id
stringlengths
9
16
submitter
stringlengths
2
64
authors
stringlengths
4
23.3k
title
stringlengths
3
294
comments
stringlengths
1
627
journal-ref
stringlengths
4
349
doi
stringlengths
12
145
report-no
stringlengths
2
341
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
21
3.66k
versions
stringlengths
62
5.08k
update_date
stringlengths
10
10
authors_parsed
stringlengths
18
30.8k
2008.11845
Shlomo Chazan
Hodaya Hammer and Shlomo E. Chazan and Jacob Goldberger and Sharon Gannot
FCN Approach for Dynamically Locating Multiple Speakers
null
null
null
null
eess.AS cs.LG cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a deep neural network-based online multi-speaker localisation algorithm. Following the W-disjoint orthogonality principle in the spectral domain, each time-frequency (TF) bin is dominated by a single speaker, and hence by a single direction of arrival (DOA). A fully convolutional network is trained with instantaneous spatial features to estimate the DOA for each TF bin. The high resolution classification enables the network to accurately and simultaneously localize and track multiple speakers, both static and dynamic. Elaborated experimental study using both simulated and real-life recordings in static and dynamic scenarios, confirms that the proposed algorithm outperforms both classic and recent deep-learning-based algorithms.
[{'version': 'v1', 'created': 'Wed, 26 Aug 2020 22:21:29 GMT'}]
2020-08-28
[['Hammer', 'Hodaya', ''], ['Chazan', 'Shlomo E.', ''], ['Goldberger', 'Jacob', ''], ['Gannot', 'Sharon', '']]
1309.7495
Itai Arad
Dorit Aharonov, Itai Arad and Thomas Vidick
The Quantum PCP Conjecture
45 pages, 4 figures, an enhanced version of the SIGACT guest column from Volume 44 Issue 2, June 2013
ACM SIGACT News archive Volume 44 Issue 2, June 2013, Pages 47--79
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The classical PCP theorem is arguably the most important achievement of classical complexity theory in the past quarter century. In recent years, researchers in quantum computational complexity have tried to identify approaches and develop tools that address the question: does a quantum version of the PCP theorem hold? The story of this study starts with classical complexity and takes unexpected turns providing fascinating vistas on the foundations of quantum mechanics, the global nature of entanglement and its topological properties, quantum error correction, information theory, and much more; it raises questions that touch upon some of the most fundamental issues at the heart of our understanding of quantum mechanics. At this point, the jury is still out as to whether or not such a theorem holds. This survey aims to provide a snapshot of the status in this ongoing story, tailored to a general theory-of-CS audience.
[{'version': 'v1', 'created': 'Sat, 28 Sep 2013 19:42:01 GMT'}]
2013-10-01
[['Aharonov', 'Dorit', ''], ['Arad', 'Itai', ''], ['Vidick', 'Thomas', '']]
1911.07417
Michael Whitmeyer
Michael Whitmeyer, Jonathan Liu
Algorithmic Discrepancy Minimization
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report will be a literature review on a result in algorithmic discrepancy theory. We will begin by providing a quick overview on discrepancy theory and some major results in the field, and then focus on an important result by Shachar Lovett and Raghu Meka. We restate the main algorithm and ideas of the paper, and rewrite proofs for some of the major results in the paper.
[{'version': 'v1', 'created': 'Mon, 18 Nov 2019 04:10:43 GMT'}]
2019-11-19
[['Whitmeyer', 'Michael', ''], ['Liu', 'Jonathan', '']]
2209.02480
M. K. Bossard
M. K. Bossard (1), N. Banerjee (1), J. Brandt (1), Y.-K. Kim (1), M. Krieg (2), B. Cathey (3), S. Nagaitsev (3), G. Stancari (3) ((1) University of Chicago (2) St. Olaf College (3) Fermilab)
Thermionic Sources For Electron Cooling At IOTA
null
null
null
FERMILAB-CONF-22-621-AD
physics.acc-ph
http://creativecommons.org/licenses/by/4.0/
We are designing and fabricating two new thermionic sources of magnetized electrons for use in the electron lens project at the Integrable Optics Test Accelerator (IOTA) at Fermilab. These electron sources will be used for cooling of 2.5 MeV protons in the presence of intense space-charge. Furthermore, we are constructing an electron source test stand at the University of Chicago which will validate the electrical, thermal, and vacuum characteristics of thermionic sources. In this paper we present the progress made so far and the upcoming steps for the thermionic electron sources for electron cooling and the test stand.
[{'version': 'v1', 'created': 'Tue, 6 Sep 2022 13:26:31 GMT'}]
2022-09-07
[['Bossard', 'M. K.', ''], ['Banerjee', 'N.', ''], ['Brandt', 'J.', ''], ['Kim', 'Y. -K.', ''], ['Krieg', 'M.', ''], ['Cathey', 'B.', ''], ['Nagaitsev', 'S.', ''], ['Stancari', 'G.', '']]
0910.2414
Erez Hatna
Itzhak Benenson and Erez Hatna
The Third State of the Schelling Model of Residential Dynamics
null
null
null
null
physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Schelling model of segregation between two groups of residential agents (Schelling 1971; Schelling 1978) reflects the most abstract view of the non-economic forces of residential migrations: be close to people of 'your own'. The model assumes that the residential agent, located in the neighborhood where the fraction of 'friends' is less than a predefined threshold value F, tries to relocate to a neighborhood for which this fraction is above F. It is well known that for the equal groups, depending on F, Schelling's residential pattern converges either to complete integration (random pattern) or segregation. We investigate Schelling model pattern dynamics as dependent on F, the ratio of the group numbers and the size of the neighborhood and demonstrate that the traditional integrate-segregate dichotomy is incomplete. In case of unequal groups, there exists the wide interval of the F-values that entails the third persistent residential pattern, in which part of the majority population segregates, while the rest remains integrated with the minority. We also demonstrate that Schelling model dynamics essentially depends on the description of agents' residential behavior. To obtain sociologically meaningful results, the agents should be satisficers, and the fraction of the agents who relocate irrespective of the neighborhood state should be non-zero.
[{'version': 'v1', 'created': 'Tue, 13 Oct 2009 15:16:24 GMT'}]
2009-10-14
[['Benenson', 'Itzhak', ''], ['Hatna', 'Erez', '']]
2204.08303
Austin Hoover
A. Hoover, N. E. Evans
Four-dimensional emittance measurement at the Spallation Neutron Source
null
null
10.1016/j.nima.2022.167376
null
physics.acc-ph
http://creativecommons.org/licenses/by/4.0/
A coasting hadron beam with an elliptical transverse profile, uniform charge density, and small transverse four-dimensional (4D) emittance could improve accelerator performance in several contexts. A phase space painting method to generate such a distribution is being tested in the Spallation Neutron Source (SNS) accumulator ring. A critical component of these efforts is to measure the 4D emittance of the beam during accumulation. The 4D emittance can be reconstructed from measured beam profiles in two ways: in the multi-optics method, the optics between a reconstruction and measurement location are varied; in the fixed-optics method, multiple measurement locations are used without modifying the optics. The fixed-optics method is faster but can lead to large uncertainty in the reconstructed 4D emittance. In this paper, we implement a variant of the multi-optics method using the four available wire-scanners near the SNS target. We also modify the wire-scanner region to reduce the uncertainty of the fixed-optics method. We then demonstrate the usefulness of the fixed-optics method by reconstructing the 4D emittance evolution during accumulation in the SNS ring.
[{'version': 'v1', 'created': 'Mon, 18 Apr 2022 13:18:38 GMT'}, {'version': 'v2', 'created': 'Sun, 24 Jul 2022 23:57:26 GMT'}]
2022-09-14
[['Hoover', 'A.', ''], ['Evans', 'N. E.', '']]
physics/9908056
Norayr Akopov
A.R. Tumanyan, N.Z. Akopov, Z.G. Guiragossian, Z.N. Akopov
Concept of Powerful Multistage Coaxial Cyclotron for Pulsed and Continuous Beam Production
10 pages, 1 figure
null
null
null
physics.acc-ph
null
The concept of large-radius multistage coaxial cyclotrons having separated orbits is described, to generate proton beams of 120-2000 MeV energy at tens of GW pulsed and hundreds of MW in continuous beam power operation. Accelerated beam losses must be less than 0.1 W/m for the intercepted average beam power linear density. The concept is inherently configured to actively compensate the longitudinal and transverse space charge expansion in beam bunches. These are based on (1) actively varying the bunch acceleration equilibrium phase while maintaining isochronism, independently for each cyclotron turns; (2) independently changing the acceleration voltage for each turn together with orbit corrections that preserve isochronism; (3) independently changing the transverse betatron oscillation tune shift, to assure non-resonant operation. Also, (4) sextupole lenses are included to compensate for chromaticity effects. Moreover, the concept is based on optimum uses of practical successful results so far achieved in beam acceleration and storage techniques. This accelerator can be used to deliver a pulsed intense source of neutrons without the use of storage rings, and to drive the different transmutation technologies. As an example of such a cyclotron system, we describe our approach of accelerating single-bunch proton beams at up to 1 GeV energy, with pulsed beam power of 80 GW and bunch duration of 2 ns. The exemplar cyclotron accelerator system is configured to be located in the shielded structure of the 6-GeV Yerevan Electron Synchrotron. The cost of such a cyclotron system is estimated to be approximately 40,000,000 US dollars, if implemented in Armenia at substantially reduced labor costs.
[{'version': 'v1', 'created': 'Sun, 29 Aug 1999 12:02:50 GMT'}]
2007-05-23
[['Tumanyan', 'A. R.', ''], ['Akopov', 'N. Z.', ''], ['Guiragossian', 'Z. G.', ''], ['Akopov', 'Z. N.', '']]
1210.7093
Bruno Paroli
B. Paroli
Thomson backscattering diagnostics of nanosecond electron bunches in high space charge regime
PhD thesis 2012, link http://phd.fisica.unimi.it
null
null
null
physics.plasm-ph physics.acc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The intra-beam repulsions play a significant role in determining the performances of free-electron devices when an high brilliance of the beam is required. The transversal and longitudinal spread of the beam, its energy and density are fundamental parameters in any beam experiment and different beam diagnostics are available to measure such parameters. A diagnostic method based on the Thomson backscattering of a laser beam impinging on the particle beam is proposed in this work for the study of nanosecond electron bunches in high space charge regime. This diagnostics, aimed to the measurement of density, energy and energy spread, was set-up in a Malmberg-Penning trap (generally used for the electron/ion confinment) in two different configurations designed to optimize sensitivity, spatial resolution and electron-beam coincidence in space and time. To this purpose an electron bunch (pulse time <4ns), produced by a photocathode source, was preliminary characterized with different electrostatic diagnostics and used to test the diagnostics systems. The solutions are detailed, which were devised for both the laser and bunch injection in the vacuum chamber, space and time coincidence of electron and laser pulses, photon detection, optimization of the geometry in the laser-beam interaction. The results are then summarized with an estimate of the minimum sensitivity of the set-up.
[{'version': 'v1', 'created': 'Fri, 26 Oct 2012 10:52:35 GMT'}]
2012-10-29
[['Paroli', 'B.', '']]
1805.10159
Nikolai Zolotykh
Vadim Lozin, Igor Razgon, Viktor Zamaraev, Elena Zamaraeva, Nikolai Yu. Zolotykh
Linear read-once and related Boolean functions
Submitted to Discrete and Applied Mathematics. arXiv admin note: text overlap with arXiv:1706.01747
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that a positive Boolean function f depending on n variables has at least n + 1 extremal points, i.e. minimal ones and maximal zeros. We show that f has exactly n + 1 extremal points if and only if it is linear read-once. The class of linear read-once functions is known to be the intersection of the classes of read-once and threshold functions. Generalizing this result we show that the class of linear read-once functions is the intersection of read-once and Chow functions. We also find the set of minimal read-once functions which are not linear read-once and the set of minimal threshold functions which are not linear read-once. In other words, we characterize the class of linear read-once functions by means of minimal forbidden subfunctions within the universe of read-once and the universe of threshold functions. Within the universe of threshold functions the importance of linear read-once func- tions is due to the fact that they attain the minimum value of the specification number, which is n + 1 for functions depending on n variables. In 1995 Anthony et al. conjec- tured that for all other threshold functions the specification number is strictly greater than n + 1. We disprove this conjecture by exhibiting a threshold non-linear read-once function depending on n variables whose specification number is n + 1.
[{'version': 'v1', 'created': 'Thu, 24 May 2018 08:13:16 GMT'}]
2018-05-28
[['Lozin', 'Vadim', ''], ['Razgon', 'Igor', ''], ['Zamaraev', 'Viktor', ''], ['Zamaraeva', 'Elena', ''], ['Zolotykh', 'Nikolai Yu.', '']]
2301.08189
Mihir Durve
Mihir Durve, Sibilla Orsini, Adriano Tiribocchi, Andrea Montessori, Jean-Michel Tucny, Marco Lauricella, Andrea Camposeo, Dario Pisignano, and Sauro Succi
Benchmarking YOLOv5 and YOLOv7 models with DeepSORT for droplet tracking applications
13 pages, 4 figures, 3 tables
null
null
null
cs.CV physics.flu-dyn
http://creativecommons.org/licenses/by/4.0/
Tracking droplets in microfluidics is a challenging task. The difficulty arises in choosing a tool to analyze general microfluidic videos to infer physical quantities. The state-of-the-art object detector algorithm You Only Look Once (YOLO) and the object tracking algorithm Simple Online and Realtime Tracking with a Deep Association Metric (DeepSORT) are customizable for droplet identification and tracking. The customization includes training YOLO and DeepSORT networks to identify and track the objects of interest. We trained several YOLOv5 and YOLOv7 models and the DeepSORT network for droplet identification and tracking from microfluidic experimental videos. We compare the performance of the droplet tracking applications with YOLOv5 and YOLOv7 in terms of training time and time to analyze a given video across various hardware configurations. Despite the latest YOLOv7 being 10% faster, the real-time tracking is only achieved by lighter YOLO models on RTX 3070 Ti GPU machine due to additional significant droplet tracking costs arising from the DeepSORT algorithm. This work is a benchmark study for the YOLOv5 and YOLOv7 networks with DeepSORT in terms of the training time and inference time for a custom dataset of microfluidic droplets.
[{'version': 'v1', 'created': 'Thu, 19 Jan 2023 17:37:40 GMT'}]
2023-01-20
[['Durve', 'Mihir', ''], ['Orsini', 'Sibilla', ''], ['Tiribocchi', 'Adriano', ''], ['Montessori', 'Andrea', ''], ['Tucny', 'Jean-Michel', ''], ['Lauricella', 'Marco', ''], ['Camposeo', 'Andrea', ''], ['Pisignano', 'Dario', ''], ['Succi', 'Sauro', '']]
2104.13974
Mohammad Shojafar
Farooq Hoseiny, Sadoon Azizi, Mohammad Shojafar, Rahim Tafazolli
Joint QoS-aware and Cost-efficient Task Scheduling for Fog-Cloud Resources in a Volunteer Computing System
21 pages, 6 figures, ACM Transactions on Internet Technology (TOIT)
null
10.1145/3418501
null
cs.DC math.OC
http://creativecommons.org/licenses/by-nc-sa/4.0/
Volunteer computing is an Internet-based distributed computing system in which volunteers share their extra available resources to manage large-scale tasks. However, computing devices in a Volunteer Computing System (VCS) are highly dynamic and heterogeneous in terms of their processing power, monetary cost, and data transferring latency. To ensure both the high Quality of Service (QoS) and low cost for different requests, all of the available computing resources must be used efficiently. Task scheduling is an NP-hard problem that is considered one of the main critical challenges in a heterogeneous VCS. Due to this, in this paper, we design two task scheduling algorithms for VCSs, named Min-CCV and Min-V. The main goal of the proposed algorithms is jointly minimizing the computation, communication and delay violation cost for the Internet of Things (IoT) requests. Our extensive simulation results show that proposed algorithms are able to allocate tasks to volunteer fog/cloud resources more efficiently than the state-of-the-art. Specifically, our algorithms improve the deadline satisfaction task rates by around 99.5% and decrease the total cost between 15 to 53% in comparison with the genetic-based algorithm.
[{'version': 'v1', 'created': 'Wed, 28 Apr 2021 18:58:51 GMT'}]
2021-04-30
[['Hoseiny', 'Farooq', ''], ['Azizi', 'Sadoon', ''], ['Shojafar', 'Mohammad', ''], ['Tafazolli', 'Rahim', '']]
2005.12540
Leopold Tremant
Philippe Chartier (MINGUS), Mohammed Lemou (IRMAR, MINGUS), L\'eopold Tr\'emant (MINGUS)
Uniformly accurate numerical schemes for a class of dissipative systems
null
null
null
null
math.AP cs.NA math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a class of relaxation problems mixing slow and fast variations which can describe population dynamics models or hyperbolic systems, with varying stiffness (from non-stiff to strongly dissipative), and develop a multi-scale method by decomposing this problem into a micro-macro system where the original stiffness is broken. We show that this new problem can therefore be simulated with a uniform order of accuracy using standard explicit numerical schemes. In other words, it is possible to solve the micro-macro problem with a cost independent of the stiffness (a.k.a. uniform cost), such that the error is also uniform. This method is successfully applied to two hyperbolic systems with and without non-linearities, and is shown to circumvent the phenomenon of order reduction.
