ID
int64 1
21k
| TITLE
stringlengths 7
239
| ABSTRACT
stringlengths 7
2.76k
| Computer Science
int64 0
1
| Physics
int64 0
1
| Mathematics
int64 0
1
| Statistics
int64 0
1
| Quantitative Biology
int64 0
1
| Quantitative Finance
int64 0
1
|
---|---|---|---|---|---|---|---|---|
20,501 | Chaotic behavior in Casimir oscillators: A case study for phase change materials | Casimir forces between material surfaces at close proximity of less than 200
nm can lead to increased chaotic behavior of actuating devices depending on the
strength of the Casimir interaction. We investigate these phenomena for phase
change materials in torsional oscillators, where the amorphous to crystalline
phase transitions lead to transitions between high and low Casimir force and
torque states respectively, without material compositions. For a conservative
system bifurcation curve and Poincare maps analysis show the absence of chaotic
behavior but with the crystalline phase (high force/torque state) favoring more
unstable behavior and stiction. However, for a non-conservative system chaotic
behavior can occur introducing significant risk for stiction, which is again
more pronounced for the crystalline phase. The latter illustrates the more
general scenario that stronger Casimir forces and torques increase the
possibility for chaotic behavior. The latter is making impossible to predict
whether stiction or stable actuation will occur on a long term basis, and it is
setting limitations in the design of micro/nano devices operating at short
range nanoscale separations.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,502 | Confluence in Probabilistic Rewriting | Driven by the interest of reasoning about probabilistic programming
languages, we set out to study a notion of unicity of normal forms for them. To
provide a tractable proof method for it, we define a property of distribution
confluence which is shown to imply the desired uniqueness (even for infinite
sequences of reduction) and further properties. We then carry over several
criteria from the classical case, such as Newman's lemma, to simplify proving
confluence in concrete languages. Using these criteria, we obtain simple proofs
of confluence for $\lambda_1$, an affine probabilistic $\lambda$-calculus, and
for Q$^*$, a quantum programming language for which a related property has
already been proven in the literature.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,503 | Structure preserving schemes for mean-field equations of collective behavior | In this paper we consider the development of numerical schemes for mean-field
equations describing the collective behavior of a large group of interacting
agents. The schemes are based on a generalization of the classical Chang-Cooper
approach and are capable to preserve the main structural properties of the
systems, namely nonnegativity of the solution, physical conservation laws,
entropy dissipation and stationary solutions. In particular, the methods here
derived are second order accurate in transient regimes whereas they can reach
arbitrary accuracy asymptotically for large times. Several examples are
reported to show the generality of the approach.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,504 | Localization optoacoustic tomography | Localization-based imaging has revolutionized fluorescence optical microscopy
and has also enabled unprecedented ultrasound images of microvascular
structures in deep tissues. Herein, we introduce a new concept of localization
optoacoustic tomography (LOAT) that employs rapid sequential acquisition of
three-dimensional optoacoustic images from flowing absorbing particles. We show
that the new method enables breaking through the spatial resolution barrier of
acoustic diffraction while further enhancing the visibility of structures under
limited-view tomographic conditions. Given the intrinsic sensitivity of
optoacoustics to multiple hemodynamic and oxygenation parameters, LOAT may
enable new level of performance in studying functional and anatomical
alterations of microcirculation.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,505 | Reduced-basis approach to many-body localization | Within the standard model of many-body localization, i.e., the disordered
chain of spinless fermions, we investigate how the interaction affects the
many-body states in the basis of noninteracting localized Anderson states. From
this starting point we follow the approach that uses a reduced basis of
many-body states. Together with an extrapolation to the full basis, it proves
to be efficient for the evaluation of the stiffnesses of local observables,
which remain finite within the non-ergodic regime and represent the hallmark of
the many-body localization (MBL). The method enables a larger span of system
sizes and, within the MBL regime, allows for a more careful analysis of the
size scaling of calculated quantities. On the other hand, the survival
stiffness as the representative of non--local quantities, reveals limitations
of the reduced-basis approach.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,506 | Electron-correlation study of Y III-Tc VII ions using a relativistic coupled-cluster theory | Spectroscopic properties, useful for plasma diagnostics and astrophysics, of
a few rubidium-like ions are studied here. We choose one of the simplest, but
correlationally challenging series where $d-$ and $f-$ orbitals are present in
the core and/or valence shells with $4d$ $^2D_{3/2}$ as the ground state. We
study different correlation characteristics of this series and make precise
calculations of electronic structure and rates of electromagnetic transitions.
