id
stringlengths 5
16
| query
stringlengths 1
382
| pos
stringlengths 7
5.09k
| neg
stringlengths 23
5.09k
| qp
float64 0.4
1
| qn
float64 0.34
0.91
| margin
float64 0.02
0.3
|
---|---|---|---|---|---|---|
2004.08277 | Learning Strategies for Radar Clutter Classification | In this paper, we address the problem of classifying clutter returns in order
to partition them into statistically homogeneous subsets. The classification
procedure relies on a model for the observables including latent variables that
is solved by the expectation-maximization algorithm. The derivations are
carried out by accounting for three different cases for the structure of the
clutter covariance matrix. A preliminary performance analysis highlights that
the proposed technique is a viable means to cluster clutter returns over the
range.
| There is a one-to-one correspondence between square-free monomial ideals and
clutters, which are also known as simple hypergraphs. It was conjectured that
unmixed admissible clutters are Cohen-Macaulay. We prove the conjecture for
uniform admissible clutters of heights 2 and 3. For admissible clutters of
greater heights, we give a family of examples to show that the conjecture may
fail. When the height is 4, we give an additional condition under which unmixed
admissible clutters are Cohen-Macaulay.
| 0.826721 | 0.596958 | 0.229763 |
2004.08278 | The impact of CMEs on the critical frequency of F2-layer ionosphere
(foF2) | The ionospheric critical frequency (foF2) from ionosonde measurements at
geographic high, middle, and low latitudes is analyzed with the occurrence of
coronal mass ejections (CMEs) in long term variability of the solar cycles. We
observed trends of monthly maximum foF2 values and monthly averaged values of
CME parameters such as speed, angular width, mass, and kinetic energy with
respect to time. The impact of CMEs on foF2 is very high at high latitudes and
low at low latitudes. The time series for monthly maximum foF2 and
monthly-averaged CME speed is moderately correlated at high and middle
latitudes.
| The effect of undesirable high-frequency free-layer switching in magnetic
multilayer systems, referred to as back hopping, is investigated by means of
the spin-diffusion model. A possible origin of the back-hopping effect is found
to be the destabilization of the pinned layer which leads to perpetual
switching of both layers. The influence of different material parameters on the
critical switching currents for the free and pinned layer is obtained by
micromagnetic simulations. It is found that the choice of a free-layer material
with low polarization $\beta$ and saturation magnetization $M_s$, and a
pinned-layer material with high $\beta$ and $M_s$ leads to a low free-layer
critical current and a high pinned-layer critical current and hence reduces the
likelihood of back hopping. While back hopping was observed in various types of
devices, there are only few experiments that exhibit this effect in
perpendicularly magnetized systems. However, our simulations suggest, that this
is likely to change due to loss of pinned-layer anisotropy when decreasing
device sizes.
| 0.895499 | 0.619085 | 0.276413 |
2004.08279 | Bypassing or flying above the obstacles? A novel multi-objective UAV
path planning problem | This study proposes a novel multi-objective integer programming model for a
collision-free discrete drone path planning problem. Considering the
possibility of bypassing obstacles or flying above them, this study aims to
minimize the path length, energy consumption, and maximum path risk
simultaneously. The static environment is represented as 3D grid cells. Due to
the NP-hardness nature of the problem, several state-of-theart evolutionary
multi-objective optimization (EMO) algorithms with customized crossover and
mutation operators are applied to find a set of non-dominated solutions. The
results show the effectiveness of applied algorithms in solving several
generated test cases.
| All standard AI planners to-date can only handle a single objective, and the
only way for them to take into account multiple objectives is by aggregation of
the objectives. Furthermore, and in deep contrast with the single objective
case, there exists no benchmark problems on which to test the algorithms for
multi-objective planning. Divide and Evolve (DAE) is an evolutionary planner
that won the (single-objective) deterministic temporal satisficing track in the
last International Planning Competition. Even though it uses intensively the
classical (and hence single-objective) planner YAHSP, it is possible to turn
DAE-YAHSP into a multi-objective evolutionary planner. A tunable benchmark
suite for multi-objective planning is first proposed, and the performances of
several variants of multi-objective DAE-YAHSP are compared on different
instances of this benchmark, hopefully paving the road to further
multi-objective competitions in AI planning.
| 0.839442 | 0.729492 | 0.10995 |
2004.08280 | In situ evidence of firehose instability in multiple reconnection | Energy conversion via reconnecting current sheets is common in space and
astrophysical plasmas. Frequently, current sheets disrupt at multiple
reconnection sites, leading to the formation of plasmoid structures between
sites, which might affect energy conversion. We present in situ evidence of the
firehose instability in multiple reconnection in the Earth's magnetotail. The
observed proton beams accelerated in the direction parallel to magnetic field
and ion-scale fluctuations of whistler type imply the development of firehose
instability between two active reconnection sites. The linear wave dispersion
relation, estimated for the measured plasma parameters, indicates a positive
growth rate of firehose-related electromagnetic fluctuations. Simulations of
temporal evolution of the observed multiple reconnection by using a 2.5D
implicit particle-in-cell code show that, as the plasmoid formed between two
reconnection sites evolves, the plasma at its edge becomes anisotropic and
overcomes the firehose marginal stability threshold, leading to the generation
of magnetic field fluctuations. The combined results of observations and
simulations suggest that the firehose instability, operating between
reconnection sites, converts plasma kinetic energy into energy of magnetic
field fluctuations, counteracting the conversion of magnetic energy into plasma
energy occurring at reconnection sites. This suggests that magnetic energy
conversion in multiple reconnection can be less efficient than in the case of
the single-site reconnection.
| We present rapid-cadence Transition Region And Coronal Explorer (TRACE)
observations which show evidence of a filament eruption from active region NOAA
10696, accompanied by an X2.5 flare, on 2004 November 10. The eruptive
filament, which manifests as a fast coronal mass ejection some minutes later,
rises as a kinking structure with an apparently exponential growth of height
within TRACE's field of view. We compare the characteristics of this filament
eruption with MHD numerical simulations of a kink-unstable magnetic flux rope,
finding excellent qualitative agreement. We suggest that, while tether
weakening by breakout-like quadrupolar reconnection may be the release
mechanism for the previously confined flux rope, the driver of the expansion is
most likely the MHD helical kink instability.
| 0.880186 | 0.774674 | 0.105512 |
2004.08281 | Is depolarization a signature of multiple scattering? | We demonstrate that depolarization is not necessarily a signature of multiple
scattering. Within a single scattering regime, we show that disordered systems
can exhibit depolarization if two sources of disorder are present and have
different individual polarization responses. To this end, we study a disordered
system consisting of a randomly rough surface that separates vacuum from a
medium with volume dielectric fluctuations. This scattering system depolarizes
the incident light even within the single scattering regime and there exist
directions of perfect depolarization which we characterize geometrically.
| Polarimetric sensing by orthogonality breaking has been recently proposed as
an alternative technique for performing direct and fast polarimetric
measurements using a specific dual-frequency dual-polarization (DFDP) source.
Based on the instantaneous Stokes-Mueller formalism to describe the
high-frequency evolution of the DFDP beam intensity, we thoroughly analyze the
interaction of such a beam with birefringent, dichroic and depolarizing
samples. This allows us to confirm that orthogonality breaking is produced by
the sample diattenuation, whereas this technique is immune to both
birefringence and diagonal depolarization. We further analyze the robustness of
this technique when polarimetric sensing is performed through a birefringent
waveguide, and the optimal DFDP source configuration for fiber-based endoscopic
measurements is subsequently identified. Finally, we consider a stochastic
depolarization model based on an ensemble of random linear diattenuators, which
makes it possible to understand the progressive vanishing of the detected
orthogonality breaking signal as the spatial heterogeneity of the sample
increases, thus confirming the insensitivity of this method to diagonal
depolarization. The fact that the orthogonality breaking signal is exclusively
due to the sample dichroism is an advantageous feature for the precise
decoupled characterization of such an anisotropic parameter in samples showing
several simultaneous effects.
| 0.88111 | 0.799946 | 0.081164 |
2004.08282 | Distributed Lower Bounds for Ruling Sets | Given a graph $G = (V,E)$, an $(\alpha, \beta)$-ruling set is a subset $S
\subseteq V$ such that the distance between any two vertices in $S$ is at least
$\alpha$, and the distance between any vertex in $V$ and the closest vertex in
$S$ is at most $\beta$. We present lower bounds for distributedly computing
ruling sets. The results carry over to one of the most fundamental symmetry
breaking problems, maximal independent set (MIS), as MIS is the same as a
$(2,1)$-ruling set.
More precisely, for the problem of computing a $(2, \beta)$-ruling set (and
hence also any $(\alpha, \beta)$-ruling set with $\alpha > 2$) in the LOCAL
model of distributed computing, we show the following, where $n$ denotes the
number of vertices and $\Delta$ the maximum degree.
$\bullet$ There is no deterministic algorithm running in $o\left( \frac{\log
\Delta}{\beta \log \log \Delta}\right) + o\left(\sqrt{\frac{\log n}{\beta \log
\log n}}\right)$ rounds, for any $\beta \in o\left(\sqrt{\frac{\log
\Delta}{\log \log \Delta}}\right) + o\left(\left(\frac{\log n}{\log \log
n}\right)^{1/3}\right)$.
$\bullet$ There is no randomized algorithm running in $o\left( \frac{\log
\Delta}{\beta \log \log \Delta}\right) + o\left(\sqrt{\frac{\log \log n}{\beta
\log \log \log n}}\right)$ rounds, for any $\beta \in o\left(\sqrt{\frac{\log
\Delta}{\log \log \Delta}}\right) + o\left(\left(\frac{\log \log n}{\log \log
\log n}\right)^{1/3}\right)$.
For $\beta > 1$, this improves on the previously best lower bound of
$\Omega(\log^* n)$ rounds that follows from the old bounds of Linial [FOCS'87]
and Naor [J.Disc.Math.'91] (resp.\ $\Omega(1)$ rounds if $\beta \in
\omega(\log^* n)$). For $\beta = 1$, i.e., for MIS, our results improve on the
previously best lower bound of $\Omega(\log^* n)$ \emph{on trees}, as our
bounds already hold on trees.
| We study a free boundary optimization problem in heat conduction, ruled by
the infinity-Laplace operator, with lower temperature bound and a volume
constraint. We obtain existence and regularity results and derive geometric
properties for the solution and the free boundaries.
| 0.837716 | 0.652755 | 0.18496 |
2004.08283 | Learned Video Compression with Feature-level Residuals | In this paper, we present an end-to-end video compression network for P-frame
challenge on CLIC. We focus on deep neural network (DNN) based video
compression, and improve the current frameworks from three aspects. First, we
notice that pixel space residuals is sensitive to the prediction errors of
optical flow based motion compensation. To suppress the relative influence, we
propose to compress the residuals of image feature rather than the residuals of
image pixels. Furthermore, we combine the advantages of both pixel-level and
feature-level residual compression methods by model ensembling. Finally, we
propose a step-by-step training strategy to improve the training efficiency of
the whole framework. Experiment results indicate that our proposed method
achieves 0.9968 MS-SSIM on CLIC validation set and 0.9967 MS-SSIM on test set.
| Image and video classification research has made great progress through the
development of handcrafted local features and learning based features. These
two architectures were proposed roughly at the same time and have flourished at
overlapping stages of history. However, they are typically viewed as distinct
approaches. In this paper, we emphasize their structural similarities and show
how such a unified view helps us in designing features that balance efficiency
and effectiveness. As an example, we study the problem of designing efficient
video feature learning algorithms for action recognition.
We approach this problem by first showing that local handcrafted features and
Convolutional Neural Networks (CNNs) share the same convolution-pooling network
structure. We then propose a two-stream Convolutional ISA (ConvISA) that adopts
the convolution-pooling structure of the state-of-the-art handcrafted video
feature with greater modeling capacities and a cost-effective training
algorithm. Through custom designed network structures for pixels and optical
flow, our method also reflects distinctive characteristics of these two data
sources.
Our experimental results on standard action recognition benchmarks show that
by focusing on the structure of CNNs, rather than end-to-end training methods,
we are able to design an efficient and powerful video feature learning
algorithm.
| 0.827087 | 0.772009 | 0.055079 |
2004.08284 | Time Series Data Cleaning: A Survey | Errors are prevalent in time series data, which is particularly common in the
industrial field. Data with errors could not be stored in the database, which
results in the loss of data assets. At present, to deal with these time series
containing errors, besides keeping original erroneous data, discarding
erroneous data and manually checking erroneous data, we can also use the
cleaning algorithm widely used in the database to automatically clean the time
series data. This survey provides a classification of time series data cleaning
techniques and comprehensively reviews the state-of-the-art methods of each
type. Besides we summarize data cleaning tools, systems and evaluation criteria
from research and industry. Finally, we highlight possible directions time
series data cleaning.
| Artificial Neural Network Model for prediction of time-series data is
revisited on analysis of the Indonesian stock-exchange data. We introduce the
use of Multi-Layer Perceptron to percept the modified Poincare-map of the given
financial time-series data. The modified Poincare-map is believed to become the
pattern of the data that transforms the data in time-t versus the data in
time-t+1 graphically. We built the Multi-Layer Perceptron to percept and
demonstrate predicting the data on specific stock-exchange in Indonesia.
| 0.908812 | 0.70986 | 0.198953 |
2004.08285 | Learning Based Hybrid Beamforming Design for Full-Duplex Millimeter Wave
Systems | Millimeter Wave (mmWave) communications with full-duplex (FD) have the
potential of increasing the spectral efficiency, relative to those with
half-duplex. However, the residual self-interference (SI) from FD and high
pathloss inherent to mmWave signals may degrade the system performance.
Meanwhile, hybrid beamforming (HBF) is an efficient technology to enhance the
channel gain and mitigate interference with reasonable complexity. However,
conventional HBF approaches for FD mmWave systems are based on optimization
processes, which are either too complex or strongly rely on the quality of
channel state information (CSI). We propose two learning schemes to design HBF
for FD mmWave systems, i.e., extreme learning machine based HBF (ELM-HBF) and
convolutional neural networks based HBF (CNN-HBF). Specifically, we first
propose an alternating direction method of multipliers (ADMM) based algorithm
to achieve SI cancellation beamforming, and then use a
majorization-minimization (MM) based algorithm for joint transmitting and
receiving HBF optimization. To train the learning networks, we simulate noisy
channels as input, and select the hybrid beamformers calculated by proposed
algorithms as targets. Results show that both learning based schemes can
provide more robust HBF performance and achieve at least 22.1% higher spectral
efficiency compared to orthogonal matching pursuit (OMP) algorithms. Besides,
the online prediction time of proposed learning based schemes is almost 20
times faster than the OMP scheme. Furthermore, the training time of ELM-HBF is
about 600 times faster than that of CNN-HBF with 64 transmitting and receiving
antennas.
| Full-duplex systems are expected to achieve 100% rate improvement over
half-duplex systems if the self-interference signal can be significantly
mitigated. In this paper, we propose the first full-duplex system utilizing
Multi-Reconfigurable Antenna (MRA) with ?90% rate improvement compared to
half-duplex systems. MRA is a dynamically reconfigurable antenna structure,
that is capable of changing its properties according to certain input
configurations. A comprehensive experimental analysis is conducted to
characterize the system performance in typical indoor environments. The
experiments are performed using a fabricated MRA that has 4096 configurable
radiation patterns. The achieved MRA-based passive self-interference
suppression is investigated, with detailed analysis for the MRA training
overhead. In addition, a heuristic-based approach is proposed to reduce the MRA
training overhead. The results show that at 1% training overhead, a total of
95dB self-interference cancellation is achieved in typical indoor environments.
The 95dB self-interference cancellation is experimentally shown to be
sufficient for 90% full-duplex rate improvement compared to half-duplex
systems.
| 0.872868 | 0.773691 | 0.099177 |
2004.08286 | Greenhouse Gas Emission Prediction on Road Network using Deep Sequence
Learning | Mitigating the substantial undesirable impact of transportation systems on
the environment is paramount. Thus, predicting Greenhouse Gas (GHG) emissions
is one of the profound topics, especially with the emergence of intelligent
transportation systems (ITS). We develop a deep learning framework to predict
link-level GHG emission rate (ER) (in CO2eq gram/second) based on the most
representative predictors, such as speed, density, and the GHG ER of previous
time steps. In particular, various specifications of the long-short term memory
(LSTM) networks with exogenous variables are examined and compared with
clustering and the autoregressive integrated moving average (ARIMA) model with
exogenous variables. The downtown Toronto road network is used as the case
study and highly detailed data are synthesized using a calibrated traffic
microsimulation and MOVES. It is found that LSTM specification with speed,
density, GHG ER, and in-links speed from three previous minutes performs the
best while adopting 2 hidden layers and when the hyper-parameters are
systematically tuned. Adopting a 30 second updating interval improves slightly
the correlation between true and predicted GHG ERs, but contributes negatively
to the prediction accuracy as reflected on the increased root mean square error
(RMSE) value. Efficiently predicting GHG emissions at a higher frequency with
lower data requirements will pave the way to non-myopic eco-routing on
large-scale road networks {to alleviate the adverse impact on the global
warming
| Dyna-style reinforcement learning is a powerful approach for problems where
not much real data is available. The main idea is to supplement real
trajectories, or sequences of sampled states over time, with simulated ones
sampled from a learned model of the environment. However, in large state
spaces, the problem of learning a good generative model of the environment has
been open so far. We propose to use deep belief networks to learn an
environment model for use in Dyna. We present our approach and validate it
empirically on problems where the state observations consist of images. Our
results demonstrate that using deep belief networks, which are full generative
models, significantly outperforms the use of linear expectation models,
proposed in Sutton et al. (2008)
| 0.886271 | 0.722838 | 0.163433 |
2004.08287 | Deep Neural Network for Respiratory Sound Classification in Wearable
Devices Enabled by Patient Specific Model Tuning | The primary objective of this paper is to build classification models and
strategies to identify breathing sound anomalies (wheeze, crackle) for
automated diagnosis of respiratory and pulmonary diseases. In this work we
propose a deep CNN-RNN model that classifies respiratory sounds based on
Mel-spectrograms. We also implement a patient specific model tuning strategy
that first screens respiratory patients and then builds patient specific
classification models using limited patient data for reliable anomaly
detection. Moreover, we devise a local log quantization strategy for model
weights to reduce the memory footprint for deployment in memory constrained
systems such as wearable devices. The proposed hybrid CNN-RNN model achieves a
score of 66.31% on four-class classification of breathing cycles for ICBHI'17
scientific challenge respiratory sound database. When the model is re-trained
with patient specific data, it produces a score of 71.81% for leave-one-out
validation. The proposed weight quantization technique achieves ~4X reduction
in total memory cost without loss of performance. The main contribution of the
paper is as follows: Firstly, the proposed model is able to achieve state of
the art score on the ICBHI'17 dataset. Secondly, deep learning models are shown
to successfully learn domain specific knowledge when pre-trained with breathing
data and produce significantly superior performance compared to generalized
models. Finally, local log quantization of trained weights is shown to be able
to reduce the memory requirement significantly. This type of patient-specific
re-training strategy can be very useful in developing reliable long-term
automated patient monitoring systems particularly in wearable healthcare
solutions.
| In this work, we aim to realize a method for embedding human knowledge into
deep neural networks. While the conventional method to embed human knowledge
has been applied for non-deep machine learning, it is challenging to apply it
for deep learning models due to the enormous number of model parameters. To
tackle this problem, we focus on the attention mechanism of an attention branch
network (ABN). In this paper, we propose a fine-tuning method that utilizes a
single-channel attention map which is manually edited by a human expert. Our
fine-tuning method can train a network so that the output attention map
corresponds to the edited ones. As a result, the fine-tuned network can output
an attention map that takes into account human knowledge. Experimental results
with ImageNet, CUB-200-2010, and IDRiD demonstrate that it is possible to
obtain a clear attention map for a visual explanation and improve the
classification performance. Our findings can be a novel framework for
optimizing networks through human intuitive editing via a visual interface and
suggest new possibilities for human-machine cooperation in addition to the
improvement of visual explanations.
| 0.882055 | 0.647882 | 0.234173 |
2004.08288 | A data driven analysis and forecast of an SEIARD epidemic model for
COVID-19 in Mexico | We propose an SEIARD mathematical model to investigate the current outbreak
of coronavirus disease (COVID-19) in Mexico. We conduct a detailed analysis of
this model and demonstrate its application using publicly reported data. We
calculate the basic reproduction number ($R_0$) via the next-generation matrix
method, and we estimate the per day infection, death and recovery rates. We
calibrate the parameters of the SEIARD model to the reported data by minimizing
the sum of squared errors and attempt to forecast the evolution of the outbreak
until June 2020. Our results estimate that the peak of the epidemic in Mexico
will be around May 2, 2020. Our model incorporates the importance of
considering the aysmptomatic infected individuals, because they represent the
majority of the infected population (with symptoms or not) and they could play
a huge role in spreading the virus without any knowledge.
| We study epidemic forecasting on real-world health data by a graph-structured
recurrent neural network (GSRNN). We achieve state-of-the-art forecasting
accuracy on the benchmark CDC dataset. To improve model efficiency, we sparsify
the network weights via transformed-$\ell_1$ penalty and maintain prediction
accuracy at the same level with 70% of the network weights being zero.
| 0.931686 | 0.731364 | 0.200322 |
2004.08289 | Disentangled Adversarial Transfer Learning for Physiological Biosignals | Recent developments in wearable sensors demonstrate promising results for
monitoring physiological status in effective and comfortable ways. One major
challenge of physiological status assessment is the problem of transfer
learning caused by the domain inconsistency of biosignals across users or
different recording sessions from the same user. We propose an adversarial
inference approach for transfer learning to extract disentangled
nuisance-robust representations from physiological biosignal data in stress
status level assessment. We exploit the trade-off between task-related features
and person-discriminative information by using both an adversary network and a
nuisance network to jointly manipulate and disentangle the learned latent
representations by the encoder, which are then input to a discriminative
classifier. Results on cross-subjects transfer evaluations demonstrate the
benefits of the proposed adversarial framework, and thus show its capabilities
to adapt to a broader range of subjects. Finally we highlight that our proposed
adversarial transfer learning approach is also applicable to other deep feature
learning frameworks.
| Neural networks are known to be vulnerable to carefully crafted adversarial
examples, and these malicious samples often transfer, i.e., they maintain their
effectiveness even against other models. With great efforts delved into the
transferability of adversarial examples, surprisingly, less attention has been
paid to its impact on real-world deep learning deployment. In this paper, we
investigate the transferability of adversarial examples across a wide range of
real-world computer vision tasks, including image classification, explicit
content detection, optical character recognition (OCR), and object detection.