[{'version': 'v1', 'created': 'Tue, 26 May 2020 06:48:57 GMT'}]
2020-05-27
[['Chartier', 'Philippe', '', 'MINGUS'], ['Lemou', 'Mohammed', '', 'IRMAR, MINGUS'], ['Trémant', 'Léopold', '', 'MINGUS']]
2204.05727
Hui Kong
Banghe Wu, Chengzhong Xu, Hui Kong
LiDAR Road-Atlas: An Efficient Map Representation for General 3D Urban Environment
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose the LiDAR Road-Atlas, a compactable and efficient 3D map representation, for autonomous robot or vehicle navigation in general urban environment. The LiDAR Road-Atlas can be generated by an online mapping framework based on incrementally merging local 2D occupancy grid maps (2D-OGM). Specifically, the contributions of our LiDAR Road-Atlas representation are threefold. First, we solve the challenging problem of creating local 2D-OGM in non-structured urban scenes based on a real-time delimitation of traversable and curb regions in LiDAR point cloud. Second, we achieve accurate 3D mapping in multiple-layer urban road scenarios by a probabilistic fusion scheme. Third, we achieve very efficient 3D map representation of general environment thanks to the automatic local-OGM induced traversable-region labeling and a sparse probabilistic local point-cloud encoding. Given the LiDAR Road-Atlas, one can achieve accurate vehicle localization, path planning and some other tasks. Our map representation is insensitive to dynamic objects which can be filtered out in the resulting map based on a probabilistic fusion. Empirically, we compare our map representation with a couple of popular map representation methods in robotics and autonomous driving societies, and our map representation is more favorable in terms of efficiency, scalability and compactness. In addition, we also evaluate localization accuracy extensively given the created LiDAR Road-Atlas representations on several public benchmark datasets. With a 16-channel LiDAR sensor, our method achieves an average global localization errors of 0.26m (translation) and 1.07 degrees (rotation) on the Apollo dataset, and 0.89m (translation) and 1.29 degrees (rotation) on the MulRan dataset, respectively, at 10Hz, which validates the promising performance of our map representation for autonomous driving.
[{'version': 'v1', 'created': 'Tue, 12 Apr 2022 11:46:09 GMT'}, {'version': 'v2', 'created': 'Mon, 13 Mar 2023 07:16:04 GMT'}]
2023-03-14
[['Wu', 'Banghe', ''], ['Xu', 'Chengzhong', ''], ['Kong', 'Hui', '']]
1906.05118
Faisal Khan
Faisal Shah Khan
Nash embedding: a road map to realizing quantum hardware
1 figure
Digitale Welt, Issue 1 2020 - Proceedings of the first International Symposium on Applied Artificial Intelligence, Munich, 2019
null
null
physics.gen-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The non-Euclidean nature of the mathematical model of quantum circuits leaves open the question of their practical implementation in hardware platforms which necessarily reside in the Euclidean space $\mathbb{R}^3$. On the other hand, reversible circuits are elements of Euclidean spaces, making their physical realization in hardware platforms possible and practical. Here, the quantum circuit model for quantum computing is mapped into that of reversible computing in a mathematically robust fashion using Nash embedding so that every quantum computation can be realized as an equivalent reversible one.
[{'version': 'v1', 'created': 'Sun, 9 Jun 2019 19:44:04 GMT'}, {'version': 'v2', 'created': 'Sat, 15 Jun 2019 18:20:58 GMT'}]
2019-11-25
[['Khan', 'Faisal Shah', '']]
1809.01587
Minsuk Kahng
Minsuk Kahng, Nikhil Thorat, Duen Horng Chau, Fernanda Vi\'egas, Martin Wattenberg
GAN Lab: Understanding Complex Deep Generative Models using Interactive Visual Experimentation
This paper will be published in the IEEE Transactions on Visualization and Computer Graphics, 25(1), January 2019, and presented at IEEE VAST 2018
null
10.1109/TVCG.2018.2864500
null
cs.HC cs.AI cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent success in deep learning has generated immense interest among practitioners and students, inspiring many to learn about this new technology. While visual and interactive approaches have been successfully developed to help people more easily learn deep learning, most existing tools focus on simpler models. In this work, we present GAN Lab, the first interactive visualization tool designed for non-experts to learn and experiment with Generative Adversarial Networks (GANs), a popular class of complex deep learning models. With GAN Lab, users can interactively train generative models and visualize the dynamic training process's intermediate results. GAN Lab tightly integrates an model overview graph that summarizes GAN's structure, and a layered distributions view that helps users interpret the interplay between submodels. GAN Lab introduces new interactive experimentation features for learning complex deep learning models, such as step-by-step training at multiple levels of abstraction for understanding intricate training dynamics. Implemented using TensorFlow.js, GAN Lab is accessible to anyone via modern web browsers, without the need for installation or specialized hardware, overcoming a major practical challenge in deploying interactive tools for deep learning.
[{'version': 'v1', 'created': 'Wed, 5 Sep 2018 15:51:50 GMT'}]
2018-09-06
[['Kahng', 'Minsuk', ''], ['Thorat', 'Nikhil', ''], ['Chau', 'Duen Horng', ''], ['Viégas', 'Fernanda', ''], ['Wattenberg', 'Martin', '']]
1801.05617
Gilles Jacobs
Cynthia Van Hee, Gilles Jacobs, Chris Emmery, Bart Desmet, Els Lefever, Ben Verhoeven, Guy De Pauw, Walter Daelemans and V\'eronique Hoste
Automatic Detection of Cyberbullying in Social Media Text
21 pages, 9 tables, under review
null
10.1371/journal.pone.0203794
null
cs.CL cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While social media offer great communication opportunities, they also increase the vulnerability of young people to threatening situations online. Recent studies report that cyberbullying constitutes a growing problem among youngsters. Successful prevention depends on the adequate detection of potentially harmful messages and the information overload on the Web requires intelligent systems to identify potential risks automatically. The focus of this paper is on automatic cyberbullying detection in social media text by modelling posts written by bullies, victims, and bystanders of online bullying. We describe the collection and fine-grained annotation of a training corpus for English and Dutch and perform a series of binary classification experiments to determine the feasibility of automatic cyberbullying detection. We make use of linear support vector machines exploiting a rich feature set and investigate which information sources contribute the most for this particular task. Experiments on a holdout test set reveal promising results for the detection of cyberbullying-related posts. After optimisation of the hyperparameters, the classifier yields an F1-score of 64% and 61% for English and Dutch respectively, and considerably outperforms baseline systems based on keywords and word unigrams.
[{'version': 'v1', 'created': 'Wed, 17 Jan 2018 10:38:20 GMT'}]
2020-03-03
[['Van Hee', 'Cynthia', ''], ['Jacobs', 'Gilles', ''], ['Emmery', 'Chris', ''], ['Desmet', 'Bart', ''], ['Lefever', 'Els', ''], ['Verhoeven', 'Ben', ''], ['De Pauw', 'Guy', ''], ['Daelemans', 'Walter', ''], ['Hoste', 'Véronique', '']]
2211.01209
Ryan Dougherty
Ryan E. Dougherty
An Asymptotically Optimal Bound for Covering Arrays of Higher Index
null
null
null
null
math.CO cs.DM
http://creativecommons.org/licenses/by/4.0/
A \emph{covering array} is an $N \times k$ array ($N$ rows, $k$ columns) with each entry from a $v$-ary alphabet, and for every $N\times t$ subarray, all $v^t$ tuples of size $t$ appear at least $\lambda$ times. The \emph{covering array number} is the smallest number $N$ for which such an array exists. For $\lambda = 1$, the covering array number is asymptotically logarithmic in $k$, when $v, t$ are fixed. Godbole, Skipper, and Sunley proved a bound of the form $\log k + \lambda \log \log k$ for the covering array number for arbitrary $\lambda$ and $v,t$ constant. The author proved a similar bound via a different technique, and conjectured that the $\log \log k$ term can be removed. In this short note we answer the conjecture in the affirmative with an asymptotically tight upper bound. In particular, we employ the probabilistic method in conjunction with the Lambert $W$ function.
[{'version': 'v1', 'created': 'Wed, 2 Nov 2022 15:39:17 GMT'}]
2022-11-03
[['Dougherty', 'Ryan E.', '']]
2007.08926
Gordon Plotkin
Martin Abadi and Gordon Plotkin
Smart Choices and the Selection Monad
Revision for LMCS publication
null
null
null
cs.LO cs.LG cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Describing systems in terms of choices and their resulting costs and rewards offers the promise of freeing algorithm designers and programmers from specifying how those choices should be made; in implementations, the choices can be realized by optimization techniques and, increasingly, by machine-learning methods. We study this approach from a programming-language perspective. We define two small languages that support decision-making abstractions: one with choices and rewards, and the other additionally with probabilities. We give both operational and denotational semantics. In the case of the second language we consider three denotational semantics, with varying degrees of correlation between possible program values and expected rewards. The operational semantics combine the usual semantics of standard constructs with optimization over spaces of possible execution strategies. The denotational semantics, which are compositional, rely on the selection monad, to handle choice, augmented with an auxiliary monad to handle other effects, such as rewards or probability. We establish adequacy theorems that the two semantics coincide in all cases. We also prove full abstraction at base types, with varying notions of observation in the probabilistic case corresponding to the various degrees of correlation. We present axioms for choice combined with rewards and probability, establishing completeness at base types for the case of rewards without probability.
[{'version': 'v1', 'created': 'Fri, 17 Jul 2020 12:13:16 GMT'}, {'version': 'v2', 'created': 'Tue, 27 Oct 2020 18:53:23 GMT'}, {'version': 'v3', 'created': 'Thu, 10 Dec 2020 18:33:28 GMT'}, {'version': 'v4', 'created': 'Thu, 11 Mar 2021 11:48:28 GMT'}, {'version': 'v5', 'created': 'Mon, 28 Jun 2021 02:11:21 GMT'}, {'version': 'v6', 'created': 'Tue, 17 Aug 2021 00:30:18 GMT'}, {'version': 'v7', 'created': 'Sat, 14 Jan 2023 04:01:39 GMT'}]
2023-01-18
[['Abadi', 'Martin', ''], ['Plotkin', 'Gordon', '']]
1810.04034
Hai Son Nguyen
S\'ebastien Cueff, Matthew Shao Ran Huang, Dongfang Li, X. Letartre, Rashid Zia, Pierre Viktorovitch, Hai Son Nguyen
Tailoring the Local Density of Optical States and directionality of light emission by symmetry-breaking
null
null
null
null
physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a method to simultaneously engineer the energy-momentum dispersion and the local density of optical states. Using vertical symmetry-breaking in high-contrast gratings, we enable the mixing of modes with different parities, thus producing hybridized modes with controlled dispersion. By tuning geometric parameters, we control the coupling between Bloch modes, leading to flatband, M- and W-shaped dispersion as well as Dirac dispersion. Such a platform opens up a new way to control the direction of emitted photons, and to enhance the spontaneous emission into desired modes. We then experimentally demonstrate that this method can be used to redirect light emission from weak emitters -- defects in Silicon -- to optical modes with adjustable density of states and angle of emission.
[{'version': 'v1', 'created': 'Mon, 8 Oct 2018 14:22:25 GMT'}]
2018-10-10
[['Cueff', 'Sébastien', ''], ['Huang', 'Matthew Shao Ran', ''], ['Li', 'Dongfang', ''], ['Letartre', 'X.', ''], ['Zia', 'Rashid', ''], ['Viktorovitch', 'Pierre', ''], ['Nguyen', 'Hai Son', '']]
1809.04981
Niklas Edberg
Niklas J. T. Edberg, M. Alho, M. Andr\'e, D. J. Andrews, E. Behar, J. L. Burch, C. M. Carr, E. Cupido, I. A. D. Engelhardt, A. I. Eriksson, K.-H. Glassmeier, C. Goetz, R. Goldstein, P. Henri, F. L. Johansson, C. Koenders, K. Mandt, H. Nilsson, E. Odelstad, I. Richter, C. Simon Wedlund, G. Stenberg Wieser, K. Szego, E. Vigren, and M. Volwerk
CME impact on comet 67P/Churyumov-Gerasimenko
14 pages, 12 figures
Monthly Notices of the Royal Astronomical Society, Volume 462, 2016
10.1093/mnras/stw2112
null
physics.space-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Rosetta observations from comet 67P/Churyumov-Gerasimenko during the impact of a coronal mass ejection (CME). The CME impacted on 5-6 Oct 2015, when Rosetta was about 800 km from the comet nucleus, \textcolor{black}{and 1.4 AU from the Sun}. Upon impact, the plasma environment is compressed to the level that solar wind ions, not seen a few days earlier when at 1500 km, now reach Rosetta. In response to the compression, the flux of suprathermal electrons increases by a factor of 5-10 and the background magnetic field strength increases by a factor of $\sim$2.5. The plasma density increases by a factor of 10 and reaches 600 cm$^{-3}$, due to increased particle impact ionisation, charge exchange and the adiabatic compression of the plasma environment. We also observe unprecedentedly large magnetic field spikes at 800 km, reaching above 200 nT, which are interpreted as magnetic flux ropes. We suggest that these could possibly be formed by magnetic reconnection processes in the coma as the magnetic field across the CME changes polarity, or as a consequence of strong shears causing Kelvin-Helmholtz instabilities in the plasma flow. Due to the \textcolor{black}{limited orbit of Rosetta}, we are not able to observe if a tail disconnection occurs during the CME impact, which could be expected based on previous remote observations of other CME-comet interactions.
[{'version': 'v1', 'created': 'Thu, 13 Sep 2018 14:20:46 GMT'}]
2018-09-14
[['Edberg', 'Niklas J. T.', ''], ['Alho', 'M.', ''], ['André', 'M.', ''], ['Andrews', 'D. J.', ''], ['Behar', 'E.', ''], ['Burch', 'J. L.', ''], ['Carr', 'C. M.', ''], ['Cupido', 'E.', ''], ['Engelhardt', 'I. A. D.', ''], ['Eriksson', 'A. I.', ''], ['Glassmeier', 'K. -H.', ''], ['Goetz', 'C.', ''], ['Goldstein', 'R.', ''], ['Henri', 'P.', ''], ['Johansson', 'F. L.', ''], ['Koenders', 'C.', ''], ['Mandt', 'K.', ''], ['Nilsson', 'H.', ''], ['Odelstad', 'E.', ''], ['Richter', 'I.', ''], ['Wedlund', 'C. Simon', ''], ['Wieser', 'G. Stenberg', ''], ['Szego', 'K.', ''], ['Vigren', 'E.', ''], ['Volwerk', 'M.', '']]
1506.03885
Dietmar Berwanger
Dietmar Berwanger and Marie van den Bogaard
Games with Delays. A Frankenstein Approach
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate infinite games on finite graphs where the information flow is perturbed by nondeterministic signalling delays. It is known that such perturbations make synthesis problems virtually unsolvable, in the general case. On the classical model where signals are attached to states, tractable cases are rare and difficult to identify. Here, we propose a model where signals are detached from control states, and we identify a subclass on which equilibrium outcomes can be preserved, even if signals are delivered with a delay that is finitely bounded. To offset the perturbation, our solution procedure combines responses from a collection of virtual plays following an equilibrium strategy in the instant- signalling game to synthesise, in a Frankenstein manner, an equivalent equilibrium strategy for the delayed-signalling game.
[{'version': 'v1', 'created': 'Fri, 12 Jun 2015 01:19:54 GMT'}]
2015-06-15
[['Berwanger', 'Dietmar', ''], ['Bogaard', 'Marie van den', '']]
2010.03022
Jie Ma
Jie Ma, Shuai Wang, Rishita Anubhai, Miguel Ballesteros, Yaser Al-Onaizan
Resource-Enhanced Neural Model for Event Argument Extraction
Findings of EMNLP 2020
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Event argument extraction (EAE) aims to identify the arguments of an event and classify the roles that those arguments play. Despite great efforts made in prior work, there remain many challenges: (1) Data scarcity. (2) Capturing the long-range dependency, specifically, the connection between an event trigger and a distant event argument. (3) Integrating event trigger information into candidate argument representation. For (1), we explore using unlabeled data in different ways. For (2), we propose to use a syntax-attending Transformer that can utilize dependency parses to guide the attention mechanism. For (3), we propose a trigger-aware sequence encoder with several types of trigger-dependent sequence representations. We also support argument extraction either from text annotated with gold entities or from plain text. Experiments on the English ACE2005 benchmark show that our approach achieves a new state-of-the-art.
[{'version': 'v1', 'created': 'Tue, 6 Oct 2020 21:00:54 GMT'}]
2020-10-08
[['Ma', 'Jie', ''], ['Wang', 'Shuai', ''], ['Anubhai', 'Rishita', ''], ['Ballesteros', 'Miguel', ''], ['Al-Onaizan', 'Yaser', '']]
2303.01595
Ellis Solaiman
Adrian Delchev and Ioannis Sfyrakis and Ellis Solaiman
Developing a Compiler for EROP -- A Language for the Specification of Smart Contracts, An Experience Report
null
null
null
null
cs.PL cs.DC cs.SE
http://creativecommons.org/licenses/by/4.0/
A smart contract is a translation of a standard paper-based contract that can be enforced and executed by a contract management system. At a high level of abstraction, a contract is only a document that describes how the signing parties are to behave in different scenarios; nevertheless, the translation of a typical paper-based contract to its electronic counterpart has proved to be both time-consuming and difficult. The requirement for a language capable of capturing the core of a contract in simple phrases and definitions has been a focus of study for many years. EROP (Events, Rights, Obligations, Prohibitions) is a contract specification language that breaks a contract down into sets of events, rights, obligations, and prohibitions.
[{'version': 'v1', 'created': 'Thu, 2 Mar 2023 21:35:25 GMT'}]
2023-03-06
[['Delchev', 'Adrian', ''], ['Sfyrakis', 'Ioannis', ''], ['Solaiman', 'Ellis', '']]
2106.01806
Dorcas Ofori-Boateng
Dorcas Ofori-Boateng, Ignacio Segovia Dominguez, Murat Kantarcioglu, Cuneyt G. Akcora, Yulia R. Gel
Topological Anomaly Detection in Dynamic Multilayer Blockchain Networks
26 pages, 6 figures, 7 tables
null
null
null
cs.CR math.AT stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the recent surge of criminal activities with cross-cryptocurrency trades, we introduce a new topological perspective to structural anomaly detection in dynamic multilayer networks. We postulate that anomalies in the underlying blockchain transaction graph that are composed of multiple layers are likely to also be manifested in anomalous patterns of the network shape properties. As such, we invoke the machinery of clique persistent homology on graphs to systematically and efficiently track evolution of the network shape and, as a result, to detect changes in the underlying network topology and geometry. We develop a new persistence summary for multilayer networks, called stacked persistence diagram, and prove its stability under input data perturbations. We validate our new topological anomaly detection framework in application to dynamic multilayer networks from the Ethereum Blockchain and the Ripple Credit Network, and demonstrate that our stacked PD approach substantially outperforms state-of-art techniques.
