title
stringlengths 7
239
| abstract
stringlengths 7
2.76k
| cs
int64 0
1
| phy
int64 0
1
| math
int64 0
1
| stat
int64 0
1
| quantitative biology
int64 0
1
| quantitative finance
int64 0
1
|
---|---|---|---|---|---|---|---|
Dual Supervised Learning | Many supervised learning tasks are emerged in dual forms, e.g.,
English-to-French translation vs. French-to-English translation, speech
recognition vs. text to speech, and image classification vs. image generation.
Two dual tasks have intrinsic connections with each other due to the
probabilistic correlation between their models. This connection is, however,
not effectively utilized today, since people usually train the models of two
dual tasks separately and independently. In this work, we propose training the
models of two dual tasks simultaneously, and explicitly exploiting the
probabilistic correlation between them to regularize the training process. For
ease of reference, we call the proposed approach \emph{dual supervised
learning}. We demonstrate that dual supervised learning can improve the
practical performances of both tasks, for various applications including
machine translation, image processing, and sentiment analysis.
| 1 | 0 | 0 | 1 | 0 | 0 |
Pentavalent symmetric graphs of order four times an odd square-free integer | A graph is said to be symmetric if its automorphism group is transitive on
its arcs. Guo et al. (Electronic J. Combin. 18, \#P233, 2011) and Pan et al.
(Electronic J. Combin. 20, \#P36, 2013) determined all pentavalent symmetric
graphs of order $4pq$. In this paper, we shall generalize this result by
determining all connected pentavalent symmetric graphs of order four times an
odd square-free integer. It is shown in this paper that, for each of such
graphs $\it\Gamma$, either the full automorphism group ${\sf Aut}\it\Gamma$ is
isomorphic to ${\sf PSL}(2,p)$, ${\sf PGL}(2,p)$, ${\sf
PSL}(2,p){\times}\mathbb{Z}_2$ or ${\sf PGL}(2,p){\times}\mathbb{Z}_2$, or
$\it\Gamma$ is isomorphic to one of 8 graphs.
| 0 | 0 | 1 | 0 | 0 | 0 |
Applying the Polyhedral Model to Tile Time Loops in Devito | The run time of many scientific computation applications for numerical
methods is heavily dependent on just a few multi-dimensional loop nests. Since
these applications are often limited by memory bandwidth rather than
computational resources they can benefit greatly from any optimizations which
decrease the run time of their loops by improving data reuse and thus reducing
the total memory traffic. Some of the most effective of these optimizations are
not suitable for development by hand or require advanced software engineering
knowledge which is beyond the level of many researchers who are not specialists
in code optimization. Several tools exist to automate the generation of
high-performance code for numerical methods, such as Devito which produces code
for finite-difference approximations typically used in the seismic imaging
domain. We present a loop-tiling optimization which can be applied to
Devito-generated loops and improves run time by up to 27.5%, and options for
automating this optimization in the Devito framework.
| 1 | 0 | 0 | 0 | 0 | 0 |
Deictic Image Maps: An Abstraction For Learning Pose Invariant Manipulation Policies | In applications of deep reinforcement learning to robotics, it is often the
case that we want to learn pose invariant policies: policies that are invariant
to changes in the position and orientation of objects in the world. For
example, consider a peg-in-hole insertion task. If the agent learns to insert a
peg into one hole, we would like that policy to generalize to holes presented
in different poses. Unfortunately, this is a challenge using conventional
methods. This paper proposes a novel state and action abstraction that is
invariant to pose shifts called \textit{deictic image maps} that can be used
with deep reinforcement learning. We provide broad conditions under which
optimal abstract policies are optimal for the underlying system. Finally, we
show that the method can help solve challenging robotic manipulation problems.
| 1 | 0 | 0 | 0 | 0 | 0 |
Charged Vector Particles Tunneling From 5D Black Hole and Black Ring | In this paper, we investigate the Hawking radiation process as a
semiclassical quantum tunneling phenomenon from black ring and Myers-Perry
black holes in 5-dimensional (5D) spaces. Using Lagrangian of
Glashow-Weinberg-Salam model with background electromagnetic field (for charged
W-bosons) and the WKB approximation, we will evaluate the tunneling
rate/probability of charged vector particles through horizons by taking into
account the electromagnetic vector potential. Moreover, we investigate the
corresponding Hawking temperature values by considering Boltzmann factor for
both cases and analyze the whole spectrum generally.
| 0 | 1 | 0 | 0 | 0 | 0 |
Implementing implicit OpenMP data sharing on GPUs | OpenMP is a shared memory programming model which supports the offloading of
target regions to accelerators such as NVIDIA GPUs. The implementation in
Clang/LLVM aims to deliver a generic GPU compilation toolchain that supports
both the native CUDA C/C++ and the OpenMP device offloading models. There are
situations where the semantics of OpenMP and those of CUDA diverge. One such
example is the policy for implicitly handling local variables. In CUDA, local
variables are implicitly mapped to thread local memory and thus become private
to a CUDA thread. In OpenMP, due to semantics that allow the nesting of regions
executed by different numbers of threads, variables need to be implicitly
\emph{shared} among the threads of a contention group. In this paper we
introduce a re-design of the OpenMP device data sharing infrastructure that is
responsible for the implicit sharing of local variables in the Clang/LLVM
toolchain. We introduce a new data sharing infrastructure that lowers
implicitly shared variables to the shared memory of the GPU. We measure the
amount of shared memory used by our scheme in cases that involve scalar
variables and statically allocated arrays. The evaluation is carried out by
offloading to K40 and P100 NVIDIA GPUs. For scalar variables the pressure on
shared memory is relatively low, under 26\% of shared memory utilization for
the K40, and does not negatively impact occupancy. The limiting occupancy
factor in that case is register pressure. The data sharing scheme offers the
users a simple memory model for controlling the implicit allocation of device
shared memory.
| 1 | 0 | 0 | 0 | 0 | 0 |
Real-Time Impulse Noise Removal from MR Images for Radiosurgery Applications | In the recent years image processing techniques are used as a tool to improve
detection and diagnostic capabilities in the medical applications. Medical
applications have been so much affected by these techniques which some of them
are embedded in medical instruments such as MRI, CT and other medical devices.
Among these techniques, medical image enhancement algorithms play an essential
role in removal of the noise which can be produced by medical instruments and
during image transfer. It has been proved that impulse noise is a major type of
noise, which is produced during medical operations, such as MRI, CT, and
angiography, by their image capturing devices. An embeddable hardware module
which is able to denoise medical images before and during surgical operations
could be very helpful. In this paper an accurate algorithm is proposed for
real-time removal of impulse noise in medical images. All image blocks are
divided into three categories of edge, smooth, and disordered areas. A
different reconstruction method is applied to each category of blocks for the
purpose of noise removal. The proposed method is tested on MR images.
Simulation results show acceptable denoising accuracy for various levels of
noise. Also an FPAG implementation of our denoising algorithm shows acceptable
hardware resource utilization. Hence, the algorithm is suitable for embedding
in medical hardware instruments such as radiosurgery devices.
| 1 | 1 | 0 | 0 | 0 | 0 |
Pitfalls of Graph Neural Network Evaluation | Semi-supervised node classification in graphs is a fundamental problem in
graph mining, and the recently proposed graph neural networks (GNNs) have
achieved unparalleled results on this task. Due to their massive success, GNNs
have attracted a lot of attention, and many novel architectures have been put
forward. In this paper we show that existing evaluation strategies for GNN
models have serious shortcomings. We show that using the same
train/validation/test splits of the same datasets, as well as making
significant changes to the training procedure (e.g. early stopping criteria)
precludes a fair comparison of different architectures. We perform a thorough
empirical evaluation of four prominent GNN models and show that considering
different splits of the data leads to dramatically different rankings of
models. Even more importantly, our findings suggest that simpler GNN
architectures are able to outperform the more sophisticated ones if the
hyperparameters and the training procedure are tuned fairly for all models.
| 1 | 0 | 0 | 0 | 0 | 0 |
Randomized CP Tensor Decomposition | The CANDECOMP/PARAFAC (CP) tensor decomposition is a popular
dimensionality-reduction method for multiway data. Dimensionality reduction is
often sought since many high-dimensional tensors have low intrinsic rank
relative to the dimension of the ambient measurement space. However, the
emergence of `big data' poses significant computational challenges for
computing this fundamental tensor decomposition. Leveraging modern randomized
algorithms, we demonstrate that the coherent structure can be learned from a
smaller representation of the tensor in a fraction of the time. Moreover, the
high-dimensional signal can be faithfully approximated from the compressed
measurements. Thus, this simple but powerful algorithm enables one to compute
the approximate CP decomposition even for massive tensors. The approximation
error can thereby be controlled via oversampling and the computation of power
iterations. In addition to theoretical results, several empirical results
demonstrate the performance of the proposed algorithm.
| 1 | 0 | 0 | 1 | 0 | 0 |
App Store 2.0: From Crowd Information to Actionable Feedback in Mobile Ecosystems | Given the increasing competition in mobile app ecosystems, improving the
experience of users has become a major goal for app vendors. This article
introduces a visionary app store, called APP STORE 2.0, which exploits
crowdsourced information about apps, devices and users to increase the overall
quality of the delivered mobile apps. We sketch a blueprint architecture of the
envisioned app stores and discuss the different kinds of actionable feedbacks
that app stores can generate using crowdsourced information.
| 1 | 0 | 0 | 0 | 0 | 0 |
An Information Matrix Approach for State Secrecy | This paper studies the problem of remote state estimation in the presence of
a passive eavesdropper. A sensor measures a linear plant's state and transmits
it to an authorized user over a packet-dropping channel, which is susceptible
to eavesdropping. Our goal is to design a coding scheme such that the
eavesdropper cannot infer the plant's current state, while the user
successfully decodes the sent messages. We employ a novel class of codes,
termed State-Secrecy Codes, which are fast and efficient for dynamical systems.