It represents the cybercriminal's situation where an ensemble of different
detection mechanisms need to be evaded all at once. We propose practical attack
that overcomes existing attacks' limitation of requiring task-specific loss
functions by targeting on the `dispersion' of internal feature map. We report
evaluation on four different computer vision tasks provided by Google Cloud
Vision APIs to show how our approach outperforms existing attacks by degrading
performance of multiple CV tasks by a large margin with only modest
perturbations.
| 0.892304 | 0.720601 | 0.171703 |
2004.08290 | Empirical Study of Market Impact Conditional on Order-Flow Imbalance | In this research we have empirically investigated the key drivers affecting
liquidity in equity markets. We illustrated how theoretical models, such as
Kyle's model, of agents' interplay in the financial markets, are aligned with
the phenomena observed in publicly available trades and quotes data.
Specifically, we confirmed that for small signed order-flows, the price impact
grows linearly with increase in the order-flow imbalance. We have, further,
implemented a machine learning algorithm to forecast market impact given a
signed order-flow. Our findings suggest that machine learning models can be
used in estimation of financial variables; and predictive accuracy of such
learning algorithms can surpass the performance of traditional statistical
approaches.
Understanding the determinants of price impact is crucial for several
reasons. From a theoretical stance, modelling the impact provides a statistical
measure of liquidity. Practitioners adopt impact models as a pre-trade tool to
estimate expected transaction costs and optimize the execution of their
strategies. This further serves as a post-trade valuation benchmark as
suboptimal execution can significantly deteriorate a portfolio performance.
More broadly, the price impact reflects the balance of liquidity across
markets. This is of central importance to regulators as it provides an
all-encompassing explanation of the correlation between market design and
systemic risk, enabling regulators to design more stable and efficient markets.
| We consider a network of prosumers involved in peer-to-peer energy exchanges,
with differentiation price preferences on the trades with their neighbors, and
we analyze two market designs: (i) a centralized market, used as a benchmark,
where a global market operator optimizes the flows (trades) between the nodes,
local demand and flexibility activation to maximize the system overall social
welfare; (ii) a distributed peer-to-peer market design where prosumers in local
energy communities optimize selfishly their trades, demand, and flexibility
activation. We first characterizethe solution of the peer-to-peer market as a
Variational Equilibrium and prove that the set of Variational Equilibria
coincides with the set of social welfare optimal solutions of market design
(i). We give several results that help understanding the structure of the
trades at an equilibriumor at the optimum. We characterize the impact of
preferences on the network line congestion and renewable energy waste under
both designs. We provide a reduced example for which we give the set of all
possible generalized equilibria, which enables to give an approximation of the
price ofanarchy. We provide a more realistic example which relies on the IEEE
14-bus network, for which we can simulate the trades under different preference
prices. Our analysis shows in particular that the preferences have a large
impact on the structure of the trades, but that one equilibrium(variational) is
optimal.
| 0.80828 | 0.662156 | 0.146124 |
2004.08292 | Boson and neutron stars with increased density | We discuss boson stars and neutron stars, respectively, in a scalar-tensor
gravity model with an explicitly time-dependent real scalar field. While the
boson stars in our model - in contrast to the neutron stars - do not possess a
hard core, we find that the qualitative effects of the scalarization are
similar in both cases : the presence of the gravity scalar allows both type of
stars to exist for larger central density as well as larger mass at given
radius than their General Relativity counterparts. In particular, we find new
types of scalarized neutron stars which have radii very close to the
corresponding Schwarzschild radius and hence are comparable in density to black
holes.
| The observable macroscopic properties of relativistic stars (whose equations
of state are known) can be predicted by solving the stellar structure equations
that follow from Einstein's equation. For neutron stars, however, our knowledge
of the equation of state is poor, so the direct stellar structure problem can
not be solved without modeling the highest density part of the equation of
state in some way. This talk will describe recent work on developing a model
independent approach to determining the high-density neutron-star equation of
state by solving an inverse stellar structure problem. This method uses the
fact that Einstein's equation provides a deterministic relationship between the
equation of state and the macroscopic observables of the stars which are
composed of that material. This talk illustrates how this method will be able
to determine the high-density part of the neutron-star equation of state with
few percent accuracy when high quality measurements of the masses and radii of
just two or three neutron stars become available. This talk will also show that
this method can be used with measurements of other macroscopic observables,
like the masses and tidal deformabilities, which can (in principle) be measured
by gravitational wave observations of binary neutron-star mergers.
| 0.831407 | 0.776577 | 0.05483 |
2004.08293 | Quarkyonic Matter Equation of State in Beta-Equilibrium | Quark matter may appear due to a hadronic-quark transition in the core of a
hybrid star. Quarkyonic matter is an approach in which both quarks and nucleons
appear as quasi-particles in a crossover transition, and provides an explicit
realization of early ideas concerning quark matter (e.g., the MIT bag model).
This description has recently been employed by McLerran and Reddy to model
chargeless (pure neutron) matter with an approach that has the virtue that the
speed of sound rises quickly at a neutron-quark transition so as to satisfy
observational constraints on the neutron star maximum mass ($\gtrsim2M_\odot$)
and the radius of a $1.4M_\odot$ star ($R_{1.4}\lesssim 13.5$ km). Traditional
models involving first-order transitions result in softer pressure-energy
density relations that have difficulty satisfying these constraints except with
very narrow choices of parameters. We propose a variation of quarkyonic matter
involving protons and leptons whose energy can be explicitly minimized to
achieve both chemical and beta equilibrium, which cannot be done in the
chargeless formulation. Quarkyonic stellar models are able to satisfy observed
mass and radius constraints with a wide range of model parameters, avoiding the
obligatory fine-tuning of conventional hybrid star models, including requiring
the transition density to be very close to the nuclear saturation density. Our
formulation fits experimental and theoretical properties of the nuclear
symmetry energy and pure neutron matter, and contains as few as three free
parameters. This makes it an ideal tool for the study of high-density matter
that is an efficient alternative to piecewise polytrope or spectral
decomposition methods.
| The recent discoveries of massive neutron stars, such as PSR J$0348+0432$ and
PSR J$1614-2230$, have raised questions about the existence of exotic matter
such as hyperons in the neutron star core. The validity of many established
equations of states (EoS's) like the GM1 and FSUGold are also questioned. We
investigate the existence of hyperonic matter in the central regions of massive
neutron stars using Relativistic Mean Field (RMF) theory with the recently
proposed IUFSU model. The IUFSU model is extended by including hyperons to
study the neutron star in $\beta$ equilibrium. The effect of different
hyperonic potentials, namely $\Sigma$ and $\Xi$ potentials, on the EoS and
hence the maximum mass of neutron stars has been studied. We have also
considered the effect of stellar rotation since the observed massive stars are
pulsars.
It has been found that a maximum mass of $1.93M_{\odot}$, which is within the
3$\sigma$ limit of the observed mass of PSR J$0348+0432$, can be obtained for
rotating stars, with certain choices of the hyperonic potentials. The said star
contains a fair amount of hyperons near the core.
| 0.831987 | 0.718532 | 0.113455 |
2004.08294 | Dimension of Restricted Classes of Interval Orders | Rabinovitch showed in 1978 that the interval orders having a representation
consisting of only closed unit intervals have order dimension at most 3. This
article shows that the same dimension bound applies to two other classes of
posets: those having a representation consisting of unit intervals (but with a
mixture of open and closed intervals allowed) and those having a representation
consisting of closed intervals with lengths in $\{0,1\}$.
| We use relations in the tautological ring of the moduli spaces
$\overline{\mathcal{M}}_{g,n}$ derived by Pandharipande, Pixton, and Zvonkine
from the Givental formula for the $r$-spin Witten class in order to obtain some
restrictions on the dimensions of the tautological rings of the open moduli
spaces $\mathcal{M}_{g,n}$. In particular, we give a new proof for the result
of Looijenga (for $n=1$) and Buryak et al. (for $n\geq 2$) that $\dim
R^{g-1}(\mathcal{M}_{g,n}) \leq n$. We also give a new proof of the result of
Looijenga (for $n=1$) and Ionel (for arbitrary $n\geq 1$) that
$R^{i}(\mathcal{M}_{g,n}) =0$ for $i\geq g$ and give some estimates for the
dimension of $R^{i}(\mathcal{M}_{g,n})$ for $i\leq g-2$.
| 0.844682 | 0.651019 | 0.193663 |
2004.08295 | Self-Duality in the Context of the Skyrme Model | We study a recently proposed modification of the Skyrme model that possesses
an exact self-dual sector leading to an infinity of exact Skyrmion solutions
with arbitrary topological (baryon) charge. The self-dual sector is made
possible by the introduction, in addition to the usual three SU(2) Skyrme
fields, of six scalar fields assembled in a symmetric and invertible three
dimensional matrix h. The action presents quadratic and quartic terms in
derivatives of the Skyrme fields, but instead of the group indices being
contracted by the SU(2) Killing form, they are contracted with the h-matrix in
the quadratic term, and by its inverse on the quartic term. Due to these extra
fields the static version of the model, as well as its self-duality equations,
are conformally invariant on the three dimensional space R^3. We show that the
static and self-dual sectors of such a theory are equivalent, and so the only
non-self-dual solution must be time dependent. We also show that for any
configuration of the Skyrme SU(2) fields, the h-fields adjust themselves to
satisfy the self-duality equations, and so the theory has plenty of non-trivial
topological solutions. We present explicit exact solutions using a holomorphic
rational ansatz, as well as a toroidal ansatz based on the conformal symmetry.
We point to possible extensions of the model that break the conformal symmetry
as well as the self-dual sector, and that can perhaps lead to interesting
physical applications.
| It is technically difficult (if not impossible) to write down and solve
self-consistently the semiclassical Einstein equations in the case of
evaporating black holes. These difficulties can in principle be overcome in an
apparently very different context, the Randall-Sundrum braneworld models in
Anti-de Sitter space. Use of Maldacena's AdS/CFT correspondence led us to
formulate a holographic conjecture for black holes localised on a brane, for
which 4D quantum corrected black holes are dual to classical 5D black holes.
This duality is applied to the computation of the correction to the newtonian
potential on the brane, with new results on the semiclassical side, and a
prediction about the existence of static large mass braneworld black holes is
made.
| 0.833937 | 0.665379 | 0.168558 |
2004.08296 | Directional Anisotropy of the Vibrational Modes in 2D Layered
Perovskites | The vibrational modes in organic/inorganic layered perovskites are of
fundamental importance for their optoelectronic properties. The hierarchical
architecture of the Ruddlesden-Popper phase of these materials allows for
distinct directionality of the vibrational modes withrespect to the main axes
of the pseudocubic lattice in the octahedral plane. Here, we study the
directionality of the fundamental phonon modes in single exfoliated
Ruddlesden-Popper perovskite flakes with polarized Raman spectroscopy at
ultralow-frequencies. A wealth of Raman bands is distinguished in the range
from 15-150 cm-1 (2-15 meV), whose features depend on the organic cation
species, on temperature, and on the direction of the linear polarization of the
incident light. By controlling the angle of the linear polarization of the
excitation laser with respect to the in-plane axes of the octahedral layer, we
gain detailed information on the symmetry of the vibrational modes. The choice
of two different organic moieties, phenethylammonium (PEA) and butylammonium
(BA) allows to discern the influence of the linker molecules, evidencing strong
anisotropy of the vibrations for the (PEA)2PbBr4 samples. Temperature dependent
Raman measurements reveal that the broad phonon bands observed at room
temperature consist of a series of sharp modes, and that such mode splitting
strongly differs for the different organic moieties and vibrational bands.
| We use computational and experimental methods to study d0 ferromagnetism at a
charge- imbalanced interface between two perovskites. In SrTiO3/KTaO3
superlattice calculations, the charge imbalance introduces holes in the SrTiO3
layer, inducing a d0 ferromagnetic half-metallic 2D electron gas at the
interface oxygen 2p orbitals. The charge imbalance overrides doping by
vacancies at realistic concentrations. Varying the constituent materials shows
ferromagnetism to be a gen- eral property of hole-type d0 perovskite
interfaces. Atomically sharp epitaxial d0 SrTiO3/KTaO3, SrTiO3 /KNbO3 and
SrTiO3 /NaNbO3 interfaces are found to exhibit ferromagnetic hysteresis at room
temperature. We suggest the behavior is due to high density of states and
exchange coupling at the oxygen t1g band in comparison with the more studied d
band t2g symmetry electron gas.
| 0.876118 | 0.742753 | 0.133364 |
2004.08297 | Towards data-driven stroke rehabilitation via wearable sensors and deep
learning | Recovery after stroke is often incomplete, but rehabilitation training may
potentiate recovery by engaging endogenous neuroplasticity. In preclinical
models of stroke, high doses of rehabilitation training are required to restore
functional movement to the affected limbs of animals. In humans, however, the
necessary dose of training to potentiate recovery is not known. This ignorance
stems from the lack of objective, pragmatic approaches for measuring training
doses in rehabilitation activities. Here, to develop a measurement approach, we
took the critical first step of automatically identifying functional
primitives, the basic building block of activities. Forty-eight individuals
with chronic stroke performed a variety of rehabilitation activities while
wearing inertial measurement units (IMUs) to capture upper body motion.
Primitives were identified by human labelers, who labeled and segmented the
associated IMU data. We performed automatic classification of these primitives
using machine learning. We designed a convolutional neural network model that
outperformed existing methods. The model includes an initial module to compute
separate embeddings of different physical quantities in the sensor data. In
addition, it replaces batch normalization (which performs normalization based
on statistics computed from the training data) with instance normalization
(which uses statistics computed from the test data). This increases robustness
to possible distributional shifts when applying the method to new patients.
With this approach, we attained an average classification accuracy of 70%.
Thus, using a combination of IMU-based motion capture and deep learning, we
were able to identify primitives automatically. This approach builds towards
objectively-measured rehabilitation training, enabling the identification and
counting of functional primitives that accrues to a training dose.
| In this paper we prove the existence of a fundamental trade-off between
accuracy and robustness in perception-based control, where control decisions
rely solely on data-driven, and often incompletely trained, perception maps. In
particular, we consider a control problem where the state of the system is
estimated from measurements extracted from a high-dimensional sensor, such as a
camera. We assume that a map between the camera's readings and the state of the
system has been learned from a set of training data of finite size, from which
the noise statistics are also estimated. We show that algorithms that maximize
the estimation accuracy (as measured by the mean squared error) using the
learned perception map tend to perform poorly in practice, where the sensor's
statistics often differ from the learned ones. Conversely, increasing the
variability and size of the training data leads to robust performance, however
limiting the estimation accuracy, and thus the control performance, in nominal
conditions. Ultimately, our work proves the existence and the implications of a
fundamental trade-off between accuracy and robustness in perception-based
control, which, more generally, affects a large class of machine learning and
data-driven algorithms.
| 0.823914 | 0.655185 | 0.168729 |
2004.08298 | IDDA: a large-scale multi-domain dataset for autonomous driving | Semantic segmentation is key in autonomous driving. Using deep visual
learning architectures is not trivial in this context, because of the
challenges in creating suitable large scale annotated datasets. This issue has
been traditionally circumvented through the use of synthetic datasets, that
have become a popular resource in this field. They have been released with the
need to develop semantic segmentation algorithms able to close the visual
domain shift between the training and test data. Although exacerbated by the
use of artificial data, the problem is extremely relevant in this field even
when training on real data. Indeed, weather conditions, viewpoint changes and
variations in the city appearances can vary considerably from car to car, and
even at test time for a single, specific vehicle. How to deal with domain
adaptation in semantic segmentation, and how to leverage effectively several
different data distributions (source domains) are important research questions
in this field. To support work in this direction, this paper contributes a new
large scale, synthetic dataset for semantic segmentation with more than 100
different source visual domains. The dataset has been created to explicitly
address the challenges of domain shift between training and test data in
various weather and view point conditions, in seven different city types.
Extensive benchmark experiments assess the dataset, showcasing open challenges
for the current state of the art. The dataset will be available at:
https://idda-dataset.github.io/home/ .
| Adversarial adaptation models have demonstrated significant progress towards
transferring knowledge from a labeled source dataset to an unlabeled target
dataset. Partial domain adaptation (PDA) investigates the scenarios in which
the source domain is large and diverse, and the target label space is a subset
of the source label space. The main purpose of PDA is to identify the shared
classes between the domains and promote learning transferable knowledge from
these classes. In this paper, we propose a multi-class adversarial architecture
for PDA. The proposed approach jointly aligns the marginal and
class-conditional distributions in the shared label space by minimaxing a novel
multi-class adversarial loss function. Furthermore, we incorporate effective
regularization terms to encourage selecting the most relevant subset of source
domain classes. In the absence of target labels, the proposed approach is able
to effectively learn domain-invariant feature representations, which in turn
can enhance the classification performance in the target domain. Comprehensive
experiments on three benchmark datasets Office-31, Office-Home, and
Caltech-Office corroborate the effectiveness of the proposed approach in
addressing different partial transfer learning tasks.
| 0.829921 | 0.691336 | 0.138585 |
2004.08299 | DSTC8-AVSD: Multimodal Semantic Transformer Network with Retrieval Style
Word Generator | Audio Visual Scene-aware Dialog (AVSD) is the task of generating a response
for a question with a given scene, video, audio, and the history of previous
turns in the dialog. Existing systems for this task employ the transformers or
recurrent neural network-based architecture with the encoder-decoder framework.
Even though these techniques show superior performance for this task, they have
significant limitations: the model easily overfits only to memorize the
grammatical patterns; the model follows the prior distribution of the
vocabularies in a dataset. To alleviate the problems, we propose a Multimodal
Semantic Transformer Network. It employs a transformer-based architecture with
an attention-based word embedding layer that generates words by querying word
embeddings. With this design, our model keeps considering the meaning of the
words at the generation stage. The empirical results demonstrate the
superiority of our proposed model that outperforms most of the previous works
for the AVSD task.
| Keyphrase extraction from documents is useful to a variety of applications
such as information retrieval and document summarization. This paper presents
an end-to-end method called DivGraphPointer for extracting a set of diversified
keyphrases from a document. DivGraphPointer combines the advantages of
traditional graph-based ranking methods and recent neural network-based
approaches. Specifically, given a document, a word graph is constructed from
the document based on word proximity and is encoded with graph convolutional
networks, which effectively capture document-level word salience by modeling
long-range dependency between words in the document and aggregating multiple
appearances of identical words into one node. Furthermore, we propose a
diversified point network to generate a set of diverse keyphrases out of the
word graph in the decoding process. Experimental results on five benchmark data
sets show that our proposed method significantly outperforms the existing
state-of-the-art approaches.
| 0.834193 | 0.714008 | 0.120186 |
2004.08300 | Thermodynamic signatures of an antiferromagnetic quantum critical point
inside a superconducting dome | Recent experiments in unconventional superconductors, and in particular
iron-based materials, have reported evidence of an antiferromagnetic quantum
critical point (AFM-QCP) emerging inside the superconducting dome of the phase
diagram. Fluctuations associated with such an AFM-QCP are expected to promote
unusual temperature dependencies of thermodynamic quantities. Here, we compute
the $T$ dependence of the specific heat $C(T)$ deep inside a fully gapped
$s^{+-}$ superconducting state as the AFM-QCP is approached. We find that, at
the AFM-QCP, the specific heat $C(T)$ vanishes quadratically with temperature,
as opposed to the typical exponential suppression seen in fully-gapped BCS
superconductors. This robust result is due to a non-analytic contribution to
the free-energy arising from the general form of the bosonic (AFM) propagator
in the SC state. Away from the AFM-QCP, as temperature is lowered, $C(T)$ shows
a crossover from a $T^2$ behavior to an exponential behavior, with the
crossover temperature scale set by the value of the superconducting gap and the
distance to the QCP. We argue that these features in the specific heat can be
used to unambiguously determine the existence of AFM-QCPs inside the
superconducting domes of iron-based and other fully gapped unconventional
superconductors.
| Strongly correlated electron systems at the border of magnetism are of active
current interest, particularly because the accompanying quantum criticality
provides a route towards both strange-metal non-Fermi liquid behavior and
unconventional superconductivity. Among the many important questions is whether
the magnetism acts simply as a source of fluctuations in the textbook Landau
framework, or instead serves as a proxy for some unexpected new physics. We put
into this general context the recent developments on quantum phase transitions
in antiferromagnetic heavy fermion metals. Among these are the extensive recent
theoretical and experimental studies on the physics of Kondo destruction in a
class of beyond-Landau quantum critical points. Also discussed are the
theoretical basis for a global phase diagram of antiferromagnetic heavy fermion
metals, and the recent surge of materials suitable for studying this phase
diagram. Furthermore, we address the generalization of this global phase
diagram to the case of Kondo insulators, and consider the future prospect to
study the interplay among Kondo coherence, magnetism and topological states.
Finally, we touch upon related issues beyond the antiferromagnetic settings,
arising in mixed valent, ferromagnetic, quadrupolar, or spin glass f-electron
systems, as well as some general issues on emergent phases near quantum
critical points.
| 0.850974 | 0.788742 | 0.062232 |
2004.08301 | Belief Propagation for Maximum Coverage on Weighted Bipartite Graph and
Application to Text Summarization | We study text summarization from the viewpoint of maximum coverage problem.