[{'version': 'v1', 'created': 'Thu, 3 Jun 2021 12:58:04 GMT'}, {'version': 'v2', 'created': 'Tue, 6 Jul 2021 18:05:13 GMT'}]
2021-07-08
[['Ofori-Boateng', 'Dorcas', ''], ['Dominguez', 'Ignacio Segovia', ''], ['Kantarcioglu', 'Murat', ''], ['Akcora', 'Cuneyt G.', ''], ['Gel', 'Yulia R.', '']]
1109.4347
Yohji Akama
Yohji Akama and Kei Irie
VC dimension of ellipsoids
null
null
null
null
math.CO cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We will establish that the VC dimension of the class of d-dimensional ellipsoids is (d^2+3d)/2, and that maximum likelihood estimate with N-component d-dimensional Gaussian mixture models induces a geometric class having VC dimension at least N(d^2+3d)/2. Keywords: VC dimension; finite dimensional ellipsoid; Gaussian mixture model
[{'version': 'v1', 'created': 'Tue, 20 Sep 2011 16:53:29 GMT'}]
2011-09-21
[['Akama', 'Yohji', ''], ['Irie', 'Kei', '']]
0807.4825
Thomas Heimburg
Andreas Blicher, Katarzyna Wodzinska, Matthias Fidorra, Mathias Winterhalter and Thomas Heimburg
The temperature dependence of lipid membrane permeability, its quantized nature, and the influence of anesthetics
12 pages, 6 figures
Biophys. J. 96 (2009), 4581-4591
10.1016/j.bpj.2009.01.062
null
physics.bio-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the permeability of lipid membranes for fluorescence dyes and ions. We find that permeability reaches a maximum close to the chain melting transition of the membranes. Close to transitions, fluctuations in area and compressibility are high, leading to an increased likelihood of spontaneous lipid pore formation. Fluorescence Correlation Spectroscopy (FCS) reveals the permeability for rhodamine dyes across 100 nm vesicles. Using FCS, we find that the permeability of vesicle membranes for fluorescence dyes is within error proportional to the excess heat capacity. To estimate defect size we measure the conductance of solvent-free planar lipid bilayer. Microscopically, we show that permeation events appear as quantized current events. Further, we demonstrate that anesthetics lead to a change in membrane permeability that can be predicted from their effect on heat capacity profiles. Depending on temperature, the permeability can be enhanced or reduced. We demonstrate that anesthetics decrease channel conductance and ultimately lead to 'blocking' of the lipid pores in experiments performed at or above the chain melting transition. Our data suggest that the macroscopic increase in permeability close to transitions and microscopic lipid channel formation are the same physical process.
[{'version': 'v1', 'created': 'Wed, 30 Jul 2008 18:15:16 GMT'}]
2009-06-09
[['Blicher', 'Andreas', ''], ['Wodzinska', 'Katarzyna', ''], ['Fidorra', 'Matthias', ''], ['Winterhalter', 'Mathias', ''], ['Heimburg', 'Thomas', '']]
0906.3683
Matteo Cherchi
Matteo Cherchi, Alberto Taormina, Alessandro C. Busacca, Roberto L. Oliveri, Saverio Bivona, Alfonso C. Cino, Salvatore Stivala, Stefano Riva Sanseverino, and Claudio Leone
Exploiting the optical quadratic nonlinearity of zincblende semiconductors for guided-wave terahertz generation: a material comparison
8 pages in two columns format, 6 figures, 2 Tables
IEEE J. Quantum Electron. 46, 368-376 (2010)
10.1109/JQE.2009.2033821
null
physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a detailed analysis and comparison of dielectric waveguides made of CdTe, GaP, GaAs and InP for modal phase matched optical difference frequency generation (DFG) in the terahertz domain. From the form of the DFG equations, we derived the definition of a very general figure of merit (FOM). In turn, this FOM enabled us to compare different configurations, by taking into account linear and nonlinear susceptibility dispersion, terahertz absorption, and a rigorous evaluation of the waveguide modes properties. The most efficient waveguides found with this procedure are predicted to approach the quantum efficiency limit with input optical power in the order of kWs.
[{'version': 'v1', 'created': 'Fri, 19 Jun 2009 14:40:57 GMT'}]
2010-03-26
[['Cherchi', 'Matteo', ''], ['Taormina', 'Alberto', ''], ['Busacca', 'Alessandro C.', ''], ['Oliveri', 'Roberto L.', ''], ['Bivona', 'Saverio', ''], ['Cino', 'Alfonso C.', ''], ['Stivala', 'Salvatore', ''], ['Sanseverino', 'Stefano Riva', ''], ['Leone', 'Claudio', '']]
1803.03797
Pawan Kumar
Sahithi Rampalli, Natasha Sehgal, Ishita Bindlish, Tanya Tyagi, and Pawan Kumar
Efficient FPGA Implementation of Conjugate Gradient Methods for Laplacian System using HLS
10 pages, 11 figures, 5 tables
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study FPGA based pipelined and superscalar design of two variants of conjugate gradient methods for solving Laplacian equation on a discrete grid; the first version corresponds to the original conjugate gradient algorithm, and the second version corresponds to a slightly modified version of the same. In conjugate gradient method to solve partial differential equations, matrix vector operations are required in each iteration; these operations can be implemented as 5 point stencil operations on the grid without explicitely constructing the matrix. We show that a pipelined and superscalar design using high level synthesis written in C language leads to a significant reduction in latencies for both methods. When comparing these two, we show that the later has roughly two times lower latency than the former given the same degree of superscalarity. These reductions in latencies for the newer variant of CG is due to parallel implementations of stencil operation on subdomains of the grid, and dut to overlap of these stencil operations with dot product operations. In a superscalar design, domain needs to be partitioned, and boundary data needs to be copied, which requires padding. In 1D partition, the padding latency increases as the number of partitions increase. For a streaming data flow model, we propose a novel traversal of the grid for 2D domain decomposition that leads to 2 times reduction in latency cost involved with padding compared to 1D partitions. Our implementation is roughly 10 times faster than software implementation for linear system of dimension $10000 \times 10000.$
[{'version': 'v1', 'created': 'Sat, 10 Mar 2018 12:05:35 GMT'}]
2018-03-13
[['Rampalli', 'Sahithi', ''], ['Sehgal', 'Natasha', ''], ['Bindlish', 'Ishita', ''], ['Tyagi', 'Tanya', ''], ['Kumar', 'Pawan', '']]
2303.05946
Kyle Hart
Kyle M. Hart (1 and 2), Brendan Englot (2), Ryan P. O'Shea (1), John D. Kelly (1), David Martinez (1) ((1) Naval Air Warfare Center Aircraft Division Lakehurst, (2) Stevens Institute of Technology)
Monocular Simultaneous Localization and Mapping using Ground Textures
7 pages, 9 figures. To appear at ICRA 2023, London, UK. Distribution Statement A: Approved for public release; distribution is unlimited, as submitted under NAVAIR Public Release Authorization 2022-0586. The views expressed here are those of the authors and do not reflect the official policy or position of the U.S. Navy, Department of Defense, or U.S. Government
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent work has shown impressive localization performance using only images of ground textures taken with a downward facing monocular camera. This provides a reliable navigation method that is robust to feature sparse environments and challenging lighting conditions. However, these localization methods require an existing map for comparison. Our work aims to relax the need for a map by introducing a full simultaneous localization and mapping (SLAM) system. By not requiring an existing map, setup times are minimized and the system is more robust to changing environments. This SLAM system uses a combination of several techniques to accomplish this. Image keypoints are identified and projected into the ground plane. These keypoints, visual bags of words, and several threshold parameters are then used to identify overlapping images and revisited areas. The system then uses robust M-estimators to estimate the transform between robot poses with overlapping images and revisited areas. These optimized estimates make up the map used for navigation. We show, through experimental data, that this system performs reliably on many ground textures, but not all.
[{'version': 'v1', 'created': 'Fri, 10 Mar 2023 14:27:31 GMT'}]
2023-03-13
[['Hart', 'Kyle M.', '', '1 and 2'], ['Englot', 'Brendan', ''], ["O'Shea", 'Ryan P.', ''], ['Kelly', 'John D.', ''], ['Martinez', 'David', '']]
2101.07517
Inga Abel
Inga Abel, Helmut Graeb
FUBOCO: Structure Synthesis of Basic Op-Amps by FUnctional BlOck COmposition
This work has been submitted to ACM for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
null
null
null
eess.SY cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a method to automatically synthesize the structure of an operational amplifier. It is positioned between approaches with fixed design plans and a small search space of structures and approaches with generic structural production rules and a large search space with technically impractical structures. The presented approach develops a hierarchical composition graph based on functional blocks that spans a search space of thousands of technically meaningful structure variants for single-output, fully-differential and complementary operational amplifiers. The search algorithm is a combined heuristic and enumerative process. The evaluation is based on circuit sizing with a library of behavioral equations of functional blocks. Formalizing the knowledge of functional blocks in op-amps for structural synthesis and sizing inherently reduces the search space and lessens the number of created topologies not fulfilling the specifications. Experimental results for the three op-amp classes are presented. An outlook how this method can be extended to multi-stage op-amps is given.
[{'version': 'v1', 'created': 'Tue, 19 Jan 2021 09:01:12 GMT'}, {'version': 'v2', 'created': 'Fri, 24 Sep 2021 11:15:22 GMT'}]
2021-09-27
[['Abel', 'Inga', ''], ['Graeb', 'Helmut', '']]
1406.3700
Bingkai Lin
Bingkai Lin
The Parameterized Complexity of k-Biclique
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a graph $G$ and a parameter $k$, the $k$-biclique problem asks whether $G$ contains a complete bipartite subgraph $K_{k,k}$. This is the most easily stated problem on graphs whose parameterized complexity is still unknown. We provide an fpt-reduction from $k$-clique to $k$-biclique, thus solving this longstanding open problem. Our reduction use a class of bipartite graphs with a threshold property of independent interest. More specifically, for positive integers $n$, $s$ and $t$, we consider a bipartite graph $G=(A\;\dot\cup\;B, E)$ such that $A$ can be partitioned into $A=V_1\;\dot\cup \;V_2\;\dot\cup\cdots\dot\cup\; V_n$ and for every $s$ distinct indices $i_1\cdots i_s$, there exist $v_{i_1}\in V_{i_1}\cdots v_{i_s}\in V_{i_s}$ such that $v_{i_1}\cdots v_{i_s}$ have at least $t+1$ common neighbors in $B$; on the other hand, every $s+1$ distinct vertices in $A$ have at most $t$ common neighbors in $B$. Using the Paley-type graphs and Weil's character sum theorem, we show that for $t=(s+1)!$ and $n$ large enough, such threshold bipartite graphs can be computed in $n^{O(1)}$. One corollary of our reduction is that there is no $f(k)\cdot n^{o(k)}$ time algorithm to decide whether a graph contains a subgraph isomorphic to $K_{k!,k!}$ unless the ETH(Exponential Time Hypothesis) fails. We also provide a probabilistic construction with better parameters $t=\Theta(s^2)$, which indicates that $k$-biclique has no $f(k)\cdot n^{o(\sqrt{k})}$-time algorithm unless 3-SAT with $m$ clauses can be solved in $2^{o(m)}$-time with high probability. Our result also implies the dichotomy classification of the parameterized complexity of cardinality constrain satisfaction problem and the inapproximability of maximum $k$-intersection problem.
[{'version': 'v1', 'created': 'Sat, 14 Jun 2014 08:20:39 GMT'}, {'version': 'v2', 'created': 'Sat, 1 Nov 2014 05:46:37 GMT'}, {'version': 'v3', 'created': 'Sat, 8 Jun 2019 02:09:26 GMT'}]
2019-06-11
[['Lin', 'Bingkai', '']]
1207.1427
Segev Wasserkrug
Segev Wasserkrug, Avigdor Gal, Opher Etzion
A Model for Reasoning with Uncertain Rules in Event Composition Systems
Appears in Proceedings of the Twenty-First Conference on Uncertainty in Artificial Intelligence (UAI2005)
null
null
UAI-P-2005-PG-599-608
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, there has been an increased need for the use of active systems - systems required to act automatically based on events, or changes in the environment. Such systems span many areas, from active databases to applications that drive the core business processes of today's enterprises. However, in many cases, the events to which the system must respond are not generated by monitoring tools, but must be inferred from other events based on complex temporal predicates. In addition, in many applications, such inference is inherently uncertain. In this paper, we introduce a formal framework for knowledge representation and reasoning enabling such event inference. Based on probability theory, we define the representation of the associated uncertainty. In addition, we formally define the probability space, and show how the relevant probabilities can be calculated by dynamically constructing a Bayesian network. To the best of our knowledge, this is the first work that enables taking such uncertainty into account in the context of active systems. herefore, our contribution is twofold: We formally define the representation and semantics of event composition for probabilistic settings, and show how to apply these extensions to the quantification of the occurrence probability of events. These results enable any active system to handle such uncertainty.
[{'version': 'v1', 'created': 'Wed, 4 Jul 2012 16:29:47 GMT'}]
2012-07-09
[['Wasserkrug', 'Segev', ''], ['Gal', 'Avigdor', ''], ['Etzion', 'Opher', '']]
2110.07391
Zongzheng Zhao
Zongzheng Zhao, Yixin Liu, Li Guo, Linquan Bai, and Chengshan Wang
Distribution Locational Marginal Pricing Under Uncertainty Considering Coordination of Distribution and Wholesale Markets
null
null
null
null
eess.SY cs.SY
http://creativecommons.org/licenses/by-nc-nd/4.0/
An effective distribution electricity market (DEM) is required to manage the rapidly growing small-scale distributed energy resources (DERs) in distribution systems (DSs). This paper proposes a day-ahead DEM clearing and pricing mechanism to account for the uncertainty of DERs and the coordination with the wholesale electricity market (WEM) through a bi-level model. The upper-level model clears the WEM in the transmission system (TS) and forms the locational marginal price (LMP) and uncertainty LMP (ULMP) for energy and uncertainty/reserve, respectively. In the lower level, a robust scheduling model considering WEM-DEM coordination and uncertainties is proposed to clear the DEM. Accordingly, the distribution LMPs (DLMPs) for active power, reactive power and uncertainty/reserve are derived to reward the energy/reserve provision and charge uncertain resources in the DEM, which provide effective price signals for managing not only the voltage and congestion, but also the uncertainty in DSs. A heterogeneous decomposition (HGD) algorithm is utilized to solve the bi-level model in a decentralized manner with limited information interaction between TS and DSs, which guarantees the solution efficiency and information privacy. The effectiveness of the proposed method is verified via numerous case studies.
[{'version': 'v1', 'created': 'Thu, 14 Oct 2021 14:27:23 GMT'}]
2021-10-15
[['Zhao', 'Zongzheng', ''], ['Liu', 'Yixin', ''], ['Guo', 'Li', ''], ['Bai', 'Linquan', ''], ['Wang', 'Chengshan', '']]
1906.02944
Han-Jia Ye
Han-Jia Ye, Hexiang Hu, De-Chuan Zhan
Learning Adaptive Classifiers Synthesis for Generalized Few-Shot Learning
Accepted by IJCV; The code is available at https://github.com/Sha-Lab/aCASTLE
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object recognition in the real-world requires handling long-tailed or even open-ended data. An ideal visual system needs to recognize the populated head visual concepts reliably and meanwhile efficiently learn about emerging new tail categories with a few training instances. Class-balanced many-shot learning and few-shot learning tackle one side of this problem, by either learning strong classifiers for head or learning to learn few-shot classifiers for the tail. In this paper, we investigate the problem of generalized few-shot learning (GFSL) -- a model during the deployment is required to learn about tail categories with few shots and simultaneously classify the head classes. We propose the ClAssifier SynThesis LEarning (CASTLE), a learning framework that learns how to synthesize calibrated few-shot classifiers in addition to the multi-class classifiers of head classes with a shared neural dictionary, shedding light upon the inductive GFSL. Furthermore, we propose an adaptive version of CASTLE (ACASTLE) that adapts the head classifiers conditioned on the incoming tail training examples, yielding a framework that allows effective backward knowledge transfer. As a consequence, ACASTLE can handle GFSL with classes from heterogeneous domains effectively. CASTLE and ACASTLE demonstrate superior performances than existing GFSL algorithms and strong baselines on MiniImageNet as well as TieredImageNet datasets. More interestingly, they outperform previous state-of-the-art methods when evaluated with standard few-shot learning criteria.
[{'version': 'v1', 'created': 'Fri, 7 Jun 2019 08:07:05 GMT'}, {'version': 'v2', 'created': 'Sat, 28 Sep 2019 06:27:48 GMT'}, {'version': 'v3', 'created': 'Sun, 29 Dec 2019 02:39:02 GMT'}, {'version': 'v4', 'created': 'Wed, 28 Oct 2020 04:34:30 GMT'}, {'version': 'v5', 'created': 'Sun, 27 Jun 2021 02:17:15 GMT'}]
2021-06-29
[['Ye', 'Han-Jia', ''], ['Hu', 'Hexiang', ''], ['Zhan', 'De-Chuan', '']]
1812.01801
Ryota Yamanaka
Shota Matsumoto, Ryota Yamanaka, Hirokazu Chiba
Mapping RDF Graphs to Property Graphs
4 pages, 4 figures
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Increasing amounts of scientific and social data are published in the Resource Description Framework (RDF). Although the RDF data can be queried using the SPARQL language, even the SPARQL-based operation has a limitation in implementing traversal or analytical algorithms. Recently, a variety of graph database implementations dedicated to analyses on the property graph model have emerged. However, the RDF model and the property graph model are not interoperable. Here, we developed a framework based on the Graph to Graph Mapping Language (G2GML) for mapping RDF graphs to property graphs to make the most of accumulated RDF data. Using this framework, graph data described in the RDF model can be converted to the property graph model and can be loaded to several graph database engines for further analysis. Future works include implementing and utilizing graph algorithms to make the most of the accumulated data in various analytical engines.