Our calculated lifetimes and transition rates are compared with other available
experimental and theoretical values. Radiative rates of vacuum ultra-violet
electromagnetic transitions of the long lived Tc$^{6+}$ ion, useful in several
areas of physics and chemistry, are estimated. To the best of our knowledge,
there is no literature for most of these transitions.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,507 | Align and Copy: UZH at SIGMORPHON 2017 Shared Task for Morphological Reinflection | This paper presents the submissions by the University of Zurich to the
SIGMORPHON 2017 shared task on morphological reinflection. The task is to
predict the inflected form given a lemma and a set of morpho-syntactic
features. We focus on neural network approaches that can tackle the task in a
limited-resource setting. As the transduction of the lemma into the inflected
form is dominated by copying over lemma characters, we propose two recurrent
neural network architectures with hard monotonic attention that are strong at
copying and, yet, substantially different in how they achieve this. The first
approach is an encoder-decoder model with a copy mechanism. The second approach
is a neural state-transition system over a set of explicit edit actions,
including a designated COPY action. We experiment with character alignment and
find that naive, greedy alignment consistently produces strong results for some
languages. Our best system combination is the overall winner of the SIGMORPHON
2017 Shared Task 1 without external resources. At a setting with 100 training
samples, both our approaches, as ensembles of models, outperform the next best
competitor.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,508 | Krylov methods for low-rank commuting generalized Sylvester equations | We consider generalizations of the Sylvester matrix equation, consisting of
the sum of a Sylvester operator and a linear operator $\Pi$ with a particular
structure. More precisely, the commutator of the matrix coefficients of the
operator $\Pi$ and the Sylvester operator coefficients are assumed to be
matrices with low rank. We show (under certain additional conditions) low-rank
approximability of this problem, i.e., the solution to this matrix equation can
be approximated with a low-rank matrix. Projection methods have successfully
been used to solve other matrix equations with low-rank approximability. We
propose a new projection method for this class of matrix equations. The choice
of subspace is a crucial ingredient for any projection method for matrix
equations. Our method is based on an adaption and extension of the extended
Krylov subspace method for Sylvester equations. A constructive choice of the
starting vector/block is derived from the low-rank commutators. We illustrate
the effectiveness of our method by solving large-scale matrix equations arising
from applications in control theory and the discretization of PDEs. The
advantages of our approach in comparison to other methods are also illustrated.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,509 | Atomic-scale origin of dynamic viscoelastic response and creep in disordered solids | Viscoelasticity has been described since the time of Maxwell as an
interpolation of purely viscous and purely elastic response, but its
microscopic atomic-level mechanism in solids has remained elusive. We studied
three model disordered solids: a random lattice, the bond-depleted fcc lattice,
and the fcc lattice with vacancies. Within the harmonic approximation for
central-force lattices, we applied sum-rules for viscoelastic response derived
on the basis of non-affine atomic motions. The latter motions are a direct
result of local structural disorder, and in particular, of the lack of
inversion-symmetry in disordered lattices. By defining a suitable quantitative
and general atomic-level measure of nonaffinity and inversion-symmetry, we show
that the viscoelastic responses of all three systems collapse onto a master
curve upon normalizing by the overall strength of inversion-symmetry breaking
in each system. Close to the isostatic point for central-force lattices,
power-law creep $G(t)\sim t^{-1/2}$ emerges as a consequence of the interplay
between soft vibrational modes and non-affine dynamics, and various analytical
scalings, supported by numerical calculations, are predicted by the theory.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,510 | On-sky closed loop correction of atmospheric dispersion for high-contrast coronagraphy and astrometry | Adaptive optic (AO) systems delivering high levels of wavefront correction
are now common at observatories. One of the main limitations to image quality
after wavefront correction comes from atmospheric refraction. An Atmospheric
dispersion compensator (ADC) is employed to correct for atmospheric refraction.
