title
stringlengths 7
239
| abstract
stringlengths 7
2.76k
| cs
int64 0
1
| phy
int64 0
1
| math
int64 0
1
| stat
int64 0
1
| quantitative biology
int64 0
1
| quantitative finance
int64 0
1
|
---|---|---|---|---|---|---|---|
Diffuse Gamma Rays in 3D Galactic Cosmic-ray Propagation Models | The Picard code for the numerical solution of the Galactic cosmic ray
propagation problem allows for high-resolution models that acknowledge the 3D
structure of our Galaxy. Picard was used to determine diffuse gamma-ray
emission of the Galaxy over the energy range from 100 MeV to 100 TeV. We
discuss the impact of a cosmic-ray source distribution aligned with the
Galactic spiral arms for a range of such spiral-arm models. As expected, the
impact on the gamma-ray emission is most distinct in the inverse-Compton
channel, where imprints of the spiral arms are visible and yield predictions
that are no longer symmetric to the rotational axis of the Milkyway. We will
illustrate these differences by a direct comparison to results from previous
axially symmetric Galactic propagation models: we find differences in the
gamma-ray flux both on global scales and on local scales related to the spiral
arm tangents. We compare gamma-ray flux and spectra at on-arm vs. off-arm
projections and characterize the differences to axially symmetric models.
| 0 | 1 | 0 | 0 | 0 | 0 |
Sticking the Landing: Simple, Lower-Variance Gradient Estimators for Variational Inference | We propose a simple and general variant of the standard reparameterized
gradient estimator for the variational evidence lower bound. Specifically, we
remove a part of the total derivative with respect to the variational
parameters that corresponds to the score function. Removing this term produces
an unbiased gradient estimator whose variance approaches zero as the
approximate posterior approaches the exact posterior. We analyze the behavior
of this gradient estimator theoretically and empirically, and generalize it to
more complex variational distributions such as mixtures and importance-weighted
posteriors.
| 1 | 0 | 0 | 1 | 0 | 0 |
Consistent hydrodynamic theory of chiral electrons in Weyl semimetals | The complete set of Maxwell's and hydrodynamic equations for the chiral
electrons in Weyl semimetals is presented. The formulation of the Euler
equation takes into account the explicit breaking of the Galilean invariance by
the ion lattice. It is shown that the Chern-Simons (or Bardeen-Zumino)
contributions should be added to the electric current and charge densities in
Maxwell's equations that provide the information on the separation of Weyl
nodes in energy and momentum. On the other hand, these topological
contributions do not directly affect the Euler equation and the energy
conservation relation for the electron fluid. By making use of the proposed
consistent hydrodynamic framework, we show that the Chern-Simons contributions
strongly modify the dispersion relations of collective modes in Weyl
semimetals. This is reflected, in particular, in the existence of distinctive
anomalous Hall waves, which are sustained by the local anomalous Hall currents.
| 0 | 1 | 0 | 0 | 0 | 0 |
Design and Processing of Invertible Orientation Scores of 3D Images for Enhancement of Complex Vasculature | The enhancement and detection of elongated structures in noisy image data is
relevant for many biomedical imaging applications. To handle complex crossing
structures in 2D images, 2D orientation scores $U: \mathbb{R} ^ 2\times S ^ 1
\rightarrow \mathbb{C}$ were introduced, which already showed their use in a
variety of applications. Here we extend this work to 3D orientation scores $U:
\mathbb{R} ^ 3 \times S ^ 2\rightarrow \mathbb{C}$. First, we construct the
orientation score from a given dataset, which is achieved by an invertible
coherent state type of transform. For this transformation we introduce 3D
versions of the 2D cake-wavelets, which are complex wavelets that can
simultaneously detect oriented structures and oriented edges. Here we introduce
two types of cake-wavelets, the first uses a discrete Fourier transform, the
second is designed in the 3D generalized Zernike basis, allowing us to
calculate analytical expressions for the spatial filters. Finally, we show two
applications of the orientation score transformation. In the first application
we propose an extension of crossing-preserving coherence enhancing diffusion
via our invertible orientation scores of 3D images which we apply to real
medical image data. In the second one we develop a new tubularity measure using
3D orientation scores and apply the tubularity measure to both artificial and
real medical data.
| 1 | 0 | 0 | 0 | 0 | 0 |
The origin and early evolution of life in chemical complexity space | Life can be viewed as a localized chemical system that sits on, or in the
basin of attraction of, a metastable dynamical attractor state that remains out
of equilibrium with the environment. Such a view of life allows that new living
states can arise through chance changes in local chemical concentration
(=mutations) that move points in space into the basin of attraction of a life
state - the attractor being an autocatalytic sets whose essential (=keystone)
species are produced at a higher rate than they are lost to the environment by
diffusion, such that growth in expected. This conception of life yields several
new insights and conjectures. (1) This framework suggests that the first new
life states to arise are likely at interfaces where the rate of diffusion of
keystone species is tied to a low-diffusion regime, while precursors and waste
products diffuse at a higher rate. (2) There are reasons to expect that once
the first life state arises, most likely on a mineral surface, additional
mutations will generate derived life states with which the original state will
compete. (3) I propose that in the resulting adaptive process there is a
general tendency for higher complexity life states (i.e., ones that are further
from being at equilibrium with the environment) to dominate a given mineral
surface. (4) The framework suggests a simple and predictable path by which
cells evolve and provides pointers on why such cells are likely to acquire
particulate inheritance. Overall, the dynamical systems theoretical framework
developed provides an integrated view of the origin and early evolution of life
and supports novel empirical approaches.
| 0 | 0 | 0 | 0 | 1 | 0 |
Principal Component Analysis for Functional Data on Riemannian Manifolds and Spheres | Functional data analysis on nonlinear manifolds has drawn recent interest.
Sphere-valued functional data, which are encountered for example as movement
trajectories on the surface of the earth, are an important special case. We
consider an intrinsic principal component analysis for smooth Riemannian
manifold-valued functional data and study its asymptotic properties. Riemannian
functional principal component analysis (RFPCA) is carried out by first mapping
the manifold-valued data through Riemannian logarithm maps to tangent spaces
around the time-varying Fréchet mean function, and then performing a
classical multivariate functional principal component analysis on the linear
tangent spaces. Representations of the Riemannian manifold-valued functions and
the eigenfunctions on the original manifold are then obtained with exponential
maps. The tangent-space approximation through functional principal component
analysis is shown to be well-behaved in terms of controlling the residual
variation if the Riemannian manifold has nonnegative curvature. Specifically,
we derive a central limit theorem for the mean function, as well as root-$n$
uniform convergence rates for other model components, including the covariance
function, eigenfunctions, and functional principal component scores. Our
applications include a novel framework for the analysis of longitudinal
compositional data, achieved by mapping longitudinal compositional data to
trajectories on the sphere, illustrated with longitudinal fruit fly behavior
patterns. RFPCA is shown to be superior in terms of trajectory recovery in
comparison to an unrestricted functional principal component analysis in
applications and simulations and is also found to produce principal component
scores that are better predictors for classification compared to traditional
functional functional principal component scores.
| 0 | 0 | 1 | 1 | 0 | 0 |
Braids with as many full twists as strands realize the braid index | We characterize the fractional Dehn twist coefficient of a braid in terms of
a slope of the homogenization of the Upsilon function, where Upsilon is the
function-valued concordance homomorphism defined by Ozsváth, Stipsicz, and
Szabó. We use this characterization to prove that $n$-braids with fractional
Dehn twist coefficient larger than $n-1$ realize the braid index of their
closure. As a consequence, we are able to prove a conjecture of Malyutin and
Netsvetaev stating that $n$-times twisted braids realize the braid index of
their closure. We provide examples that address the optimality of our results.
The paper ends with an appendix about the homogenization of knot concordance
homomorphisms.
| 0 | 0 | 1 | 0 | 0 | 0 |
The Formal Semantics of Rascal Light | Rascal is a high-level transformation language that aims to simplify software
language engineering tasks like defining program syntax, analyzing and
transforming programs, and performing code generation. The language provides
several features including built-in collections (lists, sets, maps), algebraic
data-types, powerful pattern matching operations with backtracking, and
high-level traversals supporting multiple strategies. Interaction between
different language features can be difficult to comprehend, since most features
are semantically rich. The report provides a well-defined formal semantics for
a large subset of Rascal, called Rascal Light, suitable for developing formal
techniques, e.g., type systems and static analyses. Additionally, the report
states and proofs a series of interesting properties of the semantics,
including purity of backtracking, strong typing, partial progress and the
existence of a terminating subset.
| 1 | 0 | 0 | 0 | 0 | 0 |
On inverse and right inverse ordered semigroups | A regular ordered semigroup $S$ is called right inverse if every principal
left ideal of $S$ is generated by an $\mathcal{R}$-unique ordered idempotent.
Here we explore the theory of right inverse ordered semigroups. We show that a
regular ordered semigroup is right inverse if and only if any two right
inverses of an element $a\in S$ are $\mathcal{R}$-related. Furthermore,
different characterizations of right Clifford, right group-like, group like
ordered semigroups are done by right inverse ordered semigroups. Thus a
foundation of right inverse semigroups has been developed.
| 0 | 0 | 1 | 0 | 0 | 0 |
Refining the Two-Dimensional Signed Small Ball Inequality | The two-dimensional signed small ball inequality states that for all possible
choices of signs, $$ \left\| \sum_{|R| = 2^{-n}}{ \varepsilon_R h_R}
\right\|_{L^{\infty}} \gtrsim n,$$ where the summation runs over all dyadic
rectangles in the unit square and $h_R$ denotes the associated Haar function.
This inequality first appeared in the work of Talagrand, and alternative proofs
are due to Temlyakov and Bilyk & Feldheim (who showed that the supremum equals
$n+1$ in all cases). We prove that for all integers $0\leq k \leq n+1$ and all
possible choices of signs, $$ \left| \left\{ x \in [0,1)^2: \sum_{|R| =
2^{-n}}{ \varepsilon_R h_R} = n + 1 - 2k\right\} \right| =
\frac{1}{2^{n+1}}\binom{n+1}{k}.$$
| 0 | 0 | 1 | 0 | 0 | 0 |
The structure, capability and the Schur multiplier of generalized Heisenberg Lie algebras | From [Problem 1729, Groups of prime power order, Vol. 3], Berkovich et al.
asked to obtain the Schur multiplier and the representation of a group $G$,
when $G$ is a special $p$-group minimally generated by $d$ elements and
$|G'|=p^{\frac{1}{2}d(d-1)}$. Since there are analogies between groups and Lie
algebras, we intend to give an answer to this question similarly for nilpotent
Lie algebras. Furthermore, we give some results about the tensor square and the
Schur multiplier of some nilpotent Lie algebras of class two.
| 0 | 0 | 1 | 0 | 0 | 0 |
Fractional Brownian markets with time-varying volatility and high-frequency data | Diffusion processes driven by Fractional Brownian motion (FBM) have often
been considered in modeling stock price dynamics in order to capture the long
range dependence of stock price observed in reality. Option prices for such
models had been obtained by Necula (2002) under constant drift and volatility.
We obtain option prices under time varying volatility model. The expression
depends on volatility and the Hurst parameter in a complicated manner. We
derive a central limit theorem for the quadratic variation as an estimator for
volatility for both the cases, constant as well as time varying volatility.