[{'version': 'v1', 'created': 'Wed, 5 Dec 2018 03:22:37 GMT'}]
2018-12-06
[['Matsumoto', 'Shota', ''], ['Yamanaka', 'Ryota', ''], ['Chiba', 'Hirokazu', '']]
1312.1993
Marcell Stippinger
Marcell Stippinger and J\'anos Kert\'esz
Enhancing resilience of interdependent networks by healing
6 pages, 6 figures. Acknowledgements: This work was partially supported by the European Union and the European Social Fund through project FuturICT.hu (Grant No.: TAMOP-4.2.2.C-11/1/KONV-2012-0013). JK thanks MULTIPLEX, Grant No. 317532. Thanks are due to \'Eva R\'acz for her help at the early stage of this work and to Michael Danziger for a critical reading of the manuscript
null
10.1016/j.physa.2014.08.069
null
physics.soc-ph cond-mat.stat-mech cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interdependent networks are characterized by two kinds of interactions: The usual connectivity links within each network and the dependency links coupling nodes of different networks. Due to the latter links such networks are known to suffer from cascading failures and catastrophic breakdowns. When modeling these phenomena, usually one assumes that a fraction of nodes gets damaged in one of the networks, which is followed possibly by a cascade of failures. In real life the initiating failures do not occur at once and effort is made replace the ties eliminated due to the failing nodes. Here we study a dynamic extension of the model of interdependent networks and introduce the possibility of link formation with a probability w, called healing, to bridge non-functioning nodes and enhance network resilience. A single random node is removed, which may initiate an avalanche. After each removal step healing sets in resulting in a new topology. Then a new node fails and the process continues until the giant component disappears either in a catastrophic breakdown or in a smooth transition. Simulation results are presented for square lattices as starting networks under random attacks of constant intensity. We find that the shift in the position of the breakdown has a power-law scaling as a function of the healing probability with an exponent close to 1. Below a critical healing probability, catastrophic cascades form and the average degree of surviving nodes decreases monotonically, while above this value there are no macroscopic cascades and the average degree has first an increasing character and decreases only at the very late stage of the process. These findings facilitate to plan intervention in case of crisis situation by describing the efficiency of healing efforts needed to suppress cascading failures.
[{'version': 'v1', 'created': 'Fri, 6 Dec 2013 20:37:41 GMT'}, {'version': 'v2', 'created': 'Tue, 4 Mar 2014 21:19:47 GMT'}, {'version': 'v3', 'created': 'Fri, 6 Jun 2014 10:09:02 GMT'}, {'version': 'v4', 'created': 'Thu, 4 Sep 2014 21:13:51 GMT'}]
2015-06-18
[['Stippinger', 'Marcell', ''], ['Kertész', 'János', '']]
1512.05867
Shuai Dong
Shuang Zhou, Yakui Weng, Zhangting Wu, Jinlong Wang, Lingzhi Wu, Zhenhua Ni, Qingyu Xu, Shuai Dong
Strong room-temperature blue-violet photoluminescence of multiferroic BaMnF$_4$
13 pages, 4 figures, 1 table
Physical Chemistry Chemical Physics 18, 2054-2058 (2016)
10.1039/C5CP05864C
null
cond-mat.mtrl-sci cond-mat.str-el physics.chem-ph physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
BaMnF$_4$ microsheets have been prepared by hydrothermal method. Strong room-temperature blue-violet photoluminescence has been observed (absolute luminescence quantum yield 67%), with two peaks located at 385 nm and 410 nm, respectively. More interestingly, photon self-absorption phenomenon has been observed, leading to unusual abrupt drop of luminescence intensity at wavelength of 400 nm. To understand the underlying mechanism of such emitting, the electronic structure of BaMnF$_4$ has been studied by first principles calculations. The observed two peaks are attributed to electrons' transitions between the upper-Hubbard bands of Mn's $t_{2g}$ orbitals and the lower-Hubbard bands of Mn's $e_g$ orbitals. Those Mott gap mediated d-d orbital transitions may provide additional degrees of freedom to tune the photon generation and absorption in ferroelectrics.
[{'version': 'v1', 'created': 'Fri, 18 Dec 2015 07:47:37 GMT'}]
2016-01-20
[['Zhou', 'Shuang', ''], ['Weng', 'Yakui', ''], ['Wu', 'Zhangting', ''], ['Wang', 'Jinlong', ''], ['Wu', 'Lingzhi', ''], ['Ni', 'Zhenhua', ''], ['Xu', 'Qingyu', ''], ['Dong', 'Shuai', '']]
1710.02468
Micha{\l} Lesiuk
Justyna G. Balcerzak, Micha{\l} Lesiuk, Robert Moszynski
Calculation of Araki-Sucher correction for many-electron systems
submitted to Phys. Rev. A
Phys. Rev. A 96, 052510 (2017)
10.1103/PhysRevA.96.052510
null
physics.chem-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the evaluation of the Araki-Sucher correction for arbitrary many-electron atomic and molecular systems. This contribution appears in the leading order quantum electrodynamics corrections to the energy of a bound state. The conventional one-electron basis set of Gaussian-type orbitals (GTOs) is adopted; this leads to two-electron matrix elements which are evaluated with help of generalised the McMurchie-Davidson scheme. We also consider the convergence of the results towards the complete basis set. A rigorous analytic result for the convergence rate is obtained and verified by comparing with independent numerical values for the helium atom. Finally, we present a selection of numerical examples and compare our results with the available reference data for small systems. In contrast with other methods used for the evaluation of the Araki-Sucher correction, our method is not restricted to few-electron atoms or molecules. This is illustrated by calculations for several many-electron atoms and molecules.
[{'version': 'v1', 'created': 'Fri, 6 Oct 2017 15:59:57 GMT'}, {'version': 'v2', 'created': 'Fri, 10 Nov 2017 16:36:38 GMT'}]
2017-12-06
[['Balcerzak', 'Justyna G.', ''], ['Lesiuk', 'Michał', ''], ['Moszynski', 'Robert', '']]
1410.5642
Hartmut Grote
Hartmut Grote
On the possibility of Vacuum-QED measurements with gravitational wave detectors
11 pages, 10 figures
Phys. Rev. D 91, 022002 (2015)
10.1103/PhysRevD.91.022002
null
physics.ins-det quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum electro dynamics (QED) comprises virtual particle production and thus gives rise to a refractive index of the vacuum larger than unity in the presence of a magnetic field. This predicted effect has not been measured to date, even after considerable effort of a number of experiments. It has been proposed by other authors to possibly use gravitational wave detectors for such vacuum QED measurements, and we give this proposal some new consideration in this paper. In particular we look at possible source field magnet designs and further constraints on the implementation at a gravitational wave detector. We conclude that such an experiment seems to be feasible with permanent magnets, yet still challenging in its implementation.
[{'version': 'v1', 'created': 'Tue, 21 Oct 2014 12:54:44 GMT'}, {'version': 'v2', 'created': 'Wed, 29 Oct 2014 15:31:40 GMT'}, {'version': 'v3', 'created': 'Fri, 31 Oct 2014 11:55:57 GMT'}, {'version': 'v4', 'created': 'Thu, 27 Nov 2014 11:38:53 GMT'}, {'version': 'v5', 'created': 'Mon, 15 Dec 2014 13:33:57 GMT'}]
2015-01-14
[['Grote', 'Hartmut', '']]
1302.4384
Jean-Philippe Cointet
Michel Zitt and Jean-Philippe Cointet
Citation impacts revisited: how novel impact measures reflect interdisciplinarity and structural change at the local and global level
submitted to ISSI 2013, Vienna
null
null
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Citation networks have fed numerous works in scientific evaluation, science mapping (and more recently large-scale network studies) for decades. The variety of citation behavior across scientific fields is both a research topic in sociology of science, and a problem in scientific evaluation. Normalization, tantamount to a particular weighting of links in the citation network, is necessary for allowing across-field comparisons of citation scores and interdisciplinary studies. In addition to classical normalization which drastically reduces all variability factors altogether, two tracks of research have emerged in the recent years. One is the revival of iterative "influence measures". The second is the "citing-side" normalization, whose only purpose is to control for the main factor of variability, the inequality in citing propensity, letting other aspects play: knowledge export/imports and growth. When all variables are defined at the same field-level, two propositions are established: (a) the gross impact measure identifies with the product of relative growth rate, gross balance of citation exchanges, and relative number of references (b) the normalized impact identifies with the product of relative growth rate and normalized balance. At the science level, the variance of growth rate over domains is a proxy for change in the system, and the variance of balance a measure of inter-disciplinary dependences. This opens a new perspective, where the resulting variance of normalized impact, and a related measure, the sum of these variances proposed as a Change-Exchange Indicator, summarize important aspects of science structure and dynamism. Results based on a decade's data are discussed. The behavior of normalized impact according to scale changes is also briefly discussed.
[{'version': 'v1', 'created': 'Mon, 18 Feb 2013 18:40:03 GMT'}, {'version': 'v2', 'created': 'Tue, 19 Feb 2013 09:26:42 GMT'}]
2013-02-20
[['Zitt', 'Michel', ''], ['Cointet', 'Jean-Philippe', '']]
2010.14484
Saurabh Kumar
Saurabh Kumar, Aviral Kumar, Sergey Levine, Chelsea Finn
One Solution is Not All You Need: Few-Shot Extrapolation via Structured MaxEnt RL
Accepted at NeurIPS 2020
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While reinforcement learning algorithms can learn effective policies for complex tasks, these policies are often brittle to even minor task variations, especially when variations are not explicitly provided during training. One natural approach to this problem is to train agents with manually specified variation in the training task or environment. However, this may be infeasible in practical situations, either because making perturbations is not possible, or because it is unclear how to choose suitable perturbation strategies without sacrificing performance. The key insight of this work is that learning diverse behaviors for accomplishing a task can directly lead to behavior that generalizes to varying environments, without needing to perform explicit perturbations during training. By identifying multiple solutions for the task in a single environment during training, our approach can generalize to new situations by abandoning solutions that are no longer effective and adopting those that are. We theoretically characterize a robustness set of environments that arises from our algorithm and empirically find that our diversity-driven approach can extrapolate to various changes in the environment and task.
[{'version': 'v1', 'created': 'Tue, 27 Oct 2020 17:41:57 GMT'}, {'version': 'v2', 'created': 'Mon, 7 Dec 2020 22:33:16 GMT'}]
2020-12-09
[['Kumar', 'Saurabh', ''], ['Kumar', 'Aviral', ''], ['Levine', 'Sergey', ''], ['Finn', 'Chelsea', '']]
1409.1726
Monika Cerin\v{s}ek
Monika Cerin\v{s}ek and Vladimir Batagelj
Network analysis of Zentralblatt MATH data
25 pages, 10 figures, 13 tables
Scientometrics Volume: 102 Issue: 1 Pages: 977-1001 (2015)
null
null
cs.SI cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze the data about works (papers, books) from the time period 1990-2010 that are collected in Zentralblatt MATH database. The data were converted into four 2-mode networks (works $\times$ authors, works $\times$ journals, works $\times$ keywords and works $\times$ MSCs) and into a partition of works by publication year. The networks were analyzed using Pajek -- a program for analysis and visualization of large networks. We explore the distributions of some properties of works and the collaborations among mathematicians. We also take a closer look at the characteristics of the field of graph theory as were realized with the publications.
[{'version': 'v1', 'created': 'Fri, 5 Sep 2014 10:19:51 GMT'}]
2016-03-30
[['Cerinšek', 'Monika', ''], ['Batagelj', 'Vladimir', '']]
0810.0623
Bo Yan
Bo Yan, Yisheng Ma, Yuzhu Wang
Atomic Frequency standards Based on Pulsed Coherent Light Storage
6 pages, 5 figures
null
10.1103/PhysRevA.79.063820
null
physics.atom-ph physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new scheme of microwave frequency standards based on pulsed coherent optical information storage. Unlike the usual frequency reference where the Ramsey fringe is printed on the population of a certain state, we print the Ramsey fringe on the coherence. Then the coherence is detected in the form of a retrieval light. The central line of the Ramsey fringe can be used as a frequency reference in an absorption-cell-based atomic frequency standard. This scheme is free of light shifts as the interrogating process is separated from the optical pumping processes, and the cavity pulling effect is negligible due to the low Q requirement. Encoding the Ramsey interference into the retrieval light pulse has the merit of high signal to noise ratio and the estimated frequency stability of shot noise limit is about $2\times10^{-14}$ in 1 second, this scheme is promising for building small, compact and stable atomic frequency standards.
[{'version': 'v1', 'created': 'Fri, 3 Oct 2008 12:10:11 GMT'}]
2013-10-28
[['Yan', 'Bo', ''], ['Ma', 'Yisheng', ''], ['Wang', 'Yuzhu', '']]
1904.13205
Zhujun Zhang
Zhujun Zhang
A Note on Computational Complexity of Dou Shou Qi
11 pages, 11 figures. arXiv admin note: text overlap with arXiv:1904.00200
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dou Shou Qi is a Chinese strategy board game for two players. We use a EXPTIME-hardness framework to analyse computational complexity of the game. We construct all gadgets of the hardness framework. In conclusion, we prove that Dou Shou Qi is EXPTIME-complete.
[{'version': 'v1', 'created': 'Sat, 27 Apr 2019 07:25:14 GMT'}]
2019-05-01
[['Zhang', 'Zhujun', '']]
2211.07708
Meziane Privat
Meziane Privat (CPHT)
Infinite horizon for symetric strategy population game
null
null
null
null
cs.GT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To predict the behavior of a population game when time becomes very long, the process that characterizes the evolution of our game dynamics must be reversible. Known games satisfying this are 2 strategy games as well as potential games with an exponential protocol. We will try to extend the study of infinite horizons for what are called symetric strategy games.
[{'version': 'v1', 'created': 'Mon, 14 Nov 2022 19:38:34 GMT'}, {'version': 'v2', 'created': 'Fri, 6 Jan 2023 14:03:18 GMT'}]
2023-01-09
[['Privat', 'Meziane', '', 'CPHT']]
2106.06536
Firas Jarboui
Firas Jarboui, Vianney Perchet
Unsupervised Neural Hidden Markov Models with a Continuous latent state space
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new procedure to neuralize unsupervised Hidden Markov Models in the continuous case. This provides higher flexibility to solve problems with underlying latent variables. This approach is evaluated on both synthetic and real data. On top of generating likely model parameters with comparable performances to off-the-shelf neural architecture (LSTMs, GRUs,..), the obtained results are easily interpretable.
[{'version': 'v1', 'created': 'Thu, 10 Jun 2021 11:53:38 GMT'}]
2021-06-14
[['Jarboui', 'Firas', ''], ['Perchet', 'Vianney', '']]
1711.03880
Sebastian Eckart
S. Eckart, M. Kunitski, I. Ivanov, M. Richter, K. Fehre, A. Hartung, J. Rist, K. Henrichs, D. Trabert, N. Schlott, L. Ph. H. Schmidt, T. Jahnke, M. S. Sch\"offler, A. Kheifets, R. D\"orner
Sub-Cycle Interference upon Tunnel-Ionization by Counterrotating Two-Color Fields
5 pages, 4 figures, PRA Rapid Communications accepted
Phys. Rev. A 97, 041402 (2018)
10.1103/PhysRevA.97.041402
null
physics.atom-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report on three-dimensional (3D) electron momentum distributions from single ionization of helium by a laser pulse consisting of two counterrotating circularly polarized fields (390 nm and 780 nm). A pronounced 3D low energy structure and sub-cycle interferences are observed experimentally and reproduced numerically using a trajectory based semi-classical simulation. The orientation of the low energy structure in the polarization plane is verified by numerical simulations solving the time dependent Schr\"odinger equation.
[{'version': 'v1', 'created': 'Fri, 10 Nov 2017 15:33:55 GMT'}, {'version': 'v2', 'created': 'Fri, 23 Mar 2018 17:07:34 GMT'}]
2018-04-18
[['Eckart', 'S.', ''], ['Kunitski', 'M.', ''], ['Ivanov', 'I.', ''], ['Richter', 'M.', ''], ['Fehre', 'K.', ''], ['Hartung', 'A.', ''], ['Rist', 'J.', ''], ['Henrichs', 'K.', ''], ['Trabert', 'D.', ''], ['Schlott', 'N.', ''], ['Schmidt', 'L. Ph. H.', ''], ['Jahnke', 'T.', ''], ['Schöffler', 'M. S.', ''], ['Kheifets', 'A.', ''], ['Dörner', 'R.', '']]
physics/0002020
Tomomi Ohgaki
T.Ohgaki
Simulation of Laser-Compton Cooling of Electron Beams
11 pages, 12 figures, Given at 3nd International Workshop on Electron-Electron Interactions at TeV Energies, Dec 10-12, Santa Cruz, California, 1999
Int.J.Mod.Phys.A15:2587-2598,2000
10.1142/S0217751X00002664
LBNL-44993
physics.acc-ph
null
We study a method of laser-Compton cooling of electron beams. Using a Monte Carlo code, we evaluate the effects of the laser-electron interaction for transverse cooling. The optics with and without chromatic correction for the cooling are examined. The laser-Compton cooling for JLC/NLC at E_0=2 GeV is considered.