The correction is applied based on a look-up table consisting of dispersion
values as a function of telescope elevation angle. The look-up table based
correction of atmospheric dispersion results in imperfect compensation leading
to the presence of residual dispersion in the point-spread function (PSF) and
is insufficient when sub-milliarcsecond precision is required. The presence of
residual dispersion can limit the achievable contrast while employing
high-performance coronagraphs or can compromise high-precision astrometric
measurements. In this paper, we present the first on-sky closed-loop correction
of atmospheric dispersion by directly using science path images. The concept
behind the measurement of dispersion utilizes the chromatic scaling of focal
plane speckles. An adaptive speckle grid generated with a deformable mirror
(DM) that has a sufficiently large number of actuators is used to accurately
measure the residual dispersion and subsequently correct it by driving the ADC.
We have demonstrated with the Subaru Coronagraphic Extreme AO (SCExAO) system
on-sky closed-loop correction of residual dispersion to < 1 mas across H-band.
This work will aid in the direct detection of habitable exoplanets with
upcoming extremely large telescopes (ELTs) and also provide a diagnostic tool
to test the performance of instruments which require sub-milliarcsecond
correction.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,511 | Experimental observations and modelling of intrinsic rotation reversals in tokamaks | The progress made in understanding spontaneous toroidal rotation reversals in
tokamaks is reviewed and current ideas to solve this ten-year-old puzzle are
explored. The paper includes a summarial synthesis of the experimental
observations in AUG, C-Mod, KSTAR, MAST and TCV tokamaks, reasons why turbulent
momentum transport is thought to be responsible for the reversals, a review of
the theory of turbulent momentum transport and suggestions for future
investigations.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,512 | Where, When, and How mmWave is Used in 5G and Beyon | Wireless engineers and business planners commonly raise the question on
where, when, and how millimeter-wave (mmWave) will be used in 5G and beyond.
Since the next generation network is not just a new radio access standard, but
instead an integration of networks for vertical markets with diverse
applications, answers to the question depend on scenarios and use cases to be
deployed. This paper gives four 5G mmWave deployment examples and describes in
chronological order the scenarios and use cases of their probable deployment,
including expected system architectures and hardware prototypes. The paper
starts with 28 GHz outdoor backhauling for fixed wireless access and moving
hotspots, which will be demonstrated at the PyeongChang winter Olympic games in
2018. The second deployment example is a 60 GHz unlicensed indoor access system
at the Tokyo-Narita airport, which is combined with Mobile Edge Computing (MEC)
to enable ultra-high speed content download with low latency. The third example
is mmWave mesh network to be used as a micro Radio Access Network ({\mu}-RAN),
for cost-effective backhauling of small-cell Base Stations (BSs) in dense urban
scenarios. The last example is mmWave based Vehicular-to-Vehicular (V2V) and
Vehicular-to-Everything (V2X) communications system, which enables automated
driving by exchanging High Definition (HD) dynamic map information between cars
and Roadside Units (RSUs). For 5G and beyond, mmWave and MEC will play
important roles for a diverse set of applications that require both ultra-high
data rate and low latency communications.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,513 | A simple script language for choreography of multiple, synchronizing non-anthropomorphic robots | The scripting language described in this document is (in the first place)
intended to be used on robots developed by Anja M{\o}lle Lindelof and Henning
Christiansen as part of a research project about robots performing on stage.
The target robots are expected to appear as familiar domestic objects that
take their own life, so to speak, and perhaps perform together with human
players, creating at illusion of a communication between them. In the current
version, these robots' common behaviour is determined uniquely by a script
written in the language described here -- the only possible autonomy for the
robots is action to correct dynamically for inaccuracies that arise during a
performance.