In graph theory, the task of text summarization is regarded as maximum coverage
problem on bipartite graph with weighted nodes. In recent study,
belief-propagation based algorithm for maximum coverage on unweighted graph was
proposed using the idea of statistical mechanics. We generalize it to weighted
graph for text summarization. Then we apply our algorithm to weighted biregular
random graph for verification of maximum coverage performance. We also apply it
to bipartite graph representing real document in open text dataset, and check
the performance of text summarization. As a result, our algorithm exhibits
better performance than greedy-type algorithm in some setting of text
summarization.
| We prove the following estimate for the spectrum of the normalized Laplace
operator $\Delta$ on a finite graph $G$, \begin{equation*}1- (1-
k[t])^{\frac{1}{t}}\leq \lambda_1 \leq \cdots \leq \lambda_{N-1}\leq 1+ (1-
k[t])^{\frac{1}{t}}, \,\forall \,\,\text{integers}\,\, t\geq 1. \end{equation*}
Here $k[t]$ is a lower bound for the Ollivier-Ricci curvature on the
neighborhood graph $G[t]$, which was introduced by Bauer-Jost. In particular,
when $t=1$ this is Ollivier's estimates $k\leq \lambda_1\leq \ldots \leq
\lambda_{N-1}\leq 2-k$. For sufficiently large $t$ we show that, unless $G$ is
bipartite, our estimates for $\lambda_1$ and $\lambda_{N-1}$ are always
nontrivial and improve Ollivier's estimates for all graphs with $k\leq 0$. By
definition neighborhood graphs are weighted graphs which may have loops. To
understand the Ollivier-Ricci curvature on neighborhood graphs, we generalize a
sharp estimate of the Ricci curvature given by Jost-Liu to weighted graphs with
loops and relate it to the relative local frequency of triangles and loops.
| 0.944159 | 0.650624 | 0.293535 |
2004.08302 | IMRPhenomTP: A phenomenological time domain model for dominant
quadrupole gravitational wave signal of coalescing binary black holes | In this work we present IMRPhenomTP, a time domain phenomenological model for
the dominant $l=2$, $m=|2|$ modes of coalescing black hole binary systems and
its extension to describe general precessing systems within the "twisting up"
approximation. The underlying non-precessing model is calibrated to the new
release of Numerical Relativity simulations of the SXS Collaboration and its
accuracy is comparable to the state-of-the-art non-precessing dominant mode
models as IMRPhenomX and SEOBNRv4. The precessing extension allows for
flexibility choosing the Euler angles of the time-dependent rotation between
the co-precessing and the inertial reference systems, including the single spin
NNLO and the double spin MSA PN descriptions present in other models, numerical
integration of the orbit averaged spin evolution equations, different choices
for the evolution of the orbital angular momentum norm and a simple
approximation to the ringdown behaviour.
| We investigate the expected gravitational wave emission from coalescing
supermassive black hole (SMBH) binaries resulting from mergers of their host
galaxies. We employ a semi-analytic model of galaxy and quasar formation based
on the hierarchical clustering scenario to estimate the amplitude of the
expected stochastic gravitational wave background owing to inspiraling SMBH
binaries and bursts rates owing to the SMBH binary coalescence events. We find
that the characteristic strain amplitude of the background radiation is $h_c(f)
\sim 10^{-16} (f/1 \mu {\rm Hz})^{-2/3}$ for $f \lesssim 1 \mu {\rm Hz}$. The
main contribution to the total strain amplitude of the background radiation
comes from SMBH coalescence events at $0<z<1$. We also find that a future
space-based gravitational wave interferometer such as the planned \textit{Laser
Interferometer Space Antenna} ({\sl LISA}) might detect intense gravitational
wave bursts associated with coalescence of SMBH binaries with total mass
$M_{\rm tot} < 10^7 M_{\odot}$ at $z \gtrsim 2$ at a rate $ \sim 1.0 {\rm
yr}^{-1}$. Our model predicts that burst signals with a larger amplitude
$h_{\rm burst} \sim 10^{-15}$ correspond to coalescence events of massive SMBH
binary with total mass $M_{\rm tot} \sim 10^8 M_{\odot}$ at low redshift $ z
\lesssim 1$ at a rate $ \sim 0.1 {\rm yr}^{-1}$ whereas those with a smaller
amplitude $h_{\rm burst} \sim 10^{-17}$ correspond to coalescence events of
less massive SMBH binary with total mass $M_{\rm tot} \sim 10^6 M_{\odot}$ at
high redshift $ z \gtrsim 3$.
| 0.858585 | 0.784905 | 0.07368 |
2004.08303 | Canonical Maps of general Hypersurfaces in Abelian Varieties | The main theorem of this paper is that, for a general pair $(A,X)$ of an
(ample) Hypersurface $X$ in an Abelian Variety $A$, the canonical map $\Phi_X$
of $X$ is birational onto its image if the polarization given by $X$ is not
principal (i.e., its Pfaffian $d$ is not equal to $1$).
We also show that, setting $g = dim (A)$, and letting $d$ be the Pfaffian of
the polarization given by $X$, then if $X$ is smooth and $$\Phi_X : X
\rightarrow \mathbb{P}^{N:=g+d-2}$$ is an embedding, then necessarily we have
the inequality $ d \geq g + 1$, equivalent to $N : = g+d-2 \geq 2 \ dim(X) +
1.$
We also formulate the following interesting conjecture: if $ d \geq g + 1,$
then, for a general pair $(A,X)$, $\Phi_X$ is an embedding.
| We study orbits for rational equivalence of zero-cycles on very general
abelian varieties by adapting a method of Voisin to powers of abelian
varieties. We deduce that, for $k$ at least $3$, a very general abelian variety
of dimension at least $2k-2$ has covering gonality greater than $k$. This
settles a conjecture of Voisin. We also discuss how upper bounds for the
dimension of orbits for rational equivalence can be used to provide new lower
bounds on other measures of irrationality. In particular, we obtain a
strengthening of the Alzati-Pirola bound on the degree of irrationality of
abelian varieties.
| 0.86341 | 0.815694 | 0.047715 |
2004.08304 | Travelling wave solutions on a non-zero background for the generalized
Korteweg-de Vries equation | For the generalized $p$-power Korteweg-de Vries equation, all non-periodic
travelling wave solutions with non-zero boundary conditions are explicitly
classified for all integer powers $p\geq 1$. These solutions are shown to
consist of: bright solitary waves and static humps on a non-zero background for
odd $p$; dark solitary waves on a non-zero background and kink waves for even
$p$ in the defocusing case; pairs of bright/dark solitary waves on a non-zero
background, and also bright and dark heavy-tail waves (with power decay) on a
non-zero background, for even $p$ in the focusing case. An explicit physical
parameterization is given for each type of solutionin terms of the wave speed
$c$, background size $b$, and wave height/depth $h$. The allowed kinematic
region in $(c,b)$ as well as in $(h,b)$ for existence of the solutions is
derived, and other main kinematic features are discussed. Explicit formulas are
presented in the integrable cases $p=1,2$, and in the higher power cases
$p=3,4$.
| We consider the compressive wave for the modified Korteweg--de Vries equation
with background constants $c>0$ for $x\to-\infty$ and $0$ for $x\to+\infty.$ We
study the asymptotics of solutions in the transition zone $4c^2t-\varepsilon
t<x<4c^2t-\beta t^{\sigma}\ln t$ for $\varepsilon>0,$ $\sigma\in(0,1),$
$\beta>0.$ In this region we have a bulk of nonvanishing oscillations, the
number of which grows as $\frac{\varepsilon t}{\ln t}.$ Also we show how to
obtain Khruslov--Kotlyarov's asymptotics in the domain $4c^2t-\rho\ln
t<x<4c^2t$ with the help of parametrices constructed out of Laguerre
polynomials in the corresponding Riemann-Hilbert problem.
| 0.878818 | 0.856837 | 0.021981 |
2004.08305 | Symmetries of the Schroedinger-Pauli equation for neutral particles | With using the algebraic approach Lie symmetries of Schr\"odinger equations
with matrix potentials are classified. Thirty three inequivalent equations of
such type together with the related symmetry groups are specified, the
admissible equivalence relations are clearly indicated. In particular the Boyer
results concerning kinematical invariance groups for arbitrary potentials (C.
P. Boyer, Helv. Phys. Acta, {\bf 47}, 450--605 (1974)) are clarified and
corrected.
| The historical Klein-Gordon transformation of complex-valued first-order in
time Schroedinger equations iterates these in a naively straightforward way
which changes them into complex-valued second-order in time equations that have
a plethora of extraneous solutions -- the transformation is an
operator-calculus analogue of the squaring of both sides of an algebraic
equation. The real and imaginary parts of a Schroedinger equation, however, are
well known to be precisely the dynamical equation pair of the real-valued
classical Hamiltonian functional which is numerically equal to the expectation
value of that Schroedinger equation's Hermitian Hamiltonian operator. The
purely real-valued second-order in time Euler-Lagrange equation of the
corresponding classical Lagrangian functional is also isomorphic to that
Schroedinger equation, and for symmetric Hamiltonians has exactly the same
formal appearance as the corresponding naive complex-valued Klein-Gordon
equation, but none of the latter's extraneous solutions. These quantum
Schroedinger-equation isomorphisms to classical Euler-Lagrange equations are
the technical manifestation of a key theoretical aspect of the principle of
complementarity, one which is elegantly illustrated by the isomorphic
free-photon wave-function complement to the vector potential of source-free
classical electrodynamics.
| 0.843376 | 0.815929 | 0.027447 |
2004.08307 | Fast self-testing Quantum Random Number Generator based on homodyne
detection | Self-testing and Semi-Device Independent protocols are becoming the preferred
choice for quantum technologies, being able to certify their quantum nature
with few assumptions and simple experimental implementations. In particular for
Quantum Random Number Generators the possibility of monitoring in real time the
entropy of the source only by measuring the input/output statistics is a
characteristic that no other classical system could provide. The cost of this
new possibility is not necessarily increased complexity and reduced
performance. Indeed, here we show that with a simple optical setup consisting
of commercially available components, a high bit generation rate can be
achieved. We manage to certify 145.5~MHz of quantum random bit generation rate.
| We show that the generation of entanglement of two heavily macroscopic
mirrors with masses of up to several kilograms are feasible with state of the
art techniques of high-precision laser interferometry. The basis of such a
demonstration would be a Michelson interferometer with suspended mirrors and
simultaneous homodyne detections at both interferometer output ports. We
present the connection between the generation of entanglement and the Standard
Quantum Limit (SQL) for a free mass. The SQL is a well-known reference limit in
operating interferometers for gravitational-wave detection and provides a
measure of when macroscopic entanglement can be observed in the presence of
realistic decoherence processes.
| 0.834677 | 0.708637 | 0.12604 |
2004.08308 | Fast tests for probing the causal structure of quantum processes | The identification of causal relations is a cornerstone of the scientific
method. Traditional approaches to this task are based on classical statistics.
However, such classical approaches do not apply in the quantum domain, where a
broader spectrum of causal relations becomes accessible. New approaches to
quantum causal inference have been developed in recent years, and promising new
features have been discovered. In this paper, we review and partly expand the
framework and results of Ref. [1], which demonstrated quantum speedups in the
identification of various types of causal relations induced by 1reversible
processes.
| We study the causality violation in the non-local quantum field theory (as
formulated by Kleppe and Woodard) containing a finite mass scale $\Lambda $. We
use $\phi ^{4}$ theory as a simple model for study. Starting from the
Bogoliubov-Shirkov criterion for causality, we construct and study combinations
of S-matrix elements that signal violation of causality in the one loop
approximation. We find that the causality violation in the exclusive process
$\phi +\phi \to \phi +\phi $ grows with energy, but the growth with energy,
(for low to moderate energies) is suppressed to all orders compared to what one
would expect purely from dimensional considerations. We however find that the
causality violation in other processes such as $\phi +\phi \to \phi +\phi +\phi
+\phi $ grows with energy as expected from dimensional considerations at low to
moderate energies. For high enough energies comparable to the mass scale
$\Lambda $, however, we find a rapid (exponential-like) growth in the degree of
causality violation. We generalize some of the 1-loop results to all orders. We
present interpretations of the results based on possible interpretations of the
non-local quantum field theory models.
| 0.874607 | 0.730753 | 0.143854 |
2004.08309 | Bayesian semiparametric long memory models for discretized event data | We introduce a new class of semiparametric latent variable models for long
memory discretized event data. The proposed methodology is motivated by a study
of bird vocalizations in the Amazon rain forest; the timings of vocalizations
exhibit self-similarity and long range dependence ruling out models based on
Poisson processes. The proposed class of FRActional Probit (FRAP) models is
based on thresholding of a latent process consisting of an additive expansion
of a smooth Gaussian process with a fractional Brownian motion. We develop a
Bayesian approach to inference using Markov chain Monte Carlo, and show good
performance in simulation studies. Applying the methods to the Amazon bird
vocalization data, we find substantial evidence for self-similarity and
non-Markovian/Poisson dynamics. To accommodate the bird vocalization data, in
which there are many different species of birds exhibiting their own
vocalization dynamics, a hierarchical expansion of FRAP is provided in
Supplementary Materials.
| Starting from kicked equations of motion with derivatives of non-integer
orders, we obtain "fractional" discrete maps. These maps are generalizations of
well-known universal, standard, dissipative, kicked damped rotator maps. The
main property of the suggested fractional maps is a long-term memory. The
memory effects in the fractional discrete maps mean that their present state
evolution depends on all past states with special forms of weights. These forms
are represented by combinations of power-law functions.
| 0.808205 | 0.696043 | 0.112162 |
2004.08310 | Composition, Size, and Surface Functionalization dependent Optical
Properties of Lead Bromide Perovskite Nanocrystals | The photoluminescence (PL), color purity, and stability of lead halide
perovskite nanocrystals depend critically on the surface passivation. We
present a study on the temperature dependent PL and PL decay dynamics of lead
bromide perovskite nanocrystals characterized by different types of A cations,
surface ligands, and nanocrystal sizes. Throughout, we observe a single
emission peak from cryogenic to ambient temperature. The PL decay dynamics are
dominated by the surface passivation, and a post-synthesis ligand exchange with
a quaternary ammonium bromide (QAB) results in a more stable passivation over a
larger temperature range. The PL intensity is highest from 50K-250K, which
indicates that the ligand binding competes with the thermal energy at ambient
temperature. Despite the favorable PL dynamics of nanocrystals passivated with
QAB ligands (monoexponential PL decay over a large temperature range, increased
PL intensity and stability), the surface passivation still needs improvement
toward increased emission intensity in nanocrystal films.
| We perform first-principles calculations of wurtzite GaAs nanorods to explore
the factors determining charge distributions in polar nanostructures. We show
that both the direction and magnitude of the dipole moment $\mathbf{d}$ of a
nanorod, and its electic field, depend sensitively on how its surfaces are
terminated and do not depend strongly on the spontaneous polarization of the
underlying lattice. We identify two physical mechanisms by which $\mathbf{d}$
is controlled by the surface termination, and we show that the excess charge on
the nanorod ends is not strongly localized. We discuss the implications of
these results for tuning nanocrystal properties, and for their growth and
assembly.
| 0.891022 | 0.737351 | 0.153671 |
2004.08311 | Finding Small Proofs for Description Logic Entailments: Theory and
Practice (Extended Technical Report) | Logic-based approaches to AI have the advantage that their behaviour can in
principle be explained by providing their users with proofs for the derived
consequences. However, if such proofs get very large, then it may be hard to
understand a consequence even if the individual derivation steps are easy to
comprehend. This motivates our interest in finding small proofs for Description
Logic (DL) entailments. Instead of concentrating on a specific DL and proof
calculus for this DL, we introduce a general framework in which proofs are
represented as labeled, directed hypergraphs, where each hyperedge corresponds
to a single sound derivation step. On the theoretical side, we investigate the
complexity of deciding whether a certain consequence has a proof of size at
most $n$ along the following orthogonal dimensions: (i)~the underlying proof
system is polynomial or exponential; (ii)~proofs may or may not reuse already
derived consequences; and (iii)~the number $n$ is represented in unary or
binary. We have determined the exact worst-case complexity of this decision
problem for all but one of the possible combinations of these options. On the
practical side, we have developed and implemented an approach for generating
proofs for expressive DLs based on a non-standard reasoning task called
forgetting. We have evaluated this approach on a set of realistic ontologies
and compared the obtained proofs with proofs generated by the DL reasoner ELK,
finding that forgetting-based proofs are often better w.r.t. different measures
of proof complexity.
| Recursive relational specifications are commonly used to describe the
computational structure of formal systems. Recent research in proof theory has
identified two features that facilitate direct, logic-based reasoning about
such descriptions: the interpretation of atomic judgments through recursive
definitions and an encoding of binding constructs via generic judgments.
However, logics encompassing these two features do not currently allow for the
definition of relations that embody dynamic aspects related to binding, a
capability needed in many reasoning tasks. We propose a new relation between
terms called nominal abstraction as a means for overcoming this deficiency. We
incorporate nominal abstraction into a rich logic also including definitions,
generic quantification, induction, and co-induction that we then prove to be
consistent. We present examples to show that this logic can provide elegant
treatments of binding contexts that appear in many proofs, such as those
establishing properties of typing calculi and of arbitrarily cascading
substitutions that play a role in reducibility arguments.
| 0.877138 | 0.796122 | 0.081016 |
2004.08312 | Identification of deregulated transcription factors involved in subtypes
of cancers | We propose a methodology for the identification of transcription factors
involved in the deregulation of genes in tumoral cells. This strategy is based
on the inference of a reference gene regulatory network that connects
transcription factors to their downstream targets using gene expression data.
The behavior of genes in tumor samples is then carefully compared to this
network of reference to detect deregulated target genes. A linear model is
finally used to measure the ability of each transcription factor to explain
those deregulations. We assess the performance of our method by numerical
experiments on a breast cancer data set. We show that the information about
deregulation is complementary to the expression data as the combination of the
two improves the supervised classification performance of samples into cancer
subtypes.
| We present a theoretical model of facilitated diffusion of proteins in the
cell nucleus. This model, which takes into account the successive
binding/unbinding events of proteins to DNA, relies on a fractal description of
the chromatin which has been recently evidenced experimentally. Facilitated
diffusion is shown quantitatively to be favorable for a fast localization of a
target locus by a transcription factor, and even to enable the minimization of
the search time by tuning the affinity of the transcription factor with DNA.
This study shows the robustness of the facilitated diffusion mechanism, invoked
so far only for linear conformations of DNA.
| 0.907076 | 0.705444 | 0.201632 |
2004.08313 | Traveling fronts in self-replicating persistent random walks with
multiple internal states | Self-activation coupled to a transport mechanism results in traveling waves
that describe polymerization reactions, forest fires, tumor growth, and even
the spread of epidemics. Diffusion is a simple and commonly used model of
particle transport. Many physical and biological systems are, however, better
described by persistent random walks that switch between multiple states of
ballistic motion. So far, traveling fronts in persistent random walk models
have only been analyzed in special, simplified cases. Here, we formulate the
general model of reaction-transport processes in such systems and show how to
compute the expansion velocity for arbitrary number of states. For the
two-state model, we obtain a closed-form expression for the velocity and report
how it is affected by different transport and replication parameters. We also
show that nonzero death rates result in a discontinuous transition from
quiescence to propagation. We compare our results to a recent observation of a
discontinuous onset of propagation in microtubule asters and comment on the
universal nature of the underlying mechanism.
| The propagation of an initially localized perturbation via an interacting
many-particle Hamiltonian dynamics is investigated. We argue that the
propagation of the perturbation can be captured by the use of a continuous-time
random walk where a single particle is traveling through an active, fluctuating
medium. Employing two archetype ergodic many-particle systems, namely (i) a
hard-point gas composed of two unequal masses and (ii) a Fermi-Pasta-Ulam chain
we demonstrate that the corresponding perturbation profiles coincide with the
diffusion profiles of the single-particle L\'{e}vy walk approach. The
parameters of the random walk can be related through elementary algebraic
expressions to the physical parameters of the corresponding test many-body
systems.
| 0.823289 | 0.794171 | 0.029118 |
2004.08314 | Electromigration-guided composition patterns in thin alloy films: a
computational study | Via computation of a continuum dynamical model of the diffusion and
electromigration, this paper demonstrates the feasibility of guiding the
formation of the stripe composition patterns in the thin surface layers of the
crystal alloy films. By employing the systematic parametric computational
analysis it is revealed how such properties of the pattern as the aerial number
density of the stripes and the stripe in-plane orientation are influenced by
the major physical factors that are not limited to the electric field strength
and its direction angle in the plane, but also include a number of parameters
that originate in the anisotropy of diffusion in the particular
crystallographically-oriented surface layer. By following the insights from
this analysis the real patterns hopefully can be created in a dedicated
experiment.
| The solution of a boundary--value problem formulated for the Kretschmann
configuration shows that the phase speed of a surface--plasmon--polariton (SPP)
wave guided by the planar interface of a sufficiently thin metal film and a
sculptured thin film (STF) depends on the vapor incidence angle used while
fabricating the STF by physical vapor deposition. Furthermore, it may be
possible to engineer the phase speed by periodically varying the vapor
incidence angle. The phase speed of the SPP wave can be set by selecting higher
mean value and/or the modulation amplitude of the vapor incidence angle.
| 0.883864 | 0.663748 | 0.220117 |
2004.08315 | Spanning the isogeny class of a power of an ordinary elliptic curve over
a finite field. Application to the number of rational points of curves of
genus $\leq 4$ | Let $E$ be an ordinary elliptic curve over a finite field and $g$ be a
positive integer. Under some technical assumptions, we give an algorithm to
span the isomorphism classes of principally polarized abelian varieties in the
isogeny class of $E^g$. The varieties are first described as hermitian lattices
over (not necessarily maximal) quadratic orders and then geometrically in terms
of their algebraic theta null point. We also show how to algebraically compute
Siegel modular forms of even weight given as polynomials in the theta constants
by a careful choice of an affine lift of the theta null point. We then use
these results to give an algebraic computation of Serre's obstruction for
principally polarized abelian threefolds isogenous to $E^3$ and of the Igusa
modular form in dimension $4$. We illustrate our algorithms with examples of
curves with many rational points over finite fields.
| We explain a method for computing the Cassels-Tate pairing on the 3-isogeny
Selmer groups of an elliptic curve. This improves the upper bound on the rank
of the elliptic curve coming from a descent by 3-isogeny, to that coming from a
full 3-descent. One ingredient of our work is a new algorithm for solving cubic
norm equations, that avoids the need for any S-unit computations. As an
application, we show that the elliptic curves with torsion subgroup of order 3
and rank at least 13, found by Eroshkin, have rank exactly 13.
| 0.88639 | 0.855471 | 0.030919 |
2004.08317 | Index Modulation-Based Flexible Non-Orthogonal Multiple Access | Non-orthogonal multiple access (NOMA) is envisioned as an efficient candidate
for future communication systems. This letter proposes a novel orthogonal
frequency division multiplexing (OFDM) with index modulation (IM)-based NOMA
scheme, called OFDM-IM NOMA, for future multi-user communication systems.
