally we verify that, as occurs with pair production processes in
other background fields, the pair creation rate of black holes is proportional
to exp(S), where the gravitational entropy of the black hole, S, is given by
one quarter of the area of the horizons present in the saddle point solution
that mediates the process.
| 0.87023 | 0.588637 | 0.281594 |
2004.07649
|
Notes on the interpretation of dependence measures
|
Besides the classical distinction of correlation and dependence, many
dependence measures bear further pitfalls in their application and
interpretation. The aim of this paper is to raise and recall awareness of some
of these limitations by explicitly discussing Pearson's correlation and the
multivariate dependence measures: distance correlation, distance
multicorrelations and their copula versions. The discussed aspects include
types of dependence, bias of empirical measures, influence of marginal
distributions and dimensions.
In general it is recommended to use a proper dependence measure instead of
Pearson's correlation. Moreover, a measure which is distribution-free (at least
in some sense) can help to avoid certain systematic errors. Nevertheless, in a
truly multivariate setting only the p-values of the corresponding independence
tests provide always values with indubitable interpretation.
|
Infinite determinantal measures introduced in this note are inductive limits
of determinantal measures on an exhausting family of subsets of the phase
space. Alternatively, an infinite determinantal measure can be described as a
product of a determinantal process and a convergent, but not integrable,
multiplicative functional.
Theorem 2, the main result announced in this note, gives an explicit
description for the ergodic decomposition of infinite Pickrell measures on the
spaces of infinite complex matrices in terms of infinite determinantal measures
obtained by finite-rank perturbations of Bessel point processes.
| 0.813237 | 0.676736 | 0.136501 |
2004.07650
|
Fully Dynamic $c$-Edge Connectivity in Subpolynomial Time
|
We present a deterministic fully dynamic algorithm for $c$-edge connectivity
problem with $n^{o(1)}$ worst case update and query time for any positive
integer $c = (\log n)^{o(1)}$ for a graph with $n$ vertices. Previously, only
polylogarithmic, $O(\sqrt{n})$, and $O(n^{2/3})$ worst case update time
algorithms were known for fully dynamic $1$, $2$ and $3$-edge connectivity
problems respectively.
Our techniques include a multi-level $c$-edge connectivity sparsifier, an
online-batch update algorithm for the sparsifier, and a general approach to
turn an online-batch dynamic algorithm with small amortized update time into a
fully dynamic algorithm with worst case update time.
|
We establish and generalise several bounds for various random walk quantities
including the mixing time and the maximum hitting time. Unlike previous
analyses, our derivations are based on rather intuitive notions of local
expansion properties which allows us to capture the progress the random walk
makes through $t$-step probabilities.
We apply our framework to dynamically changing graphs, where the set of
vertices is fixed while the set of edges changes in each round. For random
walks on dynamic connected graphs for which the stationary distribution does
not change over time, we show that their behaviour is in a certain sense
similar to static graphs. For example, we show that the mixing and hitting
times of any sequence of $d$-regular connected graphs is $O(n^2)$, generalising
a well-known result for static graphs. We also provide refined bounds depending
on the isoperimetric dimension of the graph, matching again known results for
static graphs. Finally, we investigate properties of random walks on dynamic
graphs that are not always connected: we relate their convergence to
stationarity to the spectral properties of an average of transition matrices
and provide some examples that demonstrate strong discrepancies between static
and dynamic graphs.
| 0.881876 | 0.768968 | 0.112908 |
2004.07651
|
Convergence of Eigenvector Continuation
|
Eigenvector continuation is a computational method that finds the extremal
eigenvalues and eigenvectors of a Hamiltonian matrix with one or more control
parameters. It does this by projection onto a subspace of eigenvectors
corresponding to selected training values of the control parameters. The method
has proven to be very efficient and accurate for interpolating and
extrapolating eigenvectors. However, almost nothing is known about how the
method converges, and its rapid convergence properties have remained
mysterious. In this letter we present the first study of the convergence of
eigenvector continuation. In order to perform the mathematical analysis, we
introduce a new variant of eigenvector continuation that we call vector
continuation. We first prove that eigenvector continuation and vector
continuation have identical convergence properties and then analyze the
convergence of vector continuation. Our analysis shows that, in general,
eigenvector continuation converges more rapidly than perturbation theory. The
faster convergence is achieved by eliminating a phenomenon that we call
differential folding, the interference between non-orthogonal vectors appearing
at different orders in perturbation theory. From our analysis we can predict
how eigenvector continuation converges both inside and outside the radius of
convergence of perturbation theory. While eigenvector continuation is a
non-perturbative method, we show that its rate of convergence can be deduced
from power series expansions of the eigenvectors. Our results also yield new
insights into the nature of divergences in perturbation theory.
|
We study the pathology that causes tropical eigenspaces of distinct
supertropical eigenvalues of a nonsingular matrix $A$, to be dependent. We show
that in lower dimensions the eigenvectors of distinct eigenvalues are
independent, as desired. The index set that differentiates between subsequent
essential monomials of the characteristic polynomial, yields an eigenvalue
$\lambda$, and corresponds to the columns of the eigenmatrix $A+\lambda I$ from
which the eigenvectors are taken. We ascertain the cause for failure in higher
dimensions, and prove that independence of the eigenvectors is recovered in
case a certain "difference criterion" holds, defined in terms of disjoint
differences between index sets of subsequent coefficients. We conclude by
considering the eigenvectors of the matrix $A^\nabla : = \det(A)^{-1}\adj(A)$
and the connection of the independence question to generalized eigenvectors.
| 0.912526 | 0.738363 | 0.174163 |
2004.07652
|
Supercongruences for Almkvist--Zudilin sequences
|
In this note, we confirm some supercongruences involving Almkvist--Zudilin
sequences, which were originally conjectured by Z.-H. Sun.
|
A sequence-to-sequence model is a neural network module for mapping two
sequences of different lengths. The sequence-to-sequence model has three core
modules: encoder, decoder, and attention. Attention is the bridge that connects
the encoder and decoder modules and improves model performance in many tasks.
In this paper, we propose two ideas to improve sequence-to-sequence model
performance by enhancing the attention module. First, we maintain the history
of the location and the expected context from several previous time-steps.
Second, we apply multiscale convolution from several previous attention vectors
to the current decoder state. We utilized our proposed framework for
sequence-to-sequence speech recognition and text-to-speech systems. The results
reveal that our proposed extension could improve performance significantly
compared to a standard attention baseline.
| 0.896514 | 0.663646 | 0.232869 |
2004.07653
|
Chaos-Based Multicarrier VLC Modulator With Compensation of LED
Nonlinearity
|
The massive deployment of light-emitting diode (LED) lightning infrastructure
has opened the opportunity to reuse it as visible light communication (VLC) to
leverage the current RF spectrum crisis in indoor scenarios. One of the main
problems in VLC is the limited dynamic range of LEDs and their nonlinear
response, which may lead to a severe degradation in the communication, and more
specifically in the bit error rate (BER). This is aggravated by the extensive
usage of multicarrier multiplexing, based on optical orthogonal frequency
division multiplexing (O-OFDM), characterized by a high peak-to-average power
ratio. Here, we present a chaos-based coded modulation (CCM) setup specifically
adapted to the LED nonlinearities. It replaces the usual modulation, while
keeping the multicarrier O-OFDM structure unchanged. First, we obtain a
semi-analytical bound for the bit error probability, taking into account the
LED nonlinear response. The bound results particularly tight for the range of
signal-to-noise ratio of interest. Then, we propose a method to design the
modulator based on optimization techniques. The objective function is the
semi-analytical bound, and the optimization is applied to a parameterization of
the CCM conjugation function. This appropriately shapes the chaotic waveform
and leads to BER improvements that outperform classical counterparts under
ideal predistortion.
|
A fundamental issue in nonlinear dynamics and statistical physics is how to
distinguish chaotic from stochastic fluctuations in short experimental
recordings. This dilemma underlies many complex systems models from stochastic
gene expression or stock exchange to quantum chaos. Traditionally,
deterministic chaos is characterized by "sensitive dependence on initial
conditions" as indicated by a positive Lyapunov exponent. However, ambiguity
arises when applying this criterion to real-world data that are corrupted by
measurement noise or perturbed nonautonomously by exogenous deterministic or
stochastic inputs. Here, we show that a positive Lyapunov exponent is
surprisingly neither necessary nor sufficient proof of deterministic chaos, and
that a nonlinear dynamical system under deterministic or stochastic forcing may
exhibit multiple forms of nonautonomous chaos assessable by a noise titration
assay. These findings lay the foundation for reliable analysis of
low-dimensional chaos for complex systems modeling and prediction of a wide
variety of physical, biological, and socioeconomic data.
| 0.882942 | 0.611852 | 0.271089 |
2004.07654
|
Numerical simulations of shear-induced consecutive coronal mass
ejections
|
Methods: Stealth CMEs represent a particular class of solar eruptions that
are clearly distinguished in coronagraph observations, but they don't have a
clear source signature. A particular type of stealth CMEs occurs in the
trailing current sheet of a previous ejection, therefore, we used the 2.5D MHD
package of the code MPI-AMRVAC to numerically simulate consecutive CMEs by
imposing shearing motions onto the inner boundary. The initial magnetic
configuration consists of a triple arcade structure embedded into a bimodal
solar wind, and the sheared polarity inversion line is found in the southern
loop system. The mesh was continuously adapted through a refinement method that
applies to current carrying structures. We then compared the obtained eruptions
with the observed directions of propagation of an initial multiple coronal mass
ejection (MCME) event that occurred in September 2009. We further analysed the
simulated ejections by tracking the centre of their flux ropes in latitude and
their total speed. Radial Poynting flux computation was employed as well to
follow the evolution of electromagnetic energy introduced into the system.
Results: Changes within 1\% in the shearing speed result in three different
scenarios for the second CME, although the preceding eruption seems
insusceptible to such small variations. Depending on the applied shearing
speed, we thus obtain a failed eruption, a stealth, or a CME driven by the
imposed shear, as the second ejection. The dynamics of all eruptions are
compared with the observed directions of propagation of an MCME event and a
good correlation is achieved. The Poynting flux analysis reveals the temporal
variation of the important steps of eruptions. For the first time, a stealth
CME is simulated in the aftermath of a first eruption, through changes in the
applied shearing speed.
|
We test the feasibility of 3D coronal-loop tracing in stereoscopic EUV image
pairs, with the ultimate goal of enabling efficient 3D reconstruction of the
coronal magnetic field that drives flares and coronal mass ejections (CMEs). We
developed an automated code designed to perform triangulation of coronal loops
in pairs (or triplets) of EUV images recorded from different perspectives. The
automated (or blind) stereoscopy code includes three major tasks: (i) automated
pattern recognition of coronal loops in EUV images, (ii) automated pairing of
corresponding loop patterns from two different aspect angles, and (iii)
stereoscopic triangulation of 3D loop coordinates. We perform tests with
simulated stereoscopic EUV images and quantify the accuracy of all three
procedures. In addition we test the performance of the blind stereoscopy code
as a function of the spacecraft-separation angle and as a function of the
spatial resolution. We also test the sensitivity to magnetic non-potentiality.
The automated code developed here can be used for analysis of existing {\sl
Solar TErrestrial RElationship Observatory (STEREO)} data, but primarily serves
for a design study of a future mission with dedicated diagnostics of
non-potential magnetic fields. For a pixel size of 0.6\arcsec (corresponding to
the {\sl Solar Dynamics Observatory (SDO) Atmospheric Imaging Assembly (AIA)}
spatial resolution of 1.4\arcsec), we find an optimum spacecraft-separation
angle of $\alpha_s \approx 5^\circ$.
| 0.827662 | 0.748863 | 0.078799 |
2004.07655
|
Vector perturbations in bouncing cosmology
|
An old question surrounding bouncing models concerns their stability under
vector perturbations. Considering perfect fluids or scalar fields, vector
perturbations evolve kinematically as $a^{-2}$, where $a$ is the scale factor.
Consequently, a definite answer concerning the bounce stability depends on an
arbitrary constant, therefore, there is no definitive answer. In this paper, we
consider a more general situation where the primeval material medium is a
non-ideal fluid, and its shear viscosity is capable of producing torque
oscillations, which can create and dynamically sustain vector perturbations
along cosmic evolution. In this framework, one can set that vector
perturbations have a quantum mechanical origin, coming from quantum vacuum
fluctuations in the far past of the bouncing model, as it is done with scalar
and tensor perturbations. Under this prescription, one can calculate their
evolution during the whole history of the bouncing model, and precisely infer
the conditions under which they remain linear before the expanding phase. It is
shown that such linearity conditions impose constraints on the free parameters
of bouncing models, which are mild, although not trivial, allowing a large
class of possibilities. Such conditions impose that vector perturbations are
also not observationally relevant in the expanding phase. The conclusion is
that bouncing models are generally stable under vector perturbations. As they
are also stable under scalar and tensor perturbations, we conclude that
bouncing models are generally stable under perturbations originated from
quantum vacuum perturbations in the far past of their contracting phase.
|
We present a nonsingular scenario in which an inflation era goes after a
bounce from a contracting scenario in the early universe. The contracting of
the universe is supposed to be slow, such that the initial anisotropies will
not grow too fast to become dominant and destroy the bounce. After the bounce,
the universe enters into an inflationary region and reheating phase, where
primordial perturbations are generated. The tensor-to-scalar ratio of the
perturbations are expected to be consistent with the newly released data,
$r=0.2^{+0.07}_{-0.05}$. The addition of the bounce process is aimed at getting
rid of the annoying Big-Bang Singularity, which generally exist in pure
inflation models.
| 0.853371 | 0.808073 | 0.045299 |
2004.07656
|
Adding virtual measurements by PWM-induced signal injection
|
We show that for PWM-operated devices, it is possible to benefit from signal
injection \emph{without an external probing signal}, by suitably using the
excitation provided by the PWM itself. As in the usual signal injection
framework conceptualized in [1], an extra "virtual measurement" can be made
available for use in a control law, but without the practical drawbacks caused
by an external signal.
|
We propose and fabricate a dual-emitter light-induced neuromorphic device
composed of two light-induced devices with a common collector and base. Two
InGaN multiple quantum well diodes (MQW-diodes) are used as the emitters to
generate light, and one InGaN MQW-diode is used as the common collector to
absorb the emitted light. When the presynaptic voltages are synchronously
applied to the two emitters, the collector demonstrates an adding together of
the excitatory post synaptic voltage (EPSV). The width and period of the two
input signals constitute the code to generate spatial summation and recognition
effects at the same time. Experimental results confirm that temporal summation
caused by the repetitive-pulse facilitation could significantly strengthen the
spatial summation effect due to the adding together behavior when the
repetitive stimulations are applied to the two emitters in rapid succession.
Particularly, the resonant summation effect occurs at the co-summation region
when the two repetitive-pulse signals have a resonant period, which offers a
more sophisticated spatiotemporal EPSV summation function for the dual-emitter
neuromorphic device.
| 0.884486 | 0.653613 | 0.230873 |
2004.07658
|
Exchange interaction of hole-spin qubits in double quantum dots in
highly anisotropic semiconductors
|
We study the exchange interaction between two hole-spin qubits in a double
quantum dot setup in a silicon nanowire in the presence of magnetic and
electric fields. Based on symmetry arguments we show that there exists an
effective spin that is conserved even in highly anisotropic semiconductors,
provided that the system has a twofold symmetry with respect to the direction
of the applied magnetic field. This finding facilitates the definition of qubit
basis states and simplifies the form of exchange interaction for two-qubit
gates in coupled quantum dots. If the magnetic field is applied along a generic
direction, cubic anisotropy terms act as an effective spin-orbit interaction
introducing novel exchange couplings even for an inversion symmetric setup.
Considering the example of a silicon nanowire double dot, we present the
relative strength of these anisotropic exchange interaction terms and calculate
the fidelity of the $\sqrt{\text{SWAP}}$ gate. Furthermore, we show that the
anisotropy-induced spin-orbit effects can be comparable to that of the direct
Rashba spin-orbit interaction for experimentally feasible electric field
strengths.
|
A photo-excited II-VI semiconductor nanocrystal doped with a few Mn spins is
considered. The effects of spin-exciton interactions and the resulting
multi-spin correlations on the photoluminescence are calculated by numerical
diagonalization of the Hamiltonian, including exchange interaction between
electrons, holes and Mn spins, as well as spin-orbit interaction. The results
provide a unified description of recent experiments of photoluminesnce of dots
with one and many Mn atoms as well as optically induced ferromagnetism in
semimagnetic nanocrystals.
| 0.924558 | 0.79563 | 0.128928 |
2004.07659
|
Algorithmic Foundations for the Diffraction Limit
|
For more than a century and a half it has been widely-believed (but was never
rigorously shown) that the physics of diffraction imposes certain fundamental
limits on the resolution of an optical system. However our understanding of
what exactly can and cannot be resolved has never risen above heuristic
arguments which, even worse, appear contradictory. In this work we remedy this
gap by studying the diffraction limit as a statistical inverse problem and,
based on connections to provable algorithms for learning mixture models, we
rigorously prove upper and lower bounds on how many photons we need (and how
precisely we need to record their locations) to resolve closely-spaced point
sources.