The present work is preliminary and has not been compared to properly to
other research work in this area, and the testing is still limited. A first
implementation on small Lego Mindstorms based robots is under development by
Mads Saustrup Fox as part of his master thesis work.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,514 | Stability results for abstract evolution equations with intermittent time-delay feedback | We consider abstract evolution equations with on-off time delay feedback.
Without the time delay term, the model is described by an exponentially stable
semigroup. We show that, under appropriate conditions involving the delay term,
the system remains asymptotically stable. Under additional assumptions
exponential stability results are also obtained. Concrete examples illustrating
the abstract results are finally given.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,515 | Solar wind turbulent cascade from MHD to sub-ion scales: large-size 3D hybrid particle-in-cell simulations | Spectral properties of the turbulent cascade from fluid to kinetic scales in
collisionless plasmas are investigated by means of large-size three-dimensional
(3D) hybrid (fluid electrons, kinetic protons) particle-in-cell simulations.
Initially isotropic Alfvènic fluctuations rapidly develop a strongly
anisotropic turbulent cascade, mainly in the direction perpendicular to the
ambient magnetic field. The omnidirectional magnetic field spectrum shows a
double power-law behavior over almost two decades in wavenumber, with a
Kolmogorov-like index at large scales, a spectral break around ion scales, and
a steepening at sub-ion scales. Power laws are also observed in the spectra of
the ion bulk velocity, density, and electric field, both at magnetohydrodynamic
(MHD) and at kinetic scales. Despite the complex structure, the omnidirectional
spectra of all fields at ion and sub-ion scales are in remarkable quantitative
agreement with those of a two-dimensional (2D) simulation with similar physical
parameters. This provides a partial, a-posteriori validation of the 2D
approximation at kinetic scales. Conversely, at MHD scales, the spectra of the
density and of the velocity (and, consequently, of the electric field) exhibit
differences between the 2D and 3D cases. Although they can be partly ascribed
to the lower spatial resolution, the main reason is likely the larger
importance of compressible effects in a full geometry. Our findings are also in
remarkable quantitative agreement with solar wind observations.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,516 | Blind source separation of tensor-valued time series | The blind source separation model for multivariate time series generally
assumes that the observed series is a linear transformation of an unobserved
series with temporally uncorrelated or independent components. Given the
observations, the objective is to find a linear transformation that recovers
the latent series. Several methods for accomplishing this exist and three
particular ones are the classic SOBI and the recently proposed generalized FOBI
(gFOBI) and generalized JADE (gJADE), each based on the use of joint lagged
moments. In this paper we generalize the methodologies behind these algorithms
for tensor-valued time series. We assume that our data consists of a tensor
observed at each time point and that the observations are linear
transformations of latent tensors we wish to estimate. The tensorial
generalizations are shown to have particularly elegant forms and we show that
each of them is Fisher consistent and orthogonal equivariant. Comparing the new
methods with the original ones in various settings shows that the tensorial
extensions are superior to both their vector-valued counterparts and to two
existing tensorial dimension reduction methods for i.i.d. data. Finally,
applications to fMRI-data and video processing show that the methods are
capable of extracting relevant information from noisy high-dimensional data.