Inspired by IM and classical OFDM-NOMA, users utilize flexibility by adjusting
power allocation factors and subcarrier activation ratios. Our new scheme
allows different service users to share available resources as in classical
NOMA, more efficiently. It is shown that OFDM-IM NOMA reliably supports a high
and low data rate user at the same resources by adjusting their subcarrier
activation ratios.
| This paper seeks to answer a simple but fundamental question: What role can
NOMA play in massive MIMO? It is well-established that power-domain
non-orthogonal multiple access (NOMA) schemes can outperform conventional
orthogonal multiple access (OMA) schemes in cellular networks. However, this
fact does not imply that NOMA is the most efficient way to communicate in
massive MIMO setups, where the base stations have many more antennas than there
are users in the cell. These setups are becoming the norm in future networks
and are usually studied by assuming spatial multiplexing of the users using
linear multi-user beamforming. To answer the above question, we analyze and
compare the performance achieved by NOMA and multi-user beamforming in both
NLOS and LOS scenarios. We reveal that the latter scheme gives the highest
average sum rate in massive MIMO setups. We also identify specific cases where
NOMA is the better choice in massive MIMO and explain how NOMA plays an
essential role in creating a hybrid of NOMA and multi-user beamforming that is
shown to perform better than two standalone schemes do.
| 0.845971 | 0.771509 | 0.074462 |
2004.08318 | Causal Inference in Case-Control Studies | We investigate identification of causal parameters in case-control and
related studies. The odds ratio in the sample is our main estimand of interest
and we articulate its relationship with causal parameters under various
scenarios. It turns out that the odds ratio is generally a sharp upper bound
for counterfactual relative risk under some monotonicity assumptions, without
resorting to strong ignorability, nor to the rare-disease assumption. Further,
we propose semparametrically efficient, easy-to-implement,
machine-learning-friendly estimators of the aggregated (log) odds ratio by
exploiting an explicit form of the efficient influence function. Using our new
estimators, we develop methods for causal inference and illustrate the
usefulness of our methods by a real-data example.
| Statisticians have made great progress in creating methods that reduce our
reliance on parametric assumptions. However this explosion in research has
resulted in a breadth of inferential strategies that both create opportunities
for more reliable inference as well as complicate the choices that an applied
researcher has to make and defend. Relatedly, researchers advocating for new
methods typically compare their method to at best 2 or 3 other causal inference
strategies and test using simulations that may or may not be designed to
equally tease out flaws in all the competing methods. The causal inference data
analysis challenge, "Is Your SATT Where It's At?", launched as part of the 2016
Atlantic Causal Inference Conference, sought to make progress with respect to
both of these issues. The researchers creating the data testing grounds were
distinct from the researchers submitting methods whose efficacy would be
evaluated. Results from 30 competitors across the two versions of the
competition (black box algorithms and do-it-yourself analyses) are presented
along with post-hoc analyses that reveal information about the characteristics
of causal inference strategies and settings that affect performance. The most
consistent conclusion was that methods that flexibly model the response surface
perform better overall than methods that fail to do so. Finally new methods are
proposed that combine features of several of the top-performing submitted
methods.
| 0.851281 | 0.787484 | 0.063797 |
2004.08319 | Magnetic correlations in subsystems of the misfit
[Ca$_2$CoO$_3$]$_{0.62}$[CoO$_2$] cobaltate | [Ca$_2$CoO$_3$]$_{0.62}$[CoO$_2$], a two dimensional misfit metallic
compound, is famous for its rich phases accessed by temperature, $i.e.$ high
temperature spin-state transition, metal-insulator transition (MIT) at
intermediate temperature ($\sim$ 100 K) and low temperature spin density wave
(SDW). It enters into short range SDW phase below T$_{MIT}$ and long range SDW
completes at 27 K [Phys. Rev. B 67, 104410 (2003)]. Information on independent
role of misfit layers (rocksalt/Ca$_2$CoO$_3$ \& triangular/CoO$_2$) in these
phases is scarce. By combining a set of complementary macroscopic (DC
magnetization and resistivity) and microscopic (neutron diffraction and X-ray
absorption fine structure spectroscopy) measurements on pure (CCO) and Tb
substituted in the rocksalt layer of CCO (CCO1), magnetic correlations in both
subsystems of this misfit compound are unraveled. CCO is found to exhibit
glassiness, as well as exchange bias (EB) effects, while CCO1 does not exhibit
glassiness, albeit it shows weaker EB effect. Our results show that the
magneto-crystalline anisotropy associated with the rocksalt layer acts as a
source of pinning, which is responsible for EB effect as well as for
localization of spins in triangular (CoO$_2$) layer, giving rise to glassiness
in CCO. By combining local structure investigations from extended X-ray
absorption fine structure (EXAFS) spectroscopy and neutron diffraction results
on CCO, we also confirm that the SDW arises in the CoO$_2$ layer.
| We study the renormalized Coulomb interactions due to retardation effect in
Na$_x$CoO$_2$. Although the Morel-Anderson's pseudo potential for $a_{1g}$
orbital $\mu^*_{a1g}$ is relatively large because the direct Coulomb repulsion
$U$ is large, that for interband transition between $a_{1g}$ and $e_g'$
orbitals $\mu^*_{a1g,eg'}$ is very small since the renormalization factor for
pair hopping $J$ is square of that for $U$. Therefore, the s-wave
superconductivity due to valence-band Suhl-Kondo mechanism will survive against
strong Coulomb interactions. The interband hopping of Cooper pairs due to shear
phonons is essential to understand the superconductivity in Na$_x$CoO$_2$.
| 0.874174 | 0.797712 | 0.076462 |
2004.08320 | A Computational Model of Levodopa-Induced Toxicity in Substantia Nigra
Pars Compacta in Parkinson's Disease | Parkinson's disease (PD) is caused by the progressive loss of dopaminergic
cells in substantia nigra pars compacta (SNc). The root cause of this cell loss
in PD is still not decisively elucidated. A recent line of thinking traces the
cause of PD neurodegeneration to metabolic deficiency. Due to exceptionally
high energy demand, SNc neurons exhibit a higher basal metabolic rate and
higher oxygen consumption rate, which results in oxidative stress. Recently, we
have suggested that the excitotoxic loss of SNc cells might be due to energy
deficiency occurring at different levels of neural hierarchy. Levodopa (LDOPA),
a precursor of dopamine, which is used as a symptom-relieving treatment for PD,
leads to outcomes that are both positive and negative. Several researchers
suggested that LDOPA might be harmful to SNc cells due to oxidative stress. The
role of LDOPA in the course of PD pathogenesis is still debatable. We
hypothesize that energy deficiency can lead to LDOPA-induced toxicity (LIT) in
two ways: by promoting dopamine-induced oxidative stress and by exacerbating
excitotoxicity in SNc. We present a multiscale computational model of
SNc-striatum system, which will help us in understanding the mechanism behind
neurodegeneration postulated above and provides insights for developing
disease-modifying therapeutics. It was observed that SNc terminals are more
vulnerable to energy deficiency than SNc somas. During LDOPA therapy, it was
observed that higher LDOPA dosage results in increased loss of somas and
terminals in SNc. It was also observed that co-administration of LDOPA and
glutathione (antioxidant) evades LDOPA-induced toxicity in SNc neurons. We show
that our proposed model was able to capture LDOPA-induced toxicity in SNc,
caused by energy deficiency.
| We study vaccine control for disease spread on an adaptive network modeling
disease avoidance behavior. Control is implemented by adding Poisson
distributed vaccination of susceptibles. We show that vaccine control is much
more effective in adaptive networks than in static networks due to an
interaction between the adaptive network rewiring and the vaccine application.
Disease extinction rates using vaccination are computed, and orders of
magnitude less vaccine application is needed to drive the disease to extinction
in an adaptive network than in a static one.
| 0.84459 | 0.622703 | 0.221887 |
2004.08321 | The local-filament pattern in the anomalous transparency of the Universe
for energetic gamma rays | The propagation length of high-energy photons through the Universe is limited
by the absorption due to $e^+e^-$ pair production on extragalactic background
radiation. Previous studies reported some discrepancies between predicted and
observed absorption, suggesting explanations in terms of new physics. However,
these effects are dominated by a limited number of observed sources, while many
do not show any discrepancy. Here, we consider the distribution in the sky of
these apparently anomalous objects, selected in two very different approaches:
the study of unphysical hardenings at distance-dependent energies in deabsorbed
spectra of TeV blazars, and the observation of ultra-high-energy air showers
from the directions of BL Lac type objects. In both cases, directions to the
anomalous sources follow the projected local distribution of galaxies, meaning
that the distant sources, contributing to the anomalies, are seen through the
local filament. This is in line with the proposed earlier explanation of the
anomalies based on mixing of photons with axion-like particles in the
filament's magnetic field.
| We consider a model for neutralino dark matter candidates arising in
anomaly-mediated supersymmetry breaking schemes, and examine its testability
through the search for exotic cosmic rays produced by neutralino pair
annihilations in the dark halo of the Galaxy. We find that the model is already
constrained by available antiprotons and positrons measurements and may be
further tested in upcoming measurements of these cosmic ray species. We show
also that the monochromatic gamma-ray flux from neutralino annihilations is
enhanced in this model up to two orders of magnitude with respect to
alternative scenarios. The gamma-ray flux detected by the Energetic Gamma Ray
Experiment Telescope in the direction of the Galactic center exceeds
significantly the theoretical expectation of standard emission models. We prove
that if at least 10% of this excess is due to gamma-ray radiation with
continuum energy spectrum from neutralino annihilations in the model under
investigation, the associated gamma-ray line will be detected by upcoming
gamma-ray experiments.
| 0.818509 | 0.737556 | 0.080953 |
2004.08322 | Coping with dating errors in causality estimation | {We consider the problem of estimating causal influences between observed
processes from time series possibly corrupted by errors in the time variable
(dating errors) which are typical in palaeoclimatology, planetary science and
astrophysics. "Causality ratio" based on the Wiener -- Granger causality is
proposed and studied for a paradigmatic class of model systems to reveal
conditions under which it correctly indicates directionality of unidirectional
coupling. It is argued that in case of {\it a priori} known directionality, the
causality ratio allows a characterization of dating errors and observational
noise. Finally, we apply the developed approach to palaeoclimatic data and
quantify the influence of solar activity on tropical Atlantic climate dynamics
over the last two millennia. A stronger solar influence in the first millennium
A.D. is inferred. The results also suggest a dating error of about 20 years in
the solar proxy time series over the same period.
| Discovering causal relations is fundamental to reasoning and intelligence. In
particular, observational causal discovery algorithms estimate the cause-effect
relation between two random entities $X$ and $Y$, given $n$ samples from
$P(X,Y)$.
In this paper, we develop a framework to estimate the cause-effect relation
between two static entities $x$ and $y$: for instance, an art masterpiece $x$
and its fraudulent copy $y$. To this end, we introduce the notion of proxy
variables, which allow the construction of a pair of random entities $(A,B)$
from the pair of static entities $(x,y)$. Then, estimating the cause-effect
relation between $A$ and $B$ using an observational causal discovery algorithm
leads to an estimation of the cause-effect relation between $x$ and $y$. For
example, our framework detects the causal relation between unprocessed
photographs and their modifications, and orders in time a set of shuffled
frames from a video.
As our main case study, we introduce a human-elicited dataset of 10,000 pairs
of casually-linked pairs of words from natural language. Our methods discover
75% of these causal relations. Finally, we discuss the role of proxy variables
in machine learning, as a general tool to incorporate static knowledge into
prediction tasks.
| 0.798086 | 0.760061 | 0.038024 |
2004.08323 | A polynomial-degree-robust a posteriori error estimator for N\'ed\'elec
discretizations of magnetostatic problems | We present an equilibration-based a posteriori error estimator for
N\'ed\'elec element discretizations of the magnetostatic problem. The estimator
is obtained by adding a gradient correction to the estimator for N\'ed\'elec
elements of arbitrary degree presented in [J. Gedicke, S. Geevers, and I.
Perugia. An equilibrated a posteriori error estimator for arbitrary-order
N\'ed\'elec elements for magnetostatic problems. arXiv preprint,
arXiv:1909.01853 [math.NA], 2019]. This new estimator is proven to be reliable,
with reliability constant 1, and efficient, with an efficiency constant that is
independent of the polynomial degree of the approximation. These properties are
demonstrated in a series of numerical experiments on three-dimensional test
problems.
| We present a posteriori error estimates for finite element approximations in
a minimization approach to a coefficient inverse problem. The problem is that
of reconstructing the dielectric permittivity $\varepsilon =
\varepsilon(\mathbf{x})$, $\mathbf{x}\in\Omega\subset\mathbb{R}^3$, from
boundary measurements of the electric field. The electric field is related to
the permittivity via Maxwell's equations. The reconstruction procedure is based
on minimization of a Tikhonov functional where the permittivity, the electric
field and a Lagrangian multiplier function are approximated by peicewise
polynomials. Our main result is an estimate for the difference between the
computed coefficient $\varepsilon_h$ and the true minimizer $\varepsilon$, in
terms of the computed functions.
| 0.931845 | 0.82582 | 0.106025 |
2004.08324 | Hitting forbidden induced subgraphs on bounded treewidth graphs | For a fixed graph $H$, the $H$-IS-Deletion problem asks, given a graph $G$,
for the minimum size of a set $S \subseteq V(G)$ such that $G\setminus S$ does
not contain $H$ as an induced subgraph. Motivated by previous work about
hitting (topological) minors and subgraphs on bounded treewidth graphs, we are
interested in determining, for a fixed graph $H$, the smallest function
$f_H(t)$ such that $H$-IS-Deletion can be solved in time $f_H(t) \cdot
n^{O(1)}$ assuming the Exponential Time Hypothesis (ETH), where $t$ and $n$
denote the treewidth and the number of vertices of the input graph,
respectively.
We show that $f_H(t) = 2^{O(t^{h-2})}$ for every graph $H$ on $h \geq 3$
vertices, and that $f_H(t) = 2^{O(t)}$ if $H$ is a clique or an independent
set. We present a number of lower bounds by generalizing a reduction of Cygan
et al. [MFCS 2014] for the subgraph version. In particular, we show that when
$H$ deviates slightly from a clique, the function $f_H(t)$ suffers a sharp
jump: if $H$ is obtained from a clique of size $h$ by removing one edge, then
$f_H(t) = 2^{\Theta(t^{h-2})}$. We also show that $f_H(t) = 2^{\Omega(t^{h})}$
when $H=K_{h,h}$, and this reduction answers an open question of Mi. Pilipczuk
[MFCS 2011] about the function $f_{C_4}(t)$ for the subgraph version.
Motivated by Cygan et al. [MFCS 2014], we also consider the colorful variant
of the problem, where each vertex of $G$ is colored with some color from $V(H)$
and we require to hit only induced copies of $H$ with matching colors. In this
case, we determine, under the ETH, the function $f_H(t)$ for every connected
graph $H$ on $h$ vertices: if $h\leq 2$ the problem can be solved in polynomial
time; if $h\geq 3$, $f_H(t) = 2^{\Theta(t)}$ if $H$ is a clique, and $f_H(t) =
2^{\Theta(t^{h-2})}$ otherwise.
| A class of graphs is $\chi$-bounded if there is a function $f$ such that
$\chi(G)\le f(\omega(G))$ for every induced subgraph $G$ of every graph in the
class, where $\chi,\omega$ denote the chromatic number and clique number of $G$
respectively. In 1987, Gy\'arf\'as conjectured that for every $c$, if
$\mathcal{C}$ is a class of graphs such that $\chi(G)\le \omega(G)+c$ for every
induced subgraph $G$ of every graph in the class, then the class of complements
of members of $\mathcal{C}$ is $\chi$-bounded. We prove this conjecture.
Indeed, more generally, a class of graphs is $\chi$-bounded if it has the
property that no graph in the class has $c+1$ odd holes, pairwise disjoint and
with no edges between them. The main tool is a lemma that if $C$ is a shortest
odd hole in a graph, and $X$ is the set of vertices with at least five
neighbours in $V(C)$, then there is a three-vertex set that dominates $X$.
| 0.827195 | 0.74592 | 0.081275 |
2004.08325 | Symmetrizers for Schur superalgebras | For the Schur superalgebra $S=S(m|n,r)$ over a ground field $K$ of
characteristic zero, we define symmetrizers $T^{\lambda}[i:j]$ of the ordered
pairs of tableaux $T_i, T_j$ of the shape $\lambda$ and show that the $K$-span
$A_{\lambda,K}$ of all symmetrizers $T^{\lambda}[i:j]$ has a basis consisting
of $T^{\lambda}[i:j]$ for $T_i,T_j$ semistandard. The $S$-superbimodule
$A_{\lambda,K}$ is identified as %$\Delta(\lambda)^*\otimes_K \nabla(\lambda)$,
where $\Delta(\lambda)^*$ is the dual of the standard supermodule %and
$\nabla(\lambda)$ is the costandard supermodule of the highest weight
$\lambda$. $D_{\lambda}\otimes_K D^o_{\lambda}$, where $D_\lambda$ and
$D^o_\lambda$ are left and right irreducible $S$-supermodules of the highest
weight $\lambda$.
We define modified symmetrizers $T^{\lambda}\{i:j\}$ and show that their
$\mathbb{Z}$-span form a $\mathbb{Z}$-form $A_{\lambda,\mathbb{Z}}$ of
$A_{\lambda, \mathbb{Q}}$. We show that every modified symmetrizer
$T^\lambda\{i:j\}$ is a $\mathbb{Z}$-linear combination of symmetrizers
$T^\lambda\{i:j\}$ for $T_i, T_j$ semistandard. Using modular reduction to a
field $K$ of characteristic $p>2$, we obtain that $A_{\lambda,K}$ has a basis
consisting of modified symmetrizers $T^\lambda\{i:j\}$ for $T_i, T_j$
semistandard.
| Let $\Lambda$ be the space of symmetric functions and $V_k$ be the subspace
spanned by the modified Schur functions $\{S_\lambda[X/(1-t)]\}_{\lambda_1\leq
k}$. We introduce a new family of symmetric polynomials,
$\{A_{\lambda}^{(k)}[X;t]\}_{\lambda_1\leq k}$, constructed from sums of
tableaux using the charge statistic. We conjecture that the polynomials
$A_{\lambda}^{(k)}[X;t]$ form a basis for $V_k$ and that the Macdonald
polynomials indexed by partitions whose first part is not larger than $k$
expand positively in terms of our polynomials. A proof of this conjecture would
not only imply the Macdonald positivity conjecture, but would substantially
refine it. Our construction of the $A_\lambda^{(k)}[X;t]$ relies on the use of
tableaux combinatorics and yields various properties and conjectures on the
nature of these polynomials. Another important development following from our
investigation is that the $A_{\lambda}^{(k)}[X;t]$ seem to play the same role
for $V_k$ as the Schur functions do for $\Lambda$. In particular, this has led
us to the discovery of many generalizations of properties held by the Schur
functions, such as Pieri and Littlewood-Richardson type coefficients.
| 0.895046 | 0.751557 | 0.143489 |
2004.08326 | SpEx: Multi-Scale Time Domain Speaker Extraction Network | Speaker extraction aims to mimic humans' selective auditory attention by
extracting a target speaker's voice from a multi-talker environment. It is
common to perform the extraction in frequency-domain, and reconstruct the
time-domain signal from the extracted magnitude and estimated phase spectra.
However, such an approach is adversely affected by the inherent difficulty of
phase estimation. Inspired by Conv-TasNet, we propose a time-domain speaker
extraction network (SpEx) that converts the mixture speech into multi-scale
embedding coefficients instead of decomposing the speech signal into magnitude
and phase spectra. In this way, we avoid phase estimation. The SpEx network
consists of four network components, namely speaker encoder, speech encoder,
speaker extractor, and speech decoder. Specifically, the speech encoder
converts the mixture speech into multi-scale embedding coefficients, the
speaker encoder learns to represent the target speaker with a speaker
embedding. The speaker extractor takes the multi-scale embedding coefficients
and target speaker embedding as input and estimates a receptive mask. Finally,
the speech decoder reconstructs the target speaker's speech from the masked
embedding coefficients. We also propose a multi-task learning framework and a
multi-scale embedding implementation. Experimental results show that the
proposed SpEx achieves 37.3%, 37.7% and 15.0% relative improvements over the
best baseline in terms of signal-to-distortion ratio (SDR), scale-invariant SDR
(SI-SDR), and perceptual evaluation of speech quality (PESQ) under an open
evaluation condition.
| Automatic meeting analysis comprises the tasks of speaker counting, speaker
diarization, and the separation of overlapped speech, followed by automatic
speech recognition. This all has to be carried out on arbitrarily long sessions
and, ideally, in an online or block-online manner. While significant progress
has been made on individual tasks, this paper presents for the first time an
all-neural approach to simultaneous speaker counting, diarization and source
separation. The NN-based estimator operates in a block-online fashion and
tracks speakers even if they remain silent for a number of time blocks, thus
learning a stable output order for the separated sources. The neural network is
recurrent over time as well as over the number of sources. The simulation
experiments show that state of the art separation performance is achieved,
while at the same time delivering good diarization and source counting results.
It even generalizes well to an unseen large number of blocks.
| 0.893354 | 0.787595 | 0.105759 |
2004.08327 | Secular dynamics of hierarchical multiple systems composed of nested
binaries, with an arbitrary number of bodies and arbitrary hierarchical
structure. III. Suborbital effects: hybrid integration techniques and
orbit-averaging corrections | The SecularMultiple code, presented in two previous papers of this series,
integrates the long-term dynamical evolution of multiple systems with any
number of bodies and hierarchical structure, provided that the system is
composed of nested binaries. In the formalism underlying SecularMultiple, we
previously averaged over all orbits in the system. This approximation
significantly speeds up numerical integration of the equations of motion,
making large population synthesis studies possible. However, the orbit
averaging approximation can break down when the secular evolution timescale of
the system is comparable to or shorter than any of the orbital periods in the
system. Here, we present an update to SecularMultiple in which we incorporate
hybrid integration techniques, and orbit-averaging corrections. With this
update, the user can specify which orbits should be integrated directly
(without averaging), or assuming averaged orbits. For orbits that are
integrated directly, we implemented two integration techniques, one which is
based on the regularised Kustaanheimo-Stiefel equations of motion in element
form. We also implemented analytical orbit-averaging corrections for pairwise
interactions to quadrupole order. The updates presented here provide more
flexibility for integrating the long-term dynamical evolution of hierarchical
multiple systems. By effectively combining direct integration and orbit
averaging the long-term evolution can be accurately computed, but with
significantly lower computational cost compared to existing direct N-body
codes. We give a number of examples in which the new features are beneficial.
Our updated code, which is written in C++ supplemented with a user-friendly
interface in Python, is freely available.
| In this work, we propose a hierarchical reinforcement learning (HRL)
structure which is capable of performing autonomous vehicle planning tasks in
simulated environments with multiple sub-goals. In this hierarchical structure,
the network is capable of 1) learning one task with multiple sub-goals
simultaneously; 2) extracting attentions of states according to changing
sub-goals during the learning process; 3) reusing the well-trained network of
sub-goals for other similar tasks with the same sub-goals. The states are
defined as processed observations which are transmitted from the perception
system of the autonomous vehicle. A hybrid reward mechanism is designed for
different hierarchical layers in the proposed HRL structure. Compared to
traditional RL methods, our algorithm is more sample-efficient since its
modular design allows reusing the policies of sub-goals across similar tasks.