They apply linear time-varying transformations to the current and past states
received by the user. In this way, they force the eavesdropper's information
matrix to decrease with asymptotically the same rate as in the open-loop
prediction case, i.e. when the eavesdropper misses all messages. As a result,
the eavesdropper's minimum mean square error (mmse) for the unstable states
grows unbounded, while the respective error for the stable states converges to
the open-loop prediction one. These secrecy guarantees are achieved under
minimal conditions, which require that, at least once, the user receives the
corresponding packet while the eavesdropper fails to intercept it. Meanwhile,
the user's estimation performance remains optimal. The theoretical results are
illustrated in simulations.
| 1 | 0 | 0 | 0 | 0 | 0 |
Adversarial Attacks on Node Embeddings | The goal of network representation learning is to learn low-dimensional node
embeddings that capture the graph structure and are useful for solving
downstream tasks. However, despite the proliferation of such methods there is
currently no study of their robustness to adversarial attacks. We provide the
first adversarial vulnerability analysis on the widely used family of methods
based on random walks. We derive efficient adversarial perturbations that
poison the network structure and have a negative effect on both the quality of
the embeddings and the downstream tasks. We further show that our attacks are
transferable -- they generalize to many models -- and are successful even when
the attacker has restricted actions.
| 1 | 0 | 0 | 0 | 0 | 0 |
Time-reversed magnetically controlled perturbation (TRMCP) optical focusing inside scattering media | Manipulating and focusing light deep inside biological tissue and tissue-like
complex media has been desired for long yet considered challenging. One
feasible strategy is through optical wavefront engineering, where the optical
scattering-induced phase distortions are time reversed or pre-compensated so
that photons travel along different optical paths interfere constructively at
the targeted position within a scattering medium. To define the targeted
position, an internal guidestar is needed to guide or provide a feedback for
wavefront engineering. It could be injected or embedded probes such as
fluorescence or nonlinear microspheres, ultrasonic modulation, as well as
absorption perturbation. Here we propose to use a magnetically controlled
optical absorbing microsphere as the internal guidestar. Using a digital
optical phase conjugation system, we obtained sharp optical focusing within
scattering media through time-reversing the scattered light perturbed by the
magnetic microshpere. Since the object is magnetically controlled, dynamic
optical focusing is allowed with a relatively large field-of-view by scanning
the magnetic field externally. Moreover, the magnetic microsphere can be
packaged with an organic membrane, using biological or chemical means to serve
as a carrier. Therefore the technique may find particular applications for
enhanced targeted drug delivery, and imaging and photoablation of angiogenic
vessels in tumours.
| 0 | 1 | 0 | 0 | 0 | 0 |
Dimensionality-strain phase diagram of strontium iridates | The competition between spin-orbit coupling, bandwidth ($W$) and
electron-electron interaction ($U$) makes iridates highly susceptible to small
external perturbations, which can trigger the onset of novel types of
electronic and magnetic states. Here we employ {\em first principles}
calculations based on density functional theory and on the constrained random
phase approximation to study how dimensionality and strain affect the strength
of $U$ and $W$ in (SrIrO$_3$)$_m$/(SrTiO$_3$) superlattices. The result is a
phase diagram explaining two different types of controllable magnetic and
electronic transitions, spin-flop and insulator-to-metal, connected with the
disruption of the $J_{eff}=1/2$ state which cannnot be understood within a
simplified local picture.
| 0 | 1 | 0 | 0 | 0 | 0 |
Herschel survey and modelling of externally-illuminated photoevaporating protoplanetary disks | Protoplanetary disks undergo substantial mass-loss by photoevaporation, a
mechanism which is crucial to their dynamical evolution. However, the processes
regulating the gas energetics have not been well constrained by observations so
far. We aim at studying the processes involved in disk photoevaporation when it
is driven by far-UV photons. We present a unique Herschel survey and new ALMA
observations of four externally-illuminated photoevaporating disks (a.k.a.
proplyds). For the analysis of these data, we developed a 1D model of the
photodissociation region (PDR) of a proplyd, based on the Meudon PDR code and
computed the far infrared line emission. We successfully reproduce most of the
observations and derive key physical parameters, i.e. densities at the disk
surface of about $10^{6}$ cm$^{-3}$ and local gas temperatures of about 1000 K.
Our modelling suggests that all studied disks are found in a transitional
regime resulting from the interplay between several heating and cooling
processes that we identify. These differ from those dominating in classical
PDRs, i.e. grain photo-electric effect and cooling by [OI] and [CII] FIR lines.
This energetic regime is associated to an equilibrium dynamical point of the
photoevaporation flow: the mass-loss rate is self-regulated to set the envelope
column density at a value that maintains the temperature at the disk surface
around 1000 K. From our best-fit models, we estimate mass-loss rates - of the
order of $10^{-7}$ $\mathrm{M}_\odot$/yr - that are in agreement with earlier
spectroscopic observation of ionised gas tracers. This holds only if we assume
an evaporation flow launched from the disk surface at sound speed
(supercritical regime). We have identified the energetic regime regulating
FUV-photoevaporation in proplyds. This regime could be implemented into models
of the dynamical evolution of protoplanetary disks.
| 0 | 1 | 0 | 0 | 0 | 0 |
Observation of Spatio-temporal Instability of Femtosecond Pulses in Normal Dispersion Multimode Graded-Index Fiber | We study the spatio-temporal instability generated by a universal unstable
attractor in normal dispersion graded-index multimode fiber (GRIN MMF) for
femtosecond pulses. Our results present the generation of geometric parametric
instability (GPI) sidebands with ultrashort input pulse for the first time.
Observed GPI sidebands are 91 THz detuned from the pump wavelength, 800 nm.
Detailed analysis carried out numerically by employing coupled-mode pulse
propagation model including optical shock and Raman nonlinearity terms. A
simplified theoretical model and numerically calculated spectra are
well-aligned with experimental results. For input pulses of 200-fs duration,
formation and evolution of GPI are shown in both spatial and temporal domains.
The spatial intensity distribution of the total field and GPI sidebands are
calculated. Numerically and experimentally obtained beam shapes of first GPI
features a Gaussian-like beam profile. Our numerical results verify the unique
feature of GPI and generated sidebands preserve their inherited spatial
intensity profile from the input pulse for different propagation distances
particularly for focused and spread the total field inside the GRIN MMF.
| 0 | 1 | 0 | 0 | 0 | 0 |
Spectral curves for the rogue waves | Here we find the spectral curves, corresponding to the known rational or
quasi-rational solutions of AKNS hierarchy equations, ultimately connected with
the modeling of the rogue waves events in the optical waveguides and in
hydrodynamics. We also determine spectral curves for the multi-phase
trigonometric, hyperbolic and elliptic solutions for the same hierarchy. It
seams that the nature of the related spectral curves was not sufficiently
discussed in existing literature.
| 0 | 1 | 1 | 0 | 0 | 0 |
Volume functional of compact manifolds with a prescribed boundary metric | We prove that a critical metric of the volume functional on a
four-dimensional compact manifold with boundary satisfying a second-order
vanishing condition on the Weyl tensor must be isometric to a geodesic ball in
a simply connected space form $\mathbb{R}^{4}$, $\mathbb{H}^{4}$ or
$\mathbb{S}^{4}.$ Moreover, we provide an integral curvature estimate involving
the Yamabe constant for critical metrics of the volume functional, which allows
us to get a rigidity result for such critical metrics on four-dimensional
manifolds.
| 0 | 0 | 1 | 0 | 0 | 0 |
Deep Multitask Learning for Semantic Dependency Parsing | We present a deep neural architecture that parses sentences into three
semantic dependency graph formalisms. By using efficient, nearly arc-factored
inference and a bidirectional-LSTM composed with a multi-layer perceptron, our
base system is able to significantly improve the state of the art for semantic
dependency parsing, without using hand-engineered features or syntax. We then
explore two multitask learning approaches---one that shares parameters across
formalisms, and one that uses higher-order structures to predict the graphs
jointly. We find that both approaches improve performance across formalisms on
average, achieving a new state of the art. Our code is open-source and
available at this https URL.
| 1 | 0 | 0 | 0 | 0 | 0 |
Chentsov's theorem for exponential families | Chentsov's theorem characterizes the Fisher information metric on statistical
models as essentially the only Riemannian metric that is invariant under
sufficient statistics. This implies that each statistical model is naturally
equipped with a geometry, so Chentsov's theorem explains why many statistical
properties can be described in geometric terms. However, despite being one of
the foundational theorems of statistics, Chentsov's theorem has only been
proved previously in very restricted settings or under relatively strong
regularity and invariance assumptions. We therefore prove a version of this
theorem for the important case of exponential families. In particular, we
characterise the Fisher information metric as the only Riemannian metric (up to
rescaling) on an exponential family and its derived families that is invariant
under independent and identically distributed extensions and canonical
sufficient statistics. Our approach is based on the central limit theorem, so
it gives a unified proof for both discrete and continuous exponential families,
and it is less technical than previous approaches.
| 1 | 0 | 1 | 1 | 0 | 0 |
Dark trions and biexcitons in WS2 and WSe2 made bright by e-e scattering | The direct band gap character and large spin-orbit splitting of the valence
band edges (at the K and K' valleys) in monolayer transition metal
dichalcogenides have put these two-dimensional materials under the spot-light
of intense experimental and theoretical studies. In particular, for Tungsten
dichalcogenides it has been found that the sign of spin splitting of conduction
band edges makes ground state excitons radiatively inactive (dark) due to spin
and momentum mismatch between the constituent electron and hole. One might
similarly assume that the ground states of charged excitons and biexcitons in
these monolayers are also dark. Here, we show that the intervalley
K$\leftrightarrows$K' electron-electron scattering mixes bright and dark states
of these complexes, and estimate the radiative lifetimes in the ground states
of these "semi-dark" trions and biexcitons to be ~ 10ps, and analyse how these
complexes appear in the temperature-dependent photoluminescence spectra of WS2
and WSe2 monolayers.
| 0 | 1 | 0 | 0 | 0 | 0 |
SGDLibrary: A MATLAB library for stochastic gradient descent algorithms | We consider the problem of finding the minimizer of a function $f:
\mathbb{R}^d \rightarrow \mathbb{R}$ of the finite-sum form $\min f(w) =
1/n\sum_{i}^n f_i(w)$. This problem has been studied intensively in recent
years in the field of machine learning (ML). One promising approach for
large-scale data is to use a stochastic optimization algorithm to solve the
problem. SGDLibrary is a readable, flexible and extensible pure-MATLAB library
of a collection of stochastic optimization algorithms. The purpose of the
library is to provide researchers and implementers a comprehensive evaluation
environment for the use of these algorithms on various ML problems.
| 1 | 0 | 0 | 1 | 0 | 0 |
Structured Uncertainty Prediction Networks | This paper is the first work to propose a network to predict a structured
uncertainty distribution for a synthesized image. Previous approaches have been
mostly limited to predicting diagonal covariance matrices. Our novel model
learns to predict a full Gaussian covariance matrix for each reconstruction,
which permits efficient sampling and likelihood evaluation.
We demonstrate that our model can accurately reconstruct ground truth
correlated residual distributions for synthetic datasets and generate plausible
high frequency samples for real face images. We also illustrate the use of
these predicted covariances for structure preserving image denoising.
| 0 | 0 | 0 | 1 | 0 | 0 |
Shannon's entropy and its Generalizations towards Statistics, Reliability and Information Science during 1948-2018 | Starting from the pioneering works of Shannon and Weiner in 1948, a plethora
of works have been reported on entropy in different directions. Entropy-related
review work in the direction of statistics, reliability and information
science, to the best of our knowledge, has not been reported so far. Here we
have tried to collect all possible works in this direction during the period
1948-2018 so that people interested in entropy, specially the new researchers,
get benefited.
| 0 | 0 | 0 | 1 | 0 | 0 |
Understanding MIDI: A Painless Tutorial on Midi Format | A short overview demystifying the midi audio format is presented. The goal is
to explain the file structure and how the instructions are used to produce a
music signal, both in the case of monophonic signals as for polyphonic signals.
| 1 | 0 | 0 | 0 | 0 | 0 |
Optimization, fast and slow: optimally switching between local and Bayesian optimization | We develop the first Bayesian Optimization algorithm, BLOSSOM, which selects
between multiple alternative acquisition functions and traditional local
optimization at each step. This is combined with a novel stopping condition
based on expected regret. This pairing allows us to obtain the best
characteristics of both local and Bayesian optimization, making efficient use
of function evaluations while yielding superior convergence to the global
minimum on a selection of optimization problems, and also halting optimization
once a principled and intuitive stopping condition has been fulfilled.
| 0 | 0 | 0 | 1 | 0 | 0 |
Optimization of exposure time division for wide field observations | The optical observations of wide fields of view encounter the problem of
selection of best exposure time. As there are usually plenty of objects
observed simultaneously, the quality of photometry of the brightest ones is
always better than of the dimmer ones. Frequently all of them are equally
interesting for the astronomers and thus it is desired to have all of them
measured with the highest possible accuracy.