That will help us to find estimators of the option prices and to find their
asymptotic distributions.
| 0 | 0 | 1 | 1 | 0 | 0 |
Experimental GHZ Entanglement beyond Qubits | The Greenberger-Horne-Zeilinger (GHZ) argument provides an all-or-nothing
contradiction between quantum mechanics and local-realistic theories. In its
original formulation, GHZ investigated three and four particles entangled in
two dimensions only. Very recently, higher dimensional contradictions
especially in three dimensions and three particles have been discovered but it
has remained unclear how to produce such states. In this article we
experimentally show how to generate a three-dimensional GHZ state from
two-photon orbital-angular-momentum entanglement. The first suggestion for a
setup which generates three-dimensional GHZ entanglement from these entangled
pairs came from using the computer algorithm Melvin. The procedure employs
novel concepts significantly beyond the qubit case. Our experiment opens up the
possibility of a truly high-dimensional test of the GHZ-contradiction which,
interestingly, employs non-Hermitian operators.
| 0 | 1 | 0 | 0 | 0 | 0 |
On global Okounkov bodies of spherical varieties | We define and study the global Okounkov moment cone of a projective spherical
variety X, generalizing both the global Okounkov body and the moment body of X
defined by Kaveh and Khovanskii. Under mild assumptions on X we show that the
global Okounkov moment cone of X is rational polyhedral. As a consequence, also
the global Okounkov body of X, with respect to a particular valuation, is
rational polyhedral.
| 0 | 0 | 1 | 0 | 0 | 0 |
From the simple reacting sphere kinetic model to the reaction-diffusion system of Maxwell-Stefan type | In this paper we perform a formal asymptotic analysis on a kinetic model for
reactive mixtures in order to derive a reaction-diffusion system of
Maxwell-Stefan type. More specifically, we start from the kinetic model of
simple reacting spheres for a quaternary mixture of monatomic ideal gases that
undergoes a reversible chemical reaction of bimolecular type. Then, we consider
a scaling describing a physical situation in which mechanical collisions play a
dominant role in the evolution process, while chemical reactions are slow, and
compute explicitly the production terms associated to the concentration and
momentum balance equations for each species in the reactive mixture. Finally,
we prove that, under isothermal assumptions, the limit equations for the scaled
kinetic model is the reaction diffusion system of Maxwell-Stefan type.
| 0 | 1 | 0 | 0 | 0 | 0 |
Origin of soft glassy rheology in the cytoskeleton | Dynamically crosslinked semiflexible biopolymers such as the actin
cytoskeleton govern the mechanical behavior of living cells. Semiflexible
biopolymers stiffen nonlinearly in response to mechanical loads, whereas the
crosslinker dynamics allow for stress relaxation over time. Here we show,
through rheology and theoretical modeling, that the combined nonlinearity in
time and stress leads to an unexpectedly slow stress relaxation, similar to the
dynamics of disordered systems close to the glass transition. Our work suggests
that transient crosslinking combined with internal stress is the microscopic
origin for the universal glassy dynamics as frequently observed in cellular
mechanics.
| 0 | 0 | 0 | 0 | 1 | 0 |
Pattern Search Multidimensional Scaling | We present a novel view of nonlinear manifold learning using derivative-free
optimization techniques. Specifically, we propose an extension of the classical
multi-dimensional scaling (MDS) method, where instead of performing gradient
descent, we sample and evaluate possible "moves" in a sphere of fixed radius
for each point in the embedded space. A fixed-point convergence guarantee can
be shown by formulating the proposed algorithm as an instance of General
Pattern Search (GPS) framework. Evaluation on both clean and noisy synthetic
datasets shows that pattern search MDS can accurately infer the intrinsic
geometry of manifolds embedded in high-dimensional spaces. Additionally,
experiments on real data, even under noisy conditions, demonstrate that the
proposed pattern search MDS yields state-of-the-art results.
| 0 | 0 | 0 | 1 | 0 | 0 |
MH370 Burst Frequency Offset Analysis and Implications on Descent Rate at End-of-Flight | Malaysian Airlines flight MH370 veered off course unexpectedly during a
scheduled trip from Kuala Lumpur to Beijing on the 7th of March 2014. MH370 was
tracked via military radar into the Malacca Straits and, after disappearing
from radar, was subsequently believed to have turned south towards the southern
Indian Ocean before crashing approximately 6 hours later. This article
discusses specifically the analysis of burst frequency offset (BFO) metadata
from the SATCOM messages. It is shown that the BFOs corresponding to the last
two SATCOM messages from the plane at 00:19:29Z and 00:19:37Z 8th March 2014
suggest that flight MH370 was rapidly descending and accelerating downwards
when message exchange with the ground station ceased.
| 0 | 0 | 0 | 1 | 0 | 0 |
Classifying Symmetrical Differences and Temporal Change in Mammography Using Deep Neural Networks | We investigate the addition of symmetry and temporal context information to a
deep Convolutional Neural Network (CNN) with the purpose of detecting malignant
soft tissue lesions in mammography. We employ a simple linear mapping that
takes the location of a mass candidate and maps it to either the contra-lateral
or prior mammogram and Regions Of Interest (ROI) are extracted around each
location. We subsequently explore two different architectures (1) a fusion
model employing two datastreams were both ROIs are fed to the network during
training and testing and (2) a stage-wise approach where a single ROI CNN is
trained on the primary image and subsequently used as feature extractor for
both primary and symmetrical or prior ROIs. A 'shallow' Gradient Boosted Tree
(GBT) classifier is then trained on the concatenation of these features and
used to classify the joint representation. Results shown a significant increase
in performance using the first architecture and symmetry information, but only
marginal gains in performance using temporal data and the other setting. We
feel results are promising and can greatly be improved when more temporal data
becomes available.
| 1 | 0 | 0 | 0 | 0 | 0 |
Deep Echo State Network (DeepESN): A Brief Survey | The study of deep recurrent neural networks (RNNs) and, in particular, of
deep Reservoir Computing (RC) is gaining an increasing research attention in
the neural networks community. The recently introduced deep Echo State Network
(deepESN) model opened the way to an extremely efficient approach for designing
deep neural networks for temporal data. At the same time, the study of deepESNs
allowed to shed light on the intrinsic properties of state dynamics developed
by hierarchical compositions of recurrent layers, i.e. on the bias of depth in
RNNs architectural design. In this paper, we summarize the advancements in the
development, analysis and applications of deepESNs.
| 1 | 0 | 0 | 1 | 0 | 0 |
Computational topology of graphs on surfaces | Computational topology is an area that revisits topological problems from an
algorithmic point of view, and develops topological tools for improved
algorithms. We survey results in computational topology that are concerned with
graphs drawn on surfaces. Typical questions include representing surfaces and
graphs embedded on them computationally, deciding whether a graph embeds on a
surface, solving computational problems related to homotopy, optimizing curves
and graphs on surfaces, and solving standard graph algorithm problems more
efficiently in the case of surface-embedded graphs.
| 1 | 0 | 1 | 0 | 0 | 0 |
Identifying hazardousness of sewer pipeline gas mixture using classification methods: a comparative study | In this work, we formulated a real-world problem related to sewer pipeline
gas detection using the classification-based approaches. The primary goal of
this work was to identify the hazardousness of sewer pipeline to offer safe and
non-hazardous access to sewer pipeline workers so that the human fatalities,
which occurs due to the toxic exposure of sewer gas components, can be avoided.
The dataset acquired through laboratory tests, experiments, and various
literature sources was organized to design a predictive model that was able to
identify/classify hazardous and non-hazardous situation of sewer pipeline. To
design such prediction model, several classification algorithms were used and
their performances were evaluated and compared, both empirically and
statistically, over the collected dataset. In addition, the performances of
several ensemble methods were analyzed to understand the extent of improvement
offered by these methods. The result of this comprehensive study showed that
the instance-based learning algorithm performed better than many other
algorithms such as multilayer perceptron, radial basis function network,
support vector machine, reduced pruning tree. Similarly, it was observed that
multi-scheme ensemble approach enhanced the performance of base predictors.
| 1 | 0 | 0 | 0 | 0 | 0 |
The rational points on certain Abelian varieties over function fields | In this paper, we consider Abelian varieties over function fields that arise
as twists of Abelian varieties by cyclic covers of irreducible quasi-projective
varieties. Then, in terms of Prym varieties associated to the cyclic covers, we
prove a structure theorem on their Mordell-Weil group. Our results give an
explicit method for construction of elliptic curves, hyper- and super-elliptic
Jacobians that have large ranks over function fields of certain varieties.
| 0 | 0 | 1 | 0 | 0 | 0 |
Multivariate inhomogeneous diffusion models with covariates and mixed effects | Modeling of longitudinal data often requires diffusion models that
incorporate overall time-dependent, nonlinear dynamics of multiple components
and provide sufficient flexibility for subject-specific modeling. This
complexity challenges parameter inference and approximations are inevitable. We
propose a method for approximate maximum-likelihood parameter estimation in
multivariate time-inhomogeneous diffusions, where subject-specific flexibility
is accounted for by incorporation of multidimensional mixed effects and
covariates. We consider $N$ multidimensional independent diffusions $X^i =
(X^i_t)_{0\leq t\leq T^i}, 1\leq i\leq N$, with common overall model structure
and unknown fixed-effects parameter $\mu$. Their dynamics differ by the
subject-specific random effect $\phi^i$ in the drift and possibly by (known)
covariate information, different initial conditions and observation times and
duration. The distribution of $\phi^i$ is parametrized by an unknown
$\vartheta$ and $\theta = (\mu, \vartheta)$ is the target of statistical
inference. Its maximum likelihood estimator is derived from the continuous-time
likelihood. We prove consistency and asymptotic normality of $\hat{\theta}_N$
when the number $N$ of subjects goes to infinity using standard techniques and
consider the more general concept of local asymptotic normality for less
regular models. The bias induced by time-discretization of sufficient
statistics is investigated. We discuss verification of conditions and
investigate parameter estimation and hypothesis testing in simulations.
| 0 | 0 | 1 | 1 | 0 | 0 |
Stability of patterns in the Abelian sandpile | We show that the patterns in the Abelian sandpile are stable. The proof
combines the structure theory for the patterns with the regularity machinery
for non-divergence form elliptic equations. The stability results allows one to
improve weak-* convergence of the Abelian sandpile to pattern convergence for
certain classes of solutions.
| 0 | 0 | 1 | 0 | 0 | 0 |
Position Heaps for Parameterized Strings | We propose a new indexing structure for parameterized strings, called
parameterized position heap. Parameterized position heap is applicable for
parameterized pattern matching problem, where the pattern matches a substring
of the text if there exists a bijective mapping from the symbols of the pattern
to the symbols of the substring. We propose an online construction algorithm of
parameterized position heap of a text and show that our algorithm runs in
linear time with respect to the text size. We also show that by using
parameterized position heap, we can find all occurrences of a pattern in the
text in linear time with respect to the product of the pattern size and the
alphabet size.
| 1 | 0 | 0 | 0 | 0 | 0 |
Quasi-Steady Model of a Pumping Kite Power System | The traction force of a kite can be used to drive a cyclic motion for
extracting wind energy from the atmosphere. This paper presents a novel
quasi-steady modelling framework for predicting the power generated over a full
pumping cycle. The cycle is divided into traction, retraction and transition
phases, each described by an individual set of analytic equations. The effect
of gravity on the airborne system components is included in the framework. A
trade-off is made between modelling accuracy and computation speed such that
the model is specifically useful for system optimisation and scaling in
economic feasibility studies. Simulation results are compared to experimental
measurements of a 20 kW kite power system operated up to a tether length of 720
m. Simulation and experiment agree reasonably well, both for moderate and for
strong wind conditions, indicating that the effect of gravity has to be taken
into account for a predictive performance simulation.