We give the first provable algorithms that work regardless of the separation,
but only for a constant number of point sources. Surprisingly, we show that
when the number of point sources becomes large, there is a phase transition
where the sample complexity goes from polynomial to exponential, and we pin
down its location to within a universal constant that is independent of the
number of point sources. Thus it is rigorously possible both to break the
diffraction limit and yet to prove strong impossibility results depending on
the setup. This is the first non-asymptotic statistical foundation for
resolution in a model arising from first principles in physics, and helps
clarify many omnipresent debates in the optics literature.
|
Following the Good-and-Walker picture, hard diffraction in the
high-energy/small-x limit of QCD can be described in terms of eigenstates of
the scattering matrix off a Color Glass Condensate. From the CGC non-linear
evolution equations, it is then possible to derive the behavior of diffractive
cross-sections at small $x.$ I discuss recent results, in particular the
consequences of the inclusion of Pomeron loops in the evolution.
| 0.860129 | 0.719122 | 0.141006 |
2004.07661
|
Lifshitz-scaling to a CPT-even lorentz-violating electrodynamics and
time delay from gamma-ray burst
|
In this work, we have used a Ho\v{r}ava-Lifshitz scaling to rewrite a
high-order derivative Lorentz-violating CPT-even electrodynamics, considering
the possibility that the Lorentz invariance violation, in which it is
originally suppressed by the quantum gravity energy scale $M_{\rm QG}$, it
occurs in a scenario with some anisotropy between space and time above a
certain intermediate energy scale $\Lambda_{\rm HL} << M_{\rm QG}$. To test
this model, we have used observational results of a cosmological time delay
between high and low energy photons from GRB090510 event. To specific values of
the Lifshitz critical exponent, we have found interesting lower bounds on the
values of $M_{\rm QG}$.
|
The gravitational Standard-Model Extension (SME) is the general field-theory
based framework for the analysis of CPT and Lorentz violation. In this work we
summarize the implications of Lorentz and CPT violation for antimatter gravity
in the context of the SME. Implications of various attempts to place indirect
limits on anomalous antimatter gravity are considered in the context of
SME-based models.
| 0.897667 | 0.719046 | 0.178621 |
2004.07662
|
Quantifying Low-Battery Anxiety of Mobile Users and Its Impacts on Video
Watching Behavior
|
People nowadays are increasingly dependent on mobile phones for daily
communication, study, and business. Along with this it incurs the low-battery
anxiety (LBA). Although having been unveiled for a while, LBA has not been
thoroughly investigated yet. Without a better understanding of LBA, it would be
difficult to precisely validate energy saving and management techniques in
terms of alleviating LBA and enhancing Quality of Experience (QoE) of mobile
users. To fill the gap, we conduct an investigation over 2000+ mobile users,
look into their feelings and reactions towards LBA, and quantify their anxiety
degree during the draining of battery power. As a case study, we also
investigate the impact of LBA on user's behavior at video watching, and with
the massive collected answers we are able to quantify user's abandoning
likelihood of attractive videos versus the battery status of mobile phone. The
empirical findings and quantitative models obtained in this work not only
disclose the characteristics of LBA among modern mobile users, but also provide
valuable references for the design, evaluation, and improvement of QoE-aware
mobile applications and services.
|
Virtual reality has been gaining popularity in recent years caused by the
proliferation of affordable consumer-grade devices such as Oculus Rift, HTC
Vive, and Samsung VR. Amongst the various VR applications, 360{\deg} video
streaming is currently one of the most popular ones. It allows user to change
their field-of-view (FoV) based on head movement, which enables them to freely
select an area anywhere from the sphere the video is (virtually) projected to.
While 360{\deg} video streaming offers new exciting ways of consuming content
for viewers, it poses a series of challenges to the systems that are
responsible for the distribution of such content from the origin to the viewer.
One challenge is the significantly increased bandwidth requirement for
streaming such content in real time. Recent research has shown that only
streaming the content that is in the user's FoV in high quality can lead to
strong bandwidth savings. This can be achieved by analyzing the viewers head
orientation and movement based on sensor information. Alternatively, historic
information from users that watched the content in the past can be taken into
account to prefetch 360{\deg} video data in high quality assuming the viewer
will direct the FoV to these areas. In this paper, we present a 360{\deg} video
streaming system that transitions between sensor- and content-based predictive
mechanisms. We evaluate the effects of this transition-based approach on the
Quality of Experience (QoE) of such a VR streaming system and show that the
perceived quality can be increased between 50\% and 80\% compared to systems
that only apply either one of the two approaches.
| 0.901862 | 0.620157 | 0.281705 |
2004.07663
|
Optimising the Fit of Stack Overflow Code Snippets into Existing Code
|
Software developers often reuse code from online sources such as Stack
Overflow within their projects. However, the process of searching for code
snippets and integrating them within existing source code can be tedious. In
order to improve efficiency and reduce time spent on code reuse, we present an
automated code reuse tool for the Eclipse IDE (Integrated Developer
Environment), NLP2TestableCode. NLP2TestableCode can not only search for Java
code snippets using natural language tasks, but also evaluate code snippets
based on a user's existing code, modify snippets to improve fit and correct
errors, before presenting the user with the best snippet, all without leaving
the editor. NLP2TestableCode also includes functionality to automatically
generate customisable test cases and suggest argument and return types, in
order to further evaluate code snippets. In evaluation, NLP2TestableCode was
capable of finding compilable code snippets for 82.9% of tasks, and testable
code snippets for 42.9%.
|
A variety of new and powerful algorithms have been developed for image
compression over the years. Among them the wavelet-based image compression
schemes have gained much popularity due to their overlapping nature which
reduces the blocking artifacts that are common phenomena in JPEG compression
and multiresolution character which leads to superior energy compaction with
high quality reconstructed images. This paper provides a detailed survey on
some of the popular wavelet coding techniques such as the Embedded Zerotree
Wavelet (EZW) coding, Set Partitioning in Hierarchical Tree (SPIHT) coding, the
Set Partitioned Embedded Block (SPECK) Coder, and the Embedded Block Coding
with Optimized Truncation (EBCOT) algorithm. Other wavelet-based coding
techniques like the Wavelet Difference Reduction (WDR) and the Adaptive Scanned
Wavelet Difference Reduction (ASWDR) algorithms, the Space Frequency
Quantization (SFQ) algorithm, the Embedded Predictive Wavelet Image Coder
(EPWIC), Compression with Reversible Embedded Wavelet (CREW), the Stack-Run
(SR) coding and the recent Geometric Wavelet (GW) coding are also discussed.
Based on the review, recommendations and discussions are presented for
algorithm development and implementation.
| 0.802664 | 0.565978 | 0.236686 |
2004.07665
|
Autonomous Cooperative Flight Control for Airship Swarms
|
This work investigates two approaches for the design of autonomous
cooperative flight controllers for airship swarms. The first controller is
based on formation flight and the second one is based on swarm intelligence
strategies. In both cases, the team of airships needs to perform two different
tasks: waypoint path following and ground moving target tracking. The UAV
platform considered in this work is the NOAMAY airship developed in Brazil. We
use a simulated environment to test the proposed approaches. Results show the
inherent flexibility of the swarm intelligence approach on both tasks.
|
The bang-bang optimal control method was proposed for glow discharge plasma
actuators, taking account of practical issues, such as limited actuation states
with instantaneously varied aerodynamic control performance. Hence, the main
contribution of this Note is to integrate flight control with active flow
control in particular for plasma actuators. Flow control effects were examined
in wind tunnel experiments, which show that the plasma authority for flow
control is limited. Flow control effects are only obvious at pitch angles near
stall. However, flight control simulations suggest that even those small
plasma-induced roll moments can satisfactorily fulfill the maneuver tasks and
meet flight quality specifications. In addition, the disturbance from volatile
plasma-induced roll moments can be rejected. Hence, the proposed bang-bang
control method is a promising candidate of control design methodology for
plasma actuators.
| 0.922914 | 0.645503 | 0.277411 |
2004.07666
|
Exchange coupling in a linear chain of three quantum-dot spin qubits in
silicon
|
Quantum gates between spin qubits can be implemented leveraging the natural
Heisenberg exchange interaction between two electrons in contact with each
other. This interaction is controllable by electrically tailoring the overlap
between electronic wavefunctions in quantum dot systems, as long as they occupy
neighbouring dots. An alternative route is the exploration of superexchange -
the coupling between remote spins mediated by a third idle electron that
bridges the distance between quantum dots. We experimentally demonstrate direct
exchange coupling and provide evidence for second neighbour mediated
superexchange in a linear array of three single-electron spin qubits in
silicon, inferred from the electron spin resonance frequency spectra. We
confirm theoretically through atomistic modeling that the device geometry only
allows for sizeable direct exchange coupling for neighbouring dots, while next
nearest neighbour coupling cannot stem from the vanishingly small tail of the
electronic wavefunction of the remote dots, and is only possible if mediated.
|
Phosphorus donor impurities in silicon are a promising candidate for
solid-state quantum computing due to their exceptionally long coherence times
and high fidelities. However, individual addressability of exchange coupled
donor qubits with separations ~15nm is challenging. Here we show that by using
atomic-precision lithography we can place a single P donor next to a 2P
molecule 16(+/-1)nm apart and use their distinctive hyperfine coupling
strengths to address qubits at vastly different resonance frequencies. In
particular the single donor yields two hyperfine peaks separated by
97(+/-2.5)MHz, in contrast to the donor molecule which exhibits three peaks
separated by 262(+/-10)MHz. Atomistic tight-binding simulations confirm the
large hyperfine interaction strength in the 2P molecule with an inter-donor
separation of ~0.7nm, consistent with lithographic STM images of the 2P site
during device fabrication. We discuss the viability of using donor molecules
for built-in addressability of electron spin qubits in silicon.
| 0.894525 | 0.826537 | 0.067988 |
2004.07667
|
Null It Out: Guarding Protected Attributes by Iterative Nullspace
Projection
|
The ability to control for the kinds of information encoded in neural
representation has a variety of use cases, especially in light of the challenge
of interpreting these models. We present Iterative Null-space Projection
(INLP), a novel method for removing information from neural representations.
Our method is based on repeated training of linear classifiers that predict a
certain property we aim to remove, followed by projection of the
representations on their null-space. By doing so, the classifiers become
oblivious to that target property, making it hard to linearly separate the data
according to it. While applicable for general scenarios, we evaluate our method
on bias and fairness use-cases, and show that our method is able to mitigate
bias in word embeddings, as well as to increase fairness in a setting of
multi-class classification.
|
This is a review paper on some of the physics, modeling, and iterative
algorithms in proton computed tomography (pCT) image reconstruction. The
primary challenge in pCT image reconstruction lies in the degraded spatial
resolution resulting from multiple Coulomb scattering within the imaged object.
Analytical models such as the most likely path (MLP) have been proposed to
predict the scattered trajectory from measurements of individual proton
location and direction before and after the object. Iterative algorithms
provide a flexible tool with which to incorporate these models into image
reconstruction. The modeling leads to a large and sparse linear system of
equations that can efficiently be solved by projection methods-based iterative
algorithms. Such algorithms perform projections of the iterates onto the
hyperlanes that are represented by the linear equations of the system. They
perform these projections in possibly various algorithmic structures, such as
block-iterative projections (BIP), string-averaging projections (SAP). These
algorithmic schemes allow flexibility of choosing blocks, strings, and other
parameters. They also cater for parallel implementations which are apt to
further save clock time in computations. Experimental results are presented
which compare some of those algorithmic options.
| 0.760382 | 0.637112 | 0.123269 |
2004.07668
|
Holding a Conference Online and Live due to COVID-19
|
The joint EDBT/ICDT conference (International Conference on Extending
Database Technology/International Conference on Database Theory) is a well
established conference series on data management, with annual meetings in the
second half of March that attract 250 to 300 delegates. Three weeks before
EDBT/ICDT 2020 was planned to take place in Copenhagen, the rapidly developing
Covid-19 pandemic led to the decision to cancel the face-to-face event. In the
interest of the research community, it was decided to move the conference
online while trying to preserve as much of the real-life experience as
possible. As far as we know, we are one of the first conferences that moved to
a fully synchronous online experience due to the COVID-19 outbreak. With fully
synchronous, we mean that participants jointly listened to presentations, had
live Q&A, and attended other live events associated with the conference. In
this report, we share our decisions, experiences, and lessons learned.
|
The outbreak of the new virus COVID-19, beyond the human health risks and
loss, has caused also very serious problems in a wide range of human
activities, including the basic and applied scientific research, mainly that
concern world wide collaborations. It is desirable to all of us to have the
prospect of quickly predicting a turning point in the daily cases curve of the
disease. In this work we face the problem of COVID-19 virus disease spreading
by aiming mostly to create a reliable mathematical model describing this
mechanism for an isolated society, for cities or even for a whole country.
Drawing upon similar mechanisms appearing in the particle detector Physics, we
concentrated to the so called, semi-gaussian function of n-degree. This
approach can provide some very useful advantages in the data analysis of the
daily reported cases of the infected people. Applying this model and fitting to
the data, reported until the submission of this work, we have determined, among
others, the mean infection time for a citizen in the society under study. We
also applied and adopted this model to the reported cases in other countries
and we have performed useful comparisons and conclusions.
| 0.793757 | 0.652259 | 0.141499 |
2004.07669
|
Inferring the origins of the pulsed gamma-ray emission from the Crab
pulsar with 10-year Fermi LAT data
|
Context: The Crab pulsar is a bright $\gamma$-ray source detected at photon
energies up to $\sim$1 TeV. Its phase-averaged and phase-resolved $\gamma$-ray
spectra both exhibit (sub-)exponential cutoffs while those above 10 GeV
apparently follow simple power-laws. Aims: We re-visit the $\gamma$-ray
properties of the Crab pulsar with 10-year \emph{Fermi} Large Area Telescope
(LAT) data in the range of 60 MeV--500 GeV. With the phase-resolved spectra, we
investigate the origins and mechanisms responsible for the emissions. Methods:
The phaseograms are reconstructed for different energy bands and further
analysed using a wavelet decomposition. The phase-resolved energy spectra are
combined with the observations of ground-based instruments like MAGIC and
VERITAS to achieve a larger energy converage. We fit power-law models to the
overlapping energy spectra from 10 GeV to $\sim$1 TeV. We include in the fit a
relative cross-calibration of energy scales between air-shower based gamma-ray
telescopes with the orbital pair-production telescope of the Fermi mission.
Results: We confirm the energy-dependence of the $\gamma$-ray pulse shape, and
equivalently, the phase-dependence of the spectral shape for the Crab pulsar. A
relatively sharp exponential cutoff at a relatively high energy of $\sim$8 GeV
is observed for the bridge-phase emission. The $E>$10 GeV spectrum observed for
the second pulse peak is harder than those for other phases. Conclusions: In
view of the diversity of phase-resolved spectral shapes of the Crab pulsar, we
tentatively propose a multi-origin scenario where the polar-cap, outer-gap and
relativistic-wind regions are involved.
|
We are constructing the broadband SED catalog of the MOJAVE sample from the
radio to the gamma-ray band using MOJAVE, Swift UVOT/XRT/BAT, and Fermi/LAT
data, in order to understand the emission mechanism of extragalactic outflows
and to investigate the site of high-energy emission in AGN. Since the launch of
Fermi gamma-ray Space Telescope in August 2008, two thirds of the MOJAVE
sources have been detected by Fermi/LAT. Combining the results of
high-resolution VLBI, X-ray, and gamma-ray observations of the jet-dominated
AGN sample, we want to pin down the origin of high-energy emission in
relativistic jets. Here we present our overall project and preliminary results
for 6 selected sources.
| 0.886853 | 0.783776 | 0.103078 |
2004.07670
|
The BAHAMAS project: Effects of dynamical dark energy on large-scale
structure
|
In this work we consider the impact of spatially-uniform but time-varying
dark energy (or `dynamical dark energy', DDE) on large-scale structure in a
spatially flat universe, using large cosmological hydrodynamical simulations
that form part of the BAHAMAS project. As DDE changes the expansion history of
the universe, it impacts the growth of structure. We explore variations in DDE
that are constrained to be consistent with the cosmic microwave background. We
find that DDE can affect the clustering of matter and haloes at the ~10% level
(suppressing it for so-called `freezing' models, while enhancing it for
`thawing' models), which should be distinguishable with upcoming large-scale
structure surveys. DDE cosmologies can also enhance or suppress the halo mass
function (with respect to LCDM) over a wide range of halo masses. The internal
properties of haloes are minimally affected by changes in DDE, however.
Finally, we show that the impact of baryons and associated feedback processes
is largely independent of the change in cosmology and that these processes can
be modelled separately to typically better than a few percent accuracy
|
Disk galaxies contain a large amount of interstellar dust, which affects the
projection of kinematic quantities. We investigate in detail the effects of
dust extinction on the mean projected velocity and the projected velocity
dispersion. We use our results to construct a general strategy to determine the
dynamical structure of disk galaxies, with the aim to constrain their mass
distribution and dynamical history.
| 0.884121 | 0.748062 | 0.136059 |
2004.07671
|
Isomorphism Testing for Graphs Excluding Small Minors
|
We prove that there is a graph isomorphism test running in time
$n^{\operatorname{polylog}(h)}$ on $n$-vertex graphs excluding some $h$-vertex
graph as a minor. Previously known bounds were $n^{\operatorname{poly}(h)}$
(Ponomarenko, 1988) and $n^{\operatorname{polylog}(n)}$ (Babai, STOC 2016). For
the algorithm we combine recent advances in the group-theoretic graph
isomorphism machinery with new graph-theoretic arguments.
|
A propositional logic sentence in conjunctive normal form that has clauses of
length two (a 2-CNF) can be associated with a multigraph in which the vertices
correspond to the variables and edges to clauses. We first show that every such
sentence that has been reduced, that is, which is unchanged under application
of certain tautologies, is equisatisfiable to a 2-CNF whose associated
multigraph is, in fact, a simple graph. Our main result is a complete
characterization of graphs that can support unsatisfiable 2-CNF sentences. We
show that a simple graph can support an unsatisfiable reduced 2-CNF sentence if
and only if it contains any one of four specific small graphs as a topological
minor. Equivalently, all reduced 2-CNF sentences supported on a given simple
graph are satisfiable if and only if all subdivisions of those four graphs are
forbidden as subgraphs of of the original graph. We conclude with a discussion
of why the Robertson-Seymour graph minor theorem does not apply in our
approach.
| 0.855237 | 0.757943 | 0.097294 |
2004.07672
|
Generate, Delete and Rewrite: A Three-Stage Framework for Improving
Persona Consistency of Dialogue Generation
|
Maintaining a consistent personality in conversations is quite natural for
human beings, but is still a non-trivial task for machines. The persona-based
dialogue generation task is thus introduced to tackle the
personality-inconsistent problem by incorporating explicit persona text into
dialogue generation models. Despite the success of existing persona-based
models on generating human-like responses, their one-stage decoding framework
can hardly avoid the generation of inconsistent persona words. In this work, we
introduce a three-stage framework that employs a generate-delete-rewrite
mechanism to delete inconsistent words from a generated response prototype and
further rewrite it to a personality-consistent one. We carry out evaluations by
both human and automatic metrics. Experiments on the Persona-Chat dataset show
that our approach achieves good performance.
|
Visual compatibility is critical for fashion analysis, yet is missing in
existing fashion image synthesis systems. In this paper, we propose to
explicitly model visual compatibility through fashion image inpainting. To this
end, we present Fashion Inpainting Networks (FiNet), a two-stage image-to-image
generation framework that is able to perform compatible and diverse inpainting.