In this paper we present a novel optimization algorithm dedicated for the
division of exposure time into sub-exposures, which allows to perform
photometry with more balanced noise budget. Thanks to the proposed technique,
the photometric precision of dimmer objects is increased at the expense of the
measurement fidelity of the brightest ones. We tested the method on real
observations using two telescope setups demonstrating its usefulness and good
agreement with the theoretical expectations. The main application of our
approach is a wide range of sky surveys, including the ones performed by the
space telescopes. The method can be applied for planning virtually any
photometric observations, in which the objects of interest show a wide range of
magnitudes.
| 0 | 1 | 0 | 0 | 0 | 0 |
Multi-Entity Dependence Learning with Rich Context via Conditional Variational Auto-encoder | Multi-Entity Dependence Learning (MEDL) explores conditional correlations
among multiple entities. The availability of rich contextual information
requires a nimble learning scheme that tightly integrates with deep neural
networks and has the ability to capture correlation structures among
exponentially many outcomes. We propose MEDL_CVAE, which encodes a conditional
multivariate distribution as a generating process. As a result, the variational
lower bound of the joint likelihood can be optimized via a conditional
variational auto-encoder and trained end-to-end on GPUs. Our MEDL_CVAE was
motivated by two real-world applications in computational sustainability: one
studies the spatial correlation among multiple bird species using the eBird
data and the other models multi-dimensional landscape composition and human
footprint in the Amazon rainforest with satellite images. We show that
MEDL_CVAE captures rich dependency structures, scales better than previous
methods, and further improves on the joint likelihood taking advantage of very
large datasets that are beyond the capacity of previous methods.
| 1 | 0 | 0 | 1 | 0 | 0 |
A recognition algorithm for simple-triangle graphs | A simple-triangle graph is the intersection graph of triangles that are
defined by a point on a horizontal line and an interval on another horizontal
line. The time complexity of the recognition problem for simple-triangle graphs
was a longstanding open problem, which was recently settled. This paper
provides a new recognition algorithm for simple-triangle graphs to improve the
time bound from $O(n^2 \overline{m})$ to $O(nm)$, where $n$, $m$, and
$\overline{m}$ are the number of vertices, edges, and non-edges of the graph,
respectively. The algorithm uses the vertex ordering characterization that a
graph is a simple-triangle graph if and only if there is a linear ordering of
the vertices containing both an alternating orientation of the graph and a
transitive orientation of the complement of the graph. We also show, as a
byproduct, that an alternating orientation can be obtained in $O(nm)$ time for
cocomparability graphs, and it is NP-complete to decide whether a graph has an
orientation that is alternating and acyclic.
| 1 | 0 | 0 | 0 | 0 | 0 |
A normalized gradient flow method with attractive-repulsive splitting for computing ground states of Bose-Einstein condensates with higher-order interaction | In this paper, we generalize the normalized gradient flow method to compute
the ground states of Bose-Einstein condensates (BEC) with higher order
interactions (HOI), which is modelled via the modified Gross-Pitaevskii
equation (MGPE). Schemes constructed in naive ways suffer from severe stability
problems due to the high restrictions on time steps. To build an efficient and
stable scheme, we split the HOI term into two parts with each part treated
separately. The part corresponding to a repulsive/positive energy is treated
semi-implicitly while the one corresponding to an attractive/negative energy is
treated fully explicitly. Based on the splitting, we construct the
BEFD-splitting and BESP-splitting schemes. A variety of numerical experiments
shows that the splitting will improve the stability of the schemes
significantly. Besides, we will show that the methods can be applied to
multidimensional problems and to the computation of the first excited state as
well.
| 0 | 1 | 0 | 0 | 0 | 0 |
Truncation in Hahn Fields is Undecidable and Wild | We show that in any nontrivial Hahn field with truncation as a primitive
operation we can interpret the monadic second-order logic of the additive
monoid of natural numbers and are thus undecidable. We also specify a definable
binary relation on such a structure that has $\SOP$ and $\TP$.
| 0 | 0 | 1 | 0 | 0 | 0 |
Direct measurement of laser aberration and ahead point from ARTEMIS satellite through strong clouds | Laser communication has advances in compared with radio frequency
communication as result of much high carrier frequency from ultraviolet to near
infrared. Very narrow laser beam is possible to form with very high power
density. But laser beam has high destruction and attenuation on clouds,
turbulence, scattering on aerosols and molecules of the atmosphere. Low Earth
orbits (LEO), Middling Earth orbits (MEO) and partly Geosynchronous Earth orbit
(GSO) satellites moving on the sky and laser light from satellites moves across
different turbulence conditions of the atmosphere, clouds, molecules of the
atmosphere H2O, O2, N2, CO, O3 and other. We performed unique experiments with
propagation of laser beams from beacon of OPALE terminal of ARTEMIS satellite
through thin clouds. We have found that small part of laser radiation is
received from ahead point there the satellite will be after time of propagation
of laser radiation from the satellite to telescope. It is in accordance with
theory of relativity for aberration of light during transition from moving to
not moving coordinate systems. It is positive effect for laser communication
through the atmosphere and clouds because will be possible to develop a system
for reduce of the atmosphere turbulence during of laser communication from
ground to the satellites. The interest is what will be during propagation of
laser radiation from the satellite through strong clouds. The detail
descriptions of laser experiment with ARTEMIS GSO satellite through strong
clouds and estimations of the laser power through strong clouds are presented
in this paper. Accordingly we must search the optimal wave lengths and power of
lasers for performs laser communication in different cloudy conditions.
| 0 | 1 | 0 | 0 | 0 | 0 |
DNN-Buddies: A Deep Neural Network-Based Estimation Metric for the Jigsaw Puzzle Problem | This paper introduces the first deep neural network-based estimation metric
for the jigsaw puzzle problem. Given two puzzle piece edges, the neural network
predicts whether or not they should be adjacent in the correct assembly of the
puzzle, using nothing but the pixels of each piece. The proposed metric
exhibits an extremely high precision even though no manual feature extraction
is performed. When incorporated into an existing puzzle solver, the solution's
accuracy increases significantly, achieving thereby a new state-of-the-art
standard.
| 1 | 0 | 0 | 1 | 0 | 0 |
Attack Analysis for Distributed Control Systems: An Internal Model Principle Approach | Although adverse effects of attacks have been acknowledged in many
cyber-physical systems, there is no system-theoretic comprehension of how a
compromised agent can leverage communication capabilities to maximize the
damage in distributed multi-agent systems. A rigorous analysis of
cyber-physical attacks enables us to increase the system awareness against
attacks and design more resilient control protocols. To this end, we will take
the role of the attacker to identify the worst effects of attacks on root nodes
and non-root nodes in a distributed control system. More specifically, we show
that a stealthy attack on root nodes can mislead the entire network to a wrong
understanding of the situation and even destabilize the synchronization
process. This will be called the internal model principle for the attacker and
will intensify the urgency of designing novel control protocols to mitigate
these types of attacks.
| 1 | 0 | 0 | 0 | 0 | 0 |
A conservative scheme for electromagnetic simulation of magnetized plasmas with kinetic electrons | A conservative scheme has been formulated and verified for gyrokinetic
particle simulations of electromagnetic waves and instabilities in magnetized
plasmas. An electron continuity equation derived from drift kinetic equation is
used to time advance electron density perturbation by using the perturbed
mechanical flow calculated from the parallel vector potential, and the parallel
vector potential is solved by using the perturbed canonical flow from the
perturbed distribution function. In gyrokinetic particle simulations using this
new scheme, shear Alfvén wave dispersion relation in shearless slab and
continuum damping in sheared cylinder have been recovered. The new scheme
overcomes the stringent requirement in conventional perturbative simulation
method that perpendicular grid size needs to be as small as electron
collisionless skin depth even for the long wavelength Alfvén waves. The new
scheme also avoids the problem in conventional method that an unphysically
large parallel electric field arises due to the inconsistency between
electrostatic potential calculated from the perturbed density and vector
potential calculated from the perturbed canonical flow. Finally, the
gyrokinetic particle simulations of the Alfvén waves in sheared cylinder have
superior numerical properties compared with the fluid simulations, which suffer
from numerical difficulties associated with singular mode structures.
| 0 | 1 | 0 | 0 | 0 | 0 |
Corrupt Bandits for Preserving Local Privacy | We study a variant of the stochastic multi-armed bandit (MAB) problem in
which the rewards are corrupted. In this framework, motivated by privacy
preservation in online recommender systems, the goal is to maximize the sum of
the (unobserved) rewards, based on the observation of transformation of these
rewards through a stochastic corruption process with known parameters. We
provide a lower bound on the expected regret of any bandit algorithm in this
corrupted setting. We devise a frequentist algorithm, KLUCB-CF, and a Bayesian
algorithm, TS-CF and give upper bounds on their regret. We also provide the
appropriate corruption parameters to guarantee a desired level of local privacy
and analyze how this impacts the regret. Finally, we present some experimental
results that confirm our analysis.
| 1 | 0 | 0 | 1 | 0 | 0 |
Deep Reinforcement Learning based Optimal Control of Hot Water Systems | Energy consumption for hot water production is a major draw in high
efficiency buildings. Optimizing this has typically been approached from a
thermodynamics perspective, decoupled from occupant influence. Furthermore,
optimization usually presupposes existence of a detailed dynamics model for the
hot water system. These assumptions lead to suboptimal energy efficiency in the
real world. In this paper, we present a novel reinforcement learning based
methodology which optimizes hot water production. The proposed methodology is
completely generalizable, and does not require an offline step or human domain
knowledge to build a model for the hot water vessel or the heating element.
Occupant preferences too are learnt on the fly. The proposed system is applied
to a set of 32 houses in the Netherlands where it reduces energy consumption
for hot water production by roughly 20% with no loss of occupant comfort.
Extrapolating, this translates to absolute savings of roughly 200 kWh for a
single household on an annual basis. This performance can be replicated to any
domestic hot water system and optimization objective, given that the fairly
minimal requirements on sensor data are met. With millions of hot water systems
operational worldwide, the proposed framework has the potential to reduce
energy consumption in existing and new systems on a multi Gigawatt-hour scale
in the years to come.
| 0 | 0 | 0 | 1 | 0 | 0 |
A Model-Based Fuzzy Control Approach to Achieving Adaptation with Contextual Uncertainties | Self-adaptive system (SAS) is capable of adjusting its behavior in response
to meaningful changes in the operational context and itself. Due to the
inherent volatility of the open and changeable environment in which SAS is
embedded, the ability of adaptation is highly demanded by many
software-intensive systems. Two concerns, i.e., the requirements uncertainty
and the context uncertainty are most important among others. An essential issue
to be addressed is how to dynamically adapt non-functional requirements (NFRs)
and task configurations of SASs with context uncertainty. In this paper, we
propose a model-based fuzzy control approach that is underpinned by the
feedforward-feedback control mechanism. This approach identifies and represents
NFR uncertainties, task uncertainties and context uncertainties with linguistic
variables, and then designs an inference structure and rules for the fuzzy
controller based on the relations between the requirements model and the
context model. The adaptation of NFRs and task configurations is achieved
through fuzzification, inference, defuzzification and readaptation. Our
approach is demonstrated with a mobile computing application and is evaluated
through a series of simulation experiments.
| 1 | 0 | 0 | 0 | 0 | 0 |
See the Near Future: A Short-Term Predictive Methodology to Traffic Load in ITS | The Intelligent Transportation System (ITS) targets to a coordinated traffic
system by applying the advanced wireless communication technologies for road
traffic scheduling. Towards an accurate road traffic control, the short-term
traffic forecasting to predict the road traffic at the particular site in a
short period is often useful and important. In existing works, Seasonal
Autoregressive Integrated Moving Average (SARIMA) model is a popular approach.
