id
stringlengths
5
16
query
stringlengths
1
382
pos
stringlengths
7
5.09k
neg
stringlengths
23
5.09k
qp
float64
0.4
1
qn
float64
0.34
0.91
margin
float64
0.02
0.3
2004.07628
On the local \'etale fundamental group of KLT threefold singularities
Let $S$ be KLT threefold singularity over an algebraically closed field of positive characteristic $p>5$. We prove that its local \'etale fundamental group is tame. If $S$ is further rational, we show that it is finite and that every finite unipotent torsor over a big open of $S$ is the restriction of finite unipotent torsor over $S$.
We extend our previous theory of etale parallel transport to a larger class of slope zero vector bundles on p-adic curves. The new class is stable under pullback by ramified coverings. We also construct p-adic representations of a central extension of the fundamental group for certain bundles of non-zero slope.
0.892958
0.777992
0.114966
2004.07630
Four Pages Are Indeed Necessary for Planar Graphs
An embedding of a graph in a book consists of a linear order of its vertices along the spine of the book and of an assignment of its edges to the pages of the book, so that no two edges on the same page cross. The book thickness of a graph is the minimum number of pages over all its book embeddings. Accordingly, the book thickness of a class of graphs is the maximum book thickness over all its members. In this paper, we address a long-standing open problem regarding the exact book thickness of the class of planar graphs, which previously was known to be either three or four. We settle this problem by demonstrating planar graphs that require four pages in any of their book embeddings, thus establishing that the book thickness of the class of planar graphs is four.
We reconsider density matrices of graphs as defined in [quant-ph/0406165]. The density matrix of a graph is the combinatorial laplacian of the graph normalized to have unit trace. We describe a simple combinatorial condition (the "degree condition") to test separability of density matrices of graphs. The condition is directly related to the PPT-criterion. We prove that the degree condition is necessary for separability and we conjecture that it is also sufficient. We prove special cases of the conjecture involving nearest point graphs and perfect matchings. We observe that the degree condition appears to have value beyond density matrices of graphs. In fact, we point out that circulant density matrices and other matrices constructed from groups always satisfy the condition and indeed are separable with respect to any split. The paper isolates a number of problems and delineates further generalizations.
0.850957
0.712828
0.138129
2004.07631
Emergence of molecular friction in liquids: bridging between the atomistic and hydrodynamic pictures
Friction in liquids arises from conservative forces between molecules and atoms. Although the hydrodynamics at the nanoscale is subject of intense research and despite the enormous interest in the non-Markovian dynamics of single molecules and solutes, the onset of friction from the atomistic scale so far could not be demonstrated. Here, we fill this gap based on frequency-resolved friction data from high-precision simulations of three prototypical liquids, including water. Combining with rigorous theoretical arguments, we show that friction in liquids emerges abruptly at a characteristic frequency, beyond which viscous liquids appear as non-dissipative, elastic solids; as a consequence, its origin is non-local in time. Concomitantly, the molecules experience Brownian forces that display persistent correlations and long-lasting memory. A critical test of the generalised Stokes-Einstein relation, mapping the friction of single molecules to the viscoelastic response of the macroscopic sample, disproves the relation for Newtonian fluids, but substantiates it exemplarily for water and a moderately supercooled liquid. The employed approach is suitable to yield novel insights into vitrification mechanisms and the intriguing mechanical properties of soft materials.
We describe an overall picture of galactic-scale star formation. Recent high-resolution magneto-hydrodynamical simulations of two-fluid dynamics with cooling/heating and thermal conduction have shown that the formation of molecular clouds requires multiple episodes of supersonic compression. This finding enables us to create a scenario in which molecular clouds form in interacting shells or bubbles on a galactic scale. First we estimate the ensemble-averaged growth rate of molecular clouds over a timescale larger than a million years. Next we perform radiation hydrodynamics simulations to evaluate the destruction rate of magnetized molecular clouds by the stellar FUV radiation. We also investigate the resultant star formation efficiency within a cloud which amounts to a low value (a few percent) if we adopt the power-law exponent -2.5 for the mass distribution of stars in the cloud. We finally describe the time evolution of the mass function of molecular clouds over a long timescale (>1Myr) and discuss the steady state exponent of the power-law slope in various environments.
0.922246
0.664821
0.257425
2004.07632
Accurate electronic band gaps of two-dimensional materials from the local modified Becke-Johnson potential
The electronic band structures of two-dimensional materials are significantly different from those of their bulk counterparts, due to quantum confinement and strong modifications of electronic screening. An accurate determination of electronic states is a prerequisite to design electronic or optoelectronic applications of two-dimensional materials, however, most of the theoretical methods we have available to compute band gaps are either inaccurate, computationally expensive, or only applicable to bulk systems. Here we show that reliable band structures of nanostructured systems can now be efficiently calculated using density-functional theory with the local modified Becke-Johnson exchange-correlation functional that we recently proposed. After re-optimizing the parameters of this functional specifically for two-dimensional materials, we show, for a test set of almost 300 systems, that the obtained band gaps are of comparable quality as those obtained using the best hybrid functionals, but at a very reduced computational cost. These results open the way for accurate high-throughput studies of band-structures of two-dimensional materials and for the study of van der Waals heterostructures with large unit cells.
We consider a spatially periodic (cosine) potential as a model for a crystalline solid that interacts with a harmonically oscillating external electric field. This problem is periodic both in space and time and can be solved analytically using the Kramers-Henneberger co-moving frame. By analyzing the stability of the closely related Mathieu-type differential equation, the electronic band structure can be obtained. We demonstrate that by changing the field intensity, the width of the zero-field band gaps can be drastically modified, including the special case when the external field causes the band gaps to disappear
0.88657
0.812405
0.074165
2004.07633
A Methodology for Creating Question Answering Corpora Using Inverse Data Annotation
In this paper, we introduce a novel methodology to efficiently construct a corpus for question answering over structured data. For this, we introduce an intermediate representation that is based on the logical query plan in a database called Operation Trees (OT). This representation allows us to invert the annotation process without losing flexibility in the types of queries that we generate. Furthermore, it allows for fine-grained alignment of query tokens to OT operations. In our method, we randomly generate OTs from a context-free grammar. Afterwards, annotators have to write the appropriate natural language question that is represented by the OT. Finally, the annotators assign the tokens to the OT operations. We apply the method to create a new corpus OTTA (Operation Trees and Token Assignment), a large semantic parsing corpus for evaluating natural language interfaces to databases. We compare OTTA to Spider and LC-QuaD 2.0 and show that our methodology more than triples the annotation speed while maintaining the complexity of the queries. Finally, we train a state-of-the-art semantic parsing model on our data and show that our corpus is a challenging dataset and that the token alignment can be leveraged to increase the performance significantly.
This paper is focused on studying the view-manifold structure in the feature spaces implied by the different layers of Convolutional Neural Networks (CNN). There are several questions that this paper aims to answer: Does the learned CNN representation achieve viewpoint invariance? How does it achieve viewpoint invariance? Is it achieved by collapsing the view manifolds, or separating them while preserving them? At which layer is view invariance achieved? How can the structure of the view manifold at each layer of a deep convolutional neural network be quantified experimentally? How does fine-tuning of a pre-trained CNN on a multi-view dataset affect the representation at each layer of the network? In order to answer these questions we propose a methodology to quantify the deformation and degeneracy of view manifolds in CNN layers. We apply this methodology and report interesting results in this paper that answer the aforementioned questions.
0.852959
0.584043
0.268916
2004.07634
Exact projector Hamiltonian, local integrals of motion, and many-body localization with topological order
In this work, we construct an exact projector Hamiltonian with interactions, which is given by a sum of mutually commuting operators called stabilizers. The model is based on the recently studied Creutz-ladder of fermions, in which flat-band structure and strong localization are realized. These stabilizers are local intergals of motion from which many-body localization (MBL) is realized. All energy eigenstates are explicitly obtained even in the presence of local disorders. All states are MBL states, that is, this system is a full many-body localized (FMBL) system. We show that this system has a topological order and stable gapless edge modes exist under the open boundary condition. By the numerical study, we investigate stability of the FMBL and topological order.
In this chapter we discuss methods to calculate the entanglement of a system using density-functional theory. We firstly introduce density-functional theory and the local-density approximation (LDA). We then discuss the concept of the `interacting LDA system'. This is characterised by an interacting many-body Hamiltonian which reproduces, uniquely and exactly, the ground state density obtained from the single-particle Kohn-Sham equations of density-functional theory when the local-density approximation is used. We motivate why this idea can be useful for appraising the local-density approximation in many-body physics particularly with regards to entanglement and related quantum information applications. Using an iterative scheme, we find the Hamiltonian characterising the interacting LDA system in relation to the test systems of Hooke's atom and helium-like atoms. The interacting LDA system ground state wavefunction is then used to calculate the spatial entanglement and the results are compared and contrasted with the exact entanglement for the two test systems. For Hooke's atom we also compare the entanglement to our previous estimates of an LDA entanglement. These were obtained using a combination of evolutionary algorithm and gradient descent, and using an LDA-based perturbative approach. We finally discuss if the position-space information entropy of the density---which can be obtained directly from the system density and hence easily from density-functional theory methods---can be considered as a proxy measure for the spatial entanglement for the test systems.
0.851621
0.703756
0.147865
2004.07635
Local Search Trajectories over S-box Space
The study of S-box properties relations is an interesting problem. In this work we develop and apply a local search method to create trajectories over S-box space. These trajectories shows the existence of an strong linear correlation between confusion coefficient variance, Transparency Order, Modified Transparency Order and Revised Transparency Order, under the Hamming Weight model. When the values of Confusion Coefficient Variance increases then the values of Transparency Order, the values of Modified Transparency Order beta zero, and the values of Revised Transparency Order beta zero, decreases, reflecting the same theoretical resistance against to Side-Channel Attacks by power consumption. As far as we know, it is the first time that Local Search trajectories are used to discover relations between cryptography properties.
Trajectory-based approaches to quantum mechanics include the de Broglie-Bohm interpretation and Nelson's stochastic interpretation. It is shown that the usual route to establishing the validity of such interpretations, via a decomposition of the Schroedinger equation into a continuity equation and a modified Hamilton-Jacobi equation, fails for some quantum states. A very simple example is provided by a quantum particle in a box, described by a wavefunction initially uniform over the interior of the box. For this example there is no corresponding continuity or modified Hamilton-Jacobi equation, and the spacetime dependence of the wavefunction has a known fractal structure. Examples with finite average energies are also constructed.
0.788944
0.65675
0.132194
2004.07636
Hcore-Init: Neural Network Initialization based on Graph Degeneracy
Neural networks are the pinnacle of Artificial Intelligence, as in recent years we witnessed many novel architectures, learning and optimization techniques for deep learning. Capitalizing on the fact that neural networks inherently constitute multipartite graphs among neuron layers, we aim to analyze directly their structure to extract meaningful information that can improve the learning process. To our knowledge graph mining techniques for enhancing learning in neural networks have not been thoroughly investigated. In this paper we propose an adapted version of the k-core structure for the complete weighted multipartite graph extracted from a deep learning architecture. As a multipartite graph is a combination of bipartite graphs, that are in turn the incidence graphs of hypergraphs, we design k-hypercore decomposition, the hypergraph analogue of k-core degeneracy. We applied k-hypercore to several neural network architectures, more specifically to convolutional neural networks and multilayer perceptrons for image recognition tasks after a very short pretraining. Then we used the information provided by the hypercore numbers of the neurons to re-initialize the weights of the neural network, thus biasing the gradient optimization scheme. Extensive experiments proved that k-hypercore outperforms the state-of-the-art initialization methods.
Weight initialization is important for faster convergence and stability of deep neural networks training. In this paper, a robust initialization method is developed to address the training instability in long short-term memory (LSTM) networks. It is based on a normalized random initialization of the network weights that aims at preserving the variance of the network input and output in the same range. The method is applied to standard LSTMs for univariate time series regression and to LSTMs robust to missing values for multivariate disease progression modeling. The results show that in all cases, the proposed initialization method outperforms the state-of-the-art initialization techniques in terms of training convergence and generalization performance of the obtained solution.
0.812958
0.782248
0.03071
2004.07637
Renormalized Lindblad Driving: A Numerically-Exact Nonequilibrium Quantum Impurity Solver
The accurate characterization of nonequilibrium strongly-correlated quantum systems has been a longstanding challenge in many-body physics. Notable among them are quantum impurity models, which appear in various nanoelectronic and quantum computing applications. Despite their seeming simplicity, they feature correlated phenomena, including emergent energy scales and non-Fermi-liquid physics, requiring renormalization group treatment. This has typically been at odds with the description of their nonequilibrium steady-state under finite bias, which exposes their nature as open quantum systems. We present a novel numerically-exact method for obtaining the nonequilibrium state of a general quantum impurity coupled to metallic leads at arbitrary voltage or temperature bias, which we call "RL-NESS" (Renormalized Lindblad-driven NonEquilibrium Steady-State). It is based on coherently coupling the impurity to discretized leads which are treated exactly. These leads are furthermore weakly coupled to reservoirs described by Lindblad dynamics which impose voltage or temperature bias. Going beyond previous attempts, we exploit a hybrid discretization scheme for the leads together with Wilson's numerical renormalization group, in order to probe exponentially small energy scales. The steady-state is then found by evolving a matrix-product density operator via real-time Lindblad dynamics, employing a dissipative generalization of the time-dependent density matrix renormalization group. In the long-time limit, this procedure converges to the steady-state at finite bond dimension due to the introduced dissipation, which bounds the growth of entanglement. We test the method against the exact solution of the noninteracting resonant level model. We demonstrate its power using an interacting two-level model, for which it correctly reproduces the known limits, and gives the full $I$-$V$ curve between them.
We illustrate how to calculate the finite-temperature linear-response conductance of quantum impurity models from the Matsubara Green function. A continued fraction expansion of the Fermi distribution is employed which was recently introduced by Ozaki [Phys. Rev. B 75, 035123 (2007)] and converges much faster than the usual Matsubara representation. We give a simplified derivation of Ozaki's idea using concepts from many-body condensed matter theory and present results for the rate of convergence. In case that the Green function of some model of interest is only known numerically, interpolating between Matsubara frequencies is much more stable than carrying out an analytic continuation to the real axis. We demonstrate this explicitly by considering an infinite tight-binding chain with a single site impurity as an exactly-solvable test system, showing that it is advantageous to calculate transport properties directly on the imaginary axis. The formalism is applied to the single impurity Anderson model, and the linear conductance at finite temperatures is calculated reliably at small to intermediate Coulomb interactions by virtue of the Matsubara functional renormalization group. Thus, this quantum many-body method combined with the continued fraction expansion of the Fermi function constitutes a promising tool to address more complex quantum dot geometries at finite temperatures.
0.894941
0.813239
0.081703
2004.07638
Uncertainty quantification for the BGK model of the Boltzmann equation using multilevel variance reduced Monte Carlo methods
We propose a control variate multilevel Monte Carlo method for the kinetic BGK model of the Boltzmann equation subject to random inputs. The method combines a multilevel Monte Carlo technique with the computation of the optimal control variate multipliers derived from local or global variance minimization problems. Consistency and convergence analysis for the method equipped with a second-order positivity-preserving and asymptotic-preserving scheme in space and time is also performed. Various numerical examples confirm that the optimized multilevel Monte Carlo method outperforms the classical multilevel Monte Carlo method especially for problems with discontinuities.
We propose a multi-level method to increase the accuracy of machine learning algorithms for approximating observables in scientific computing, particularly those that arise in systems modeled by differential equations. The algorithm relies on judiciously combining a large number of computationally cheap training data on coarse resolutions with a few expensive training samples on fine grid resolutions. Theoretical arguments for lowering the generalization error, based on reducing the variance of the underlying maps, are provided and numerical evidence, indicating significant gains over underlying single-level machine learning algorithms, are presented. Moreover, we also apply the multi-level algorithm in the context of forward uncertainty quantification and observe a considerable speed-up over competing algorithms.
0.902105
0.823883
0.078223
2004.07639
Where can I drive? Deep Ego-Corridor Estimation for Robust Automated Driving
Lane detection is an essential part of the perception module of any automated driving (AD) or advanced driver assistance system (ADAS). So far, model-driven approaches for the detection of lane markings proved sufficient. More recently, however data-driven approaches have been proposed that show superior results. These deep learning approaches typically propose a classification of the free-space using for example semantic segmentation. While these examples focus and optimize on unmarked inner-city roads, we believe that mapless driving in complex highway scenarios is still not handled with sufficient robustness and availability. Especially in challenging weather situations such as heavy rain, fog at night or reflections in puddles, the reliable detection of lane markings will decrease significantly or completely fail with low-cost video-only AD systems. Therefore, we propose to specifically classify a drivable corridor in the ego-lane on a pixel level with a deep learning approach. Our approach is intentionally kept simple with only 660k parameters. Thus, we were able to easily integrate our algorithm into an online AD system of a test vehicle. We demonstrate the performance of our approach under challenging conditions qualitatively and quantitatively in comparison to a state-of-the-art model-driven approach. We see the current approach as a fallback method whenever a model-driven approach cannot cope with a specific scenario. Due to this, a fallback method does not have to fulfill the same requirements on comfort in lateral control as the primary algorithm: Its task is to catch the temporal shortcomings of the main perception task.
Safety, efficiency, privacy, and cybersecurity can be achieved jointly in self-organizing networks of communicating vehicles of various automated driving levels. The underlying approach, solutions and novel results are briefly exposed. We explain why we are faced with a crucial choice regarding motorized society and cyber surveillance.
0.813477
0.694854
0.118623
2004.07640
Smoluchowski equations for linker-mediated irreversible aggregation
In order to study linker-mediated aggregation of colloidal particles with limited valence, we combine kinetic Monte Carlo simulations and an approximate theory based on the Smoluchowski equations. We found that aggregation depends strongly on two parameters, the ratio of the number of linkers and particles and the ratio of their diffusion coefficients. These control parameters are absent in single-species aggregation and provide a much greater variety and control of the resulting structures. We show that aggregation is non-trivial when two time scales of aggregation are present. Our aggregation dynamics theory is in qualitative and quantitative agreement with kinetic Monte Carlo simulations. Our results show how the optimal aggregation may be tuned through the ratio of the linkers and particles and that of the diffusion coefficients.
A characterisation of the stochastic bounded generators of quantum irreversible Master equations is given. This suggests the general form of quantum stochastic evolution with respect to the Poisson (jumps), Wiener (diffusion) or general Quantum Noise. The corresponding irreversible Heisenberg evolution in terms of stochastic completely positive (CP) maps is found and the general form of the stochastic completely dissipative (CD) operator equation is discovered.
0.859686
0.692446
0.16724
2004.07641
A Spatiotemporal Epidemic Model to Quantify the Effects of Contact Tracing, Testing, and Containment
We introduce a novel modeling framework for studying epidemics that is specifically designed to make use of fine-grained spatiotemporal data. Motivated by the current COVID-19 outbreak and the availability of data from contact or location tracing technologies, our model uses marked temporal point processes to represent individual mobility patterns and the course of the disease for each individual in a population. We design an efficient sampling algorithm for our model that can be used to predict the spread of infectious diseases such as COVID-19 under different testing and tracing strategies, social distancing measures, and business restrictions, given location or contact histories of individuals. Building on this algorithm, we use Bayesian optimization to estimate the risk of exposure of each individual at the sites they visit, the percentage of symptomatic individuals, and the difference in transmission rate between asymptomatic and symptomatic individuals from historical longitudinal testing data. Experiments using measured COVID-19 data and mobility patterns from T\"{u}bingen, a town in the southwest of Germany, demonstrate that our model can be used to quantify the effects of tracing, testing, and containment strategies at an unprecedented spatiotemporal resolution. To facilitate research and informed policy-making, particularly in the context of the current COVID-19 outbreak, we are releasing an open-source implementation of our framework at https://github.com/covid19-model.
The basic reproductive number -- $R_0$ -- is one of the most common and most commonly misapplied numbers in public health. Although often used to compare outbreaks and forecast pandemic risk, this single number belies the complexity that two different pathogens can exhibit, even when they have the same $R_0$. Here, we show how to predict outbreak size using estimates of the distribution of secondary infections, leveraging both its average $R_0$ and the underlying heterogeneity. To do so, we reformulate and extend a classic result from random network theory that relies on contact tracing data to simultaneously determine the first moment ($R_0$) and the higher moments (representing the heterogeneity) in the distribution of secondary infections. Further, we show the different ways in which this framework can be implemented in the data-scarce reality of emerging pathogens. Lastly, we demonstrate that without data on the heterogeneity in secondary infections for emerging infectious diseases like COVID-19, the uncertainty in outbreak size ranges dramatically. Taken together, our work highlights the critical need for contact tracing during emerging infectious disease outbreaks and the need to look beyond $R_0$ when predicting epidemic size.