| 1 | 0 | 1 | 0 | 0 | 0 |
Expansion of pinched hypersurfaces of the Euclidean and hyperbolic space by high powers of curvature | We prove convergence results for expanding curvature flows in the Euclidean
and hyperbolic space. The flow speeds have the form $F^{-p}$, where $p>1$ and
$F$ is a positive, strictly monotone and 1-homogeneous curvature function. In
particular this class includes the mean curvature $F=H$. We prove that a
certain initial pinching condition is preserved and the properly rescaled
hypersurfaces converge smoothly to the unit sphere. We show that an example due
to Andrews-McCoy-Zheng can be used to construct strictly convex initial
hypersurfaces, for which the inverse mean curvature flow to the power $p>1$
loses convexity, justifying the necessity to impose a certain pinching
condition on the initial hypersurface.
| 0 | 0 | 1 | 0 | 0 | 0 |
Sound Mixed-Precision Optimization with Rewriting | Finite-precision arithmetic computations face an inherent tradeoff between
accuracy and efficiency. The points in this tradeoff space are determined,
among other factors, by different data types but also evaluation orders. To put
it simply, the shorter a precision's bit-length, the larger the roundoff error
will be, but the faster the program will run. Similarly, the fewer arithmetic
operations the program performs, the faster it will run; however, the effect on
the roundoff error is less clear-cut. Manually optimizing the efficiency of
finite-precision programs while ensuring that results remain accurate enough is
challenging. The unintuitive and discrete nature of finite-precision makes
estimation of roundoff errors difficult; furthermore the space of possible data
types and evaluation orders is prohibitively large. We present the first fully
automated and sound technique and tool for optimizing the performance of
floating-point and fixed-point arithmetic kernels. Our technique combines
rewriting and mixed-precision tuning. Rewriting searches through different
evaluation orders to find one which minimizes the roundoff error at no
additional runtime cost. Mixed-precision tuning assigns different finite
precisions to different variables and operations and thus provides
finer-grained control than uniform precision. We show that when these two
techniques are designed and applied together, they can provide higher
performance improvements than each alone.
| 1 | 0 | 0 | 0 | 0 | 0 |
Negative thermal expansion and metallophilicity in Cu$_3$[Co(CN)$_6$] | We report the synthesis and structural characterisation of the molecular
framework copper(I) hexacyanocobaltate(III), Cu$_3$[Co(CN)$_6$], which we find
to be isostructural to H$_3$[Co(CN)$_6$] and the colossal negative thermal
expansion material Ag$_3$[Co(CN)$_6$]. Using synchrotron X-ray powder
diffraction measurements, we find strong positive and negative thermal
expansion behaviour respectively perpendicular and parallel to the trigonal
crystal axis: $\alpha_a$ = 25.4(5)\,MK$^{-1}$ and $\alpha_c$ =
$-$43.5(8)\,MK$^{-1}$. These opposing effects collectively result in a volume
expansivity $\alpha_V$ = 7.4(11)\,MK$^{-1}$ that is remarkably small for an
anisotropic molecular framework. This thermal response is discussed in the
context of the behaviour of the analogous H- and Ag-containing systems. We make
use of density-functional theory with many-body dispersion interactions
(DFT+MBD) to demonstrate that Cu$\ldots$Cu metallophilic (`cuprophilic')
interactions are significantly weaker in Cu$_3$[Co(CN)$_6$] than Ag$\ldots$Ag
interactions in Ag$_3$[Co(CN)$_6$], but that this lowering of energy scale
counterintuitively translates to a more moderate---rather than
enhanced---degree of structural flexibility. The same conclusion is drawn from
consideration of a simple lattice dynamical model, which we also present here.
Our results demonstrate that strong interactions can actually be exploited in
the design of ultra-responsive materials if those interactions are set up to
act in tension.
| 0 | 1 | 0 | 0 | 0 | 0 |
Quantum Fluctuations along Symmetry Crossover in Kondo-correlated Quantum Dot | Universal properties of entangled many-body states are controlled by their
symmetry and quantum fluctuations. By magnetic-field tuning of the spin-orbital
degeneracy in a Kondo-correlated quantum dot, we have modified quantum
fluctuations to directly measure their influence on the many-body properties
along the crossover from $SU(4)$ to $SU(2)$ symmetry of the ground state.
High-sensitive current noise measurements combined with the non-equilibrium
Fermi liquid theory clarify that the Kondo resonance and electron correlations
are enhanced as the fluctuations, measured by the Wilson ratio, increase along
the symmetry crossover. Our achievement demonstrates that non-linear noise
constitutes a measure of quantum fluctuations that can be used to tackle
quantum phase transitions.
| 0 | 1 | 0 | 0 | 0 | 0 |
Impossibility results on stability of phylogenetic consensus methods | We answer two questions raised by Bryant, Francis and Steel in their work on
consensus methods in phylogenetics. Consensus methods apply to every practical
instance where it is desired to aggregate a set of given phylogenetic trees
(say, gene evolution trees) into a resulting, "consensus" tree (say, a species
tree). Various stability criteria have been explored in this context, seeking
to model desirable consistency properties of consensus methods as the
experimental data is updated (e.g., more taxa, or more trees, are mapped).
However, such stability conditions can be incompatible with some basic
regularity properties that are widely accepted to be essential in any
meaningful consensus method. Here, we prove that such an incompatibility does
arise in the case of extension stability on binary trees and in the case of
associative stability. Our methods combine general theoretical considerations
with the use of computer programs tailored to the given stability requirements.
| 0 | 0 | 0 | 0 | 1 | 0 |
Improved Distributed Degree Splitting and Edge Coloring | The degree splitting problem requires coloring the edges of a graph red or
blue such that each node has almost the same number of edges in each color, up
to a small additive discrepancy. The directed variant of the problem requires
orienting the edges such that each node has almost the same number of incoming
and outgoing edges, again up to a small additive discrepancy.
We present deterministic distributed algorithms for both variants, which
improve on their counterparts presented by Ghaffari and Su [SODA'17]: our
algorithms are significantly simpler and faster, and have a much smaller
discrepancy. This also leads to a faster and simpler deterministic algorithm
for $(2+o(1))\Delta$-edge-coloring, improving on that of Ghaffari and Su.
| 1 | 0 | 0 | 0 | 0 | 0 |
Global geometry and $C^1$ convex extensions of $1$-jets | Let $E$ be an arbitrary subset of $\mathbb{R}^n$ (not necessarily bounded),
and $f:E\to\mathbb{R}$, $G:E\to\mathbb{R}^n$ be functions. We provide necessary
and sufficient conditions for the $1$-jet $(f,G)$ to have an extension $(F,
\nabla F)$ with $F:\mathbb{R}^n\to\mathbb{R}$ convex and of class $C^{1}$.
Besides, if $G$ is bounded we can take $F$ so that $\textrm{Lip}(F)\lesssim
\|G\|_{\infty}$. As an application we also solve a similar problem about
finding convex hypersurfaces of class $C^1$ with prescribed normals at the
points of an arbitrary subset of $\mathbb{R}^n$.
| 0 | 0 | 1 | 0 | 0 | 0 |
Interpretable Deep Learning applied to Plant Stress Phenotyping | Availability of an explainable deep learning model that can be applied to
practical real world scenarios and in turn, can consistently, rapidly and
accurately identify specific and minute traits in applicable fields of
biological sciences, is scarce. Here we consider one such real world example
viz., accurate identification, classification and quantification of biotic and
abiotic stresses in crop research and production. Up until now, this has been
predominantly done manually by visual inspection and require specialized
training. However, such techniques are hindered by subjectivity resulting from
inter- and intra-rater cognitive variability. Here, we demonstrate the ability
of a machine learning framework to identify and classify a diverse set of
foliar stresses in the soybean plant with remarkable accuracy. We also present
an explanation mechanism using gradient-weighted class activation mapping that
isolates the visual symptoms used by the model to make predictions. This
unsupervised identification of unique visual symptoms for each stress provides
a quantitative measure of stress severity, allowing for identification,
classification and quantification in one framework. The learnt model appears to
be agnostic to species and make good predictions for other (non-soybean)
species, demonstrating an ability of transfer learning.
| 1 | 0 | 0 | 1 | 0 | 0 |
Differentiable Compositional Kernel Learning for Gaussian Processes | The generalization properties of Gaussian processes depend heavily on the
choice of kernel, and this choice remains a dark art. We present the Neural
Kernel Network (NKN), a flexible family of kernels represented by a neural
network. The NKN architecture is based on the composition rules for kernels, so
that each unit of the network corresponds to a valid kernel. It can compactly
approximate compositional kernel structures such as those used by the Automatic
Statistician (Lloyd et al., 2014), but because the architecture is
differentiable, it is end-to-end trainable with gradient-based optimization. We
show that the NKN is universal for the class of stationary kernels. Empirically
we demonstrate pattern discovery and extrapolation abilities of NKN on several
tasks that depend crucially on identifying the underlying structure, including
time series and texture extrapolation, as well as Bayesian optimization.
| 0 | 0 | 0 | 1 | 0 | 0 |
Airy structures and symplectic geometry of topological recursion | We propose a new approach to the topological recursion of Eynard-Orantin
based on the notion of Airy structure, which we introduce in the paper. We
explain why Airy structure is a more fundamental object than the one of the
spectral curve. We explain how the concept of quantization of Airy structure
leads naturally to the formulas of topological recursion as well as their
generalizations. The notion of spectral curve is also considered in a more
general framework of Poisson surfaces endowed with foliation. We explain how
the deformation theory of spectral curves is related to Airy structures. Few
other topics (e.g. the Holomorphic Anomaly Equation) are also discussed from
the general point of view of Airy structures.
| 0 | 0 | 1 | 0 | 0 | 0 |
Multiscale Information Decomposition: Exact Computation for Multivariate Gaussian Processes | Exploiting the theory of state space models, we derive the exact expressions
of the information transfer, as well as redundant and synergistic transfer, for
coupled Gaussian processes observed at multiple temporal scales. All of the
terms, constituting the frameworks known as interaction information
decomposition and partial information decomposition, can thus be analytically
obtained for different time scales from the parameters of the VAR model that
fits the processes. We report the application of the proposed methodology
firstly to benchmark Gaussian systems, showing that this class of systems may
generate patterns of information decomposition characterized by mainly
redundant or synergistic information transfer persisting across multiple time
scales or even by the alternating prevalence of redundant and synergistic
source interaction depending on the time scale. Then, we apply our method to an
important topic in neuroscience, i.e., the detection of causal interactions in
human epilepsy networks, for which we show the relevance of partial information
decomposition to the detection of multiscale information transfer spreading
from the seizure onset zone.
| 0 | 0 | 1 | 1 | 0 | 0 |
Transforming Speed Sequences into Road Rays on the Map with Elastic Pathing | Advances in technology have provided ways to monitor and measure driving
behavior. Recently, this technology has been applied to usage-based automotive
insurance policies that offer reduced insurance premiums to policy holders who
opt-in to automotive monitoring. Several companies claim to measure only speed
data, which they further claim preserves privacy. However, we have developed an
algorithm - elastic pathing - that successfully tracks drivers' locations from
speed data. The algorithm tracks drivers by assuming a start position, such as
the driver's home address (which is typically known to insurance companies),
and then estimates the possible routes by fitting the speed data to map data.