The results show that the proposed method converges to an optimal policy faster
than traditional RL methods.
| 0.890571 | 0.671852 | 0.21872 |
2004.08328 | Probing New Physics with Long-Range Neutrino Interactions: An Effective
Field Theory Approach | We investigate forces induced by the exchange of two light neutrinos between
Standard Model (SM) fermions in the presence of effective operators
parametrising physics beyond the SM. We first set up a general framework in
which we derive the long-range potential mediated by weakly interacting
neutrinos in the SM, retaining both spin-independent and spin-dependent terms.
We then derive neutrino-mediated potentials when there are vector, scalar and
tensor non-standard interactions present as well as an exotic neutrino magnetic
moment. Examining the phenomenology of such long-range potentials in atomic
scale laboratory experiments, we derive upper bounds on the Wilson coefficients
of the effective operators and compare these to those from processes such as
charged lepton flavour violation.
| Background: Long-baseline experiments such as the planned Deep Underground
Neutrino Experiment (DUNE) require theoretical descriptions of the complete
event in a neutrino-nucleus reaction. Since nuclear targets are used this
requires a good understanding of neutrino-nucleus interactions.
Purpose: Develop a consistent theory and code framework for the description
of lepton-nucleus interactions that can be used to describe not only inclusive
cross sections, but also the complete final state of the reaction.
Methods: The Giessen-Boltzmann-Uehling-Uhlenbeck (GiBUU) implementation of
quantum-kinetic transport theory is used, with improvements in its treatment of
the nuclear ground state and of 2p2h interactions. For the latter an empirical
structure function from electron scattering data is used as a basis.
Results: Results for electron-induced inclusive cross sections are given as a
necessary check for the overall quality of this approach. The calculated
neutrino-induced inclusive double-differential cross sections show good
agreement with data from neutrino- and antineutrino reactions for different
neutrino flavors at MiniBooNE and T2K. Inclusive double-differential cross
sections for MicroBooNE, NOvA, MINERvA and LBNF/DUNE are given.
Conclusions: Based on the GiBUU model of lepton-nucleus descriptions a good
theoretical description of inclusive electron-, neutrino- and
antineutrino-nucleus data over a wide range of energies, different neutrino
flavors and different experiments is now possible. Since no tuning is involved
this theory and code should be reliable also for new energy regimes and target
masses. \end{description}
| 0.864738 | 0.789065 | 0.075673 |
2004.08329 | Counterterm method and thermodynamics of Hairy Black Holes in a
Vector-Tensor theory with Abelian gauge symmetry breaking | For a type of non-minimally coupled vector-tensor theories with Abelian gauge
symmetry breaking in four-dimensional spacetime and correspondingly asymptotic
non-AdS black hole solutions including a cosmological constant, we construct
the appropriate boundary terms and derive the associated junction condition. In
order to remove the divergences in the stress tensor which is localized on the
spacetime boundary, we also involve the suitable surface counterterms into the
total action. Using the counterterm method, we caculate the black hole mass. An
implicit relation between the black hole carge $Q$ and other parameters is
implied by combining the expression of the black hole mass with the first law
of black hole thermodynamics. With this implicit relation, we can prove the
inequality $Q\leq M$ which is a general bound for most of charged black holes.
Besides, the phase structure of black holes is also investigated in the grand
canonical ensemble.
| We study certain bi-scalar-tensor theories emanating from conformal symmetry
requirements of Horndeski's four-dimensional action. The former scalar is a
Galileon with shift symmetry whereas the latter scalar is adjusted to have a
higher order conformal coupling. Employing technics from local Weyl geometry
certain Galileon higher order terms are thus constructed to be conformally
invariant. The combined shift and partial conformal symmetry of the action,
allow us to construct exact black hole solutions. The black holes initially
found are of planar horizon geometry embedded in anti de Sitter space and can
accommodate electric charge. The conformally coupled scalar comes with an
additional independent charge and it is well-defined on the horizon whereas
additional regularity of the Galileon field is achieved allowing for time
dependence. Guided by our results in adS space-time we then consider a higher
order version of the BBMB action and construct asymptotically flat, regular,
hairy black holes. The addition of the Galileon field is seen to cure the BBMB
scalar horizon singularity while allowing for the presence of primary scalar
hair seen as an independent integration constant along-side the mass of the
black hole.
| 0.884182 | 0.789071 | 0.095111 |
2004.08331 | The spatial distribution of quasi-biennial oscillations in the
high-latitude solar activity | Quasi-biennial oscillations (QBOs) are considered as a fundamental mode of
solar magnetic activity at low latitudes ($\leq50^\circ$). However, the
evolutionary aspect and the hemispheric distribution of solar QBOs at high
latitudes ($\geq60^\circ$) are rarely studied. Here, a relatively novel
time-frequency analysis technique, named the synchrosqueezed wavelet transform,
is applied to extract the main components of the polar faculae in the northern
and southern hemispheres for the time interval from August 1951 to December
1998. It is found as the following: (1) Apart from the 22-year Hale cycle, the
17-year extended activity cycle, and the 11-year Schwabe cycle, the QBOs have
been estimated as a prominent timescale of solar magnetic activity at high
latitudes; (2) the QBOs of the polar faculae are coherent in the two
hemispheres, but the temporal (phase) and the spatial (amplitude) variations of
solar QBOs occur unevenly on both hemispheres; and (3) for the 11-year period
mode, the northern hemisphere begins three months earlier than that in the
southern one. Moreover, the spatial and temporal distributions of the
hemispheric QBOs differ from those of the 11-year Schwabe cycle mode in the two
hemispheres. Our findings could be helpful to improve our knowledge on the
physical origin of the spatial distribution of solar QBOs at high latitudes,
and could also provide more constraints on solar dynamo models introduced to
characterize the different components of the solar magnetic activity cycle.
| We report on results of imaging and spectral studies of X-ray emission from
Jupiter observed by Suzaku. In 2006 Suzaku had found diffuse X-ray emission in
$1\unicode{x2013}5$ keV associated with Jovian inner radiation belts. It has
been suggested that the emission is caused by the inverse-Compton scattering by
ultra-relativistic electrons ($ \sim 50 $ MeV) in Jupiter's magnetosphere. To
confirm the existence of this emission and to understand its relation to the
solar activity, we conducted an additional Suzaku observation in 2014 around
the maximum of the 24th solar cycle. As a result, we successfully found again
the diffuse emission around Jupiter in $1\unicode{x2013}5$ keV and also
point-like emission in $0.4\unicode{x2013}1$ keV. The luminosity of the
point-like emission which was probably composed of solar X-ray scattering,
charge exchange, or auroral bremsstrahlung emission increased by a factor of $
\sim 5$ with respect to 2006, most likely due to an increase of the solar
activity. The diffuse emission spectrum in the $1\unicode{x2013}5$ keV band was
well-fitted with a flat power-law function ($ \Gamma = 1.4 \pm 0.1 $) as in the
past observation, which supported the inverse-Compton scattering hypothesis.
However, its spatial distribution changed from $ \sim 12 \times 4 $ Jovian
radius (Rj) to $ \sim 20 \times 7 $ Rj. The luminosity of the diffuse emission
increased by a smaller factor of $ \sim 3 $. This indicates that the diffuse
emission is not simply responding to the solar activity, which is also known to
cause little effect on the distribution of high-energy electrons around
Jupiter. Further sensitive study of the spatial and spectral distributions of
the diffuse hard X-ray emission is important to understand how high-energy
particles are accelerated in Jupiter's magnetosphere.
| 0.884747 | 0.657324 | 0.227423 |
2004.08332 | On the Stability Margin and Input Delay Margin of Linear Multi-agent
systems | This paper provides a framework to characterize the gain margin, phase
margin, and maximum input delay margin of a linear time-invariant multi-agent
system where the interaction topology is described by a graph with a directed
spanning tree. The stability analysis of the multi-agent system based on the
generalized Nyquist theorem is converted to finding a minimum gain positive
definite Hermitian perturbation and minimum phase unitary perturbation in the
feedback path of the loop transfer function. Specifically, two constrained
minimization problems are solved to calculate the gain, phase, and input delay
margins of the multi-agent system. We further state necessary and sufficient
conditions concerning stability of the multi-agent system independent of gain
and phase perturbations, and input delay.
| Marginal stability arguments are used to describe the rotation-number
dependence of torque in Taylor-Couette (TC) flow for radius ratios $\eta \geq
0.9$ and shear Reynolds number $Re_S=2\times 10^4$. With an approximate
representation of the mean profile by piecewise linear functions, characterized
by the boundary-layer thicknesses at the inner and outer cylinder and the
angular momentum in the center, profiles and torques are extracted from the
requirement that the boundary layers represent marginally stable TC subsystems
and that the torque at the inner and outer cylinder coincide. This model then
explains the broad shoulder in the torque as a function of rotation number near
$R_\Omega\approx 0.2$. For rotation numbers $R_\Omega < 0.07$ the TC stability
conditions predict boundary layers in which shear Reynolds numbers are very
large. Assuming that the TC instability is bypassed by some shear instability,
a second maximum in torque appears, in very good agreement with numerical
simulations. The results show that, despite the shortcomings of marginal
stability theory in other cases, it can explain quantitatively the
non-monotonic torque variation with rotation number for both the broad maximum
as well as the narrow maximum.
| 0.886785 | 0.624219 | 0.262566 |
2004.08334 | Results from the first all-sky search for continuous gravitational waves
from small-ellipticity sources | We present the results of an all-sky search for continuous gravitational wave
signals with frequencies in the 500-1700 Hz range targeting neutron stars with
ellipticity of 1e-8. The search is done on LIGO O2 data set using Falcon
analysis pipeline. The results presented here double the sensitivity over LIGO
O2 data results. The search is capable of detecting low ellipticity sources up
to 170 pc. We establish strict upper limits which hold for worst-case signal
parameters. We list outliers uncovered by the search, including several which
we cannot associate with any known instrumental cause.
| We describe several new techniques which accelerate Bayesian searches for
continuous gravitational-wave emission from supermassive black-hole binaries
using pulsar timing arrays. These techniques mitigate the problematic increase
of search-dimensionality with the size of the pulsar array which arises from
having to include an extra parameter per pulsar as the array is expanded. This
extra parameter corresponds to searching over the phase of the
gravitational-wave as it propagates past each pulsar so that we can coherently
include the pulsar-term in our search strategies. Our techniques make the
analysis tractable with powerful evidence-evaluation packages like MultiNest.
We find good agreement of our techniques with the parameter-estimation and
Bayes factor evaluation performed with full signal templates, and conclude that
these techniques make excellent first-cut tools for detection and
characterisation of continuous gravitational-wave signals with pulsar timing
arrays. Crucially, at low to moderate signal-to-noise ratios the factor by
which the analysis is sped up can be > 100, permitting rigorous programs of
systematic injection and recovery of signals to establish robust detection
criteria within a Bayesian formalism.
| 0.897408 | 0.79497 | 0.102438 |
2004.08335 | A Low Mach Number Fluctuating Hydrodynamics Model For Ionic Liquids | We present a new mesoscale model for ionic liquids based on a low Mach number
fluctuating hydrodynamics formulation for multicomponent charged species. The
low Mach number approach eliminates sound waves from the fully compressible
equations leading to a computationally efficient incompressible formulation.
The model uses a Gibbs free energy functional that includes enthalpy of mixing,
interfacial energy, and electrostatic contributions. These lead to a new
fourth-order term in the mass equations and a reversible stress in the momentum
equations. We calibrate our model using parameters for [DMPI+][F6P-], an
extensively-studied room temperature ionic liquid (RTIL), and numerically
demonstrate the formation of mesoscopic structuring at equilibrium in two and
three dimensions. In simulations with electrode boundaries the measured double
layer capacitance decreases with voltage, in agreement with theoretical
predictions and experimental measurements for RTILs. Finally, we present a
shear electroosmosis example to demonstrate that the methodology can be used to
model electrokinetic flows.
| We have studied three-dimensional hydrodynamic interactions of relativistic
extragalactic jets with two-phase ambient media. These jets propagate through a
denser homogeneous gas and then impact clouds with densities 100 to 1000 times
higher than the initial beam density. The deflection angle of the jet is
influenced more by the density contrast of the cloud than by the beam Mach
number of the jet. A relativistic jet with low relativistic beam Mach number
can eventually be slightly bent after it crosses the dense cloud; however, we
have not seen permanently bent structures in the interaction of a high
relativistic beam Mach number jet with a cloud. The relativistic jet impacts on
dense clouds do not necessarily destroy the clouds completely, and much of the
cloud body can survive as a coherent blob. This enhancement of cloud durability
is partly due to the geometric influence of the off-axis collisions we consider
and also arises from the lower rate of cloud fragmentation through the
Kelvin-Helmholtz instability for relativistic jets. To compare our simulations
with observed extragalactic radio jets, we have computed the approximate
surface distributions of synchrotron emission at different viewing angles.
These surface intensity maps show relativistic jets interacting with clouds can
produce synchrotron emission knots similar to structures observed in many
VLBI-scale radio sources. We find that the synchrotron emission increases
steeply at the moment of impact and the emission peaks right before the jet
passes through the cloud.
| 0.898206 | 0.612528 | 0.285678 |
2004.08336 | MAP segmentation in Bayesian hidden Markov models: a case study | We consider the problem of estimating the maximum posterior probability (MAP)
state sequence for a finite state and finite emission alphabet hidden Markov
model (HMM) in the Bayesian setup, where both emission and transition matrices
have Dirichlet priors. We study a training set consisting of thousands of
protein alignment pairs. The training data is used to set the prior
hyperparameters for Bayesian MAP segmentation. Since the Viterbi algorithm is
not applicable any more, there is no simple procedure to find the MAP path, and
several iterative algorithms are considered and compared. The main goal of the
paper is to test the Bayesian setup against the frequentist one, where the
parameters of HMM are estimated using the training data.
| The focus of this work is on developing probabilistic models for user
activity in social networks by incorporating the social network influence as
perceived by the user. For this, we propose a coupled Hidden Markov Model,
where each user's activity evolves according to a Markov chain with a hidden
state that is influenced by the collective activity of the friends of the user.
We develop generalized Baum-Welch and Viterbi algorithms for model parameter
learning and state estimation for the proposed framework. We then validate the
proposed model using a significant corpus of user activity on Twitter. Our
numerical studies show that with sufficient observations to ensure accurate
model learning, the proposed framework explains the observed data better than
either a renewal process-based model or a conventional uncoupled Hidden Markov
Model. We also demonstrate the utility of the proposed approach in predicting
the time to the next tweet. Finally, clustering in the model parameter space is
shown to result in distinct natural clusters of users characterized by the
interaction dynamic between a user and his network.
| 0.865723 | 0.714989 | 0.150734 |
2004.08337 | Entanglement as upper bounded for the nonlocality of a general two-qubit
system | Nonlocality and entanglement are not only the fundamental characteristics of
quantum mechanics but also important resources for quantum information and
computation applications. Exploiting the quantitative relationship between the
two different resources is of both theoretical and practical significance. The
common choice for quantifying the nonlocality of a two-qubit state is the
maximal violation of the Clauser-Horne-Shimony-Holt inequality. That for
entanglement is entanglement of formation, which is a function of the
concurrence. In this paper, we systematically investigate the quantitative
relationship between the entanglement and nonlocality of a general two-qubit
system. We rederive a known upper bound on the nonlocality of a general
two-qubit state, which depends on the state's entanglement. We investigate the
condition that the nonlocality of two different two-qubit states can be
optimally stimulated by the same nonlocality test setting and find the class of
two-qubit state pairs that have this property. Finally, we obtain the necessary
and sufficient condition that the upper bound can be reached.
| We investigate the genuine multipartite nonlocality of three-mode Gaussian
states of continuous variable systems. For pure states, we present a simplified
procedure to obtain the maximum violation of the Svetlichny inequality based on
displaced parity measurements, and we analyze its interplay with genuine
tripartite entanglement measured via Renyi-2 entropy. The maximum Svetlichny
violation admits tight upper and lower bounds at fixed tripartite entanglement.
For mixed states, no violation is possible when the purity falls below 0.86. We
also explore a set of recently derived weaker inequalities for three-way
nonlocality, finding violations for all tested pure states. Our results provide
a strong signature for the nonclassical and nonlocal nature of Gaussian states
despite their positive Wigner function, and lead to precise recipes for its
experimental verification.
| 0.920889 | 0.831408 | 0.089481 |
2004.08338 | The two player shortest path network interdiction problem | In this article, we study a biobjective extension of the shortest path
network interdiction problem. Each arc in the network is associated with two
integer length values and two players compute their respective shortest paths
from source to sink independently from each other while an interdictor tries to
lengthen both shortest paths by removing arcs. We show that this problem is
intractable and that deciding whether a feasible interdiction strategy is
efficient, is NP- complete. We provide a solution procedure to solve the
problem on two-terminal series-parallel graphs in pseudopolynomial time. In
addition, we show that a variant of the problem with bottleneck objectives can
be solved in polynomial time on general directed graphs.
| We present KADABRA, a new algorithm to approximate betweenness centrality in
directed and undirected graphs, which significantly outperforms all previous
approaches on real-world complex networks. The efficiency of the new algorithm
relies on two new theoretical contributions, of independent interest. The first
contribution focuses on sampling shortest paths, a subroutine used by most
algorithms that approximate betweenness centrality. We show that, on realistic
random graph models, we can perform this task in time $|E|^{\frac{1}{2}+o(1)}$
with high probability, obtaining a significant speedup with respect to the
$\Theta(|E|)$ worst-case performance. We experimentally show that this new
technique achieves similar speedups on real-world complex networks, as well.
The second contribution is a new rigorous application of the adaptive sampling
technique. This approach decreases the total number of shortest paths that need
to be sampled to compute all betweenness centralities with a given absolute
error, and it also handles more general problems, such as computing the $k$
most central nodes. Furthermore, our analysis is general, and it might be
extended to other settings.
| 0.912427 | 0.715587 | 0.19684 |
2004.08339 | Wavefunctions from Energies: Applications in simple potentials | A remarkable mathematical property -- somehow hidden and recently
rediscovered -- allows obtaining the eigenvectors of a Hermitian matrix
directly from their eigenvalues. That opens the possibility to get the
wavefunctions from the spectrum, an elusive goal of many fields in physics.
Here, the formula is assessed for simple potentials, recovering the theoretical
wavefunctions within machine accuracy. A striking feature of this
eigenvalue--eigenvector relation is that it does not require knowing any of the
entries of the working matrix. However, it requires the knowledge of the
eigenvalues of the minor matrices (in which a row and a column have been
deleted from the original matrix). We found a pattern in these sub-matrices
spectra, allowing to get the eigenvectors analytically. The physical
information hidden behind this pattern is analyzed.
| The concepts of Lorentz invariance of local (flat space) physics, and
unitarity of time evolution and the S-matrix, are famously rigid and robust,
admitting no obvious consistent theoretical deformations, and confirmed to
incredible accuracy by experiments. But neither of these notions seem to appear
directly in describing the spatial correlation functions at future infinity
characterizing the "boundary" observables in cosmology. How then can we see
them emerge as {\it exact} concepts from a possible ab-initio theory for the
late-time wavefunction of the universe? In this letter we examine this question
in a simple but concrete setting, for the perturbative wavefunction in a class
of scalar field models where an ab-initio description of the wavefunction has
been given by "cosmological polytopes". Singularities of the wavefunction are
associated with facets of the polytope. One of the singularities --
corresponding to the "total energy pole" -- is well known to be associated with
the flat-space scattering amplitude. We show how the combinatorics and geometry
of this {\it scattering facet} of the cosmological polytope straightforwardly
leads to the emergence of Lorentz invariance and unitarity for the S-matrix.
Unitarity follows from the way boundaries of the scattering facet factorize
into products of lower-dimensional polytopes, while Lorentz invariance follows
from a contour integral representation of the canonical form, which exists for
any polytope, specialized to cosmological polytopes.
| 0.794625 | 0.709655 | 0.08497 |
2004.08340 | Data-driven Flood Emulation: Speeding up Urban Flood Predictions by Deep
Convolutional Neural Networks | Computational complexity has been the bottleneck of applying physically-based
simulations on large urban areas with high spatial resolution for efficient and
systematic flooding analyses and risk assessments. To address this issue of
long computational time, this paper proposes that the prediction of maximum
water depth rasters can be considered as an image-to-image translation problem
where the results are generated from input elevation rasters using the
information learned from data rather than by conducting simulations, which can
significantly accelerate the prediction process. The proposed approach was
implemented by a deep convolutional neural network trained on flood simulation
data of 18 designed hyetographs on three selected catchments. Multiple tests
with both designed and real rainfall events were performed and the results show
that the flood predictions by neural network uses only 0.5 % of time comparing
with physically-based approaches, with promising accuracy and ability of
generalizations. The proposed neural network can also potentially be applied to
different but relevant problems including flood predictions for urban layout
planning.
| Nowadays there is no field research which is not flooded with data. Among the
sciences, Astrophysics has always been driven by the analysis of massive
amounts of data. The development of new and more sophisticated observation
facilities, both ground-based and spaceborne, has led data more and more
complex (Variety), an exponential growth of both data Volume (i.e., in the
order of petabytes), and Velocity in terms of production and transmission.
Therefore, new and advanced processing solutions will be needed to process this
huge amount of data. We investigate some of these solutions, based on machine
learning models as well as tools and architectures for Big Data analysis that
can be exploited in the astrophysical context.
| 0.872977 | 0.665125 | 0.207852 |
2004.08341 | High-fidelity multistate STIRAP assisted by shortcut fields | Multistate stimulated Raman adiabatic passage (STIRAP) is a process which
allows for adiabatic population transfer between the two ends of a
chainwise-connected quantum system. The process requires large temporal areas
of the driving pulsed fields (pump and Stokes) in order to suppress the
nonadiabatic couplings and thereby to make adiabatic evolution possible. To
this end, in the present paper a variation of multistate STIRAP, which
accelerates and improves the population transfer, is presented. In addition to
the usual pump and Stokes fields it uses shortcut fields applied between the
states, which form the dark state of the system. The shortcuts cancel the
couplings between the dark state and the other adiabatic states thereby
resulting (in the ideal case) in a unit transition probability between the two
end states of the chain. Specific examples of five-state systems formed of the
magnetic sublevels of the transitions between two degenerate levels with
angular momenta $J_g=2$ and $J_e=1$ or $J_e=2$ are considered in detail, for
which the shortcut fields are derived analytically. The proposed method is
simpler than the usual "shortcuts to adiabaticity" recipe, which prescribes
shortcut fields between all states of the system, while the present proposal
uses shortcut fields between the sublevels forming the dark state only. The
results are of potential interest in applications where high-fidelity quantum
control is essential, e.g. quantum information, atom optics, formation of
ultracold molecules, cavity QED, etc.
| We explore an intriguing alternative for a fast and high-fidelity generation
of steady-state entanglement. By exponentially enhancing the atom-cavity
interaction, we obtain an exponentially-enhanced effective cooperativity of the
system, which results in a high fidelity of the state generation. Meanwhile, we
modulate the amplitudes of the driving fields to accelerate the population
transfer to a target state, e.g., a Bell state. An exponentially-shortened
stabilization time is thus predicted. Specifically, when the cooperativity of
the system is $C=30$, the fidelity of the acceleration scheme reaches $98.5\%$,
and the stabilization time is about 10 times shorter than that without
acceleration. Moreover, we find from the numerical simulation that the
acceleration scheme is robust against systematic and stochastic
(amplitude-noise) errors.
| 0.734855 | 0.655788 | 0.079068 |
2004.08342 | GW190412: Observation of a Binary-Black-Hole Coalescence with Asymmetric
Masses | We report the observation of gravitational waves from a binary-black-hole
coalescence during the first two weeks of LIGO's and Virgo's third observing
run. The signal was recorded on April 12, 2019 at 05:30:44 UTC with a network
signal-to-noise ratio of 19. The binary is different from observations during
the first two observing runs most notably due to its asymmetric masses: a ~30
solar mass black hole merged with a ~8 solar mass black hole companion. The
more massive black hole rotated with a dimensionless spin magnitude between
0.17 and 0.59 (90% probability). Asymmetric systems are predicted to emit
gravitational waves with stronger contributions from higher multipoles, and
indeed we find strong evidence for gravitational radiation beyond the leading
quadrupolar order in the observed signal. A suite of tests performed on
GW190412 indicates consistency with Einstein's general theory of relativity.