The scheme however encounters two challenges: 1) the analysis on related data
is insufficient whereas some important features of data may be neglected; and
2) with data presenting different features, it is unlikely to have one
predictive model that can fit all situations. To tackle above issues, in this
work, we develop a hybrid model to improve accuracy of SARIMA. In specific, we
first explore the autocorrelation and distribution features existed in traffic
flow to revise structure of the time series model. Based on the Gaussian
distribution of traffic flow, a hybrid model with a Bayesian learning algorithm
is developed which can effectively expand the application scenarios of SARIMA.
We show the efficiency and accuracy of our proposal using both analysis and
experimental studies. Using the real-world trace data, we show that the
proposed predicting approach can achieve satisfactory performance in practice.
| 1 | 0 | 0 | 1 | 0 | 0 |
Single-Crystal N-polar GaN p-n Diodes by Plasma-Assisted Molecular Beam Epitaxy | N-polar GaN p-n diodes are realized on single-crystal N-polar GaN bulk wafers
by plasma-assisted molecular beam epitaxy growth. The current-voltage
characteristics show high-quality rectification and electroluminescence
characteristics with a high on/off current ratio and interband photon emission.
The measured electroluminescence spectrum is dominated by strong near-band edge
emission, while deep level luminescence is greatly suppressed. A very low
dislocation density leads to a high reverse breakdown electric field. The low
leakage current N-polar diodes open up several potential applications in
polarization-engineered photonic and electronic devices.
| 0 | 1 | 0 | 0 | 0 | 0 |
Particle Identification with the TOP and ARICH detectors at Belle II | Particle identification at the Belle II experiment will be provided by two
ring imaging Cherenkov devices, the time of propagation counters in the central
region and the proximity focusing RICH with aerogel radiator in the forward
end-cap region. The key features of these two detectors, the performance
studies, and the construction progress is presented.
| 0 | 1 | 0 | 0 | 0 | 0 |
Face Detection and Face Recognition In the Wild Using Off-the-Shelf Freely Available Components | This paper presents an easy and efficient face detection and face recognition
approach using free software components from the internet. Face detection and
face recognition problems have wide applications in home and office security.
Therefore this work will helpful for those searching for a free face
off-the-shelf face detection system. Using this system, faces can be detected
in uncontrolled environments. In the detection phase, every individual face is
detected and in the recognition phase the detected faces are compared with the
faces in a given data set and recognized.
| 1 | 0 | 0 | 0 | 0 | 0 |
End-to-end Learning of Deterministic Decision Trees | Conventional decision trees have a number of favorable properties, including
interpretability, a small computational footprint and the ability to learn from
little training data. However, they lack a key quality that has helped fuel the
deep learning revolution: that of being end-to-end trainable, and to learn from
scratch those features that best allow to solve a given supervised learning
problem. Recent work (Kontschieder 2015) has addressed this deficit, but at the
cost of losing a main attractive trait of decision trees: the fact that each
sample is routed along a small subset of tree nodes only. We here propose a
model and Expectation-Maximization training scheme for decision trees that are
fully probabilistic at train time, but after a deterministic annealing process
become deterministic at test time. We also analyze the learned oblique split
parameters on image datasets and show that Neural Networks can be trained at
each split node. In summary, we present the first end-to-end learning scheme
for deterministic decision trees and present results on par with or superior to
published standard oblique decision tree algorithms.
| 1 | 0 | 0 | 1 | 0 | 0 |
Conceptualization of Object Compositions Using Persistent Homology | A topological shape analysis is proposed and utilized to learn concepts that
reflect shape commonalities. Our approach is two-fold: i) a spatial topology
analysis of point cloud segment constellations within objects. Therein
constellations are decomposed and described in an hierarchical manner - from
single segments to segment groups until a single group reflects an entire
object. ii) a topology analysis of the description space in which segment
decompositions are exposed in. Inspired by Persistent Homology, hidden groups
of shape commonalities are revealed from object segment decompositions.
Experiments show that extracted persistent groups of commonalities can
represent semantically meaningful shape concepts. We also show the
generalization capability of the proposed approach considering samples of
external datasets.
| 1 | 0 | 0 | 0 | 0 | 0 |
Long-term Blood Pressure Prediction with Deep Recurrent Neural Networks | Existing methods for arterial blood pressure (BP) estimation directly map the
input physiological signals to output BP values without explicitly modeling the
underlying temporal dependencies in BP dynamics. As a result, these models
suffer from accuracy decay over a long time and thus require frequent
calibration. In this work, we address this issue by formulating BP estimation
as a sequence prediction problem in which both the input and target are
temporal sequences. We propose a novel deep recurrent neural network (RNN)
consisting of multilayered Long Short-Term Memory (LSTM) networks, which are
incorporated with (1) a bidirectional structure to access larger-scale context
information of input sequence, and (2) residual connections to allow gradients
in deep RNN to propagate more effectively. The proposed deep RNN model was
tested on a static BP dataset, and it achieved root mean square error (RMSE) of
3.90 and 2.66 mmHg for systolic BP (SBP) and diastolic BP (DBP) prediction
respectively, surpassing the accuracy of traditional BP prediction models. On a
multi-day BP dataset, the deep RNN achieved RMSE of 3.84, 5.25, 5.80 and 5.81
mmHg for the 1st day, 2nd day, 4th day and 6th month after the 1st day SBP
prediction, and 1.80, 4.78, 5.0, 5.21 mmHg for corresponding DBP prediction,
respectively, which outperforms all previous models with notable improvement.
The experimental results suggest that modeling the temporal dependencies in BP
dynamics significantly improves the long-term BP prediction accuracy.
| 1 | 0 | 0 | 1 | 0 | 0 |
Risks for life on habitable planets from superflares of their host stars | We explore some of the ramifications arising from superflares on the
evolutionary history of Earth, other planets in the Solar system, and
exoplanets. We propose that the most powerful superflares can serve as
plausible drivers of extinction events, and that their periodicity could
correspond to certain patterns in the terrestrial fossil diversity record. On
the other hand, weaker superflares may play a positive role in enabling the
origin of life through the formation of key organic compounds. Superflares
could also prove to be quite detrimental to the evolution of complex life on
present-day Mars and exoplanets in the habitable zone of M- and K-dwarfs. We
conclude that the risk posed by superflares has not been sufficiently
appreciated, and that humanity might potentially witness a superflare event in
the next $\sim 10^3$ years leading to devastating economic and technological
losses. In light of the many uncertainties and assumptions associated with our
analysis, we recommend that these results should be viewed with due caution.
| 0 | 1 | 0 | 0 | 0 | 0 |
Thermodynamics of Spin-1/2 Kagomé Heisenberg Antiferromagnet: Algebraic Paramagnetic Liquid and Finite-Temperature Phase Diagram | Quantum fluctuations from frustration can trigger quantum spin liquids (QSLs)
at zero temperature. However, it is unclear how thermal fluctuations affect a
QSL. We employ state-of-the-art tensor network-based methods to explore the
ground state and thermodynamic properties of the spin-1/2 kagome Heisenberg
antiferromagnet (KHA). Its ground state is shown to be consistent with a
gapless QSL by observing the absence of zero-magnetization plateau as well as
the algebraic behaviors of susceptibility and specific heat at low
temperatures, respectively. We show that there exists an \textit{algebraic
paramagnetic liquid} (APL) that possesses both the paramagnetic properties and
the algebraic behaviors inherited from the QSL. The APL is induced under the
interplay between quantum fluctuations from geometrical frustration and thermal
fluctuations. By studying the temperature-dependent behaviors of specific heat
and magnetic susceptibility, a finite-temperature phase diagram in a magnetic
field is suggested, where various phases are identified. This present study
gains useful insight into the thermodynamic properties of the spin-1/2 KHA with
or without a magnetic field and is helpful for relevant experimental studies.
| 0 | 1 | 0 | 0 | 0 | 0 |
Fast Rigid 3D Registration Solution: A Simple Method Free of SVD and Eigen-Decomposition | A novel solution is obtained to solve the rigid 3D registration problem,
motivated by previous eigen-decomposition approaches. Different from existing
solvers, the proposed algorithm does not require sophisticated matrix
operations e.g. singular value decomposition or eigenvalue decomposition.
Instead, the optimal eigenvector of the point cross-covariance matrix can be
computed within several iterations. It is also proven that the optimal rotation
matrix can be directly computed for cases without need of quaternion. The
simple framework provides very easy approach of integer-implementation on
embedded platforms. Simulations on noise-corrupted point clouds have verified
the robustness and computation speed of the proposed method. The final results
indicate that the proposed algorithm is accurate, robust and owns over $60\%
\sim 80\%$ less computation time than representatives. It has also been applied
to real-world applications for faster relative robotic navigation.
| 1 | 0 | 0 | 0 | 0 | 0 |
Massive MIMO 5G Cellular Networks: mm-wave vs. μ-wave Frequencies | Enhanced mobile broadband (eMBB) is one of the key use-cases for the
development of the new standard 5G New Radio for the next generation of mobile
wireless networks. Large-scale antenna arrays, a.k.a. Massive MIMO, the usage
of carrier frequencies in the range 10-100 GHz, the so-called millimeter wave
(mm-wave) band, and the network densification with the introduction of
small-sized cells are the three technologies that will permit implementing eMBB
services and realizing the Gbit/s mobile wireless experience. This paper is
focused on the massive MIMO technology; initially conceived for conventional
cellular frequencies in the sub-6 GHz range (\mu-wave), the massive MIMO
concept has been then progressively extended to the case in which mm-wave
frequencies are used. However, due to different propagation mechanisms in urban
scenarios, the resulting MIMO channel models at \mu-wave and mm-wave are
radically different. Six key basic differences are pinpointed in this paper,
along with the implications that they have on the architecture and algorithms
of the communication transceivers and on the attainable performance in terms of
reliability and multiplexing capabilities.
| 1 | 0 | 0 | 0 | 0 | 0 |
Independent Set Size Approximation in Graph Streams | We study the problem of estimating the size of independent sets in a graph
$G$ defined by a stream of edges. Our approach relies on the Caro-Wei bound,
which expresses the desired quantity in terms of a sum over nodes of the
reciprocal of their degrees, denoted by $\beta(G)$. Our results show that
$\beta(G)$ can be approximated accurately, based on a provided lower bound on
$\beta$. Stronger results are possible when the edges are promised to arrive
grouped by an incident node. In this setting, we obtain a value that is at most
a logarithmic factor below the true value of $\beta$ and no more than the true
independent set size. To justify the form of this bound, we also show an
$\Omega(n/\beta)$ lower bound on any algorithm that approximates $\beta$ up to
a constant factor.
| 1 | 0 | 0 | 0 | 0 | 0 |
Two-Person Zero-Sum Games with Unbounded Payoff Functions and Uncertain Expected Payoffs | This paper provides sufficient conditions for the existence of values and
solutions for two-person zero-sum one-step games with possibly noncompact
action sets for both players and possibly unbounded payoff functions, which may
be neither convex nor concave. For such games payoffs may not be defined for
some pairs of strategies. In addition to the existence of values and solutions,
this paper investigates continuity properties of the value functions and
solution multifunctions for families of games with possibly noncompact action
sets and unbounded payoff functions, when action sets and payoffs depend on a
parameter.
| 0 | 0 | 1 | 0 | 0 | 0 |
Scale relativistic formulation of non-differentiable mechanics II: The Schroedinger picture | This article is the second in a series of two presenting the Scale
Relativistic approach to non-differentiability in mechanics and its relation to
quantum mechanics. Here, we show Schroedinger's equation to be a reformulation
of Newton's fundamental relation of dynamics as generalized to
non-differentiable geometries in the first paper \cite{paper1}. It motivates an
alternative interpretation of the other axioms of standard quantum mechanics in
a coherent picture. This exercise validates the Scale Relativistic approach
and, at the same time, it allows to identify macroscopic chaotic systems
considered at time scales exceeding their horizon of predictability as
candidates in which to search for quantum-like structuring or behavior.
| 0 | 1 | 0 | 0 | 0 | 0 |
Compact arrangement for femtosecond laser induced generation of broadband hard x-ray pulses | We present a simple apparatus for femtosecond laser induced generation of
X-rays. The apparatus consists of a vacuum chamber containing an off-axis
parabolic focusing mirror, a reel system, a debris protection setup, a quartz
window for the incoming laser beam, and an X-ray window. Before entering the
vacuum chamber, the femtosecond laser is expanded with an all reflective
telescope design to minimize laser intensity losses and pulse broadening while
allowing for focusing as well as peak intensity optimization. The laser pulse
duration was characterized by second-harmonic generation frequency resolved
optical gating. A high spatial resolution knife-edge technique was implemented
to characterize the beam size at the focus of the X-ray generation apparatus.