Disentangling the generation of shape and appearance to ensure photorealistic
results, our framework consists of a shape generation network and an appearance
generation network. More importantly, for each generation network, we introduce
two encoders interacting with one another to learn latent code in a shared
compatibility space. The latent representations are jointly optimized with the
corresponding generation network to condition the synthesis process,
encouraging a diverse set of generated results that are visually compatible
with existing fashion garments. In addition, our framework is readily extended
to clothing reconstruction and fashion transfer, with impressive results.
Extensive experiments with comparisons with state-of-the-art approaches on
fashion synthesis task quantitatively and qualitatively demonstrate the
effectiveness of our method.
| 0.923215 | 0.644942 | 0.278274 |
2004.07673
|
All two-party facet Bell inequalities are violated by Almost Quantum
correlations
|
The characterization of the set of quantum correlations is a problem of
fundamental importance in quantum information. The question whether every
proper (tight) Bell inequality is violated in Quantum theory is an intriguing
one in this regard. Here, we make significant progress in answering this
question, by showing that every tight Bell inequality is violated by 'Almost
Quantum' correlations, a semi-definite programming relaxation of the set of
quantum correlations. As a consequence, we show that many (classes of) Bell
inequalities including two-party correlation Bell inequalities and
multi-outcome non-local computation games, that do not admit quantum
violations, are not facets of the classical Bell polytope. To do this, we make
use of the intriguing connections between Bell correlations and the
graph-theoretic Lov\'{a}sz-theta set, discovered by Cabello-Severini-Winter
(CSW). We also exploit connections between the cut polytope of graph theory and
the classical correlation Bell polytope, to show that correlation Bell
inequalities that define facets of the lower dimensional correlation polytope
are violated in quantum theory. The methods also enable us to derive novel
(almost) quantum Bell inequalities, which may be of independent interest for
self-testing applications.
|
With the advent of quantum information, the violation of a Bell inequality is
used as evidence of the absence of an eavesdropper in cryptographic scenarios
such as key distribution and randomness expansion. One of the key assumptions
of Bell's Theorem is the existence of experimental "free will", meaning that
measurement settings can be chosen at random and independently by each party.
The relaxation of this assumption potentially shifts the balance of power
towards an eavesdropper. We consider a no-signalling model with reduced "free
will" and bound the adversary's capabilities in the task of randomness
expansion.
| 0.902541 | 0.742457 | 0.160085 |
2004.07674
|
Stochastic epidemics in a heterogeneous community (Part III of the book
Stochastic Epidemic Models and Inference)
|
This document is the Part III of the book 'Stochastic Epidemic Models with
Inference' edited by Tom Britton and Etienne Pardoux. Plan of the chapter: 1)
Random Graphs, 2) The Reproduction Number R0, 3) SIR Epidemics on Configuration
Model Graphs, 4) Statistical Description of Epidemics Spreading on Networks:
The Case of Cuban HIV.
|
Understanding the network structure, and finding out the influential nodes is
a challenging issue in the large networks. Identifying the most influential
nodes in the network can be useful in many applications like immunization of
nodes in case of epidemic spreading, during intentional attacks on complex
networks. A lot of research is done to devise centrality measures which could
efficiently identify the most influential nodes in the network. There are two
major approaches to the problem: On one hand, deterministic strategies that
exploit knowledge about the overall network topology in order to find the
influential nodes, while on the other end, random strategies are completely
agnostic about the network structure. Centrality measures that can deal with a
limited knowledge of the network structure are required. Indeed, in practice,
information about the global structure of the overall network is rarely
available or hard to acquire. Even if available, the structure of the network
might be too large that it is too much computationally expensive to calculate
global centrality measures. To that end, a centrality measure is proposed that
requires information only at the community level to identify the influential
nodes in the network. Indeed, most of the real-world networks exhibit a
community structure that can be exploited efficiently to discover the
influential nodes. We performed a comparative evaluation of prominent global
deterministic strategies together with stochastic strategies with an available
and the proposed deterministic community-based strategy. Effectiveness of the
proposed method is evaluated by performing experiments on synthetic and
real-world networks with community structure in the case of immunization of
nodes for epidemic control.
| 0.87793 | 0.770401 | 0.107529 |
2004.07675
|
Software Challenges For HL-LHC Data Analysis
|
The high energy physics community is discussing where investment is needed to
prepare software for the HL-LHC and its unprecedented challenges. The ROOT
project is one of the central software players in high energy physics since
decades. From its experience and expectations, the ROOT team has distilled a
comprehensive set of areas that should see research and development in the
context of data analysis software, for making best use of HL-LHC's physics
potential. This work shows what these areas could be, why the ROOT team
believes investing in them is needed, which gains are expected, and where
related work is ongoing. It can serve as an indication for future research
proposals and cooperations.
|
With the advent of a new generation of telescopes (INTEGRAL, Fermi, H.E.S.S.,
MAGIC, VERITAS, MILAGRO) and the prospects of planned observatories such as CTA
or HAWC, gamma-ray astronomy is becoming an integral part of modern
astrophysical research. Analysing gamma-ray data is still a major challenge,
and today relies on a large diversity of tools and software frameworks that
were specifically developed for each instrument. With the goal of facilitating
and unifying the analysis of gamma-ray data, we are currently developing an
innovative data analysis toolbox, called the GammaLib, that enables gamma-ray
data analysis in an instrument independent way. We will present the basic ideas
that are behind the GammaLib, and describe its architecture and usage.
| 0.854266 | 0.741447 | 0.112818 |
2004.07676
|
Video Face Manipulation Detection Through Ensemble of CNNs
|
In the last few years, several techniques for facial manipulation in videos
have been successfully developed and made available to the masses (i.e.,
FaceSwap, deepfake, etc.). These methods enable anyone to easily edit faces in
video sequences with incredibly realistic results and a very little effort.
Despite the usefulness of these tools in many fields, if used maliciously, they
can have a significantly bad impact on society (e.g., fake news spreading,
cyber bullying through fake revenge porn). The ability of objectively detecting
whether a face has been manipulated in a video sequence is then a task of
utmost importance. In this paper, we tackle the problem of face manipulation
detection in video sequences targeting modern facial manipulation techniques.
In particular, we study the ensembling of different trained Convolutional
Neural Network (CNN) models. In the proposed solution, different models are
obtained starting from a base network (i.e., EfficientNetB4) making use of two
different concepts: (i) attention layers; (ii) siamese training. We show that
combining these networks leads to promising face manipulation detection results
on two publicly available datasets with more than 119000 videos.
|
In this paper we compare the use of several features in the task of content
filtering for video social networks, a very challenging task, not only because
the unwanted content is related to very high-level semantic concepts (e.g.,
pornography, violence, etc.) but also because videos from social networks are
extremely assorted, preventing the use of constrained a priori information. We
propose a simple method, able to combine diverse evidence, coming from
different features and various video elements (entire video, shots, frames,
keyframes, etc.). We evaluate our method in three social network applications,
related to the detection of unwanted content - pornographic videos, violent
videos, and videos posted to artificially manipulate popularity scores. Using
challenging test databases, we show that this simple scheme is able to obtain
good results, provided that adequate features are chosen. Moreover, we
establish a representation using codebooks of spatiotemporal local descriptors
as critical to the success of the method in all three contexts. This is
consequential, since the state-of-the-art still relies heavily on static
features for the tasks addressed.
| 0.861946 | 0.699473 | 0.162474 |
2004.07677
|
A Unifying Characterization of Tree-based Networks and Orchard Networks
using Cherry Covers
|
Phylogenetic networks are used to study evolutionary relationships between
species in biology. Such networks are often categorized into classes by their
topological features, which stem from both biological and computational
motivations. We study two network classes in this paper: tree-based networks
and orchard networks. Tree-based networks are those that can be obtained by
inserting edges between the edges of an underlying tree. Orchard networks are a
recently introduced generalization of the class of tree-child networks.
Structural characterizations have already been discovered for tree-based
networks; this is not the case for orchard networks. In this paper, we
introduce cherry covers---a unifying characterization of both network
classes---in which we decompose the edges of the networks into so-called cherry
shapes and reticulated cherry shapes. We show that cherry covers can be used to
characterize the class of tree-based networks as well as the class of orchard
networks. Moreover, we also generalize these results to non-binary networks.
|
This paper presents the design and implementation of a measurement-based QoS
and resource management framework, CNQF (Converged Networks QoS Management
Framework). CNQF is designed to provide unified, scalable QoS control and
resource management through the use of a policy-based network management
paradigm. It achieves this via distributed functional entities that are
deployed to co-ordinate the resources of the transport network through
centralized policy-driven decisions supported by measurement-based control
architecture. We present the CNQF architecture, implementation of the prototype
and validation of various inbuilt QoS control mechanisms using real traffic
flows on a Linux-based experimental test bed.
| 0.908514 | 0.656786 | 0.251727 |
2004.07678
|
Online Social Deception and Its Countermeasures for Trustworthy
Cyberspace: A Survey
|
We are living in an era when online communication over social network
services (SNSs) have become an indispensable part of people's everyday lives.
As a consequence, online social deception (OSD) in SNSs has emerged as a
serious threat in cyberspace, particularly for users vulnerable to such
cyberattacks. Cyber attackers have exploited the sophisticated features of SNSs
to carry out harmful OSD activities, such as financial fraud, privacy threat,
or sexual/labor exploitation. Therefore, it is critical to understand OSD and
develop effective countermeasures against OSD for building a trustworthy SNSs.
In this paper, we conducted an extensive survey, covering (i) the
multidisciplinary concepts of social deception; (ii) types of OSD attacks and
their unique characteristics compared to other social network attacks and
cybercrimes; (iii) comprehensive defense mechanisms embracing prevention,
detection, and response (or mitigation) against OSD attacks along with their
pros and cons; (iv) datasets/metrics used for validation and verification; and
(v) legal and ethical concerns related to OSD research. Based on this survey,
we provide insights into the effectiveness of countermeasures and the lessons
from existing literature. We conclude this survey paper with an in-depth
discussions on the limitations of the state-of-the-art and recommend future
research directions in this area.
|
Since 1950, information flows have been in the centre of scientific research.
Up until internet penetration in the late 90s, these studies were based over
traditional offline social networks. Several observations in offline
information flows studies, such as two-step flow of communication and the
importance of weak ties, were verified in several online studies, showing that
the diffused information flows from one Online Social Network (OSN) to several
others. Within that flow, information is shared to and reproduced by the users
of each network. Furthermore, the original content is enhanced or weakened
according to its topic, the dynamic and exposure of each OSNs. In such a
concept, each OSN is considered a layer of information flows that interacts
with each other. In this paper, we examine such flows in several social
networks, as well as their diffusion and lifespan across multiple OSNs, in
terms of user-generated content. Our results verify the perception of content
and information connection in various OSNs.
| 0.897468 | 0.685974 | 0.211494 |
2004.07679
|
Composable Security for Multipartite Entanglement Verification
|
We present a composably secure protocol allowing $n$ parties to test an
entanglement generation resource controlled by a possibly dishonest party. The
test consists only in local quantum operations and authenticated classical
communication once a state is shared among them and provides composable
security, namely it can be used as a secure subroutine by $n$ honest parties
within larger communication protocols to test if a source is sharing quantum
states that are at least $\epsilon$-close to the GHZ state. This claim comes on
top of previous results on multipartite entanglement verification where the
security was studied in the usual game-based model. Here we improve the
protocol to make it more suitable for practical use in a quantum network and we
study its security in the Abstract Cryptography framework to highlight
composability issues and avoid hidden assumptions. This framework is a
top-to-bottom theory that makes explicit any piece of information that each
component (party or resource) gets at every time-step of the protocol. Moreover
any security proof, which amounts to showing indistinguishability between an
ideal resource having the desired security properties (up to local simulation)
and the concrete resource representing the protocol, is composable for free in
this setting. Our protocol can typically be used as a subroutine in a Quantum
Internet, to securely share a GHZ state among the network before performing a
communication or computation protocol.
|
As two of the most important entanglement measures--the entanglement of
formation and the entanglement of distillation--have so far been limited to
bipartite settings, the study of other entanglement measures for multipartite
systems appears necessary. Here, connections between two other entanglement
measures--the relative entropy of entanglement and the geometric measure of
entanglement--are investigated. It is found that for arbitrary pure states the
latter gives rise to a lower bound on the former. For certain pure states, some
bipartite and some multipartite, this lower bound is saturated, and thus their
relative entropy of entanglement can be found analytically in terms of their
known geometric measure of entanglement. For certain mixed states, upper bounds
on the relative entropy of entanglement are also established. Numerical
evidence strongly suggests that these upper bounds are tight, i.e., they are
actually the relative entropy of entanglement.
| 0.877832 | 0.773278 | 0.104555 |
2004.07680
|
On equivariant oriented cohomology of Bott-Samelson varieties
|
For any Bott-Samelson resolution $q_{I}:\hat{X_{I}}\rightarrow G/B$ of the
flag variety $G/B$, and any torus equivariant oriented cohomology $h_T$, we
compute the restriction formula of certain basis $\eta_L$ of $h_T(\hat{X_{I}})$
determined by the projective bundle formula. As an application, we show that
$h_T(\hat{X_{I}})$ embeds into the equivariant oriented cohomology of $T$-fixed
points, and the image can be characterized by using the
Goresky-Kottwitz-MacPherson (GKM) description. Furthermore, we compute the
push-forward of the basis $\eta_L$ onto $h_T(G/B)$, and their restriction
formula.
|
A Bott manifold is the total space of some iterated $\mathbb C P^1$-bundle
over a point. We prove that any graded ring isomorphism between the cohomology
rings of two Bott manifolds preserves their Pontrjagin classes. Moreover, we
prove that such an isomorphism is induced from a diffeomorphism if the Bott
manifolds are $\mathbb Z/2$-trivial, where a Bott manifold is called $\mathbb
Z/2$-trivial if its cohomology ring with $\mathbb Z/2$-coefficient is
isomorphic to that of a product of $\mathbb C P^1$'s.
| 0.87419 | 0.809751 | 0.06444 |
2004.07681
|
De-Signing Hamiltonians for Quantum Adiabatic Optimization
|
Quantum fluctuations driven by non-stoquastic Hamiltonians have been
conjectured to be an important and perhaps essential missing ingredient for
achieving a quantum advantage with adiabatic optimization. We introduce a
transformation that maps every non-stoquastic adiabatic path ending in a
classical Hamiltonian to a corresponding stoquastic adiabatic path by
appropriately adjusting the phase of each matrix entry in the computational
basis. We compare the spectral gaps of these adiabatic paths and find both
theoretically and numerically that the paths based on non-stoquastic
Hamiltonians have generically smaller spectral gaps between the ground and
first excited states, suggesting they are less useful than stoquastic
Hamiltonians for quantum adiabatic optimization. These results apply to any
adiabatic algorithm which interpolates to a final Hamiltonian that is diagonal
in the computational basis.
|
We propose that the constants of Nature we observe (which appear as
parameters in the classical action) are quantum observables in a kinematical
Hilbert space. When all of these observables commute, our proposal differs
little from the treatment given to classical parameters in quantum information
theory, at least if we were to inhabit a constants' eigenstate.
Non-commutativity introduces novelties, due to its associated uncertainty and
complementarity principles, and it may even preclude hamiltonian evolution. The
system typically evolves as a quantum superposition of hamiltonian evolutions
resulting from a diagonalization process, and these are usually quite distinct
from the original one (defined in terms of the non-commuting constants). We
present several examples targeting $G$, $c$ and $\Lambda $, and the dynamics of
homogeneous and isotropic Universes. If we base our construction on the
Heisenberg algebra and the quantum harmonic oscillator, the alternative
dynamics tends to silence matter (effectively setting $G$ to zero), and make
curvature and the cosmological constant act as if their signs are reversed.
Thus, the early Universe expands as a quantum superposition of different Milne
or de Sitter expansions for all material equations of state, even though matter
nominally dominates the density, $\rho $, because of the negligible influence
of $G\rho $ on the dynamics. A superposition of Einstein static universes can
also be obtained. We also investigate the results of basing our construction on
the algebra of $SU(2)$, into which we insert information about the sign of a
constant of Nature, or whether its action is switched on or off. In this case
we find examples displaying quantum superpositions of bounces at the initial
state for the Universe.
| 0.850301 | 0.63736 | 0.212941 |
2004.07682
|
On the use of Benford's law to detect GAN-generated images
|
The advent of Generative Adversarial Network (GAN) architectures has given
anyone the ability of generating incredibly realistic synthetic imagery. The
malicious diffusion of GAN-generated images may lead to serious social and
political consequences (e.g., fake news spreading, opinion formation, etc.). It
is therefore important to regulate the widespread distribution of synthetic
imagery by developing solutions able to detect them. In this paper, we study
the possibility of using Benford's law to discriminate GAN-generated images
from natural photographs. Benford's law describes the distribution of the most
significant digit for quantized Discrete Cosine Transform (DCT) coefficients.
Extending and generalizing this property, we show that it is possible to
extract a compact feature vector from an image. This feature vector can be fed
to an extremely simple classifier for GAN-generated image detection purpose.
|
Generative Adversarial Networks (GANs) are a well-known technique that is
trained on samples (e.g. pictures of fruits) and which after training is able
to generate realistic new samples. Conditional GANs (CGANs) additionally
provide label information for subclasses (e.g. apple, orange, pear) which
enables the GAN to learn more easily and increase the quality of its output
samples. We use GANs to learn architectural features of major cities and to
generate images of buildings which do not exist. We show that currently
available GAN and CGAN architectures are unsuited for this task and propose a
custom architecture and demonstrate that our architecture has superior
performance for this task and verify its capabilities with extensive
experiments.
| 0.915952 | 0.799185 | 0.116767 |
2004.07683
|
Do sequence-to-sequence VAEs learn global features of sentences?
|
A longstanding goal in NLP is to compute global sentence representations.