0.846855
0.757242
0.089613
2004.07642
Towards Instance-Level Parser Selection for Cross-Lingual Transfer of Dependency Parsers
Current methods of cross-lingual parser transfer focus on predicting the best parser for a low-resource target language globally, that is, "at treebank level". In this work, we propose and argue for a novel cross-lingual transfer paradigm: instance-level parser selection (ILPS), and present a proof-of-concept study focused on instance-level selection in the framework of delexicalized parser transfer. We start from an empirical observation that different source parsers are the best choice for different Universal POS sequences in the target language. We then propose to predict the best parser at the instance level. To this end, we train a supervised regression model, based on the Transformer architecture, to predict parser accuracies for individual POS-sequences. We compare ILPS against two strong single-best parser selection baselines (SBPS): (1) a model that compares POS n-gram distributions between the source and target languages (KL) and (2) a model that selects the source based on the similarity between manually created language vectors encoding syntactic properties of languages (L2V). The results from our extensive evaluation, coupling 42 source parsers and 20 diverse low-resource test languages, show that ILPS outperforms KL and L2V on 13/20 and 14/20 test languages, respectively. Further, we show that by predicting the best parser "at the treebank level" (SBPS), using the aggregation of predictions from our instance-level model, we outperform the same baselines on 17/20 and 16/20 test languages.
Input validation is the first line of defense against malformed or malicious inputs. It is therefore critical that the validator (which is often part of the parser) is free of bugs. To build dependable input validators, we propose using parser generators for context-free languages. In the context of network protocols, various works have pointed at context-free languages as falling short to specify precisely or concisely common idioms found in protocols. We review those assessments and perform a rigorous, language-theoretic analysis of several common protocol idioms. We then demonstrate the practical value of our findings by developing a modular, robust, and efficient input validator for HTTP relying on context-free grammars and regular expressions.
0.902742
0.727679
0.175063
2004.07643
Hereditary subshifts whose measure of maximal entropy has no Gibbs property
We show that the measure of maximal entropy for the hereditary closure of a $\mathscr{B}$-free subshift has the Gibbs property if and only if the Mirsky measure of the subshift is purely atomic. This answers an open question asked by Peckner. Moreover, we show that $\mathscr{B}$ is taut whenever the corresponding Mirsky measure $\nu_\eta$ has full support. This is the converse theorem to a recent result of Keller.
We prove that systems satisfying the specification property are saturated in the sense that the topological entropy of the set of generic points of any invariant measure is equal to the measure-theoretic entropy of the measure. We study Banach valued Birkhoff ergodic averages and obtain a variational principle for its topological entropy spectrum. As application, we examine a particular example concerning with the set of real numbers for which the frequencies of occurrences in their dyadic expansions of infinitely many words are prescribed. This relies on our explicit determination of a maximal entropy measure.
0.919797
0.818261
0.101536
2004.07644
Machine-learning-based methods for output only structural modal identification
In this study, we propose a machine-learning-based approach to identify the modal parameters of the output only data for structural health monitoring (SHM) that makes full use of the characteristic of independence of modal responses and the principle of machine learning. By taking advantage of the independence feature of each mode, we use the principle of unsupervised learning, making the training process of the deep neural network becomes the process of modal separation. A self-coding deep neural network is designed to identify the structural modal parameters from the vibration data of structures. The mixture signals, that is, the structural response data, are used as the input of the neural network. Then we use a complex cost function to restrict the training process of the neural network, making the output of the third layer the modal responses we want, and the weights of the last two layers are mode shapes. The deep neural network is essentially a nonlinear objective function optimization problem. A novel loss function is proposed to constrain the independent feature with consideration of uncorrelation and non-Gaussianity to restrict the designed neural network to obtain the structural modal parameters. A numerical example of a simple structure and an example of actual SHM data from a cable-stayed bridge are presented to illustrate the modal parameter identification ability of the proposed approach. The results show the approach s good capability in blindly extracting modal information from system responses.
Multilayer perceptron is the most common used class of feed-forward artificial neural network. It contains many applications in diverse fields such as speech recognition, image recognition, and machine translation software. To cater for the fast development of quantum machine learning, in this paper, we propose a new model to study multilayer perceptron in quantum computer. This contains the tasks to prepare the quantum state of the output signal in each layer and to establish the quantum version of learning algorithm about the weights in each layer. We will show that the corresponding quantum versions can achieve at least quadratic speedup or even exponential speedup over the classical algorithms. This provide us an efficient method to study multilayer perceptron and its applications in machine learning in quantum computer. Finally, as an inspiration, an exponential fast learning algorithm (based on Hebb's learning rule) of Hopfield network will be proposed.
0.851963
0.638551
0.213412
2004.07645
Mathematical model of LoRaWAN channel access
While 3GPP has been developing NB-IoT, the market of Low Power Wide Area Networks has been mastered by cheap and simple Sigfox and LoRa/LoRaWAN technologies. Being positioned as having an open standard, LoRaWAN has attracted also much interest from the research community. Specifically, many papers address the efficiency of its PHY layer. However MAC is still underinvestigated. Existing studies of LoRaWAN do not take into account the acknowledgement and retransmission policy, which may lead to incorrect results. In this paper, we carefully take into account the peculiarities of LoRaWAN transmission retries and show that it is the weakest issue of this technology, which significantly increases failure probability for retries. The main contribution of the paper is a mathematical model which accurately estimates how packet error rate depends on the offered load. In contrast to other papers, which evaluate LoRaWAN capacity just as the maximal throughput, our model can be used to find the maximal load, which allows reliable packet delivery.
Building on recent development by Padakandla and Pradhan, and by Lim, Feng, Pastore, Nazer, and Gastpar, this paper studies the potential of structured nested coset coding as a complete replacement for random coding in network information theory. The roles of two techniques used in nested coset coding to generate nonuniform codewords, namely, shaping and channel transformation, are clarified and illustrated via the simple example of the two-sender multiple access channel. While individually deficient, the optimal combination of shaping and channel transformation is shown to achieve the same performance as traditional random codes for the general two-sender multiple access channel. The achievability proof of the capacity region is extended to the multiple access channels with more than two senders, and with one or more receivers. A quantization argument consistent with the construction of nested coset codes is presented to prove achievability for their Gaussian counterparts. These results open up new possibilities of utilizing nested coset codes with the same generator matrix for a broader class of applications.
0.816395
0.727383
0.089012
2004.07646
Gap Statistics of the Sequence $\{\alpha\sqrt{n}\}$
The gaps in the sequence $\{\sqrt{n}\}$ were shown by Elkies-McMullen (2004) to have a limiting distribution which is not the exponential distribution. However it is conjectured that the distribution of gaps in the sequence $\{\alpha\sqrt{n}\}$ is exponential, provided $\alpha^2$ is irrational. For almost all values of $\alpha$, we prove an important step in this direction. In particular, we show that all the correlations are Poissonian along a subsequence. Therefore, our result implies that the gap distribution converges to the exponential distribution along the same subsequence.
In this paper we study the semiclassical limit for the pseudo-relativistic Hartree equation $\sqrt{-\varepsilon^2 \Delta + m^2}u + V u = (I_\alpha * |u|^{p}) |u|^{p-2}u$ in $\mathbb{R}^N$ where $m>0$, $2 \leq p < \frac{2N}{N-1}$, $V \colon \mathbb{R}^N \to \mathbb{R}$ is an external scalar potential, $I_\alpha (x) = \frac{c_{N,\alpha}}{|x|^{N-\alpha}}$ is a convolution kernel, $c_{N,\alpha}$ is a positive constant and $(N-1)p-N<\alpha <N$. For $N=3$, $\alpha=p=2$, our equation becomes the pseudo-relativistic Hartree equation with Coulomb kernel.
0.883834
0.664787
0.219047
2004.07647
Unveiling the power spectra of $\delta$ Scuti stars with TESS. The temperature, gravity, and frequency scaling relation
Thanks to high-precision photometric data legacy from space telescopes like CoRoT and Kepler, the scientific community could detect and characterize the power spectra of hundreds of thousands of stars. Using the scaling relations, it is possible to estimate masses and radii for solar-type pulsators. However, these stars are not the only kind of stellar objects that follow these rules: $\delta$ Scuti stars seem to be characterized with seismic indexes such as the large separation ($\Delta\nu$). Thanks to long-duration high-cadence TESS light curves, we analysed more than two thousand of this kind of classical pulsators. In that way, we propose the frequency at maximum power ($\nu_{\rm max}$) as a proper seismic index since it is directly related with the intrinsic temperature, mass and radius of the star. This parameter seems not to be affected by rotation, inclination, extinction or resonances, with the exception of the evolution of the stellar parameters. Furthermore, we can constrain rotation and inclination using the departure of temperature produced by the gravity-darkening effect. This is especially feasible for fast rotators as most of $\delta$ Scuti stars seem to be.
We report the discovery of 31 blue, short period, pulsators made using data taken as part of the Rapid Temporal Survey (RATS). We find they have periods between 51-83 mins and full-amplitudes between 0.05-0.65 mag. Using the period-luminosity relationship for short period pulsating stars we determine their distance. Assuming they are pulsating in either the fundamental or first over-tone radial mode the majority are located at a distance greater than 3kpc, with several being more than 20 kpc distant. Most stars are at least 1 kpc from the Galactic plane, with three being more than 10 kpc. One is located in the direction of the Galactic anti-center and has Galactocentric distance of ~30 kpc and is ~20 kpc below the plane: they are therefore potential tracers of Galactic structure. We have obtained low-resolution spectra for a small number our targets and find they have temperatures between 7200--7900K and a metal content less than Solar. The colours of the pulsators and the spectral fits to those stars for which we have spectra indicate that they are either SX Phe or delta Scuti stars. We estimate the number of SX Phe stars in our Galaxy and find significantly fewer per unit mass than reported in massive globular clusters or dwarf spheroidal galaxies.
0.855127
0.765673
0.089453
2004.07648
Entropy rate of product of independent processes
We provide explicit formulas for (relative) entropy rate of the (multiplicative) product of bilateral, real, finitely-valued, stationary independent processes $\mathbf{X}$, $\mathbf{Y}$, with $\mathbf{Y}$ ergodic, taking values in $\{0,1\}$. We apply our results to a version of classical Furstenberg's filtering problem where instead of the sum $\mathbf{X}+\mathbf{Y}$ one considers the product $\mathbf{X}\cdot \mathbf{Y}.$ In particular, we give lower and upper bounds for the (relative) entropy rate, answering open questions from a paper by Ku\l{}aga-Przymus, Lema\'{n}czyk and Weiss (2015). A crucial role is played by processes that are not bilaterally deterministic; we provide sufficient conditions that guarantee the absence of this property.
We analyze the quantum process in which a cosmic string breaks in a de Sitter (dS) background, and a pair of neutral or charged black holes is produced at the ends of the string. The energy to materialize and accelerate the pair comes from the positive cosmological constant and, in addition, from the string tension. The compact saddle point solutions without conical singularities (instantons) or with conical singularities (sub-maximal instantons) that describe this process are constructed through the analytical continuation of the dS C-metric. Then, we explicitly compute the pair creation rate of the process. In particular, we find the nucleation rate of a cosmic string in a dS background, and the probability that it breaks and a pair of black holes is produced. Finally we verify that, as occurs with pair production processes in other background fields, the pair creation rate of black holes is proportional to exp(S), where the gravitational entropy of the black hole, S, is given by one quarter of the area of the horizons present in the saddle point solution that mediates the process.
0.87023
0.588637
0.281594
2004.07649
Notes on the interpretation of dependence measures
Besides the classical distinction of correlation and dependence, many dependence measures bear further pitfalls in their application and interpretation. The aim of this paper is to raise and recall awareness of some of these limitations by explicitly discussing Pearson's correlation and the multivariate dependence measures: distance correlation, distance multicorrelations and their copula versions. The discussed aspects include types of dependence, bias of empirical measures, influence of marginal distributions and dimensions. In general it is recommended to use a proper dependence measure instead of Pearson's correlation. Moreover, a measure which is distribution-free (at least in some sense) can help to avoid certain systematic errors. Nevertheless, in a truly multivariate setting only the p-values of the corresponding independence tests provide always values with indubitable interpretation.
Infinite determinantal measures introduced in this note are inductive limits of determinantal measures on an exhausting family of subsets of the phase space. Alternatively, an infinite determinantal measure can be described as a product of a determinantal process and a convergent, but not integrable, multiplicative functional. Theorem 2, the main result announced in this note, gives an explicit description for the ergodic decomposition of infinite Pickrell measures on the spaces of infinite complex matrices in terms of infinite determinantal measures obtained by finite-rank perturbations of Bessel point processes.
0.813237
0.676736
0.136501
2004.07650
Fully Dynamic $c$-Edge Connectivity in Subpolynomial Time
We present a deterministic fully dynamic algorithm for $c$-edge connectivity problem with $n^{o(1)}$ worst case update and query time for any positive integer $c = (\log n)^{o(1)}$ for a graph with $n$ vertices. Previously, only polylogarithmic, $O(\sqrt{n})$, and $O(n^{2/3})$ worst case update time algorithms were known for fully dynamic $1$, $2$ and $3$-edge connectivity problems respectively. Our techniques include a multi-level $c$-edge connectivity sparsifier, an online-batch update algorithm for the sparsifier, and a general approach to turn an online-batch dynamic algorithm with small amortized update time into a fully dynamic algorithm with worst case update time.
We establish and generalise several bounds for various random walk quantities including the mixing time and the maximum hitting time. Unlike previous analyses, our derivations are based on rather intuitive notions of local expansion properties which allows us to capture the progress the random walk makes through $t$-step probabilities. We apply our framework to dynamically changing graphs, where the set of vertices is fixed while the set of edges changes in each round. For random walks on dynamic connected graphs for which the stationary distribution does not change over time, we show that their behaviour is in a certain sense similar to static graphs. For example, we show that the mixing and hitting times of any sequence of $d$-regular connected graphs is $O(n^2)$, generalising a well-known result for static graphs. We also provide refined bounds depending on the isoperimetric dimension of the graph, matching again known results for static graphs. Finally, we investigate properties of random walks on dynamic graphs that are not always connected: we relate their convergence to stationarity to the spectral properties of an average of transition matrices and provide some examples that demonstrate strong discrepancies between static and dynamic graphs.
0.881876
0.768968
0.112908
2004.07651
Convergence of Eigenvector Continuation
Eigenvector continuation is a computational method that finds the extremal eigenvalues and eigenvectors of a Hamiltonian matrix with one or more control parameters. It does this by projection onto a subspace of eigenvectors corresponding to selected training values of the control parameters. The method has proven to be very efficient and accurate for interpolating and extrapolating eigenvectors. However, almost nothing is known about how the method converges, and its rapid convergence properties have remained mysterious. In this letter we present the first study of the convergence of eigenvector continuation. In order to perform the mathematical analysis, we introduce a new variant of eigenvector continuation that we call vector continuation. We first prove that eigenvector continuation and vector continuation have identical convergence properties and then analyze the convergence of vector continuation. Our analysis shows that, in general, eigenvector continuation converges more rapidly than perturbation theory. The faster convergence is achieved by eliminating a phenomenon that we call differential folding, the interference between non-orthogonal vectors appearing at different orders in perturbation theory. From our analysis we can predict how eigenvector continuation converges both inside and outside the radius of convergence of perturbation theory. While eigenvector continuation is a non-perturbative method, we show that its rate of convergence can be deduced from power series expansions of the eigenvectors. Our results also yield new insights into the nature of divergences in perturbation theory.
We study the pathology that causes tropical eigenspaces of distinct supertropical eigenvalues of a nonsingular matrix $A$, to be dependent. We show that in lower dimensions the eigenvectors of distinct eigenvalues are independent, as desired. The index set that differentiates between subsequent essential monomials of the characteristic polynomial, yields an eigenvalue $\lambda$, and corresponds to the columns of the eigenmatrix $A+\lambda I$ from which the eigenvectors are taken. We ascertain the cause for failure in higher dimensions, and prove that independence of the eigenvectors is recovered in case a certain "difference criterion" holds, defined in terms of disjoint differences between index sets of subsequent coefficients. We conclude by considering the eigenvectors of the matrix $A^\nabla : = \det(A)^{-1}\adj(A)$ and the connection of the independence question to generalized eigenvectors.
0.912526
0.738363
0.174163
2004.07652
Supercongruences for Almkvist--Zudilin sequences
In this note, we confirm some supercongruences involving Almkvist--Zudilin sequences, which were originally conjectured by Z.-H. Sun.
A sequence-to-sequence model is a neural network module for mapping two sequences of different lengths. The sequence-to-sequence model has three core modules: encoder, decoder, and attention. Attention is the bridge that connects the encoder and decoder modules and improves model performance in many tasks. In this paper, we propose two ideas to improve sequence-to-sequence model performance by enhancing the attention module. First, we maintain the history of the location and the expected context from several previous time-steps. Second, we apply multiscale convolution from several previous attention vectors to the current decoder state. We utilized our proposed framework for sequence-to-sequence speech recognition and text-to-speech systems. The results reveal that our proposed extension could improve performance significantly compared to a standard attention baseline.
0.896514
0.663646
0.232869
2004.07653
Chaos-Based Multicarrier VLC Modulator With Compensation of LED Nonlinearity
The massive deployment of light-emitting diode (LED) lightning infrastructure has opened the opportunity to reuse it as visible light communication (VLC) to leverage the current RF spectrum crisis in indoor scenarios. One of the main problems in VLC is the limited dynamic range of LEDs and their nonlinear response, which may lead to a severe degradation in the communication, and more specifically in the bit error rate (BER). This is aggravated by the extensive usage of multicarrier multiplexing, based on optical orthogonal frequency division multiplexing (O-OFDM), characterized by a high peak-to-average power ratio. Here, we present a chaos-based coded modulation (CCM) setup specifically adapted to the LED nonlinearities. It replaces the usual modulation, while keeping the multicarrier O-OFDM structure unchanged. First, we obtain a semi-analytical bound for the bit error probability, taking into account the LED nonlinear response. The bound results particularly tight for the range of signal-to-noise ratio of interest. Then, we propose a method to design the modulator based on optimization techniques. The objective function is the semi-analytical bound, and the optimization is applied to a parameterization of the CCM conjugation function. This appropriately shapes the chaotic waveform and leads to BER improvements that outperform classical counterparts under ideal predistortion.
A fundamental issue in nonlinear dynamics and statistical physics is how to distinguish chaotic from stochastic fluctuations in short experimental recordings. This dilemma underlies many complex systems models from stochastic gene expression or stock exchange to quantum chaos. Traditionally, deterministic chaos is characterized by "sensitive dependence on initial conditions" as indicated by a positive Lyapunov exponent. However, ambiguity arises when applying this criterion to real-world data that are corrupted by measurement noise or perturbed nonautonomously by exogenous deterministic or stochastic inputs. Here, we show that a positive Lyapunov exponent is surprisingly neither necessary nor sufficient proof of deterministic chaos, and that a nonlinear dynamical system under deterministic or stochastic forcing may exhibit multiple forms of nonautonomous chaos assessable by a noise titration assay. These findings lay the foundation for reliable analysis of low-dimensional chaos for complex systems modeling and prediction of a wide variety of physical, biological, and socioeconomic data.
0.882942
0.611852
0.271089
2004.07654
Numerical simulations of shear-induced consecutive coronal mass ejections
Methods: Stealth CMEs represent a particular class of solar eruptions that are clearly distinguished in coronagraph observations, but they don't have a clear source signature. A particular type of stealth CMEs occurs in the trailing current sheet of a previous ejection, therefore, we used the 2.5D MHD package of the code MPI-AMRVAC to numerically simulate consecutive CMEs by imposing shearing motions onto the inner boundary. The initial magnetic configuration consists of a triple arcade structure embedded into a bimodal solar wind, and the sheared polarity inversion line is found in the southern loop system. The mesh was continuously adapted through a refinement method that applies to current carrying structures. We then compared the obtained eruptions with the observed directions of propagation of an initial multiple coronal mass ejection (MCME) event that occurred in September 2009. We further analysed the simulated ejections by tracking the centre of their flux ropes in latitude and their total speed. Radial Poynting flux computation was employed as well to follow the evolution of electromagnetic energy introduced into the system. Results: Changes within 1\% in the shearing speed result in three different scenarios for the second CME, although the preceding eruption seems insusceptible to such small variations. Depending on the applied shearing speed, we thus obtain a failed eruption, a stealth, or a CME driven by the imposed shear, as the second ejection. The dynamics of all eruptions are compared with the observed directions of propagation of an MCME event and a good correlation is achieved. The Poynting flux analysis reveals the temporal variation of the important steps of eruptions. For the first time, a stealth CME is simulated in the aftermath of a first eruption, through changes in the applied shearing speed.