We have characterized x-ray spectra obtained with three different samples:
titanium, iron:chromium alloy, and copper. In all three cases, the femtosecond
laser generated X-rays give spectral lines consistent with literature reports.
We present a rms amplitude analysis of the generated X-ray pulses, and provide
an upper bound for the duration of the X-ray pulses.
| 0 | 1 | 0 | 0 | 0 | 0 |
Hierarchical Summarization of Metric Changes | We study changes in metrics that are defined on a cartesian product of trees.
Such metrics occur naturally in many practical applications, where a global
metric (such as revenue) can be broken down along several hierarchical
dimensions (such as location, gender, etc).
Given a change in such a metric, our goal is to identify a small set of
non-overlapping data segments that account for the change. An organization
interested in improving the metric can then focus their attention on these data
segments.
Our key contribution is an algorithm that mimics the operation of a
hierarchical organization of analysts. The algorithm has been successfully
applied, for example within Google Adwords to help advertisers triage the
performance of their advertising campaigns.
We show that the algorithm is optimal for two dimensions, and has an
approximation ratio $\log^{d-2}(n+1)$ for $d \geq 3$ dimensions, where $n$ is
the number of input data segments. For the Adwords application, we can show
that our algorithm is in fact a $2$-approximation.
Mathematically, we identify a certain data pattern called a \emph{conflict}
that both guides the design of the algorithm, and plays a central role in the
hardness results. We use these conflicts to both derive a lower bound of
$1.144^{d-2}$ (again $d\geq3$) for our algorithm, and to show that the problem
is NP-hard, justifying the focus on approximation.
| 1 | 0 | 0 | 0 | 0 | 0 |
Manifold learning with bi-stochastic kernels | In this paper we answer the following question: what is the infinitesimal
generator of the diffusion process defined by a kernel that is normalized such
that it is bi-stochastic with respect to a specified measure? More precisely,
under the assumption that data is sampled from a Riemannian manifold we
determine how the resulting infinitesimal generator depends on the potentially
nonuniform distribution of the sample points, and the specified measure for the
bi-stochastic normalization. In a special case, we demonstrate a connection to
the heat kernel. We consider both the case where only a single data set is
given, and the case where a data set and a reference set are given. The
spectral theory of the constructed operators is studied, and Nyström
extension formulas for the gradients of the eigenfunctions are computed.
Applications to discrete point sets and manifold learning are discussed.
| 0 | 0 | 1 | 1 | 0 | 0 |
The importance of the weak: Interaction modifiers in artificial spin ices | The modification of geometry and interactions in two-dimensional magnetic
nanosystems has enabled a range of studies addressing the magnetic order,
collective low-energy dynamics, and emergent magnetic properties, in e.g.
artificial spin ice structures. The common denominator of all these
investigations is the use of Ising-like mesospins as building blocks, in the
form of elongated magnetic islands. Here we introduce a new approach: single
interaction modifiers, using slave-mesospins in the form of discs, within which
the mesospin is free to rotate in the disc plane. We show that by placing these
on the vertices of square artificial spin ice arrays and varying their
diameter, it is possible to tailor the strength and the ratio of the
interaction energies. We demonstrate the existence of degenerate ice-rule
obeying states in square artificial spin ice structures, enabling the
exploration of thermal dynamics in a spin liquid manifold. Furthermore, we even
observe the emergence of flux lattices on larger length-scales, when the energy
landscape of the vertices is reversed. The work highlights the potential of a
design strategy for two-dimensional magnetic nano-architectures, through which
mixed dimensionality of mesospins can be used to promote thermally emergent
mesoscale magnetic states.
| 0 | 1 | 0 | 0 | 0 | 0 |
How To Extract Fashion Trends From Social Media? A Robust Object Detector With Support For Unsupervised Learning | With the proliferation of social media, fashion inspired from celebrities,
reputed designers as well as fashion influencers has shortened the cycle of
fashion design and manufacturing. However, with the explosion of fashion
related content and large number of user generated fashion photos, it is an
arduous task for fashion designers to wade through social media photos and
create a digest of trending fashion. This necessitates deep parsing of fashion
photos on social media to localize and classify multiple fashion items from a
given fashion photo. While object detection competitions such as MSCOCO have
thousands of samples for each of the object categories, it is quite difficult
to get large labeled datasets for fast fashion items. Moreover,
state-of-the-art object detectors do not have any functionality to ingest large
amount of unlabeled data available on social media in order to fine tune object
detectors with labeled datasets. In this work, we show application of a generic
object detector, that can be pretrained in an unsupervised manner, on 24
categories from recently released Open Images V4 dataset. We first train the
base architecture of the object detector using unsupervisd learning on 60K
unlabeled photos from 24 categories gathered from social media, and then
subsequently fine tune it on 8.2K labeled photos from Open Images V4 dataset.
On 300 X 300 image inputs, we achieve 72.7% mAP on a test dataset of 2.4K
photos while performing 11% to 17% better as compared to the state-of-the-art
object detectors. We show that this improvement is due to our choice of
architecture that lets us do unsupervised learning and that performs
significantly better in identifying small objects.
| 0 | 0 | 0 | 1 | 0 | 0 |
Multi-Task Learning Using Neighborhood Kernels | This paper introduces a new and effective algorithm for learning kernels in a
Multi-Task Learning (MTL) setting. Although, we consider a MTL scenario here,
our approach can be easily applied to standard single task learning, as well.
As shown by our empirical results, our algorithm consistently outperforms the
traditional kernel learning algorithms such as uniform combination solution,
convex combinations of base kernels as well as some kernel alignment-based
models, which have been proven to give promising results in the past. We
present a Rademacher complexity bound based on which a new Multi-Task Multiple
Kernel Learning (MT-MKL) model is derived. In particular, we propose a Support
Vector Machine-regularized model in which, for each task, an optimal kernel is
learned based on a neighborhood-defining kernel that is not restricted to be
positive semi-definite. Comparative experimental results are showcased that
underline the merits of our neighborhood-defining framework in both
classification and regression problems.
| 1 | 0 | 0 | 1 | 0 | 0 |
Optimized Bucket Wheel Design for Asteroid Excavation | Current spacecraft need to launch with all of their required fuel for travel.
This limits the system performance, payload capacity, and mission flexibility.
One compelling alternative is to perform In-Situ Resource Utilization (ISRU) by
extracting fuel from small bodies in local space such as asteroids or small
satellites. Compared to the Moon or Mars, the microgravity on an asteroid
demands a fraction of the energy for digging and accessing hydrated regolith
just below the surface. Previous asteroid excavation efforts have focused on
discrete capture events (an extension of sampling technology) or whole-asteroid
capture and processing. This paper proposes an optimized bucket wheel design
for surface excavation of an asteroid or small-body. Asteroid regolith is
excavated and water extracted for use as rocket propellant. Our initial study
focuses on system design, bucket wheel mechanisms, and capture dynamics applied
to ponded materials known to exist on asteroids like Itokawa and Eros and small
satellites like Phobos and Deimos. For initial evaluation of
material-spacecraft dynamics and mechanics, we assume lunar-like regolith for
bulk density, particle size and cohesion. We shall present our estimates for
the energy balance of excavation and processing versus fuel gained.
Conventional electrolysis of water is used to produce hydrogen and oxygen. It
is compared with steam for propulsion and both show significant delta-v. We
show that a return trip from Deimos to Earth is possible for a 12 kg craft
using ISRU processed fuel.
| 1 | 1 | 0 | 0 | 0 | 0 |
Fraction of the X-ray selected AGNs with optical emission lines in galaxy groups | Compared with numerous X-ray dominant active galactic nuclei (AGNs) without
emission-line signatures in their optical spectra, the X-ray selected AGNs with
optical emission lines are probably still in the high-accretion phase of black
hole growth. This paper presents an investigation on the fraction of these
X-ray detected AGNs with optical emission-line spectra in 198 galaxy groups at
$z<1$ in a rest frame 0.1-2.4 keV luminosity range 41.3 <log(L_X/erg s-1) <
44.1 within the COSMOS field, as well as its variations with redshift and group
richness. For various selection criteria of member galaxies, the numbers of
galaxies and the AGNs with optical emission lines in each galaxy group are
obtained. It is found that, in total 198 X-ray groups, there are 27 AGNs
detected in 26 groups. AGN fraction is on everage less than $4.6 (\pm 1.2)\%$
for individual groups hosting at least one AGN. The corrected overall AGN
fraction for whole group sample is less than $0.98 (\pm 0.11) \%$. The
normalized locations of group AGNs show that 15 AGNs are found to be located in
group centers, including all 6 low-luminosity group AGNs. A week rising
tendency with $z$ are found: overall AGN fraction is 0.30-0.43% for the groups
at $z<0.5$, and 0.55-0.64% at 0.5 < z < 1.0. For the X-ray groups at $z>0.5$,
most member AGNs are X-ray bright, optically dull, which results in a lower AGN
fractions at higher redshifts. The AGN fraction in isolated fields also
exhibits a rising trend with redshift, and the slope is consistent with that in
groups. The environment of galaxy groups seems to make no difference in
detection probability of the AGNs with emission lines. Additionally, a larger
AGN fractions are found in poorer groups, which implies that the AGNs in poorer
groups might still be in the high-accretion phase, whereas the AGN population
in rich clusters is mostly in the low-accretion, X-ray dominant phase.
| 0 | 1 | 0 | 0 | 0 | 0 |
A local search 2.917-approximation algorithm for duo-preservation string mapping | We study the {\em maximum duo-preservation string mapping} ({\sc Max-Duo})
problem, which is the complement of the well studied {\em minimum common string
partition} ({\sc MCSP}) problem. Both problems have applications in many fields
including text compression and bioinformatics. Motivated by an earlier local
search algorithm, we present an improved approximation and show that its
performance ratio is no greater than ${35}/{12} < 2.917$. This beats the
current best $3.25$-approximation for {\sc Max-Duo}. The performance analysis
of our algorithm is done through a complex yet interesting amortization. Two
lower bounds on the locality gap of our algorithm are also provided.
| 1 | 0 | 0 | 0 | 0 | 0 |
Towards Automatic Learning of Heuristics for Mechanical Transformations of Procedural Code | The current trends in next-generation exascale systems go towards integrating
a wide range of specialized (co-)processors into traditional supercomputers.