[{'version': 'v1', 'created': 'Wed, 9 Feb 2000 23:59:58 GMT'}, {'version': 'v2', 'created': 'Thu, 10 Feb 2000 05:01:18 GMT'}]
2015-06-26
[['Ohgaki', 'T.', '']]
2009.09677
Jesus L. Lobo
Jesus L. Lobo, Javier Del Ser, Eneko Osaba, Albert Bifet, Francisco Herrera
CURIE: A Cellular Automaton for Concept Drift Detection
null
null
null
null
cs.LG stat.ML
http://creativecommons.org/licenses/by-sa/4.0/
Data stream mining extracts information from large quantities of data flowing fast and continuously (data streams). They are usually affected by changes in the data distribution, giving rise to a phenomenon referred to as concept drift. Thus, learning models must detect and adapt to such changes, so as to exhibit a good predictive performance after a drift has occurred. In this regard, the development of effective drift detection algorithms becomes a key factor in data stream mining. In this work we propose CU RIE, a drift detector relying on cellular automata. Specifically, in CU RIE the distribution of the data stream is represented in the grid of a cellular automata, whose neighborhood rule can then be utilized to detect possible distribution changes over the stream. Computer simulations are presented and discussed to show that CU RIE, when hybridized with other base learners, renders a competitive behavior in terms of detection metrics and classification accuracy. CU RIE is compared with well-established drift detectors over synthetic datasets with varying drift characteristics.
[{'version': 'v1', 'created': 'Mon, 21 Sep 2020 08:28:21 GMT'}]
2020-09-22
[['Lobo', 'Jesus L.', ''], ['Del Ser', 'Javier', ''], ['Osaba', 'Eneko', ''], ['Bifet', 'Albert', ''], ['Herrera', 'Francisco', '']]
2206.13929
David Messerschmitt
David Messerschmitt, Philip Lubin, Ian Morrison
Optimal mass and speed for interstellar flyby with directed-energy propulsion
null
null
null
null
astro-ph.IM physics.space-ph
http://creativecommons.org/licenses/by-nc-nd/4.0/
The design of mission scenarios for the flyby investigation of nearby star systems by probes launched using directed energy is addressed. Multiple probes are launched with a fixed launch infrastructure, and download of scientific data occurs following target encounter and data collection. Assuming the primary goal is to reliably recover a larger volume of collected scientific data with a smaller data latency (elapsed time from launch to complete recovery of the data), it is shown that there is an efficient frontier where volume cannot be increased for a given latency and latency cannot be reduced for a given volume. For each probe launch, increasing the volume along this frontier is achieved by increasing the probe mass, which results in a reduced probe speed. Thus choosing the highest feasible probe speed generally does not achieve an efficient tradeoff of volume and latency. Along this frontier the total distance traveled to the completion of data download does not vary significantly, implying that the download time duration is approximately a fixed fraction of the launch-to-target transit time. Due to longer propulsion duration when probe mass is increased, increasing data volume incurs a cost in the total launch energy expended, but with favorable economies of scale. An important characteristic of any probe technology is the scaling law that relates probe mass to transmit data rate, as this affects details of the efficient frontier.
[{'version': 'v1', 'created': 'Mon, 27 Jun 2022 17:55:17 GMT'}]
2022-06-29
[['Messerschmitt', 'David', ''], ['Lubin', 'Philip', ''], ['Morrison', 'Ian', '']]
2111.03120
Peru Bhardwaj
Peru Bhardwaj, John Kelleher, Luca Costabello and Declan O'Sullivan
Adversarial Attacks on Knowledge Graph Embeddings via Instance Attribution Methods
2021 Conference on Empirical Methods in Natural Language Processing (EMNLP 2021)
null
null
null
cs.LG cs.AI cs.CL cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite the widespread use of Knowledge Graph Embeddings (KGE), little is known about the security vulnerabilities that might disrupt their intended behaviour. We study data poisoning attacks against KGE models for link prediction. These attacks craft adversarial additions or deletions at training time to cause model failure at test time. To select adversarial deletions, we propose to use the model-agnostic instance attribution methods from Interpretable Machine Learning, which identify the training instances that are most influential to a neural model's predictions on test instances. We use these influential triples as adversarial deletions. We further propose a heuristic method to replace one of the two entities in each influential triple to generate adversarial additions. Our experiments show that the proposed strategies outperform the state-of-art data poisoning attacks on KGE models and improve the MRR degradation due to the attacks by up to 62% over the baselines.
[{'version': 'v1', 'created': 'Thu, 4 Nov 2021 19:38:48 GMT'}]
2021-11-08
[['Bhardwaj', 'Peru', ''], ['Kelleher', 'John', ''], ['Costabello', 'Luca', ''], ["O'Sullivan", 'Declan', '']]
1312.4076
Rodrigo Lopez-Pablos
Rodrigo Lopez-Pablos (Universidad Nacional de La Matanza y Universidad Tecnol\'ogica Nacional)
Elementos de ingenier\'ia de explotaci\'on de la informaci\'on: r\'eplica y algunos trazos sobre teor\'ia inform\'atica
4 pages, 1 figure, written in castilian, Anales de la AAEP, ISSN 1852-0022
Asoc.Arg.Econ.Polit. XLVIII RA (2013): 1-4
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
A reply to the commentaries of Yana (2013), and some jots on information theory.
[{'version': 'v1', 'created': 'Sat, 14 Dec 2013 18:18:20 GMT'}]
2013-12-17
[['Lopez-Pablos', 'Rodrigo', '', 'Universidad Nacional de La Matanza y Universidad\n Tecnológica Nacional']]
2010.13607
Fabian Hofmann
Fabian Hofmann
Tracing prices: A flow-based cost allocation for optimized power systems
12 pages (+8 pages appendix), 18 figures
null
null
null
physics.soc-ph
http://creativecommons.org/licenses/by/4.0/
Power system models are a valuable and widely used tool to determine cost-minimal future operation and investment under political or ecological boundary conditions. Yet they are silent about the allocation of costs of single assets, as generators or transmission lines, to consumers in the network. Existing cost-allocation methods hardly suit large networks and do not take all relevant costs into account. This paper bridges this gap. Based on flow tracing, it introduces a peer-to-peer or more precisely an asset-to-consumer allocation of all costs in an optimized power system. The resulting cost allocation is both locally constrained and aligned with locational marginal prices in the optimum. The approach is applied and discussed using a future German scenario.
[{'version': 'v1', 'created': 'Mon, 26 Oct 2020 14:25:20 GMT'}]
2020-10-27
[['Hofmann', 'Fabian', '']]
1909.01837
Siddhartha Datta
Siddhartha Datta
DeepObfusCode: Source Code Obfuscation Through Sequence-to-Sequence Networks
Accepted in Advances in Intelligent Systems and Computing 2021 & Computing Conference 2021
null
null
null
cs.CR cs.LG cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper explores a novel methodology in source code obfuscation through the application of text-based recurrent neural network (RNN) encoder-decoder models in ciphertext generation and key generation. Sequence-to-sequence models are incorporated into the model architecture to generate obfuscated code, generate the deobfuscation key, and live execution. Quantitative benchmark comparison to existing obfuscation methods indicate significant improvement in stealth and execution cost for the proposed solution, and experiments regarding the model's properties yield positive results regarding its character variation, dissimilarity to the original codebase, and consistent length of obfuscated code.
[{'version': 'v1', 'created': 'Tue, 3 Sep 2019 17:22:39 GMT'}, {'version': 'v2', 'created': 'Wed, 29 Jan 2020 18:01:16 GMT'}, {'version': 'v3', 'created': 'Thu, 25 Feb 2021 11:30:06 GMT'}]
2021-02-26
[['Datta', 'Siddhartha', '']]
2007.00857
Meilin Gao
Meilin Gao, Bo Ai, Yong Niu, Wen Wu, Peng Yang, Feng Lyu, Xuemin (Sherman) Shen
Efficient Hybrid Beamforming with Anti-Blockage Design for High-Speed Railway Communications
11 Pages, 9 Figures
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020
10.1109/TVT.2020.3000757
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Future railway is expected to accommodate both train operation services and passenger broadband services. The millimeter wave (mmWave) communication is a promising technology in providing multi-gigabit data rates to onboard users. However, mmWave communications suffer from severe propagation attenuation and vulnerability to blockage, which can be very challenging in high-speed railway (HSR) scenarios. In this paper, we investigate efficient hybrid beamforming (HBF) design for train-to-ground communications. First, we develop a two-stage HBF algorithm in blockage-free scenarios. In the first stage, the minimum mean square error method is adopted for optimal hybrid beamformer design with low complexity and fast convergence; in the second stage, the orthogonal matching pursuit method is utilized to approximately recover the analog and digital beamformers. Second, in blocked scenarios, we design an anti-blockage scheme by adaptively invoking the proposed HBF algorithm, which can efficiently deal with random blockages. Extensive simulation results are presented to show the sum rate performance of the proposed algorithms under various configurations, including transmission power, velocity of the train, blockage probability, etc. It is demonstrated that the proposed anti-blockage algorithm can improve the effective rate by 20% in severely-blocked scenarios while maintaining low outage probability.
[{'version': 'v1', 'created': 'Thu, 2 Jul 2020 03:44:37 GMT'}]
2020-07-03
[['Gao', 'Meilin', '', 'Sherman'], ['Ai', 'Bo', '', 'Sherman'], ['Niu', 'Yong', '', 'Sherman'], ['Wu', 'Wen', '', 'Sherman'], ['Yang', 'Peng', '', 'Sherman'], ['Lyu', 'Feng', '', 'Sherman'], ['Xuemin', '', '', 'Sherman'], ['Shen', '', '']]
2207.10506
Aline Sindel
Aline Sindel, Bettina Hohberger, Andreas Maier, Vincent Christlein
Multi-modal Retinal Image Registration Using a Keypoint-Based Vessel Structure Aligning Network
11 pages, 3 figures, 3 tables, accepted to MICCAI 2022
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In ophthalmological imaging, multiple imaging systems, such as color fundus, infrared, fluorescein angiography, optical coherence tomography (OCT) or OCT angiography, are often involved to make a diagnosis of retinal disease. Multi-modal retinal registration techniques can assist ophthalmologists by providing a pixel-based comparison of aligned vessel structures in images from different modalities or acquisition times. To this end, we propose an end-to-end trainable deep learning method for multi-modal retinal image registration. Our method extracts convolutional features from the vessel structure for keypoint detection and description and uses a graph neural network for feature matching. The keypoint detection and description network and graph neural network are jointly trained in a self-supervised manner using synthetic multi-modal image pairs and are guided by synthetically sampled ground truth homographies. Our method demonstrates higher registration accuracy as competing methods for our synthetic retinal dataset and generalizes well for our real macula dataset and a public fundus dataset.
[{'version': 'v1', 'created': 'Thu, 21 Jul 2022 14:36:51 GMT'}]
2022-07-22
[['Sindel', 'Aline', ''], ['Hohberger', 'Bettina', ''], ['Maier', 'Andreas', ''], ['Christlein', 'Vincent', '']]
2009.14635
Kourosh Meshgi
Kourosh Meshgi, Maryam Sadat Mirzaei
Adversarial Semi-Supervised Multi-Domain Tracking
Accepted for ACCV 2020
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neural networks for multi-domain learning empowers an effective combination of information from different domains by sharing and co-learning the parameters. In visual tracking, the emerging features in shared layers of a multi-domain tracker, trained on various sequences, are crucial for tracking in unseen videos. Yet, in a fully shared architecture, some of the emerging features are useful only in a specific domain, reducing the generalization of the learned feature representation. We propose a semi-supervised learning scheme to separate domain-invariant and domain-specific features using adversarial learning, to encourage mutual exclusion between them, and to leverage self-supervised learning for enhancing the shared features using the unlabeled reservoir. By employing these features and training dedicated layers for each sequence, we build a tracker that performs exceptionally on different types of videos.
[{'version': 'v1', 'created': 'Wed, 30 Sep 2020 12:47:28 GMT'}]
2020-10-01
[['Meshgi', 'Kourosh', ''], ['Mirzaei', 'Maryam Sadat', '']]
1111.3107
EPTCS
Alex Spelten (RWTH Aachen University), Wolfgang Thomas (RWTH Aachen University), Sarah Winter (RWTH Aachen University)
Trees over Infinite Structures and Path Logics with Synchronization
In Proceedings INFINITY 2011, arXiv:1111.2678
EPTCS 73, 2011, pp. 20-34
10.4204/EPTCS.73.5
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide decidability and undecidability results on the model-checking problem for infinite tree structures. These tree structures are built from sequences of elements of infinite relational structures. More precisely, we deal with the tree iteration of a relational structure M in the sense of Shelah-Stupp. In contrast to classical results where model-checking is shown decidable for MSO-logic, we show decidability of the tree model-checking problem for logics that allow only path quantifiers and chain quantifiers (where chains are subsets of paths), as they appear in branching time logics; however, at the same time the tree is enriched by the equal-level relation (which holds between vertices u, v if they are on the same tree level). We separate cleanly the tree logic from the logic used for expressing properties of the underlying structure M. We illustrate the scope of the decidability results by showing that two slight extensions of the framework lead to undecidability. In particular, this applies to the (stronger) tree iteration in the sense of Muchnik-Walukiewicz.
[{'version': 'v1', 'created': 'Mon, 14 Nov 2011 06:35:15 GMT'}]
2011-11-15
[['Spelten', 'Alex', '', 'RWTH Aachen University'], ['Thomas', 'Wolfgang', '', 'RWTH Aachen\n University'], ['Winter', 'Sarah', '', 'RWTH Aachen University']]
1811.08362
Yunbo Wang
Zhiyu Yao, Yunbo Wang, Mingsheng Long, Jianmin Wang, Philip S Yu, Jiaguang Sun
Multi-Task Learning of Generalizable Representations for Video Action Recognition
ICME 2020
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In classic video action recognition, labels may not contain enough information about the diverse video appearance and dynamics, thus, existing models that are trained under the standard supervised learning paradigm may extract less generalizable features. We evaluate these models under a cross-dataset experiment setting, as the above label bias problem in video analysis is even more prominent across different data sources. We find that using the optical flows as model inputs harms the generalization ability of most video recognition models. Based on these findings, we present a multi-task learning paradigm for video classification. Our key idea is to avoid label bias and improve the generalization ability by taking data as its own supervision or supervising constraints on the data. First, we take the optical flows and the RGB frames by taking them as auxiliary supervisions, and thus naming our model as Reversed Two-Stream Networks (Rev2Net). Further, we collaborate the auxiliary flow prediction task and the frame reconstruction task by introducing a new training objective to Rev2Net, named Decoding Discrepancy Penalty (DDP), which constraints the discrepancy of the multi-task features in a self-supervised manner. Rev2Net is shown to be effective on the classic action recognition task. It specifically shows a strong generalization ability in the cross-dataset experiments.
[{'version': 'v1', 'created': 'Tue, 20 Nov 2018 16:49:17 GMT'}, {'version': 'v2', 'created': 'Sun, 12 Apr 2020 02:56:41 GMT'}]
2020-04-14
[['Yao', 'Zhiyu', ''], ['Wang', 'Yunbo', ''], ['Long', 'Mingsheng', ''], ['Wang', 'Jianmin', ''], ['Yu', 'Philip S', ''], ['Sun', 'Jiaguang', '']]
2206.04893
Chuyang Ke
Chuyang Ke, Jean Honorio
Provable Guarantees for Sparsity Recovery with Deterministic Missing Data Patterns
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of consistently recovering the sparsity pattern of a regression parameter vector from correlated observations governed by deterministic missing data patterns using Lasso. We consider the case in which the observed dataset is censored by a deterministic, non-uniform filter. Recovering the sparsity pattern in datasets with deterministic missing structure can be arguably more challenging than recovering in a uniformly-at-random scenario. In this paper, we propose an efficient algorithm for missing value imputation by utilizing the topological property of the censorship filter. We then provide novel theoretical results for exact recovery of the sparsity pattern using the proposed imputation strategy. Our analysis shows that, under certain statistical and topological conditions, the hidden sparsity pattern can be recovered consistently with high probability in polynomial time and logarithmic sample complexity.
[{'version': 'v1', 'created': 'Fri, 10 Jun 2022 06:14:45 GMT'}]
2022-06-13
[['Ke', 'Chuyang', ''], ['Honorio', 'Jean', '']]
physics/0703097
Peter H. L. Christiansen
P. Christiansen (for the ALICE TPC Collaboration)
Particle Identification Studies with an ALICE Test TPC
6 pages, 4 figures, Quark Matter 06 poster proceeding
Int.J.Mod.Phys.E16:2457-2462,2007
10.1142/S0218301307008094
null
physics.ins-det
null
Using a test TPC, consisting of the ALICE TPC field cage prototype in combination with the final ALICE TPC readout and electronics, the energy loss distribution and resolution were measured for identified protons. The measurements were compared to theoretical calculations and good quantitative agreement was found when detector effects were taken into account. The implications for particle identification are discussed.
[{'version': 'v1', 'created': 'Thu, 8 Mar 2007 15:41:42 GMT'}]
2019-08-14
[['Christiansen', 'P.', '', 'for the ALICE TPC Collaboration']]
1312.0841
Ben Ruijl
Ben Ruijl and Jos Vermaseren and Aske Plaat and Jaap van den Herik
Combining Simulated Annealing and Monte Carlo Tree Search for Expression Simplification
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many applications of computer algebra large expressions must be simplified to make repeated numerical evaluations tractable. Previous works presented heuristically guided improvements, e.g., for Horner schemes. The remaining expression is then further reduced by common subexpression elimination. A recent approach successfully applied a relatively new algorithm, Monte Carlo Tree Search (MCTS) with UCT as the selection criterion, to find better variable orderings. Yet, this approach is fit for further improvements since it is sensitive to the so-called exploration-exploitation constant $C_p$ and the number of tree updates $N$. In this paper we propose a new selection criterion called Simulated Annealing UCT (SA-UCT) that has a dynamic exploration-exploitation parameter, which decreases with the iteration number $i$ and thus reduces the importance of exploration over time. First, we provide an intuitive explanation in terms of the exploration-exploitation behavior of the algorithm. Then, we test our algorithm on three large expressions of different origins. We observe that SA-UCT widens the interval of good initial values $C_p$ where best results are achieved. The improvement is large (more than a tenfold) and facilitates the selection of an appropriate $C_p$.