We test the feasibility of 3D coronal-loop tracing in stereoscopic EUV image pairs, with the ultimate goal of enabling efficient 3D reconstruction of the coronal magnetic field that drives flares and coronal mass ejections (CMEs). We developed an automated code designed to perform triangulation of coronal loops in pairs (or triplets) of EUV images recorded from different perspectives. The automated (or blind) stereoscopy code includes three major tasks: (i) automated pattern recognition of coronal loops in EUV images, (ii) automated pairing of corresponding loop patterns from two different aspect angles, and (iii) stereoscopic triangulation of 3D loop coordinates. We perform tests with simulated stereoscopic EUV images and quantify the accuracy of all three procedures. In addition we test the performance of the blind stereoscopy code as a function of the spacecraft-separation angle and as a function of the spatial resolution. We also test the sensitivity to magnetic non-potentiality. The automated code developed here can be used for analysis of existing {\sl Solar TErrestrial RElationship Observatory (STEREO)} data, but primarily serves for a design study of a future mission with dedicated diagnostics of non-potential magnetic fields. For a pixel size of 0.6\arcsec (corresponding to the {\sl Solar Dynamics Observatory (SDO) Atmospheric Imaging Assembly (AIA)} spatial resolution of 1.4\arcsec), we find an optimum spacecraft-separation angle of $\alpha_s \approx 5^\circ$.
0.827662
0.748863
0.078799
2004.07655
Vector perturbations in bouncing cosmology
An old question surrounding bouncing models concerns their stability under vector perturbations. Considering perfect fluids or scalar fields, vector perturbations evolve kinematically as $a^{-2}$, where $a$ is the scale factor. Consequently, a definite answer concerning the bounce stability depends on an arbitrary constant, therefore, there is no definitive answer. In this paper, we consider a more general situation where the primeval material medium is a non-ideal fluid, and its shear viscosity is capable of producing torque oscillations, which can create and dynamically sustain vector perturbations along cosmic evolution. In this framework, one can set that vector perturbations have a quantum mechanical origin, coming from quantum vacuum fluctuations in the far past of the bouncing model, as it is done with scalar and tensor perturbations. Under this prescription, one can calculate their evolution during the whole history of the bouncing model, and precisely infer the conditions under which they remain linear before the expanding phase. It is shown that such linearity conditions impose constraints on the free parameters of bouncing models, which are mild, although not trivial, allowing a large class of possibilities. Such conditions impose that vector perturbations are also not observationally relevant in the expanding phase. The conclusion is that bouncing models are generally stable under vector perturbations. As they are also stable under scalar and tensor perturbations, we conclude that bouncing models are generally stable under perturbations originated from quantum vacuum perturbations in the far past of their contracting phase.
We present a nonsingular scenario in which an inflation era goes after a bounce from a contracting scenario in the early universe. The contracting of the universe is supposed to be slow, such that the initial anisotropies will not grow too fast to become dominant and destroy the bounce. After the bounce, the universe enters into an inflationary region and reheating phase, where primordial perturbations are generated. The tensor-to-scalar ratio of the perturbations are expected to be consistent with the newly released data, $r=0.2^{+0.07}_{-0.05}$. The addition of the bounce process is aimed at getting rid of the annoying Big-Bang Singularity, which generally exist in pure inflation models.
0.853371
0.808073
0.045299
2004.07656
Adding virtual measurements by PWM-induced signal injection
We show that for PWM-operated devices, it is possible to benefit from signal injection \emph{without an external probing signal}, by suitably using the excitation provided by the PWM itself. As in the usual signal injection framework conceptualized in [1], an extra "virtual measurement" can be made available for use in a control law, but without the practical drawbacks caused by an external signal.
We propose and fabricate a dual-emitter light-induced neuromorphic device composed of two light-induced devices with a common collector and base. Two InGaN multiple quantum well diodes (MQW-diodes) are used as the emitters to generate light, and one InGaN MQW-diode is used as the common collector to absorb the emitted light. When the presynaptic voltages are synchronously applied to the two emitters, the collector demonstrates an adding together of the excitatory post synaptic voltage (EPSV). The width and period of the two input signals constitute the code to generate spatial summation and recognition effects at the same time. Experimental results confirm that temporal summation caused by the repetitive-pulse facilitation could significantly strengthen the spatial summation effect due to the adding together behavior when the repetitive stimulations are applied to the two emitters in rapid succession. Particularly, the resonant summation effect occurs at the co-summation region when the two repetitive-pulse signals have a resonant period, which offers a more sophisticated spatiotemporal EPSV summation function for the dual-emitter neuromorphic device.
0.884486
0.653613
0.230873
2004.07658
Exchange interaction of hole-spin qubits in double quantum dots in highly anisotropic semiconductors
We study the exchange interaction between two hole-spin qubits in a double quantum dot setup in a silicon nanowire in the presence of magnetic and electric fields. Based on symmetry arguments we show that there exists an effective spin that is conserved even in highly anisotropic semiconductors, provided that the system has a twofold symmetry with respect to the direction of the applied magnetic field. This finding facilitates the definition of qubit basis states and simplifies the form of exchange interaction for two-qubit gates in coupled quantum dots. If the magnetic field is applied along a generic direction, cubic anisotropy terms act as an effective spin-orbit interaction introducing novel exchange couplings even for an inversion symmetric setup. Considering the example of a silicon nanowire double dot, we present the relative strength of these anisotropic exchange interaction terms and calculate the fidelity of the $\sqrt{\text{SWAP}}$ gate. Furthermore, we show that the anisotropy-induced spin-orbit effects can be comparable to that of the direct Rashba spin-orbit interaction for experimentally feasible electric field strengths.
A photo-excited II-VI semiconductor nanocrystal doped with a few Mn spins is considered. The effects of spin-exciton interactions and the resulting multi-spin correlations on the photoluminescence are calculated by numerical diagonalization of the Hamiltonian, including exchange interaction between electrons, holes and Mn spins, as well as spin-orbit interaction. The results provide a unified description of recent experiments of photoluminesnce of dots with one and many Mn atoms as well as optically induced ferromagnetism in semimagnetic nanocrystals.
0.924558
0.79563
0.128928
2004.07659
Algorithmic Foundations for the Diffraction Limit
For more than a century and a half it has been widely-believed (but was never rigorously shown) that the physics of diffraction imposes certain fundamental limits on the resolution of an optical system. However our understanding of what exactly can and cannot be resolved has never risen above heuristic arguments which, even worse, appear contradictory. In this work we remedy this gap by studying the diffraction limit as a statistical inverse problem and, based on connections to provable algorithms for learning mixture models, we rigorously prove upper and lower bounds on how many photons we need (and how precisely we need to record their locations) to resolve closely-spaced point sources. We give the first provable algorithms that work regardless of the separation, but only for a constant number of point sources. Surprisingly, we show that when the number of point sources becomes large, there is a phase transition where the sample complexity goes from polynomial to exponential, and we pin down its location to within a universal constant that is independent of the number of point sources. Thus it is rigorously possible both to break the diffraction limit and yet to prove strong impossibility results depending on the setup. This is the first non-asymptotic statistical foundation for resolution in a model arising from first principles in physics, and helps clarify many omnipresent debates in the optics literature.
Following the Good-and-Walker picture, hard diffraction in the high-energy/small-x limit of QCD can be described in terms of eigenstates of the scattering matrix off a Color Glass Condensate. From the CGC non-linear evolution equations, it is then possible to derive the behavior of diffractive cross-sections at small $x.$ I discuss recent results, in particular the consequences of the inclusion of Pomeron loops in the evolution.
0.860129
0.719122
0.141006
2004.07661
Lifshitz-scaling to a CPT-even lorentz-violating electrodynamics and time delay from gamma-ray burst
In this work, we have used a Ho\v{r}ava-Lifshitz scaling to rewrite a high-order derivative Lorentz-violating CPT-even electrodynamics, considering the possibility that the Lorentz invariance violation, in which it is originally suppressed by the quantum gravity energy scale $M_{\rm QG}$, it occurs in a scenario with some anisotropy between space and time above a certain intermediate energy scale $\Lambda_{\rm HL} << M_{\rm QG}$. To test this model, we have used observational results of a cosmological time delay between high and low energy photons from GRB090510 event. To specific values of the Lifshitz critical exponent, we have found interesting lower bounds on the values of $M_{\rm QG}$.
The gravitational Standard-Model Extension (SME) is the general field-theory based framework for the analysis of CPT and Lorentz violation. In this work we summarize the implications of Lorentz and CPT violation for antimatter gravity in the context of the SME. Implications of various attempts to place indirect limits on anomalous antimatter gravity are considered in the context of SME-based models.
0.897667
0.719046
0.178621
2004.07662
Quantifying Low-Battery Anxiety of Mobile Users and Its Impacts on Video Watching Behavior
People nowadays are increasingly dependent on mobile phones for daily communication, study, and business. Along with this it incurs the low-battery anxiety (LBA). Although having been unveiled for a while, LBA has not been thoroughly investigated yet. Without a better understanding of LBA, it would be difficult to precisely validate energy saving and management techniques in terms of alleviating LBA and enhancing Quality of Experience (QoE) of mobile users. To fill the gap, we conduct an investigation over 2000+ mobile users, look into their feelings and reactions towards LBA, and quantify their anxiety degree during the draining of battery power. As a case study, we also investigate the impact of LBA on user's behavior at video watching, and with the massive collected answers we are able to quantify user's abandoning likelihood of attractive videos versus the battery status of mobile phone. The empirical findings and quantitative models obtained in this work not only disclose the characteristics of LBA among modern mobile users, but also provide valuable references for the design, evaluation, and improvement of QoE-aware mobile applications and services.
Virtual reality has been gaining popularity in recent years caused by the proliferation of affordable consumer-grade devices such as Oculus Rift, HTC Vive, and Samsung VR. Amongst the various VR applications, 360{\deg} video streaming is currently one of the most popular ones. It allows user to change their field-of-view (FoV) based on head movement, which enables them to freely select an area anywhere from the sphere the video is (virtually) projected to. While 360{\deg} video streaming offers new exciting ways of consuming content for viewers, it poses a series of challenges to the systems that are responsible for the distribution of such content from the origin to the viewer. One challenge is the significantly increased bandwidth requirement for streaming such content in real time. Recent research has shown that only streaming the content that is in the user's FoV in high quality can lead to strong bandwidth savings. This can be achieved by analyzing the viewers head orientation and movement based on sensor information. Alternatively, historic information from users that watched the content in the past can be taken into account to prefetch 360{\deg} video data in high quality assuming the viewer will direct the FoV to these areas. In this paper, we present a 360{\deg} video streaming system that transitions between sensor- and content-based predictive mechanisms. We evaluate the effects of this transition-based approach on the Quality of Experience (QoE) of such a VR streaming system and show that the perceived quality can be increased between 50\% and 80\% compared to systems that only apply either one of the two approaches.
0.901862
0.620157
0.281705
2004.07663
Optimising the Fit of Stack Overflow Code Snippets into Existing Code
Software developers often reuse code from online sources such as Stack Overflow within their projects. However, the process of searching for code snippets and integrating them within existing source code can be tedious. In order to improve efficiency and reduce time spent on code reuse, we present an automated code reuse tool for the Eclipse IDE (Integrated Developer Environment), NLP2TestableCode. NLP2TestableCode can not only search for Java code snippets using natural language tasks, but also evaluate code snippets based on a user's existing code, modify snippets to improve fit and correct errors, before presenting the user with the best snippet, all without leaving the editor. NLP2TestableCode also includes functionality to automatically generate customisable test cases and suggest argument and return types, in order to further evaluate code snippets. In evaluation, NLP2TestableCode was capable of finding compilable code snippets for 82.9% of tasks, and testable code snippets for 42.9%.
A variety of new and powerful algorithms have been developed for image compression over the years. Among them the wavelet-based image compression schemes have gained much popularity due to their overlapping nature which reduces the blocking artifacts that are common phenomena in JPEG compression and multiresolution character which leads to superior energy compaction with high quality reconstructed images. This paper provides a detailed survey on some of the popular wavelet coding techniques such as the Embedded Zerotree Wavelet (EZW) coding, Set Partitioning in Hierarchical Tree (SPIHT) coding, the Set Partitioned Embedded Block (SPECK) Coder, and the Embedded Block Coding with Optimized Truncation (EBCOT) algorithm. Other wavelet-based coding techniques like the Wavelet Difference Reduction (WDR) and the Adaptive Scanned Wavelet Difference Reduction (ASWDR) algorithms, the Space Frequency Quantization (SFQ) algorithm, the Embedded Predictive Wavelet Image Coder (EPWIC), Compression with Reversible Embedded Wavelet (CREW), the Stack-Run (SR) coding and the recent Geometric Wavelet (GW) coding are also discussed. Based on the review, recommendations and discussions are presented for algorithm development and implementation.
0.802664
0.565978
0.236686
2004.07665
Autonomous Cooperative Flight Control for Airship Swarms
This work investigates two approaches for the design of autonomous cooperative flight controllers for airship swarms. The first controller is based on formation flight and the second one is based on swarm intelligence strategies. In both cases, the team of airships needs to perform two different tasks: waypoint path following and ground moving target tracking. The UAV platform considered in this work is the NOAMAY airship developed in Brazil. We use a simulated environment to test the proposed approaches. Results show the inherent flexibility of the swarm intelligence approach on both tasks.
The bang-bang optimal control method was proposed for glow discharge plasma actuators, taking account of practical issues, such as limited actuation states with instantaneously varied aerodynamic control performance. Hence, the main contribution of this Note is to integrate flight control with active flow control in particular for plasma actuators. Flow control effects were examined in wind tunnel experiments, which show that the plasma authority for flow control is limited. Flow control effects are only obvious at pitch angles near stall. However, flight control simulations suggest that even those small plasma-induced roll moments can satisfactorily fulfill the maneuver tasks and meet flight quality specifications. In addition, the disturbance from volatile plasma-induced roll moments can be rejected. Hence, the proposed bang-bang control method is a promising candidate of control design methodology for plasma actuators.
0.922914
0.645503
0.277411
2004.07666
Exchange coupling in a linear chain of three quantum-dot spin qubits in silicon
Quantum gates between spin qubits can be implemented leveraging the natural Heisenberg exchange interaction between two electrons in contact with each other. This interaction is controllable by electrically tailoring the overlap between electronic wavefunctions in quantum dot systems, as long as they occupy neighbouring dots. An alternative route is the exploration of superexchange - the coupling between remote spins mediated by a third idle electron that bridges the distance between quantum dots. We experimentally demonstrate direct exchange coupling and provide evidence for second neighbour mediated superexchange in a linear array of three single-electron spin qubits in silicon, inferred from the electron spin resonance frequency spectra. We confirm theoretically through atomistic modeling that the device geometry only allows for sizeable direct exchange coupling for neighbouring dots, while next nearest neighbour coupling cannot stem from the vanishingly small tail of the electronic wavefunction of the remote dots, and is only possible if mediated.
Phosphorus donor impurities in silicon are a promising candidate for solid-state quantum computing due to their exceptionally long coherence times and high fidelities. However, individual addressability of exchange coupled donor qubits with separations ~15nm is challenging. Here we show that by using atomic-precision lithography we can place a single P donor next to a 2P molecule 16(+/-1)nm apart and use their distinctive hyperfine coupling strengths to address qubits at vastly different resonance frequencies. In particular the single donor yields two hyperfine peaks separated by 97(+/-2.5)MHz, in contrast to the donor molecule which exhibits three peaks separated by 262(+/-10)MHz. Atomistic tight-binding simulations confirm the large hyperfine interaction strength in the 2P molecule with an inter-donor separation of ~0.7nm, consistent with lithographic STM images of the 2P site during device fabrication. We discuss the viability of using donor molecules for built-in addressability of electron spin qubits in silicon.
0.894525
0.826537
0.067988
2004.07667
Null It Out: Guarding Protected Attributes by Iterative Nullspace Projection
The ability to control for the kinds of information encoded in neural representation has a variety of use cases, especially in light of the challenge of interpreting these models. We present Iterative Null-space Projection (INLP), a novel method for removing information from neural representations. Our method is based on repeated training of linear classifiers that predict a certain property we aim to remove, followed by projection of the representations on their null-space. By doing so, the classifiers become oblivious to that target property, making it hard to linearly separate the data according to it. While applicable for general scenarios, we evaluate our method on bias and fairness use-cases, and show that our method is able to mitigate bias in word embeddings, as well as to increase fairness in a setting of multi-class classification.
This is a review paper on some of the physics, modeling, and iterative algorithms in proton computed tomography (pCT) image reconstruction. The primary challenge in pCT image reconstruction lies in the degraded spatial resolution resulting from multiple Coulomb scattering within the imaged object. Analytical models such as the most likely path (MLP) have been proposed to predict the scattered trajectory from measurements of individual proton location and direction before and after the object. Iterative algorithms provide a flexible tool with which to incorporate these models into image reconstruction. The modeling leads to a large and sparse linear system of equations that can efficiently be solved by projection methods-based iterative algorithms. Such algorithms perform projections of the iterates onto the hyperlanes that are represented by the linear equations of the system. They perform these projections in possibly various algorithmic structures, such as block-iterative projections (BIP), string-averaging projections (SAP). These algorithmic schemes allow flexibility of choosing blocks, strings, and other parameters. They also cater for parallel implementations which are apt to further save clock time in computations. Experimental results are presented which compare some of those algorithmic options.
0.760382
0.637112
0.123269
2004.07668
Holding a Conference Online and Live due to COVID-19
The joint EDBT/ICDT conference (International Conference on Extending Database Technology/International Conference on Database Theory) is a well established conference series on data management, with annual meetings in the second half of March that attract 250 to 300 delegates. Three weeks before EDBT/ICDT 2020 was planned to take place in Copenhagen, the rapidly developing Covid-19 pandemic led to the decision to cancel the face-to-face event. In the interest of the research community, it was decided to move the conference online while trying to preserve as much of the real-life experience as possible. As far as we know, we are one of the first conferences that moved to a fully synchronous online experience due to the COVID-19 outbreak. With fully synchronous, we mean that participants jointly listened to presentations, had live Q&A, and attended other live events associated with the conference. In this report, we share our decisions, experiences, and lessons learned.
The outbreak of the new virus COVID-19, beyond the human health risks and loss, has caused also very serious problems in a wide range of human activities, including the basic and applied scientific research, mainly that concern world wide collaborations. It is desirable to all of us to have the prospect of quickly predicting a turning point in the daily cases curve of the disease. In this work we face the problem of COVID-19 virus disease spreading by aiming mostly to create a reliable mathematical model describing this mechanism for an isolated society, for cities or even for a whole country. Drawing upon similar mechanisms appearing in the particle detector Physics, we concentrated to the so called, semi-gaussian function of n-degree. This approach can provide some very useful advantages in the data analysis of the daily reported cases of the infected people. Applying this model and fitting to the data, reported until the submission of this work, we have determined, among others, the mean infection time for a citizen in the society under study. We also applied and adopted this model to the reported cases in other countries and we have performed useful comparisons and conclusions.
0.793757
0.652259
0.141499
2004.07669
Inferring the origins of the pulsed gamma-ray emission from the Crab pulsar with 10-year Fermi LAT data
Context: The Crab pulsar is a bright $\gamma$-ray source detected at photon energies up to $\sim$1 TeV. Its phase-averaged and phase-resolved $\gamma$-ray spectra both exhibit (sub-)exponential cutoffs while those above 10 GeV apparently follow simple power-laws. Aims: We re-visit the $\gamma$-ray properties of the Crab pulsar with 10-year \emph{Fermi} Large Area Telescope (LAT) data in the range of 60 MeV--500 GeV. With the phase-resolved spectra, we investigate the origins and mechanisms responsible for the emissions. Methods: The phaseograms are reconstructed for different energy bands and further analysed using a wavelet decomposition. The phase-resolved energy spectra are combined with the observations of ground-based instruments like MAGIC and VERITAS to achieve a larger energy converage. We fit power-law models to the overlapping energy spectra from 10 GeV to $\sim$1 TeV. We include in the fit a relative cross-calibration of energy scales between air-shower based gamma-ray telescopes with the orbital pair-production telescope of the Fermi mission. Results: We confirm the energy-dependence of the $\gamma$-ray pulse shape, and equivalently, the phase-dependence of the spectral shape for the Crab pulsar. A relatively sharp exponential cutoff at a relatively high energy of $\sim$8 GeV is observed for the bridge-phase emission. The $E>$10 GeV spectrum observed for the second pulse peak is harder than those for other phases. Conclusions: In view of the diversity of phase-resolved spectral shapes of the Crab pulsar, we tentatively propose a multi-origin scenario where the polar-cap, outer-gap and relativistic-wind regions are involved.
We are constructing the broadband SED catalog of the MOJAVE sample from the radio to the gamma-ray band using MOJAVE, Swift UVOT/XRT/BAT, and Fermi/LAT data, in order to understand the emission mechanism of extragalactic outflows and to investigate the site of high-energy emission in AGN. Since the launch of Fermi gamma-ray Space Telescope in August 2008, two thirds of the MOJAVE sources have been detected by Fermi/LAT. Combining the results of high-resolution VLBI, X-ray, and gamma-ray observations of the jet-dominated AGN sample, we want to pin down the origin of high-energy emission in relativistic jets. Here we present our overall project and preliminary results for 6 selected sources.