To demonstrate the algorithm's real-world applicability, we evaluated its
performance with driving datasets from central New Jersey and Seattle,
Washington, representing suburban and urban areas. We are able to estimate
destinations with error within 250 meters for 17% of the traces and within 500
meters for 24% of the traces in the New Jersey dataset, and with error within
250 and 500 meters for 15.5% and 27.5% of the traces, respectively, in the
Seattle dataset. Our work shows that these insurance schemes enable a
substantial breach of privacy.
| 1 | 0 | 0 | 0 | 0 | 0 |
Solitons and geometrical structures in a perfect fluid spacetime | Geometrical aspects of a perfect fluid spacetime are described in terms of
different curvature tensors and $\eta$-Ricci and $\eta$-Einstein solitons in a
perfect fluid spacetime are determined. Conditions for the Ricci soliton to be
steady, expanding or shrinking are also given. In a particular case when the
potential vector field $\xi$ of the soliton is of gradient type,
$\xi:=grad(f)$, we derive from the soliton equation a Laplacian equation
satisfied by $f$.
| 0 | 0 | 1 | 0 | 0 | 0 |
Hemodynamics of a Bileaflet Mechanical Heart Valve with Different Levels of Dysfunction | Heart disease is one of leading causes of mortality worldwide. Healthy heart
valves are key for proper heart function. When these valves dysfunction, a
replacement is often necessary in severe cases. The current study presents an
investigation of the pulsatile blood flow through a bileaflet mechanical heart
valve (BMHV) where one leaflet is healthy and can fully open and the other
leaflet cannot fully open with different levels of dysfunction. To better
understand the implications that a dysfunctional leaflet has on the blood flow
through these valves, analysis of flow characteristics such as velocity,
pressure drop, wall shear stress and vorticity profiles was performed. Results
suggested that leaflet dysfunction caused increased local velocities,
separation regions and wall shear stresses. For example, the maximum velocity
increased from 2.53 m/s to 4.9 m/s when dysfunction increased from 0% to 100%.
The pressure drop increased (by up to 300%) with dysfunctionality. Results
suggested that leaflet dysfunction also caused increased wall shear stresses on
the valve frame where higher stresses developed around the hinges (at 75% and
100% dysfunctions). Analysis also showed that increased dysfunctionality of one
leaflet led to higher net shear forces on both the healthy and dysfunctional
leaflets (by up to 200% and 600%, respectively).
| 0 | 1 | 0 | 0 | 0 | 0 |
Nonnegative Hermitian vector bundles and Chern numbers | We show in this article that if a holomorphic vector bundle has a nonnegative
Hermitian metric in the sense of Bott and Chern, which always exists on
globally generated holomorphic vector bundles, then some special linear
combinations of Chern forms are strongly nonnegative. This particularly implies
that all the Chern numbers of such a holomorphic vector bundle are nonnegative
and can be bounded below and above respectively by two special Chern numbers.
As applications, we obtain a family of new results on compact connected complex
manifolds which are homogeneous or can be holomorphically immersed into complex
tori, some of which improve several classical results.
| 0 | 0 | 1 | 0 | 0 | 0 |
The Ubiquity of Large Graphs and Surprising Challenges of Graph Processing | Graph processing is becoming increasingly prevalent across many application
domains. In spite of this prevalence, there is little research about how graphs
are actually used in practice. We conducted an online survey aimed at
understanding: (i) the types of graphs users have; (ii) the graph computations
users run; (iii) the types of graph software users use; and (iv) the major
challenges users face when processing their graphs. We describe the
participants' responses to our questions highlighting common patterns and
challenges. We further reviewed user feedback in the mailing lists, bug
reports, and feature requests in the source repositories of a large suite of
software products for processing graphs. Through our review, we were able to
answer some new questions that were raised by participants' responses and
identify specific challenges that users face when using different classes of
graph software. The participants' responses and data we obtained revealed
surprising facts about graph processing in practice. In particular, real-world
graphs represent a very diverse range of entities and are often very large, and
scalability and visualization are undeniably the most pressing challenges faced
by participants. We hope these findings can guide future research.
| 1 | 0 | 0 | 0 | 0 | 0 |
On the classification of four-dimensional gradient Ricci solitons | In this paper, we prove some classification results for four-dimensional
gradient Ricci solitons. For a four-dimensional gradient shrinking Ricci
soliton with $div^4Rm^\pm=0$, we show that it is either Einstein or a finite
quotient of $\mathbb{R}^4$, $\mathbb{S}^2\times\mathbb{R}^2$ or
$\mathbb{S}^3\times\mathbb{R}$. The same result can be obtained under the
condition of $div^4W^\pm=0$. We also present some classification results of
four-dimensional complete non-compact gradient expanding Ricci soliton with
non-negative Ricci curvature and gradient steady Ricci solitons under certain
curvature conditions.
| 0 | 0 | 1 | 0 | 0 | 0 |
In-gap bound states induced by a single nonmagnetic impurity in sign-preserving s-wave superconductors with incipient bands | We have investigated the in-gap bound states (IGBS) induced by a single
nonmagnetic impurity in multiband superconductors with incipient bands.
Contrary to the naive expectation, we found that even if the superconducting
(SC) order parameter is sign-preserving s-wave on the Fermi surfaces, the
incipient bands may still affect the appearance and locations of the IGBS,
although the gap between the incipient bands and the Fermi level is much larger
than the SC gap. Therefore in scanning tunneling microscopy experiments, the
IGBS induced by a single nonmagnetic impurity are not the definitive evidences
for the sign-changing order parameter on the Fermi surfaces. Our findings have
special implications for the experimental determination of the pairing symmetry
in the FeSe-based superconductors.
| 0 | 1 | 0 | 0 | 0 | 0 |
Gridbot: An autonomous robot controlled by a Spiking Neural Network mimicking the brain's navigational system | It is true that the "best" neural network is not necessarily the one with the
most "brain-like" behavior. Understanding biological intelligence, however, is
a fundamental goal for several distinct disciplines. Translating our
understanding of intelligence to machines is a fundamental problem in robotics.
Propelled by new advancements in Neuroscience, we developed a spiking neural
network (SNN) that draws from mounting experimental evidence that a number of
individual neurons is associated with spatial navigation. By following the
brain's structure, our model assumes no initial all-to-all connectivity, which
could inhibit its translation to a neuromorphic hardware, and learns an
uncharted territory by mapping its identified components into a limited number
of neural representations, through spike-timing dependent plasticity (STDP). In
our ongoing effort to employ a bioinspired SNN-controlled robot to real-world
spatial mapping applications, we demonstrate here how an SNN may robustly
control an autonomous robot in mapping and exploring an unknown environment,
while compensating for its own intrinsic hardware imperfections, such as
partial or total loss of visual input.
| 0 | 0 | 0 | 0 | 1 | 0 |
Calculation of thallium hyperfine anomaly | We suggest a method to calculate hyperfine anomaly for many-electron atoms
and ions. At first, we tested this method by calculating hyperfine anomaly for
hydrogen-like thallium ion and obtained fairly good agreement with analytical
expressions. Then we did calculations for the neutral thallium and tested an
assumption, that the the ratio between the anomalies for $s$ and $p_{1/2}$
states is the same for these two systems. Finally, we come up with
recommendations about preferable atomic states for the precision measurements
of the nuclear $g$ factors.
| 0 | 1 | 0 | 0 | 0 | 0 |
Elliptic supersymmetric integrable model and multivariable elliptic functions | We investigate the elliptic integrable model introduced by Deguchi and
Martin, which is an elliptic extension of the Perk-Schultz model. We introduce
and study a class of partition functions of the elliptic model by using the
Izergin-Korepin analysis. We show that the partition functions are expressed as
a product of elliptic factors and elliptic Schur-type symmetric functions. This
result resembles the recent works by number theorists in which the
correspondence between the partition functions of trigonometric models and the
product of the deformed Vandermonde determinant and Schur functions were
established.
| 0 | 1 | 0 | 0 | 0 | 0 |
Crystalline Electric Field Randomness in the Triangular Lattice Spin-Liquid YbMgGaO$_4$ | We apply moderate-high-energy inelastic neutron scattering (INS) measurements
to investigate Yb$^{3+}$ crystalline electric field (CEF) levels in the
triangular spin-liquid candidate YbMgGaO$_4$. Three CEF excitations from the
ground-state Kramers doublet are centered at the energies $\hbar \omega$ = 39,
61, and 97\,meV in agreement with the effective \mbox{spin-1/2} $g$-factors and
experimental heat capacity, but reveal sizable broadening. We argue that this
broadening originates from the site mixing between Mg$^{2+}$ and Ga$^{3+}$
giving rise to a distribution of Yb--O distances and orientations and, thus, of
CEF parameters that account for the peculiar energy profile of the CEF
excitations. The CEF randomness gives rise to a distribution of the effective
spin-1/2 $g$-factors and explains the unprecedented broadening of low-energy
magnetic excitations in the fully polarized ferromagnetic phase of YbMgGaO$_4$,
although a distribution of magnetic couplings due to the Mg/Ga disorder may be
important as well.
| 0 | 1 | 0 | 0 | 0 | 0 |
Quadrics and Scherk towers | We investigate the relation between quadrics and their Christoffel duals on
the one hand, and certain zero mean curvature surfaces and their Gauss maps on
the other hand. To study the relation between timelike minimal surfaces and the
Christoffel duals of 1-sheeted hyperboloids we introduce para-holomorphic
elliptic functions. The curves of type change for real isothermic surfaces of
mixed causal type turn out to be aligned with the real curvature line net.
| 0 | 0 | 1 | 0 | 0 | 0 |
Scalable Greedy Feature Selection via Weak Submodularity | Greedy algorithms are widely used for problems in machine learning such as
feature selection and set function optimization. Unfortunately, for large
datasets, the running time of even greedy algorithms can be quite high. This is
because for each greedy step we need to refit a model or calculate a function
using the previously selected choices and the new candidate.
Two algorithms that are faster approximations to the greedy forward selection
were introduced recently ([Mirzasoleiman et al. 2013, 2015]). They achieve
better performance by exploiting distributed computation and stochastic
evaluation respectively. Both algorithms have provable performance guarantees
for submodular functions.
In this paper we show that divergent from previously held opinion,
submodularity is not required to obtain approximation guarantees for these two
algorithms. Specifically, we show that a generalized concept of weak
submodularity suffices to give multiplicative approximation guarantees. Our
result extends the applicability of these algorithms to a larger class of
functions. Furthermore, we show that a bounded submodularity ratio can be used
to provide data dependent bounds that can sometimes be tighter also for
submodular functions. We empirically validate our work by showing superior
performance of fast greedy approximations versus several established baselines
on artificial and real datasets.
| 1 | 0 | 0 | 1 | 0 | 0 |
Budget-Constrained Multi-Armed Bandits with Multiple Plays | We study the multi-armed bandit problem with multiple plays and a budget
constraint for both the stochastic and the adversarial setting. At each round,
exactly $K$ out of $N$ possible arms have to be played (with $1\leq K \leq N$).
In addition to observing the individual rewards for each arm played, the player
also learns a vector of costs which has to be covered with an a-priori defined
budget $B$. The game ends when the sum of current costs associated with the
played arms exceeds the remaining budget.
Firstly, we analyze this setting for the stochastic case, for which we assume
each arm to have an underlying cost and reward distribution with support
$[c_{\min}, 1]$ and $[0, 1]$, respectively. We derive an Upper Confidence Bound
(UCB) algorithm which achieves $O(NK^4 \log B)$ regret.