| 0 | 0 | 1 | 1 | 0 | 0 |
20,517 | Mixed Cages | We introduce the notion of a $[z, r; g]$-mixed cage. A $[z, r; g]$-mixed cage
is a mixed graph $G$, $z$-regular by arcs, $r$-regular by edges, with girth $g$
and minimum order. In this paper we prove the existence of $[z, r ;g]$-mixed
cages and exhibit families of mixed cages for some specific values. We also
give lower and upper bounds for some choices of $z, r$ and $g$. In particular
we present the first results on $[z,r;g]$- mixed cages for $z=1$ and any $r\geq
1$ and $g\geq 3$, and for any $z\geq 1$, $r=1$ and $g=4$.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,518 | Single-beam dielectric-microsphere trapping with optical heterodyne detection | A technique to levitate and measure the three-dimensional position of
micrometer-sized dielectric spheres with heterodyne detection is presented. The
two radial degrees of freedom are measured by interfering light transmitted
through the microsphere with a reference wavefront, while the axial degree of
freedom is measured from the phase of the light reflected from the surface of
the microsphere. This method pairs the simplicity and accessibility of single
beam optical traps to a measurement of displacement that is intrinsically
calibrated by the wavelength of the trapping light and has exceptional immunity
to stray light. A theoretical shot noise limit of
$1.3\times10^{-13}\,\text{m}/\sqrt{\text{Hz}}$ for the radial degrees of
freedom, and $3.0\times10^{-15} \, \text{m}/\sqrt{\text{Hz}}$ for the axial
degree of freedom can be obtained in the system described. The measured
acceleration noise in the radial direction is $7.5\times10^{-5} \,
(\text{m/s}^2)/\sqrt{\text{Hz}}$.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,519 | An Empirical Analysis of Traceability in the Monero Blockchain | Monero is a privacy-centric cryptocurrency that allows users to obscure their
transactions by including chaff coins, called "mixins," along with the actual
coins they spend. In this paper, we empirically evaluate two weaknesses in
Monero's mixin sampling strategy. First, about 62% of transaction inputs with
one or more mixins are vulnerable to "chain-reaction" analysis -- that is, the
real input can be deduced by elimination. Second, Monero mixins are sampled in
such a way that they can be easily distinguished from the real coins by their
age distribution; in short, the real input is usually the "newest" input. We
estimate that this heuristic can be used to guess the real input with 80%
accuracy over all transactions with 1 or more mixins. Next, we turn to the
Monero ecosystem and study the importance of mining pools and the former
anonymous marketplace AlphaBay on the transaction volume. We find that after
removing mining pool activity, there remains a large amount of potentially
privacy-sensitive transactions that are affected by these weaknesses. We
propose and evaluate two countermeasures that can improve the privacy of future
transactions.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,520 | Automatic Face Image Quality Prediction | Face image quality can be defined as a measure of the utility of a face image
to automatic face recognition. In this work, we propose (and compare) two
methods for automatic face image quality based on target face quality values
from (i) human assessments of face image quality (matcher-independent), and
(ii) quality values computed from similarity scores (matcher-dependent). A
support vector regression model trained on face features extracted using a deep
convolutional neural network (ConvNet) is used to predict the quality of a face
image. The proposed methods are evaluated on two unconstrained face image
databases, LFW and IJB-A, which both contain facial variations with multiple
quality factors. Evaluation of the proposed automatic face image quality
measures shows we are able to reduce the FNMR at 1% FMR by at least 13% for two
face matchers (a COTS matcher and a ConvNet matcher) by using the proposed face
quality to select subsets of face images and video frames for matching
templates (i.e., multiple faces per subject) in the IJB-A protocol. To our
knowledge, this is the first work to utilize human assessments of face image
quality in designing a predictor of unconstrained face quality that is shown to
be effective in cross-database evaluation.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,521 | Stochastic Block Models are a Discrete Surface Tension | Networks, which represent agents and interactions between them, arise in
myriad applications throughout the sciences, engineering, and even the
humanities. To understand large-scale structure in a network, a common task is
to cluster a network's nodes into sets called "communities" such that there are
dense connections within communities but sparse connections between them. A
popular and statistically principled method to perform such clustering is to
use a family of generative models known as stochastic block models (SBMs). In
this paper, we show that maximum likelihood estimation in an SBM is a network
analog of a well-known continuum surface-tension problem that arises from an
application in metallurgy. To illustrate the utility of this bridge, we
implement network analogs of three surface-tension algorithms, with which we
successfully recover planted community structure in synthetic networks and
which yield fascinating insights on empirical networks from the field of
hyperspectral video segmentation.