0.886853
0.783776
0.103078
2004.07670
The BAHAMAS project: Effects of dynamical dark energy on large-scale structure
In this work we consider the impact of spatially-uniform but time-varying dark energy (or `dynamical dark energy', DDE) on large-scale structure in a spatially flat universe, using large cosmological hydrodynamical simulations that form part of the BAHAMAS project. As DDE changes the expansion history of the universe, it impacts the growth of structure. We explore variations in DDE that are constrained to be consistent with the cosmic microwave background. We find that DDE can affect the clustering of matter and haloes at the ~10% level (suppressing it for so-called `freezing' models, while enhancing it for `thawing' models), which should be distinguishable with upcoming large-scale structure surveys. DDE cosmologies can also enhance or suppress the halo mass function (with respect to LCDM) over a wide range of halo masses. The internal properties of haloes are minimally affected by changes in DDE, however. Finally, we show that the impact of baryons and associated feedback processes is largely independent of the change in cosmology and that these processes can be modelled separately to typically better than a few percent accuracy
Disk galaxies contain a large amount of interstellar dust, which affects the projection of kinematic quantities. We investigate in detail the effects of dust extinction on the mean projected velocity and the projected velocity dispersion. We use our results to construct a general strategy to determine the dynamical structure of disk galaxies, with the aim to constrain their mass distribution and dynamical history.
0.884121
0.748062
0.136059
2004.07671
Isomorphism Testing for Graphs Excluding Small Minors
We prove that there is a graph isomorphism test running in time $n^{\operatorname{polylog}(h)}$ on $n$-vertex graphs excluding some $h$-vertex graph as a minor. Previously known bounds were $n^{\operatorname{poly}(h)}$ (Ponomarenko, 1988) and $n^{\operatorname{polylog}(n)}$ (Babai, STOC 2016). For the algorithm we combine recent advances in the group-theoretic graph isomorphism machinery with new graph-theoretic arguments.
A propositional logic sentence in conjunctive normal form that has clauses of length two (a 2-CNF) can be associated with a multigraph in which the vertices correspond to the variables and edges to clauses. We first show that every such sentence that has been reduced, that is, which is unchanged under application of certain tautologies, is equisatisfiable to a 2-CNF whose associated multigraph is, in fact, a simple graph. Our main result is a complete characterization of graphs that can support unsatisfiable 2-CNF sentences. We show that a simple graph can support an unsatisfiable reduced 2-CNF sentence if and only if it contains any one of four specific small graphs as a topological minor. Equivalently, all reduced 2-CNF sentences supported on a given simple graph are satisfiable if and only if all subdivisions of those four graphs are forbidden as subgraphs of of the original graph. We conclude with a discussion of why the Robertson-Seymour graph minor theorem does not apply in our approach.
0.855237
0.757943
0.097294
2004.07672
Generate, Delete and Rewrite: A Three-Stage Framework for Improving Persona Consistency of Dialogue Generation
Maintaining a consistent personality in conversations is quite natural for human beings, but is still a non-trivial task for machines. The persona-based dialogue generation task is thus introduced to tackle the personality-inconsistent problem by incorporating explicit persona text into dialogue generation models. Despite the success of existing persona-based models on generating human-like responses, their one-stage decoding framework can hardly avoid the generation of inconsistent persona words. In this work, we introduce a three-stage framework that employs a generate-delete-rewrite mechanism to delete inconsistent words from a generated response prototype and further rewrite it to a personality-consistent one. We carry out evaluations by both human and automatic metrics. Experiments on the Persona-Chat dataset show that our approach achieves good performance.
Visual compatibility is critical for fashion analysis, yet is missing in existing fashion image synthesis systems. In this paper, we propose to explicitly model visual compatibility through fashion image inpainting. To this end, we present Fashion Inpainting Networks (FiNet), a two-stage image-to-image generation framework that is able to perform compatible and diverse inpainting. Disentangling the generation of shape and appearance to ensure photorealistic results, our framework consists of a shape generation network and an appearance generation network. More importantly, for each generation network, we introduce two encoders interacting with one another to learn latent code in a shared compatibility space. The latent representations are jointly optimized with the corresponding generation network to condition the synthesis process, encouraging a diverse set of generated results that are visually compatible with existing fashion garments. In addition, our framework is readily extended to clothing reconstruction and fashion transfer, with impressive results. Extensive experiments with comparisons with state-of-the-art approaches on fashion synthesis task quantitatively and qualitatively demonstrate the effectiveness of our method.
0.923215
0.644942
0.278274
2004.07673
All two-party facet Bell inequalities are violated by Almost Quantum correlations
The characterization of the set of quantum correlations is a problem of fundamental importance in quantum information. The question whether every proper (tight) Bell inequality is violated in Quantum theory is an intriguing one in this regard. Here, we make significant progress in answering this question, by showing that every tight Bell inequality is violated by 'Almost Quantum' correlations, a semi-definite programming relaxation of the set of quantum correlations. As a consequence, we show that many (classes of) Bell inequalities including two-party correlation Bell inequalities and multi-outcome non-local computation games, that do not admit quantum violations, are not facets of the classical Bell polytope. To do this, we make use of the intriguing connections between Bell correlations and the graph-theoretic Lov\'{a}sz-theta set, discovered by Cabello-Severini-Winter (CSW). We also exploit connections between the cut polytope of graph theory and the classical correlation Bell polytope, to show that correlation Bell inequalities that define facets of the lower dimensional correlation polytope are violated in quantum theory. The methods also enable us to derive novel (almost) quantum Bell inequalities, which may be of independent interest for self-testing applications.
With the advent of quantum information, the violation of a Bell inequality is used as evidence of the absence of an eavesdropper in cryptographic scenarios such as key distribution and randomness expansion. One of the key assumptions of Bell's Theorem is the existence of experimental "free will", meaning that measurement settings can be chosen at random and independently by each party. The relaxation of this assumption potentially shifts the balance of power towards an eavesdropper. We consider a no-signalling model with reduced "free will" and bound the adversary's capabilities in the task of randomness expansion.
0.902541
0.742457
0.160085
2004.07674
Stochastic epidemics in a heterogeneous community (Part III of the book Stochastic Epidemic Models and Inference)
This document is the Part III of the book 'Stochastic Epidemic Models with Inference' edited by Tom Britton and Etienne Pardoux. Plan of the chapter: 1) Random Graphs, 2) The Reproduction Number R0, 3) SIR Epidemics on Configuration Model Graphs, 4) Statistical Description of Epidemics Spreading on Networks: The Case of Cuban HIV.
Understanding the network structure, and finding out the influential nodes is a challenging issue in the large networks. Identifying the most influential nodes in the network can be useful in many applications like immunization of nodes in case of epidemic spreading, during intentional attacks on complex networks. A lot of research is done to devise centrality measures which could efficiently identify the most influential nodes in the network. There are two major approaches to the problem: On one hand, deterministic strategies that exploit knowledge about the overall network topology in order to find the influential nodes, while on the other end, random strategies are completely agnostic about the network structure. Centrality measures that can deal with a limited knowledge of the network structure are required. Indeed, in practice, information about the global structure of the overall network is rarely available or hard to acquire. Even if available, the structure of the network might be too large that it is too much computationally expensive to calculate global centrality measures. To that end, a centrality measure is proposed that requires information only at the community level to identify the influential nodes in the network. Indeed, most of the real-world networks exhibit a community structure that can be exploited efficiently to discover the influential nodes. We performed a comparative evaluation of prominent global deterministic strategies together with stochastic strategies with an available and the proposed deterministic community-based strategy. Effectiveness of the proposed method is evaluated by performing experiments on synthetic and real-world networks with community structure in the case of immunization of nodes for epidemic control.
0.87793
0.770401
0.107529
2004.07675
Software Challenges For HL-LHC Data Analysis
The high energy physics community is discussing where investment is needed to prepare software for the HL-LHC and its unprecedented challenges. The ROOT project is one of the central software players in high energy physics since decades. From its experience and expectations, the ROOT team has distilled a comprehensive set of areas that should see research and development in the context of data analysis software, for making best use of HL-LHC's physics potential. This work shows what these areas could be, why the ROOT team believes investing in them is needed, which gains are expected, and where related work is ongoing. It can serve as an indication for future research proposals and cooperations.
With the advent of a new generation of telescopes (INTEGRAL, Fermi, H.E.S.S., MAGIC, VERITAS, MILAGRO) and the prospects of planned observatories such as CTA or HAWC, gamma-ray astronomy is becoming an integral part of modern astrophysical research. Analysing gamma-ray data is still a major challenge, and today relies on a large diversity of tools and software frameworks that were specifically developed for each instrument. With the goal of facilitating and unifying the analysis of gamma-ray data, we are currently developing an innovative data analysis toolbox, called the GammaLib, that enables gamma-ray data analysis in an instrument independent way. We will present the basic ideas that are behind the GammaLib, and describe its architecture and usage.
0.854266
0.741447
0.112818
2004.07676
Video Face Manipulation Detection Through Ensemble of CNNs
In the last few years, several techniques for facial manipulation in videos have been successfully developed and made available to the masses (i.e., FaceSwap, deepfake, etc.). These methods enable anyone to easily edit faces in video sequences with incredibly realistic results and a very little effort. Despite the usefulness of these tools in many fields, if used maliciously, they can have a significantly bad impact on society (e.g., fake news spreading, cyber bullying through fake revenge porn). The ability of objectively detecting whether a face has been manipulated in a video sequence is then a task of utmost importance. In this paper, we tackle the problem of face manipulation detection in video sequences targeting modern facial manipulation techniques. In particular, we study the ensembling of different trained Convolutional Neural Network (CNN) models. In the proposed solution, different models are obtained starting from a base network (i.e., EfficientNetB4) making use of two different concepts: (i) attention layers; (ii) siamese training. We show that combining these networks leads to promising face manipulation detection results on two publicly available datasets with more than 119000 videos.
In this paper we compare the use of several features in the task of content filtering for video social networks, a very challenging task, not only because the unwanted content is related to very high-level semantic concepts (e.g., pornography, violence, etc.) but also because videos from social networks are extremely assorted, preventing the use of constrained a priori information. We propose a simple method, able to combine diverse evidence, coming from different features and various video elements (entire video, shots, frames, keyframes, etc.). We evaluate our method in three social network applications, related to the detection of unwanted content - pornographic videos, violent videos, and videos posted to artificially manipulate popularity scores. Using challenging test databases, we show that this simple scheme is able to obtain good results, provided that adequate features are chosen. Moreover, we establish a representation using codebooks of spatiotemporal local descriptors as critical to the success of the method in all three contexts. This is consequential, since the state-of-the-art still relies heavily on static features for the tasks addressed.
0.861946
0.699473
0.162474
2004.07677
A Unifying Characterization of Tree-based Networks and Orchard Networks using Cherry Covers
Phylogenetic networks are used to study evolutionary relationships between species in biology. Such networks are often categorized into classes by their topological features, which stem from both biological and computational motivations. We study two network classes in this paper: tree-based networks and orchard networks. Tree-based networks are those that can be obtained by inserting edges between the edges of an underlying tree. Orchard networks are a recently introduced generalization of the class of tree-child networks. Structural characterizations have already been discovered for tree-based networks; this is not the case for orchard networks. In this paper, we introduce cherry covers---a unifying characterization of both network classes---in which we decompose the edges of the networks into so-called cherry shapes and reticulated cherry shapes. We show that cherry covers can be used to characterize the class of tree-based networks as well as the class of orchard networks. Moreover, we also generalize these results to non-binary networks.
This paper presents the design and implementation of a measurement-based QoS and resource management framework, CNQF (Converged Networks QoS Management Framework). CNQF is designed to provide unified, scalable QoS control and resource management through the use of a policy-based network management paradigm. It achieves this via distributed functional entities that are deployed to co-ordinate the resources of the transport network through centralized policy-driven decisions supported by measurement-based control architecture. We present the CNQF architecture, implementation of the prototype and validation of various inbuilt QoS control mechanisms using real traffic flows on a Linux-based experimental test bed.
0.908514
0.656786
0.251727
2004.07678
Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey
We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives. As a consequence, online social deception (OSD) in SNSs has emerged as a serious threat in cyberspace, particularly for users vulnerable to such cyberattacks. Cyber attackers have exploited the sophisticated features of SNSs to carry out harmful OSD activities, such as financial fraud, privacy threat, or sexual/labor exploitation. Therefore, it is critical to understand OSD and develop effective countermeasures against OSD for building a trustworthy SNSs. In this paper, we conducted an extensive survey, covering (i) the multidisciplinary concepts of social deception; (ii) types of OSD attacks and their unique characteristics compared to other social network attacks and cybercrimes; (iii) comprehensive defense mechanisms embracing prevention, detection, and response (or mitigation) against OSD attacks along with their pros and cons; (iv) datasets/metrics used for validation and verification; and (v) legal and ethical concerns related to OSD research. Based on this survey, we provide insights into the effectiveness of countermeasures and the lessons from existing literature. We conclude this survey paper with an in-depth discussions on the limitations of the state-of-the-art and recommend future research directions in this area.
Since 1950, information flows have been in the centre of scientific research. Up until internet penetration in the late 90s, these studies were based over traditional offline social networks. Several observations in offline information flows studies, such as two-step flow of communication and the importance of weak ties, were verified in several online studies, showing that the diffused information flows from one Online Social Network (OSN) to several others. Within that flow, information is shared to and reproduced by the users of each network. Furthermore, the original content is enhanced or weakened according to its topic, the dynamic and exposure of each OSNs. In such a concept, each OSN is considered a layer of information flows that interacts with each other. In this paper, we examine such flows in several social networks, as well as their diffusion and lifespan across multiple OSNs, in terms of user-generated content. Our results verify the perception of content and information connection in various OSNs.
0.897468
0.685974
0.211494
2004.07679
Composable Security for Multipartite Entanglement Verification
We present a composably secure protocol allowing $n$ parties to test an entanglement generation resource controlled by a possibly dishonest party. The test consists only in local quantum operations and authenticated classical communication once a state is shared among them and provides composable security, namely it can be used as a secure subroutine by $n$ honest parties within larger communication protocols to test if a source is sharing quantum states that are at least $\epsilon$-close to the GHZ state. This claim comes on top of previous results on multipartite entanglement verification where the security was studied in the usual game-based model. Here we improve the protocol to make it more suitable for practical use in a quantum network and we study its security in the Abstract Cryptography framework to highlight composability issues and avoid hidden assumptions. This framework is a top-to-bottom theory that makes explicit any piece of information that each component (party or resource) gets at every time-step of the protocol. Moreover any security proof, which amounts to showing indistinguishability between an ideal resource having the desired security properties (up to local simulation) and the concrete resource representing the protocol, is composable for free in this setting. Our protocol can typically be used as a subroutine in a Quantum Internet, to securely share a GHZ state among the network before performing a communication or computation protocol.
As two of the most important entanglement measures--the entanglement of formation and the entanglement of distillation--have so far been limited to bipartite settings, the study of other entanglement measures for multipartite systems appears necessary. Here, connections between two other entanglement measures--the relative entropy of entanglement and the geometric measure of entanglement--are investigated. It is found that for arbitrary pure states the latter gives rise to a lower bound on the former. For certain pure states, some bipartite and some multipartite, this lower bound is saturated, and thus their relative entropy of entanglement can be found analytically in terms of their known geometric measure of entanglement. For certain mixed states, upper bounds on the relative entropy of entanglement are also established. Numerical evidence strongly suggests that these upper bounds are tight, i.e., they are actually the relative entropy of entanglement.
0.877832
0.773278
0.104555
2004.07680
On equivariant oriented cohomology of Bott-Samelson varieties
For any Bott-Samelson resolution $q_{I}:\hat{X_{I}}\rightarrow G/B$ of the flag variety $G/B$, and any torus equivariant oriented cohomology $h_T$, we compute the restriction formula of certain basis $\eta_L$ of $h_T(\hat{X_{I}})$ determined by the projective bundle formula. As an application, we show that $h_T(\hat{X_{I}})$ embeds into the equivariant oriented cohomology of $T$-fixed points, and the image can be characterized by using the Goresky-Kottwitz-MacPherson (GKM) description. Furthermore, we compute the push-forward of the basis $\eta_L$ onto $h_T(G/B)$, and their restriction formula.
A Bott manifold is the total space of some iterated $\mathbb C P^1$-bundle over a point. We prove that any graded ring isomorphism between the cohomology rings of two Bott manifolds preserves their Pontrjagin classes. Moreover, we prove that such an isomorphism is induced from a diffeomorphism if the Bott manifolds are $\mathbb Z/2$-trivial, where a Bott manifold is called $\mathbb Z/2$-trivial if its cohomology ring with $\mathbb Z/2$-coefficient is isomorphic to that of a product of $\mathbb C P^1$'s.
0.87419
0.809751
0.06444
2004.07681
De-Signing Hamiltonians for Quantum Adiabatic Optimization
Quantum fluctuations driven by non-stoquastic Hamiltonians have been conjectured to be an important and perhaps essential missing ingredient for achieving a quantum advantage with adiabatic optimization. We introduce a transformation that maps every non-stoquastic adiabatic path ending in a classical Hamiltonian to a corresponding stoquastic adiabatic path by appropriately adjusting the phase of each matrix entry in the computational basis. We compare the spectral gaps of these adiabatic paths and find both theoretically and numerically that the paths based on non-stoquastic Hamiltonians have generically smaller spectral gaps between the ground and first excited states, suggesting they are less useful than stoquastic Hamiltonians for quantum adiabatic optimization. These results apply to any adiabatic algorithm which interpolates to a final Hamiltonian that is diagonal in the computational basis.
We propose that the constants of Nature we observe (which appear as parameters in the classical action) are quantum observables in a kinematical Hilbert space. When all of these observables commute, our proposal differs little from the treatment given to classical parameters in quantum information theory, at least if we were to inhabit a constants' eigenstate. Non-commutativity introduces novelties, due to its associated uncertainty and complementarity principles, and it may even preclude hamiltonian evolution. The system typically evolves as a quantum superposition of hamiltonian evolutions resulting from a diagonalization process, and these are usually quite distinct from the original one (defined in terms of the non-commuting constants). We present several examples targeting $G$, $c$ and $\Lambda $, and the dynamics of homogeneous and isotropic Universes. If we base our construction on the Heisenberg algebra and the quantum harmonic oscillator, the alternative dynamics tends to silence matter (effectively setting $G$ to zero), and make curvature and the cosmological constant act as if their signs are reversed. Thus, the early Universe expands as a quantum superposition of different Milne or de Sitter expansions for all material equations of state, even though matter nominally dominates the density, $\rho $, because of the negligible influence of $G\rho $ on the dynamics. A superposition of Einstein static universes can also be obtained. We also investigate the results of basing our construction on the algebra of $SU(2)$, into which we insert information about the sign of a constant of Nature, or whether its action is switched on or off. In this case we find examples displaying quantum superpositions of bounces at the initial state for the Universe.
0.850301
0.63736
0.212941
2004.07682
On the use of Benford's law to detect GAN-generated images
The advent of Generative Adversarial Network (GAN) architectures has given anyone the ability of generating incredibly realistic synthetic imagery. The malicious diffusion of GAN-generated images may lead to serious social and political consequences (e.g., fake news spreading, opinion formation, etc.). It is therefore important to regulate the widespread distribution of synthetic imagery by developing solutions able to detect them. In this paper, we study the possibility of using Benford's law to discriminate GAN-generated images from natural photographs. Benford's law describes the distribution of the most significant digit for quantized Discrete Cosine Transform (DCT) coefficients. Extending and generalizing this property, we show that it is possible to extract a compact feature vector from an image. This feature vector can be fed to an extremely simple classifier for GAN-generated image detection purpose.
Generative Adversarial Networks (GANs) are a well-known technique that is trained on samples (e.g. pictures of fruits) and which after training is able to generate realistic new samples. Conditional GANs (CGANs) additionally provide label information for subclasses (e.g. apple, orange, pear) which enables the GAN to learn more easily and increase the quality of its output samples. We use GANs to learn architectural features of major cities and to generate images of buildings which do not exist. We show that currently available GAN and CGAN architectures are unsuited for this task and propose a custom architecture and demonstrate that our architecture has superior performance for this task and verify its capabilities with extensive experiments.
0.915952
0.799185
0.116767
2004.07683
Do sequence-to-sequence VAEs learn global features of sentences?
A longstanding goal in NLP is to compute global sentence representations. Such representations would be useful for sample-efficient semi-supervised learning and controllable text generation. To learn to represent global and local information separately, Bowman & al. (2016) proposed to train a sequence-to-sequence model with the variational auto-encoder (VAE) objective. What precisely is encoded in these latent variables expected to capture global features? We measure which words benefit most from the latent information by decomposing the reconstruction loss per position in the sentence. Using this method, we see that VAEs are prone to memorizing the first words and the sentence length, drastically limiting their usefulness. To alleviate this, we propose variants based on bag-of-words assumptions and language model pretraining. These variants learn latents that are more global: they are more predictive of topic or sentiment labels, and their reconstructions are more faithful to the labels of the original documents.
Machine improvisation creates music either by explicit coding of rules or by applying machine learning methods. We deal with the latter case. An improvisation system capable of real-time must execute two process concurrently: one to apply machine learning methods to musical sequences in order to capture prominent musical features, and one to produce musical sequences stylistically consistent with the learned material. As an example, the Concurrent Constraint Factor Oracle Model for Music Improvisation (ccfomi), based upon Non-deterministic Timed Concurrent Constraint (ntcc) calculus, uses the Factor Oracle to store the learned sequences.