[{'version': 'v1', 'created': 'Tue, 3 Dec 2013 14:56:28 GMT'}]
2013-12-04
[['Ruijl', 'Ben', ''], ['Vermaseren', 'Jos', ''], ['Plaat', 'Aske', ''], ['Herik', 'Jaap van den', '']]
1107.4150
Kun He Dr.
Wenqi Huang and Kun He
Analysis on the computability over the efficient utilization problem of the four-dimensional space-time
13 pages, 3 figures
Theoretical Computer Science, vol. 501(27): 1-10, 2013
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper formally proposes a problem about the efficient utilization of the four dimensional space-time. Given a cuboid container, a finite number of rigid cuboid items, and the time length that each item should be continuous baked in the container, the problem asks to arrange the starting time for each item being placed into the container and to arrange the position and orientation for each item at each instant during its continuous baking period such that the total time length the container be utilized is as short as possible. Here all side dimensions of the container and of the items are positive real numbers arbitrarily given. Differs from the classical packing problems, the position and orientation of each item in the container could be changed over time. Therefore, according to above mathematical model, the four-dimensional space-time can be utilized more truly and more fully. This paper then proves that there exists an exact algorithm that could solve the problem by finite operations, so we say this problem is weak computable. Based on the understanding of this computability proof, it is expected to design effective approximate algorithms in the near future. A piggyback work completed is a strict proof on the weak computability over general and natural case of the three-dimensional cuboid packing decision problem that all parameters are positive real numbers.
[{'version': 'v1', 'created': 'Thu, 21 Jul 2011 03:19:09 GMT'}]
2015-01-26
[['Huang', 'Wenqi', ''], ['He', 'Kun', '']]
1410.6796
Wojciech Mazurczyk
Wojciech Mazurczyk and Luca Caviglione
Steganography in Modern Smartphones and Mitigation Techniques
25 pages, 8 figures, 6 tables
null
null
null
cs.MM cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information. However, the majority of works evaluating the security degree of smartphones neglects steganography, which can be mainly used to: i) exfiltrate confidential data via camouflage methods, and ii) conceal valuable or personal information into innocent looking carriers. Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014. The different approaches are grouped according to the portion of the device used to hide information, leading to three different covert channels, i.e., local, object and network. Also, it reviews the relevant approaches used to detect and mitigate steganographic attacks or threats. Lastly, it showcases the most popular software applications to embed secret data into carriers, as well as possible future directions.
[{'version': 'v1', 'created': 'Wed, 27 Aug 2014 08:46:05 GMT'}]
2014-10-27
[['Mazurczyk', 'Wojciech', ''], ['Caviglione', 'Luca', '']]
1703.06822
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Process algebra with strategic interleaving
19 pages, this version is a revision of the published version
Theory of Computing Systems, 63(3):488--505, 2019
10.1007/s00224-018-9873-2
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In process algebras such as ACP (Algebra of Communicating Processes), parallel processes are considered to be interleaved in an arbitrary way. In the case of multi-threading as found in contemporary programming languages, parallel processes are actually interleaved according to some interleaving strategy. An interleaving strategy is what is called a process-scheduling policy in the field of operating systems. In many systems, for instance hardware/software systems, we have to do with both parallel processes that may best be considered to be interleaved in an arbitrary way and parallel processes that may best be considered to be interleaved according to some interleaving strategy. Therefore, we extend ACP in this paper with the latter form of interleaving. The established properties of the extension concerned include an elimination property, a conservative extension property, and a unique expansion property.
[{'version': 'v1', 'created': 'Mon, 20 Mar 2017 16:15:17 GMT'}, {'version': 'v2', 'created': 'Mon, 19 Feb 2018 11:05:48 GMT'}, {'version': 'v3', 'created': 'Tue, 21 Apr 2020 12:39:01 GMT'}]
2020-04-22
[['Bergstra', 'J. A.', ''], ['Middelburg', 'C. A.', '']]
2301.08810
Yinghao Aaron Li
Yinghao Aaron Li, Cong Han, Xilin Jiang, Nima Mesgarani
Phoneme-Level BERT for Enhanced Prosody of Text-to-Speech with Grapheme Predictions
null
null
null
null
cs.CL cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large-scale pre-trained language models have been shown to be helpful in improving the naturalness of text-to-speech (TTS) models by enabling them to produce more naturalistic prosodic patterns. However, these models are usually word-level or sup-phoneme-level and jointly trained with phonemes, making them inefficient for the downstream TTS task where only phonemes are needed. In this work, we propose a phoneme-level BERT (PL-BERT) with a pretext task of predicting the corresponding graphemes along with the regular masked phoneme predictions. Subjective evaluations show that our phoneme-level BERT encoder has significantly improved the mean opinion scores (MOS) of rated naturalness of synthesized speech compared with the state-of-the-art (SOTA) StyleTTS baseline on out-of-distribution (OOD) texts.
[{'version': 'v1', 'created': 'Fri, 20 Jan 2023 21:36:16 GMT'}]
2023-01-24
[['Li', 'Yinghao Aaron', ''], ['Han', 'Cong', ''], ['Jiang', 'Xilin', ''], ['Mesgarani', 'Nima', '']]
2205.12354
Nitish K Panigrahy
Nitish K. Panigrahy, Prajit Dhara, Don Towsley, Saikat Guha and Leandros Tassiulas
Optimal Entanglement Distribution using Satellite Based Quantum Networks
null
null
null
null
quant-ph cs.NI
http://creativecommons.org/licenses/by/4.0/
Recent technological advancements in satellite based quantum communication has made it a promising technology for realizing global scale quantum networks. Due to better loss distance scaling compared to ground based fiber communication, satellite quantum communication can distribute high quality quantum entanglements among ground stations that are geographically separated at very long distances. This work focuses on optimal distribution of bipartite entanglements to a set of pair of ground stations using a constellation of orbiting satellites. In particular, we characterize the optimal satellite-to-ground station transmission scheduling policy with respect to the aggregate entanglement distribution rate subject to various resource constraints at the satellites and ground stations. We cast the optimal transmission scheduling problem as an integer linear programming problem and solve it efficiently for some specific scenarios. Our framework can also be used as a benchmark tool to measure the performance of other potential transmission scheduling policies.
[{'version': 'v1', 'created': 'Tue, 24 May 2022 20:32:00 GMT'}, {'version': 'v2', 'created': 'Thu, 26 May 2022 02:00:05 GMT'}]
2022-05-27
[['Panigrahy', 'Nitish K.', ''], ['Dhara', 'Prajit', ''], ['Towsley', 'Don', ''], ['Guha', 'Saikat', ''], ['Tassiulas', 'Leandros', '']]
2002.05141
Anastasios Tsiamis
Anastasios Tsiamis and George Pappas
Online Learning of the Kalman Filter with Logarithmic Regret
null
null
null
null
cs.LG cs.SY eess.SY math.OC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the problem of predicting observations generated online by an unknown, partially observed linear system, which is driven by stochastic noise. For such systems the optimal predictor in the mean square sense is the celebrated Kalman filter, which can be explicitly computed when the system model is known. When the system model is unknown, we have to learn how to predict observations online based on finite data, suffering possibly a non-zero regret with respect to the Kalman filter's prediction. We show that it is possible to achieve a regret of the order of $\mathrm{poly}\log(N)$ with high probability, where $N$ is the number of observations collected. Our work is the first to provide logarithmic regret guarantees for the widely used Kalman filter. This is achieved using an online least-squares algorithm, which exploits the approximately linear relation between future observations and past observations. The regret analysis is based on the stability properties of the Kalman filter, recent statistical tools for finite sample analysis of system identification, and classical results for the analysis of least-squares algorithms for time series. Our regret analysis can also be applied for state prediction of the hidden state, in the case of unknown noise statistics but known state-space basis. A fundamental technical contribution is that our bounds hold even for the class of non-explosive systems, which includes the class of marginally stable systems, which was an open problem for the case of online prediction under stochastic noise.
[{'version': 'v1', 'created': 'Wed, 12 Feb 2020 18:31:31 GMT'}]
2020-02-13
[['Tsiamis', 'Anastasios', ''], ['Pappas', 'George', '']]
2211.00701
Alexander Khanikaev
Svetlana Kiriushechkina, Anton Vakulenko, Daria Smirnova, Sriram Guddala, Filipp Komissarenko, Monica Allen, Jeffery Allen, Alexander B. Khanikaev
Photonic Dirac Waveguides
16 pages, 5 figures
null
null
null
physics.optics cond-mat.mtrl-sci physics.app-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Dirac equation is a paradigmatic model that describes a range of intriguing properties of relativistic spin-1/2 particles, from the existence of antiparticles to Klein tunneling. However, the Dirac-like equations have found application far beyond its original scope, and has been used to comprehend the properties of graphene and topological phases of matter. In the field of photonics, the opportunity to emulate Dirac physics has also enabled topological photonic insulators. In this paper, we demonstrate that judiciously engineered synthetic potentials in photonic Dirac systems can offer physical properties beyond both the elementary and quasi-particles, and topological realms. Specifically, we introduce a new class of optical Dirac waveguides, whose guided electromagnetic modes are endowed with pseudo-spin degree of freedom. Pseudo-spin coupled with the ability to engineer synthetic gauge potentials acting on it, enables control over the guided modes which is unattainable in conventional optical waveguides. In particular, we use a silicon nanophotonic metasurface that supports pseudo-spin degree of freedom as a testing platform to predict and experimentally confirm a spin-full nature of the Dirac waveguides. We also demonstrate that, for suitable trapping potentials, the guided modes exhibit spin-dependent field distributions, which gives rise to their distinct transport and radiative properties. Thereby, the Dirac waveguides manifest spin-dependent radiative lifetimes - the non-Hermitian spin-Hall effect - and open new avenues for spin-multiplexing, controlling characteristics of guided optical modes, and tuning light-matter interactions with photonic pseudo-spins.
[{'version': 'v1', 'created': 'Tue, 1 Nov 2022 18:56:55 GMT'}]
2022-11-03
[['Kiriushechkina', 'Svetlana', ''], ['Vakulenko', 'Anton', ''], ['Smirnova', 'Daria', ''], ['Guddala', 'Sriram', ''], ['Komissarenko', 'Filipp', ''], ['Allen', 'Monica', ''], ['Allen', 'Jeffery', ''], ['Khanikaev', 'Alexander B.', '']]
1901.10744
Pasquale De Luca
Pasquale De Luca, Vincenzo Maria Russiello, Raffaele Ciro Sannino and Lorenzo Valente
A study for Image compression using Re-Pair algorithm
8 pages
null
null
null
cs.MM cs.CV
http://creativecommons.org/publicdomain/zero/1.0/
The compression is an important topic in computer science which allows we to storage more amount of data on our data storage. There are several techniques to compress any file. In this manuscript will be described the most important algorithm to compress images such as JPEG and it will be compared with another method to retrieve good reason to not use this method on images. So to compress the text the most encoding technique known is the Huffman Encoding which it will be explained in exhaustive way. In this manuscript will showed how to compute a text compression method on images in particular the method and the reason to choice a determinate image format against the other. The method studied and analyzed in this manuscript is the Re-Pair algorithm which is purely for grammatical context to be compress. At the and it will be showed the good result of this application.
[{'version': 'v1', 'created': 'Wed, 30 Jan 2019 10:17:52 GMT'}, {'version': 'v2', 'created': 'Thu, 7 Feb 2019 13:56:41 GMT'}, {'version': 'v3', 'created': 'Wed, 13 Feb 2019 11:36:43 GMT'}]
2019-02-14
[['De Luca', 'Pasquale', ''], ['Russiello', 'Vincenzo Maria', ''], ['Sannino', 'Raffaele Ciro', ''], ['Valente', 'Lorenzo', '']]
1702.01731
Mohammadreza Babaee
Mohammadreza Babaee, Duc Tung Dinh, Gerhard Rigoll
A Deep Convolutional Neural Network for Background Subtraction
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we present a novel background subtraction system that uses a deep Convolutional Neural Network (CNN) to perform the segmentation. With this approach, feature engineering and parameter tuning become unnecessary since the network parameters can be learned from data by training a single CNN that can handle various video scenes. Additionally, we propose a new approach to estimate background model from video. For the training of the CNN, we employed randomly 5 percent video frames and their ground truth segmentations taken from the Change Detection challenge 2014(CDnet 2014). We also utilized spatial-median filtering as the post-processing of the network outputs. Our method is evaluated with different data-sets, and the network outperforms the existing algorithms with respect to the average ranking over different evaluation metrics. Furthermore, due to the network architecture, our CNN is capable of real time processing.
[{'version': 'v1', 'created': 'Mon, 6 Feb 2017 18:24:04 GMT'}]
2017-02-07
[['Babaee', 'Mohammadreza', ''], ['Dinh', 'Duc Tung', ''], ['Rigoll', 'Gerhard', '']]
2102.09516
Jung-Wan Ryu
Jung-Wan Ryu, Jinhang Cho
Transformation cavities with a narrow refractive index profile
13 pages, 4 figures
null
10.1364/OL.422529
null
physics.optics
http://creativecommons.org/licenses/by/4.0/
Recently, gradient index cavities, or so-called transformation cavities, designed by conformal transformation optics have been studied to support resonant modes with both high Q-factors and emission directionality. We propose a new design method for transformation cavities to realize a narrower width of the refractive index profile, a great advantage in experimental implementations, without losing the benefits of conformal mapping. We study the resonant modes with both high Q-factor and directional emission in the newly designed transformation cavities, where the refractive index profile is 50 percent narrower than in previously proposed transformation cavities. By varying a system parameter with a fixed maximal value of the refractive index profile inside the cavity, the width of the refractive index profile narrows, the Q-factors become higher, and the near and far field patterns maintain their properties, namely conformal whispering gallery modes and bidirectional emission, respectively.
[{'version': 'v1', 'created': 'Thu, 18 Feb 2021 17:59:12 GMT'}]
2021-04-21
[['Ryu', 'Jung-Wan', ''], ['Cho', 'Jinhang', '']]
1806.02677
A. E. Sitnitsky
A.E. Sitnitsky
Analytic calculation of ground state splitting in symmetric double well potential
21 p., 4 fig. arXiv admin note: text overlap with arXiv:1801.03733
Computational and Theoretical Chemistry 1138C (2018) pp. 15-22
10.1016/j.comptc.2018.05.021
null
physics.chem-ph quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The exact solution of the one-dimensional Schr\"odinger equation with symmetric trigonometric double-well potential (DWP) is obtained via angular oblate spheroidal function. The results of stringent analytic calculation for the ground state splitting of ring-puckering vibration in the 1,3-dioxole (as an example of the case when the ground state tunneling doublet is well below the potential barrier top) and 2,3-dihydrofuran (as an example of the case when the ground state tunneling doublet is close to the potential barrier top) are compared with several variants of approximate semiclassical (WKB) ones. This enables us to verify the accuracy of various WKB formulas suggested in the literature: 1. ordinary WKB, i.e., the formula from the Landau and Lifshitz textbook; 2. Garg's formula; 3. instanton approach. We show that for the former case all three variants of WKB provide good accuracy while for the latter one they are very inaccurate. The results obtained provide a new theoretical tool for describing relevant experimental data on IR spectroscopy of ring-puckering vibrations.
[{'version': 'v1', 'created': 'Wed, 6 Jun 2018 08:36:49 GMT'}]
2018-06-08
[['Sitnitsky', 'A. E.', '']]
2205.12808
Haoyuan Sun
Haoyuan Sun, Kwangjun Ahn, Christos Thrampoulidis, Navid Azizan
Mirror Descent Maximizes Generalized Margin and Can Be Implemented Efficiently
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Driven by the empirical success and wide use of deep neural networks, understanding the generalization performance of overparameterized models has become an increasingly popular question. To this end, there has been substantial effort to characterize the implicit bias of the optimization algorithms used, such as gradient descent (GD), and the structural properties of their preferred solutions. This paper answers an open question in this literature: For the classification setting, what solution does mirror descent (MD) converge to? Specifically, motivated by its efficient implementation, we consider the family of mirror descent algorithms with potential function chosen as the $p$-th power of the $\ell_p$-norm, which is an important generalization of GD. We call this algorithm $p$-$\textsf{GD}$. For this family, we characterize the solutions it obtains and show that it converges in direction to a generalized maximum-margin solution with respect to the $\ell_p$-norm for linearly separable classification. While the MD update rule is in general expensive to compute and perhaps not suitable for deep learning, $p$-$\textsf{GD}$ is fully parallelizable in the same manner as SGD and can be used to train deep neural networks with virtually no additional computational overhead. Using comprehensive experiments with both linear and deep neural network models, we demonstrate that $p$-$\textsf{GD}$ can noticeably affect the structure and the generalization performance of the learned models.
[{'version': 'v1', 'created': 'Wed, 25 May 2022 14:33:13 GMT'}, {'version': 'v2', 'created': 'Thu, 29 Sep 2022 17:14:59 GMT'}]
2022-09-30
[['Sun', 'Haoyuan', ''], ['Ahn', 'Kwangjun', ''], ['Thrampoulidis', 'Christos', ''], ['Azizan', 'Navid', '']]
1803.06515
Chunfang Li
Chun-Fang Li and Yun-Long Zhang
From nonholonomic quantum constraint to canonical variables of photons I: true intrinsic degree of freedom
18 pages, 1 figure
null
null
null
quant-ph math.RT physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report that the true intrinsic degree of freedom of the photon is neither the polarization nor the spin. It describes a local property in momentum space and is represented in the local representation by the Pauli matrices. This result is achieved by treating the transversality condition on the vector wavefunction as a nonholonomic quantum constraint. We find that the quantum constraint makes it possible to generalize the Stokes parameters to characterize the polarization of a general state. Unexpectedly, the generalized Stokes parameters are specified in a momentum-space local reference system that is fixed by another degree of freedom, called Stratton vector. Only constant Stokes parameters in one particular local reference system can convey the intrinsic degree of freedom of the photon. We show that the optical rotation is one of such processes that change the Stratton vector with the intrinsic quantum number remaining fixed. Changing the Stratton vector of the eigenstate of the helicity will give rise to a Berry's phase.