While the mass ratio of this system differs from all previous detections, we
show that it is consistent with the population model of stellar binary black
holes inferred from the first two observing runs.
| The Laser Interferometer Space Antenna (LISA) will produce a data stream
containing a vast number of overlapping sources: from strong signals generated
by the coalescence of massive black hole binary systems to much weaker
radiation form sub-stellar mass compact binaries and extreme-mass ratio
inspirals. It has been argued that the observation of weak signals could be
hampered by the presence of loud ones and that they first need to be removed to
allow such observations. Here we consider a different approach in which sources
are studied simultaneously within the framework of Bayesian inference. We
investigate the simplified case in which the LISA data stream contains
radiation from a massive black hole binary system superimposed over a (weaker)
quasi-monochromatic waveform generated by a white dwarf binary. We derive the
posterior probability density function of the model parameters using an
automatic Reversible Jump Markov Chain Monte Carlo algorithm (RJMCMC). We show
that the information about the sources and noise are retrieved at the expected
level of accuracy without the need of removing the stronger signal. Our
analysis suggests that this approach is worth pursuing further and should be
considered for the actual analysis of the LISA data.
| 0.898269 | 0.720768 | 0.177501 |
2004.08343 | Spectral gap for the growth-fragmentation equation via Harris's Theorem | We study the long-time behaviour of the growth-fragmentation equation, a
nonlocal linear evolution equation describing a wide range of phenomena in
structured population dynamics. We show the existence of a spectral gap under
conditions that generalise those in the literature by using a method based on
Harris's theorem, a result coming from the study of equilibration of Markov
processes. The difficulty posed by the non-conservativeness of the equation is
overcome by performing an $h$-transform, after solving the dual Perron
eigenvalue problem. The existence of the direct Perron eigenvector is then a
consequence of our methods, which prove exponential contraction of the
evolution equation. Moreover the rate of convergence is explicitly quantifiable
in terms of the dual eigenfunction and the coefficients of the equation.
| Weiyi Zhang noticed recently a gap in the proof of the main theorem of the
authors article "Tamed to compatible: Symplectic forms via moduli space
integration" [T] for the case when the symplectic 4-manifold in question has
first Betti number 2 (and necessarily self-dual second Betti number 1). This
note explains how to fill this gap.
| 0.890125 | 0.660154 | 0.229971 |
2004.08344 | Semi-Device-Independent Heterodyne-based Quantum Random Number Generator | Randomness is a fundamental feature of quantum mechanics, which is an
invaluable resource for both classical and quantum technologies. Practical
quantum random number generators (QRNG) usually need to trust their devices,
but their security can be jeopardized in case of imperfections or malicious
external actions. In this work, we present a robust implementation of a
Semi-Device-Independent QRNG that guarantees both security and fast generation
rates. The system works in a prepare and measure scenario where measurement and
source are untrusted, but a bound on the energy of the prepared states is
assumed. Our implementation exploits heterodyne detection, which offers
increased generation rate and improved long-term stability compared to
alternative measurement strategies. In particular, due to the tomographic
properties of heterodyne measurement, we can compensate for fast phase
fluctuations via post-processing, avoiding complex active phase stabilization
systems. As a result, our scheme combines high security and speed with a simple
setup featuring only commercial-off-the-shelf components, making it an
attractive solution in many practical scenarios.
| We consider a quantum graph consisting of a ring with Rashba hamiltonian and
an arbitrary number of semi-infinite wires attached. We describe the scattering
matrix for this system and investigate spin filtering for a three terminal
device.
| 0.893666 | 0.695821 | 0.197845 |
2004.08345 | Complexity Analysis of an Edge Preserving CNN SAR Despeckling Algorithm | SAR images are affected by multiplicative noise that impairs their
interpretations. In the last decades several methods for SAR denoising have
been proposed and in the last years great attention has moved towards deep
learning based solutions. Based on our last proposed convolutional neural
network for SAR despeckling, here we exploit the effect of the complexity of
the network. More precisely, once a dataset has been fixed, we carry out an
analysis of the network performance with respect to the number of layers and
numbers of features the network is composed of. Evaluation on simulated and
real data are carried out. The results show that deeper networks better
generalize on both simulated and real images.
| We consider the all pairs all shortest paths (APASP) problem, which maintains
the shortest path dag rooted at every vertex in a directed graph G=(V,E) with
positive edge weights. For this problem we present a decremental algorithm
(that supports the deletion of a vertex, or weight increases on edges incident
to a vertex). Our algorithm runs in amortized O(\vstar^2 \cdot \log n) time per
update, where n=|V|, and \vstar bounds the number of edges that lie on shortest
paths through any given vertex. Our APASP algorithm can be used for the
decremental computation of betweenness centrality (BC), a graph parameter that
is widely used in the analysis of large complex networks. No nontrivial
decremental algorithm for either problem was known prior to our work. Our
method is a generalization of the decremental algorithm of Demetrescu and
Italiano [DI04] for unique shortest paths, and for graphs with \vstar =O(n), we
match the bound in [DI04]. Thus for graphs with a constant number of shortest
paths between any pair of vertices, our algorithm maintains APASP and BC scores
in amortized time O(n^2 \log n) under decremental updates, regardless of the
number of edges in the graph.
| 0.889793 | 0.628309 | 0.261483 |
2004.08346 | An integrated light management system with real-time light measurement
and human perception | Illumination is important for well-being, productivity and safety across
several environments, including offices, retail shops and industrial
warehouses. Current techniques for setting up lighting require extensive and
expert support and need to be repeated if the scene changes. Here we propose
the first fully-automated light management system (LMS) which measures lighting
in real-time, leveraging an RGBD sensor and a radiosity-based light propagation
model. Thanks to the integration of light distribution and perception curves
into the radiosity, we outperform a commercial software (Relux) on a newly
introduced dataset. Furthermore, our proposed LMS is the first to estimate both
the presence and the attention of the people in the environment, as well as
their light perception. Our new LMS adapts therefore lighting to the scene and
human activity and it is capable of saving up to 66%, as we experimentally
quantify,without compromising the lighting quality.
| We are exploring the enhancement of models of agent behaviour with more
"human-like" decision making strategies than are presently available. Our
motivation is to developed with a view to as the decision analysis and support
for electric taxi company under the mission of energy saving and reduction of
CO2, in particular car-pool and car-sharing management policies. In order to
achieve the object of decision analysis for user, we provide a human-agents
interactive spatial behaviour to support user making decision real time. We
adopt passenger average waiting time and electric taxi average idle time as the
performance measures and decision support fro electric taxi company. Finally,
according to the analysis result, we demonstrate that our multi-agent
simulation and GUI can help users or companies quickly make a quality and
accurate decision to reduce the decision-making cost and time.
| 0.870859 | 0.630264 | 0.240596 |
2004.08347 | Aspects of multimode Kerr ring-down fitting | A black hole that is ringing down to quiescence emits gravitational radiation
of a very specific nature that can inform us of its mass and angular momentum,
test the no-hair theorem for black holes, and perhaps even give us additional
information about its progenitor system. This paper provides a detailed
description of, and investigation into the behavior of, multimode fitting of
the ring-down signal provided by numerical simulations. We find that there are
at least 3 well-motivated multimode fitting schemes that can be used. These
methods are tested against a specific numerical simulation to allow for
comparison to prior work.
| A novel interpretation is given of Dirac's "wave equation for the
relativistic electron" as a quantum-mechanical one-particle equation. In this
interpretation the electron and the positron are merely the two different
"topological spin" states of a single more fundamental particle, not distinct
particles in their own right. The new interpretation is backed up by the
existence of such bi-particle structures in general relativity, in particular
the ring singularity present in any spacelike section of the maximal
analytically extended, topologically non-trivial, electromagnetic Kerr-Newman
spacetime in the zero-gravity limit (here, "zero-gravity" means the limit $G\to
0$, where $G$ is Newton's constant of universal gravitation). This novel
interpretation resolves the dilemma that Dirac's wave equation seems to be
capable of describing both the electron and the positron in "external" fields
in many relevant situations, while the bi-spinorial wave function has only a
single position variable in its argument, not two - as it should if it were a
two-particle equation! A Dirac equation is formulated for a ring-like
bi-particle which interacts with a static point charges located elsewhere in
the topologically non-trivial physical space associated with the moving ring
bi-particle, the motion being governed by a de-Broglie-Bohm type law extracted
from the Dirac equation. As an application, the pertinent general-relativistic
zero-gravity Hydrogen problem is studied in the usual Born-Oppenheimer
approximation. Its spectral results suggest that the zero-$G$ Kerr-Newman
magnetic moment be identified with the so-called "anomalous magnetic moment of
the physical electron," not with the Bohr magneton, so that the ring radius is
only a tiny fraction of the electron's Compton wave length.
| 0.814414 | 0.608007 | 0.206406 |
2004.08348 | An Asynchronous Computability Theorem for Fair Adversaries | This paper proposes a simple topological characterization of a large class of
fair adversarial models via affine tasks: sub-complexes of the second iteration
of the standard chromatic subdivision. We show that the task computability of a
model in the class is precisely captured by iterations of the corresponding
affine task. Fair adversaries include, but are not restricted to, the models of
wait-freedom, t-resilience, and $k$-concurrency. Our results generalize and
improve all previously derived topological characterizations of the ability of
a model to solve distributed tasks.
| Guidelines for the management of atherosclerotic cardiovascular disease
(ASCVD) recommend the use of risk stratification models to identify patients
most likely to benefit from cholesterol-lowering and other therapies. These
models have differential performance across race and gender groups with
inconsistent behavior across studies, potentially resulting in an inequitable
distribution of beneficial therapy. In this work, we leverage adversarial
learning and a large observational cohort extracted from electronic health
records (EHRs) to develop a "fair" ASCVD risk prediction model with reduced
variability in error rates across groups. We empirically demonstrate that our
approach is capable of aligning the distribution of risk predictions
conditioned on the outcome across several groups simultaneously for models
built from high-dimensional EHR data. We also discuss the relevance of these
results in the context of the empirical trade-off between fairness and model
performance.
| 0.800615 | 0.617766 | 0.18285 |
2004.08349 | What do you Mean? The Role of the Mean Function in Bayesian Optimisation | Bayesian optimisation is a popular approach for optimising expensive
black-box functions. The next location to be evaluated is selected via
maximising an acquisition function that balances exploitation and exploration.
Gaussian processes, the surrogate models of choice in Bayesian optimisation,
are often used with a constant prior mean function equal to the arithmetic mean
of the observed function values. We show that the rate of convergence can
depend sensitively on the choice of mean function. We empirically investigate 8
mean functions (constant functions equal to the arithmetic mean, minimum,
median and maximum of the observed function evaluations, linear, quadratic
polynomials, random forests and RBF networks), using 10 synthetic test problems
and two real-world problems, and using the Expected Improvement and Upper
Confidence Bound acquisition functions.
We find that for design dimensions $\ge5$ using a constant mean function
equal to the worst observed quality value is consistently the best choice on
the synthetic problems considered. We argue that this worst-observed-quality
function promotes exploitation leading to more rapid convergence. However, for
the real-world tasks the more complex mean functions capable of modelling the
fitness landscape may be effective, although there is no clearly optimum
choice.
| Bayesian Inference and Information Bottleneck are the two most popular
objectives for neural networks, but they can be optimised only via a
variational lower bound: the Variational Information Bottleneck (VIB). In this
manuscript we show that the two objectives are actually equivalent to the
InfoMax: maximise the information between the data and the labels. The InfoMax
representation of the two objectives is not relevant only per se, since it
helps to understand the role of the network capacity, but also because it
allows us to derive a variational objective, the Variational InfoMax (VIM),
that maximises them directly without resorting to any lower bound. The
theoretical improvement of VIM over VIB is highlighted by the computational
experiments, where the model trained by VIM improves the VIB model in three
different tasks: accuracy, robustness to noise and representation quality.
| 0.896225 | 0.785998 | 0.110226 |
2004.08351 | Convergence of large population games to mean field games with
interaction through the controls | This work considers stochastic differential games with a large number of
players, whose costs and dynamics interact through the empirical distribution
of both their states and their controls. We develop a framework to prove
convergence of finite-player games to the asymptotic mean field game. Our
approach is based on the concept of propagation of chaos for forward and
backward weakly interacting particles which we investigate by fully
probabilistic methods, and which appear to be of independent interest. These
propagation of chaos arguments allow to derive moment and concentration bounds
for the convergence of both Nash equilibria and social optima in
non-cooperative and cooperative games, respectively. Incidentally, we also
obtain convergence of a system of second order parabolic partial differential
equations on finite dimensional spaces to a second order parabolic partial
differential equation on the Wasserstein space.
| This paper investigates the control of a massive population of UAVs such as
drones. The straightforward method of control of UAVs by considering the
interactions among them to make a flock requires a huge inter-UAV communication
which is impossible to implement in real-time applications. One method of
control is to apply the mean-field game (MFG) framework which substantially
reduces communications among the UAVs. However, to realize this framework,
powerful processors are required to obtain the control laws at different UAVs.
This requirement limits the usage of the MFG framework for real-time
applications such as massive UAV control. Thus, a function approximator based
on neural networks (NN) is utilized to approximate the solutions of
Hamilton-Jacobi-Bellman (HJB) and Fokker-Planck-Kolmogorov (FPK) equations.
Nevertheless, using an approximate solution can violate the conditions for
convergence of the MFG framework. Therefore, the federated learning (FL)
approach which can share the model parameters of NNs at drones, is proposed
with NN based MFG to satisfy the required conditions. The stability analysis of
the NN based MFG approach is presented and the performance of the proposed
FL-MFG is elaborated by the simulations.
| 0.834033 | 0.741341 | 0.092692 |
2004.08352 | Motion and Region Aware Adversarial Learning for Fall Detection with
Thermal Imaging | Automatic fall detection is a vital technology for ensuring health and safety
of people. Home based camera systems for fall detection often put people's
privacy at risk. Thermal cameras can partially/fully obfuscate facial features,
thus preserving the privacy of a person. Another challenge is the less
occurrence of falls in comparison to normal activities of daily living. As fall
occurs rarely, it is non-trivial to learn algorithms due to class imbalance. To
handle these problems, we formulate fall detection as an anomaly detection
within an adversarial framework using thermal imaging camera. We present a
novel adversarial network that comprise of two channel 3D convolutional auto
encoders; one each handling video sequences and optical flow, which then
reconstruct the thermal data and the optical flow input sequences. We introduce
a differential constraint, a technique to track the region of interest and a
joint discriminator to compute the reconstruction error. Larger reconstruction
error indicates the occurrence of fall in a video sequence. The experiments on
a publicly available thermal fall dataset show the superior results obtained in
comparison to standard baseline.
| We propose an approach to distinguish between correct and incorrect image
classifications. Our approach can detect misclassifications which either occur
$\it{unintentionally}$ ("natural errors"), or due to
$\it{intentional~adversarial~attacks}$ ("adversarial errors"), both in a single
$\it{unified~framework}$. Our approach is based on the observation that
correctly classified images tend to exhibit robust and consistent
classifications under certain image transformations (e.g., horizontal flip,
small image translation, etc.). In contrast, incorrectly classified images
(whether due to adversarial errors or natural errors) tend to exhibit large
variations in classification results under such transformations. Our approach
does not require any modifications or retraining of the classifier, hence can
be applied to any pre-trained classifier. We further use state of the art
targeted adversarial attacks to demonstrate that even when the adversary has
full knowledge of our method, the adversarial distortion needed for bypassing
our detector is $\it{no~longer~imperceptible~to~the~human~eye}$. Our approach
obtains state-of-the-art results compared to previous adversarial detection
methods, surpassing them by a large margin.
| 0.896768 | 0.673003 | 0.223765 |
2004.08353 | Privacy-Preserving Script Sharing in GUI-based
Programming-by-Demonstration Systems | An important concern in end user development (EUD) is accidentally embedding
personal information in program artifacts when sharing them. This issue is
particularly important in GUI-based programming-by-demonstration (PBD) systems
due to the lack of direct developer control of script contents. Prior studies
reported that these privacy concerns were the main barrier to script sharing in
EUD. We present a new approach that can identify and obfuscate the potential
personal information in GUI-based PBD scripts based on the uniqueness of
information entries with respect to the corresponding app GUI context. Compared
with the prior approaches, ours supports broader types of personal information
beyond explicitly pre-specified ones, requires minimal user effort, addresses
the threat of re-identification attacks, and can work with third-party apps
from any task domain. Our approach also recovers obfuscated fields locally on
the script consumer's side to preserve the shared scripts' transparency,
readability, robustness, and generalizability. Our evaluation shows that our
approach (1) accurately identifies the potential personal information in
scripts across different apps in diverse task domains; (2) allows end-user
developers to feel comfortable sharing their own scripts; and (3) enables
script consumers to understand the operation of shared scripts despite the
obfuscated fields.
| The widespread adoption of continuously connected smartphones and tablets
developed the usage of mobile applications, among which many use location to
provide geolocated services. These services provide new prospects for users:
getting directions to work in the morning, leaving a check-in at a restaurant
at noon and checking next day's weather in the evening are possible right from
any mobile device embedding a GPS chip. In these location-based applications,
the user's location is sent to a server, which uses them to provide contextual
and personalised answers. However, nothing prevents the latter from gathering,
analysing and possibly sharing the collected information, which opens the door
to many privacy threats. Indeed, mobility data can reveal sensitive information
about users, among which one's home, work place or even religious and political
preferences. For this reason, many privacy-preserving mechanisms have been
proposed these last years to enhance location privacy while using geolocated
services. This article surveys and organises contributions in this area from
classical building blocks to the most recent developments of privacy threats
and location privacy-preserving mechanisms. We divide the protection mechanisms
between online and offline use cases, and organise them into six categories
depending on the nature of their algorithm. Moreover, this article surveys the
evaluation metrics used to assess protection mechanisms in terms of privacy,
utility and performance. Finally, open challenges and new directions to address
the problem of computational location privacy are pointed out and discussed.
| 0.864261 | 0.696827 | 0.167434 |
2004.08354 | Complex Envelope Variable Approximation in Nonlinear Dynamics | We present the Complex Envelope Variable Approximation (CEVA) as the very
useful and compact method for the analysis of the essentially nonlinear
dynamical systems. It allows us to study both the stationary and non-stationary
dynamics even in the cases, when any small parameters are absent in the initial
problem. It is notable that the CEVA admits the analysis of the nonlinear
normal modes and their resonant interactions in the discrete systems without
any restrictions on the oscillation amplitudes. In this paper we formulate the
CEVA's formalism and demonstrate some non-trivial examples of its application.
The advantages of the method and possible problems are briefly discussed.
| Function approximation from input and output data pairs constitutes a
fundamental problem in supervised learning. Deep neural networks are currently
the most popular method for learning to mimic the input-output relationship of
a general nonlinear system, as they have proven to be very effective in
approximating complex highly nonlinear functions. In this work, we show that
identifying a general nonlinear function $y = f(x_1,\ldots,x_N)$ from
input-output examples can be formulated as a tensor completion problem and
under certain conditions provably correct nonlinear system identification is
possible. Specifically, we model the interactions between the $N$ input
variables and the scalar output of a system by a single $N$-way tensor, and
setup a weighted low-rank tensor completion problem with smoothness
regularization which we tackle using a block coordinate descent algorithm. We
extend our method to the multi-output setting and the case of partially
observed data, which cannot be readily handled by neural networks. Finally, we
demonstrate the effectiveness of the approach using several regression tasks
including some standard benchmarks and a challenging student grade prediction
task.
| 0.85979 | 0.70646 | 0.153329 |
2004.08355 | Towards an Interoperable Ecosystem of AI and LT Platforms: A Roadmap for
the Implementation of Different Levels of Interoperability | With regard to the wider area of AI/LT platform interoperability, we
concentrate on two core aspects: (1) cross-platform search and discovery of
resources and services; (2) composition of cross-platform service workflows. We
devise five different levels (of increasing complexity) of platform
interoperability that we suggest to implement in a wider federation of AI/LT
platforms. We illustrate the approach using the five emerging AI/LT platforms
AI4EU, ELG, Lynx, QURATOR and SPEAKER.
| The demand of transparency of clinical research results, the need of
accelerating the process of transferring innovation in the daily medical
practice as well as assuring patient safety and product efficacy make it
necessary to extend the functionality of traditional trial registries. These
new systems should combine different functionalities to track the information
exchange, support collaborative work, manage regulatory documents and monitor
the entire clinical investigation (CIV) lifecycle. This is the approach used to
develop MEDIS, a Medical Device Information System, described in this paper
under the perspective of the business process, and the underlining
architecture. Moreover, MEDIS was designed on the basis of Health Level 7 (HL7)
v.3 standards and methodology to make it interoperable with similar registries,
but also to facilitate information exchange between different health
information systems.
| 0.925729 | 0.633654 | 0.292075 |
2004.08356 | Goal-conditioned Batch Reinforcement Learning for Rotation Invariant
Locomotion | We propose a novel approach to learn goal-conditioned policies for locomotion
in a batch RL setting. The batch data is collected by a policy that is not
goal-conditioned. For the locomotion task, this translates to data collection
using a policy learnt by the agent for walking straight in one direction, and
using that data to learn a goal-conditioned policy that enables the agent to
walk in any direction. The data collection policy used should be invariant to
the direction the agent is facing i.e. regardless of its initial orientation,
the agent should take the same actions to walk forward. We exploit this
property to learn a goal-conditioned policy using two key ideas: (1) augmenting
data by generating trajectories with the same actions in different directions,
and (2) learning an encoder that enforces invariance between these rotated
trajectories with a Siamese framework. We show that our approach outperforms
existing RL algorithms on 3-D locomotion agents like Ant, Humanoid and
Minitaur.
| While recent progress has spawned very powerful machine learning systems,
those agents remain extremely specialized and fail to transfer the knowledge
they gain to similar yet unseen tasks. In this paper, we study a simple
reinforcement learning problem and focus on learning policies that encode the
proper invariances for generalization to different settings. We evaluate three
potential methods for policy generalization: data augmentation, meta-learning
and adversarial training. We find our data augmentation method to be effective,
and study the potential of meta-learning and adversarial learning as
alternative task-agnostic approaches.