0.884315
0.675057
0.209258
2004.07684
Joint Semantic Segmentation and Boundary Detection using Iterative Pyramid Contexts
In this paper, we present a joint multi-task learning framework for semantic segmentation and boundary detection. The critical component in the framework is the iterative pyramid context module (PCM), which couples two tasks and stores the shared latent semantics to interact between the two tasks. For semantic boundary detection, we propose the novel spatial gradient fusion to suppress nonsemantic edges. As semantic boundary detection is the dual task of semantic segmentation, we introduce a loss function with boundary consistency constraint to improve the boundary pixel accuracy for semantic segmentation. Our extensive experiments demonstrate superior performance over state-of-the-art works, not only in semantic segmentation but also in semantic boundary detection. In particular, a mean IoU score of 81:8% on Cityscapes test set is achieved without using coarse data or any external data for semantic segmentation. For semantic boundary detection, we improve over previous state-of-the-art works by 9.9% in terms of AP and 6:8% in terms of MF(ODS).
Semantic image segmentation is an essential component of modern autonomous driving systems, as an accurate understanding of the surrounding scene is crucial to navigation and action planning. Current state-of-the-art approaches in semantic image segmentation rely on pre-trained networks that were initially developed for classifying images as a whole. While these networks exhibit outstanding recognition performance (i.e., what is visible?), they lack localization accuracy (i.e., where precisely is something located?). Therefore, additional processing steps have to be performed in order to obtain pixel-accurate segmentation masks at the full image resolution. To alleviate this problem we propose a novel ResNet-like architecture that exhibits strong localization and recognition performance. We combine multi-scale context with pixel-level accuracy by using two processing streams within our network: One stream carries information at the full image resolution, enabling precise adherence to segment boundaries. The other stream undergoes a sequence of pooling operations to obtain robust features for recognition. The two streams are coupled at the full image resolution using residuals. Without additional processing steps and without pre-training, our approach achieves an intersection-over-union score of 71.8% on the Cityscapes dataset.
0.933645
0.808009
0.125636
2004.07685
Spin selection rule for {\it S} level transitions in atomic rubidium under paraxial and nonparaxial two-photon excitation
We report on an experimental test of the spin selection rule for two-photon transitions in atoms. In particular, we demonstrate that the $5S_{1/2}\to 6S_{1/2}$ transition rate in a rubidium gas follows a quadratic dependency on the helicity parameter linked to the polarization of the excitation light. For excitation via a single Gaussian beam or two counterpropagating beams in a hot vapor cell, the transition rate scales as the squared degree of linear polarization. The rate reaches zero when the light is circularly polarized. In contrast, when the excitation is realized via an evanescent field near an optical nanofiber, the two-photon transition cannot be completely extinguished (theoretically, not lower than 13\% of the maximum rate, under our experimental conditions) by only varying the polarization of the fiber-guided light. Our findings lead to a deeper understanding of the physics of multiphoton processes in atoms in strongly nonparaxial light.
We suggest a simple experimental method for probing antiferromagnetic spin correlations of two-component Fermi gases in optical lattices. The method relies on a spin selective Raman transition to excite atoms of one spin species to their first excited vibrational mode where the tunneling is large. The resulting difference in the tunneling dynamics of the two spin species can then be exploited, to reveal the spin correlations by measuring the number of doubly occupied lattice sites at a later time. We perform quantum Monte Carlo simulations of the spin system and solve the optical lattice dynamics numerically to show how the timed probe can be used to identify antiferromagnetic spin correlations in optical lattices.
0.919006
0.833964
0.085042
2004.07686
Vanishing cohomology and Betti bounds for complex projective hypersurfaces
We employ the formalism of vanishing cycles and perverse sheaves to introduce and study the vanishing cohomology of complex projective hypersurfaces. As a consequence, we give upper bounds for the Betti numbers of projective hypersurfaces, generalizing those obtained by different methods by Dimca in the isolated singularities case, and by Siersma-Tib\u{a}r in the case of hypersurfaces with a $1$-dimensional singular locus. We also prove a supplement to the Lefschetz hyperplane theorem for hypersurfaces, which takes the dimension of the singular locus into account, and we use it to give a new proof of a result of Kato.
Hesse claimed that an irreducible projective hypersurface in $\PP^n$ defined by an equation with vanishing hessian determinant is necessarily a cone. Gordan and Noether proved that this is true for $n\leq 3$ and constructed counterexamples for every $n\geq 4$. Gordan and Noether and Franchetta gave classification of hypersurfaces in $\PP^4$ with vanishing hessian and which are not cones. Here we translate in geometric terms Gordan and Noether approach, providing direct geometrical proofs of these results.
0.922985
0.824019
0.098966
2004.07687
Physical Characteristics of Umbral Dots Derived from a High Resolution Observation
The aim of this study is revisit the physical parameters of umbral dots (UDs) with the latest high resolution observations and contribute to the scientific understanding of their formation and evolution. In this study, we applied a particle tracking algorithm for detecting UDs in NOAA AR12384 observed on June 14, 2015 by the Goode Solar Telescope (GST). We analyzed average position distributions, location dependencies, and general properties of detected total 2892 UDs separately during their life time and the periodic behavior of only selected 10 long living UDs. We found; i) brightest, largest, fastest and most elliptic UDs tend to be located at the umbra-penumbra boundary while their lifetime does not display any meaningful location dependency, ii) average dynamic velocity of all detected UDs is about twice (0.76 km/s) of the previously reported average values, iii) obtained trajectories from the longest living 354 UDs show that they have generally inward motion, iv) chosen 10 long living UDs generally have similar periodic behavior showing 8.5-32, 3.5-4.1, 1.5-1.9, and 1.1-1.3 minutes periodicities, v) generally, detected UDs have an elliptical shape with the averaged eccentricity of 0.29, with a 0.11 standard deviation, vi) larger UDs tend to be more elliptic and more dynamic.
We discuss a device --- a purely capacitively coupled interacting spinless triple quantum dot system --- for the observation of the SU(3) Kondo effect. Unlike more familiar SU(2) and SU(4) Kondo effects in quantum dot devices which lead to unitary linear conductance at low temperatures, the SU(3) Kondo scenario can be easily identified by the conductance pinned to a characteristic value of 3/4 of the unitary limit. This is associated with the interesting fact that the SU(3) Kondo effect does not occur at the particle-hole symmetric point, where the system is found instead in the valence-fluctuating regime with the total dot occupancy flipping between 1 and 2, but for gate voltages in the two Kondo plateaux where the dot occupancy is pinned to an integer value, either 1 or 2. From the thermodynamic analysis in the Kondo regime we find that the effective impurity orbital moment, defined through the impurity orbital susceptibility (chi_imp) multiplied by the temperature, is T\chi_imp=1 at high temperatures and then it increases to the characteristic value of T\chi_imp=4/3 corresponding to the three-fold degenerate local-moment fixed point where the impurity entropy is S_imp=ln 3. Then, at much lower temperatures, the system flows to the non-degenerate strong-coupling fixed point in which the SU(3) Kondo effect takes place. We also report results about the robustness of the SU(3) Kondo effect against various perturbations present in real experimental setups. Finally, we describe possible mechanisms to restore the SU(3) Kondo physics by properly tuning the on-site dot potentials. We briefly comment on the spinfull case which has very different behavior and shows Kondo plateaus in conductance for all integer values of the occupancy, including at the particle-hole symmetric point.
0.831291
0.641424
0.189867
2004.07688
Statistical inference for epidemic processes in a homogeneous community (Part IV of the book Stochastic Epidemic Models and Inference)
This document is the Part IV of the book 'Stochastic Epidemic Models with Inference' edited by Tom Britton and Etienne Pardoux. It is written by Catherine Lar\'edo, with the contribution of Viet Chi Tran for the Chapter 4. Epidemic data present challenging statistical problems, starting from the recurrent issue of handling missing information. We review methods such as MCMC, ABC or methods based on diffusion approximations. Plan of this document: 1) Observations and Asymptotic Frameworks; 2) Inference for Markov Chain Epidemic Models; 3) Inference Based on the Diffusion Approximation of Epidemic Models; 4) Inference for Continuous Time SIR models.
We study an SIS epidemic process over a static contact network where the nodes have partial information about the epidemic state. They react by limiting their interactions with their neighbors when they believe the epidemic is currently prevalent. A node's awareness is weighted by the fraction of infected neighbors in their social network, and a global broadcast of the fraction of infected nodes in the entire network. The dynamics of the benchmark (no awareness) and awareness models are described by discrete-time Markov chains, from which mean-field approximations (MFA) are derived. The states of the MFA are interpreted as the nodes' probabilities of being infected. We show a sufficient condition for existence of a "metastable", or endemic, state of the awareness model coincides with that of the benchmark model. Furthermore, we use a coupling technique to give a full stochastic comparison analysis between the two chains, which serves as a probabilistic analogue to the MFA analysis. In particular, we show that adding awareness reduces the expectation of any epidemic metric on the space of sample paths, e.g. eradication time or total infections. We characterize the reduction in expectations in terms of the coupling distribution. In simulations, we evaluate the effect social distancing has on contact networks from different random graph families (geometric, Erd\H{o}s-Renyi, and scale-free random networks).
0.881954
0.81386
0.068095
2004.07689
More on Faulhaber's theorem for sums of powers of integers
In this note we consider the theorem established in arXiv:1912.07171 concerning the sums of powers of the first $n$ positive integers, $S_k = 1^k + 2^k + \cdots + n^k$, and show that it can be used to demonstrate the classical theorem of Faulhaber for both cases of odd and even $k$.
In this paper, we investigate exceptional sets in the Waring-Goldbach problem for unlike powers. For example, estimates are obtained for sufficiently large integers below a parameter subject to the necessary local conditions that do not have a representation as the sum of a square of prime, a cube of prime and a sixth power of prime and a $k$-th power of prime. These results improve the recent result due to Br\"udern in the order of magnitude. Furthermore, the method can be also applied to the similar estimates for the exceptional sets for Waring-Goldbach problem for unlike powers.
0.9177
0.790102
0.127599
2004.07690
Data-Driven Robust Control Using Reinforcement Learning
This paper proposes a robust control design method using reinforcement-learning for controlling partially-unknown dynamical systems under uncertain conditions. The method extends the optimal reinforcement-learning algorithm with a new learning technique that is based on the robust control theory. By learning from the data, the algorithm proposed actions that guarantees the stability of the closed loop system within the uncertainties estimated from the data. Control policies are calculated by solving a set of linear matrix inequalities. The controller was evaluated using simulations on a blood glucose model for patients with type-1 diabetes. Simulation results show that the proposed methodology is capable of safely regulates the blood glucose within a healthy level under the influence of measurement and process noises. The controller has also significantly reduced the post-meal fluctuation of the blood glucose. A comparison between the proposed algorithm and the existing optimal reinforcement learning algorithm shows the improved robustness of the closed loop system using our method.
This paper sets forth a framework for deep reinforcement learning as applied to market making (DRLMM) for cryptocurrencies. Two advanced policy gradient-based algorithms were selected as agents to interact with an environment that represents the observation space through limit order book data, and order flow arrival statistics. Within the experiment, a forward-feed neural network is used as the function approximator and two reward functions are compared. The performance of each combination of agent and reward function is evaluated by daily and average trade returns. Using this DRLMM framework, this paper demonstrates the effectiveness of deep reinforcement learning in solving stochastic inventory control challenges market makers face.
0.810922
0.699498
0.111423
2004.07691
In Search of Life: Learning from Synthetic Data to Detect Vital Signs in Videos
Automatically detecting vital signs in videos, such as the estimation of heart and respiration rates, is a challenging research problem in computer vision with important applications in the medical field. One of the key difficulties in tackling this task is the lack of sufficient supervised training data, which severely limits the use of powerful deep neural networks. In this paper we address this limitation through a novel deep learning approach, in which a recurrent deep neural network is trained to detect vital signs in the infrared thermal domain from purely synthetic data. What is most surprising is that our novel method for synthetic training data generation is general, relatively simple and uses almost no prior medical domain knowledge. Moreover, our system, which is trained in a purely automatic manner and needs no human annotation, also learns to predict the respiration or heart intensity signal for each moment in time and to detect the region of interest that is most relevant for the given task, e.g. the nose area in the case of respiration. We test the effectiveness of our proposed system on the recent LCAS dataset and obtain state-of-the-art results.
Scarce data is a major challenge to scaling robot learning to truly complex tasks, as we need to generalize locally learned policies over different task contexts. Contextual policy search offers data-efficient learning and generalization by explicitly conditioning the policy on a parametric context space. In this paper, we further structure the contextual policy representation. We propose to factor contexts into two components: target contexts that describe the task objectives, e.g. target position for throwing a ball; and environment contexts that characterize the environment, e.g. initial position or mass of the ball. Our key observation is that experience can be directly generalized over target contexts. We show that this can be easily exploited in contextual policy search algorithms. In particular, we apply factorization to a Bayesian optimization approach to contextual policy search both in sampling-based and active learning settings. Our simulation results show faster learning and better generalization in various robotic domains. See our supplementary video: https://youtu.be/MNTbBAOufDY.
0.868986
0.627794
0.241192
2004.07692
A Hybrid Objective Function for Robustness of Artificial Neural Networks -- Estimation of Parameters in a Mechanical System
In several studies, hybrid neural networks have proven to be more robust against noisy input data compared to plain data driven neural networks. We consider the task of estimating parameters of a mechanical vehicle model based on acceleration profiles. We introduce a convolutional neural network architecture that is capable to predict the parameters for a family of vehicle models that differ in the unknown parameters. We introduce a convolutional neural network architecture that given sequential data predicts the parameters of the underlying data's dynamics. This network is trained with two objective functions. The first one constitutes a more naive approach that assumes that the true parameters are known. The second objective incorporates the knowledge of the underlying dynamics and is therefore considered as hybrid approach. We show that in terms of robustness, the latter outperforms the first objective on noisy input data.
Building robust online content recommendation systems requires learning complex interactions between user preferences and content features. The field has evolved rapidly in recent years from traditional multi-arm bandit and collaborative filtering techniques, with new methods employing Deep Learning models to capture non-linearities. Despite progress, the dynamic nature of online recommendations still poses great challenges, such as finding the delicate balance between exploration and exploitation. In this paper we show how uncertainty estimations can be incorporated by employing them in an optimistic exploitation/exploration strategy for more efficient exploration of new recommendations. We provide a novel hybrid deep neural network model, Deep Density Networks (DDN), which integrates content-based deep learning models with a collaborative scheme that is able to robustly model and estimate uncertainty. Finally, we present online and offline results after incorporating DNN into a real world content recommendation system that serves billions of recommendations per day, and show the benefit of using DDN in practice.
0.816964
0.616768
0.200196
2004.07693
Hunting keV sterile neutrinos with KATRIN: building the first TRISTAN module
The KATRIN (Karlsruhe Tritium Neutrino) experiment investigates the energetic endpoint of the tritium beta-decay spectrum to determine the effective mass of the electron anti-neutrino. The collaboration has reported a first mass measurement result at this TAUP-2019 conference. The TRISTAN project aims at detecting a keV-sterile neutrino signature by measuring the entire tritium beta-decay spectrum with an upgraded KATRIN system. One of the greatest challenges is to handle the high signal rates generated by the strong activity of the KATRIN tritium source while maintaining a good energy resolution. Therefore, a novel multi-pixel silicon drift detector and read-out system are being designed to handle rates of about 100 Mcps with an energy resolution better than 300 eV (FWHM). This report presents succinctly the KATRIN experiment, the TRISTAN project, then the results of the first 7-pixels prototype measurement campaign and finally describes the construction of the first TRISTAN module composed of 166 SDD-pixels as well as its implementation in KATRIN experiment.
We study sterile neutrinos in an extension of the standard model, based on the gauge group $SU(3)_C\otimes SU(3)_L\otimes SU(3)_R\otimes U(1)_N$, and use this model to illustrate how to apply cosmological limits to thermalized particles that decouple while relativistic. These neutrinos, $N_{aL}$, can be dark matter candidates, with a keV mass range arising rather naturally in this model. We analyse the cosmological limits imposed by $N_{eff}$ and dark matter abundance on these neutrinos. Assuming that these neutrinos have roughly equal masses and are not CDM, we conclude that the $N_{eff}$ experimental value can be satisfied in some cases and the abundance constraint implies that these neutrinos are hot dark matter. With this information, we give upper bounds on the Yukawa coupling between the sterile neutrinos and a scalar field, the possible values of the VEV of this scalar field and lower bounds to the mass of one gauge boson of the model.
0.869824
0.776212
0.093612
2004.07694
Spiciness theory revisited, with new views on neutral density, orthogonality and passiveness
This paper clarifies the theoretical basis for constructing spiciness variables optimal for characterising ocean water masses. Three essential ingredients are identified: 1) a material density variable $\gamma$ that is as neutral as feasible; 2) a material state function $\xi$ independent of $\gamma$, but otherwise arbitrary; 3) an empirically determined function $\xi_r(\gamma)$ of $\gamma$ quantifying the isopycnal mean behaviour of $\xi$. The key results are: It is the anomaly $\xi' = \xi - \xi_r(\gamma)$, rather than $\xi$, that is the variable optimally suited for characterising ocean water masses; Ingredient 1) is required, because contrary to what is usually assumed, it is not the property of $\xi$ that determine its dynamical inertness, but the degree of neutrality of $\gamma$; Oceanic sections of $\xi'$ are rather insensitive to the particular choice of $\xi$; Contrary to what has been usually assumed, it is orthogonality in physical space rather than in thermohaline space that is the relevant property for optimally characterising ocean water masses. The results are important because: They unify the various ways in which spiciness has been defined and used in the literature; They provide for the first time a rigorous first-principles physical justification for the concept of neutral density.
We briefly review the five possible real polynomial solutions of hypergeometric differential equations. Three of them are the well known classical orthogonal polynomials, but the other two are different with respect to their orthogonality properties. We then focus on the family of polynomials which exhibits a finite orthogonality. This family, to be referred to as the Romanovski polynomials, is required in exact solutions of several physics problems ranging from quantum mechanics and quark physics to random matrix theory. It appears timely to draw attention to it by the present study. Our survey also includes several new observations on the orthogonality properties of the Romanovski polynomials and new developments from their Rodrigues formula.
0.765789
0.645791
0.119997
2004.07695
Calibration of a Shower Lead-Scintillation Spectrometer by Cosmic Radiation
The results of calibration by cosmic muons of a shower lead-scintillation spectrometer of the sandwich type designed to work in high-intensity photon and electron beams with an energy of 0.1 - 1.0 GeV are presented. It was found that the relative energy resolution of the spectrometer depends on the angle of entry of cosmic muons into the spectrometer in the vertical plane and does not depend on the angle of entry in the horizontal plane. The relative energy resolution of the spectrometer was 16%. Placing an additional lead-scintillation assembly in front of the spectrometer improved the relative energy resolution of the spectrometer to 9%.
Cosmic ray air showers produce radio emission, consisting in large part of geosynchrotron emission. Since the radiation mechanism is based on particle acceleration, the atmospheric electric field can play an important role. Especially inside thunderclouds large electric fields can be present. We examine the contribution of an electric field to the emission mechanism theoretically and experimentally. Two mechanisms of amplification of radio emission are considered: the acceleration radiation of the shower particles and the radiation from the current that is produced by ionization electrons moving in the electric field. We selected and evaluated LOPES data recorded during thunderstorms, periods of heavy cloudiness and periods of cloudless weather. We find that during thunderstorms the radio emission can be strongly enhanced. No amplified pulses were found during periods of cloudless sky or heavy cloudiness, suggesting that the electric field effect for radio air shower measurements can be safely ignored during non-thunderstorm conditions.
0.885709
0.739347
0.146361
2004.07696
Rapidly evaluating lockdown strategies using spectral analysis: the cycles behind new daily COVID-19 cases and what happens after lockdown
Spectral analysis characterises oscillatory time series behaviours such as cycles, but accurate estimation requires reasonable numbers of observations. Current COVID-19 time series for many countries are short: pre- and post-lockdown series are shorter still. Accurate estimation of potentially interesting cycles within such series seems beyond reach. We solve the problem of obtaining accurate estimates from short time series by using recent Bayesian spectral fusion methods. Here we show that transformed new daily COVID-19 cases for many countries generally contain three cycles operating at wavelengths of around 2.7, 4.1 and 6.7 days (weekly). We show that the shorter cycles are suppressed after lockdown. The pre- and post lockdown differences suggest that the weekly effect is at least partly due to non-epidemic factors, whereas the two shorter cycles seem intrinsic to the epidemic. Unconstrained, new cases grow exponentially, but the internal cyclic structure causes periodic falls in cases. This suggests that lockdown success might only be indicated by four or more daily falls in cases. Spectral learning for epidemic time series contributes to the understanding of the epidemic process, helping evaluate interventions and assists with forecasting. Spectral fusion is a general technique that is able to fuse spectra recorded at different sampling rates, which can be applied to a wide range of time series from many disciplines.