| 1 | 0 | 0 | 1 | 0 | 0 |
20,522 | Robust d-wave pairing symmetry in multi-orbital cobalt high temperature superconductors | The pairing symmetry of the newly proposed cobalt high temperature
(high-$T_c$) superconductors formed by vertex shared cation-anion tetrahedral
complexes is studied by the methods of mean field, random phase approximation
(RPA) and functional renormalization group (FRG) analysis. The results of all
these methods show that the $d_{x^2-y^2}$ pairing symmetry is robustly favored
near half filling. The RPA and FRG methods, which are valid in weak interaction
regions, predict that the superconducting state is also strongly orbital
selective, namely the $d_{x^2-y^2}$ orbital that has the largest density near
half filling among the three $t_{2g}$ orbitals dominates superconducting
pairing. These results suggest that the new materials, if synthesized, can
provide indisputable test to high-$T_c$ pairing mechanism and the validity of
different theoretical methods.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,523 | Thermodynamic properties of Ba$_2$CoSi$_2$O$_6$Cl$_2$ in strong magnetic field: Realization of flat-band physics in a highly frustrated quantum magnet | The search for flat-band solid-state realizations is a crucial issue to
verify or to challenge theoretical predictions for quantum many-body flat-band
systems. For frustrated quantum magnets flat bands lead to various
unconventional properties related to the existence of localized many-magnon
states. The recently synthesized magnetic compound Ba$_2$CoSi$_2$O$_6$Cl$_2$
seems to be an almost perfect candidate to observe these features in
experiments. We develop a theory for Ba$_2$CoSi$_2$O$_6$Cl$_2$ by adapting the
localized-magnon concept to this compound. We first show that our theory
describes the known experimental facts and then we propose new experimental
studies to detect a field-driven phase transition related to a
Wigner-crystal-like ordering of localized magnons at low temperatures.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,524 | Fisher Information and Natural Gradient Learning of Random Deep Networks | A deep neural network is a hierarchical nonlinear model transforming input
signals to output signals. Its input-output relation is considered to be
stochastic, being described for a given input by a parameterized conditional
probability distribution of outputs. The space of parameters consisting of
weights and biases is a Riemannian manifold, where the metric is defined by the
Fisher information matrix. The natural gradient method uses the steepest
descent direction in a Riemannian manifold, so it is effective in learning,
avoiding plateaus. It requires inversion of the Fisher information matrix,
however, which is practically impossible when the matrix has a huge number of
dimensions. Many methods for approximating the natural gradient have therefore
been introduced. The present paper uses statistical neurodynamical method to
reveal the properties of the Fisher information matrix in a net of random
connections under the mean field approximation. We prove that the Fisher
information matrix is unit-wise block diagonal supplemented by small order
terms of off-block-diagonal elements, which provides a justification for the
quasi-diagonal natural gradient method by Y. Ollivier. A unitwise
block-diagonal Fisher metrix reduces to the tensor product of the Fisher
information matrices of single units. We further prove that the Fisher
information matrix of a single unit has a simple reduced form, a sum of a
diagonal matrix and a rank 2 matrix of weight-bias correlations. We obtain the
inverse of Fisher information explicitly. We then have an explicit form of the
natural gradient, without relying on the numerical matrix inversion, which
drastically speeds up stochastic gradient learning.
| 0 | 0 | 0 | 1 | 0 | 0 |
20,525 | Dynamic of plumes and scaling during the melting of a Phase Change Material heated from below | We identify and describe the main dynamic regimes occurring during the
melting of the PCM n-octadecane in horizontal layers of several sizes heated
from below. This configuration allows to cover a wide range of effective
Rayleigh numbers on the liquid PCM phase, up to $\sim 10^9$, without changing
any external parameter control. We identify four different regimes as time
evolves: (i) the conductive regime, (ii) linear regime, (iii) coarsening regime
and (iv) turbulent regime. The first two regimes appear at all domain sizes.
However the third and fourth regime require a minimum advance of the
solid/liquid interface to develop, and we observe them only for large enough
domains.