Such representations would be useful for sample-efficient semi-supervised
learning and controllable text generation. To learn to represent global and
local information separately, Bowman & al. (2016) proposed to train a
sequence-to-sequence model with the variational auto-encoder (VAE) objective.
What precisely is encoded in these latent variables expected to capture global
features? We measure which words benefit most from the latent information by
decomposing the reconstruction loss per position in the sentence. Using this
method, we see that VAEs are prone to memorizing the first words and the
sentence length, drastically limiting their usefulness. To alleviate this, we
propose variants based on bag-of-words assumptions and language model
pretraining. These variants learn latents that are more global: they are more
predictive of topic or sentiment labels, and their reconstructions are more
faithful to the labels of the original documents.
|
Machine improvisation creates music either by explicit coding of rules or by
applying machine learning methods. We deal with the latter case. An
improvisation system capable of real-time must execute two process
concurrently: one to apply machine learning methods to musical sequences in
order to capture prominent musical features, and one to produce musical
sequences stylistically consistent with the learned material. As an example,
the Concurrent Constraint Factor Oracle Model for Music Improvisation (ccfomi),
based upon Non-deterministic Timed Concurrent Constraint (ntcc) calculus, uses
the Factor Oracle to store the learned sequences.
| 0.884315 | 0.675057 | 0.209258 |
2004.07684
|
Joint Semantic Segmentation and Boundary Detection using Iterative
Pyramid Contexts
|
In this paper, we present a joint multi-task learning framework for semantic
segmentation and boundary detection. The critical component in the framework is
the iterative pyramid context module (PCM), which couples two tasks and stores
the shared latent semantics to interact between the two tasks. For semantic
boundary detection, we propose the novel spatial gradient fusion to suppress
nonsemantic edges. As semantic boundary detection is the dual task of semantic
segmentation, we introduce a loss function with boundary consistency constraint
to improve the boundary pixel accuracy for semantic segmentation. Our extensive
experiments demonstrate superior performance over state-of-the-art works, not
only in semantic segmentation but also in semantic boundary detection. In
particular, a mean IoU score of 81:8% on Cityscapes test set is achieved
without using coarse data or any external data for semantic segmentation. For
semantic boundary detection, we improve over previous state-of-the-art works by
9.9% in terms of AP and 6:8% in terms of MF(ODS).
|
Semantic image segmentation is an essential component of modern autonomous
driving systems, as an accurate understanding of the surrounding scene is
crucial to navigation and action planning. Current state-of-the-art approaches
in semantic image segmentation rely on pre-trained networks that were initially
developed for classifying images as a whole. While these networks exhibit
outstanding recognition performance (i.e., what is visible?), they lack
localization accuracy (i.e., where precisely is something located?). Therefore,
additional processing steps have to be performed in order to obtain
pixel-accurate segmentation masks at the full image resolution. To alleviate
this problem we propose a novel ResNet-like architecture that exhibits strong
localization and recognition performance. We combine multi-scale context with
pixel-level accuracy by using two processing streams within our network: One
stream carries information at the full image resolution, enabling precise
adherence to segment boundaries. The other stream undergoes a sequence of
pooling operations to obtain robust features for recognition. The two streams
are coupled at the full image resolution using residuals. Without additional
processing steps and without pre-training, our approach achieves an
intersection-over-union score of 71.8% on the Cityscapes dataset.
| 0.933645 | 0.808009 | 0.125636 |
2004.07685
|
Spin selection rule for {\it S} level transitions in atomic rubidium
under paraxial and nonparaxial two-photon excitation
|
We report on an experimental test of the spin selection rule for two-photon
transitions in atoms. In particular, we demonstrate that the $5S_{1/2}\to
6S_{1/2}$ transition rate in a rubidium gas follows a quadratic dependency on
the helicity parameter linked to the polarization of the excitation light. For
excitation via a single Gaussian beam or two counterpropagating beams in a hot
vapor cell, the transition rate scales as the squared degree of linear
polarization. The rate reaches zero when the light is circularly polarized. In
contrast, when the excitation is realized via an evanescent field near an
optical nanofiber, the two-photon transition cannot be completely extinguished
(theoretically, not lower than 13\% of the maximum rate, under our experimental
conditions) by only varying the polarization of the fiber-guided light. Our
findings lead to a deeper understanding of the physics of multiphoton processes
in atoms in strongly nonparaxial light.
|
We suggest a simple experimental method for probing antiferromagnetic spin
correlations of two-component Fermi gases in optical lattices. The method
relies on a spin selective Raman transition to excite atoms of one spin species
to their first excited vibrational mode where the tunneling is large. The
resulting difference in the tunneling dynamics of the two spin species can then
be exploited, to reveal the spin correlations by measuring the number of doubly
occupied lattice sites at a later time. We perform quantum Monte Carlo
simulations of the spin system and solve the optical lattice dynamics
numerically to show how the timed probe can be used to identify
antiferromagnetic spin correlations in optical lattices.
| 0.919006 | 0.833964 | 0.085042 |
2004.07686
|
Vanishing cohomology and Betti bounds for complex projective
hypersurfaces
|
We employ the formalism of vanishing cycles and perverse sheaves to introduce
and study the vanishing cohomology of complex projective hypersurfaces. As a
consequence, we give upper bounds for the Betti numbers of projective
hypersurfaces, generalizing those obtained by different methods by Dimca in the
isolated singularities case, and by Siersma-Tib\u{a}r in the case of
hypersurfaces with a $1$-dimensional singular locus. We also prove a supplement
to the Lefschetz hyperplane theorem for hypersurfaces, which takes the
dimension of the singular locus into account, and we use it to give a new proof
of a result of Kato.
|
Hesse claimed that an irreducible projective hypersurface in $\PP^n$ defined
by an equation with vanishing hessian determinant is necessarily a cone. Gordan
and Noether proved that this is true for $n\leq 3$ and constructed
counterexamples for every $n\geq 4$. Gordan and Noether and Franchetta gave
classification of hypersurfaces in $\PP^4$ with vanishing hessian and which are
not cones. Here we translate in geometric terms Gordan and Noether approach,
providing direct geometrical proofs of these results.
| 0.922985 | 0.824019 | 0.098966 |
2004.07687
|
Physical Characteristics of Umbral Dots Derived from a High Resolution
Observation
|
The aim of this study is revisit the physical parameters of umbral dots (UDs)
with the latest high resolution observations and contribute to the scientific
understanding of their formation and evolution. In this study, we applied a
particle tracking algorithm for detecting UDs in NOAA AR12384 observed on June
14, 2015 by the Goode Solar Telescope (GST). We analyzed average position
distributions, location dependencies, and general properties of detected total
2892 UDs separately during their life time and the periodic behavior of only
selected 10 long living UDs. We found; i) brightest, largest, fastest and most
elliptic UDs tend to be located at the umbra-penumbra boundary while their
lifetime does not display any meaningful location dependency, ii) average
dynamic velocity of all detected UDs is about twice (0.76 km/s) of the
previously reported average values, iii) obtained trajectories from the longest
living 354 UDs show that they have generally inward motion, iv) chosen 10 long
living UDs generally have similar periodic behavior showing 8.5-32, 3.5-4.1,
1.5-1.9, and 1.1-1.3 minutes periodicities, v) generally, detected UDs have an
elliptical shape with the averaged eccentricity of 0.29, with a 0.11 standard
deviation, vi) larger UDs tend to be more elliptic and more dynamic.
|
We discuss a device --- a purely capacitively coupled interacting spinless
triple quantum dot system --- for the observation of the SU(3) Kondo effect.
Unlike more familiar SU(2) and SU(4) Kondo effects in quantum dot devices which
lead to unitary linear conductance at low temperatures, the SU(3) Kondo
scenario can be easily identified by the conductance pinned to a characteristic
value of 3/4 of the unitary limit. This is associated with the interesting fact
that the SU(3) Kondo effect does not occur at the particle-hole symmetric
point, where the system is found instead in the valence-fluctuating regime with
the total dot occupancy flipping between 1 and 2, but for gate voltages in the
two Kondo plateaux where the dot occupancy is pinned to an integer value,
either 1 or 2. From the thermodynamic analysis in the Kondo regime we find that
the effective impurity orbital moment, defined through the impurity orbital
susceptibility (chi_imp) multiplied by the temperature, is T\chi_imp=1 at high
temperatures and then it increases to the characteristic value of T\chi_imp=4/3
corresponding to the three-fold degenerate local-moment fixed point where the
impurity entropy is S_imp=ln 3. Then, at much lower temperatures, the system
flows to the non-degenerate strong-coupling fixed point in which the SU(3)
Kondo effect takes place. We also report results about the robustness of the
SU(3) Kondo effect against various perturbations present in real experimental
setups. Finally, we describe possible mechanisms to restore the SU(3) Kondo
physics by properly tuning the on-site dot potentials. We briefly comment on
the spinfull case which has very different behavior and shows Kondo plateaus in
conductance for all integer values of the occupancy, including at the
particle-hole symmetric point.
| 0.831291 | 0.641424 | 0.189867 |
2004.07688
|
Statistical inference for epidemic processes in a homogeneous community
(Part IV of the book Stochastic Epidemic Models and Inference)
|
This document is the Part IV of the book 'Stochastic Epidemic Models with
Inference' edited by Tom Britton and Etienne Pardoux. It is written by
Catherine Lar\'edo, with the contribution of Viet Chi Tran for the Chapter 4.
Epidemic data present challenging statistical problems, starting from the
recurrent issue of handling missing information. We review methods such as
MCMC, ABC or methods based on diffusion approximations. Plan of this document:
1) Observations and Asymptotic Frameworks; 2) Inference for Markov Chain
Epidemic Models; 3) Inference Based on the Diffusion Approximation of Epidemic
Models; 4) Inference for Continuous Time SIR models.
|
We study an SIS epidemic process over a static contact network where the
nodes have partial information about the epidemic state. They react by limiting
their interactions with their neighbors when they believe the epidemic is
currently prevalent. A node's awareness is weighted by the fraction of infected
neighbors in their social network, and a global broadcast of the fraction of
infected nodes in the entire network. The dynamics of the benchmark (no
awareness) and awareness models are described by discrete-time Markov chains,
from which mean-field approximations (MFA) are derived. The states of the MFA
are interpreted as the nodes' probabilities of being infected. We show a
sufficient condition for existence of a "metastable", or endemic, state of the
awareness model coincides with that of the benchmark model. Furthermore, we use
a coupling technique to give a full stochastic comparison analysis between the
two chains, which serves as a probabilistic analogue to the MFA analysis. In
particular, we show that adding awareness reduces the expectation of any
epidemic metric on the space of sample paths, e.g. eradication time or total
infections. We characterize the reduction in expectations in terms of the
coupling distribution. In simulations, we evaluate the effect social distancing
has on contact networks from different random graph families (geometric,
Erd\H{o}s-Renyi, and scale-free random networks).
| 0.881954 | 0.81386 | 0.068095 |
2004.07689
|
More on Faulhaber's theorem for sums of powers of integers
|
In this note we consider the theorem established in arXiv:1912.07171
concerning the sums of powers of the first $n$ positive integers, $S_k = 1^k +
2^k + \cdots + n^k$, and show that it can be used to demonstrate the classical
theorem of Faulhaber for both cases of odd and even $k$.
|
In this paper, we investigate exceptional sets in the Waring-Goldbach problem
for unlike powers. For example, estimates are obtained for sufficiently large
integers below a parameter subject to the necessary local conditions that do
not have a representation as the sum of a square of prime, a cube of prime and
a sixth power of prime and a $k$-th power of prime. These results improve the
recent result due to Br\"udern in the order of magnitude. Furthermore, the
method can be also applied to the similar estimates for the exceptional sets
for Waring-Goldbach problem for unlike powers.
| 0.9177 | 0.790102 | 0.127599 |
2004.07690
|
Data-Driven Robust Control Using Reinforcement Learning
|
This paper proposes a robust control design method using
reinforcement-learning for controlling partially-unknown dynamical systems
under uncertain conditions. The method extends the optimal
reinforcement-learning algorithm with a new learning technique that is based on
the robust control theory. By learning from the data, the algorithm proposed
actions that guarantees the stability of the closed loop system within the
uncertainties estimated from the data. Control policies are calculated by
solving a set of linear matrix inequalities. The controller was evaluated using
simulations on a blood glucose model for patients with type-1 diabetes.
Simulation results show that the proposed methodology is capable of safely
regulates the blood glucose within a healthy level under the influence of
measurement and process noises. The controller has also significantly reduced
the post-meal fluctuation of the blood glucose. A comparison between the
proposed algorithm and the existing optimal reinforcement learning algorithm
shows the improved robustness of the closed loop system using our method.
|
This paper sets forth a framework for deep reinforcement learning as applied
to market making (DRLMM) for cryptocurrencies. Two advanced policy
gradient-based algorithms were selected as agents to interact with an
environment that represents the observation space through limit order book
data, and order flow arrival statistics. Within the experiment, a forward-feed
neural network is used as the function approximator and two reward functions
are compared. The performance of each combination of agent and reward function
is evaluated by daily and average trade returns. Using this DRLMM framework,
this paper demonstrates the effectiveness of deep reinforcement learning in
solving stochastic inventory control challenges market makers face.
| 0.810922 | 0.699498 | 0.111423 |
2004.07691
|
In Search of Life: Learning from Synthetic Data to Detect Vital Signs in
Videos
|
Automatically detecting vital signs in videos, such as the estimation of
heart and respiration rates, is a challenging research problem in computer
vision with important applications in the medical field. One of the key
difficulties in tackling this task is the lack of sufficient supervised
training data, which severely limits the use of powerful deep neural networks.
In this paper we address this limitation through a novel deep learning
approach, in which a recurrent deep neural network is trained to detect vital
signs in the infrared thermal domain from purely synthetic data. What is most
surprising is that our novel method for synthetic training data generation is
general, relatively simple and uses almost no prior medical domain knowledge.
Moreover, our system, which is trained in a purely automatic manner and needs
no human annotation, also learns to predict the respiration or heart intensity
signal for each moment in time and to detect the region of interest that is
most relevant for the given task, e.g. the nose area in the case of
respiration. We test the effectiveness of our proposed system on the recent
LCAS dataset and obtain state-of-the-art results.
|
Scarce data is a major challenge to scaling robot learning to truly complex
tasks, as we need to generalize locally learned policies over different task
contexts. Contextual policy search offers data-efficient learning and
generalization by explicitly conditioning the policy on a parametric context
space. In this paper, we further structure the contextual policy
representation. We propose to factor contexts into two components: target
contexts that describe the task objectives, e.g. target position for throwing a
ball; and environment contexts that characterize the environment, e.g. initial
position or mass of the ball. Our key observation is that experience can be
directly generalized over target contexts. We show that this can be easily
exploited in contextual policy search algorithms. In particular, we apply
factorization to a Bayesian optimization approach to contextual policy search
both in sampling-based and active learning settings. Our simulation results
show faster learning and better generalization in various robotic domains. See
our supplementary video: https://youtu.be/MNTbBAOufDY.
| 0.868986 | 0.627794 | 0.241192 |
2004.07692
|
A Hybrid Objective Function for Robustness of Artificial Neural Networks
-- Estimation of Parameters in a Mechanical System
|
In several studies, hybrid neural networks have proven to be more robust
against noisy input data compared to plain data driven neural networks. We
consider the task of estimating parameters of a mechanical vehicle model based
on acceleration profiles. We introduce a convolutional neural network
architecture that is capable to predict the parameters for a family of vehicle
models that differ in the unknown parameters. We introduce a convolutional
neural network architecture that given sequential data predicts the parameters
of the underlying data's dynamics. This network is trained with two objective
functions. The first one constitutes a more naive approach that assumes that
the true parameters are known. The second objective incorporates the knowledge
of the underlying dynamics and is therefore considered as hybrid approach. We
show that in terms of robustness, the latter outperforms the first objective on
noisy input data.
|
Building robust online content recommendation systems requires learning
complex interactions between user preferences and content features. The field
has evolved rapidly in recent years from traditional multi-arm bandit and
collaborative filtering techniques, with new methods employing Deep Learning
models to capture non-linearities. Despite progress, the dynamic nature of
online recommendations still poses great challenges, such as finding the
delicate balance between exploration and exploitation. In this paper we show
how uncertainty estimations can be incorporated by employing them in an
optimistic exploitation/exploration strategy for more efficient exploration of
new recommendations. We provide a novel hybrid deep neural network model, Deep
Density Networks (DDN), which integrates content-based deep learning models
with a collaborative scheme that is able to robustly model and estimate
uncertainty. Finally, we present online and offline results after incorporating
DNN into a real world content recommendation system that serves billions of
recommendations per day, and show the benefit of using DDN in practice.
| 0.816964 | 0.616768 | 0.200196 |
2004.07693
|
Hunting keV sterile neutrinos with KATRIN: building the first TRISTAN
module
|
The KATRIN (Karlsruhe Tritium Neutrino) experiment investigates the energetic
endpoint of the tritium beta-decay spectrum to determine the effective mass of
the electron anti-neutrino. The collaboration has reported a first mass
measurement result at this TAUP-2019 conference. The TRISTAN project aims at
detecting a keV-sterile neutrino signature by measuring the entire tritium
beta-decay spectrum with an upgraded KATRIN system. One of the greatest
challenges is to handle the high signal rates generated by the strong activity
of the KATRIN tritium source while maintaining a good energy resolution.