The new coronavirus known as COVID-19 is rapidly spreading since December 2019. Without any vaccination or medicine, the means of controlling it are limited to quarantine and social distancing. Here we study the spatio-temporal propagation of the COVID-19 virus in China and compare it to other global locations. Our results suggest that the disease propagation is highly related to population migration from Hubei resembling a L\'{e}vy flight which is characteristic of human mobility and thus could be controlled by efficient quarantines. Since quarantine is usually applied on a city level, more insight can be obtained in analyzing the epidemic in cities. Our results suggest that the disease spread in a city in China is characterized by two-stages process. At early times, at order of few days, the infection rate in the city is close to constant probably due to the lack of means to detect infected individuals before infection signs are observed and at later times it decays approximately exponentially due to quarantines. These two stages can explain the significant differences between the propagation in China and in other world-wide locations. While most cities in China control the disease which resulted in the decaying stage, in other world-wide countries the situation is still becoming worse probably due to less social interactions control and overloaded health systems which reflects in the death and recovery rates.
0.900316
0.710649
0.189667
2004.07697
Computational Drug Repositioning and Elucidation of Mechanism of Action of Compounds against SARS-CoV-2
The COVID-19 crisis called for rapid reaction from all the fields of biomedical research. Traditional drug development involve time consuming pipelines that conflict with the urgence of identifying effective therapies during a health and economic emergency. Drug repositioning, that is the discovery of new clinical applications for drugs already approved for different therapeutic contexts, could provide an effective shortcut to bring COVID-19 treatments to the bedside in a timely manner. Moreover, computational approaches can help accelerate the process even further. Here we present the application of different software tools based on transcriptomics data to identify drugs that are potentially able to counteract SARS-CoV-2 infection and also to provide insights on their mode of action. We believe that HDAC inhibitors warrant further investigation. In addition, we found that the DNA Mismatch repair pathway is strongly modulated by drugs with experimental in vitro activity against SARS-CoV-2 infection.
Alchemical theory is emerging as a promising tool in the context of molecular dynamics simulations for drug discovery projects. In this theoretical contribution, I revisit the statistical mechanics foundation of non covalent interactions in drug-receptor systems, providing a unifying treatment that encompasses the most important variants in the alchemical approaches, from the seminal Double Annihilation Method by Jorgensen and Ravimohan [W.L. Jorgensen and C. Ravimohan, J. Chem. Phys. 83,3050, 1985], to the Gilson's Double Decoupling Method [M. K. Gilson and J. A. Given and B. L. Bush and J. A. McCammon, Biophys. J. 72, 1047 1997] and the Deng and Roux alchemical theory [Y. Deng and B. Roux, J. Chem. Theory Comput., 2, 1255 2006]. Connections and differences between the various alchemical approaches are highlighted and discussed, and finally placed into the broader context of nonequilibrium thermodynamics.
0.860715
0.749259
0.111456
2004.07698
On a new geometric homology theory
In this note we present a new homology theory, we call it geometric homology theory(or GHT for brevity). We prove that the homology groups of GHT are isomorphic to singular homology groups, which solves a Conjecture of Voronov. GHT has several nice properties compared with singular homology, making it more suitable than singular homology in some situations, especially in chain-level theories. We will develop further of this theory in our sequel paper.
This note discusses recent new approaches to studying flopping curves on 3-folds. In a joint paper, the author and Michael Wemyss introduced a 3-fold invariant, the contraction algebra, which may be associated to such curves. It characterises their geometric and homological properties in a unified manner, using the theory of noncommutative deformations. Toda has now clarified the enumerative significance of the contraction algebra for flopping curves, calculating its dimension in terms of Gopakumar-Vafa invariants. Before reviewing these results, and others, I give a brief introduction to the rich geometry of flopping curves on 3-folds, starting from the resolutions of Kleinian surface singularities. This is based on a talk given at VBAC 2014 in Berlin.
0.89831
0.780271
0.11804
2004.07699
Predictive Whole-Body Control of Humanoid Robot Locomotion
Humanoid robots are machines built with an anthropomorphic shape. Despite decades of research into the subject, it is still challenging to tackle the robot locomotion problem from an algorithmic point of view. For example, these machines cannot achieve a constant forward body movement without exploiting contacts with the environment. The reactive forces resulting from the contacts are subject to strong limitations, complicating the design of control laws. As a consequence, the generation of humanoid motions requires to exploit fully the mathematical model of the robot in contact with the environment or to resort to approximations of it. This thesis investigates predictive and optimal control techniques for tackling humanoid robot motion tasks. They generate control input values from the system model and objectives, often transposed as cost function to minimize. In particular, this thesis tackles several aspects of the humanoid robot locomotion problem in a crescendo of complexity. First, we consider the single step push recovery problem. Namely, we aim at maintaining the upright posture with a single step after a strong external disturbance. Second, we generate and stabilize walking motions. In addition, we adopt predictive techniques to perform more dynamic motions, like large step-ups. The above-mentioned applications make use of different simplifications or assumptions to facilitate the tractability of the corresponding motion tasks. Moreover, they consider first the foot placements and only afterward how to maintain balance. We attempt to remove all these simplifications. [continued]
This work presents approaches for the estimation of quantities important for the control of the momentum of a humanoid robot. In contrast to previous approaches which use simplified models such as the Linear Inverted Pendulum Model, we present estimators based on the momentum dynamics of the robot. By using this simple yet dynamically-consistent model, we avoid the issues of using simplified models for estimation. We develop an estimator for the center of mass and full momentum which can be reformulated to estimate center of mass offsets as well as external wrenches applied to the robot. The observability of these estimators is investigated and their performance is evaluated in comparison to previous approaches.
0.857286
0.783501
0.073785
2004.07700
Generalizability issues with deep learning models in medicine and their potential solutions: illustrated with Cone-Beam Computed Tomography (CBCT) to Computed Tomography (CT) image conversion
Generalizability is a concern when applying a deep learning (DL) model trained on one dataset to other datasets. Training a universal model that works anywhere, anytime, for anybody is unrealistic. In this work, we demonstrate the generalizability problem, then explore potential solutions based on transfer learning (TL) by using the cone-beam computed tomography (CBCT) to computed tomography (CT) image conversion task as the testbed. Previous works have converted CBCT to CT-like images. However, all of those works studied only one or two anatomical sites and used images from the same vendor's scanners. Here, we investigated how a model trained for one machine and one anatomical site works on other machines and other sites. We trained a model on CBCT images acquired from one vendor's scanners for head and neck cancer patients and applied it to images from another vendor's scanners and for other disease sites. We found that generalizability could be a significant problem for this particular application when applying a trained DL model to datasets from another vendor's scanners. We then explored three practical solutions based on TL to solve this generalization problem: the target model, which is trained on a target domain from scratch; the combined model, which is trained on both source and target domain datasets from scratch; and the adapted model, which fine-tunes the trained source model to a target domain. We found that when there are sufficient data in the target domain, all three models can achieve good performance. When the target dataset is limited, the adapted model works the best, which indicates that using the fine-tuning strategy to adapt the trained model to an unseen target domain dataset is a viable and easy way to implement DL models in the clinic.
In Europe the 20% of the CT scans cover the thoracic region. The acquired images contain information about the cardiovascular system that often remains latent due to the lack of contrast in the cardiac area. On the other hand, the contrast enhanced computed tomography (CECT) represents an imaging technique that allows to easily assess the cardiac chambers volumes and the contrast dynamics. With this work we aim to face the problem of extraction and presentation of these latent information, using a deep learning approach with convolutional neural networks. Starting from the extraction of relevant features from the image without contrast medium, we try to re-map them on features typical of CECT, to synthesize an image characterized by an attenuation in the cardiac chambers as if a virtually iodine contrast medium was injected. The purposes are to guarantee an estimation of the left cardiac chambers volume and to perform an evaluation of the contrast dynamics. Our approach is based on a deconvolutional network trained on a set of 120 patients who underwent both CT acquisitions in the same contrastographic arterial phase and the same cardiac phase. To ensure a reliable predicted CECT image, in terms of values and morphology, a custom loss function is defined by combining an error function to find a pixel-wise correspondence, which takes into account the similarity in term of Hounsfield units between the input and output images and by a cross-entropy computed on the binarized versions of the synthesized and of the real CECT image. The proposed method is finally tested on 20 subjects.
0.919194
0.773253
0.145941
2004.07701
$\Sigma^{+}$ and $\bar{\Sigma}^-$ polarization in the $J/\psi$ and $\psi(3686)$ decays
From $1310.6\times10^{6}$ $J/\psi$ and $448.1\times10^{6}$ $\psi(3686)$ events collected with the BESIII experiment, we report the first observation of $\Sigma^{+}$ and $\bar{\Sigma}^{-}$ spin polarization in $e^+e^-\rightarrow J/\psi (\psi(3686)) \rightarrow \Sigma^{+} \bar{\Sigma}^{-}$ decays. The relative phases of the form factors $\Delta\Phi$ have been measured to be $(-15.5\pm0.7\pm0.5)^{\circ}$ and $(21.7\pm4.0\pm0.8)^{\circ}$ with $J/\psi$ and $\psi(3686)$ data, respectively. The non-zero value of $\Delta\Phi$ allows for a direct and simultaneous measurement of the decay asymmetry parameters of $\Sigma^{+}\rightarrow p \pi^{0}~(\alpha_0 = -0.998\pm0.037\pm0.009)$ and $\bar{\Sigma}^{-}\rightarrow \bar{p} \pi^{0}~(\bar{\alpha}_0 = 0.990\pm0.037\pm0.011)$, the latter value being determined for the first time. The average decay asymmetry, $(\alpha_{0} - \bar{\alpha}_{0})/2$, is calculated to be $-0.994\pm0.004\pm0.002$. The CP asymmetry $A_{\rm CP,\Sigma} = (\alpha_0 + \bar{\alpha}_0)/(\alpha_0 - \bar{\alpha}_0) = -0.004\pm0.037\pm0.010$ is extracted for the first time, and is found to be consistent with CP conservation.
It has been suggested that the suppression of $J/\psi$ production in heavy nuclei is a signature of the formation of quark-gluon plasma. We here show that this phenomenon can be understood in terms of conventional physics, {\it i.e.} {\it i)} perturbative QCD, {\it ii)} the parton recombination implementation of shadowing in the initial state, and {\it iii)} final state interactions with the hadronic debris of the nuclear target. Unlike previous calculations we include both the direct $J/\psi$ production and its production via radiative $\chi$ decays ($\chi_J \to J/\psi + \gamma$). We are able to reproduce the experimental data including their small-$x$ behavior. We emphasize the importance of studying the $x_2$-dependence of the ratio $\sigma(b A)/\sigma(b N)$, where $b$ designates the beam and $x_2$ is the momentum fraction of the parton from the nuclear target.
0.901457
0.756308
0.14515
2004.07702
Molecular modeling of aqueous electrolytes at interfaces: effects of long-range dispersion forces and ionic charge rescaling
Molecular dynamics simulations generally rely on empirical force fields. For aqueous electrolytes, force fields using rescaled ionic charges (electronic continuum correction, ECC), possibly complemented with rescaling of Van der Waals parameters (electronic continuum correction rescaled, ECCR), show promising results in bulk, but their performance at interfaces has been less explored. Here we show that both truncation of dispersion forces and the ionic charge rescaling factor have a non-trivial impact on the measured surface tension and on the interfacial structure. These results suggest that the molecular modeling of aqueous electrolytes at interfaces would benefit from using long-range solvers for dispersion forces, and from using the ECCR method, where the charge rescaling factor should be chosen to correct long-range electrostatic interactions.
Solid polymer electrolytes are considered a promising alternative to traditional liquid electrolytes in energy storage applications because of their good mechanical properties, and excellent thermal and chemical stability. A gap, however, still exists in understanding ion transport mechanisms and improving ion transport in solid polymer electrolytes. Therefore, it is crucial to bridge composition--structure and structure--property relationships. Here we demonstrate that size asymmetry, $\lambda$, represented by the ratio of counterion to charged monomer size, plays a key role in both the nanostructure and in the ionic dynamics. More specifically, when the nanostructure is modified by the external electric field such that the mobility cannot be described by linear response theory, two situations arise. The ionic mobility increases as $\lambda$ decreases (small counterions) in the weak electrostatics (high dielectric constant) regime. Whereas in systems with strong electrostatic interactions, ionomers with higher size symmetry ($\lambda \approx 1$) display higher ionic mobility. Moreover, ion transport is found to be dominated by the hopping of the ions and not by moving ionic clusters (also known as "vehicular'' charge transport). These results serve as a guide for designing ion-containing polymers for ion transport related applications.
0.926601
0.776734
0.149867
2004.07703
Unsupervised Intra-domain Adaptation for Semantic Segmentation through Self-Supervision
Convolutional neural network-based approaches have achieved remarkable progress in semantic segmentation. However, these approaches heavily rely on annotated data which are labor intensive. To cope with this limitation, automatically annotated data generated from graphic engines are used to train segmentation models. However, the models trained from synthetic data are difficult to transfer to real images. To tackle this issue, previous works have considered directly adapting models from the source data to the unlabeled target data (to reduce the inter-domain gap). Nonetheless, these techniques do not consider the large distribution gap among the target data itself (intra-domain gap). In this work, we propose a two-step self-supervised domain adaptation approach to minimize the inter-domain and intra-domain gap together. First, we conduct the inter-domain adaptation of the model; from this adaptation, we separate the target domain into an easy and hard split using an entropy-based ranking function. Finally, to decrease the intra-domain gap, we propose to employ a self-supervised adaptation technique from the easy to the hard split. Experimental results on numerous benchmark datasets highlight the effectiveness of our method against existing state-of-the-art approaches. The source code is available at https://github.com/feipan664/IntraDA.git.
Segmenting aerial images is being of great potential in surveillance and scene understanding of urban areas. It provides a mean for automatic reporting of the different events that happen in inhabited areas. This remarkably promotes public safety and traffic management applications. After the wide adoption of convolutional neural networks methods, the accuracy of semantic segmentation algorithms could easily surpass 80% if a robust dataset is provided. Despite this success, the deployment of a pre-trained segmentation model to survey a new city that is not included in the training set significantly decreases the accuracy. This is due to the domain shift between the source dataset on which the model is trained and the new target domain of the new city images. In this paper, we address this issue and consider the challenge of domain adaptation in semantic segmentation of aerial images. We design an algorithm that reduces the domain shift impact using Generative Adversarial Networks (GANs). In the experiments, we test the proposed methodology on the International Society for Photogrammetry and Remote Sensing (ISPRS) semantic segmentation dataset and found that our method improves the overall accuracy from 35% to 52% when passing from Potsdam domain (considered as source domain) to Vaihingen domain (considered as target domain). In addition, the method allows recovering efficiently the inverted classes due to sensor variation. In particular, it improves the average segmentation accuracy of the inverted classes due to sensor variation from 14% to 61%.
0.902387
0.787739
0.114649
2004.07704
Bourgain-Brezis-Mironescu Domains
Bourgain et al.(2001) proved that for $p>1$ and smooth bounded domain $\Omega\subseteq\mathbb{R}^N$, \begin{equation*} \lim\limits_{s\to1}(1-s)\iint \limits_{\Omega \times \Omega}\frac{\lvert f(x)-f(y) \rvert^p}{\lvert x-y \rvert^{N+sp}}dx dy=\kappa \int \limits_{\Omega}\lvert \nabla f(x) \rvert^p dx \end{equation*} for all $f\in L^p(\Omega)$. This gives a characterization of $W^{1,p}(\Omega)$ by means of $W^{s,p}(\Omega)$ seminorms only. For the case $p=1$, D\'avila(2002) proved that when $\Omega$ is a bounded domain with Lipschitz boundary, \begin{equation*} \lim\limits_{s\to1}(1-s)\iint \limits_{\Omega \times \Omega}\frac{\lvert f(x)-f(y) \rvert}{\lvert x-y \rvert^{N+s}}dx dy=\kappa [f]_{BV(\Omega)} \end{equation*} for all $f\in L^1(\Omega)$. This characterizes $BV(\Omega)$ in terms of $W^{s,1}(\Omega)$ seminorm. In this paper we extend the first result and partially extend the second result to extension domains.
A new range of uniform $L^p$ resolvent estimates is obtained in the setting of the flat torus, improving previous results of Bourgain, Shao, Sogge and Yao. The arguments rely on the $\ell^2$-decoupling theorem and multidimensional Weyl sum estimates.
0.744316
0.674259
0.070057
2004.07705
Asymmetric dark matter from semi-annihilation
We show that a general semi-annihilation scenario, in which a pair of dark matter (DM) particles annihilate to an anti-DM, and an unstable state that can mix with or decay to standard model states, can lead to particle anti-particle asymmetry in the DM sector. The present DM abundance, including the CP-violation in the DM sector and the resulting present asymmetry are determined entirely by a single semi-annihilation process at next-to-leading order. For large CP-violation in this process, we find that a nearly complete asymmetry can be obtained in the DM sector, with the observed DM density being dominated by the (anti-)DM particle. The presence of additional pair-annihilation processes can modify the ratio of DM and anti-DM number densities further, if the pair-annihilation is active subsequent to the decoupling of the semi-annihilation. For such a scenario, the required CP-violation for generating the same present asymmetry is generically much smaller, as compared to the scenario with only semi-annihilation present. We show that a minimal model with a complex scalar DM with cubic self-interactions can give rise to both semi- and pair-annihilations, with the required CP-violation generated at one-loop level. We also find that the upper bound on the DM mass from S-matrix unitarity in the purely asymmetric semi-annihilation scenario, with maximal CP-violation, is around 15 GeV, which is much stronger than in the WIMP and previously considered asymmetric DM cases, due to the required large non-zero chemical potential for such asymmetric DM.
Recent measurements of cosmic-ray electron and positron fluxes by PAMELA and ATIC experiments may indicate the existence of annihilating dark matter with large annihilation cross section. We discuss its possible relation to other astrophysical/cosmological observations : gamma-rays, neutrinos, and big-bang nucleosynthesis. It is shown that they give stringent constraints on some annihilating dark matter models.
0.880726
0.773061
0.107665
2004.07706
Marching on a rugged landscape: universality in disordered asymmetric exclusion processes
We develop the hydrodynamic theory for number conserving asymmetric exclusion processes with short-range random quenched disordered hopping rates. We show that when the system is away from half-filling, the spatio-temporal scaling of the density fluctuations is indistinguishable from its pure counterpart, with the associated scaling exponents belonging to the one-dimensional Kardar- Parisi-Zhang universality class. In contrast, close to half-filling, the scaling exponents take different values, indicating the relevance of the quenched disorder and the emergence of a new universality class.
We describe a resolvent-type method for estimating time integrals of time-dependent functionals of general right processes in equilibrium and apply this result in the case of weakly asymmetric one-dimensional simple exclusion showing a weak form of a replacement lemma for quadratic fluctuations.
0.887857
0.769328
0.118528
2004.07707
Analyzing Reinforcement Learning Benchmarks with Random Weight Guessing
We propose a novel method for analyzing and visualizing the complexity of standard reinforcement learning (RL) benchmarks based on score distributions. A large number of policy networks are generated by randomly guessing their parameters, and then evaluated on the benchmark task; the study of their aggregated results provide insights into the benchmark complexity. Our method guarantees objectivity of evaluation by sidestepping learning altogether: the policy network parameters are generated using Random Weight Guessing (RWG), making our method agnostic to (i) the classic RL setup, (ii) any learning algorithm, and (iii) hyperparameter tuning. We show that this approach isolates the environment complexity, highlights specific types of challenges, and provides a proper foundation for the statistical analysis of the task's difficulty. We test our approach on a variety of classic control benchmarks from the OpenAI Gym, where we show that small untrained networks can provide a robust baseline for a variety of tasks. The networks generated often show good performance even without gradual learning, incidentally highlighting the triviality of a few popular benchmarks.
In this paper we argue for the fundamental importance of the value distribution: the distribution of the random return received by a reinforcement learning agent. This is in contrast to the common approach to reinforcement learning which models the expectation of this return, or value. Although there is an established body of literature studying the value distribution, thus far it has always been used for a specific purpose such as implementing risk-aware behaviour. We begin with theoretical results in both the policy evaluation and control settings, exposing a significant distributional instability in the latter. We then use the distributional perspective to design a new algorithm which applies Bellman's equation to the learning of approximate value distributions. We evaluate our algorithm using the suite of games from the Arcade Learning Environment. We obtain both state-of-the-art results and anecdotal evidence demonstrating the importance of the value distribution in approximate reinforcement learning. Finally, we combine theoretical and empirical evidence to highlight the ways in which the value distribution impacts learning in the approximate setting.
0.892302
0.792712
0.09959
2004.07708
Pockels Soliton Microcomb
Kerr soliton microcombs have recently emerged as a prominent topic in integrated photonics and enabled new horizons for optical frequency metrology. Kerr soliton microcombs, as its name suggests, are based on the high-order cubic optical nonlinearity. It is desirable to exploit quadratic photonic materials, namely Pockels materials, for soliton generation and on-chip implementation of 1f-2f comb self-referencing. Such quadratically-driven solitons have been theoretically proposed, but have not yet been observed in a nanophotonic platform despite of recent progresses in quadratic comb generation in free-space and crystalline resonators. Here we report photonic chip-based Pockels microcomb solitons driven by three-wave mixing in an aluminum nitride microring resonator. In contrast to typical Kerr solitons, our Pockels soliton features unity soliton generation fidelity, two-by-two annihilation of multi-soliton states, favorable tuning dynamics, and high pump-to-soliton conversion efficiency.