[{'version': 'v1', 'created': 'Sat, 17 Mar 2018 14:36:30 GMT'}]
2018-03-20
[['Li', 'Chun-Fang', ''], ['Zhang', 'Yun-Long', '']]
1609.07407
Joshua Rapp
Joshua Rapp and Vivek K Goyal
A Few Photons Among Many: Unmixing Signal and Noise for Photon-Efficient Active Imaging
null
IEEE TCI vol. 3, no. 3 (2017) 445-459
10.1109/TCI.2017.2706028
null
stat.AP physics.ins-det
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conventional LIDAR systems require hundreds or thousands of photon detections to form accurate depth and reflectivity images. Recent photon-efficient computational imaging methods are remarkably effective with only 1.0 to 3.0 detected photons per pixel, but they are not demonstrated at signal-to-background ratio (SBR) below 1.0 because their imaging accuracies degrade significantly in the presence of high background noise. We introduce a new approach to depth and reflectivity estimation that focuses on unmixing contributions from signal and noise sources. At each pixel in an image, short-duration range gates are adaptively determined and applied to remove detections likely to be due to noise. For pixels with too few detections to perform this censoring accurately, we borrow data from neighboring pixels to improve depth estimates, where the neighborhood formation is also adaptive to scene content. Algorithm performance is demonstrated on experimental data at varying levels of noise. Results show improved performance of both reflectivity and depth estimates over state-of-the-art methods, especially at low signal-to-background ratios. In particular, accurate imaging is demonstrated with SBR as low as 0.04. This validation of a photon-efficient, noise-tolerant method demonstrates the viability of rapid, long-range, and low-power LIDAR imaging.
[{'version': 'v1', 'created': 'Fri, 23 Sep 2016 15:49:24 GMT'}]
2019-11-13
[['Rapp', 'Joshua', ''], ['Goyal', 'Vivek K', '']]
1808.00727
Christoph Redl
Christoph Redl
Inlining External Sources in Answer Set Programs
Under consideration in Theory and Practice of Logic Programming (TPLP)
Theory and Practice of Logic Programming 19 (2019) 360-411
10.1017/S147106841800056X
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
HEX-programs are an extension of answer set programs (ASP) with external sources. To this end, external atoms provide a bidirectional interface between the program and an external source. The traditional evaluation algorithm for HEX-programs is based on guessing truth values of external atoms and verifying them by explicit calls of the external source. The approach was optimized by techniques that reduce the number of necessary verification calls or speed them up, but the remaining external calls are still expensive. In this paper we present an alternative evaluation approach based on inlining of external atoms, motivated by existing but less general approaches for specialized formalisms such as DL-programs. External atoms are then compiled away such that no verification calls are necessary. The approach is implemented in the dlvhex reasoner. Experiments show a significant performance gain. Besides performance improvements, we further exploit inlining for extending previous (semantic) characterizations of program equivalence from ASP to HEX-programs, including those of strong equivalence, uniform equivalence and H, B -equivalence. Finally, based on these equivalence criteria, we characterize also inconsistency of programs wrt. extensions. Since well-known ASP extensions (such as constraint ASP) are special cases of HEX, the results are interesting beyond the particular formalism. Under consideration in Theory and Practice of Logic Programming (TPLP).
[{'version': 'v1', 'created': 'Thu, 2 Aug 2018 09:32:20 GMT'}]
2020-02-19
[['Redl', 'Christoph', '']]
1503.08866
Bin Li
Bin Li, Berenice Mettler, Timonthy M. Kowalewski
Towards Data-Driven Hierarchical Surgical Skill Analysis
M2CAI 2014
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper evaluates methods of hierarchical skill analysis developed in aerospace to the problem of surgical skill assessment and modeling. The analysis employs tool motion data of Fundamental of Laparoscopic Skills (FLS) tasks collected from clinicians of various skill levels at three different clinical teaching hospitals in the United States. Outcomes are evaluated based on their ability to provide relevant information about the underlying processes across the entire system hierarchy including control, guidance and planning.
[{'version': 'v1', 'created': 'Mon, 30 Mar 2015 22:35:03 GMT'}]
2015-04-01
[['Li', 'Bin', ''], ['Mettler', 'Berenice', ''], ['Kowalewski', 'Timonthy M.', '']]
1408.4976
Richard Katz
John W. Crowley, Richard F. Katz, Peter J. Huybers, Charles H. Langmuir, Sung-Hyun Park
Glacial cycles drive variations in the production of oceanic crust
30 pages, 6 figures (including supplementary information). Resubmitted to Science on 12 December 2014
Science, Vol. 347, no. 6227, pp. 1237-1240, 2015
10.1126/science.1261508
null
physics.geo-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Glacial cycles redistribute water between oceans and continents causing pressure changes in the upper mantle, with consequences for melting of Earth's interior. Using Plio-Pleistocene sea-level variations as a forcing function, theoretical models of mid-ocean ridge dynamics that include melt transport predict temporal variations in crustal thickness of hundreds of meters. New bathymetry from the Australian-Antarctic ridge shows significant spectral energy near the Milankovitch periods of 23, 41, and 100 ky, consistent with model predictions. These results suggest that abyssal hills, one of the most common bathymetric features on Earth, record the magmatic response to changes in sea level. The models and data support a link between glacial cycles at the surface and mantle melting at depth, recorded in the bathymetric fabric of the sea floor.
[{'version': 'v1', 'created': 'Thu, 21 Aug 2014 12:43:28 GMT'}, {'version': 'v2', 'created': 'Mon, 15 Dec 2014 13:13:57 GMT'}]
2015-06-16
[['Crowley', 'John W.', ''], ['Katz', 'Richard F.', ''], ['Huybers', 'Peter J.', ''], ['Langmuir', 'Charles H.', ''], ['Park', 'Sung-Hyun', '']]
1709.06661
Murat Arcak
Murat Arcak and John Maidens
Simulation-based reachability analysis for nonlinear systems using componentwise contraction properties
null
null
null
null
cs.SY
http://creativecommons.org/licenses/by-nc-sa/4.0/
A shortcoming of existing reachability approaches for nonlinear systems is the poor scalability with the number of continuous state variables. To mitigate this problem we present a simulation-based approach where we first sample a number of trajectories of the system and next establish bounds on the convergence or divergence between the samples and neighboring trajectories. We compute these bounds using contraction theory and reduce the conservatism by partitioning the state vector into several components and analyzing contraction properties separately in each direction. Among other benefits this allows us to analyze the effect of constant but uncertain parameters by treating them as state variables and partitioning them into a separate direction. We next present a numerical procedure to search for weighted norms that yield a prescribed contraction rate, which can be incorporated in the reachability algorithm to adjust the weights to minimize the growth of the reachable set.
[{'version': 'v1', 'created': 'Tue, 19 Sep 2017 22:04:58 GMT'}]
2017-09-21
[['Arcak', 'Murat', ''], ['Maidens', 'John', '']]
2012.09914
Md. Selim Habib
Md. Selim Habib, Christos Markos, and Rodrigo Amezcua-Correa
Impact of cladding elements on the loss performance of hollow-core anti-resonant fibers
null
null
null
null
physics.optics
http://creativecommons.org/licenses/by/4.0/
Understanding the impact of the cladding tube structure on the overall guiding performance is crucial for designing single-mode, wide-band, and ultra low-loss nested hollow-core anti-resonant fiber (HC-ARF). Here we thoroughly investigate on how the propagation loss is affected by the nested elements when their geometry is realistic (i.e., non-ideal). Interestingly, it was found that the size rather than the shape of the nested elements, have a dominant role in the final loss performance of the HC-ARFs. We identify a unique 'V-shape' pattern for suppression of higher-order modes loss by optimizing free design parameters of HC-ARF. We find that a 5-tube nested HC-ARF has wider transmission window and better single-mode operation than 6-tube HC-ARF. We show that the propagation loss can be significantly improved by using anisotropic nested anti-resonant tubes elongated in the radial direction. Our simulations indicate that with this novel fiber design, a propagation loss as low as 0.11 dB/km at 1.55 $\mu$m can be achieved. Our results provide design insights towards fully exploiting single-mode, wide-band, and ultra low-loss HC-ARF. In addition, the extraordinary optical properties of the proposed fiber can be beneficial for several applications such as future optical communication system, high energy light transport, extreme non-nonlinear optics and beyond.
[{'version': 'v1', 'created': 'Thu, 17 Dec 2020 20:18:53 GMT'}]
2020-12-21
[['Habib', 'Md. Selim', ''], ['Markos', 'Christos', ''], ['Amezcua-Correa', 'Rodrigo', '']]
1812.03761
Lucy Martin
Lucy Martin, Shinji Machida, David Kelliher and Suzie Sheehy
A study of coherent and incoherent resonances in high intensity beams using a linear Paul trap
null
New J. Phys. 21 053023 (2019)
10.1088/1367-2630/ab0e28
null
physics.acc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a quantitative measurement of the change in frequency (tune) with intensity of four transverse resonances in a high intensity Gaussian beam. Due to the non-linear space charge forces present in high intensity beams, particle motion cannot be analytically described. Instead we use the Simulator of Particle Orbit Dynamics (S-POD) and the Intense Beam Experiment (IBEX), two linear Paul traps, to experimentally replicate the system. In high intensity beams a coherent resonant response to both space charge and external field driven perturbations is possible, these coherent resonances are excited at a tune that differs by a factor $C_{m}$ from that of the incoherent resonance. By increasing the number of ions stored in the linear Paul trap and studying the location of four different resonances we extract provisional values describing the change in tune of the resonance with intensity. These values are then compared to the $C_{m}$ factors for coherent resonances. We find that the $C_{m}$ factors do not accurately predict the location of resonances in high intensity Gaussian beams. Further insight into the experiment is gained through simulation using Warp, a particle-in-cell code.
[{'version': 'v1', 'created': 'Mon, 10 Dec 2018 12:40:45 GMT'}, {'version': 'v2', 'created': 'Mon, 3 Jun 2019 14:15:35 GMT'}]
2019-06-04
[['Martin', 'Lucy', ''], ['Machida', 'Shinji', ''], ['Kelliher', 'David', ''], ['Sheehy', 'Suzie', '']]
2001.07799
Ziyue Xiang
Ziyue Xiang, Daniel E. Acuna
Scientific Image Tampering Detection Based On Noise Inconsistencies: A Method And Datasets
null
null
null
null
cs.CV eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scientific image tampering is a problem that affects not only authors but also the general perception of the research community. Although previous researchers have developed methods to identify tampering in natural images, these methods may not thrive under the scientific setting as scientific images have different statistics, format, quality, and intentions. Therefore, we propose a scientific-image specific tampering detection method based on noise inconsistencies, which is capable of learning and generalizing to different fields of science. We train and test our method on a new dataset of manipulated western blot and microscopy imagery, which aims at emulating problematic images in science. The test results show that our method can detect various types of image manipulation in different scenarios robustly, and it outperforms existing general-purpose image tampering detection schemes. We discuss applications beyond these two types of images and suggest next steps for making detection of problematic images a systematic step in peer review and science in general.
[{'version': 'v1', 'created': 'Tue, 21 Jan 2020 22:29:56 GMT'}, {'version': 'v2', 'created': 'Wed, 4 Mar 2020 20:46:46 GMT'}]
2020-03-06
[['Xiang', 'Ziyue', ''], ['Acuna', 'Daniel E.', '']]
1605.08590
Zuogong Yue
Zuogon Yue, Johan Thunberg, Lennart Ljung, Ye Yuan and Jorge Goncalves
Systems Aliasing in Dynamic Network Reconstruction: Issues on Low Sampling Frequencies
14 pages. arXiv admin note: substantial text overlap with arXiv:1605.06973
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network reconstruction of dynamical continuous-time (CT) systems is motivated by applications in many fields. Due to experimental limitations, especially in biology, data could be sampled at low frequencies, leading to significant challenges in network inference. We introduce the concept of "system aliasing" and characterize the minimal sampling frequency that allows reconstruction of CT systems from low sampled data. A test criterion is also proposed to check whether system aliasing is presented. With no system aliasing, the paper provides an algorithm to reconstruct dynamic network from data in the presence of noise. In addition, when there is system aliasing we perform studies that add additional prior information of the system such as sparsity. This paper opens new directions in modelling of network systems where samples have significant costs. Such tools are essential to process the available data in applications subject to current experimental limitations.
[{'version': 'v1', 'created': 'Fri, 27 May 2016 11:36:41 GMT'}, {'version': 'v2', 'created': 'Mon, 30 May 2016 11:40:08 GMT'}, {'version': 'v3', 'created': 'Thu, 28 Sep 2017 15:17:12 GMT'}, {'version': 'v4', 'created': 'Mon, 29 Oct 2018 15:20:41 GMT'}]
2018-10-30
[['Yue', 'Zuogon', ''], ['Thunberg', 'Johan', ''], ['Ljung', 'Lennart', ''], ['Yuan', 'Ye', ''], ['Goncalves', 'Jorge', '']]
2208.01905
YuLi Sun
Yuli Sun, Lin Lei, Dongdong Guan, Gangyao Kuang, Li Liu
Graph Signal Processing for Heterogeneous Change Detection Part II: Spectral Domain Analysis
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is the second part of the paper that provides a new strategy for the heterogeneous change detection (HCD) problem, that is, solving HCD from the perspective of graph signal processing (GSP). We construct a graph to represent the structure of each image, and treat each image as a graph signal defined on the graph. In this way, we can convert the HCD problem into a comparison of responses of signals on systems defined on the graphs. In the part I, the changes are measured by comparing the structure difference between the graphs from the vertex domain. In this part II, we analyze the GSP for HCD from the spectral domain. We first analyze the spectral properties of the different images on the same graph, and show that their spectra exhibit commonalities and dissimilarities. Specially, it is the change that leads to the dissimilarities of their spectra. Then, we propose a regression model for the HCD, which decomposes the source signal into the regressed signal and changed signal, and requires the regressed signal have the same spectral property as the target signal on the same graph. With the help of graph spectral analysis, the proposed regression model is flexible and scalable. Experiments conducted on seven real data sets show the effectiveness of the proposed method.
[{'version': 'v1', 'created': 'Wed, 3 Aug 2022 08:11:24 GMT'}, {'version': 'v2', 'created': 'Mon, 8 Aug 2022 03:00:43 GMT'}]
2022-08-09
[['Sun', 'Yuli', ''], ['Lei', 'Lin', ''], ['Guan', 'Dongdong', ''], ['Kuang', 'Gangyao', ''], ['Liu', 'Li', '']]
2008.00075
Stepan Kuznetsov
Max Kanovich, Stepan Kuznetsov, Andre Scedrov
The Multiplicative-Additive Lambek Calculus with Subexponential and Bracket Modalities
Accepted for publication in the Journal of Logic, Language, and Information
null
null
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a proof-theoretic and algorithmic complexity analysis for systems introduced by Morrill to serve as the core of the CatLog categorial grammar parser. We consider two recent versions of Morrill's calculi, and focus on their fragments including multiplicative (Lambek) connectives, additive conjunction and disjunction, brackets and bracket modalities, and the ! subexponential modality. For both systems, we resolve issues connected with the cut rule and provide necessary modifications, after which we prove admissibility of cut (cut elimination theorem). We also prove algorithmic undecidability for both calculi, and show that categorial grammars based on them can generate arbitrary recursively enumerable languages.
[{'version': 'v1', 'created': 'Fri, 31 Jul 2020 20:42:13 GMT'}, {'version': 'v2', 'created': 'Wed, 30 Sep 2020 20:02:13 GMT'}]
2020-10-02
[['Kanovich', 'Max', ''], ['Kuznetsov', 'Stepan', ''], ['Scedrov', 'Andre', '']]
2010.10670
Joseph Marino
Joseph Marino, Alexandre Pich\'e, Alessandro Davide Ialongo, Yisong Yue
Iterative Amortized Policy Optimization
Advances in Neural Processing Systems (NeurIPS) 2021
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Policy networks are a central feature of deep reinforcement learning (RL) algorithms for continuous control, enabling the estimation and sampling of high-value actions. From the variational inference perspective on RL, policy networks, when used with entropy or KL regularization, are a form of \textit{amortized optimization}, optimizing network parameters rather than the policy distributions directly. However, \textit{direct} amortized mappings can yield suboptimal policy estimates and restricted distributions, limiting performance and exploration. Given this perspective, we consider the more flexible class of \textit{iterative} amortized optimizers. We demonstrate that the resulting technique, iterative amortized policy optimization, yields performance improvements over direct amortization on benchmark continuous control tasks.
[{'version': 'v1', 'created': 'Tue, 20 Oct 2020 23:25:42 GMT'}, {'version': 'v2', 'created': 'Fri, 22 Oct 2021 20:44:57 GMT'}]
2021-10-26
[['Marino', 'Joseph', ''], ['Piché', 'Alexandre', ''], ['Ialongo', 'Alessandro Davide', ''], ['Yue', 'Yisong', '']]
1810.12834
Ciriaco Andrea D'Angelo
Giovanni Abramo, Ciriaco Andrea D'Angelo
Assessing national strengths and weaknesses in research fields
null
Abramo, G., D'Angelo, C.A. (2014). Assessing national strengths and weaknesses in research fields. Journal of Informetrics, 8(3), 766-775
10.1016/j.joi.2014.07.002
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
National policies aimed at fostering the effectiveness of scientific systems should be based on reliable strategic analysis identifying strengths and weaknesses at field level. Approaches and indicators thus far proposed in the literature have not been completely satisfactory, since they fail to distinguish the effect of the size of production factors from that of their quality, particularly the quality of labor. The current work proposes an innovative "input-oriented" approach, which permits: i) estimation of national research performance in a field and comparison to that of other nations, independent of the size of their respective research staffs; and, for fields of comparable intensity of publication, ii) identification of the strong and weak research fields within a national research system on the basis of international comparison. In reference to the second objective, the proposed approach is applied to the Italian case, through the analysis of the 2006-2010 scientific production of the Italian academic system, in the 200 research fields where bibliometric analysis is meaningful.