Due to the efficiency of heterogeneous systems in terms of Watts and FLOPS per
surface unit, opening the access of heterogeneous platforms to a wider range of
users is an important problem to be tackled. However, heterogeneous platforms
limit the portability of the applications and increase development complexity
due to the programming skills required. Program transformation can help make
programming heterogeneous systems easier by defining a step-wise transformation
process that translates a given initial code into a semantically equivalent
final code, but adapted to a specific platform. Program transformation systems
require the definition of efficient transformation strategies to tackle the
combinatorial problem that emerges due to the large set of transformations
applicable at each step of the process. In this paper we propose a machine
learning-based approach to learn heuristics to define program transformation
strategies. Our approach proposes a novel combination of reinforcement learning
and classification methods to efficiently tackle the problems inherent to this
type of systems. Preliminary results demonstrate the suitability of this
approach.
| 1 | 0 | 0 | 0 | 0 | 0 |
Using Graphs of Classifiers to Impose Declarative Constraints on Semi-supervised Learning | We propose a general approach to modeling semi-supervised learning (SSL)
algorithms. Specifically, we present a declarative language for modeling both
traditional supervised classification tasks and many SSL heuristics, including
both well-known heuristics such as co-training and novel domain-specific
heuristics. In addition to representing individual SSL heuristics, we show that
multiple heuristics can be automatically combined using Bayesian optimization
methods. We experiment with two classes of tasks, link-based text
classification and relation extraction. We show modest improvements on
well-studied link-based classification benchmarks, and state-of-the-art results
on relation-extraction tasks for two realistic domains.
| 1 | 0 | 0 | 1 | 0 | 0 |
Fabrication of a centimeter-long cavity on a nanofiber for cavity QED | We report the fabrication of a 1.2 cm long cavity directly on a nanofiber
using femtosecond laser ablation. The cavity modes with finesse value in the
range 200-400 can still maintain the transmission between 40-60%, which can
enable "strong-coupling" regime of cavity QED for a single atom trapped 200 nm
away from the fiber surface. For such cavity modes, we estimate the one-pass
intra-cavity transmission to be 99.53%. Other cavity modes, which can enable
high cooperativity in the range 3-10, show transmission over 60-85% and are
suitable for fiber-based single photon sources and quantum nonlinear optics in
the "Purcell" regime.
| 0 | 1 | 0 | 0 | 0 | 0 |
Optimized Deformed Laplacian for Spectrum-based Community Detection in Sparse Heterogeneous Graphs | Spectral clustering is one of the most popular, yet still incompletely
understood, methods for community detection on graphs. In this article we study
spectral clustering based on the deformed Laplacian matrix $D-rA$, for sparse
heterogeneous graphs (following a two-class degree-corrected stochastic block
model). For a specific value $r = \zeta$, we show that, unlike competing
methods such as the Bethe Hessian or non-backtracking operator approaches,
clustering is insensitive to the graph heterogeneity. Based on heuristic
arguments, we study the behavior of the informative eigenvector of $D-\zeta A$
and, as a result, we accurately predict the clustering accuracy. Via extensive
simulations and application to real networks, the resulting clustering
algorithm is validated and observed to systematically outperform
state-of-the-art competing methods.
| 1 | 0 | 0 | 1 | 0 | 0 |
High dimensional deformed rectangular matrices with applications in matrix denoising | We consider the recovery of a low rank $M \times N$ matrix $S$ from its noisy
observation $\tilde{S}$ in two different regimes. Under the assumption that $M$
is comparable to $N$, we propose two consistent estimators for $S$. Our
analysis relies on the local behavior of the large dimensional rectangular
matrices with finite rank perturbation. We also derive the convergent limits
and rates for the singular values and vectors of such matrices.
| 0 | 0 | 1 | 1 | 0 | 0 |
Validation of the 3-under-2 principle of cell wall growth in Gram-positive bacteria by simulation of a simple coarse-grained model | The aim of this work is to propose a first coarse-grained model of Bacillus
subtilis cell wall, handling explicitly the existence of multiple layers of
peptidoglycans. In this first work, we aim at the validation of the recently
proposed "three under two" principle.
| 0 | 1 | 0 | 0 | 0 | 0 |
Self-bound quantum droplets in atomic mixtures | Self-bound quantum droplets are a newly discovered phase in the context of
ultracold atoms. In this work we report their experimental realization
following the original proposal by Petrov [Phys. Rev. Lett. 115, 155302
(2015)], using an attractive bosonic mixture. In this system spherical droplets
form due to the balance of competing attractive and repulsive forces, provided
by the mean-field energy close to the collapse threshold and the first-order
correction due to quantum fluctuations. Thanks to an optical levitating
potential with negligible residual confinement we observe self-bound droplets
in free space and we characterize the conditions for their formation as well as
their equilibrium properties. This work sets the stage for future studies on
quantum droplets, from the measurement of their peculiar excitation spectrum,
to the exploration of their superfluid nature.
| 0 | 1 | 0 | 0 | 0 | 0 |
Control of Gene Regulatory Networks with Noisy Measurements and Uncertain Inputs | This paper is concerned with the problem of stochastic control of gene
regulatory networks (GRNs) observed indirectly through noisy measurements and
with uncertainty in the intervention inputs. The partial observability of the
gene states and uncertainty in the intervention process are accounted for by
modeling GRNs using the partially-observed Boolean dynamical system (POBDS)
signal model with noisy gene expression measurements. Obtaining the optimal
infinite-horizon control strategy for this problem is not attainable in
general, and we apply reinforcement learning and Gaussian process techniques to
find a near-optimal solution. The POBDS is first transformed to a
directly-observed Markov Decision Process in a continuous belief space, and the
Gaussian process is used for modeling the cost function over the belief and
intervention spaces. Reinforcement learning then is used to learn the cost
function from the available gene expression data. In addition, we employ
sparsification, which enables the control of large partially-observed GRNs. The
performance of the resulting algorithm is studied through a comprehensive set
of numerical experiments using synthetic gene expression data generated from a
melanoma gene regulatory network.
| 0 | 0 | 0 | 1 | 0 | 0 |
On Memory System Design for Stochastic Computing | Growing uncertainty in design parameters (and therefore, in design
functionality) renders stochastic computing particularly promising, which
represents and processes data as quantized probabilities. However, due to the
difference in data representation, integrating conventional memory (designed
and optimized for non-stochastic computing) in stochastic computing systems
inevitably incurs a significant data conversion overhead. Barely any stochastic
computing proposal to-date covers the memory impact. In this paper, as the
first study of its kind to the best of our knowledge, we rethink the memory
system design for stochastic computing. The result is a seamless stochastic
system, StochMem, which features analog memory to trade the energy and area
overhead of data conversion for computation accuracy. In this manner StochMem
can reduce the energy (area) overhead by up-to 52.8% (93.7%) at the cost of at
most 0.7% loss in computation accuracy.
| 1 | 0 | 0 | 0 | 0 | 0 |
Strongly convex stochastic online optimization on a unit simplex with application to the mixing least square regression | In this paper we propose a new approach to obtain mixing least square
regression estimate by means of stochastic online mirror descent in
non-euclidian set-up.
| 0 | 0 | 1 | 0 | 0 | 0 |
Unsupervised Domain Adaptation for Face Recognition in Unlabeled Videos | Despite rapid advances in face recognition, there remains a clear gap between
the performance of still image-based face recognition and video-based face
recognition, due to the vast difference in visual quality between the domains
and the difficulty of curating diverse large-scale video datasets. This paper
addresses both of those challenges, through an image to video feature-level
domain adaptation approach, to learn discriminative video frame
representations. The framework utilizes large-scale unlabeled video data to
reduce the gap between different domains while transferring discriminative
knowledge from large-scale labeled still images. Given a face recognition
network that is pretrained in the image domain, the adaptation is achieved by
(i) distilling knowledge from the network to a video adaptation network through
feature matching, (ii) performing feature restoration through synthetic data
augmentation and (iii) learning a domain-invariant feature through a domain
adversarial discriminator. We further improve performance through a
discriminator-guided feature fusion that boosts high-quality frames while
eliminating those degraded by video domain-specific factors. Experiments on the
YouTube Faces and IJB-A datasets demonstrate that each module contributes to
our feature-level domain adaptation framework and substantially improves video
face recognition performance to achieve state-of-the-art accuracy. We
demonstrate qualitatively that the network learns to suppress diverse artifacts
in videos such as pose, illumination or occlusion without being explicitly
trained for them.
| 1 | 0 | 0 | 0 | 0 | 0 |
Unifying DAGs and UGs | We introduce a new class of graphical models that generalizes
Lauritzen-Wermuth-Frydenberg chain graphs by relaxing the semi-directed
acyclity constraint so that only directed cycles are forbidden. Moreover, up to
two edges are allowed between any pair of nodes. Specifically, we present
local, pairwise and global Markov properties for the new graphical models and
prove their equivalence. We also present an equivalent factorization property.
Finally, we present a causal interpretation of the new models.
| 1 | 0 | 0 | 1 | 0 | 0 |
Program Completionin the Input Language of GRINGO | We argue that turning a logic program into a set of completed definitions can
be sometimes thought of as the "reverse engineering" process of generating a
set of conditions that could serve as a specification for it. Accordingly, it
may be useful to define completion for a large class of ASP programs and to
automate the process of generating and simplifying completion formulas.
Examining the output produced by this kind of software may help programmers to
see more clearly what their program does, and to what degree its behavior
conforms with their expectations. As a step toward this goal, we propose here a
definition of program completion for a large class of programs in the input
language of the ASP grounder GRINGO, and study its properties. This note is
under consideration for publication in Theory and Practice of Logic
Programming.
| 1 | 0 | 0 | 0 | 0 | 0 |
Numerical modelling of surface water wave interaction with a moving wall | In the present manuscript, we consider the practical problem of wave
interaction with a vertical wall. However, the novelty here consists in the
fact that the wall can move horizontally due to a system of springs. The water
wave evolution is described with the free surface potential flow model. Then, a
semi-analytical numerical method is presented. It is based on a mapping
technique and a finite difference scheme in the transformed domain. The idea is
to pose the equations on a fixed domain. This method is thoroughly tested and
validated in our study. By choosing specific values of spring parameters, this
system can be used to damp (or in other words to extract the energy of)
incident water waves.
| 1 | 1 | 0 | 0 | 0 | 0 |
Dynamic Curriculum Learning for Imbalanced Data Classification | Human attribute analysis is a challenging task in the field of computer
vision, since the data is largely imbalance-distributed. Common techniques such
as re-sampling and cost-sensitive learning require prior-knowledge to train the
system. To address this problem, we propose a unified framework called Dynamic
Curriculum Learning (DCL) to online adaptively adjust the sampling strategy and
loss learning in single batch, which resulting in better generalization and
discrimination. Inspired by the curriculum learning, DCL consists of two level
curriculum schedulers: (1) sampling scheduler not only manages the data
distribution from imbalanced to balanced but also from easy to hard; (2) loss
scheduler controls the learning importance between classification and metric
learning loss. Learning from these two schedulers, we demonstrate our DCL
framework with the new state-of-the-art performance on the widely used face
attribute dataset CelebA and pedestrian attribute dataset RAP.