We obtain the exact nontopological soliton lattice solutions of the Associated Lam\'e equation in different parameter regimes and compute the corresponding energy for each of these solutions. We show that in specific limits these solutions give rise to nontopological (pulse-like) single solitons, as well as to different types of topological (kink-like) single soliton solutions of the Associated Lam\'e equation. Following Manton, we also compute, as an illustration, the asymptotic interaction energy between these soliton solutions in one particular case. Finally, in specific limits, we deduce the soliton lattices, as well as the topological single soliton solutions of the Lam\'e equation, and also the sine-Gordon soliton solution.
0.895625
0.758724
0.136902
2004.07709
Late-time decaying dark matter: constraints and implications for the $H_0$-tension
We constrain and update the bounds on the life-time of a decaying dark matter model with a warm massive daughter particle using the most recent low-redshift probes. We use Supernovae Type-Ia, Baryon Acoustic Oscillations and the time delay measurements of gravitationally lensed quasars. These data sets are complemented by the early universe priors taken from the Cosmic Microwave background. For the maximum allowed fraction of the relativistic daughter particle, the updated bounds on the life-time are found to be $\tau > 9\, \rm{Gyr}$ and $\tau >11\,\rm{Gyr}$ at $95\%$ C.L., for the two-body and many-body decay scenarios, respectively. We also comment on the recent proposal that the current two-body decaying dark matter model can provide resolution for the $H_0$-tension, by contrasting against the standard $\Lambda$CDM model. We infer that the current dark matter decaying scenario is unlikely to alleviate the $H_0$-tension. We find that the decaying dark matter is able to reduce the trend of the decreasing $H_0$ values with increasing lens redshifts observed in the strong lensing dataset.
We investigate a string-inspired dark energy scenario featuring a scalar field with a coupling to the Gauss-Bonnet invariant. Such coupling can trigger the onset of late dark energy domination after a scaling matter era. The universe may then cross the phantom divide and perhaps also exit from the acceleration. We discuss extensively the cosmological and astrophysical implications of the coupled scalar field. Data from the Solar system, supernovae Ia, cosmic microwave background radiation, large scale structure and big bang nucleosynthesis is used to constrain the parameters of the model. A good Newtonian limit may require to fix the coupling. With all the data combined, there appears to be some tension with the nucleosynthesis bound, and the baryon oscillation scale seems to strongly disfavor the model. These possible problems might be overcome in more elaborate models. In addition, the validity of these constraints in the present context is not strictly established. Evolution of fluctuations in the scalar field and their impact to clustering of matter is studied in detail and more model-independently. Small scale limit is derived for the perturbations and their stability is addressed. A divergence is found and discussed. The general equations for scalar perturbations are also presented and solved numerically, confirming that the Gauss-Bonnet coupling can be compatible with the observed spectrum of cosmic microwave background radiation as well as the matter power spectrum inferred from large scale surveys.
0.869737
0.762016
0.107721
2004.07710
Quantum circuit synthesis using Householder transformations
The synthesis of a quantum circuit consists in decomposing a unitary matrix into a series of elementary operations. In this paper, we propose a circuit synthesis method based on the QR factorization via Householder transformations. We provide a two-step algorithm: during the first step we exploit the specific structure of a quantum operator to compute its QR factorization, then the factorized matrix is used to produce a quantum circuit. We analyze several costs (circuit size and computational time) and compare them to existing techniques from the literature. For a final quantum circuit twice as large as the one obtained by the best existing method, we accelerate the computation by orders of magnitude.
We introduce ProjectQ, an open source software effort for quantum computing. The first release features a compiler framework capable of targeting various types of hardware, a high-performance simulator with emulation capabilities, and compiler plug-ins for circuit drawing and resource estimation. We introduce our Python-embedded domain-specific language, present the features, and provide example implementations for quantum algorithms. The framework allows testing of quantum algorithms through simulation and enables running them on actual quantum hardware using a back-end connecting to the IBM Quantum Experience cloud service. Through extension mechanisms, users can provide back-ends to further quantum hardware, and scientists working on quantum compilation can provide plug-ins for additional compilation, optimization, gate synthesis, and layout strategies.
0.906735
0.770026
0.136709
2004.07711
Knowledge Distillation for Action Anticipation via Label Smoothing
Human capability to anticipate near future from visual observations and non-verbal cues is essential for developing intelligent systems that need to interact with people. Several research areas, such as human-robot interaction (HRI), assisted living or autonomous driving need to foresee future events to avoid crashes or help visually impaired people. Such challenging task requires to capture and understand the underlying structure of the analyzed domain in order to reduce prediction uncertainty. Since the action anticipation task can be seen as a multi-label problem with missing labels, we design and extend the idea of label smoothing extracting semantics from the target labels. We show that such generalization is equivalent to considering a knowledge distillation framework where a teacher injects useful semantic information into the model during training. In our experiments, we implement a multi-modal framework based on long short-term memory (LSTM) networks to anticipate future actions which is able to summarise past observations while making predictions of the future at different time steps. To validate our soft labeling procedure we perform extensive experiments on the egocentric EPIC-Kitchens dataset which includes more than 2500 action classes. The experiments show that label smoothing systematically improves performance of state-of-the-art models.
A new label smoothing method that makes use of prior knowledge of a language at human level, homophone, is proposed in this paper for automatic speech recognition (ASR). Compared with its forerunners, the proposed method uses pronunciation knowledge of homophones in a more complex way. End-to-end ASR models that learn acoustic model and language model jointly and modelling units of characters are necessary conditions for this method. Experiments with hybrid CTC sequence-to-sequence model show that the new method can reduce character error rate (CER) by 0.4% absolutely.
0.885178
0.680214
0.204964
2004.07712
Ergodicity effects on transport-diffusion equations with localized damping
The main objective of this paper is to study the time decay of transport-diffusion equation with inhomogeneous localized damping in the multi-dimensional torus. The drift is governed by an autonomous Lipschitz vector field and the diffusion by the standard heat equation with small viscosity parameter $\nu$. In the first part we deal with the inviscid case and show some results on the time decay of the energy using in a crucial way the ergodicity and the unique ergodicity of the flow generated by the drift. In the second part we analyze the same problem with small viscosity and provide quite similar results on the exponential decay uniformly with respect to the viscosity in some logarithmic time scaling of the \mbox{type $t\in [0,C_0\ln(1/\nu)]$}.
We study the relative value iteration for the ergodic control problem under a near-monotone running cost structure for a nondegenerate diffusion controlled through its drift. This algorithm takes the form of a quasilinear parabolic Cauchy initial value problem in $\RR^{d}$. We show that this Cauchy problem stabilizes, or in other words, that the solution of the quasilinear parabolic equation converges for every bounded initial condition in $\Cc^{2}(\RR^{d})$ to the solution of the Hamilton--Jacobi--Bellman (HJB) equation associated with the ergodic control problem.
0.860931
0.82967
0.031261
2004.07713
True 3D reconstruction in digital holography
We examine the nature of the 3D image as obtained by replay (or back-propagation) of the object wave from the hologram recording plane to the original object volume. While recording of a hologram involves transferring information from a 3D volume to a 2D detector plane, the replay of the hologram involves creating information in a set of 3D voxels from a much smaller number of 2D detector pixels, which at first look appears to be surprising. We point out that the hologram replay process is a Hermitian transpose (and not inverse) of the hologram formation process and therefore only provides an approximation to the original 3D object function. With the knowledge of this Hermitian transpose property, we show how one may realize true 3D image reconstruction via a regularized optimization algorithm. The numerical illustrations of this optimization approach as presented here show excellent slice-by-slice tomographic 3D reconstruction of the original object under the weak scattering approximation. In particular, the reconstructed 3D image field has near-zero numerical values at voxels where the original object did not exist. We note that 3D image reconstruction of this kind cannot be achieved by the traditional physical replay process. In this sense the proposed methodology for digital holographic image reconstruction goes beyond numerically mimicking the traditional film based holographic replay. The reconstruction approach may find potential applications in a number of digital holographic imaging systems.
Azimuthal distributions of particles produced in nucleus-nucleus collisions are measured with respect to an estimated reaction plane which, because of finite multiplicity fluctuations, differs in general from the true reaction plane. It follows that the measured distributions do not coincide with the true ones. I propose a general method of reconstructing the Fourier coefficients of the true azimuthal distributions from the measured ones. This analysis suggests that the Fourier coefficients are the best observables to characterize azimuthal anisotropies because, unlike other observables such as the in-plane anisotropy ratio or the squeeze-out ratio, they can be reconstructed accurately.
0.871941
0.620343
0.251598
2004.07714
Synthesizing quantum circuits via numerical optimization
We provide a simple framework for the synthesis of quantum circuits based on a numerical optimization algorithm. This algorithm is used in the context of the trapped-ions technology. We derive theoretical lower bounds for the number of quantum gates required to implement any quantum algorithm. Then we present numerical experiments with random quantum operators where we compute the optimal parameters of the circuits and we illustrate the correctness of the theoretical lower bounds. We finally discuss the scalability of the method with the number of qubits.
We address the question of efficient implementation of quantum protocols, with small communication and entanglement, and short depth circuit for encoding or decoding. We introduce two new methods to achieve this, the first method involving two new versions of convex-split lemma that use small amount of additional resource (in comparison to prior version) and the second method being inspired by the technique of classical correlated sampling in computer science. These lead to a series of new consequences, as follows. First, we consider the task of quantum decoupling, where the aim is to apply an operation on a n-qubit register so as to make it independent of an inaccessible quantum system. Many previous works achieve decoupling with the aid of a random unitary. It is known that random unitaries can be replaced by random circuits of size O(n\log n) and depth poly(\log n), or unitary 2-designs based on Clifford circuits of similar size and depth. We show that given any choice of basis such as the computational basis, decoupling can be achieved by a unitary that takes basis vectors to basis vectors. Thus, the circuit acts in a `classical' manner and additionally uses O(n) catalytic qubits in maximally mixed quantum state. Our unitary performs addition and multiplication modulo a prime and hence achieves a circuit size of O(n\log n) and logarithmic depth. This shows that the circuit complexity of integer multiplication (modulo a prime) is lower bounded by the optimal circuit complexity of decoupling. Next, we construct a new one-shot entanglement-assisted protocol for quantum channel coding that achieves near-optimal communication through a given channel. The number of qubits of pre-shared entanglement is exponentially smaller than that in the previous protocol near-optimal in communication. We also achieve similar results for one-shot quantum state redistribution.
0.921929
0.805115
0.116815
2004.07715
Taxonomy of Dual Block-Coordinate Ascent Methods for Discrete Energy Minimization
We consider the maximum-a-posteriori inference problem in discrete graphical models and study solvers based on the dual block-coordinate ascent rule. We map all existing solvers in a single framework, allowing for a better understanding of their design principles. We theoretically show that some block-optimizing updates are sub-optimal and how to strictly improve them. On a wide range of problem instances of varying graph connectivity, we study the performance of existing solvers as well as new variants that can be obtained within the framework. As a result of this exploration we build a new state-of-the art solver, performing uniformly better on the whole range of test instances.
Combining the classical theory of optimal transport with modern operator splitting techniques, we develop a new numerical method for nonlinear, nonlocal partial differential equations, arising in models of porous media, materials science, and biological swarming. Using the JKO scheme, along with the Benamou-Brenier dynamical characterization of the Wasserstein distance, we reduce computing the solution of these evolutionary PDEs to solving a sequence of fully discrete minimization problems, with strictly convex objective function and linear constraint. We compute the minimizer of these fully discrete problems by applying a recent, provably convergent primal dual splitting scheme for three operators \cite{Yan17}. By leveraging the PDE's underlying variational structure, our method overcomes traditional stability issues arising from the strong nonlinearity and degeneracy, and it is also naturally positivity preserving and entropy decreasing. Furthermore, by transforming the traditional linear equality constraint, as has appeared in previous work, into a linear inequality constraint, our method converges in fewer iterations without sacrificing any accuracy. Remarkably, our method is also massively parallelizable and thus very efficient in resolving high dimensional problems. We prove that minimizers of the fully discrete problem converge to minimizers of the continuum JKO problem as the discretization is refined, and in the process, we recover convergence results for existing numerical methods for computing Wasserstein geodesics \cite{PPO14}. Finally, we conclude with simulations of nonlinear PDEs and Wasserstein geodesics in one and two dimensions that illustrate the key properties of our numerical method.
0.77658
0.702608
0.073972
2004.07717
Digital Ariadne: Citizen Empowerment for Epidemic Control
The COVID-19 crisis represents the most dangerous threat to public health since the H1N1 influenza pandemic of 1918. So far, the disease due to the SARS-CoV-2 virus has been countered with extreme measures at national level that attempt to suppress epidemic growth. However, these approaches require quick adoption and enforcement in order to effectively curb virus spread, and may cause unprecedented socio-economic impact. A viable alternative to mass surveillance and rule enforcement is harnessing collective intelligence by means of citizen empowerment. Mobile applications running on personal devices could significantly support this kind of approach by exploiting context/location awareness and data collection capabilities. In particular, technology-assisted location and contact tracing, if broadly adopted, may help limit the spread of infectious diseases by raising end-user awareness and enabling the adoption of selective quarantine measures. In this paper, we outline general requirements and design principles of personal applications for epidemic containment running on common smartphones, and we present a tool, called 'diAry' or 'digital Ariadne', based on voluntary location and Bluetooth tracking on personal devices, supporting a distributed query system that enables fully anonymous, privacy-preserving contact tracing. We look forward to comments, feedback, and further discussion regarding contact tracing solutions for pandemic containment.
According to the Center of Disease Control (CDC), the Opioid epidemic has claimed more than 72,000 lives in the US in 2017 alone. In spite of various efforts at the local, state and federal level, the impact of the epidemic is becoming progressively worse, as evidenced by the fact that the number of Opioid related deaths increased by 12.5\% between 2016 and 2017. Predictive analytics can play an important role in combating the epidemic by providing decision making tools to stakeholders at multiple levels - from health care professionals to policy makers to first responders. Generating Opioid incidence heat maps from past data, aid these stakeholders to visualize the profound impact of the Opioid epidemic. Such post-fact creation of the heat map provides only retrospective information, and as a result, may not be as useful for preventive action in the current or future time-frames. In this paper, we present a novel deep neural architecture, which learns subtle spatio-temporal variations in Opioid incidences data and accurately predicts future heat maps. We evaluated the efficacy of our model on two open source datasets- (i) The Cincinnati Heroin Overdose dataset, and (ii) Connecticut Drug Related Death Dataset.
0.793241
0.658415
0.134826
2004.07718
Coresets for Clustering in Excluded-minor Graphs and Beyond
Coresets are modern data-reduction tools that are widely used in data analysis to improve efficiency in terms of running time, space and communication complexity. Our main result is a fast algorithm to construct a small coreset for k-Median in (the shortest-path metric of) an excluded-minor graph. Specifically, we give the first coreset of size that depends only on $k$, $\epsilon$ and the excluded-minor size, and our running time is quasi-linear (in the size of the input graph). The main innovation in our new algorithm is that is iterative; it first reduces the $n$ input points to roughly $O(\log n)$ reweighted points, then to $O(\log\log n)$, and so forth until the size is independent of $n$. Each step in this iterative size reduction is based on the importance sampling framework of Feldman and Langberg (STOC 2011), with a crucial adaptation that reduces the number of \emph{distinct points}, by employing a terminal embedding (where low distortion is guaranteed only for the distance from every terminal to all other points). Our terminal embedding is technically involved and relies on shortest-path separators, a standard tool in planar and excluded-minor graphs. Furthermore, our new algorithm is applicable also in Euclidean metrics, by simply using a recent terminal embedding result of Narayanan and Nelson, (STOC 2019), which extends the Johnson-Lindenstrauss Lemma. We thus obtain an efficient coreset construction in high-dimensional Euclidean spaces, thereby matching and simplifying state-of-the-art results (Sohler and Woodruff, FOCS 2018; Huang and Vishnoi, STOC 2020). In addition, we also employ terminal embedding with additive distortion to obtain small coresets in graphs with bounded highway dimension, and use applications of our coresets to obtain improved approximation schemes, e.g., an improved PTAS for planar k-Median via a new centroid set.
The classical Hadwiger conjecture dating back to 1940's states that any graph of chromatic number at least $r$ has the clique of order $r$ as a minor. Hadwiger's conjecture is an example of a well studied class of problems asking how large a clique minor one can guarantee in a graph with certain restrictions. One problem of this type asks what is the largest size of a clique minor in a graph on $n$ vertices of independence number $\alpha(G)$ at most $r$. If true Hadwiger's conjecture would imply the existence of a clique minor of order $n/\alpha(G)$. Results of Kuhn and Osthus and Krivelevich and Sudakov imply that if one assumes in addition that $G$ is $H$-free for some bipartite graph $H$ then one can find a polynomially larger clique minor. This has recently been extended to triangle free graphs by Dvo\v{r}\'ak and Yepremyan, answering a question of Norin. We complete the picture and show that the same is true for arbitrary graph $H$, answering a question of Dvo\v{r}\'ak and Yepremyan. In particular, we show that any $K_s$-free graph has a clique minor of order $c_s(n/\alpha(G))^{1+\frac{1}{10(s-2) }}$, for some constant $c_s$ depending only on $s$. The exponent in this result is tight up to a constant factor in front of the $\frac{1}{s-2}$ term.
0.845622
0.71328
0.132342
2004.07719
Terahertz Conductivity of Heavy-fermion Systems from Time-resolved Spectroscopy
The Drude model describes the free-electron conduction in simple metals, governed by the freedom that the mobile electrons have within the material. In strongly correlated systems, however, a significant deviation of the optical conductivity from the simple metallic Drude behavior is observed. Here, we investigate the optical conductivity of the heavy-fermion system CeCu$_{\mathrm{6-x}}$Au$_{\mathrm{x}}$, using time-resolved, phase-sensitive terahertz spectroscopy. Terahertz electric field creates two types of excitations in heavy-fermion materials: First, the intraband excitations that leave the heavy quasiparticles intact. Second, the resonant interband transitions between the heavy and light parts of the hybridized conduction band that break the Kondo singlet. We find that the Kondo-singlet breaking interband transitions do not create a Drude peak, while the Kondo-retaining intraband excitations yield the expected Drude response; thus, making it possible to separate these two fundamentally different correlated contributions to the optical conductivity.
Replacing a magnetic atom by a spinless atom in a heavy fermion compound generates a quantum state often referred to as a 'Kondo-hole'. No experimental imaging has been achieved of the atomic-scale electronic structure of a Kondo-hole, or of their destructive impact (Lawrence JM, et al. (1996) Kondo hole behavior in Ce0. 97La0. 03Pd3. Phys Rev B 53:12559-12562; Bauer ED, et al. (2011) Electronic inhomogeneity in a Kondo lattice. Proc Natl Acad Sci. 108:6857-6861) on the hybridization process between conduction and localized electrons which generates the heavy fermion state. Here we report visualization of the electronic structure at Kondo-holes created by substituting spinless Thorium atoms for magnetic Uranium atoms in the heavy-fermion system URu2Si2. At each Thorium atom, an electronic bound state is observed. Moreover, surrounding each Thorium atom we find the unusual modulations of hybridization strength recently predicted to occur at Kondo-holes (Figgins J, Morr DK (2011) Defects in heavy-fermion materials: unveiling strong correlations in real space. Phys Rev Lett 107:066401). Then, by introducing the 'hybridization gapmap' technique to heavy fermion studies, we discover intense nanoscale heterogeneity of hybridization due to a combination of the randomness of Kondo-hole sites and the long-range nature of the hybridization oscillations. These observations provide direct insight into both the microscopic processes of heavy-fermion forming hybridization and the macroscopic effects of Kondo-hole doping.
0.878689
0.763285
0.115404
2004.07720
Accurate single- and double-differential resummation of colour-singlet processes with MATRIX+RadISH: $W^+W^-$ production at the LHC
We present the combination of fully differential cross sections for colour-singlet production processes at next-to-next-to-leading order (NNLO) QCD obtained with MATRIX and all-order resummation through RadISH. This interface allows us to achieve unprecedented accuracy for various transverse observables in $2 \rightarrow 2$ production processes. As an important application we consider $W^+ W^-$ production at the LHC, more precisely the full leptonic process $pp\to \ell^+\ell^{\prime\, -}\nu_{\ell}{\bar\nu}_{\ell^\prime}+X$ with $\ell'\neq\ell$, and we present resummed predictions for differential distributions in presence of fiducial selection cuts. In particular, we resum the transverse-momentum spectrum of the $W^+ W^-$ pair at next-to-next-to-next-to-leading logarithmic (N$^3$LL) accuracy and match it to the integrated NNLO cross section. The transverse-momentum spectrum of the leading jet in $W^+ W^-$ production is calculated at NNLO+NNLL accuracy. Finally, the joint resummation for the transverse-momentum spectrum of the $W^+ W^-$ pair in the presence of a jet veto is performed at NNLO+NNLL. Our phenomenological study highlights the importance of higher-order perturbative and logarithmic corrections for precision phenomenology at the LHC.