Keywords: reinforcement learning, generalization, data augmentation,
meta-learning, adversarial learning.
| 0.892117 | 0.743098 | 0.149019 |
2004.08357 | Geodesic Connectedness of Affine Manifolds | We discuss new sufficient conditions under which an affine manifold
$(M,\nabla)$ is geodesically connected. These conditions are shown to be
essentially weaker than those discussed in groundbreaking work by Beem and
Parker and in recent work by Alexander and Karr, with the added advantage that
they yield an elementary proof of the main result.
| For functions on generalised connected surfaces (of any dimensions) with
boundary and mean curvature, we establish an oscillation estimate in which the
mean curvature enters in a novel way. As application we prove an a priori
estimate of the geodesic diameter of compact connected smooth immersions in
terms of their boundary data and mean curvature. These results are developed in
the framework of varifolds. For this purpose, we establish that the notion of
indecomposability is the appropriate substitute for connectedness and that it
has a strong regularising effect; we thus obtain a new natural class of
varifolds to study. Finally, our development leads to a variety of questions
that are of substance both in the smooth and the nonsmooth setting.
| 0.933046 | 0.847726 | 0.08532 |
2004.08358 | On the intersection of minimal hypersurfaces of $S^k$ | It is known since the work of Frankel that two compactly immersed minimal
hypersurfaces in a manifold with positive Ricci curvature must have an
intersection point. Several generalizations of this result can be found in the
literature, for example in the works of Lawson, Petersen and Wilhelm, among
others. In the special case of minimal hypersurfaces of $S^k$, we prove a
stronger version of Frankel's theorem. Namely, we show that if two compact
minimal hypersurfaces $M_1$, $M_2$ of $S^k$ and a point $\mathbf{p}\in S^k$ are
given, then $M_1$ and $M_2$ have an intersection point in the hemisphere with
respect to $\mathbf{p}$. As a corollary of this result, we give an alternative
proof to Ros' two-piece property of minimal surfaces of $S^3$, for the general
dimension case.
| In this paper we propose and prove an explicit formula for computing the
degree of Fano schemes of linear subspaces on general hypersurfaces. The method
used here is based on the localization theorem and Bott's residue formula in
equivariant intersection theory.
| 0.890479 | 0.804402 | 0.086077 |
2004.08359 | On homotopy continuation based singularity distance computations for
3-RPR manipulators | It is known that parallel manipulators suffer from singular configurations.
Evaluating the distance between a given configuration to the closest singular
one is of interest for industrial applications (e.g.\ singularity-free path
planning). For parallel manipulators of Stewart-Gough type, geometric
meaningful distance measures are known, which are used for the computation of
the singularity distance as the global minimizer of an optimization problem. In
the case of hexapods and linear pentapods the critical points of the
corresponding polynomial Lagrange function cannot be found by the Grobner basis
method due to the degree and number of unknowns. But this polynomial system of
equations can be solved by software tools of numerical algebraic geometry
relying on homotopy continuation. To gain experiences for the treatment of the
mentioned spatial manipulators, this paper attempts to find minimal
multi-homogeneous Bezout numbers for the homotopy continuation based
singularity distance computation with respect to various algebraic motion
representations of planar Euclidean/equiform kinematics. The homogenous and
non-homogenous representations under study are compared and discussed based on
the 3-RPR manipulator.
| Understanding continuous human actions is a non-trivial but important problem
in computer vision. Although there exists a large corpus of work in the
recognition of action sequences, most approaches suffer from problems relating
to vast variations in motions, action combinations, and scene contexts. In this
paper, we introduce a novel method for semantic segmentation and recognition of
long and complex manipulation action tasks, such as "preparing a breakfast" or
"making a sandwich". We represent manipulations with our recently introduced
"Semantic Event Chain" (SEC) concept, which captures the underlying
spatiotemporal structure of an action invariant to motion, velocity, and scene
context. Solely based on the spatiotemporal interactions between manipulated
objects and hands in the extracted SEC, the framework automatically parses
individual manipulation streams performed either sequentially or concurrently.
Using event chains, our method further extracts basic primitive elements of
each parsed manipulation. Without requiring any prior object knowledge, the
proposed framework can also extract object-like scene entities that exhibit the
same role in semantically similar manipulations. We conduct extensive
experiments on various recent datasets to validate the robustness of the
framework.
| 0.910498 | 0.679235 | 0.231264 |
2004.08360 | Scaling properties of the dynamics at first-order quantum transitions
when boundary conditions favor one of the two phases | We address the out-of-equilibrium dynamics of a many-body system when one of
its Hamiltonian parameters is driven across a first-order quantum transition
(FOQT). In particular, we consider systems subject to fixed boundary
conditions, favoring one of the two phases separated by the FOQT: more
precisely, boundary conditions that favor the same magnetized phase (EFBC) or
opposite phases (OFBC) at the two ends of the chain. These issues are
investigated within the paradigmatic one-dimensional quantum Ising model, in
which FOQTs are driven by the longitudinal magnetic field h. We study the
dynamic behavior for an instantaneous quench and for a protocol in which h is
slowly varied across the FOQT. We develop a dynamic finite-size scaling theory
for both EFBC and OFBC, which displays some remarkable differences with respect
to the case of neutral boundary conditions. The corresponding relevant time
scale shows a qualitative different size dependence in the two cases: it
increases exponentially with the size in the case of EFBC, and as a power of
the size in the case of OFBC.
| We study the out of equilibrium dynamics of the Fermionic Hubbard Model
induced by a linear ramp of the repulsive interaction $U$ from the metallic
state through the Mott transition. To this extent we use a time dependent
Gutzwiller variational method and complement this analysis with the inclusion
of quantum fluctuations at the leading order, in the framework of a $Z_2$ slave
spin theory. We discuss the dynamics during the ramp and the issue of
adiabaticity through the scaling of the excitation energy with the ramp
duration $\tau$. In addition, we study the dynamics for times scales longer
than the ramp time, when the system is again isolated and the total energy
conserved. We establish the existence of a dynamical phase transition analogous
to the one present in the sudden quench case and discuss its properties as a
function of final interaction and ramp duration. Finally we discuss the role of
quantum fluctuations on the mean field dynamics for both long ramps, where spin
wave theory is sufficient, and for very short ramps, where a self consistent
treatment of quantum fluctuations is required in order to obtain relaxation.
| 0.901778 | 0.796672 | 0.105105 |
2004.08361 | Unsupervised Discovery of Implicit Gender Bias | Despite their prevalence in society, social biases are difficult to define
and identify, primarily because human judgements in this domain can be
unreliable. Therefore, we take an unsupervised approach to identifying gender
bias at a comment or sentence level, and present a model that can surface text
likely to contain bias. The main challenge in this approach is forcing the
model to focus on signs of implicit bias, rather than other artifacts in the
data. Thus, the core of our methodology relies on reducing the influence of
confounds through propensity score matching and adversarial learning. Our
analysis shows how biased comments directed towards female politicians contain
mixed criticisms and references to their spouses, while comments directed
towards other female public figures focus on appearance and sexualization.
Ultimately, our work offers a way to capture subtle biases in various domains
without relying on subjective human judgements.
| We examine the utility of implicit behavioral cues in the form of EEG brain
signals and eye movements for gender recognition (GR) and emotion recognition
(ER). Specifically, the examined cues are acquired via low-cost, off-the-shelf
sensors. We asked 28 viewers (14 female) to recognize emotions from unoccluded
(no mask) as well as partially occluded (eye and mouth masked) emotive faces.
Obtained experimental results reveal that (a) reliable GR and ER is achievable
with EEG and eye features, (b) differential cognitive processing especially for
negative emotions is observed for males and females and (c) some of these
cognitive differences manifest under partial face occlusion, as typified by the
eye and mouth mask conditions.
| 0.865526 | 0.748868 | 0.116659 |
2004.08362 | Derivation of Regularized Field Equations for the Einstein-Gauss-Bonnet
Theory in Four Dimensions | We propose a regularization procedure for the novel Einstein-Gauss-Bonnet
theory of gravity, which produces a set of field equations that can be written
in closed form in four dimensions. Our method consists of introducing a counter
term into the action, and does not rely on the embedding or compactification of
any higher-dimensional spaces. This counter term is sufficient to cancel the
divergence in the action that would otherwise occur, and exactly reproduces the
trace of the field equations of the original formulation of the theory. All
other field equations display an extra scalar gravitational degree of freedom
in the gravitational sector. We discuss issues concerning the equivalence
between our new regularized theory and the original.
| In Gauss-Bonnet braneworld cosmology, the Friedmann equation of our
four-dimensional universe on 3-brane is modified in a high energy regime
(Gauss-Bonnet regime), while the standard expansion law is reproduced in low
energies (standard regime). We investigate the Gauss-Bonnet braneworld
cosmological effect on the thermal relic density of cold dark matter when the
freeze-out of the dark matter occurs in the Gaugss-Bonnet regime. We find that
the resultant relic density is considerably reduced when the transition
temperature, which connects the Gauss-Bonnet regime with the standard regime,
is low enough. This result is in sharp contrast with the result previously
obtained in the Randall-Sundrum braneworld cosmology, where the relic density
is enhanced.
| 0.923593 | 0.763609 | 0.159984 |
2004.08364 | Networked and Autonomous Model-scale Vehicles for Experiments in
Research and Education | This paper presents the $\mathrm{\mu}$Car, a 1:18 model-scale vehicle with
Ackermann steering geometry developed for experiments in networked and
autonomous driving in research and education. The vehicle is open source,
moderately costed and highly flexible, which allows for many applications. It
is equipped with an inertial measurement unit and an odometer and obtains its
pose via WLAN from an indoor positioning system. The two supported operating
modes for controlling the vehicle are (1) computing control inputs on external
hardware, transmitting them via WLAN and applying received inputs to the
actuators and (2) transmitting a reference trajectory via WLAN, which is then
followed by a controller running on the onboard Raspberry Pi Zero W. The design
allows identical vehicles to be used at the same time in order to conduct
experiments with a large amount of networked agents.
| Machine learning based system are increasingly being used for sensitive tasks
such as security surveillance, guiding autonomous vehicle, taking investment
decisions, detecting and blocking network intrusion and malware etc. However,
recent research has shown that machine learning models are venerable to attacks
by adversaries at all phases of machine learning (eg, training data collection,
training, operation). All model classes of machine learning systems can be
misled by providing carefully crafted inputs making them wrongly classify
inputs. Maliciously created input samples can affect the learning process of a
ML system by either slowing down the learning process, or affecting the
performance of the learned mode, or causing the system make error(s) only in
attacker's planned scenario. Because of these developments, understanding
security of machine learning algorithms and systems is emerging as an important
research area among computer security and machine learning researchers and
practitioners. We present a survey of this emerging area in machine learning.
| 0.846692 | 0.619915 | 0.226777 |
2004.08365 | Early forecasts of the evolution of the COVID-19 outbreaks and
quantitative assessment of the effectiveness of countering measures | We discovered that the time evolution of the inverse fractional daily growth
of new infections, N/dN, in the current outbreak of COVID-19 is accurately
described by a universal function, namely the two-parameter Gumbel cumulative
function, in all countries that we have investigated. While the two Gumbel
parameters, as determined bit fits to the data, vary from country to country
(and even within different regions of the same country), reflecting the
diversity and efficacy of the adopted containment measures, the functional form
of the evolution of N/dN appears to be universal. The result of the fit in a
given region or country appears to be stable against variations of the selected
time interval. This makes it possible to robustly estimate the two parameters
from the data data even over relatively small time periods. In turn, this
allows one to predict with large advance and well-controlled confidence levels,
the time of the peak in the daily new infections, its magnitude and duration
(hence the total infections), as well as the time when the daily new infections
decrease to a pre-set value (e.g. less than about 2 new infections per day per
million people), which can be very useful for planning the reopening of
economic and social activities. We use this formalism to predict and compare
these key features of the evolution of the COVID-19 disease in a number of
countries and provide a quantitative assessment of the degree of success in in
their efforts to countain the outbreak.
| CT imaging is crucial for diagnosis, assessment and staging COVID-19
infection. Follow-up scans every 3-5 days are often recommended for disease
progression. It has been reported that bilateral and peripheral ground glass
opacification (GGO) with or without consolidation are predominant CT findings
in COVID-19 patients. However, due to lack of computerized quantification
tools, only qualitative impression and rough description of infected areas are
currently used in radiological reports. In this paper, a deep learning
(DL)-based segmentation system is developed to automatically quantify infection
regions of interest (ROIs) and their volumetric ratios w.r.t. the lung. The
performance of the system was evaluated by comparing the automatically
segmented infection regions with the manually-delineated ones on 300 chest CT
scans of 300 COVID-19 patients. For fast manual delineation of training samples
and possible manual intervention of automatic results, a human-in-the-loop
(HITL) strategy has been adopted to assist radiologists for infection region
segmentation, which dramatically reduced the total segmentation time to 4
minutes after 3 iterations of model updating. The average Dice simiarility
coefficient showed 91.6% agreement between automatic and manual infaction
segmentations, and the mean estimation error of percentage of infection (POI)
was 0.3% for the whole lung. Finally, possible applications, including but not
limited to analysis of follow-up CT scans and infection distributions in the
lobes and segments correlated with clinical findings, were discussed.
| 0.814627 | 0.713991 | 0.100636 |
2004.08366 | DynamicEmbedding: Extending TensorFlow for Colossal-Scale Applications | One of the limitations of deep learning models with sparse features today
stems from the predefined nature of their input, which requires a dictionary be
defined prior to the training. With this paper we propose both a theory and a
working system design which remove this limitation, and show that the resulting
models are able to perform better and efficiently run at a much larger scale.
Specifically, we achieve this by decoupling a model's content from its form to
tackle architecture evolution and memory growth separately. To efficiently
handle model growth, we propose a new neuron model, called DynamicCell, drawing
inspiration from from the free energy principle [15] to introduce the concept
of reaction to discharge non-digestive energy, which also subsumes gradient
descent based approaches as its special cases. We implement DynamicCell by
introducing a new server into TensorFlow to take over most of the work
involving model growth. Consequently, it enables any existing deep learning
models to efficiently handle arbitrary number of distinct sparse features
(e.g., search queries), and grow incessantly without redefining the model. Most
notably, one of our models, which has been reliably running in production for
over a year, is capable of suggesting high quality keywords for advertisers of
Google Smart Campaigns and achieved significant accuracy gains based on a
challenging metric -- evidence that data-driven, self-evolving systems can
potentially exceed the performance of traditional rule-based approaches.
| Recently algorithms incorporating second order curvature information have
become popular in training neural networks. The Nesterov's Accelerated
Quasi-Newton (NAQ) method has shown to effectively accelerate the BFGS
quasi-Newton method by incorporating the momentum term and Nesterov's
accelerated gradient vector. A stochastic version of NAQ method was proposed
for training of large-scale problems. However, this method incurs high
stochastic variance noise. This paper proposes a stochastic variance reduced
Nesterov's Accelerated Quasi-Newton method in full (SVR-NAQ) and limited
(SVRLNAQ) memory forms. The performance of the proposed method is evaluated in
Tensorflow on four benchmark problems - two regression and two classification
problems respectively. The results show improved performance compared to
conventional methods.
| 0.780192 | 0.736 | 0.044192 |
2004.08367 | An $L^2$-Cheeger M\"uller theorem on compact manifolds-with-boundary | We generalize a Cheeger-M\"uller type theorem for flat, unitary bundles on
infinite covering spaces over manifolds-with-boundary, proven by Burghelea,
Friedlander and Kappeller arXiv:dg-ga/9510010 [math.DG]. Employing recent
anomaly results by Br\"uning, Ma and Zhang, we prove an analogous statement for
a general flat bundle that is only required to have a unimodular restriction to
the boundary.
| Inspired by the work of Burq and Tzvetkov (Invent. math. 173(2008),
449-475.), firstly, we construct the local strong solution to the cubic
nonlinear wave equation with random data for a large set of initial data in
$H^{s}(M)$ with $s\geq \frac{5}{14}$, where M is a three dimensional compact
manifold with boundary, moreover, our result improves the result of Theorem 2
in (Invent. math. 173(2008), 449-475.); secondly, we construct the local strong
solution to the quintic nonlinear wave equation with random data for a large
set of initial data in $H^{s}(M)$ with $s\geq\frac{1}{6}$, where M is a two
dimensional compact boundaryless manifold; finally, we construct the local
strong solution to the quintic nonlinear wave equation with random data for a
large set of initial data in $H^{s}(M)$ with $s\geq \frac{23}{90}$, where M is
a two dimensional compact manifold with boundary.
| 0.859634 | 0.690062 | 0.169571 |
2004.08369 | Turning in the landscape: a new mechanism for generating Primordial
Black Holes | We propose a new model-independent mechanism for producing Primordial Black
Holes during a period of multi-field inflation. The required enhancement of
primordial fluctuations compared to their value at CMB scales naturally occurs
when the trajectory in field space exhibits a limited period of strongly
non-geodesic motion (i.e. strong bending). Such trajectories with multiple
dynamical fields are motivated by the search for ultraviolet completions of
inflation. The mechanism presented has numerous specific features that can be
understood analytically for sufficiently smooth turns. By deriving tentative
results for the Primordial Black Hole mass spectrum we study how the parameters
describing the turn affect the properties of the resulting Primordial Black
Hole population.
| When magnetic field lines thread a rotating black hole's horizon and connect
with remote astrophysical loads, the rotational energy of the black hole can be
extracted through the Blandford-Znajek mechanism. Due to the rotation of the
black hole, the magnetic field lines are twisted and toroidal components are
generated. So poloidal electric currents are induced and the black hole's
rotational energy is transported to the astrophysical loads through Poynting
flux. The Blandford-Znajek mechanism has been considered to be a possible
process for powering extragalactic jets.
In this paper we show that due to the screw instability of magnetic field,
the toroidal components of the magnetic field, and thus the poloidal currents,
cannot exceed the limits given by the Kruskal-Shafranov criterion. This
significantly lowers the power of the Blandford-Znajek mechanism when the loads
are far from the black hole. So the Blandford-Znajek mechanism can only work
efficiently within the neighborhood of the black hole. The implications of the
results for the scenario of extragalactic jets powered by the Blandford-Znajek
mechanism are discussed.
| 0.878379 | 0.732192 | 0.146187 |
2004.08370 | Cohomology of generalised configuration spaces of points on
$\mathbb{R}^r$ | We compute the cohomology ring of a generalised type of configuration space
of points in $\mathbb{R}^r$. This configuration space is indexed by a graph. In
the case the graph is complete the result is known and it is due to Arnold and
Cohen. However, our computations give a generalisation to any graph and an
alternative proof of the classical result. Moreover, we show that there are
deletion-contraction short exact sequences for this cohomology rings.
| We prove that if the Hardy-Littlewood maximal operator is bounded on a
separable Banach function space $X(\mathbb{R}^n)$ and on its associate space
$X'(\mathbb{R}^n)$ and a maximally modulated Calder\'on-Zygmund singular
integral operator $T^\Phi$ is of weak type $(r,r)$ for all $r\in(1,\infty)$,
then $T^\Phi$ extends to a bounded operator on $X(\mathbb{R}^n)$. This theorem
implies the boundedness of the maximally modulated Hilbert transform on
variable Lebesgue spaces $L^{p(\cdot)}(\mathbb{R})$ under natural assumptions
on the variable exponent $p:\mathbb{R}\to(1,\infty)$. Applications of the above
result to the boundedness and compactness of pseudodifferential operators with
$L^\infty(\mathbb{R},V(\mathbb{R}))$-symbols on variable Lebesgue spaces
$L^{p(\cdot)}(\mathbb{R})$ are considered. Here the Banach algebra
$L^\infty(\mathbb{R},V(\mathbb{R}))$ consists of all bounded measurable
$V(\mathbb{R})$-valued functions on $\mathbb{R}$ where $V(\mathbb{R})$ is the
Banach algebra of all functions of bounded total variation.
| 0.92239 | 0.716158 | 0.206232 |
2004.08371 | Exploring the Combination of Contextual Word Embeddings and Knowledge
Graph Embeddings | ``Classical'' word embeddings, such as Word2Vec, have been shown to capture
the semantics of words based on their distributional properties. However, their
ability to represent the different meanings that a word may have is limited.
Such approaches also do not explicitly encode relations between entities, as
denoted by words. Embeddings of knowledge bases (KB) capture the explicit
relations between entities denoted by words, but are not able to directly
capture the syntagmatic properties of these words. To our knowledge, recent
research have focused on representation learning that augment the strengths of
one with the other. In this work, we begin exploring another approach using
contextual and KB embeddings jointly at the same level and propose two tasks --
an entity typing and a relation typing task -- that evaluate the performance of
contextual and KB embeddings. We also evaluated a concatenated model of
contextual and KB embeddings with these two tasks, and obtain conclusive
results on the first task. We hope our work may contribute as a basis for
models and datasets that develop in the direction of this approach.
| This paper addresses the problem of mapping natural language text to
knowledge base entities. The mapping process is approached as a composition of
a phrase or a sentence into a point in a multi-dimensional entity space
obtained from a knowledge graph. The compositional model is an LSTM equipped
with a dynamic disambiguation mechanism on the input word embeddings (a
Multi-Sense LSTM), addressing polysemy issues. Further, the knowledge base
space is prepared by collecting random walks from a graph enhanced with textual
features, which act as a set of semantic bridges between text and knowledge
base entities. The ideas of this work are demonstrated on large-scale
text-to-entity mapping and entity classification tasks, with state of the art
results.
| 0.865654 | 0.82017 | 0.045484 |
2004.08372 | Holographic Naturalness | The Holographic Naturalness (HN) is a new paradigm towards an explanation of
the Cosmological Constant (CC) and the Higgs Hierarchy (HH) in the Universe.