| 1 | 0 | 0 | 0 | 0 | 0 |
Causal Discovery in the Presence of Measurement Error: Identifiability Conditions | Measurement error in the observed values of the variables can greatly change
the output of various causal discovery methods. This problem has received much
attention in multiple fields, but it is not clear to what extent the causal
model for the measurement-error-free variables can be identified in the
presence of measurement error with unknown variance. In this paper, we study
precise sufficient identifiability conditions for the measurement-error-free
causal model and show what information of the causal model can be recovered
from observed data. In particular, we present two different sets of
identifiability conditions, based on the second-order statistics and
higher-order statistics of the data, respectively. The former was inspired by
the relationship between the generating model of the
measurement-error-contaminated data and the factor analysis model, and the
latter makes use of the identifiability result of the over-complete independent
component analysis problem.
| 1 | 0 | 0 | 1 | 0 | 0 |
Elliptic fibrations on covers of the elliptic modular surface of level 5 | We consider the K3 surfaces that arise as double covers of the elliptic
modular surface of level 5, $R_{5,5}$. Such surfaces have a natural elliptic
fibration induced by the fibration on $R_{5,5}$. Moreover, they admit several
other elliptic fibrations. We describe such fibrations in terms of linear
systems of curves on $R_{5,5}$. This has a major advantage over other methods
of classification of elliptic fibrations, namely, a simple algorithm that has
as input equations of linear systems of curves in the projective plane yields a
Weierstrass equation for each elliptic fibration. We deal in detail with the
cases for which the double cover is branched over the two reducible fibers of
type $I_5$ and for which it is branched over two smooth fibers, giving a
complete list of elliptic fibrations for these two scenarios.
| 0 | 0 | 1 | 0 | 0 | 0 |
A wide field-of-view crossed Dragone optical system using the anamorphic aspherical surfaces | A side-fed crossed Dragone telescope provides a wide field-of-view. This type
of a telescope is commonly employed in the measurement of cosmic microwave
background (CMB) polarization, which requires an image-space telecentric
telescope with a large focal plane over broadband coverage. We report the
design of the wide field-of-view crossed Dragone optical system using the
anamorphic aspherical surfaces with correction terms up to the 10th order. We
achieved the Strehl ratio larger than 0.95 over 32 by 18 square degrees at 150
GHz. This design is an image-space telecentric and fully diffraction-limited
system below 400 GHz. We discuss the optical performance in the uniformity of
the axially symmetric point spread function and telecentricity over the
field-of-view. We also address the analysis to evaluate the polarization
properties, including the instrumental polarization, extinction rate, and
polarization angle rotation. This work is a part of programs to design a
compact multi-color wide field-of-view telescope for LiteBIRD, which is a next
generation CMB polarization satellite.
| 0 | 1 | 0 | 0 | 0 | 0 |
Searching for Biophysically Realistic Parameters for Dynamic Neuron Models by Genetic Algorithms from Calcium Imaging Recording | Individual Neurons in the nervous systems exploit various dynamics. To
capture these dynamics for single neurons, we tune the parameters of an
electrophysiological model of nerve cells, to fit experimental data obtained by
calcium imaging. A search for the biophysical parameters of this model is
performed by means of a genetic algorithm, where the model neuron is exposed to
a predefined input current representing overall inputs from other parts of the
nervous system. The algorithm is then constrained for keeping the ion-channel
currents within reasonable ranges, while producing the best fit to a calcium
imaging time series of the AVA interneuron, from the brain of the soil-worm, C.
elegans. Our settings enable us to project a set of biophysical parameters to
the the neuron kinetics observed in neuronal imaging.
| 1 | 0 | 0 | 0 | 0 | 0 |
Matrix elements of irreducible representations of $\mathrm{SU}(n+1)\times\mathrm{SU}(n+1)$ and multivariable matrix-valued orthogonal polynomials | In Part 1 we study the spherical functions on compact symmetric pairs of
arbitrary rank under a suitable multiplicity freeness assumption and additional
conditions on the branching rules. The spherical functions are taking values in
the spaces of linear operators of a finite dimensional representation of the
subgroup, so the spherical functions are matrix-valued. Under these assumptions
these functions can be described in terms of matrix-valued orthogonal
polynomials in several variables, where the number of variables is the rank of
the compact symmetric pair. Moreover, these polynomials are uniquely determined
as simultaneous eigenfunctions of a commutative algebra of differential
operators.
In Part 2 we verify that the group case $\mathrm{SU}(n+1)$ meets all the
conditions that we impose in Part 1. For any $k\in\mathbb{N}_{0}$ we obtain
families of orthogonal polynomials in $n$ variables with values in the $N\times
N$-matrices, where $N=\binom{n+k}{k}$. The case $k=0$ leads to the classical
Heckman-Opdam polynomials of type $A_{n}$ with geometric parameter. For $k=1$
we obtain the most complete results. In this case we give an explicit
expression of the matrix weight, which we show to be irreducible whenever
$n\ge2$. We also give explicit expressions of the spherical functions that
determine the matrix weight for $k=1$. These expressions are used to calculate
the spherical functions that determine the matrix weight for general $k$ up to
invertible upper-triangular matrices. This generalizes and gives a new proof of
a formula originally obtained by Koornwinder for the case $n=1$. The commuting
family of differential operators that have the matrix-valued polynomials as
simultaneous eigenfunctions contains an element of order one. We give explicit
formulas for differential operators of order one and two for $(n,k)$ equal to
$(2,1)$ and $(3,1)$.
| 0 | 0 | 1 | 0 | 0 | 0 |
On the variance of internode distance under the multispecies coalescent | We consider the problem of estimating species trees from unrooted gene tree
topologies in the presence of incomplete lineage sorting, a common phenomenon
that creates gene tree heterogeneity in multilocus datasets. One popular class
of reconstruction methods in this setting is based on internode distances, i.e.
the average graph distance between pairs of species across gene trees. While
statistical consistency in the limit of large numbers of loci has been
established in some cases, little is known about the sample complexity of such
methods. Here we make progress on this question by deriving a lower bound on
the worst-case variance of internode distance which depends linearly on the
corresponding graph distance in the species tree. We also discuss some
algorithmic implications.
| 0 | 0 | 0 | 0 | 1 | 0 |
DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN | Recently, the introduction of the generative adversarial network (GAN) and
its variants has enabled the generation of realistic synthetic samples, which
has been used for enlarging training sets. Previous work primarily focused on
data augmentation for semi-supervised and supervised tasks. In this paper, we
instead focus on unsupervised anomaly detection and propose a novel generative
data augmentation framework optimized for this task. In particular, we propose
to oversample infrequent normal samples - normal samples that occur with small
probability, e.g., rare normal events. We show that these samples are
responsible for false positives in anomaly detection. However, oversampling of
infrequent normal samples is challenging for real-world high-dimensional data
with multimodal distributions. To address this challenge, we propose to use a
GAN variant known as the adversarial autoencoder (AAE) to transform the
high-dimensional multimodal data distributions into low-dimensional unimodal
latent distributions with well-defined tail probability. Then, we
systematically oversample at the `edge' of the latent distributions to increase
the density of infrequent normal samples. We show that our oversampling
pipeline is a unified one: it is generally applicable to datasets with
different complex data distributions. To the best of our knowledge, our method
is the first data augmentation technique focused on improving performance in
unsupervised anomaly detection. We validate our method by demonstrating
consistent improvements across several real-world datasets.
| 0 | 0 | 0 | 1 | 0 | 0 |
Online Human Gesture Recognition using Recurrent Neural Networks and Wearable Sensors | Gestures are a natural communication modality for humans. The ability to
interpret gestures is fundamental for robots aiming to naturally interact with
humans. Wearable sensors are promising to monitor human activity, in particular
the usage of triaxial accelerometers for gesture recognition have been
explored. Despite this, the state of the art presents lack of systems for
reliable online gesture recognition using accelerometer data. The article
proposes SLOTH, an architecture for online gesture recognition, based on a
wearable triaxial accelerometer, a Recurrent Neural Network (RNN) probabilistic
classifier and a procedure for continuous gesture detection, relying on
modelling gesture probabilities, that guarantees (i) good recognition results
in terms of precision and recall, (ii) immediate system reactivity.
| 1 | 0 | 0 | 0 | 0 | 0 |
Conditional Variance Penalties and Domain Shift Robustness | When training a deep network for image classification, one can broadly
distinguish between two types of latent features of images that will drive the
classification. Following the notation of Gong et al. (2016), we can divide
latent features into (i) "core" features $X^\text{core}$ whose distribution
$X^\text{core}\vert Y$ does not change substantially across domains and (ii)
"style" features $X^{\text{style}}$ whose distribution $X^{\text{style}}\vert
Y$ can change substantially across domains. These latter orthogonal features
would generally include features such as rotation, image quality or brightness
but also more complex ones like hair color or posture for images of persons.
Guarding against future adversarial domain shifts implies that the influence of
the second type of style features in the prediction has to be limited. We
assume that the domain itself is not observed and hence a latent variable. We
do assume, however, that we can sometimes observe a typically discrete
identifier or $\mathrm{ID}$ variable. We know in some applications, for
example, that two images show the same person, and $\mathrm{ID}$ then refers to
the identity of the person. The method requires only a small fraction of images
to have an $\mathrm{ID}$ variable. We group data samples if they share the same
class and identifier $(Y,\mathrm{ID})=(y,\mathrm{id})$ and penalize the
conditional variance of the prediction if we condition on $(Y,\mathrm{ID})$.
Using this approach is shown to protect against shifts in the distribution of
the style variables for both regression and classification models.
Specifically, the conditional variance penalty CoRe is shown to be equivalent
to minimizing the risk under noise interventions in a regression setting and is
shown to lead to adversarial risk consistency in a partially linear
classification setting.
| 1 | 0 | 0 | 1 | 0 | 0 |
The First Optical Spectra of Wolf Rayet Stars in M101 Revealed with Gemini/GMOS | Deep narrow-band HST imaging of the iconic spiral galaxy M101 has revealed
over a thousand new Wolf Rayet (WR) candidates. We report spectrographic
confirmation of 10 HeII emission line sources hosting 15 WR stars. We find WR
stars present at both sub- and super-solar metalicities with WC stars favouring
more metal-rich regions compared to WN stars. We investigate the association of
WR stars with HII regions using archival HST imaging and conclude that the
majority of WR stars are in or associated with HII regions. Of the 10 emission
lines sources, only one appears to be unassociated with a star-forming region.
Our spectroscopic survey provides confidence that our narrow-band photometric
candidates are in fact bonafide WR stars, which will allow us to characterise
the progenitors of any core-collapse supernovae that erupt in the future in
M101.
| 0 | 1 | 0 | 0 | 0 | 0 |
Machine Learning Topological Invariants with Neural Networks | In this Letter we supervisedly train neural networks to distinguish different
topological phases in the context of topological band insulators. After
training with Hamiltonians of one-dimensional insulators with chiral symmetry,
the neural network can predict their topological winding numbers with nearly
100% accuracy, even for Hamiltonians with larger winding numbers that are not
included in the training data. These results show a remarkable success that the
neural network can capture the global and nonlinear topological features of
quantum phases from local inputs. By opening up the neural network, we confirm
that the network does learn the discrete version of the winding number formula.