Secondly, for the adversarial case in which the entire sequence of rewards
and costs is fixed in advance, we derive an upper bound on the regret of order
$O(\sqrt{NB\log(N/K)})$ utilizing an extension of the well-known
$\texttt{Exp3}$ algorithm. We also provide upper bounds that hold with high
probability and a lower bound of order $\Omega((1 - K/N)^2 \sqrt{NB/K})$.
| 1 | 0 | 0 | 1 | 0 | 0 |
Thermalized Axion Inflation | We analyze the dynamics of inflationary models with a coupling of the
inflaton $\phi$ to gauge fields of the form $\phi F \tilde{F}/f$, as in the
case of axions. It is known that this leads to an instability, with exponential
amplification of gauge fields, controlled by the parameter $\xi=
\dot{\phi}/(2fH)$, which can strongly affect the generation of cosmological
perturbations and even the background. We show that scattering rates involving
gauge fields can become larger than the expansion rate $H$, due to the very
large occupation numbers, and create a thermal bath of particles of temperature
$T$ during inflation. In the thermal regime, energy is transferred to smaller
scales, radically modifying the predictions of this scenario. We thus argue
that previous constraints on $\xi$ are alleviated. If the gauge fields have
Standard Model interactions, which naturally provides reheating, they
thermalize already at $\xi\gtrsim2.9$, before perturbativity constraints and
also before backreaction takes place. In absence of SM interactions (i.e. for a
dark photon), we find that gauge fields and inflaton perturbations thermalize
if $\xi\gtrsim3.4$; however, observations require $\xi\gtrsim6$, which is above
the perturbativity and backreaction bounds and so a dedicated study is
required. After thermalization, though, the system should evolve non-trivially
due to the competition between the instability and the gauge field thermal
mass. If the thermal mass and the instabilities equilibrate, we expect an
equilibrium temperature of $T_{eq} \simeq \xi H/\bar{g}$ where $\bar{g}$ is the
effective gauge coupling. Finally, we estimate the spectrum of perturbations if
$\phi$ is thermal and find that the tensor to scalar ratio is suppressed by
$H/(2T)$, if tensors do not thermalize.
| 0 | 1 | 0 | 0 | 0 | 0 |
A Data-Driven Approach to Extract Connectivity Structures from Diffusion Tensor Imaging Data | Diffusion Tensor Imaging (DTI) is an effective tool for the analysis of
structural brain connectivity in normal development and in a broad range of
brain disorders. However efforts to derive inherent characteristics of
structural brain networks have been hampered by the very high dimensionality of
the data, relatively small sample sizes, and the lack of widely acceptable
connectivity-based regions of interests (ROIs). Typical approaches have focused
either on regions defined by standard anatomical atlases that do not
incorporate anatomical connectivity, or have been based on voxel-wise analysis,
which results in loss of statistical power relative to structure-wise
connectivity analysis. In this work, we propose a novel, computationally
efficient iterative clustering method to generate connectivity-based
whole-brain parcellations that converge to a stable parcellation in a few
iterations. Our algorithm is based on a sparse representation of the whole
brain connectivity matrix, which reduces the number of edges from around a half
billion to a few million while incorporating the necessary spatial constraints.
We show that the resulting regions in a sense capture the inherent connectivity
information present in the data, and are stable with respect to initialization
and the randomization scheme within the algorithm. These parcellations provide
consistent structural regions across the subjects of population samples that
are homogeneous with respect to anatomic connectivity. Our method also derives
connectivity structures that can be used to distinguish between population
samples with known different structural connectivity. In particular, new
results in structural differences for different population samples such as
Females vs Males, Normal Controls vs Schizophrenia, and different age groups in
Normal Controls are also shown.
| 0 | 0 | 0 | 1 | 1 | 0 |
A survey of location inference techniques on Twitter | The increasing popularity of the social networking service, Twitter, has made
it more involved in day-to-day communications, strengthening social
relationships and information dissemination. Conversations on Twitter are now
being explored as indicators within early warning systems to alert of imminent
natural disasters such earthquakes and aid prompt emergency responses to crime.
Producers are privileged to have limitless access to market perception from
consumer comments on social media and microblogs. Targeted advertising can be
made more effective based on user profile information such as demography,
interests and location. While these applications have proven beneficial, the
ability to effectively infer the location of Twitter users has even more
immense value. However, accurately identifying where a message originated from
or author's location remains a challenge thus essentially driving research in
that regard. In this paper, we survey a range of techniques applied to infer
the location of Twitter users from inception to state-of-the-art. We find
significant improvements over time in the granularity levels and better
accuracy with results driven by refinements to algorithms and inclusion of more
spatial features.
| 1 | 0 | 0 | 0 | 0 | 0 |
Detection and segmentation of the Left Ventricle in Cardiac MRI using Deep Learning | Manual segmentation of the Left Ventricle (LV) is a tedious and meticulous
task that can vary depending on the patient, the Magnetic Resonance Images
(MRI) cuts and the experts. Still today, we consider manual delineation done by
experts as being the ground truth for cardiac diagnosticians. Thus, we are
reviewing the paper - written by Avendi and al. - who presents a combined
approach with Convolutional Neural Networks, Stacked Auto-Encoders and
Deformable Models, to try and automate the segmentation while performing more
accurately. Furthermore, we have implemented parts of the paper (around three
quarts) and experimented both the original method and slightly modified
versions when changing the architecture and the parameters.
| 0 | 0 | 0 | 1 | 0 | 0 |
Curvature-driven stability of defects in nematic textures over spherical disks | Stabilizing defects in liquid-crystal systems is crucial for many physical
processes and applications ranging from functionalizing liquid-crystal textures
to recently reported command of chaotic behaviors of active matters. In this
work, we perform analytical calculations to study the curvature driven
stability mechanism of defects based on the isotropic nematic disk model that
is free of any topological constraint. We show that in a growing spherical disk
covering a sphere the accumulation of curvature effect can prevent typical +1
and +1/2 defects from forming boojum textures where the defects are repelled to
the boundary of the disk. Our calculations reveal that the movement of the
equilibrium position of the +1 defect from the boundary to the center of the
spherical disk occurs in a very narrow window of the disk area, exhibiting the
first-order phase-transition-like behavior. For the pair of +1/2 defects by
splitting a +1 defect, we find the curvature driven alternating repulsive and
attractive interactions between the two defects. With the growth of the
spherical disk these two defects tend to approach and finally recombine towards
a +1 defect texture. The sensitive response of defects to curvature and the
curvature driven stability mechanism demonstrated in this work in nematic disk
systems may have implications towards versatile control and engineering of
liquid crystal textures in various applications.
| 0 | 1 | 0 | 0 | 0 | 0 |
Heterogeneous nucleation of catalyst-free InAs nanowires on silicon | We report on the heterogeneous nucleation of catalyst-free InAs nanowires on
Si (111) substrates by chemical beam epitaxy. We show that nanowire nucleation
is enhanced by sputtering the silicon substrate with energetic particles. We
argue that particle bombardment introduces lattice defects on the silicon
surface that serve as preferential nucleation sites. The formation of these
nucleation sites can be controlled by the sputtering parameters, allowing the
control of nanowire density in a wide range. Nanowire nucleation is accompanied
by unwanted parasitic islands, but by careful choice of annealing and growth
temperature allows to strongly reduce the relative density of these islands and
to realize samples with high nanowire yield.
| 0 | 1 | 0 | 0 | 0 | 0 |
Random Transverse Field Spin-Glass Model on the Cayley tree : phase transition between the two Many-Body-Localized Phases | The quantum Ising model with random couplings and random transverse fields on
the Cayley tree is studied by Real-Space-Renormalization in order to construct
the whole set of eigenstates. The renormalization rules are analyzed via large
deviations. The phase transition between the paramagnetic and the spin-glass
Many-Body-Localized phases involves the activated exponent $\psi=1$ and the
correlation length exponent $\nu=1$. The spin-glass-ordered cluster containing
$N_{SG}$ spins is found to be extremely sparse with respect to the total number
$N$ of spins : its size grows only logarithmically at the critical point
$N_{SG}^{criti} \propto \ln N$, and it is sub-extensive $N_{SG} \propto
N^{\theta}$ in the finite region of the spin-glass phase where the continuously
varying exponent $\theta$ remains in the interval $0<\theta<1$.
| 0 | 1 | 0 | 0 | 0 | 0 |
Femtosecond laser inscription of Bragg grating waveguides in bulk diamond | Femtosecond laser writing is applied to form Bragg grating waveguides in the
diamond bulk. Type II waveguides are integrated with a single pulse
point-by-point periodic laser modification positioned towards the edge of the
waveguide core. These photonic devices, operating in the telecommunications
band, allow for simultaneous optical waveguiding and narrowband reflection from
a 4th order grating. This fabrication technology opens the way towards advanced
3D photonic networks in diamond for a range of applications.
| 0 | 1 | 0 | 0 | 0 | 0 |
FORM version 4.2 | We introduce FORM 4.2, a new minor release of the symbolic manipulation
toolkit. We demonstrate several new features, such as a new pattern matching
option, new output optimization, and automatic expansion of rational functions.
| 1 | 0 | 0 | 0 | 0 | 0 |
An Analysis of Two Common Reference Points for EEGs | Clinical electroencephalographic (EEG) data varies significantly depending on
a number of operational conditions (e.g., the type and placement of electrodes,
the type of electrical grounding used). This investigation explores the
statistical differences present in two different referential montages: Linked
Ear (LE) and Averaged Reference (AR). Each of these accounts for approximately
45% of the data in the TUH EEG Corpus. In this study, we explore the impact
this variability has on machine learning performance. We compare the
statistical properties of features generated using these two montages, and
explore the impact of performance on our standard Hidden Markov Model (HMM)
based classification system. We show that a system trained on LE data
significantly outperforms one trained only on AR data (77.2% vs. 61.4%). We
also demonstrate that performance of a system trained on both data sets is
somewhat compromised (71.4% vs. 77.2%). A statistical analysis of the data
suggests that mean, variance and channel normalization should be considered.
However, cepstral mean subtraction failed to produce an improvement in
performance, suggesting that the impact of these statistical differences is
subtler.
| 0 | 0 | 0 | 1 | 0 | 0 |
A Concurrency-Optimal Binary Search Tree | The paper presents the first \emph{concurrency-optimal} implementation of a
binary search tree (BST). The implementation, based on a standard sequential
implementation of an internal tree, ensures that every \emph{schedule} is
accepted, i.e., interleaving of steps of the sequential code, unless
linearizability is violated. To ensure this property, we use a novel read-write
locking scheme that protects tree \emph{edges} in addition to nodes.
Our implementation outperforms the state-of-the art BSTs on most basic
workloads, which suggests that optimizing the set of accepted schedules of the
sequential code can be an adequate design principle for efficient concurrent
data structures.
| 1 | 0 | 0 | 0 | 0 | 0 |
Controlling seizure propagation in large-scale brain networks | Information transmission in the human brain is a fundamentally dynamic
network process. In partial epilepsy, this process is perturbed and highly
synchronous seizures originate in a local network, the so-called epileptogenic
zone (EZ), before recruiting other close or distant brain regions. We studied
patient-specific brain network models of 15 drug-resistant epilepsy patients
with implanted stereotactic electroencephalography (SEEG) electrodes. Each
personalized brain model was derived from structural data of magnetic resonance
imaging (MRI) and diffusion tensor weighted imaging (DTI), comprising 88 nodes
equipped with region specific neural mass models capable of demonstrating a
range of epileptiform discharges. Each patients virtual brain was further
personalized through the integration of the clinically hypothesized EZ.