Therefore, a novel multi-pixel silicon drift detector and read-out system are
being designed to handle rates of about 100 Mcps with an energy resolution
better than 300 eV (FWHM). This report presents succinctly the KATRIN
experiment, the TRISTAN project, then the results of the first 7-pixels
prototype measurement campaign and finally describes the construction of the
first TRISTAN module composed of 166 SDD-pixels as well as its implementation
in KATRIN experiment.
|
We study sterile neutrinos in an extension of the standard model, based on
the gauge group $SU(3)_C\otimes SU(3)_L\otimes SU(3)_R\otimes U(1)_N$, and use
this model to illustrate how to apply cosmological limits to thermalized
particles that decouple while relativistic. These neutrinos, $N_{aL}$, can be
dark matter candidates, with a keV mass range arising rather naturally in this
model. We analyse the cosmological limits imposed by $N_{eff}$ and dark matter
abundance on these neutrinos. Assuming that these neutrinos have roughly equal
masses and are not CDM, we conclude that the $N_{eff}$ experimental value can
be satisfied in some cases and the abundance constraint implies that these
neutrinos are hot dark matter. With this information, we give upper bounds on
the Yukawa coupling between the sterile neutrinos and a scalar field, the
possible values of the VEV of this scalar field and lower bounds to the mass of
one gauge boson of the model.
| 0.869824 | 0.776212 | 0.093612 |
2004.07694
|
Spiciness theory revisited, with new views on neutral density,
orthogonality and passiveness
|
This paper clarifies the theoretical basis for constructing spiciness
variables optimal for characterising ocean water masses. Three essential
ingredients are identified: 1) a material density variable $\gamma$ that is as
neutral as feasible; 2) a material state function $\xi$ independent of
$\gamma$, but otherwise arbitrary; 3) an empirically determined function
$\xi_r(\gamma)$ of $\gamma$ quantifying the isopycnal mean behaviour of $\xi$.
The key results are: It is the anomaly $\xi' = \xi - \xi_r(\gamma)$, rather
than $\xi$, that is the variable optimally suited for characterising ocean
water masses; Ingredient 1) is required, because contrary to what is usually
assumed, it is not the property of $\xi$ that determine its dynamical
inertness, but the degree of neutrality of $\gamma$; Oceanic sections of $\xi'$
are rather insensitive to the particular choice of $\xi$; Contrary to what has
been usually assumed, it is orthogonality in physical space rather than in
thermohaline space that is the relevant property for optimally characterising
ocean water masses.
The results are important because: They unify the various ways in which
spiciness has been defined and used in the literature; They provide for the
first time a rigorous first-principles physical justification for the concept
of neutral density.
|
We briefly review the five possible real polynomial solutions of
hypergeometric differential equations. Three of them are the well known
classical orthogonal polynomials, but the other two are different with respect
to their orthogonality properties. We then focus on the family of polynomials
which exhibits a finite orthogonality. This family, to be referred to as the
Romanovski polynomials, is required in exact solutions of several physics
problems ranging from quantum mechanics and quark physics to random matrix
theory. It appears timely to draw attention to it by the present study. Our
survey also includes several new observations on the orthogonality properties
of the Romanovski polynomials and new developments from their Rodrigues
formula.
| 0.765789 | 0.645791 | 0.119997 |
2004.07695
|
Calibration of a Shower Lead-Scintillation Spectrometer by Cosmic
Radiation
|
The results of calibration by cosmic muons of a shower lead-scintillation
spectrometer of the sandwich type designed to work in high-intensity photon and
electron beams with an energy of 0.1 - 1.0 GeV are presented. It was found that
the relative energy resolution of the spectrometer depends on the angle of
entry of cosmic muons into the spectrometer in the vertical plane and does not
depend on the angle of entry in the horizontal plane. The relative energy
resolution of the spectrometer was 16%. Placing an additional
lead-scintillation assembly in front of the spectrometer improved the relative
energy resolution of the spectrometer to 9%.
|
Cosmic ray air showers produce radio emission, consisting in large part of
geosynchrotron emission. Since the radiation mechanism is based on particle
acceleration, the atmospheric electric field can play an important role.
Especially inside thunderclouds large electric fields can be present. We
examine the contribution of an electric field to the emission mechanism
theoretically and experimentally. Two mechanisms of amplification of radio
emission are considered: the acceleration radiation of the shower particles and
the radiation from the current that is produced by ionization electrons moving
in the electric field. We selected and evaluated LOPES data recorded during
thunderstorms, periods of heavy cloudiness and periods of cloudless weather. We
find that during thunderstorms the radio emission can be strongly enhanced. No
amplified pulses were found during periods of cloudless sky or heavy
cloudiness, suggesting that the electric field effect for radio air shower
measurements can be safely ignored during non-thunderstorm conditions.
| 0.885709 | 0.739347 | 0.146361 |
2004.07696
|
Rapidly evaluating lockdown strategies using spectral analysis: the
cycles behind new daily COVID-19 cases and what happens after lockdown
|
Spectral analysis characterises oscillatory time series behaviours such as
cycles, but accurate estimation requires reasonable numbers of observations.
Current COVID-19 time series for many countries are short: pre- and
post-lockdown series are shorter still. Accurate estimation of potentially
interesting cycles within such series seems beyond reach. We solve the problem
of obtaining accurate estimates from short time series by using recent Bayesian
spectral fusion methods. Here we show that transformed new daily COVID-19 cases
for many countries generally contain three cycles operating at wavelengths of
around 2.7, 4.1 and 6.7 days (weekly). We show that the shorter cycles are
suppressed after lockdown. The pre- and post lockdown differences suggest that
the weekly effect is at least partly due to non-epidemic factors, whereas the
two shorter cycles seem intrinsic to the epidemic. Unconstrained, new cases
grow exponentially, but the internal cyclic structure causes periodic falls in
cases. This suggests that lockdown success might only be indicated by four or
more daily falls in cases. Spectral learning for epidemic time series
contributes to the understanding of the epidemic process, helping evaluate
interventions and assists with forecasting. Spectral fusion is a general
technique that is able to fuse spectra recorded at different sampling rates,
which can be applied to a wide range of time series from many disciplines.
|
The new coronavirus known as COVID-19 is rapidly spreading since December
2019. Without any vaccination or medicine, the means of controlling it are
limited to quarantine and social distancing. Here we study the spatio-temporal
propagation of the COVID-19 virus in China and compare it to other global
locations. Our results suggest that the disease propagation is highly related
to population migration from Hubei resembling a L\'{e}vy flight which is
characteristic of human mobility and thus could be controlled by efficient
quarantines. Since quarantine is usually applied on a city level, more insight
can be obtained in analyzing the epidemic in cities. Our results suggest that
the disease spread in a city in China is characterized by two-stages process.
At early times, at order of few days, the infection rate in the city is close
to constant probably due to the lack of means to detect infected individuals
before infection signs are observed and at later times it decays approximately
exponentially due to quarantines. These two stages can explain the significant
differences between the propagation in China and in other world-wide locations.
While most cities in China control the disease which resulted in the decaying
stage, in other world-wide countries the situation is still becoming worse
probably due to less social interactions control and overloaded health systems
which reflects in the death and recovery rates.
| 0.900316 | 0.710649 | 0.189667 |
2004.07697
|
Computational Drug Repositioning and Elucidation of Mechanism of Action
of Compounds against SARS-CoV-2
|
The COVID-19 crisis called for rapid reaction from all the fields of
biomedical research. Traditional drug development involve time consuming
pipelines that conflict with the urgence of identifying effective therapies
during a health and economic emergency. Drug repositioning, that is the
discovery of new clinical applications for drugs already approved for different
therapeutic contexts, could provide an effective shortcut to bring COVID-19
treatments to the bedside in a timely manner. Moreover, computational
approaches can help accelerate the process even further. Here we present the
application of different software tools based on transcriptomics data to
identify drugs that are potentially able to counteract SARS-CoV-2 infection and
also to provide insights on their mode of action. We believe that HDAC
inhibitors warrant further investigation. In addition, we found that the DNA
Mismatch repair pathway is strongly modulated by drugs with experimental in
vitro activity against SARS-CoV-2 infection.
|
Alchemical theory is emerging as a promising tool in the context of molecular
dynamics simulations for drug discovery projects. In this theoretical
contribution, I revisit the statistical mechanics foundation of non covalent
interactions in drug-receptor systems, providing a unifying treatment that
encompasses the most important variants in the alchemical approaches, from the
seminal Double Annihilation Method by Jorgensen and Ravimohan [W.L. Jorgensen
and C. Ravimohan, J. Chem. Phys. 83,3050, 1985], to the Gilson's Double
Decoupling Method [M. K. Gilson and J. A. Given and B. L. Bush and J. A.
McCammon, Biophys. J. 72, 1047 1997] and the Deng and Roux alchemical theory
[Y. Deng and B. Roux, J. Chem. Theory Comput., 2, 1255 2006]. Connections and
differences between the various alchemical approaches are highlighted and
discussed, and finally placed into the broader context of nonequilibrium
thermodynamics.
| 0.860715 | 0.749259 | 0.111456 |
2004.07698
|
On a new geometric homology theory
|
In this note we present a new homology theory, we call it geometric homology
theory(or GHT for brevity). We prove that the homology groups of GHT are
isomorphic to singular homology groups, which solves a Conjecture of Voronov.
GHT has several nice properties compared with singular homology, making it more
suitable than singular homology in some situations, especially in chain-level
theories. We will develop further of this theory in our sequel paper.
|
This note discusses recent new approaches to studying flopping curves on
3-folds. In a joint paper, the author and Michael Wemyss introduced a 3-fold
invariant, the contraction algebra, which may be associated to such curves. It
characterises their geometric and homological properties in a unified manner,
using the theory of noncommutative deformations. Toda has now clarified the
enumerative significance of the contraction algebra for flopping curves,
calculating its dimension in terms of Gopakumar-Vafa invariants. Before
reviewing these results, and others, I give a brief introduction to the rich
geometry of flopping curves on 3-folds, starting from the resolutions of
Kleinian surface singularities. This is based on a talk given at VBAC 2014 in
Berlin.
| 0.89831 | 0.780271 | 0.11804 |
2004.07699
|
Predictive Whole-Body Control of Humanoid Robot Locomotion
|
Humanoid robots are machines built with an anthropomorphic shape. Despite
decades of research into the subject, it is still challenging to tackle the
robot locomotion problem from an algorithmic point of view. For example, these
machines cannot achieve a constant forward body movement without exploiting
contacts with the environment. The reactive forces resulting from the contacts
are subject to strong limitations, complicating the design of control laws. As
a consequence, the generation of humanoid motions requires to exploit fully the
mathematical model of the robot in contact with the environment or to resort to
approximations of it.
This thesis investigates predictive and optimal control techniques for
tackling humanoid robot motion tasks. They generate control input values from
the system model and objectives, often transposed as cost function to minimize.
In particular, this thesis tackles several aspects of the humanoid robot
locomotion problem in a crescendo of complexity. First, we consider the single
step push recovery problem. Namely, we aim at maintaining the upright posture
with a single step after a strong external disturbance. Second, we generate and
stabilize walking motions. In addition, we adopt predictive techniques to
perform more dynamic motions, like large step-ups.
The above-mentioned applications make use of different simplifications or
assumptions to facilitate the tractability of the corresponding motion tasks.
Moreover, they consider first the foot placements and only afterward how to
maintain balance. We attempt to remove all these simplifications. [continued]
|
This work presents approaches for the estimation of quantities important for
the control of the momentum of a humanoid robot. In contrast to previous
approaches which use simplified models such as the Linear Inverted Pendulum
Model, we present estimators based on the momentum dynamics of the robot. By
using this simple yet dynamically-consistent model, we avoid the issues of
using simplified models for estimation. We develop an estimator for the center
of mass and full momentum which can be reformulated to estimate center of mass
offsets as well as external wrenches applied to the robot. The observability of
these estimators is investigated and their performance is evaluated in
comparison to previous approaches.
| 0.857286 | 0.783501 | 0.073785 |
2004.07700
|
Generalizability issues with deep learning models in medicine and their
potential solutions: illustrated with Cone-Beam Computed Tomography (CBCT) to
Computed Tomography (CT) image conversion
|
Generalizability is a concern when applying a deep learning (DL) model
trained on one dataset to other datasets. Training a universal model that works
anywhere, anytime, for anybody is unrealistic. In this work, we demonstrate the
generalizability problem, then explore potential solutions based on transfer
learning (TL) by using the cone-beam computed tomography (CBCT) to computed
tomography (CT) image conversion task as the testbed. Previous works have
converted CBCT to CT-like images. However, all of those works studied only one
or two anatomical sites and used images from the same vendor's scanners. Here,
we investigated how a model trained for one machine and one anatomical site
works on other machines and other sites. We trained a model on CBCT images
acquired from one vendor's scanners for head and neck cancer patients and
applied it to images from another vendor's scanners and for other disease
sites. We found that generalizability could be a significant problem for this
particular application when applying a trained DL model to datasets from
another vendor's scanners. We then explored three practical solutions based on
TL to solve this generalization problem: the target model, which is trained on
a target domain from scratch; the combined model, which is trained on both
source and target domain datasets from scratch; and the adapted model, which
fine-tunes the trained source model to a target domain. We found that when
there are sufficient data in the target domain, all three models can achieve
good performance. When the target dataset is limited, the adapted model works
the best, which indicates that using the fine-tuning strategy to adapt the
trained model to an unseen target domain dataset is a viable and easy way to
implement DL models in the clinic.
|
In Europe the 20% of the CT scans cover the thoracic region. The acquired
images contain information about the cardiovascular system that often remains
latent due to the lack of contrast in the cardiac area. On the other hand, the
contrast enhanced computed tomography (CECT) represents an imaging technique
that allows to easily assess the cardiac chambers volumes and the contrast
dynamics. With this work we aim to face the problem of extraction and
presentation of these latent information, using a deep learning approach with
convolutional neural networks. Starting from the extraction of relevant
features from the image without contrast medium, we try to re-map them on
features typical of CECT, to synthesize an image characterized by an
attenuation in the cardiac chambers as if a virtually iodine contrast medium
was injected. The purposes are to guarantee an estimation of the left cardiac
chambers volume and to perform an evaluation of the contrast dynamics. Our
approach is based on a deconvolutional network trained on a set of 120 patients
who underwent both CT acquisitions in the same contrastographic arterial phase
and the same cardiac phase. To ensure a reliable predicted CECT image, in terms
of values and morphology, a custom loss function is defined by combining an
error function to find a pixel-wise correspondence, which takes into account
the similarity in term of Hounsfield units between the input and output images
and by a cross-entropy computed on the binarized versions of the synthesized
and of the real CECT image. The proposed method is finally tested on 20
subjects.
| 0.919194 | 0.773253 | 0.145941 |
2004.07701
|
$\Sigma^{+}$ and $\bar{\Sigma}^-$ polarization in the $J/\psi$ and
$\psi(3686)$ decays
|
From $1310.6\times10^{6}$ $J/\psi$ and $448.1\times10^{6}$ $\psi(3686)$
events collected with the BESIII experiment, we report the first observation of
$\Sigma^{+}$ and $\bar{\Sigma}^{-}$ spin polarization in $e^+e^-\rightarrow
J/\psi (\psi(3686)) \rightarrow \Sigma^{+} \bar{\Sigma}^{-}$ decays. The
relative phases of the form factors $\Delta\Phi$ have been measured to be
$(-15.5\pm0.7\pm0.5)^{\circ}$ and $(21.7\pm4.0\pm0.8)^{\circ}$ with $J/\psi$
and $\psi(3686)$ data, respectively. The non-zero value of $\Delta\Phi$ allows
for a direct and simultaneous measurement of the decay asymmetry parameters of
$\Sigma^{+}\rightarrow p \pi^{0}~(\alpha_0 = -0.998\pm0.037\pm0.009)$ and
$\bar{\Sigma}^{-}\rightarrow \bar{p} \pi^{0}~(\bar{\alpha}_0 =
0.990\pm0.037\pm0.011)$, the latter value being determined for the first time.
The average decay asymmetry, $(\alpha_{0} - \bar{\alpha}_{0})/2$, is calculated
to be $-0.994\pm0.004\pm0.002$. The CP asymmetry $A_{\rm CP,\Sigma} = (\alpha_0
+ \bar{\alpha}_0)/(\alpha_0 - \bar{\alpha}_0) = -0.004\pm0.037\pm0.010$ is
extracted for the first time, and is found to be consistent with CP
conservation.
|
It has been suggested that the suppression of $J/\psi$ production in heavy
nuclei is a signature of the formation of quark-gluon plasma. We here show that
this phenomenon can be understood in terms of conventional physics, {\it i.e.}
{\it i)} perturbative QCD, {\it ii)} the parton recombination implementation of
shadowing in the initial state, and {\it iii)} final state interactions with
the hadronic debris of the nuclear target. Unlike previous calculations we
include both the direct $J/\psi$ production and its production via radiative
$\chi$ decays ($\chi_J \to J/\psi + \gamma$). We are able to reproduce the
experimental data including their small-$x$ behavior. We emphasize the
importance of studying the $x_2$-dependence of the ratio $\sigma(b A)/\sigma(b
N)$, where $b$ designates the beam and $x_2$ is the momentum fraction of the
parton from the nuclear target.
| 0.901457 | 0.756308 | 0.14515 |
2004.07702
|
Molecular modeling of aqueous electrolytes at interfaces: effects of
long-range dispersion forces and ionic charge rescaling
|
Molecular dynamics simulations generally rely on empirical force fields. For
aqueous electrolytes, force fields using rescaled ionic charges (electronic
continuum correction, ECC), possibly complemented with rescaling of Van der
Waals parameters (electronic continuum correction rescaled, ECCR), show
promising results in bulk, but their performance at interfaces has been less
explored. Here we show that both truncation of dispersion forces and the ionic
charge rescaling factor have a non-trivial impact on the measured surface
tension and on the interfacial structure. These results suggest that the
molecular modeling of aqueous electrolytes at interfaces would benefit from
using long-range solvers for dispersion forces, and from using the ECCR method,
where the charge rescaling factor should be chosen to correct long-range
electrostatic interactions.
|
Solid polymer electrolytes are considered a promising alternative to
traditional liquid electrolytes in energy storage applications because of their
good mechanical properties, and excellent thermal and chemical stability. A
gap, however, still exists in understanding ion transport mechanisms and
improving ion transport in solid polymer electrolytes. Therefore, it is crucial
to bridge composition--structure and structure--property relationships. Here we
demonstrate that size asymmetry, $\lambda$, represented by the ratio of
counterion to charged monomer size, plays a key role in both the nanostructure
and in the ionic dynamics. More specifically, when the nanostructure is
modified by the external electric field such that the mobility cannot be
described by linear response theory, two situations arise. The ionic mobility
increases as $\lambda$ decreases (small counterions) in the weak electrostatics
(high dielectric constant) regime. Whereas in systems with strong electrostatic
interactions, ionomers with higher size symmetry ($\lambda \approx 1$) display
higher ionic mobility. Moreover, ion transport is found to be dominated by the
hopping of the ions and not by moving ionic clusters (also known as
"vehicular'' charge transport). These results serve as a guide for designing
ion-containing polymers for ion transport related applications.
| 0.926601 | 0.776734 | 0.149867 |
2004.07703
|
Unsupervised Intra-domain Adaptation for Semantic Segmentation through
Self-Supervision
|
Convolutional neural network-based approaches have achieved remarkable
progress in semantic segmentation. However, these approaches heavily rely on
annotated data which are labor intensive. To cope with this limitation,
automatically annotated data generated from graphic engines are used to train
segmentation models. However, the models trained from synthetic data are
difficult to transfer to real images. To tackle this issue, previous works have
considered directly adapting models from the source data to the unlabeled
target data (to reduce the inter-domain gap). Nonetheless, these techniques do
not consider the large distribution gap among the target data itself
(intra-domain gap). In this work, we propose a two-step self-supervised domain
adaptation approach to minimize the inter-domain and intra-domain gap together.