The measurement of a charge asymmetry in t tbar production at LHC constitutes more than an independent confirmation of the forward-backward asymmetry found at Tevatron. Indeed, both measurements together can be used to identify the source of the asymmetry. This is demonstrated for the case of new Z', W' vector bosons and colour-sextet and triplet scalars, exchanged in t, u channels respectively, and a very heavy axigluon in the s channel.
0.896848
0.750285
0.146563
2004.07721
Resource Efficient Chemistry on Quantum Computers with the Variational Quantum Eigensolver and The Double Unitary Coupled-Cluster approach
Applications of quantum simulation algorithms to obtain electronic energies of molecules on noisy intermediate-scale quantum (NISQ) devices require careful consideration of resources describing the complex electron correlation effects. In modeling second-quantized problems, the biggest challenge confronted is that the number of qubits scales linearly with the size of molecular basis. This poses a significant limitation on the size of the basis sets and the number of correlated electrons included in quantum simulations of chemical processes. To address this issue and to enable more realistic simulations on NISQ computers, we employ the double unitary coupled-cluster (DUCC) method to effectively downfold correlation effects into the reduced-size orbital space, commonly referred to as the active space. Using downfolding techniques, we demonstrate that properly constructed effective Hamiltonians can capture the effect of the whole orbital space in small-size active spaces. Combining the downfolding pre-processing technique with the Variational Quantum Eigensolver, we solve for the ground-state energy of $\text{H}_2$ and $\text{Li}_2$ in the cc-pVTZ basis using the DUCC-reduced active spaces. We compare these results to full configuration-interaction and high-level coupled-cluster reference calculations.
The solution of eigenproblems is often a key computational bottleneck that limits the tractable system size of numerical algorithms, among them electronic structure theory in chemistry and in condensed matter physics. Large eigenproblems can easily exceed the capacity of a single compute node, thus must be solved on distributed-memory parallel computers. We here present GPU-oriented optimizations of the ELPA two-stage tridiagonalization eigensolver (ELPA2). On top of its existing cuBLAS-based GPU offloading, we add a CUDA kernel to speed up the back-transformation of eigenvectors, which can be the computationally most expensive part of the two-stage tridiagonalization algorithm. We demonstrate the performance of this GPU-accelerated eigensolver by benchmark calculations on two hybrid CPU-GPU architectures, namely a compute cluster based on Intel Xeon Gold CPUs and NVIDIA Volta GPUs, and the Summit supercomputer based on IBM POWER9 CPUs and NVIDIA Volta GPUs. Consistent with previous benchmarks on CPU-only architectures, the GPU-accelerated two-stage solver exhibits a parallel performance superior to the one-stage solver.
0.825144
0.763885
0.061259
2004.07723
Covid Notions: Towards Formal Definitions -- and Documented Understanding -- of Privacy Goals and Claimed Protection in Proximity-Tracing Services
The recent SARS-CoV-2 pandemic gave rise to management approaches using mobile apps for contact tracing. The corresponding apps track individuals and their interactions, to facilitate alerting users of potential infections well before they become infectious themselves. Naive implementation obviously jeopardizes the privacy of health conditions, location, activities, and social interaction of its users. A number of protocol designs for colocation tracking have already been developed, most of which claim to function in a privacy preserving manner. However, despite claims such as "GDPR compliance", "anonymity", "pseudonymity" or other forms of "privacy", the authors of these designs usually neglect to precisely define what they (aim to) protect. We make a first step towards formally defining the privacy notions of proximity tracing services, especially with regards to the health, (co-)location, and social interaction of their users. We also give a high-level intuition of which protection the most prominent proposals can and cannot achieve. This initial overview indicates that all proposals include some centralized services, and none protects identity and (co-)locations of infected users perfectly from both other users and the service provider.
Location-Based Services (LBSs) build upon geographic information to provide users with location-dependent functionalities. In such a context, it is particularly important that geographic locations claimed by users are trustworthy. Centralized verification approaches proposed in the last few years are not satisfactory, as they entail a high risk to the privacy of users. In this paper, we present and evaluate a novel decentralized, infrastructure-independent proof-of-location scheme based on blockchain technology. Our scheme guarantees both location trustworthiness and user privacy preservation.
0.864946
0.748001
0.116945
2004.07724
Mean Number and Number Variance of Squeezed Coherent Photons In a Thermal State of Photons
We consider the equilibrium thermal state of photons and determine the mean number and number variance of squeezed coherent photons. We use an integral representation for electro-magnetic radiation applicable both to systems in equilibrium and to systems in nonequilibrium to determine the spectral function of the radiation. The system considered is in thermal equilibrium and we find that the squeezed coherent photons are at a higher temperature than the photons themselves. Also, as expected, the mean number of squeezed coherent photons is greater than that of photons.
The electromagnetic field inside a spherical cavity of large radius R is considered in the presence of stationary charge and current densities. R provides infra-red regularization while maintaining gauge invariance. The quantum ground state of physical photons forming the magnetic field is found to be a coherent state with a definite mean occupation number. The electric field, which is determined by the Gauss law constraint, is maintained by a minimum uncertainty coherent state, according to the projection operator approach to the quantization of constrained systems. The mean occupation number of this state is proportional to the square of the total charge. The results confirm formulae obtained previously from a calculation with a finite photon mass for infra-red regularization.
0.927042
0.818621
0.108421
2004.07725
Functional SAC model: With application to spatial econometrics
Spatial autoregressive combined (SAC) model has been widely studied in the literature for the analysis of spatial data in various areas such as geography, economics, demography, regional sciences. This is a linear model with scalar response, scalar explanatory variables and which allows for spatial interactions in the dependent variable and the disturbances. In this work we extend this modeling approach from scalar to functional covariate. The parameters of the model are estimated via the maximum likelihood estimation method. A simulation study is conducted to evaluate the performance of the proposed methodology. As an illustration, the model is used to establish the relationship between unemployment and illiteracy in Senegal.
Learning about cause and effect is arguably the main goal in applied econometrics. In practice, the validity of these causal inferences is contingent on a number of critical assumptions regarding the type of data that has been collected and the substantive knowledge that is available. For instance, unobserved confounding factors threaten the internal validity of estimates, data availability is often limited to non-random, selection-biased samples, causal effects need to be learned from surrogate experiments with imperfect compliance, and causal knowledge has to be extrapolated across structurally heterogeneous populations. A powerful causal inference framework is required to tackle these challenges, which plague most data analysis to varying degrees. Building on the structural approach to causality introduced by Haavelmo (1943) and the graph-theoretic framework proposed by Pearl (1995), the artificial intelligence (AI) literature has developed a wide array of techniques for causal learning that allow to leverage information from various imperfect, heterogeneous, and biased data sources (Bareinboim and Pearl, 2016). In this paper, we discuss recent advances in this literature that have the potential to contribute to econometric methodology along three dimensions. First, they provide a unified and comprehensive framework for causal inference, in which the aforementioned problems can be addressed in full generality. Second, due to their origin in AI, they come together with sound, efficient, and complete algorithmic criteria for automatization of the corresponding identification task. And third, because of the nonparametric description of structural models that graph-theoretic approaches build on, they combine the strengths of both structural econometrics as well as the potential outcomes framework, and thus offer a perfect middle ground between these two competing literature streams.
0.868315
0.741369
0.126946
2004.07726
Magnetic field generation from composition gradients in inertial confinement fusion fuel
Experimental asymmetries in fusion implosions can lead to magnetic field generation in the hot plasma core. For typical parameters, previous studies found that the magnetisation Hall parameter, given by the product of the electron gyro-frequency and Coulomb collision time, can exceed one. This will affect the hydrodynamics through inhibition and deflection of the electron heat flux. The magnetic field source is the collisionless Biermann term, which arises from the Debye shielding potential in electron pressure gradients. We show that there is an additional source term due to the Z dependence of the Coulomb collision operator. If there are ion composition gradients, such as jets of carbon ablator mix entering the hot-spot, this source term can rapidly exceed the Biermann fields. In addition, the Biermann fields are enhanced due to the increased temperature gradients from carbon radiative cooling. With even stronger self-generated fields, heat loss to the carbon regions will be reduced, potentially reducing the negative effect of carbon mix.
We have extended the biquaternionic Dirac's equation to include interactions with photons. The electric field is found to be perpendicular to the matter magnetic field, and the magnetic field is perpendicular to the matter inertial field. Inertial and magnetic masses are found to be conserved separately. The magnetic mass density is a consequence of the coupling between the vector potential and the matter inertial field. The presence of the vector and scalar potentials, and the matter inertial and magnetic fields are found to modify the standard form of the derived Maxwell's equations. The resulting interacting electrodynamics equations are found to generalize those of axion-like fields of Frank Wilczek or Chern-Simons equations. The axion field satisfies massive Klein-Gordon equation if Lorenz gauge condition is violated. Therefore, axion could be our massive photon. The electromagnetic field vector, $\vec{F}=\vec{E}+ic\vec{B}$, is found to satisfy massive Dirac's equation in addition to the fact that $\vec{\nabla}\cdot\vec{F}=0$, where $\vec{E}$ and $\vec{B}$ are the electric and magnetic fields, respectively.
0.768694
0.614907
0.153787
2004.07727
Accretion Disc Winds in Tidal Disruption Events: Ultraviolet Spectral Lines as Orientation Indicators
Some tidal disruption events (TDEs) exhibit blueshifted broad absorption lines (BALs) in their rest-frame ultraviolet (UV) spectra, while others display broad emission lines (BELs). Similar phenomenology is observed in quasars and accreting white dwarfs, where it can be interpreted as an orientation effect associated with line formation in an accretion disc wind.We propose and explore a similar unification scheme for TDEs. We present synthetic UV spectra for disc and wind-hosting TDEs, produced by a state-of-the-art Monte Carlo ionization and radiative transfer code. Our models cover a wide range of disc wind geometries and kinematics. Such winds naturally reproduce both BALs and BELs. In general, sight lines looking into the wind cone preferentially produce BALs, while other orientations preferentially produce BELs. We also study the effect of wind clumping and CNO-processed abundances on the observed spectra. Clumpy winds tend to produce stronger UV emission and absorption lines, because clumping increases both the emission measure and the abundances of the relevant ionic species, the latter by reducing the ionization state of the outflow. The main effect of adopting CNO-processed abundances is a weakening of C~{\sc iv}~1550~\AA~ and an enhancement of N \textsc{v}~1240~\AA~ in the spectra. We conclude that line formation in an accretion disc wind is a promising mechanism for explaining the diverse UV spectra of TDEs. If this is correct, the relative number of BAL and BEL TDEs can be used to estimate the covering factor of the outflow. The models in this work are publicly available online and upon request.
The tidal disruption of a star by a supermassive black hole can result in transient radio emission. The electrons producing these synchrotron radio flares could either be accelerated inside a relativistic jet or externally by shocks resulting from an outflow interacting with the circumnuclear medium. Until now, evidence for the internal emission mechanism has been lacking; nearly all tidal disruption flare studies have adopted the external shock model to explain the observed properties of radio flares. Here we report a result that presents a challenge to external emission models: we discovered a cross-correlation between the soft X-ray (0.3-1 keV) and 16 GHz radio flux of the tidal disruption flare ASASSN-14li. Variability features in the X-ray light curve appear again in the radio light curve, but after a time lag of about 13 days. This demonstrates that soft X-ray emitting accretion disk regulates the radio emission. This coupling appears to be inconsistent with all previous external emission models for this source but is naturally explained if the radio emission originates from a freely expanding jet. We show that emission internal to an adiabatically expanding jet can also reproduce the observed evolution of the radio spectral energy distribution. Furthermore, both the correlation between X-ray and radio luminosity as well as our radio spectral modeling imply an approximately linear coupling between the accretion rate and jet power.
0.878583
0.749256
0.129328
2004.07728
Image Quality Assessment: Unifying Structure and Texture Similarity
Objective measures of image quality generally operate by making local comparisons of pixels of a "degraded" image to those of the original. Relative to human observers, these measures are overly sensitive to resampling of texture regions (e.g., replacing one patch of grass with another). Here we develop the first full-reference image quality model with explicit tolerance to texture resampling. Using a convolutional neural network, we construct an injective and differentiable function that transforms images to a multi-scale overcomplete representation. We empirically show that the spatial averages of the feature maps in this representation capture texture appearance, in that they provide a set of sufficient statistical constraints to synthesize a wide variety of texture patterns. We then describe an image quality method that combines correlation of these spatial averages ("texture similarity") with correlation of the feature maps ("structure similarity"). The parameters of the proposed measure are jointly optimized to match human ratings of image quality, while minimizing the reported distances between subimages cropped from the same texture images. Experiments show that the optimized method explains human perceptual scores, both on conventional image quality databases, as well as on texture databases. The measure also offers competitive performance on related tasks such as texture classification and retrieval. Finally, we show that our method is relatively insensitive to geometric transformations (e.g., translation and dilation), without use of any specialized training or data augmentation. Code is available at https://github.com/dingkeyan93/DISTS.
We present a full reference, perceptual image metric based on VGG-16, an artificial neural network trained on object classification. We fit the metric to a new database based on 140k unique images annotated with ground truth by human raters who received minimal instruction. The resulting metric shows competitive performance on TID 2013, a database widely used to assess image quality assessments methods. More interestingly, it shows strong responses to objects potentially carrying semantic relevance such as faces and text, which we demonstrate using a visualization technique and ablation experiments. In effect, the metric appears to model a higher influence of semantic context on judgments, which we observe particularly in untrained raters. As the vast majority of users of image processing systems are unfamiliar with Image Quality Assessment (IQA) tasks, these findings may have significant impact on real-world applications of perceptual metrics.
0.869669
0.792267
0.077402
2004.07729
Estimating quantum coherence by noncommutativity of any observable and its incoherent part
We establish an inequality involving the quantum coherence of an arbitrary quantum state, possibly nonpure, in arbitrary dimension and a noncommutativity estimator of an arbitrary observable. The noncommutativity estimator uses the commutator of the observable and its incoherent or classical part. The relation provides a direct method of obtaining an estimate of the quantum coherence of an arbitrary quantum state, without resorting to quantum state tomography or the existing witness operators.
Recent time-resolved differential transmission and Faraday rotation measurements of long-lived electron spin coherence in quantum wells displayed intriguing parametric dependencies. For their understanding we formulate a microscopic theory of the optical response of a gas of optically incoherent excitons whose constituent electrons retain spin coherence, under a weak magnetic field applied in the quantum well's plane. We define a spin beat susceptibility and evaluate it in linear order of the exciton density. Our results explain the many-body physics underlying the basic features observed in the experimental measurements.
0.953187
0.754808
0.198379
2004.07730
Typical knots: size, link component count, and writhe
We model the typical behavior of knots and links using grid diagrams. Links are ubiquitous in the sciences, and their normal or typical behavior is of significant importance in understanding situations such as the topological state of DNA or the statistical mechanics of ring polymers. We examine three invariants: the expected size of a random knot; the expected number of components of a random link; and the expected writhe of a random knot. We investigate the first two numerically and produce generating functions which codify the observed patterns, we perform an exploratory data analysis for the third. We continue this project in a future work, where we investigate genus and the effects of crossing change on it.
We define a multi-variable version of the Affine Index Polynomial for virtual links. This invariant reduces to the original Affine Index Polynomial in the case of virtual knots, and also generalizes the version for compatible virtual links recently developed by L. Kauffman. We prove that this invariant is a Vassiliev invariant of order one, and study what happens as we shift the coloring of one or more components.
0.882488
0.813746
0.068742
2004.07731
Experimental Data from a Quantum Computer Verifies the Generalized Pauli Exclusion Principle
"What are the consequences ... that Fermi particles cannot get into the same state ... " R. P. Feynman wrote of the Pauli exclusion principle, "In fact, almost all the peculiarities of the material world hinge on this wonderful fact." In 1972 Borland and Dennis showed that there exist powerful constraints beyond the Pauli exclusion principle on the orbital occupations of Fermi particles, providing important restrictions on quantum correlation and entanglement. Here we use computations on quantum computers to experimentally verify the existence of these additional constraints. Quantum many-fermion states are randomly prepared on the quantum computer and tested for constraint violations. Measurements show no violation and confirm the generalized Pauli exclusion principle with an error of one part in one quintillion.
Heisenberg's uncertainty principle has been understood to set a limitation on measurements; however, the long-standing mathematical formulation established by Heisenberg, Kennard, and Robertson does not allow such an interpretation. Recently, a new relation was found to give a universally valid relation between noise and disturbance in general quantum measurements, and it has become clear that the new relation plays a role of the first principle to derive various quantum limits on measurement and information processing in a unified treatment. This paper examines the above development on the noise-disturbance uncertainty principle in the model-independent approach based on the measurement operator formalism, which is widely accepted to describe a class of generalized measurements in the field of quantum information. We obtain explicit formulas for the noise and disturbance of measurements given by the measurement operators, and show that projective measurements do not satisfy the Heisenberg-type noise-disturbance relation that is typical in the gamma-ray microscope thought experiments. We also show that the disturbance on a Pauli operator of a projective measurement of another Pauli operator constantly equals the square root of 2, and examine how this measurement violates the Heisenberg-type relation but satisfies the new noise-disturbance relation.
0.877005
0.794934
0.082071
2004.07732
Multigrid for Chiral Lattice Fermions: Domain Wall
Critical slowing down for the Krylov Dirac solver presents a major obstacle to further advances in lattice field theory as it approaches the continuum solution. We propose a new multi-grid approach for chiral fermions, applicable to both the 5-d domain wall or 4-d Overlap operator. The central idea is to directly coarsen the 4-d Wilson kernel, giving an effective domain wall or overlap operator on each level. We provide here an explicit construction for the Shamir domain wall formulation with numerical tests for the 2-d Schwinger prototype, demonstrating near ideal multi-grid scaling. The framework is designed for a natural extension to 4-d lattice QCD chiral fermions, such as the M\"obius, Zolotarev or Borici domain wall discretizations or directly to a rational expansion of the 4-d Overlap operator. For the Shamir operator, the effective overlap operator is isolated by the use of a Pauli-Villars preconditioner in the spirit of the K\"ahler-Dirac spectral map used in a recent staggered MG algorithm [1].
We present the first GPU-based conjugate gradient (CG) solver for lattice QCD with domain-wall fermions (DWF). It is well-known that CG is the most time-consuming part in the Hybrid Monte Carlo simulation of unquenched lattice QCD, which becomes even more computational demanding for lattice QCD with exact chiral symmetry. We have designed a CG solver for the general 5-dimensional DWF operator on NVIDIA CUDA architecture with mixed-precision, using the defect correction as well as the reliable updates algorithms. We optimize our computation by even-odd preconditioning in the 4D space-time lattice, plus several innovative techniques for CUDA kernels. For NVIDIA GeForce GTX 285/480, our CG solver attains 180/233 Gflops (sustained).
0.86522
0.824042
0.041178
2004.07733
Bridging the Gap: FPGAs as Programmable Switches
The emergence of P4, a domain specific language, coupled to PISA, a domain specific architecture, is revolutionizing the networking field. P4 allows to describe how packets are processed by a programmable data plane, spanning ASICs and CPUs, implementing PISA. Because the processing flexibility can be limited on ASICs, while the CPUs performance for networking tasks lag behind, recent works have proposed to implement PISA on FPGAs. However, little effort has been dedicated to analyze whether FPGAs are good candidates to implement PISA. In this work, we take a step back and evaluate the micro-architecture efficiency of various PISA blocks. We demonstrate, supported by a theoretical and experimental analysis, that the performance of a few PISA blocks is severely limited by the current FPGA architectures. Specifically, we show that match tables and programmable packet schedulers represent the main performance bottlenecks for FPGA-based programmable switches. Thus, we explore two avenues to alleviate these shortcomings. First, we identify network applications well tailored to current FPGAs. Second, to support a wider range of networking applications, we propose modifications to the FPGA architectures which can also be of interest out of the networking field.
Deep Neural Networks are becoming the de-facto standard models for image understanding, and more generally for computer vision tasks. As they involve highly parallelizable computations, CNN are well suited to current fine grain programmable logic devices. Thus, multiple CNN accelerators have been successfully implemented on FPGAs. Unfortunately, FPGA resources such as logic elements or DSP units remain limited. This work presents a holistic method relying on approximate computing and design space exploration to optimize the DSP block utilization of a CNN implementation on an FPGA. This method was tested when implementing a reconfigurable OCR convolutional neural network on an Altera Stratix V device and varying both data representation and CNN topology in order to find the best combination in terms of DSP block utilization and classification accuracy. This exploration generated dataflow architectures of 76 CNN topologies with 5 different fixed point representation. Most efficient implementation performs 883 classifications/sec at 256 x 256 resolution using 8% of the available DSP blocks.
0.842134
0.737204
0.10493