We also make a couple of remarks regarding the role of the symmetry and the
opposite effect of regularization techniques when applying machine learning to
physical systems.
| 1 | 1 | 0 | 0 | 0 | 0 |
Topics and Label Propagation: Best of Both Worlds for Weakly Supervised Text Classification | We propose a Label Propagation based algorithm for weakly supervised text
classification. We construct a graph where each document is represented by a
node and edge weights represent similarities among the documents. Additionally,
we discover underlying topics using Latent Dirichlet Allocation (LDA) and
enrich the document graph by including the topics in the form of additional
nodes. The edge weights between a topic and a text document represent level of
"affinity" between them. Our approach does not require document level
labelling, instead it expects manual labels only for topic nodes. This
significantly minimizes the level of supervision needed as only a few topics
are observed to be enough for achieving sufficiently high accuracy. The Label
Propagation Algorithm is employed on this enriched graph to propagate labels
among the nodes. Our approach combines the advantages of Label Propagation
(through document-document similarities) and Topic Modelling (for minimal but
smart supervision). We demonstrate the effectiveness of our approach on various
datasets and compare with state-of-the-art weakly supervised text
classification approaches.
| 1 | 0 | 0 | 0 | 0 | 0 |
Parallel Markov Chain Monte Carlo for the Indian Buffet Process | Indian Buffet Process based models are an elegant way for discovering
underlying features within a data set, but inference in such models can be
slow. Inferring underlying features using Markov chain Monte Carlo either
relies on an uncollapsed representation, which leads to poor mixing, or on a
collapsed representation, which leads to a quadratic increase in computational
complexity. Existing attempts at distributing inference have introduced
additional approximation within the inference procedure. In this paper we
present a novel algorithm to perform asymptotically exact parallel Markov chain
Monte Carlo inference for Indian Buffet Process models. We take advantage of
the fact that the features are conditionally independent under the
beta-Bernoulli process. Because of this conditional independence, we can
partition the features into two parts: one part containing only the finitely
many instantiated features and the other part containing the infinite tail of
uninstantiated features. For the finite partition, parallel inference is simple
given the instantiation of features. But for the infinite tail, performing
uncollapsed MCMC leads to poor mixing and hence we collapse out the features.
The resulting hybrid sampler, while being parallel, produces samples
asymptotically from the true posterior.
| 0 | 0 | 0 | 1 | 0 | 0 |
The Robot Routing Problem for Collecting Aggregate Stochastic Rewards | We propose a new model for formalizing reward collection problems on graphs
with dynamically generated rewards which may appear and disappear based on a
stochastic model. The *robot routing problem* is modeled as a graph whose nodes
are stochastic processes generating potential rewards over discrete time. The
rewards are generated according to the stochastic process, but at each step, an
existing reward disappears with a given probability. The edges in the graph
encode the (unit-distance) paths between the rewards' locations. On visiting a
node, the robot collects the accumulated reward at the node at that time, but
traveling between the nodes takes time. The optimization question asks to
compute an optimal (or epsilon-optimal) path that maximizes the expected
collected rewards.
We consider the finite and infinite-horizon robot routing problems. For
finite-horizon, the goal is to maximize the total expected reward, while for
infinite horizon we consider limit-average objectives. We study the
computational and strategy complexity of these problems, establish NP-lower
bounds and show that optimal strategies require memory in general. We also
provide an algorithm for computing epsilon-optimal infinite paths for arbitrary
epsilon > 0.
| 1 | 0 | 1 | 0 | 0 | 0 |
Estimating occupation time functionals | We study the estimation of integral type functionals $\int_{0}^{t}f(X_{r})dr$
for a function $f$ and a $d$-dimensional càdlàg process $X$ with respect to
discrete observations by a Riemann-sum estimator. Based on novel semimartingale
approximations in the Fourier domain, central limit theorems are proved for
$L^{2}$-Sobolev functions $f$ with fractional smoothness and continuous Itô
semimartingales $X$. General $L^{2}(\mathbb{P})$-upper bounds on the error for
càdlàg processes are given under weak assumptions. These bounds combine and
generalize all previously obtained results in the literature and apply also to
non-Markovian processes. Several detailed examples are discussed. As
application the approximation of local times for fractional Brownian motion is
studied. The optimality of the $L^{2}(\mathbb{P})$-upper bounds is shown by
proving the corresponding lower bounds in case of Brownian motion.
| 0 | 0 | 1 | 1 | 0 | 0 |
Bootstrapping a Lexicon for Emotional Arousal in Software Engineering | Emotional arousal increases activation and performance but may also lead to
burnout in software development. We present the first version of a Software
Engineering Arousal lexicon (SEA) that is specifically designed to address the
problem of emotional arousal in the software developer ecosystem. SEA is built
using a bootstrapping approach that combines word embedding model trained on
issue-tracking data and manual scoring of items in the lexicon. We show that
our lexicon is able to differentiate between issue priorities, which are a
source of emotional activation and then act as a proxy for arousal. The best
performance is obtained by combining SEA (428 words) with a previously created
general purpose lexicon by Warriner et al. (13,915 words) and it achieves
Cohen's d effect sizes up to 0.5.
| 1 | 0 | 0 | 0 | 0 | 0 |
Early Solar System irradiation quantified by linked vanadium and beryllium isotope variations in meteorites | X-ray emission in young stellar objects (YSOs) is orders of magnitude more
intense than in main sequence stars1,2, suggestive of cosmic ray irradiation of
surrounding accretion disks. Protoplanetary disk irradiation has been detected
around YSOs by HERSCHEL3. In our solar system, short-lived 10Be (half-life =
1.39 My4), which cannot be produced by stellar nucleosynthesis, was discovered
in the oldest solar system solids, the calcium-aluminium-rich inclusions
(CAIs)5. The high 10Be abundance, as well as detection of other irradiation
tracers6,7, suggest 10Be likely originates from cosmic ray irradiation caused
by solar flares8. Nevertheless, the nature of these flares (gradual or
impulsive), the target (gas or dust), and the duration and location of
irradiation remain unknown. Here we use the vanadium isotopic composition,
together with initial 10Be abundance to quantify irradiation conditions in the
early Solar System9. For the initial 10Be abundances recorded in CAIs, 50V
excesses of a few per mil relative to chondrites have been predicted10,11. We
report 50V excesses in CAIs up to 4.4 per mil that co-vary with 10Be abundance.
Their co-variation dictates that excess 50V and 10Be were synthesised through
irradiation of refractory dust. Modelling of the production rate of 50V and
10Be demonstrates that the dust was exposed to solar cosmic rays produced by
gradual flares for less than 300 years at about 0.1 au from the protoSun.
| 0 | 1 | 0 | 0 | 0 | 0 |
Two classes of nonlocal Evolution Equations related by a shared Traveling Wave Problem | We consider reaction-diffusion equations and Korteweg-de Vries-Burgers (KdVB)
equations, i.e. scalar conservation laws with diffusive-dispersive
regularization. We review the existence of traveling wave solutions for these
two classes of evolution equations. For classical equations the traveling wave
problem (TWP) for a local KdVB equation can be identified with the TWP for a
reaction-diffusion equation. In this article we study this relationship for
these two classes of evolution equations with nonlocal diffusion/dispersion.
This connection is especially useful, if the TW equation is not studied
directly, but the existence of a TWS is proven using one of the evolution
equations instead. Finally, we present three models from fluid dynamics and
discuss the TWP via its link to associated reaction-diffusion equations.
| 0 | 0 | 1 | 0 | 0 | 0 |
Analyzing IO Amplification in Linux File Systems | We present the first systematic analysis of read, write, and space
amplification in Linux file systems. While many researchers are tackling write
amplification in key-value stores, IO amplification in file systems has been
largely unexplored. We analyze data and metadata operations on five widely-used
Linux file systems: ext2, ext4, XFS, btrfs, and F2FS. We find that data
operations result in significant write amplification (2-32X) and that metadata
operations have a large IO cost. For example, a single rename requires 648 KB
write IO in btrfs. We also find that small random reads result in read
amplification of 2-13X. Based on these observations, we present the CReWS
conjecture about the relationship between IO amplification, consistency, and
storage space utilization. We hope this paper spurs people to design future
file systems with less IO amplification, especially for non-volatile memory
technologies.
| 1 | 0 | 0 | 0 | 0 | 0 |
Feature analysis of multidisciplinary scientific collaboration patterns based on PNAS | The features of collaboration patterns are often considered to be different
from discipline to discipline. Meanwhile, collaborating among disciplines is an
obvious feature emerged in modern scientific research, which incubates several
interdisciplines. The features of collaborations in and among the disciplines
of biological, physical and social sciences are analyzed based on 52,803 papers
published in a multidisciplinary journal PNAS during 1999 to 2013. From those
data, we found similar transitivity and assortativity of collaboration patterns
as well as the identical distribution type of collaborators per author and that
of papers per author, namely a mixture of generalized Poisson and power-law
distributions. In addition, we found that interdisciplinary research is
undertaken by a considerable fraction of authors, not just those with many
collaborators or those with many papers. This case study provides a window for
understanding aspects of multidisciplinary and interdisciplinary collaboration
patterns.
| 1 | 1 | 0 | 0 | 0 | 0 |
Inflationary magneto-(non)genesis, increasing kinetic couplings, and the strong coupling problem | We study the generation of magnetic fields during inflation making use of a
coupling of the inflaton and moduli fields to electromagnetism via the photon
kinetic term, and assuming that the coupling is an increasing function of time.
We demonstrate that the strong coupling problem of inflationary magnetogenesis
can be avoided by incorporating the destabilization of moduli fields after
inflation. The magnetic field always dominates over the electric one, and thus
the severe constraints on the latter from backreaction, which are the demanding
obstacles in the case of a decreasing coupling function, do not apply to the
current scenario. However, we show that this loophole to the strong coupling
problem comes at a price: the normalization of the amplitude of magnetic fields
is determined by this coupling term and is therefore suppressed by a large
factor after the moduli destabilization completes. From this we conclude that
there is no self-consistent and generic realization of primordial
magnetogenesis producing scale-invariant fields in the case of an increasing
kinetic coupling.
| 0 | 1 | 0 | 0 | 0 | 0 |
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving | We present HornDroid, a new tool for the static analysis of information flow
properties in Android applications. The core idea underlying HornDroid is to
use Horn clauses for soundly abstracting the semantics of Android applications
and to express security properties as a set of proof obligations that are
automatically discharged by an off-the-shelf SMT solver. This approach makes it
possible to fine-tune the analysis in order to achieve a high degree of
precision while still using off-the-shelf verification tools, thereby
leveraging the recent advances in this field. As a matter of fact, HornDroid
outperforms state-of-the-art Android static analysis tools on benchmarks
proposed by the community. Moreover, HornDroid is the first static analysis
tool for Android to come with a formal proof of soundness, which covers the
core of the analysis technique: besides yielding correctness assurances, this
proof allowed us to identify some critical corner-cases that affect the
soundness guarantees provided by some of the previous static analysis tools for
Android.
| 1 | 0 | 0 | 0 | 0 | 0 |
Assessing the reliability polynomial based on percolation theory | In this paper, we study the robustness of network topologies. We use the
concept of percolation as measuring tool to assess the reliability polynomial
of those systems which can be modeled as a general inhomogeneous random graph
as well as scale-free random graph.
| 0 | 0 | 1 | 1 | 0 | 0 |
Interval Exchange Transformations and Low-Discrepancy | In [Mas82] and [Vee78] it was proved independently that almost every interval
exchange transformation is uniquely ergodic. The Birkhoff ergodic theorem
implies that these maps mainly have uniformly distributed orbits. This raises
the question under which conditions the orbits yield low-discrepancy sequences.
The case of $n=2$ intervals corresponds to circle rotation, where conditions
for low-discrepancy are well-known. In this paper, we give corresponding
conditions in the case $n=3$. Furthermore, we construct infinitely many
interval exchange transformations with low-discrepancy orbits for $n \geq 4$.
We also show that these examples do not coincide with $LS$-sequences if $S \geq
2$.
| 0 | 0 | 1 | 0 | 0 | 0 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.