Motivated by the Holographic Principle, and inspired by the (A)dS/CFT
correspondence, we elaborate on the possibility and on the cosmological
consequences of a fundamental intrinsic disorder and temperature in "vacuo". We
postulate that the zero vacuum entropy is provided by a large number of quantum
hair fields, the "hairons". The quantum hairon gas in space-time induces an
effective decoherence effect to the Standard Model (SM) particle sector. This
is leading to an entropic reinterpretation of UV divergent contributions to CC
and HH: we will show that, in both the cases, the large number of
re-scatterings on the hairon ensamble suppresses any radiative instabilities.
The CC and HH problems are illusions envisaged by a conscious observer, having
access on the limited amount of informations from SM tests: both the issues are
originated from our ignorance of the hidden entropy intrinsically stored in the
space-time. The HN suggests to search for effective decoherence effects in
particle physics observables such as effective CPT, Unitarity and Energy
violations. Regarding the HH, the HN does not introduce any new particles or
interactions around the TeV-scale: we do not expect for any signatures, at LHC
and any future high energy colliders, related to the Higgs UV completion in a
Wilsonian sense.
| We propose the modified form of the conventional holographic conserved
charges which provides us the frame-independent expressions for charges. This
form is also preferable to the conventional one since it is independent of the
holographic renormalization scheme. We show the frame and scheme independence
through the matching of our holographic expression to the covariant bulk
expression of conserved charges. As an explicit example, we consider
five-dimensional AdS Kerr black holes and show that our form of holographic
conserved charges gives us the identical expressions in the rotating and
non-rotating frames.
| 0.820166 | 0.749361 | 0.070805 |
2004.08373 | Active-Learning in the Online Environment | Online learning is convenient for many learners; it gives them the
possibility of learning without being restricted by attending a particular
classroom at a specific time. While this exciting opportunity can let its users
manage their life in a better way, many students may suffer from feeling
isolated or disconnected from the community that consists of the instructor and
the learners. Lack of interaction among students and the instructor may
negatively impact their learnings and cause adverse emotions like anxiety,
sadness, and depression. Apart from the feeling of loneliness, sometimes
students may come up with different issues or questions as they study the
course, which can stop them from confidently progressing or make them feel
discouraged if we leave them alone. To promote interaction and to overcome the
limitations of geographic distance in online education, we propose a customized
design, Tele-instruction, with useful features supplement to the traditional
online learning systems to enable peers and the instructor of the course to
interact at their conveniences once needed. The designed system can help
students address their questions through the answers already provided to other
students or ask for the instructor's point of view by two-way communication,
similar to face-to-face forms of educational experiences. We believe our
approach can assist in filling the gaps when online learning falls behind the
traditional classroom-based learning systems.
| Influential users play an important role in online social networks since
users tend to have an impact on one other. Therefore, the proposed work
analyzes users and their behavior in order to identify influential users and
predict user participation. Normally, the success of a social media site is
dependent on the activity level of the participating users. For both online
social networking sites and individual users, it is of interest to find out if
a topic will be interesting or not. In this article, we propose association
learning to detect relationships between users. In order to verify the
findings, several experiments were executed based on social network analysis,
in which the most influential users identified from association rule learning
were compared to the results from Degree Centrality and Page Rank Centrality.
The results clearly indicate that it is possible to identify the most
influential users using association rule learning. In addition, the results
also indicate a lower execution time compared to state-of-the-art methods.
| 0.738933 | 0.670347 | 0.068586 |
2004.08374 | On Regularity of Max-CSPs and Min-CSPs | We study approximability of regular constraint satisfaction problems, i.e.,
CSPs where each variable in an instance has the same number of occurrences. In
particular, we show that for any CSP $\Lambda$, existence of an $\alpha$
approximation algorithm for unweighted regular Max-CSP $\Lambda$ implies
existence of an $\alpha-o(1)$ approximation algorithm for weighted Max-CSP
$\Lambda$ in which regularity of the instances is not imposed. We also give an
analogous result for Min-CSPs, and therefore show that up to arbitrarily small
error it is sufficient to conduct the study of approximability of CSPs only on
regular unweighted instances.
| The min-max kernel is a generalization of the popular resemblance kernel
(which is designed for binary data). In this paper, we demonstrate, through an
extensive classification study using kernel machines, that the min-max kernel
often provides an effective measure of similarity for nonnegative data. As the
min-max kernel is nonlinear and might be difficult to be used for industrial
applications with massive data, we show that the min-max kernel can be
linearized via hashing techniques. This allows practitioners to apply min-max
kernel to large-scale applications using well matured linear algorithms such as
linear SVM or logistic regression.
The previous remarkable work on consistent weighted sampling (CWS) produces
samples in the form of ($i^*, t^*$) where the $i^*$ records the location (and
in fact also the weights) information analogous to the samples produced by
classical minwise hashing on binary data. Because the $t^*$ is theoretically
unbounded, it was not immediately clear how to effectively implement CWS for
building large-scale linear classifiers. In this paper, we provide a simple
solution by discarding $t^*$ (which we refer to as the "0-bit" scheme). Via an
extensive empirical study, we show that this 0-bit scheme does not lose
essential information. We then apply the "0-bit" CWS for building linear
classifiers to approximate min-max kernel classifiers, as extensively validated
on a wide range of publicly available classification datasets. We expect this
work will generate interests among data mining practitioners who would like to
efficiently utilize the nonlinear information of non-binary and nonnegative
data.
| 0.853296 | 0.746844 | 0.106452 |
2004.08375 | Low-stretch spanning trees of graphs with bounded width | We study the problem of low-stretch spanning trees in graphs of bounded
width: bandwidth, cutwidth, and treewidth. We show that any simple connected
graph $G$ with a linear arrangement of bandwidth $b$ can be embedded into a
distribution $\mathcal T$ of spanning trees such that the expected stretch of
each edge of $G$ is $O(b^2)$. Our proof implies a linear time algorithm for
sampling from $\mathcal T$. Therefore, we have a linear time algorithm that
finds a spanning tree of $G$ with average stretch $O(b^2)$ with high
probability. We also describe a deterministic linear-time algorithm for
computing a spanning tree of $G$ with average stretch $O(b^3)$. For graphs of
cutwidth $c$, we construct a spanning tree with stretch $O(c^2)$ in linear
time. Finally, when $G$ has treewidth $k$ we provide a dynamic programming
algorithm computing a minimum stretch spanning tree of $G$ that runs in
polynomial time with respect to the number of vertices of $G$.
| A spanning 2-forest separating vertices $u$ and $v$ of an undirected
connected graph is a spanning forest with 2 components such that $u$ and $v$
are in distinct components. Aside from their combinatorial significance,
spanning 2-forests have an important application to the calculation of
resistance distance or effective resistance. The resistance distance between
vertices $u$ and $v$ in a graph representing an electrical circuit with unit
resistance on each edge is the number of spanning 2-forests separating $u$ and
$v$ divided by the number of spanning trees in the graph. There are also
well-known matrix theoretic methods for calculating resistance distance, but
the way in which the structure of the underlying graph determines resistance
distance via these methods is not well understood.
For any connected graph $G$ with a 2-separator separating vertices $u$ and
$v$, we show that the number of spanning trees and spanning 2-forests
separating $u$ and $v$ can be expressed in terms of these same quantities for
the smaller separated graphs, which makes computation significantly more
tractable. An important special case is the preservation of the number of
spanning 2-forests if $u$ and $v$ are in the same smaller graph. In this paper
we demonstrate that this method of calculating resistance distance is more
suitable for certain structured families of graphs than the more standard
methods. We apply our results to count the number of spanning 2-forests and
calculate the resistance distance in a family of Sierpinski triangles and in
the family of linear 2-trees with a single bend.
| 0.924956 | 0.790217 | 0.134739 |
2004.08377 | ECCOLA -- a Method for Implementing Ethically Aligned AI Systems | Various recent Artificial Intelligence (AI) system failures, some of which
have made the global headlines, have highlighted issues in these systems. These
failures have resulted in calls for more ethical AI systems that better take
into account their effects on various stakeholders. However, implementing AI
ethics into practice is still an on-going challenge. High-level guidelines for
doing so exist, devised by governments and private organizations alike, but
lack practicality for developers. To address this issue, in this paper, we
present a method for implementing AI ethics. The method, ECCOLA, has been
iteratively developed using a cyclical action design research approach. The
method makes the high-level AI ethics principles more practical, making it
possible for developers to more easily implement them in practice.
| Under the headline "AI safety", a wide-reaching issue is being discussed,
whether in the future some "superhuman artificial intelligence" /
"superintelligence" could could pose a threat to humanity. In addition, the
late Steven Hawking warned that the rise of robots may be disastrous for
mankind. A major concern is that even benevolent superhuman artificial
intelligence (AI) may become seriously harmful if its given goals are not
exactly aligned with ours, or if we cannot specify precisely its objective
function. Metaphorically, this is compared to king Midas in Greek mythology,
who expressed the wish that everything he touched should turn to gold, but
obviously this wish was not specified precisely enough. In our view, this
sounds like requirements problems and the challenge of their precise
formulation. (To our best knowledge, this has not been pointed out yet.) As
usual in requirements engineering (RE), ambiguity or incompleteness may cause
problems. In addition, the overall issue calls for a major RE endeavor,
figuring out the wishes and the needs with regard to a superintelligence, which
will in our opinion most likely be a very complex software-intensive system
based on AI. This may even entail theoretically defining an extended
requirements problem.
| 0.888453 | 0.675528 | 0.212925 |
2004.08378 | Can We Use Stack Overflow as a Source of Explainable Bug-fix Data? | Bug-fix data sets are important for building various software engineering
support tools, such as program repair or Application Programming Interface
(API) misuse detection. These data sets are typically constructed from mining
commit history in version-control systems. In this paper, we investigate
whether Stack Overflow can be used as an additional source for bug-fix or code
improvement data sets. Comments on Stack Overflow provide an effective way for
developers to point out problems with existing answers, alternative solutions,
or pitfalls. Given its crowd-sourced nature, answers are often updated to
incorporate these suggestions. In this paper, we mine comment-edit pairs from
Stack Overflow and investigate their potential usefulness for constructing the
above data sets. These comment-edit pairs have the added benefit of having
concrete descriptions/explanations of why the change is needed as well as
potentially having less tangled changes to deal with. We first design a
technique to extract related comment-edit pairs and then qualitatively and
quantitatively investigate the nature of these pairs. We find that the majority
of comment-edit pairs are not tangled, but find that only 27% of the studied
pairs are potentially useful for the above applications. We categorize the
types of mined pairs and find that the highest ratio of useful pairs come from
those categorized as Correction, Flaw, and Obsolete. Our work is the first to
investigate Stack Overflow comment-edit pairs and opens the door for future
work in this direction. Based on our findings and observations, we provide
concrete suggestions on how to potentially identify a larger set of useful
comment-edit pairs, which can also be facilitated by our shared data.
| Recent years have seen the rise of Deep Learning (DL) techniques applied to
source code. Researchers have exploited DL to automate several development and
maintenance tasks, such as writing commit messages, generating comments and
detecting vulnerabilities among others. One of the long lasting dreams of
applying DL to source code is the possibility to automate non-trivial coding
activities. While some steps in this direction have been taken (e.g., learning
how to fix bugs), there is still a glaring lack of empirical evidence on the
types of code changes that can be learned and automatically applied by DL. Our
goal is to make this first important step by quantitatively and qualitatively
investigating the ability of a Neural Machine Translation (NMT) model to learn
how to automatically apply code changes implemented by developers during pull
requests. We train and experiment with the NMT model on a set of 236k pairs of
code components before and after the implementation of the changes provided in
the pull requests. We show that, when applied in a narrow enough context (i.e.,
small/medium-sized pairs of methods before/after the pull request changes), NMT
can automatically replicate the changes implemented by developers during pull
requests in up to 36% of the cases. Moreover, our qualitative analysis shows
that the model is capable of learning and replicating a wide variety of
meaningful code changes, especially refactorings and bug-fixing activities. Our
results pave the way for novel research in the area of DL on code, such as the
automatic learning and applications of refactoring.
| 0.849461 | 0.692972 | 0.156489 |
2004.08379 | Iteratively Pruned Deep Learning Ensembles for COVID-19 Detection in
Chest X-rays | We demonstrate use of iteratively pruned deep learning model ensembles for
detecting the coronavirus disease 2019 (COVID-19) infection with chest X-rays
(CXRs). The disease is caused by the novel Severe Acute Respiratory Syndrome
Coronavirus 2 (SARS-CoV-2) virus, also known as the novel Coronavirus
(2019-nCoV). A custom convolutional neural network (CNN) and a selection of
pretrained CNN models are trained on publicly available CXR collections to
learn CXR modality-specific feature representations and the learned knowledge
is transferred and fine-tuned to improve performance and generalization in the
related task of classifying normal, bacterial pneumonia, and CXRs exhibiting
COVID-19 abnormalities. The best performing models are iteratively pruned to
identify optimal number of neurons in the convolutional layers to reduce
complexity and improve memory efficiency. The predictions of the
best-performing pruned models are combined through different ensemble
strategies to improve classification performance. The custom and pretrained
CNNs are evaluated at the patient-level to alleviate issues due to information
leakage and reduce generalization errors. Empirical evaluations demonstrate
that the weighted average of the best-performing pruned models significantly
improves performance resulting in an accuracy of 99.01% and area under the
curve (AUC) of 0.9972 in detecting COVID-19 findings on CXRs as compared to the
individual constituent models. The combined use of modality-specific knowledge
transfer, iterative model pruning, and ensemble learning resulted in improved
predictions. We expect that this model can be quickly adopted for COVID-19
screening using chest radiographs.
| State-of-the-art deep learning systems rely on iterative distributed training
to tackle the increasing complexity of models and input data. The iteration
time in these communication-heavy systems depends on the computation time,
communication time and the extent of overlap of computation and communication.
In this work, we identify a shortcoming in systems with graph representation
for computation, such as TensorFlow and PyTorch, that result in high variance
in iteration time --- random order of received parameters across workers. We
develop a system, TicTac, to improve the iteration time by fixing this issue in
distributed deep learning with Parameter Servers while guaranteeing
near-optimal overlap of communication and computation. TicTac identifies and
enforces an order of network transfers which improves the iteration time using
prioritization. Our system is implemented over TensorFlow and requires no
changes to the model or developer inputs. TicTac improves the throughput by up
to $37.7\%$ in inference and $19.2\%$ in training, while also reducing
straggler effect by up to $2.3\times$. Our code is publicly available.
| 0.889267 | 0.690235 | 0.199032 |
1011.1768 | Dirac mass dynamics in a multidimensional nonlocal parabolic equation | Nonlocal Lotka-Volterra models have the property that solutions concentrate
as Dirac masses in the limit of small diffusion. Is it possible to describe the
dynamics of the limiting concentration points and of the weights of the Dirac
masses? What is the long time asymptotics of these Dirac masses? Can several
Dirac masses co-exist? We will explain how these questions relate to the
so-called "constrained Hamilton-Jacobi equation" and how a form of canonical
equation can be established. This equation has been established assuming
smoothness. Here we build a framework where smooth solutions exist and thus the
full theory can be developed rigorously. We also show that our form of
canonical equation comes with a structure of gradient flow. Numerical
simulations show that the trajectories can exhibit unexpected dynamics well
explained by this equation. Our motivation comes from population adaptive
evolution a branch of mathematical ecology which models darwinian evolution.
| We study dynamical fermion mass generation in (2+1)-dimensional quantum
electrodynamics with a gauge field coupling to massless Dirac fermions and
non-relativistic scalar bosons. We calculate the fermion velocity
renormalization and then examine its influence on dynamical mass generation by
using the Dyson-Schwinger equation. It is found that dynamical mass generation
takes place even after including the scalar bosons as long as the bosonic
compressibility parameter $\xi$ is sufficiently small. In addition, the fermion
velocity renormalization enhances the dynamically generated mass.
| 0.848265 | 0.795423 | 0.052842 |
1105.4323 | Milnor-Wood type inequalities for Higgs bundles | We explain how the generalized Milnor-Wood inequality of Burger and Iozzi for
reductive representations of a cocompact complex-hyperbolic lattice into a
Hermitian Lie group translates under the non-abelian Hodge correspondence into
an inequality for topological invariants of the corresponding Higgs bundles. In
this manner, we obtain in a uniform way a universal Milnor-Wood inequality for
Higgs bundles over complex-hyperbolic manifolds of arbitrary dimensions and
with arbitrary Hermitian structure group. This complements results of Biquard,
Bradlow, Garcia-Prada, Gothen, Mundet, Rubio and Chaput, Koziarz, Maubon.
| The paper considers the Dirac operator on a Riemann surface coupled to a
symplectic holomorphic vector bundle W. Each spinor in the null-space generates
through the moment map a Higgs bundle, and varying W one obtains a holomorphic
Lagrangian subvariety in the moduli space of Higgs bundles. Applying this to
the irreducible symplectic representations of SL(2) we obtain Lagrangian
submanifolds of the rank 2 moduli space which link up with m-period points on
the Prym variety of the spectral curve as well as Brill-Noether loci on the
moduli space of semistable bundles. The case of genus 2 is investigated in some
detail.
| 0.920206 | 0.798444 | 0.121763 |
1111.4553 | A hidden BFKL / XXX s = -1/2 spin chain mapping | A new mapping between the BFKL equation and Beisert's representation of the
XXX Heisenberg ferromagnet with spin s = - 1/2 is given. The action of the
Hamiltonian operator of a spin chain with SL(2) invariance on a symmetric
double copy of a harmonic oscillator excited state is shown to be identical to
the action of the BFKL Hamiltonian on the gluon Green function for the
azimuthal-angle averaged forward scattering case. A natural mapping between the
gluon Green function, discretized in virtuality space, and the double harmonic
oscillator excited state emerges.
| We study two-spin entanglement and order parameter fluctuations as a function
of the system size in the XY model in a transverse field and in the isotropic
XXX model. Both models are characterized by the occurrence of ground state
degeneracy also when systems of finite size are considered. This is always true
for the XXX model, but only at the factorizing field for the XY model. We study
the size dependence of symmetric states, which, in the presence of degeneracy,
can be expanded as a linear combination of broken symmetry states. We show
that, while the XY model looses its quantum superposition content exponentially
with the size $N$, a decrease of the order of 1/N is observed when the XXX
model is considered. The emergence of two qualitatively different regimes is
directly related to the difference in the symmetry of the models.
| 0.860673 | 0.744733 | 0.115939 |
1203.3811 | Efficient Atlasing and Search of Assembly Landscapes: Stratification and
Convexification via Cayley Parametrization | We describe a novel geometric methodology for analyzing free-energy and
kinetics of assembly driven by short-range pair-potentials in an implicit
solvent, and provides illustrations of its unique capabilities.
An atlas is a labeled partition of the assembly landscape into a topological
roadmap of maximal, contiguous, nearly-equipotential-energy conformational
regions or macrostates, together with their neighborhood relationships. The new
methodology decouples the roadmap generation from sampling and produces: (1) a
query-able atlas of local potential energy minima, their basin structure,
energy barriers, and neighboring basins; (2) paths between a specified pair of
basins; and (3) approximations of relative path lengths, basin volumes
(configurational entropy), and path probabilities.
Results demonstrating the core algorithm's capabilities have been generated
by a resource-light, opensource software implementation EASAL. EASAL atlases
several hundred thousand macrostates in minutes on a standard laptop.
Subsequent path and basin computations each take seconds. The core algorithm's
correctness, time complexity, and efficiency-accuracy tradeoffs are formally
guaranteed using modern geometric constraint systems.
The methodology further links geometric variables of the input assembling
units to a type of intuitive topological bar-code of the output atlas, which in
turn determine stable assembled structures and kinetics. This succinct
input-output relationship facilitates reverse analysis, and control towards
design.
We use the novel convex Cayley (distance-based) parametrization that is
unique to assembly, as opposed to folding. Sampling microstates with
macrostate-specific Cayley parameters avoids gradient-descent search used by
all prevailing methods. This increases sampling efficiency, significantly
reduces the number of repeated and discarded samples.
| R-parity violation in supersymmetry gives rise to many unique experimental
signatures. We describe searches with the ATLAS detector for supersymmetry with
R-parity violating decays. Examples include searches for resonant sneutrino
decays to an electron and a muon, and displaced vertices arising from the late
decays of heavy objects with a muon in the final state. The most recent results
on these channels are presented based on data recorded with the ATLAS detector
in 7TeV proton-proton collisions at the CERN Large Hadron Collider in 2010 and
2011.
| 0.822083 | 0.564737 | 0.257345 |
1205.0916 | Stochastic electrodynamics and the interpretation of quantum physics | Arguments are given for the plausibility that quantum mechanics is a
stochastic theory and that many quantum phenomena derive from the existence of
a real noise consisting of vacuum fluctuations of the fields existing in
nature. I revisit stochastic electrodynamics (SED), a theory that studies
classical systems of electrically charged particles immersed in a real
electromagnetic zeropoint field with spectral density proportional to the cube
of the frequency, Planck's constant appearing as the parameter fixing the
scale. Asides from briefly reviewing known results, I make a detailed
comparison between SED and quantum mechanics which shows that both theories
make different predictions in many cases. However SED might be a guide for a
stochastic interpretation of quantum mechanics
| We present a generic quantum master equation whose dissipative dynamics
autonomously stabilizes a harmonic oscillator in the n=1 Fock state. A
multi-mode optomechanical system is analyzed and shown to be an example of a
physical system obeying this model. We show that the optomechanical setup
enables preparation of a mechanical oscillator in a nonclassical steady state,
and that this state indeed approaches a single phonon Fock state in the ideal
parameter regime. The generic model may be useful in other settings, such as
cavity or circuit quantum electrodynamics or trapped ion physics.
| 0.890986 | 0.740726 | 0.15026 |
1212.59 | Finite dimensional approximation properties for uniform Roe algebras | We study property A for metric spaces $X$ with bounded geometry introduced by
Guoliang Yu. Property A is an amenability-type condition, which is less
restrictive than amenability for groups. The property has a connection with
finite dimensional approximation properties in the theory of operator algebras.
It has been already known that property A of a metric space $X$ with bounded
geometry is equivalent to nuclearity of the uniform Roe algebra C$^*_u(X)$. We
prove that exactness and local reflexivity of C$^*_u(X)$ also characterize
property A of $X$.
| We develop a Mayer-Vietoris sequence for the analytic structure group
explored by Higson and Roe. Using explicit formulas for Mayer-Vietoris boundary
maps, we give a new proof and generalizations of Roe's partitioned manifold
index theorem.
| 0.805172 | 0.735663 | 0.069509 |
Subsets and Splits