Subsequent simulations and connectivity modulations were performed and
uncovered a finite repertoire of seizure propagation patterns. Across patients,
we found that (i) patient-specific network connectivity is predictive for the
subsequent seizure propagation pattern; (ii)seizure propagation is
characterized by a systematic sequence of brain states; (iii) propagation can
be controlled by an optimal intervention on the connectivity matrix; (iv) the
degree of invasiveness can be significantly reduced via the here proposed
seizure control as compared to traditional resective surgery. To stop seizures,
neurosurgeons typically resect the EZ completely. We showed that stability
analysis of the network dynamics using graph theoretical metrics estimates
reliably the spatiotemporal properties of seizure propagation. This suggests
novel less invasive paradigms of surgical interventions to treat and manage
partial epilepsy.
| 0 | 0 | 0 | 0 | 1 | 0 |
DroidStar: Callback Typestates for Android Classes | Event-driven programming frameworks, such as Android, are based on components
with asynchronous interfaces. The protocols for interacting with these
components can often be described by finite-state machines we dub *callback
typestates*. Callback typestates are akin to classical typestates, with the
difference that their outputs (callbacks) are produced asynchronously. While
useful, these specifications are not commonly available, because writing them
is difficult and error-prone.
Our goal is to make the task of producing callback typestates significantly
easier. We present a callback typestate assistant tool, DroidStar, that
requires only limited user interaction to produce a callback typestate. Our
approach is based on an active learning algorithm, L*. We improved the
scalability of equivalence queries (a key component of L*), thus making active
learning tractable on the Android system.
We use DroidStar to learn callback typestates for Android classes both for
cases where one is already provided by the documentation, and for cases where
the documentation is unclear. The results show that DroidStar learns callback
typestates accurately and efficiently. Moreover, in several cases, the
synthesized callback typestates uncovered surprising and undocumented
behaviors.
| 1 | 0 | 0 | 0 | 0 | 0 |
Piezoelectricity for Nondestructive Testing of Crystal Surfaces | A stress is applied at the flat face and the apex of a prismatic
piezoelectric crystal. The voltage generated at these points differs in order
of magnitude. The result may be used to nondestructively test the uniformity of
surfaces of piezoelectric crystals.
| 0 | 1 | 0 | 0 | 0 | 0 |
ALMA Observations of Starless Core Substructure in Ophiuchus | Compact substructure is expected to arise in a starless core as mass becomes
concentrated in the central region likely to form a protostar. Additionally,
multiple peaks may form if fragmentation occurs. We present ALMA Cycle 2
observations of 60 starless and protostellar cores in the Ophiuchus molecular
cloud. We detect eight compact substructures which are >15 arcsec from the
nearest Spitzer YSO. Only one of these has strong evidence for being truly
starless after considering ancillary data, e.g., from Herschel and X-ray
telescopes. An additional extended emission structure has tentative evidence
for starlessness. The number of our detections is consistent with estimates
from a combination of synthetic observations of numerical simulations and
analytical arguments. This result suggests that a similar ALMA study in the
Chamaeleon I cloud, which detected no compact substructure in starless cores,
may be due to the peculiar evolutionary state of cores in that cloud.
| 0 | 1 | 0 | 0 | 0 | 0 |
Neuron-inspired flexible memristive device on silicon (100) | Comprehensive understanding of the world's most energy efficient powerful
computer, the human brain, is an elusive scientific issue. Still, already
gained knowledge indicates memristors can be used as a building block to model
the brain. At the same time, brain cortex is folded allowing trillions of
neurons to be integrated in a compact volume. Therefore, we report flexible
aluminium oxide based memristive devices fabricated and then derived from
widely used bulk mono-crystalline silicon (100). We use complementary metal
oxide semiconductor based processes to layout the foundation for ultra large
scale integration (ULSI) of such memory devices to advance the task of
comprehending a physical model of human brain.
| 0 | 1 | 0 | 0 | 0 | 0 |
Detecting laws in power subgroups | A group law is said to be detectable in power subgroups if, for all coprime
$m$ and $n$, a group $G$ satisfies the law if and only if the power subgroups
$G^m$ and $G^n$ both satisfy the law. We prove that for all positive integers
$c$, nilpotency of class at most $c$ is detectable in power subgroups, as is
the $k$-Engel law for $k$ at most 4. In contrast, detectability in power
subgroups fails for solvability of given derived length: we construct a finite
group $W$ such that $W^2$ and $W^3$ are metabelian but $W$ has derived length
$3$. We analyse the complexity of the detectability of commutativity in power
subgroups, in terms of finite presentations that encode a proof of the result.
| 0 | 0 | 1 | 0 | 0 | 0 |
On the Reliable Detection of Concept Drift from Streaming Unlabeled Data | Classifiers deployed in the real world operate in a dynamic environment,
where the data distribution can change over time. These changes, referred to as
concept drift, can cause the predictive performance of the classifier to drop
over time, thereby making it obsolete. To be of any real use, these classifiers
need to detect drifts and be able to adapt to them, over time. Detecting drifts
has traditionally been approached as a supervised task, with labeled data
constantly being used for validating the learned model. Although effective in
detecting drifts, these techniques are impractical, as labeling is a difficult,
costly and time consuming activity. On the other hand, unsupervised change
detection techniques are unreliable, as they produce a large number of false
alarms. The inefficacy of the unsupervised techniques stems from the exclusion
of the characteristics of the learned classifier, from the detection process.
In this paper, we propose the Margin Density Drift Detection (MD3) algorithm,
which tracks the number of samples in the uncertainty region of a classifier,
as a metric to detect drift. The MD3 algorithm is a distribution independent,
application independent, model independent, unsupervised and incremental
algorithm for reliably detecting drifts from data streams. Experimental
evaluation on 6 drift induced datasets and 4 additional datasets from the
cybersecurity domain demonstrates that the MD3 approach can reliably detect
drifts, with significantly fewer false alarms compared to unsupervised feature
based drift detectors. The reduced false alarms enables the signaling of drifts
only when they are most likely to affect classification performance. As such,
the MD3 approach leads to a detection scheme which is credible, label efficient
and general in its applicability.
| 1 | 0 | 0 | 1 | 0 | 0 |
Exploiting generalization in the subspaces for faster model-based learning | Due to the lack of enough generalization in the state-space, common methods
in Reinforcement Learning (RL) suffer from slow learning speed especially in
the early learning trials. This paper introduces a model-based method in
discrete state-spaces for increasing learning speed in terms of required
experience (but not required computational time) by exploiting generalization
in the experiences of the subspaces. A subspace is formed by choosing a subset
of features in the original state representation (full-space). Generalization
and faster learning in a subspace are due to many-to-one mapping of experiences
from the full-space to each state in the subspace. Nevertheless, due to
inherent perceptual aliasing in the subspaces, the policy suggested by each
subspace does not generally converge to the optimal policy. Our approach,
called Model Based Learning with Subspaces (MoBLeS), calculates confidence
intervals of the estimated Q-values in the full-space and in the subspaces.
These confidence intervals are used in the decision making, such that the agent
benefits the most from the possible generalization while avoiding from
detriment of the perceptual aliasing in the subspaces. Convergence of MoBLeS to
the optimal policy is theoretically investigated. Additionally, we show through
several experiments that MoBLeS improves the learning speed in the early
trials.
| 1 | 0 | 0 | 1 | 0 | 0 |
Quasitriangular structure and twisting of the 2+1 bicrossproduct model | We show that the bicrossproduct model
$C[SU_2^*]{\blacktriangleright\!\!\triangleleft} U(su_2)$ quantum Poincare
group in 2+1 dimensions acting on the quantum spacetime $[x_i,t]=\imath\lambda
x_i$ is related by a Drinfeld and module-algebra twist to the quantum double
$U(su_2)\ltimes C[SU_2]$ acting on the quantum spacetime
$[x_\mu,x_\nu]=\imath\lambda\epsilon_{\mu\nu\rho}x_\rho$. We obtain this twist
by taking a scaling limit as $q\to 1$ of the $q$-deformed version of the above
where it corresponds to a previous theory of $q$-deformed Wick rotation from
$q$-Euclidean to $q$-Minkowski space. We also recover the twist result at the
Lie bialgebra level.
| 0 | 0 | 1 | 0 | 0 | 0 |
Can simple transmission chains foster collective intelligence in binary-choice tasks? | In many social systems, groups of individuals can find remarkably efficient
solutions to complex cognitive problems, sometimes even outperforming a single
expert. The success of the group, however, crucially depends on how the
judgments of the group members are aggregated to produce the collective answer.
A large variety of such aggregation methods have been described in the
literature, such as averaging the independent judgments, relying on the
majority or setting up a group discussion. In the present work, we introduce a
novel approach for aggregating judgments - the transmission chain - which has
not yet been consistently evaluated in the context of collective intelligence.
In a transmission chain, all group members have access to a unique collective
solution and can improve it sequentially. Over repeated improvements, the
collective solution that emerges reflects the judgments of every group members.
We address the question of whether such a transmission chain can foster
collective intelligence for binary-choice problems. In a series of numerical
simulations, we explore the impact of various factors on the performance of the
transmission chain, such as the group size, the model parameters, and the
structure of the population. The performance of this method is compared to
those of the majority rule and the confidence-weighted majority. Finally, we
rely on two existing datasets of individuals performing a series of binary
decisions to evaluate the expected performances of the three methods
empirically. We find that the parameter space where the transmission chain has
the best performance rarely appears in real datasets. We conclude that the
transmission chain is best suited for other types of problems, such as those
that have cumulative properties.
| 1 | 1 | 0 | 0 | 0 | 0 |
A Theoretical Analysis of First Heuristics of Crowdsourced Entity Resolution | Entity resolution (ER) is the task of identifying all records in a database
that refer to the same underlying entity, and are therefore duplicates of each
other. Due to inherent ambiguity of data representation and poor data quality,
ER is a challenging task for any automated process. As a remedy, human-powered
ER via crowdsourcing has become popular in recent years. Using crowd to answer
queries is costly and time consuming. Furthermore, crowd-answers can often be
faulty. Therefore, crowd-based ER methods aim to minimize human participation
without sacrificing the quality and use a computer generated similarity matrix
actively. While, some of these methods perform well in practice, no theoretical
analysis exists for them, and further their worst case performances do not
reflect the experimental findings. This creates a disparity in the
understanding of the popular heuristics for this problem. In this paper, we
make the first attempt to close this gap. We provide a thorough analysis of the
prominent heuristic algorithms for crowd-based ER. We justify experimental
observations with our analysis and information theoretic lower bounds.
| 1 | 0 | 0 | 0 | 0 | 0 |
Dependency resolution and semantic mining using Tree Adjoining Grammars for Tamil Language | Tree adjoining grammars (TAGs) provide an ample tool to capture syntax of
many Indian languages. Tamil represents a special challenge to computational
formalisms as it has extensive agglutinative morphology and a comparatively
difficult argument structure. Modelling Tamil syntax and morphology using TAG
is an interesting problem which has not been in focus even though TAGs are over
4 decades old, since its inception. Our research with Tamil TAGs have shown us
that we can not only represent syntax of the language, but to an extent mine
out semantics through dependency resolution of the sentence. But in order to
demonstrate this phenomenal property, we need to parse Tamil language sentences
using TAGs we have built and through parsing obtain a derivation we could use
to resolve dependencies, thus proving the semantic property. We use an in-house
developed pseudo lexical TAG chart parser; algorithm given by Schabes and Joshi
(1988), for generating derivations of sentences. We do not use any statistics
to rank out ambiguous derivations but rather use all of them to understand the
mentioned semantic relation with in TAGs for Tamil. We shall also present a
brief parser analysis for the completeness of our discussions.
| 1 | 0 | 0 | 0 | 0 | 0 |
Loop conditions | We discuss such Maltsev conditions that consist of just one linear equation,
we call them loop conditions. To every such condition can be assigned a graph.