First, we conduct the inter-domain adaptation of the model; from this
adaptation, we separate the target domain into an easy and hard split using an
entropy-based ranking function. Finally, to decrease the intra-domain gap, we
propose to employ a self-supervised adaptation technique from the easy to the
hard split. Experimental results on numerous benchmark datasets highlight the
effectiveness of our method against existing state-of-the-art approaches. The
source code is available at https://github.com/feipan664/IntraDA.git.
|
Segmenting aerial images is being of great potential in surveillance and
scene understanding of urban areas. It provides a mean for automatic reporting
of the different events that happen in inhabited areas. This remarkably
promotes public safety and traffic management applications. After the wide
adoption of convolutional neural networks methods, the accuracy of semantic
segmentation algorithms could easily surpass 80% if a robust dataset is
provided. Despite this success, the deployment of a pre-trained segmentation
model to survey a new city that is not included in the training set
significantly decreases the accuracy. This is due to the domain shift between
the source dataset on which the model is trained and the new target domain of
the new city images. In this paper, we address this issue and consider the
challenge of domain adaptation in semantic segmentation of aerial images. We
design an algorithm that reduces the domain shift impact using Generative
Adversarial Networks (GANs). In the experiments, we test the proposed
methodology on the International Society for Photogrammetry and Remote Sensing
(ISPRS) semantic segmentation dataset and found that our method improves the
overall accuracy from 35% to 52% when passing from Potsdam domain (considered
as source domain) to Vaihingen domain (considered as target domain). In
addition, the method allows recovering efficiently the inverted classes due to
sensor variation. In particular, it improves the average segmentation accuracy
of the inverted classes due to sensor variation from 14% to 61%.
| 0.902387 | 0.787739 | 0.114649 |
2004.07704
|
Bourgain-Brezis-Mironescu Domains
|
Bourgain et al.(2001) proved that for $p>1$ and smooth bounded domain
$\Omega\subseteq\mathbb{R}^N$, \begin{equation*} \lim\limits_{s\to1}(1-s)\iint
\limits_{\Omega \times \Omega}\frac{\lvert f(x)-f(y) \rvert^p}{\lvert x-y
\rvert^{N+sp}}dx dy=\kappa \int \limits_{\Omega}\lvert \nabla f(x) \rvert^p dx
\end{equation*} for all $f\in L^p(\Omega)$. This gives a characterization of
$W^{1,p}(\Omega)$ by means of $W^{s,p}(\Omega)$ seminorms only. For the case
$p=1$, D\'avila(2002) proved that when $\Omega$ is a bounded domain with
Lipschitz boundary, \begin{equation*} \lim\limits_{s\to1}(1-s)\iint
\limits_{\Omega \times \Omega}\frac{\lvert f(x)-f(y) \rvert}{\lvert x-y
\rvert^{N+s}}dx dy=\kappa [f]_{BV(\Omega)} \end{equation*} for all $f\in
L^1(\Omega)$. This characterizes $BV(\Omega)$ in terms of $W^{s,1}(\Omega)$
seminorm. In this paper we extend the first result and partially extend the
second result to extension domains.
|
A new range of uniform $L^p$ resolvent estimates is obtained in the setting
of the flat torus, improving previous results of Bourgain, Shao, Sogge and Yao.
The arguments rely on the $\ell^2$-decoupling theorem and multidimensional Weyl
sum estimates.
| 0.744316 | 0.674259 | 0.070057 |
2004.07705
|
Asymmetric dark matter from semi-annihilation
|
We show that a general semi-annihilation scenario, in which a pair of dark
matter (DM) particles annihilate to an anti-DM, and an unstable state that can
mix with or decay to standard model states, can lead to particle anti-particle
asymmetry in the DM sector. The present DM abundance, including the
CP-violation in the DM sector and the resulting present asymmetry are
determined entirely by a single semi-annihilation process at next-to-leading
order. For large CP-violation in this process, we find that a nearly complete
asymmetry can be obtained in the DM sector, with the observed DM density being
dominated by the (anti-)DM particle. The presence of additional
pair-annihilation processes can modify the ratio of DM and anti-DM number
densities further, if the pair-annihilation is active subsequent to the
decoupling of the semi-annihilation. For such a scenario, the required
CP-violation for generating the same present asymmetry is generically much
smaller, as compared to the scenario with only semi-annihilation present. We
show that a minimal model with a complex scalar DM with cubic self-interactions
can give rise to both semi- and pair-annihilations, with the required
CP-violation generated at one-loop level. We also find that the upper bound on
the DM mass from S-matrix unitarity in the purely asymmetric semi-annihilation
scenario, with maximal CP-violation, is around 15 GeV, which is much stronger
than in the WIMP and previously considered asymmetric DM cases, due to the
required large non-zero chemical potential for such asymmetric DM.
|
Recent measurements of cosmic-ray electron and positron fluxes by PAMELA and
ATIC experiments may indicate the existence of annihilating dark matter with
large annihilation cross section. We discuss its possible relation to other
astrophysical/cosmological observations : gamma-rays, neutrinos, and big-bang
nucleosynthesis. It is shown that they give stringent constraints on some
annihilating dark matter models.
| 0.880726 | 0.773061 | 0.107665 |
2004.07706
|
Marching on a rugged landscape: universality in disordered asymmetric
exclusion processes
|
We develop the hydrodynamic theory for number conserving asymmetric exclusion
processes with short-range random quenched disordered hopping rates. We show
that when the system is away from half-filling, the spatio-temporal scaling of
the density fluctuations is indistinguishable from its pure counterpart, with
the associated scaling exponents belonging to the one-dimensional Kardar-
Parisi-Zhang universality class. In contrast, close to half-filling, the
scaling exponents take different values, indicating the relevance of the
quenched disorder and the emergence of a new universality class.
|
We describe a resolvent-type method for estimating time integrals of
time-dependent functionals of general right processes in equilibrium and apply
this result in the case of weakly asymmetric one-dimensional simple exclusion
showing a weak form of a replacement lemma for quadratic fluctuations.
| 0.887857 | 0.769328 | 0.118528 |
2004.07707
|
Analyzing Reinforcement Learning Benchmarks with Random Weight Guessing
|
We propose a novel method for analyzing and visualizing the complexity of
standard reinforcement learning (RL) benchmarks based on score distributions. A
large number of policy networks are generated by randomly guessing their
parameters, and then evaluated on the benchmark task; the study of their
aggregated results provide insights into the benchmark complexity. Our method
guarantees objectivity of evaluation by sidestepping learning altogether: the
policy network parameters are generated using Random Weight Guessing (RWG),
making our method agnostic to (i) the classic RL setup, (ii) any learning
algorithm, and (iii) hyperparameter tuning. We show that this approach isolates
the environment complexity, highlights specific types of challenges, and
provides a proper foundation for the statistical analysis of the task's
difficulty. We test our approach on a variety of classic control benchmarks
from the OpenAI Gym, where we show that small untrained networks can provide a
robust baseline for a variety of tasks. The networks generated often show good
performance even without gradual learning, incidentally highlighting the
triviality of a few popular benchmarks.
|
In this paper we argue for the fundamental importance of the value
distribution: the distribution of the random return received by a reinforcement
learning agent. This is in contrast to the common approach to reinforcement
learning which models the expectation of this return, or value. Although there
is an established body of literature studying the value distribution, thus far
it has always been used for a specific purpose such as implementing risk-aware
behaviour. We begin with theoretical results in both the policy evaluation and
control settings, exposing a significant distributional instability in the
latter. We then use the distributional perspective to design a new algorithm
which applies Bellman's equation to the learning of approximate value
distributions. We evaluate our algorithm using the suite of games from the
Arcade Learning Environment. We obtain both state-of-the-art results and
anecdotal evidence demonstrating the importance of the value distribution in
approximate reinforcement learning. Finally, we combine theoretical and
empirical evidence to highlight the ways in which the value distribution
impacts learning in the approximate setting.
| 0.892302 | 0.792712 | 0.09959 |
2004.07708
|
Pockels Soliton Microcomb
|
Kerr soliton microcombs have recently emerged as a prominent topic in
integrated photonics and enabled new horizons for optical frequency metrology.
Kerr soliton microcombs, as its name suggests, are based on the high-order
cubic optical nonlinearity. It is desirable to exploit quadratic photonic
materials, namely Pockels materials, for soliton generation and on-chip
implementation of 1f-2f comb self-referencing. Such quadratically-driven
solitons have been theoretically proposed, but have not yet been observed in a
nanophotonic platform despite of recent progresses in quadratic comb generation
in free-space and crystalline resonators. Here we report photonic chip-based
Pockels microcomb solitons driven by three-wave mixing in an aluminum nitride
microring resonator. In contrast to typical Kerr solitons, our Pockels soliton
features unity soliton generation fidelity, two-by-two annihilation of
multi-soliton states, favorable tuning dynamics, and high pump-to-soliton
conversion efficiency.
|
We obtain the exact nontopological soliton lattice solutions of the
Associated Lam\'e equation in different parameter regimes and compute the
corresponding energy for each of these solutions. We show that in specific
limits these solutions give rise to nontopological (pulse-like) single
solitons, as well as to different types of topological (kink-like) single
soliton solutions of the Associated Lam\'e equation. Following Manton, we also
compute, as an illustration, the asymptotic interaction energy between these
soliton solutions in one particular case. Finally, in specific limits, we
deduce the soliton lattices, as well as the topological single soliton
solutions of the Lam\'e equation, and also the sine-Gordon soliton solution.
| 0.895625 | 0.758724 | 0.136902 |
2004.07709
|
Late-time decaying dark matter: constraints and implications for the
$H_0$-tension
|
We constrain and update the bounds on the life-time of a decaying dark matter
model with a warm massive daughter particle using the most recent low-redshift
probes. We use Supernovae Type-Ia, Baryon Acoustic Oscillations and the time
delay measurements of gravitationally lensed quasars. These data sets are
complemented by the early universe priors taken from the Cosmic Microwave
background. For the maximum allowed fraction of the relativistic daughter
particle, the updated bounds on the life-time are found to be $\tau > 9\,
\rm{Gyr}$ and $\tau >11\,\rm{Gyr}$ at $95\%$ C.L., for the two-body and
many-body decay scenarios, respectively. We also comment on the recent proposal
that the current two-body decaying dark matter model can provide resolution for
the $H_0$-tension, by contrasting against the standard $\Lambda$CDM model. We
infer that the current dark matter decaying scenario is unlikely to alleviate
the $H_0$-tension. We find that the decaying dark matter is able to reduce the
trend of the decreasing $H_0$ values with increasing lens redshifts observed in
the strong lensing dataset.
|
We investigate a string-inspired dark energy scenario featuring a scalar
field with a coupling to the Gauss-Bonnet invariant. Such coupling can trigger
the onset of late dark energy domination after a scaling matter era. The
universe may then cross the phantom divide and perhaps also exit from the
acceleration. We discuss extensively the cosmological and astrophysical
implications of the coupled scalar field. Data from the Solar system,
supernovae Ia, cosmic microwave background radiation, large scale structure and
big bang nucleosynthesis is used to constrain the parameters of the model. A
good Newtonian limit may require to fix the coupling. With all the data
combined, there appears to be some tension with the nucleosynthesis bound, and
the baryon oscillation scale seems to strongly disfavor the model. These
possible problems might be overcome in more elaborate models. In addition, the
validity of these constraints in the present context is not strictly
established. Evolution of fluctuations in the scalar field and their impact to
clustering of matter is studied in detail and more model-independently. Small
scale limit is derived for the perturbations and their stability is addressed.
A divergence is found and discussed. The general equations for scalar
perturbations are also presented and solved numerically, confirming that the
Gauss-Bonnet coupling can be compatible with the observed spectrum of cosmic
microwave background radiation as well as the matter power spectrum inferred
from large scale surveys.
| 0.869737 | 0.762016 | 0.107721 |
2004.07710
|
Quantum circuit synthesis using Householder transformations
|
The synthesis of a quantum circuit consists in decomposing a unitary matrix
into a series of elementary operations. In this paper, we propose a circuit
synthesis method based on the QR factorization via Householder transformations.
We provide a two-step algorithm: during the first step we exploit the specific
structure of a quantum operator to compute its QR factorization, then the
factorized matrix is used to produce a quantum circuit. We analyze several
costs (circuit size and computational time) and compare them to existing
techniques from the literature. For a final quantum circuit twice as large as
the one obtained by the best existing method, we accelerate the computation by
orders of magnitude.
|
We introduce ProjectQ, an open source software effort for quantum computing.
The first release features a compiler framework capable of targeting various
types of hardware, a high-performance simulator with emulation capabilities,
and compiler plug-ins for circuit drawing and resource estimation. We introduce
our Python-embedded domain-specific language, present the features, and provide
example implementations for quantum algorithms. The framework allows testing of
quantum algorithms through simulation and enables running them on actual
quantum hardware using a back-end connecting to the IBM Quantum Experience
cloud service. Through extension mechanisms, users can provide back-ends to
further quantum hardware, and scientists working on quantum compilation can
provide plug-ins for additional compilation, optimization, gate synthesis, and
layout strategies.
| 0.906735 | 0.770026 | 0.136709 |
2004.07711
|
Knowledge Distillation for Action Anticipation via Label Smoothing
|
Human capability to anticipate near future from visual observations and
non-verbal cues is essential for developing intelligent systems that need to
interact with people. Several research areas, such as human-robot interaction
(HRI), assisted living or autonomous driving need to foresee future events to
avoid crashes or help visually impaired people. Such challenging task requires
to capture and understand the underlying structure of the analyzed domain in
order to reduce prediction uncertainty. Since the action anticipation task can
be seen as a multi-label problem with missing labels, we design and extend the
idea of label smoothing extracting semantics from the target labels. We show
that such generalization is equivalent to considering a knowledge distillation
framework where a teacher injects useful semantic information into the model
during training. In our experiments, we implement a multi-modal framework based
on long short-term memory (LSTM) networks to anticipate future actions which is
able to summarise past observations while making predictions of the future at
different time steps. To validate our soft labeling procedure we perform
extensive experiments on the egocentric EPIC-Kitchens dataset which includes
more than 2500 action classes. The experiments show that label smoothing
systematically improves performance of state-of-the-art models.
|
A new label smoothing method that makes use of prior knowledge of a language
at human level, homophone, is proposed in this paper for automatic speech
recognition (ASR). Compared with its forerunners, the proposed method uses
pronunciation knowledge of homophones in a more complex way. End-to-end ASR
models that learn acoustic model and language model jointly and modelling units
of characters are necessary conditions for this method. Experiments with hybrid
CTC sequence-to-sequence model show that the new method can reduce character
error rate (CER) by 0.4% absolutely.
| 0.885178 | 0.680214 | 0.204964 |
2004.07712
|
Ergodicity effects on transport-diffusion equations with localized
damping
|
The main objective of this paper is to study the time decay of
transport-diffusion equation with inhomogeneous localized damping in the
multi-dimensional torus. The drift is governed by an autonomous Lipschitz
vector field and the diffusion by the standard heat equation with small
viscosity parameter $\nu$. In the first part we deal with the inviscid case and
show some results on the time decay of the energy using in a crucial way the
ergodicity and the unique ergodicity of the flow generated by the drift. In the
second part we analyze the same problem with small viscosity and provide quite
similar results on the exponential decay uniformly with respect to the
viscosity in some logarithmic time scaling of the \mbox{type $t\in
[0,C_0\ln(1/\nu)]$}.
|
We study the relative value iteration for the ergodic control problem under a
near-monotone running cost structure for a nondegenerate diffusion controlled
through its drift. This algorithm takes the form of a quasilinear parabolic
Cauchy initial value problem in $\RR^{d}$. We show that this Cauchy problem
stabilizes, or in other words, that the solution of the quasilinear parabolic
equation converges for every bounded initial condition in $\Cc^{2}(\RR^{d})$ to
the solution of the Hamilton--Jacobi--Bellman (HJB) equation associated with
the ergodic control problem.
| 0.860931 | 0.82967 | 0.031261 |
2004.07713
|
True 3D reconstruction in digital holography
|
We examine the nature of the 3D image as obtained by replay (or
back-propagation) of the object wave from the hologram recording plane to the
original object volume. While recording of a hologram involves transferring
information from a 3D volume to a 2D detector plane, the replay of the hologram
involves creating information in a set of 3D voxels from a much smaller number
of 2D detector pixels, which at first look appears to be surprising. We point
out that the hologram replay process is a Hermitian transpose (and not inverse)
of the hologram formation process and therefore only provides an approximation
to the original 3D object function. With the knowledge of this Hermitian
transpose property, we show how one may realize true 3D image reconstruction
via a regularized optimization algorithm. The numerical illustrations of this
optimization approach as presented here show excellent slice-by-slice
tomographic 3D reconstruction of the original object under the weak scattering
approximation. In particular, the reconstructed 3D image field has near-zero
numerical values at voxels where the original object did not exist. We note
that 3D image reconstruction of this kind cannot be achieved by the traditional
physical replay process. In this sense the proposed methodology for digital
holographic image reconstruction goes beyond numerically mimicking the
traditional film based holographic replay. The reconstruction approach may find
potential applications in a number of digital holographic imaging systems.
|
Azimuthal distributions of particles produced in nucleus-nucleus collisions
are measured with respect to an estimated reaction plane which, because of
finite multiplicity fluctuations, differs in general from the true reaction
plane. It follows that the measured distributions do not coincide with the true
ones. I propose a general method of reconstructing the Fourier coefficients of
the true azimuthal distributions from the measured ones. This analysis suggests
that the Fourier coefficients are the best observables to characterize
azimuthal anisotropies because, unlike other observables such as the in-plane
anisotropy ratio or the squeeze-out ratio, they can be reconstructed
accurately.
| 0.871941 | 0.620343 | 0.251598 |
2004.07714
|
Synthesizing quantum circuits via numerical optimization
|
We provide a simple framework for the synthesis of quantum circuits based on
a numerical optimization algorithm. This algorithm is used in the context of
the trapped-ions technology. We derive theoretical lower bounds for the number
of quantum gates required to implement any quantum algorithm. Then we present
numerical experiments with random quantum operators where we compute the
optimal parameters of the circuits and we illustrate the correctness of the
theoretical lower bounds. We finally discuss the scalability of the method with
the number of qubits.
|
We address the question of efficient implementation of quantum protocols,
with small communication and entanglement, and short depth circuit for encoding
or decoding. We introduce two new methods to achieve this, the first method
involving two new versions of convex-split lemma that use small amount of
additional resource (in comparison to prior version) and the second method
being inspired by the technique of classical correlated sampling in computer
science. These lead to a series of new consequences, as follows.