The transition to turbulence takes places after a secondary instability that
forces the coarsening of the thermal plumes. Each one of the melting regimes
creates a distinct solid/liquid front that characterizes the internal state of
the melting process. We observe that most of the magnitudes of the melting
process are ruled by power laws, although not all of them. Thus the number of
plumes, some regimes of the Rayleigh number as a function of time, the number
of plumes after the primary and secondary instability, the thermal and kinetic
boundary layers follow simple power laws. In particular, we find that the
Nusselt number scales with the Rayleigh number as $Nu \sim Ra^{0.29}$ in the
turbulent regime, consistent with theories and experiments on Rayleigh-Bénard
convection that show an exponent $2/7$.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,526 | Parallel mean curvature surfaces in four-dimensional homogeneous spaces | We survey different classification results for surfaces with parallel mean
curvature immersed into some Riemannian homogeneous four-manifolds, including
real and complex space forms, and product spaces. We provide a common framework
for this problem, with special attention to the existence of holomorphic
quadratic differentials on such surfaces. The case of spheres with parallel
mean curvature is also explained in detail, as well as the state-of-the-art
advances in the general problem.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,527 | Recent implementations, applications, and extensions of the Locally Optimal Block Preconditioned Conjugate Gradient method (LOBPCG) | Since introduction [A. Knyazev, Toward the optimal preconditioned
eigensolver: Locally optimal block preconditioned conjugate gradient method,
SISC (2001) DOI:10.1137/S1064827500366124] and efficient parallel
implementation [A. Knyazev et al., Block locally optimal preconditioned
eigenvalue xolvers (BLOPEX) in HYPRE and PETSc, SISC (2007)
DOI:10.1137/060661624], LOBPCG has been used is a wide range of applications in
mechanics, material sciences, and data sciences. We review its recent
implementations and applications, as well as extensions of the local optimality
idea beyond standard eigenvalue problems.
| 1 | 0 | 0 | 1 | 0 | 0 |
20,528 | An evaluation of cosmological models from expansion and growth of structure measurements | We compare a large suite of theoretical cosmological models to observational
data from the cosmic microwave background, baryon acoustic oscillation
measurements of expansion, Type Ia SNe measurements of expansion, redshift
space distortion measurements of the growth of structure, and the local Hubble
constant. Our theoretical models include parametrizations of dark energy as
well as physical models of dark energy and modified gravity. We determine the
constraints on the model parameters, incorporating the redshift space
distortion data directly in the analysis. To determine whether models can be
ruled out, we evaluate the $p$ value (the probability under the model of
obtaining data as bad or worse than the observed data). In our comparison, we
find the well known tension of H$_0$ with the other data; no model resolves
this tension successfully. Among the models we consider, the large scale growth
of structure data does not affect the modified gravity models as a category
particularly differently than dark energy models; it matters for some modified
gravity models but not others, and the same is true for dark energy models. We
compute predicted observables for each model under current observational
constraints, and identify models for which future observational constraints
will be particularly informative.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,529 | The variety of $2$-dimensional algebras over an algebraically closed field | The work is devoted to the variety of $2$-dimensional algebras over an
algebraically closed field. Firstly, we classify such algebras modulo
isomorphism. Then we describe the degenerations and the closures of principal
algebra series in the variety under consideration. Finally, we apply our
results to obtain analogous descriptions for the subvarieties of flexible, and
bicommutative algebras. In particular, we describe rigid algebras and
irreducible components for these subvarieties.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,530 | A Variational Observation Model of 3D Object for Probabilistic Semantic SLAM | We present a Bayesian object observation model for complete probabilistic
semantic SLAM. Recent studies on object detection and feature extraction have
become important for scene understanding and 3D mapping. However, 3D shape of
the object is too complex to formulate the probabilistic observation model;
therefore, performing the Bayesian inference of the object-oriented features as
well as their pose is less considered. Besides, when the robot equipped with an
RGB mono camera only observes the projected single view of an object, a