We provide a classification of conditions with undirected graphs. It follows
that the Siggers term is the weakest non-trivial loop condition.
| 0 | 0 | 1 | 0 | 0 | 0 |
Impact of Feature Selection on Micro-Text Classification | Social media datasets, especially Twitter tweets, are popular in the field of
text classification. Tweets are a valuable source of micro-text (sometimes
referred to as "micro-blogs"), and have been studied in domains such as
sentiment analysis, recommendation systems, spam detection, clustering, among
others. Tweets often include keywords referred to as "Hashtags" that can be
used as labels for the tweet. Using tweets encompassing 50 labels, we studied
the impact of word versus character-level feature selection and extraction on
different learners to solve a multi-class classification task. We show that
feature extraction of simple character-level groups performs better than simple
word groups and pre-processing methods like normalizing using Porter's Stemming
and Part-of-Speech ("POS")-Lemmatization.
| 1 | 0 | 0 | 0 | 0 | 0 |
One-Shot Learning of Multi-Step Tasks from Observation via Activity Localization in Auxiliary Video | Due to burdensome data requirements, learning from demonstration often falls
short of its promise to allow users to quickly and naturally program robots.
Demonstrations are inherently ambiguous and incomplete, making correct
generalization to unseen situations difficult without a large number of
demonstrations in varying conditions. By contrast, humans are often able to
learn complex tasks from a single demonstration (typically observations without
action labels) by leveraging context learned over a lifetime. Inspired by this
capability, our goal is to enable robots to perform one-shot learning of
multi-step tasks from observation by leveraging auxiliary video data as
context. Our primary contribution is a novel system that achieves this goal by:
(1) using a single user-segmented demonstration to define the primitive actions
that comprise a task, (2) localizing additional examples of these actions in
unsegmented auxiliary videos via a metalearning-based approach, (3) using these
additional examples to learn a reward function for each action, and (4)
performing reinforcement learning on top of the inferred reward functions to
learn action policies that can be combined to accomplish the task. We
empirically demonstrate that a robot can learn multi-step tasks more
effectively when provided auxiliary video, and that performance greatly
improves when localizing individual actions, compared to learning from
unsegmented videos.
| 1 | 0 | 0 | 1 | 0 | 0 |
Larger is Better: The Effect of Learning Rates Enjoyed by Stochastic Optimization with Progressive Variance Reduction | In this paper, we propose a simple variant of the original stochastic
variance reduction gradient (SVRG), where hereafter we refer to as the variance
reduced stochastic gradient descent (VR-SGD). Different from the choices of the
snapshot point and starting point in SVRG and its proximal variant, Prox-SVRG,
the two vectors of each epoch in VR-SGD are set to the average and last iterate
of the previous epoch, respectively. This setting allows us to use much larger
learning rates or step sizes than SVRG, e.g., 3/(7L) for VR-SGD vs 1/(10L) for
SVRG, and also makes our convergence analysis more challenging. In fact, a
larger learning rate enjoyed by VR-SGD means that the variance of its
stochastic gradient estimator asymptotically approaches zero more rapidly.
Unlike common stochastic methods such as SVRG and proximal stochastic methods
such as Prox-SVRG, we design two different update rules for smooth and
non-smooth objective functions, respectively. In other words, VR-SGD can tackle
non-smooth and/or non-strongly convex problems directly without using any
reduction techniques such as quadratic regularizers. Moreover, we analyze the
convergence properties of VR-SGD for strongly convex problems, which show that
VR-SGD attains a linear convergence rate. We also provide the convergence
guarantees of VR-SGD for non-strongly convex problems. Experimental results
show that the performance of VR-SGD is significantly better than its
counterparts, SVRG and Prox-SVRG, and it is also much better than the best
known stochastic method, Katyusha.
| 1 | 0 | 1 | 1 | 0 | 0 |
Concerning the Neural Code | The central problem with understanding brain and mind is the neural code
issue: understanding the matter of our brain as basis for the phenomena of our
mind. The richness with which our mind represents our environment, the
parsimony of genetic data, the tremendous efficiency with which the brain
learns from scant sensory input and the creativity with which our mind
constructs mental worlds all speak in favor of mind as an emergent phenomenon.
This raises the further issue of how the neural code supports these processes
of organization. The central point of this communication is that the neural
code has the form of structured net fragments that are formed by network
self-organization, activate and de-activate on the functional time scale, and
spontaneously combine to form larger nets with the same basic structure.
| 0 | 0 | 0 | 0 | 1 | 0 |
Community Question Answering Platforms vs. Twitter for Predicting Characteristics of Urban Neighbourhoods | In this paper, we investigate whether text from a Community Question
Answering (QA) platform can be used to predict and describe real-world
attributes. We experiment with predicting a wide range of 62 demographic
attributes for neighbourhoods of London. We use the text from QA platform of
Yahoo! Answers and compare our results to the ones obtained from Twitter
microblogs. Outcomes show that the correlation between the predicted
demographic attributes using text from Yahoo! Answers discussions and the
observed demographic attributes can reach an average Pearson correlation
coefficient of \r{ho} = 0.54, slightly higher than the predictions obtained
using Twitter data. Our qualitative analysis indicates that there is semantic
relatedness between the highest correlated terms extracted from both datasets
and their relative demographic attributes. Furthermore, the correlations
highlight the different natures of the information contained in Yahoo! Answers
and Twitter. While the former seems to offer a more encyclopedic content, the
latter provides information related to the current sociocultural aspects or
phenomena.
| 1 | 0 | 0 | 0 | 0 | 0 |
SPASS: Scientific Prominence Active Search System with Deep Image Captioning Network | Planetary exploration missions with Mars rovers are complicated, which
generally require elaborated task planning by human experts, from the path to
take to the images to capture. NASA has been using this process to acquire over
22 million images from the planet Mars. In order to improve the degree of
automation and thus efficiency in this process, we propose a system for
planetary rovers to actively search for prominence of prespecified scientific
features in captured images. Scientists can prespecify such search tasks in
natural language and upload them to a rover, on which the deployed system
constantly captions captured images with a deep image captioning network and
compare the auto-generated captions to the prespecified search tasks by certain
metrics so as to prioritize those images for transmission. As a beneficial side
effect, the proposed system can also be deployed to ground-based planetary data
systems as a content-based search engine.
| 1 | 0 | 0 | 1 | 0 | 0 |
Nonlinear Sequential Accepts and Rejects for Identification of Top Arms in Stochastic Bandits | We address the M-best-arm identification problem in multi-armed bandits. A
player has a limited budget to explore K arms (M<K), and once pulled, each arm
yields a reward drawn (independently) from a fixed, unknown distribution. The
goal is to find the top M arms in the sense of expected reward. We develop an
algorithm which proceeds in rounds to deactivate arms iteratively. At each
round, the budget is divided by a nonlinear function of remaining arms, and the
arms are pulled correspondingly. Based on a decision rule, the deactivated arm
at each round may be accepted or rejected. The algorithm outputs the accepted
arms that should ideally be the top M arms. We characterize the decay rate of
the misidentification probability and establish that the nonlinear budget
allocation proves to be useful for different problem environments (described by
the number of competitive arms). We provide comprehensive numerical experiments
showing that our algorithm outperforms the state-of-the-art using suitable
nonlinearity.
| 1 | 0 | 0 | 1 | 0 | 0 |
A Machine Learning Framework to Forecast Wave Conditions | A~machine learning framework is developed to estimate ocean-wave conditions.
By supervised training of machine learning models on many thousands of
iterations of a physics-based wave model, accurate representations of
significant wave heights and period can be used to predict ocean conditions. A
model of Monterey Bay was used as the example test site; it was forced by
measured wave conditions, ocean-current nowcasts, and reported winds. These
input data along with model outputs of spatially variable wave heights and
characteristic period were aggregated into supervised learning training and
test data sets, which were supplied to machine learning models. These machine
learning models replicated wave heights with a root-mean-squared error of 9cm
and correctly identify over 90% of the characteristic periods for the test-data
sets. Impressively, transforming model inputs to outputs through matrix
operations requires only a fraction (<1/1,000) of the computation time compared
to forecasting with the physics-based model.
| 0 | 1 | 0 | 0 | 0 | 0 |
Unobtrusive Deferred Update Stabilization for Efficient Geo-Replication | In this paper we propose a novel approach to manage the throughput vs latency
tradeoff that emerges when managing updates in geo-replicated systems. Our
approach consists in allowing full concurrency when processing local updates
and using a deferred local serialisation procedure before shipping updates to
remote datacenters. This strategy allows to implement inexpensive mechanisms to
ensure system consistency requirements while avoiding intrusive effects on
update operations, a major performance limitation of previous systems. We have
implemented our approach as a variant of Riak KV. Our extensive evaluation
shows that we outperform sequencer-based approaches by almost an order of
magnitude in the maximum achievable throughput. Furthermore, unlike previous
sequencer-free solutions, our approach reaches nearly optimal remote update
visibility latencies without limiting throughput.
| 1 | 0 | 0 | 0 | 0 | 0 |
Exploratory Analysis of Pairwise Interactions in Online Social Networks | In the last few decades sociologists were trying to explain human behaviour
by analysing social networks, which requires access to data about interpersonal
relationships. This represented a big obstacle in this research field until the
emergence of online social networks (OSNs), which vastly facilitated the
process of collecting such data. Nowadays, by crawling public profiles on OSNs,
it is possible to build a social graph where "friends" on OSN become
represented as connected nodes. OSN connection does not necessarily indicate a
close real-life relationship, but using OSN interaction records may reveal
real-life relationship intensities, a topic which inspired a number of recent
researches. Still, published research currently lacks an extensive exploratory
analysis of OSN interaction records, i.e. a comprehensive overview of users'
interaction via different ways of OSN interaction. In this paper we provide
such an overview by leveraging results of conducted extensive social experiment
which managed to collect records for over 3,200 Facebook users interacting with
over 1,400,000 of their friends. Our exploratory analysis focuses on extracting
population distributions and correlation parameters for 13 interaction
parameters, providing valuable insight in online social network interaction for
future researches aimed at this field of study.
| 1 | 0 | 0 | 0 | 0 | 0 |
Communication-Avoiding Optimization Methods for Distributed Massive-Scale Sparse Inverse Covariance Estimation | Across a variety of scientific disciplines, sparse inverse covariance
estimation is a popular tool for capturing the underlying dependency
relationships in multivariate data. Unfortunately, most estimators are not
scalable enough to handle the sizes of modern high-dimensional data sets (often
on the order of terabytes), and assume Gaussian samples. To address these
deficiencies, we introduce HP-CONCORD, a highly scalable optimization method
for estimating a sparse inverse covariance matrix based on a regularized
pseudolikelihood framework, without assuming Gaussianity. Our parallel proximal
gradient method uses a novel communication-avoiding linear algebra algorithm
and runs across a multi-node cluster with up to 1k nodes (24k cores), achieving
parallel scalability on problems with up to ~819 billion parameters (1.28
million dimensions); even on a single node, HP-CONCORD demonstrates
scalability, outperforming a state-of-the-art method. We also use HP-CONCORD to
estimate the underlying dependency structure of the brain from fMRI data, and
use the result to identify functional regions automatically. The results show
good agreement with a clustering from the neuroscience literature.
| 1 | 0 | 0 | 1 | 0 | 0 |
Thought Viruses and Asset Prices | We use insights from epidemiology, namely the SIR model, to study how agents
infect each other with "investment ideas." Once an investment idea "goes
viral," equilibrium prices exhibit the typical "fever peak," which is
characteristic for speculative excesses. Using our model, we identify a time
line of symptoms that indicate whether a boom is in its early or later stages.