First, we consider the task of quantum decoupling, where the aim is to apply
an operation on a n-qubit register so as to make it independent of an
inaccessible quantum system. Many previous works achieve decoupling with the
aid of a random unitary. It is known that random unitaries can be replaced by
random circuits of size O(n\log n) and depth poly(\log n), or unitary 2-designs
based on Clifford circuits of similar size and depth. We show that given any
choice of basis such as the computational basis, decoupling can be achieved by
a unitary that takes basis vectors to basis vectors. Thus, the circuit acts in
a `classical' manner and additionally uses O(n) catalytic qubits in maximally
mixed quantum state. Our unitary performs addition and multiplication modulo a
prime and hence achieves a circuit size of O(n\log n) and logarithmic depth.
This shows that the circuit complexity of integer multiplication (modulo a
prime) is lower bounded by the optimal circuit complexity of decoupling.
Next, we construct a new one-shot entanglement-assisted protocol for quantum
channel coding that achieves near-optimal communication through a given
channel. The number of qubits of pre-shared entanglement is exponentially
smaller than that in the previous protocol near-optimal in communication. We
also achieve similar results for one-shot quantum state redistribution.
| 0.921929 | 0.805115 | 0.116815 |
2004.07715
|
Taxonomy of Dual Block-Coordinate Ascent Methods for Discrete Energy
Minimization
|
We consider the maximum-a-posteriori inference problem in discrete graphical
models and study solvers based on the dual block-coordinate ascent rule. We map
all existing solvers in a single framework, allowing for a better understanding
of their design principles. We theoretically show that some block-optimizing
updates are sub-optimal and how to strictly improve them. On a wide range of
problem instances of varying graph connectivity, we study the performance of
existing solvers as well as new variants that can be obtained within the
framework. As a result of this exploration we build a new state-of-the art
solver, performing uniformly better on the whole range of test instances.
|
Combining the classical theory of optimal transport with modern operator
splitting techniques, we develop a new numerical method for nonlinear, nonlocal
partial differential equations, arising in models of porous media, materials
science, and biological swarming. Using the JKO scheme, along with the
Benamou-Brenier dynamical characterization of the Wasserstein distance, we
reduce computing the solution of these evolutionary PDEs to solving a sequence
of fully discrete minimization problems, with strictly convex objective
function and linear constraint. We compute the minimizer of these fully
discrete problems by applying a recent, provably convergent primal dual
splitting scheme for three operators \cite{Yan17}. By leveraging the PDE's
underlying variational structure, our method overcomes traditional stability
issues arising from the strong nonlinearity and degeneracy, and it is also
naturally positivity preserving and entropy decreasing. Furthermore, by
transforming the traditional linear equality constraint, as has appeared in
previous work, into a linear inequality constraint, our method converges in
fewer iterations without sacrificing any accuracy. Remarkably, our method is
also massively parallelizable and thus very efficient in resolving high
dimensional problems. We prove that minimizers of the fully discrete problem
converge to minimizers of the continuum JKO problem as the discretization is
refined, and in the process, we recover convergence results for existing
numerical methods for computing Wasserstein geodesics \cite{PPO14}. Finally, we
conclude with simulations of nonlinear PDEs and Wasserstein geodesics in one
and two dimensions that illustrate the key properties of our numerical method.
| 0.77658 | 0.702608 | 0.073972 |
2004.07717
|
Digital Ariadne: Citizen Empowerment for Epidemic Control
|
The COVID-19 crisis represents the most dangerous threat to public health
since the H1N1 influenza pandemic of 1918. So far, the disease due to the
SARS-CoV-2 virus has been countered with extreme measures at national level
that attempt to suppress epidemic growth. However, these approaches require
quick adoption and enforcement in order to effectively curb virus spread, and
may cause unprecedented socio-economic impact. A viable alternative to mass
surveillance and rule enforcement is harnessing collective intelligence by
means of citizen empowerment. Mobile applications running on personal devices
could significantly support this kind of approach by exploiting
context/location awareness and data collection capabilities. In particular,
technology-assisted location and contact tracing, if broadly adopted, may help
limit the spread of infectious diseases by raising end-user awareness and
enabling the adoption of selective quarantine measures. In this paper, we
outline general requirements and design principles of personal applications for
epidemic containment running on common smartphones, and we present a tool,
called 'diAry' or 'digital Ariadne', based on voluntary location and Bluetooth
tracking on personal devices, supporting a distributed query system that
enables fully anonymous, privacy-preserving contact tracing. We look forward to
comments, feedback, and further discussion regarding contact tracing solutions
for pandemic containment.
|
According to the Center of Disease Control (CDC), the Opioid epidemic has
claimed more than 72,000 lives in the US in 2017 alone. In spite of various
efforts at the local, state and federal level, the impact of the epidemic is
becoming progressively worse, as evidenced by the fact that the number of
Opioid related deaths increased by 12.5\% between 2016 and 2017. Predictive
analytics can play an important role in combating the epidemic by providing
decision making tools to stakeholders at multiple levels - from health care
professionals to policy makers to first responders. Generating Opioid incidence
heat maps from past data, aid these stakeholders to visualize the profound
impact of the Opioid epidemic. Such post-fact creation of the heat map provides
only retrospective information, and as a result, may not be as useful for
preventive action in the current or future time-frames. In this paper, we
present a novel deep neural architecture, which learns subtle spatio-temporal
variations in Opioid incidences data and accurately predicts future heat maps.
We evaluated the efficacy of our model on two open source datasets- (i) The
Cincinnati Heroin Overdose dataset, and (ii) Connecticut Drug Related Death
Dataset.
| 0.793241 | 0.658415 | 0.134826 |
2004.07718
|
Coresets for Clustering in Excluded-minor Graphs and Beyond
|
Coresets are modern data-reduction tools that are widely used in data
analysis to improve efficiency in terms of running time, space and
communication complexity. Our main result is a fast algorithm to construct a
small coreset for k-Median in (the shortest-path metric of) an excluded-minor
graph. Specifically, we give the first coreset of size that depends only on
$k$, $\epsilon$ and the excluded-minor size, and our running time is
quasi-linear (in the size of the input graph).
The main innovation in our new algorithm is that is iterative; it first
reduces the $n$ input points to roughly $O(\log n)$ reweighted points, then to
$O(\log\log n)$, and so forth until the size is independent of $n$. Each step
in this iterative size reduction is based on the importance sampling framework
of Feldman and Langberg (STOC 2011), with a crucial adaptation that reduces the
number of \emph{distinct points}, by employing a terminal embedding (where low
distortion is guaranteed only for the distance from every terminal to all other
points). Our terminal embedding is technically involved and relies on
shortest-path separators, a standard tool in planar and excluded-minor graphs.
Furthermore, our new algorithm is applicable also in Euclidean metrics, by
simply using a recent terminal embedding result of Narayanan and Nelson, (STOC
2019), which extends the Johnson-Lindenstrauss Lemma. We thus obtain an
efficient coreset construction in high-dimensional Euclidean spaces, thereby
matching and simplifying state-of-the-art results (Sohler and Woodruff, FOCS
2018; Huang and Vishnoi, STOC 2020).
In addition, we also employ terminal embedding with additive distortion to
obtain small coresets in graphs with bounded highway dimension, and use
applications of our coresets to obtain improved approximation schemes, e.g., an
improved PTAS for planar k-Median via a new centroid set.
|
The classical Hadwiger conjecture dating back to 1940's states that any graph
of chromatic number at least $r$ has the clique of order $r$ as a minor.
Hadwiger's conjecture is an example of a well studied class of problems asking
how large a clique minor one can guarantee in a graph with certain
restrictions. One problem of this type asks what is the largest size of a
clique minor in a graph on $n$ vertices of independence number $\alpha(G)$ at
most $r$. If true Hadwiger's conjecture would imply the existence of a clique
minor of order $n/\alpha(G)$. Results of Kuhn and Osthus and Krivelevich and
Sudakov imply that if one assumes in addition that $G$ is $H$-free for some
bipartite graph $H$ then one can find a polynomially larger clique minor. This
has recently been extended to triangle free graphs by Dvo\v{r}\'ak and
Yepremyan, answering a question of Norin. We complete the picture and show that
the same is true for arbitrary graph $H$, answering a question of Dvo\v{r}\'ak
and Yepremyan. In particular, we show that any $K_s$-free graph has a clique
minor of order $c_s(n/\alpha(G))^{1+\frac{1}{10(s-2) }}$, for some constant
$c_s$ depending only on $s$. The exponent in this result is tight up to a
constant factor in front of the $\frac{1}{s-2}$ term.
| 0.845622 | 0.71328 | 0.132342 |
2004.07719
|
Terahertz Conductivity of Heavy-fermion Systems from Time-resolved
Spectroscopy
|
The Drude model describes the free-electron conduction in simple metals,
governed by the freedom that the mobile electrons have within the material. In
strongly correlated systems, however, a significant deviation of the optical
conductivity from the simple metallic Drude behavior is observed. Here, we
investigate the optical conductivity of the heavy-fermion system
CeCu$_{\mathrm{6-x}}$Au$_{\mathrm{x}}$, using time-resolved, phase-sensitive
terahertz spectroscopy. Terahertz electric field creates two types of
excitations in heavy-fermion materials: First, the intraband excitations that
leave the heavy quasiparticles intact. Second, the resonant interband
transitions between the heavy and light parts of the hybridized conduction band
that break the Kondo singlet. We find that the Kondo-singlet breaking interband
transitions do not create a Drude peak, while the Kondo-retaining intraband
excitations yield the expected Drude response; thus, making it possible to
separate these two fundamentally different correlated contributions to the
optical conductivity.
|
Replacing a magnetic atom by a spinless atom in a heavy fermion compound
generates a quantum state often referred to as a 'Kondo-hole'. No experimental
imaging has been achieved of the atomic-scale electronic structure of a
Kondo-hole, or of their destructive impact (Lawrence JM, et al. (1996) Kondo
hole behavior in Ce0. 97La0. 03Pd3. Phys Rev B 53:12559-12562; Bauer ED, et al.
(2011) Electronic inhomogeneity in a Kondo lattice. Proc Natl Acad Sci.
108:6857-6861) on the hybridization process between conduction and localized
electrons which generates the heavy fermion state. Here we report visualization
of the electronic structure at Kondo-holes created by substituting spinless
Thorium atoms for magnetic Uranium atoms in the heavy-fermion system URu2Si2.
At each Thorium atom, an electronic bound state is observed. Moreover,
surrounding each Thorium atom we find the unusual modulations of hybridization
strength recently predicted to occur at Kondo-holes (Figgins J, Morr DK (2011)
Defects in heavy-fermion materials: unveiling strong correlations in real
space. Phys Rev Lett 107:066401). Then, by introducing the 'hybridization
gapmap' technique to heavy fermion studies, we discover intense nanoscale
heterogeneity of hybridization due to a combination of the randomness of
Kondo-hole sites and the long-range nature of the hybridization oscillations.
These observations provide direct insight into both the microscopic processes
of heavy-fermion forming hybridization and the macroscopic effects of
Kondo-hole doping.
| 0.878689 | 0.763285 | 0.115404 |
2004.07720
|
Accurate single- and double-differential resummation of colour-singlet
processes with MATRIX+RadISH: $W^+W^-$ production at the LHC
|
We present the combination of fully differential cross sections for
colour-singlet production processes at next-to-next-to-leading order (NNLO) QCD
obtained with MATRIX and all-order resummation through RadISH. This interface
allows us to achieve unprecedented accuracy for various transverse observables
in $2 \rightarrow 2$ production processes. As an important application we
consider $W^+ W^-$ production at the LHC, more precisely the full leptonic
process $pp\to \ell^+\ell^{\prime\, -}\nu_{\ell}{\bar\nu}_{\ell^\prime}+X$ with
$\ell'\neq\ell$, and we present resummed predictions for differential
distributions in presence of fiducial selection cuts. In particular, we resum
the transverse-momentum spectrum of the $W^+ W^-$ pair at
next-to-next-to-next-to-leading logarithmic (N$^3$LL) accuracy and match it to
the integrated NNLO cross section. The transverse-momentum spectrum of the
leading jet in $W^+ W^-$ production is calculated at NNLO+NNLL accuracy.
Finally, the joint resummation for the transverse-momentum spectrum of the $W^+
W^-$ pair in the presence of a jet veto is performed at NNLO+NNLL. Our
phenomenological study highlights the importance of higher-order perturbative
and logarithmic corrections for precision phenomenology at the LHC.
|
The measurement of a charge asymmetry in t tbar production at LHC constitutes
more than an independent confirmation of the forward-backward asymmetry found
at Tevatron. Indeed, both measurements together can be used to identify the
source of the asymmetry. This is demonstrated for the case of new Z', W' vector
bosons and colour-sextet and triplet scalars, exchanged in t, u channels
respectively, and a very heavy axigluon in the s channel.
| 0.896848 | 0.750285 | 0.146563 |
2004.07721
|
Resource Efficient Chemistry on Quantum Computers with the Variational
Quantum Eigensolver and The Double Unitary Coupled-Cluster approach
|
Applications of quantum simulation algorithms to obtain electronic energies
of molecules on noisy intermediate-scale quantum (NISQ) devices require careful
consideration of resources describing the complex electron correlation effects.
In modeling second-quantized problems, the biggest challenge confronted is that
the number of qubits scales linearly with the size of molecular basis. This
poses a significant limitation on the size of the basis sets and the number of
correlated electrons included in quantum simulations of chemical processes. To
address this issue and to enable more realistic simulations on NISQ computers,
we employ the double unitary coupled-cluster (DUCC) method to effectively
downfold correlation effects into the reduced-size orbital space, commonly
referred to as the active space. Using downfolding techniques, we demonstrate
that properly constructed effective Hamiltonians can capture the effect of the
whole orbital space in small-size active spaces. Combining the downfolding
pre-processing technique with the Variational Quantum Eigensolver, we solve for
the ground-state energy of $\text{H}_2$ and $\text{Li}_2$ in the cc-pVTZ basis
using the DUCC-reduced active spaces. We compare these results to full
configuration-interaction and high-level coupled-cluster reference
calculations.
|
The solution of eigenproblems is often a key computational bottleneck that
limits the tractable system size of numerical algorithms, among them electronic
structure theory in chemistry and in condensed matter physics. Large
eigenproblems can easily exceed the capacity of a single compute node, thus
must be solved on distributed-memory parallel computers. We here present
GPU-oriented optimizations of the ELPA two-stage tridiagonalization eigensolver
(ELPA2). On top of its existing cuBLAS-based GPU offloading, we add a CUDA
kernel to speed up the back-transformation of eigenvectors, which can be the
computationally most expensive part of the two-stage tridiagonalization
algorithm. We demonstrate the performance of this GPU-accelerated eigensolver
by benchmark calculations on two hybrid CPU-GPU architectures, namely a compute
cluster based on Intel Xeon Gold CPUs and NVIDIA Volta GPUs, and the Summit
supercomputer based on IBM POWER9 CPUs and NVIDIA Volta GPUs. Consistent with
previous benchmarks on CPU-only architectures, the GPU-accelerated two-stage
solver exhibits a parallel performance superior to the one-stage solver.
| 0.825144 | 0.763885 | 0.061259 |
2004.07723
|
Covid Notions: Towards Formal Definitions -- and Documented
Understanding -- of Privacy Goals and Claimed Protection in Proximity-Tracing
Services
|
The recent SARS-CoV-2 pandemic gave rise to management approaches using
mobile apps for contact tracing. The corresponding apps track individuals and
their interactions, to facilitate alerting users of potential infections well
before they become infectious themselves. Naive implementation obviously
jeopardizes the privacy of health conditions, location, activities, and social
interaction of its users. A number of protocol designs for colocation tracking
have already been developed, most of which claim to function in a privacy
preserving manner. However, despite claims such as "GDPR compliance",
"anonymity", "pseudonymity" or other forms of "privacy", the authors of these
designs usually neglect to precisely define what they (aim to) protect. We make
a first step towards formally defining the privacy notions of proximity tracing
services, especially with regards to the health, (co-)location, and social
interaction of their users. We also give a high-level intuition of which
protection the most prominent proposals can and cannot achieve. This initial
overview indicates that all proposals include some centralized services, and
none protects identity and (co-)locations of infected users perfectly from both
other users and the service provider.