[{'version': 'v1', 'created': 'Tue, 30 Oct 2018 16:06:36 GMT'}]
2018-10-31
[['Abramo', 'Giovanni', ''], ["D'Angelo", 'Ciriaco Andrea', '']]
1606.01781
Alexis Conneau
Alexis Conneau, Holger Schwenk, Lo\"ic Barrault, Yann Lecun
Very Deep Convolutional Networks for Text Classification
10 pages, EACL 2017, camera-ready
null
null
null
cs.CL cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dominant approach for many NLP tasks are recurrent neural networks, in particular LSTMs, and convolutional neural networks. However, these architectures are rather shallow in comparison to the deep convolutional networks which have pushed the state-of-the-art in computer vision. We present a new architecture (VDCNN) for text processing which operates directly at the character level and uses only small convolutions and pooling operations. We are able to show that the performance of this model increases with depth: using up to 29 convolutional layers, we report improvements over the state-of-the-art on several public text classification tasks. To the best of our knowledge, this is the first time that very deep convolutional nets have been applied to text processing.
[{'version': 'v1', 'created': 'Mon, 6 Jun 2016 15:14:50 GMT'}, {'version': 'v2', 'created': 'Fri, 27 Jan 2017 12:49:11 GMT'}]
2017-01-30
[['Conneau', 'Alexis', ''], ['Schwenk', 'Holger', ''], ['Barrault', 'Loïc', ''], ['Lecun', 'Yann', '']]
2010.15877
Yunchengh Hua
Yuncheng Hua, Yuan-Fang Li, Gholamreza Haffari, Guilin Qi and Tongtong Wu
Few-Shot Complex Knowledge Base Question Answering via Meta Reinforcement Learning
11 pages, 1 figure, accepted in EMNLP 2020
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complex question-answering (CQA) involves answering complex natural-language questions on a knowledge base (KB). However, the conventional neural program induction (NPI) approach exhibits uneven performance when the questions have different types, harboring inherently different characteristics, e.g., difficulty level. This paper proposes a meta-reinforcement learning approach to program induction in CQA to tackle the potential distributional bias in questions. Our method quickly and effectively adapts the meta-learned programmer to new questions based on the most similar questions retrieved from the training data. The meta-learned policy is then used to learn a good programming policy, utilizing the trial trajectories and their rewards for similar questions in the support set. Our method achieves state-of-the-art performance on the CQA dataset (Saha et al., 2018) while using only five trial trajectories for the top-5 retrieved questions in each support set, and metatraining on tasks constructed from only 1% of the training set. We have released our code at https://github.com/DevinJake/MRL-CQA.
[{'version': 'v1', 'created': 'Thu, 29 Oct 2020 18:34:55 GMT'}]
2020-11-02
[['Hua', 'Yuncheng', ''], ['Li', 'Yuan-Fang', ''], ['Haffari', 'Gholamreza', ''], ['Qi', 'Guilin', ''], ['Wu', 'Tongtong', '']]
1009.0297
Gideon Simpson
Gideon Simpson, Marc Spiegelman
Solitary Wave Benchmarks in Magma Dynamics
25 pages, 7 figures
null
null
null
physics.geo-ph math.NA nlin.PS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a model problem for benchmarking codes that investigate magma migration in the Earth's interior. This system retains the essential features of more sophisticated models, yet has the advantage of possessing solitary wave solutions. The existence of such exact solutions to the nonlinear problem make it an excellent benchmark problem for combinations of solver algorithms. In this work, we explore a novel algorithm for computing high quality approximations of the solitary waves and use them to benchmark a semi-Lagrangian Crank-Nicholson scheme for a finite element discretization of the time dependent problem.
[{'version': 'v1', 'created': 'Wed, 1 Sep 2010 22:38:02 GMT'}]
2010-09-03
[['Simpson', 'Gideon', ''], ['Spiegelman', 'Marc', '']]
1706.08817
Kyriakos Georgiou
Kyriakos Georgiou, Samuel Xavier-de-Souza, Kerstin Eder
The IoT energy challenge: A software perspective
9 pages, 1 figure
IEEE Embedded Systems Letters, 2017, vol. PP, no. 99, pp. 1-1
10.1109/LES.2017.2741419
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Internet of Things (IoT) sparks a whole new world of embedded applications. Most of these applications are based on deeply embedded systems that have to operate on limited or unreliable sources of energy, such as batteries or energy harvesters. Meeting the energy requirements for such applications is a hard challenge, which threatens the future growth of the IoT. Software has the ultimate control over hardware. Therefore, its role is significant in optimizing the energy consumption of a system. Currently, programmers have no feedback on how their software affects the energy consumption of a system. Such feedback can be enabled by energy transparency, a concept that makes a program's energy consumption visible, from hardware to software. This paper discusses the need for energy transparency in software development and emphasizes on how such transparency can be realized to help tackling the IoT energy challenge.
[{'version': 'v1', 'created': 'Tue, 27 Jun 2017 12:38:30 GMT'}]
2017-09-06
[['Georgiou', 'Kyriakos', ''], ['Xavier-de-Souza', 'Samuel', ''], ['Eder', 'Kerstin', '']]
2011.14393
Jalal Arabneydi
Vida Fathi, Jalal Arabneydi and Amir G. Aghdam
Reinforcement Learning in Linear Quadratic Deep Structured Teams: Global Convergence of Policy Gradient Methods
Proceedings of IEEE Conference on Decision and Control, 2020
null
null
null
cs.MA cs.LG cs.SY eess.SY math.OC
http://creativecommons.org/licenses/by/4.0/
In this paper, we study the global convergence of model-based and model-free policy gradient descent and natural policy gradient descent algorithms for linear quadratic deep structured teams. In such systems, agents are partitioned into a few sub-populations wherein the agents in each sub-population are coupled in the dynamics and cost function through a set of linear regressions of the states and actions of all agents. Every agent observes its local state and the linear regressions of states, called deep states. For a sufficiently small risk factor and/or sufficiently large population, we prove that model-based policy gradient methods globally converge to the optimal solution. Given an arbitrary number of agents, we develop model-free policy gradient and natural policy gradient algorithms for the special case of risk-neutral cost function. The proposed algorithms are scalable with respect to the number of agents due to the fact that the dimension of their policy space is independent of the number of agents in each sub-population. Simulations are provided to verify the theoretical results.
[{'version': 'v1', 'created': 'Sun, 29 Nov 2020 16:02:39 GMT'}, {'version': 'v2', 'created': 'Tue, 15 Dec 2020 06:55:09 GMT'}]
2020-12-16
[['Fathi', 'Vida', ''], ['Arabneydi', 'Jalal', ''], ['Aghdam', 'Amir G.', '']]
2203.11079
Fabian Egidy
Anton Ehrmanntraut, Fabian Egidy, Christian Gla{\ss}er
Oracle with $\mathrm{P=NP\cap coNP}$, but no Many-One Completeness in UP, DisjNP, and DisjCoNP
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct an oracle relative to which $\mathrm{P} = \mathrm{NP} \cap \mathrm{coNP}$, but there are no many-one complete sets in $\mathrm{UP}$, no many-one complete disjoint $\mathrm{NP}$-pairs, and no many-one complete disjoint $\mathrm{coNP}$-pairs. This contributes to a research program initiated by Pudl\'ak [Pud17], which studies incompleteness in the finite domain and which mentions the construction of such oracles as open problem. The oracle shows that $\mathsf{NP}\cap\mathsf{coNP}$ is indispensable in the list of hypotheses studied by Pudl\'ak. Hence one should consider stronger hypotheses, in order to find a universal one.
[{'version': 'v1', 'created': 'Mon, 21 Mar 2022 15:58:52 GMT'}]
2022-03-22
[['Ehrmanntraut', 'Anton', ''], ['Egidy', 'Fabian', ''], ['Glaßer', 'Christian', '']]
2009.13901
Carlo Cossu
Carlo Cossu
Evaluation of tilt control for wind-turbine arrays in the atmospheric boundary layer
submitted to Wind Energy Science (revised version)
null
null
null
physics.flu-dyn
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wake redirection is a promising approach designed to mitigate turbine-wake interactions which have a negative impact on the performance and lifetime of wind farms. It has recently been found that substantial power gains can be obtained by tilting the rotors of spanwise-periodic wind-turbine arrays. Rotor tilt is associated to the generation of coherent streamwise vortices which deflect wakes towards the ground and, by exploiting the vertical wind shear, replace them with higher-momentum fluid (high-speed streaks). The objective of this work is to evaluate power gains that can be obtained by tilting rotors in spanwise-periodic wind-turbine arrays immersed in the atmospheric boundary layer and, in particular, to analyze the influence of the rotor size on power gains in the case where the turbines emerge from the atmospheric surface layer. We show that, for the case of wind-aligned arrays, large power gains can be obtained for positive tilt angles of the order of 30{\deg}. Power gains are substantially enhanced by operating tilted-rotor turbines at thrust coefficients higher than in the reference configuration. These power gains initially increase with the rotor size reaching a maximum for rotor diameters of the order of 3.6 boundary layer momentum thicknesses (for the considered cases) and decrease for larger sizes. Maximum power gains are obtained for wind-turbine spanwise spacings which are very similar to those of large-scale and very large scale streaky motions which are naturally amplified in turbulent boundary layers. These results are all congruent with the findings of previous investigations of passive control of canonical boundary layers for drag-reduction applications where high-speed streaks replaced wakes of spanwise-periodic rows of wall-mounted roughness elements.
[{'version': 'v1', 'created': 'Tue, 29 Sep 2020 09:48:55 GMT'}, {'version': 'v2', 'created': 'Mon, 8 Feb 2021 15:47:22 GMT'}]
2021-02-09
[['Cossu', 'Carlo', '']]
2006.01509
Marlin Benedikt Sch\"afer
Marlin B. Sch\"afer (1 and 2), Frank Ohme (1 and 2), Alexander H. Nitz (1 and 2) ((1) Max-Planck-Institut f\"ur Gravitationsphysik (Albert-Einstein-Institut), (2) Leibniz Universit\"at Hannover)
Detection of gravitational-wave signals from binary neutron star mergers using machine learning
14 pages, 6 figures, 1 table, supplemental materials at https://github.com/gwastro/bns-machine-learning-search
Phys. Rev. D 102, 063015 (2020)
10.1103/PhysRevD.102.063015
null
astro-ph.HE astro-ph.IM cs.LG gr-qc
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As two neutron stars merge, they emit gravitational waves that can potentially be detected by earth bound detectors. Matched-filtering based algorithms have traditionally been used to extract quiet signals embedded in noise. We introduce a novel neural-network based machine learning algorithm that uses time series strain data from gravitational-wave detectors to detect signals from non-spinning binary neutron star mergers. For the Advanced LIGO design sensitivity, our network has an average sensitive distance of 130 Mpc at a false-alarm rate of 10 per month. Compared to other state-of-the-art machine learning algorithms, we find an improvement by a factor of 6 in sensitivity to signals with signal-to-noise ratio below 25. However, this approach is not yet competitive with traditional matched-filtering based methods. A conservative estimate indicates that our algorithm introduces on average 10.2 s of latency between signal arrival and generating an alert. We give an exact description of our testing procedure, which can not only be applied to machine learning based algorithms but all other search algorithms as well. We thereby improve the ability to compare machine learning and classical searches.
[{'version': 'v1', 'created': 'Tue, 2 Jun 2020 10:20:11 GMT'}, {'version': 'v2', 'created': 'Mon, 28 Sep 2020 12:52:49 GMT'}]
2020-09-29
[['Schäfer', 'Marlin B.', '', '1 and 2'], ['Ohme', 'Frank', '', '1 and 2'], ['Nitz', 'Alexander H.', '', '1 and 2']]
1208.0285
Mahashweta Das
Mahashweta Das, Saravanan Thirumuruganathan, Sihem Amer-Yahia, Gautam Das, Cong Yu
Who Tags What? An Analysis Framework
VLDB2012
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp. 1567-1578 (2012)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rise of Web 2.0 is signaled by sites such as Flickr, del.icio.us, and YouTube, and social tagging is essential to their success. A typical tagging action involves three components, user, item (e.g., photos in Flickr), and tags (i.e., words or phrases). Analyzing how tags are assigned by certain users to certain items has important implications in helping users search for desired information. In this paper, we explore common analysis tasks and propose a dual mining framework for social tagging behavior mining. This framework is centered around two opposing measures, similarity and diversity, being applied to one or more tagging components, and therefore enables a wide range of analysis scenarios such as characterizing similar users tagging diverse items with similar tags, or diverse users tagging similar items with diverse tags, etc. By adopting different concrete measures for similarity and diversity in the framework, we show that a wide range of concrete analysis problems can be defined and they are NP-Complete in general. We design efficient algorithms for solving many of those problems and demonstrate, through comprehensive experiments over real data, that our algorithms significantly out-perform the exact brute-force approach without compromising analysis result quality.
[{'version': 'v1', 'created': 'Wed, 1 Aug 2012 17:20:05 GMT'}]
2012-08-02
[['Das', 'Mahashweta', ''], ['Thirumuruganathan', 'Saravanan', ''], ['Amer-Yahia', 'Sihem', ''], ['Das', 'Gautam', ''], ['Yu', 'Cong', '']]
cond-mat/0602549
M. T. Yamashita
M. T. Yamashita, Lauro Tomio, A. Delfino and T. Frederico
Four-boson scale near a Feshbach resonance
null
Europhys. Lett. 75, 555 (2006)
10.1209/epl/i2006-10141-6
null
cond-mat.soft physics.atom-ph
null
We show that an independent four-body momentum scale $\mu_{(4)}$ drives the tetramer binding energy for fixed trimer energy (or three-body scale $\mu_{(3)}$) and large scattering length ($a$). The three- and four-body forces from the one-channel reduction of the atomic interaction near a Feshbach resonance disentangle $\mu_{(4)}$ and $\mu_{(3)}$. The four-body independent scale is also manifested through a family of Tjon-lines, with slope given by $\mu_{(4)}/\mu_{(3)}$ for $a^{-1}=0$. There is the possibility of a new renormalization group limit cycle due to the new scale.
[{'version': 'v1', 'created': 'Thu, 23 Feb 2006 12:54:47 GMT'}, {'version': 'v2', 'created': 'Fri, 27 Oct 2006 13:39:22 GMT'}]
2009-11-11
[['Yamashita', 'M. T.', ''], ['Tomio', 'Lauro', ''], ['Delfino', 'A.', ''], ['Frederico', 'T.', '']]
2208.03898
Naihao Deng
Yulong Chen, Naihao Deng, Yang Liu, Yue Zhang
DialogSum Challenge: Results of the Dialogue Summarization Shared Task
INLG 2021 DialogSum Challenge Result Report. Link to this report on INLG website: https://inlgmeeting.github.io/poster_paper43.html. Presentation video on YouTube: https://www.youtube.com/watch?v=5Bk3tNr_1ng; on Bilibili: https://www.bilibili.com/video/BV13e4y1h7eB?spm_id_from=444.41.list.card_archive.click
null
null
null
cs.CL
http://creativecommons.org/licenses/by-sa/4.0/
We report the results of DialogSum Challenge, the shared task on summarizing real-life scenario dialogues at INLG 2022. Four teams participate in this shared task and three submit their system reports, exploring different methods to improve the performance of dialogue summarization. Although there is a great improvement over the baseline models regarding automatic evaluation metrics, such as Rouge scores, we find that there is a salient gap between model generated outputs and human annotated summaries by human evaluation from multiple aspects. These findings demonstrate the difficulty of dialogue summarization and suggest that more fine-grained evaluatuion metrics are in need.
[{'version': 'v1', 'created': 'Mon, 8 Aug 2022 03:39:42 GMT'}, {'version': 'v2', 'created': 'Tue, 9 Aug 2022 02:28:02 GMT'}, {'version': 'v3', 'created': 'Sat, 3 Sep 2022 05:08:20 GMT'}]
2022-09-07
[['Chen', 'Yulong', ''], ['Deng', 'Naihao', ''], ['Liu', 'Yang', ''], ['Zhang', 'Yue', '']]
1910.06149
Yujia Ding
Yujia Ding and Weiqing Gu
Accelerometer-Based Gait Segmentation: Simultaneously User and Adversary Identification
null
null
null
null
eess.SP cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a new gait segmentation method based on accelerometer data and develop a new distance function between two time series, showing novel and effectiveness in simultaneously identifying user and adversary. Comparing with the normally used Neural Network methods, our approaches use geometric features to extract walking cycles more precisely and employ a new similarity metric to conduct user-adversary identification. This new technology for simultaneously identify user and adversary contributes to cybersecurity beyond user-only identification. In particular, the new technology is being applied to cell phone recorded walking data and performs an accuracy of $98.79\%$ for 6 classes classification (user-adversary identification) and $99.06\%$ for binary classification (user only identification). In addition to walking signal, our approach works on walking up, walking down and mixed walking signals. This technology is feasible for both large and small data set, overcoming the current challenges facing to Neural Networks such as tuning large number of hyper-parameters for large data sets and lacking of training data for small data sets. In addition, the new distance function developed here can be applied in any signal analysis.
[{'version': 'v1', 'created': 'Fri, 11 Oct 2019 06:45:30 GMT'}]
2019-10-15
[['Ding', 'Yujia', ''], ['Gu', 'Weiqing', '']]

This is the same datasets as in Kaggle (https://www.kaggle.com/datasets/Cornell-University/arxiv)

Only selected for CS category

Downloads last month
0
Edit dataset card