Regarding the market's top, we find that prices start to decline while the
number of infected agents, who buy the asset, is still rising. Moreover, the
presence of fully rational agents (i) accelerates booms (ii) lowers peak prices
and (iii) produces broad, drawn-out, market tops.
| 0 | 0 | 0 | 0 | 0 | 1 |
Walking Through Waypoints | We initiate the study of a fundamental combinatorial problem: Given a
capacitated graph $G=(V,E)$, find a shortest walk ("route") from a source $s\in
V$ to a destination $t\in V$ that includes all vertices specified by a set
$\mathscr{W}\subseteq V$: the \emph{waypoints}. This waypoint routing problem
finds immediate applications in the context of modern networked distributed
systems. Our main contribution is an exact polynomial-time algorithm for graphs
of bounded treewidth. We also show that if the number of waypoints is
logarithmically bounded, exact polynomial-time algorithms exist even for
general graphs. Our two algorithms provide an almost complete characterization
of what can be solved exactly in polynomial-time: we show that more general
problems (e.g., on grid graphs of maximum degree 3, with slightly more
waypoints) are computationally intractable.
| 1 | 0 | 0 | 0 | 0 | 0 |
Imaging a Central Ionized Component, a Narrow Ring, and the CO Snowline in the Multi-Gapped Disk of HD 169142 | We report Very Large Array observations at 7 mm, 9 mm, and 3 cm toward the
pre-transitional disk of the Herbig Ae star HD 169142. These observations have
allowed us to study the mm emission of this disk with the highest angular
resolution so far ($0\rlap."12\times0\rlap."09$, or 14 au$\times$11 au, at 7
mm). Our 7 and 9 mm images show a narrow ring of emission at a radius of
$\sim25$ au tracing the outer edge of the inner gap. This ring presents an
asymmetric morphology that could be produced by dynamical interactions between
the disk and forming planets. Additionally, the azimuthally averaged radial
intensity profiles of the 7 and 9 mm images confirm the presence of the
previously reported gap at $\sim45$ au, and reveal a new gap at $\sim85$ au. We
analyzed archival DCO$^+$(3-2) and C$^{18}$O(2-1) ALMA observations, showing
that the CO snowline is located very close to this third outer gap. This
suggests that growth and accumulation of large dust grains close to the CO
snowline could be the mechanism responsible for this proposed outer gap.
Finally, a compact source of emission is detected at 7 mm, 9 mm, and 3 cm
toward the center of the disk. Its flux density and spectral index indicate
that it is dominated by free-free emission from ionized gas, which could be
associated with either the photoionization of the inner disk, an independent
object, or an ionized jet.
| 0 | 1 | 0 | 0 | 0 | 0 |
Viconmavlink: A software tool for indoor positioning using a motion capture system | Motion capture is a widely-used technology in robotics research thanks to its
precise posi tional measurements with real-time performance. This paper
presents ViconMAVLink, a cross-platform open-source software tool that provides
indoor positioning services to networked robots. ViconMAVLink converts Vicon
motion capture data into proper pose and motion data formats and send
localization information to robots using the MAVLink protocol. The software is
a convenient tool for mobile robotics researchers to conduct experiments in a
controlled indoor environment.
| 1 | 0 | 0 | 0 | 0 | 0 |
On the set of optimal homeomorphisms for the natural pseudo-distance associated with the Lie group S^1 | If $\varphi$ and $\psi$ are two continuous real-valued functions defined on a
compact topological space $X$ and $G$ is a subgroup of the group of all
homeomorphisms of $X$ onto itself, the natural pseudo-distance
$d_G(\varphi,\psi)$ is defined as the infimum of $\mathcal{L}(g)=\|\varphi-\psi
\circ g \|_\infty$, as $g$ varies in $G$. In this paper, we make a first step
towards extending the study of this concept to the case of Lie groups, by
assuming $X=G=S^1$. In particular, we study the set of the optimal
homeomorphisms for $d_G$, i.e. the elements $\rho_\alpha$ of $S^1$ such that
$\mathcal{L}(\rho_\alpha)$ is equal to $d_G(\varphi,\psi)$. As our main
results, we give conditions that a homeomorphism has to meet in order to be
optimal, and we prove that the set of the optimal homeomorphisms is finite
under suitable conditions.
| 1 | 0 | 1 | 0 | 0 | 0 |
A generalization of an identity due to Kimura and Ruehr | An identity stated by Kimura and proved by Ruehr, Kimura and others
stipulates that for any function $f$ continuous on $[-\frac{1}{2},
\frac{3}{2}]$ one has $$ \int_{-1/2}^{3/2} f(3x^2 - 2x^3) dx = 2 \int_0^1
f(3x^2 - 2x^3) dx. $$ We prove that this equality is not an isolated example by
providing a family of polynomials, related to the Tchebychev polynomials and of
which $(3x^2 - 2x^3)$ is a particular case, giving rise to similar identities.
| 0 | 0 | 1 | 0 | 0 | 0 |
Towards Scalable Spectral Clustering via Spectrum-Preserving Sparsification | The eigendeomposition of nearest-neighbor (NN) graph Laplacian matrices is
the main computational bottleneck in spectral clustering. In this work, we
introduce a highly-scalable, spectrum-preserving graph sparsification algorithm
that enables to build ultra-sparse NN (u-NN) graphs with guaranteed
preservation of the original graph spectrums, such as the first few
eigenvectors of the original graph Laplacian. Our approach can immediately lead
to scalable spectral clustering of large data networks without sacrificing
solution quality. The proposed method starts from constructing low-stretch
spanning trees (LSSTs) from the original graphs, which is followed by
iteratively recovering small portions of "spectrally critical" off-tree edges
to the LSSTs by leveraging a spectral off-tree embedding scheme. To determine
the suitable amount of off-tree edges to be recovered to the LSSTs, an
eigenvalue stability checking scheme is proposed, which enables to robustly
preserve the first few Laplacian eigenvectors within the sparsified graph.
Additionally, an incremental graph densification scheme is proposed for
identifying extra edges that have been missing in the original NN graphs but
can still play important roles in spectral clustering tasks. Our experimental
results for a variety of well-known data sets show that the proposed method can
dramatically reduce the complexity of NN graphs, leading to significant
speedups in spectral clustering.
| 1 | 0 | 0 | 1 | 0 | 0 |
Deep-Learnt Classification of Light Curves | Astronomy light curves are sparse, gappy, and heteroscedastic. As a result
standard time series methods regularly used for financial and similar datasets
are of little help and astronomers are usually left to their own instruments
and techniques to classify light curves. A common approach is to derive
statistical features from the time series and to use machine learning methods,
generally supervised, to separate objects into a few of the standard classes.
In this work, we transform the time series to two-dimensional light curve
representations in order to classify them using modern deep learning
techniques. In particular, we show that convolutional neural networks based
classifiers work well for broad characterization and classification. We use
labeled datasets of periodic variables from CRTS survey and show how this opens
doors for a quick classification of diverse classes with several possible
exciting extensions.
| 0 | 1 | 0 | 0 | 0 | 0 |
Bulk crystalline optomechanics | Brillouin processes couple light and sound through optomechanical three-wave
interactions. Within bulk solids, this coupling is mediated by the intrinsic
photo-elastic material response yielding coherent emission of high frequency
(GHz) acoustic phonons. This same interaction produces strong optical
nonlinearities that overtake both Raman or Kerr nonlinearities in practically
all solids. In this paper, we show that the strength and character of Brillouin
interactions are radically altered at low temperatures when the phonon
coherence length surpasses the system size. In this limit, the solid becomes a
coherent optomechanical system with macroscopic (cm-scale) phonon modes
possessing large ($60\ \mu \rm{g}$) motional masses. These phonon modes, which
are formed by shaping the surfaces of the crystal into a confocal phononic
resonator, yield appreciable optomechanical coupling rates (${\sim}100$ Hz),
providing access to ultra-high $Q$-factor ($4.2{\times}10^7$) phonon modes at
high ($12$ GHz) carrier frequencies. The single-pass nonlinear optical
susceptibility is enhanced from its room temperature value by more than four
orders of magnitude. Through use of bulk properties, rather than
nano-structural control, this comparatively simple approach is enticing for the
ability to engineer optomechanical coupling at high frequencies and with high
power handling. In contrast to cavity optomechanics, we show that this system
yields a unique form of dispersive symmetry breaking that enables selective
phonon heating or cooling without an optical cavity (i.e., cavity-less
optomechanics). Extending these results, practically any transparent
crystalline material can be shaped into an optomechanical system as the basis
for materials spectroscopy, new regimes of laser physics, precision metrology,
quantum information processing, and for studies of macroscopic quantum
coherence.
| 0 | 1 | 0 | 0 | 0 | 0 |
Swift Linked Data Miner: Mining OWL 2 EL class expressions directly from online RDF datasets | In this study, we present Swift Linked Data Miner, an interruptible algorithm
that can directly mine an online Linked Data source (e.g., a SPARQL endpoint)
for OWL 2 EL class expressions to extend an ontology with new SubClassOf:
axioms. The algorithm works by downloading only a small part of the Linked Data
source at a time, building a smart index in the memory and swiftly iterating
over the index to mine axioms. We propose a transformation function from mined
axioms to RDF Data Shapes. We show, by means of a crowdsourcing experiment,
that most of the axioms mined by Swift Linked Data Miner are correct and can be
added to an ontology. We provide a ready to use Protégé plugin implementing
the algorithm, to support ontology engineers in their daily modeling work.
| 1 | 0 | 0 | 0 | 0 | 0 |
Political Footprints: Political Discourse Analysis using Pre-Trained Word Vectors | In this paper, we discuss how machine learning could be used to produce a
systematic and more objective political discourse analysis. Political
footprints are vector space models (VSMs) applied to political discourse. Each
of their vectors represents a word, and is produced by training the English
lexicon on large text corpora. This paper presents a simple implementation of
political footprints, some heuristics on how to use them, and their application
to four cases: the U.N. Kyoto Protocol and Paris Agreement, and two U.S.
presidential elections. The reader will be offered a number of reasons to
believe that political footprints produce meaningful results, along with some
suggestions on how to improve their implementation.
| 1 | 0 | 0 | 0 | 0 | 0 |
Predicting the Quality of Short Narratives from Social Media | An important and difficult challenge in building computational models for
narratives is the automatic evaluation of narrative quality. Quality evaluation
connects narrative understanding and generation as generation systems need to
evaluate their own products. To circumvent difficulties in acquiring
annotations, we employ upvotes in social media as an approximate measure for
story quality. We collected 54,484 answers from a crowd-powered
question-and-answer website, Quora, and then used active learning to build a
classifier that labeled 28,320 answers as stories. To predict the number of
upvotes without the use of social network features, we create neural networks
that model textual regions and the interdependence among regions, which serve
as strong benchmarks for future research. To our best knowledge, this is the
first large-scale study for automatic evaluation of narrative quality.
| 1 | 0 | 0 | 0 | 0 | 0 |
Fast Approximate Natural Gradient Descent in a Kronecker-factored Eigenbasis | Optimization algorithms that leverage gradient covariance information, such
as variants of natural gradient descent (Amari, 1998), offer the prospect of
yielding more effective descent directions. For models with many parameters,
the covariance matrix they are based on becomes gigantic, making them
inapplicable in their original form. This has motivated research into both
simple diagonal approximations and more sophisticated factored approximations
such as KFAC (Heskes, 2000; Martens & Grosse, 2015; Grosse & Martens, 2016). In
the present work we draw inspiration from both to propose a novel approximation
that is provably better than KFAC and amendable to cheap partial updates. It
consists in tracking a diagonal variance, not in parameter coordinates, but in
a Kronecker-factored eigenbasis, in which the diagonal approximation is likely
to be more effective. Experiments show improvements over KFAC in optimization
speed for several deep network architectures.
| 0 | 0 | 0 | 1 | 0 | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.