|
Location-Based Services (LBSs) build upon geographic information to provide
users with location-dependent functionalities. In such a context, it is
particularly important that geographic locations claimed by users are
trustworthy. Centralized verification approaches proposed in the last few years
are not satisfactory, as they entail a high risk to the privacy of users. In
this paper, we present and evaluate a novel decentralized,
infrastructure-independent proof-of-location scheme based on blockchain
technology. Our scheme guarantees both location trustworthiness and user
privacy preservation.
| 0.864946 | 0.748001 | 0.116945 |
2004.07724
|
Mean Number and Number Variance of Squeezed Coherent Photons In a
Thermal State of Photons
|
We consider the equilibrium thermal state of photons and determine the mean
number and number variance of squeezed coherent photons. We use an integral
representation for electro-magnetic radiation applicable both to systems in
equilibrium and to systems in nonequilibrium to determine the spectral function
of the radiation. The system considered is in thermal equilibrium and we find
that the squeezed coherent photons are at a higher temperature than the photons
themselves. Also, as expected, the mean number of squeezed coherent photons is
greater than that of photons.
|
The electromagnetic field inside a spherical cavity of large radius R is
considered in the presence of stationary charge and current densities. R
provides infra-red regularization while maintaining gauge invariance. The
quantum ground state of physical photons forming the magnetic field is found to
be a coherent state with a definite mean occupation number. The electric field,
which is determined by the Gauss law constraint, is maintained by a minimum
uncertainty coherent state, according to the projection operator approach to
the quantization of constrained systems. The mean occupation number of this
state is proportional to the square of the total charge. The results confirm
formulae obtained previously from a calculation with a finite photon mass for
infra-red regularization.
| 0.927042 | 0.818621 | 0.108421 |
2004.07725
|
Functional SAC model: With application to spatial econometrics
|
Spatial autoregressive combined (SAC) model has been widely studied in the
literature for the analysis of spatial data in various areas such as geography,
economics, demography, regional sciences. This is a linear model with scalar
response, scalar explanatory variables and which allows for spatial
interactions in the dependent variable and the disturbances. In this work we
extend this modeling approach from scalar to functional covariate. The
parameters of the model are estimated via the maximum likelihood estimation
method. A simulation study is conducted to evaluate the performance of the
proposed methodology. As an illustration, the model is used to establish the
relationship between unemployment and illiteracy in Senegal.
|
Learning about cause and effect is arguably the main goal in applied
econometrics. In practice, the validity of these causal inferences is
contingent on a number of critical assumptions regarding the type of data that
has been collected and the substantive knowledge that is available. For
instance, unobserved confounding factors threaten the internal validity of
estimates, data availability is often limited to non-random, selection-biased
samples, causal effects need to be learned from surrogate experiments with
imperfect compliance, and causal knowledge has to be extrapolated across
structurally heterogeneous populations. A powerful causal inference framework
is required to tackle these challenges, which plague most data analysis to
varying degrees. Building on the structural approach to causality introduced by
Haavelmo (1943) and the graph-theoretic framework proposed by Pearl (1995), the
artificial intelligence (AI) literature has developed a wide array of
techniques for causal learning that allow to leverage information from various
imperfect, heterogeneous, and biased data sources (Bareinboim and Pearl, 2016).
In this paper, we discuss recent advances in this literature that have the
potential to contribute to econometric methodology along three dimensions.
First, they provide a unified and comprehensive framework for causal inference,
in which the aforementioned problems can be addressed in full generality.
Second, due to their origin in AI, they come together with sound, efficient,
and complete algorithmic criteria for automatization of the corresponding
identification task. And third, because of the nonparametric description of
structural models that graph-theoretic approaches build on, they combine the
strengths of both structural econometrics as well as the potential outcomes
framework, and thus offer a perfect middle ground between these two competing
literature streams.
| 0.868315 | 0.741369 | 0.126946 |
2004.07726
|
Magnetic field generation from composition gradients in inertial
confinement fusion fuel
|
Experimental asymmetries in fusion implosions can lead to magnetic field
generation in the hot plasma core. For typical parameters, previous studies
found that the magnetisation Hall parameter, given by the product of the
electron gyro-frequency and Coulomb collision time, can exceed one. This will
affect the hydrodynamics through inhibition and deflection of the electron heat
flux. The magnetic field source is the collisionless Biermann term, which
arises from the Debye shielding potential in electron pressure gradients. We
show that there is an additional source term due to the Z dependence of the
Coulomb collision operator. If there are ion composition gradients, such as
jets of carbon ablator mix entering the hot-spot, this source term can rapidly
exceed the Biermann fields. In addition, the Biermann fields are enhanced due
to the increased temperature gradients from carbon radiative cooling. With even
stronger self-generated fields, heat loss to the carbon regions will be
reduced, potentially reducing the negative effect of carbon mix.
|
We have extended the biquaternionic Dirac's equation to include interactions
with photons. The electric field is found to be perpendicular to the matter
magnetic field, and the magnetic field is perpendicular to the matter inertial
field. Inertial and magnetic masses are found to be conserved separately. The
magnetic mass density is a consequence of the coupling between the vector
potential and the matter inertial field. The presence of the vector and scalar
potentials, and the matter inertial and magnetic fields are found to modify the
standard form of the derived Maxwell's equations. The resulting interacting
electrodynamics equations are found to generalize those of axion-like fields of
Frank Wilczek or Chern-Simons equations. The axion field satisfies massive
Klein-Gordon equation if Lorenz gauge condition is violated. Therefore, axion
could be our massive photon. The electromagnetic field vector,
$\vec{F}=\vec{E}+ic\vec{B}$, is found to satisfy massive Dirac's equation in
addition to the fact that $\vec{\nabla}\cdot\vec{F}=0$, where $\vec{E}$ and
$\vec{B}$ are the electric and magnetic fields, respectively.
| 0.768694 | 0.614907 | 0.153787 |
2004.07727
|
Accretion Disc Winds in Tidal Disruption Events: Ultraviolet Spectral
Lines as Orientation Indicators
|
Some tidal disruption events (TDEs) exhibit blueshifted broad absorption
lines (BALs) in their rest-frame ultraviolet (UV) spectra, while others display
broad emission lines (BELs). Similar phenomenology is observed in quasars and
accreting white dwarfs, where it can be interpreted as an orientation effect
associated with line formation in an accretion disc wind.We propose and explore
a similar unification scheme for TDEs. We present synthetic UV spectra for disc
and wind-hosting TDEs, produced by a state-of-the-art Monte Carlo ionization
and radiative transfer code. Our models cover a wide range of disc wind
geometries and kinematics. Such winds naturally reproduce both BALs and BELs.
In general, sight lines looking into the wind cone preferentially produce BALs,
while other orientations preferentially produce BELs. We also study the effect
of wind clumping and CNO-processed abundances on the observed spectra. Clumpy
winds tend to produce stronger UV emission and absorption lines, because
clumping increases both the emission measure and the abundances of the relevant
ionic species, the latter by reducing the ionization state of the outflow. The
main effect of adopting CNO-processed abundances is a weakening of C~{\sc
iv}~1550~\AA~ and an enhancement of N \textsc{v}~1240~\AA~ in the spectra. We
conclude that line formation in an accretion disc wind is a promising mechanism
for explaining the diverse UV spectra of TDEs. If this is correct, the relative
number of BAL and BEL TDEs can be used to estimate the covering factor of the
outflow. The models in this work are publicly available online and upon
request.
|
The tidal disruption of a star by a supermassive black hole can result in
transient radio emission. The electrons producing these synchrotron radio
flares could either be accelerated inside a relativistic jet or externally by
shocks resulting from an outflow interacting with the circumnuclear medium.
Until now, evidence for the internal emission mechanism has been lacking;
nearly all tidal disruption flare studies have adopted the external shock model
to explain the observed properties of radio flares. Here we report a result
that presents a challenge to external emission models: we discovered a
cross-correlation between the soft X-ray (0.3-1 keV) and 16 GHz radio flux of
the tidal disruption flare ASASSN-14li. Variability features in the X-ray light
curve appear again in the radio light curve, but after a time lag of about 13
days. This demonstrates that soft X-ray emitting accretion disk regulates the
radio emission. This coupling appears to be inconsistent with all previous
external emission models for this source but is naturally explained if the
radio emission originates from a freely expanding jet. We show that emission
internal to an adiabatically expanding jet can also reproduce the observed
evolution of the radio spectral energy distribution. Furthermore, both the
correlation between X-ray and radio luminosity as well as our radio spectral
modeling imply an approximately linear coupling between the accretion rate and
jet power.
| 0.878583 | 0.749256 | 0.129328 |
2004.07728
|
Image Quality Assessment: Unifying Structure and Texture Similarity
|
Objective measures of image quality generally operate by making local
comparisons of pixels of a "degraded" image to those of the original. Relative
to human observers, these measures are overly sensitive to resampling of
texture regions (e.g., replacing one patch of grass with another). Here we
develop the first full-reference image quality model with explicit tolerance to
texture resampling. Using a convolutional neural network, we construct an
injective and differentiable function that transforms images to a multi-scale
overcomplete representation. We empirically show that the spatial averages of
the feature maps in this representation capture texture appearance, in that
they provide a set of sufficient statistical constraints to synthesize a wide
variety of texture patterns. We then describe an image quality method that
combines correlation of these spatial averages ("texture similarity") with
correlation of the feature maps ("structure similarity"). The parameters of the
proposed measure are jointly optimized to match human ratings of image quality,
while minimizing the reported distances between subimages cropped from the same
texture images. Experiments show that the optimized method explains human
perceptual scores, both on conventional image quality databases, as well as on
texture databases. The measure also offers competitive performance on related
tasks such as texture classification and retrieval. Finally, we show that our
method is relatively insensitive to geometric transformations (e.g.,
translation and dilation), without use of any specialized training or data
augmentation. Code is available at https://github.com/dingkeyan93/DISTS.
|
We present a full reference, perceptual image metric based on VGG-16, an
artificial neural network trained on object classification. We fit the metric
to a new database based on 140k unique images annotated with ground truth by
human raters who received minimal instruction. The resulting metric shows
competitive performance on TID 2013, a database widely used to assess image
quality assessments methods. More interestingly, it shows strong responses to
objects potentially carrying semantic relevance such as faces and text, which
we demonstrate using a visualization technique and ablation experiments. In
effect, the metric appears to model a higher influence of semantic context on
judgments, which we observe particularly in untrained raters. As the vast
majority of users of image processing systems are unfamiliar with Image Quality
Assessment (IQA) tasks, these findings may have significant impact on
real-world applications of perceptual metrics.
| 0.869669 | 0.792267 | 0.077402 |
2004.07729
|
Estimating quantum coherence by noncommutativity of any observable and
its incoherent part
|
We establish an inequality involving the quantum coherence of an arbitrary
quantum state, possibly nonpure, in arbitrary dimension and a noncommutativity
estimator of an arbitrary observable. The noncommutativity estimator uses the
commutator of the observable and its incoherent or classical part. The relation
provides a direct method of obtaining an estimate of the quantum coherence of
an arbitrary quantum state, without resorting to quantum state tomography or
the existing witness operators.
|
Recent time-resolved differential transmission and Faraday rotation
measurements of long-lived electron spin coherence in quantum wells displayed
intriguing parametric dependencies. For their understanding we formulate a
microscopic theory of the optical response of a gas of optically incoherent
excitons whose constituent electrons retain spin coherence, under a weak
magnetic field applied in the quantum well's plane. We define a spin beat
susceptibility and evaluate it in linear order of the exciton density. Our
results explain the many-body physics underlying the basic features observed in
the experimental measurements.
| 0.953187 | 0.754808 | 0.198379 |
2004.07730
|
Typical knots: size, link component count, and writhe
|
We model the typical behavior of knots and links using grid diagrams. Links
are ubiquitous in the sciences, and their normal or typical behavior is of
significant importance in understanding situations such as the topological
state of DNA or the statistical mechanics of ring polymers. We examine three
invariants: the expected size of a random knot; the expected number of
components of a random link; and the expected writhe of a random knot. We
investigate the first two numerically and produce generating functions which
codify the observed patterns, we perform an exploratory data analysis for the
third. We continue this project in a future work, where we investigate genus
and the effects of crossing change on it.
|
We define a multi-variable version of the Affine Index Polynomial for virtual
links. This invariant reduces to the original Affine Index Polynomial in the
case of virtual knots, and also generalizes the version for compatible virtual
links recently developed by L. Kauffman. We prove that this invariant is a
Vassiliev invariant of order one, and study what happens as we shift the
coloring of one or more components.
| 0.882488 | 0.813746 | 0.068742 |
2004.07731
|
Experimental Data from a Quantum Computer Verifies the Generalized Pauli
Exclusion Principle
|
"What are the consequences ... that Fermi particles cannot get into the same
state ... " R. P. Feynman wrote of the Pauli exclusion principle, "In fact,
almost all the peculiarities of the material world hinge on this wonderful
fact." In 1972 Borland and Dennis showed that there exist powerful constraints
beyond the Pauli exclusion principle on the orbital occupations of Fermi
particles, providing important restrictions on quantum correlation and
entanglement. Here we use computations on quantum computers to experimentally
verify the existence of these additional constraints. Quantum many-fermion
states are randomly prepared on the quantum computer and tested for constraint
violations. Measurements show no violation and confirm the generalized Pauli
exclusion principle with an error of one part in one quintillion.
|
Heisenberg's uncertainty principle has been understood to set a limitation on
measurements; however, the long-standing mathematical formulation established
by Heisenberg, Kennard, and Robertson does not allow such an interpretation.
Recently, a new relation was found to give a universally valid relation between
noise and disturbance in general quantum measurements, and it has become clear
that the new relation plays a role of the first principle to derive various
quantum limits on measurement and information processing in a unified
treatment. This paper examines the above development on the noise-disturbance
uncertainty principle in the model-independent approach based on the
measurement operator formalism, which is widely accepted to describe a class of
generalized measurements in the field of quantum information. We obtain
explicit formulas for the noise and disturbance of measurements given by the
measurement operators, and show that projective measurements do not satisfy the
Heisenberg-type noise-disturbance relation that is typical in the gamma-ray
microscope thought experiments. We also show that the disturbance on a Pauli
operator of a projective measurement of another Pauli operator constantly
equals the square root of 2, and examine how this measurement violates the
Heisenberg-type relation but satisfies the new noise-disturbance relation.
| 0.877005 | 0.794934 | 0.082071 |
2004.07732
|
Multigrid for Chiral Lattice Fermions: Domain Wall
|
Critical slowing down for the Krylov Dirac solver presents a major obstacle
to further advances in lattice field theory as it approaches the continuum
solution. We propose a new multi-grid approach for chiral fermions, applicable
to both the 5-d domain wall or 4-d Overlap operator. The central idea is to
directly coarsen the 4-d Wilson kernel, giving an effective domain wall or
overlap operator on each level. We provide here an explicit construction for
the Shamir domain wall formulation with numerical tests for the 2-d Schwinger
prototype, demonstrating near ideal multi-grid scaling. The framework is
designed for a natural extension to 4-d lattice QCD chiral fermions, such as
the M\"obius, Zolotarev or Borici domain wall discretizations or directly to a
rational expansion of the 4-d Overlap operator. For the Shamir operator, the
effective overlap operator is isolated by the use of a Pauli-Villars
preconditioner in the spirit of the K\"ahler-Dirac spectral map used in a
recent staggered MG algorithm [1].
|
We present the first GPU-based conjugate gradient (CG) solver for lattice QCD
with domain-wall fermions (DWF). It is well-known that CG is the most
time-consuming part in the Hybrid Monte Carlo simulation of unquenched lattice
QCD, which becomes even more computational demanding for lattice QCD with exact
chiral symmetry. We have designed a CG solver for the general 5-dimensional DWF
operator on NVIDIA CUDA architecture with mixed-precision, using the defect
correction as well as the reliable updates algorithms. We optimize our
computation by even-odd preconditioning in the 4D space-time lattice, plus
several innovative techniques for CUDA kernels. For NVIDIA GeForce GTX 285/480,
our CG solver attains 180/233 Gflops (sustained).
| 0.86522 | 0.824042 | 0.041178 |
2004.07733
|
Bridging the Gap: FPGAs as Programmable Switches
|
The emergence of P4, a domain specific language, coupled to PISA, a domain
specific architecture, is revolutionizing the networking field. P4 allows to
describe how packets are processed by a programmable data plane, spanning ASICs
and CPUs, implementing PISA. Because the processing flexibility can be limited
on ASICs, while the CPUs performance for networking tasks lag behind, recent
works have proposed to implement PISA on FPGAs. However, little effort has been
dedicated to analyze whether FPGAs are good candidates to implement PISA. In
this work, we take a step back and evaluate the micro-architecture efficiency
of various PISA blocks. We demonstrate, supported by a theoretical and
experimental analysis, that the performance of a few PISA blocks is severely
limited by the current FPGA architectures. Specifically, we show that match
tables and programmable packet schedulers represent the main performance
bottlenecks for FPGA-based programmable switches. Thus, we explore two avenues
to alleviate these shortcomings. First, we identify network applications well
tailored to current FPGAs. Second, to support a wider range of networking
applications, we propose modifications to the FPGA architectures which can also
be of interest out of the networking field.
|
Deep Neural Networks are becoming the de-facto standard models for image
understanding, and more generally for computer vision tasks. As they involve
highly parallelizable computations, CNN are well suited to current fine grain
programmable logic devices. Thus, multiple CNN accelerators have been
successfully implemented on FPGAs. Unfortunately, FPGA resources such as logic
elements or DSP units remain limited. This work presents a holistic method
relying on approximate computing and design space exploration to optimize the
DSP block utilization of a CNN implementation on an FPGA. This method was
tested when implementing a reconfigurable OCR convolutional neural network on
an Altera Stratix V device and varying both data representation and CNN
topology in order to find the best combination in terms of DSP block
utilization and classification accuracy. This exploration generated dataflow
architectures of 76 CNN topologies with 5 different fixed point representation.
Most efficient implementation performs 883 classifications/sec at 256 x 256
resolution using 8% of the available DSP blocks.
| 0.842134 | 0.737204 | 0.10493 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.