significant amount of the 3D shape information is abandoned. Due to these
limitations, semantic SLAM and viewpoint-independent loop closure using
volumetric 3D object shape is challenging. In order to enable the complete
formulation of probabilistic semantic SLAM, we approximate the observation
model of a 3D object with a tractable distribution. We also estimate the
variational likelihood from the 2D image of the object to exploit its observed
single view. In order to evaluate the proposed method, we perform pose and
feature estimation, and demonstrate that the automatic loop closure works
seamlessly without additional loop detector in various environments.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,531 | Generation of optical frequency combs via four-wave mixing processes for low- and medium-resolution astronomy | We investigate the generation of optical frequency combs through a cascade of
four-wave mixing processes in nonlinear fibres with optimised parameters. The
initial optical field consists of two continuous-wave lasers with frequency
separation larger than 40 GHz (312.7 pm at 1531 nm). It propagates through
three nonlinear fibres. The first fibre serves to pulse shape the initial
sinusoidal-square pulse, while a strong pulse compression down to sub-100 fs
takes place in the second fibre which is an amplifying erbium-doped fibre. The
last stage is a low-dispersion highly nonlinear fibre where the frequency comb
bandwidth is increased and the line intensity is equalised. We model this
system using the generalised nonlinear Schrödinger equation and investigate
it in terms of fibre lengths, fibre dispersion, laser frequency separation and
input powers with the aim to minimise the frequency comb noise. With the
support of the numerical results, a frequency comb is experimentally generated,
first in the near infra-red and then it is frequency-doubled into the visible
spectral range. Using a MUSE-type spectrograph, we evaluate the comb
performance for astronomical wavelength calibration in terms of equidistancy of
the comb lines and their stability.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,532 | Cross-referencing Social Media and Public Surveillance Camera Data for Disaster Response | Physical media (like surveillance cameras) and social media (like Instagram
and Twitter) may both be useful in attaining on-the-ground information during
an emergency or disaster situation. However, the intersection and reliability
of both surveillance cameras and social media during a natural disaster are not
fully understood. To address this gap, we tested whether social media is of
utility when physical surveillance cameras went off-line during Hurricane Irma
in 2017. Specifically, we collected and compared geo-tagged Instagram and
Twitter posts in the state of Florida during times and in areas where public
surveillance cameras went off-line. We report social media content and
frequency and content to determine the utility for emergency managers or first
responders during a natural disaster.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,533 | Nonlinear Dynamics of a Viscous Bubbly Fluid | A physical model of a three-dimensional flow of a viscous bubbly fluid in an
intermediate regime between bubble formation and breakage is presented. The
model is based on mechanics and thermodynamics of a single bubble coupled to
the dynamics of a viscous fluid as a whole, and takes into account multiple
physical effects, including gravity, viscosity, and surface tension.
Dimensionless versions of the resulting nonlinear model are obtained, and
values of dimensionless parameters are estimated for typical magma flows in
horizontal subaerial lava fields and vertical volcanic conduits.
Exact solutions of the resulting system of nonlinear equations corresponding
to equilibrium flows and traveling waves are analyzed in the one-dimensional
setting. Generalized Su-Gardner-type perturbation analysis is employed to study
approximate solutions of the model in the long-wave ansatz. Simplified
nonlinear partial differential equations (PDE) satisfied by the leading terms
of the perturbation solutions are systematically derived. It is shown that for
specific classes of perturbations, approximate solutions of the bubbly fluid
model arise from solutions of the classical diffusion, Burgers,
variable-coefficient Burgers, and Korteweg-de Vries equations.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,534 | ConvNet-Based Localization of Anatomical Structures in 3D Medical Images | Localization of anatomical structures is a prerequisite for many tasks in
medical image analysis. We propose a method for automatic localization of one
or more anatomical structures in 3D medical images through detection of their
presence in 2D image slices using a convolutional neural network (ConvNet).
A single ConvNet is trained to detect presence of the anatomical structure of
interest in axial, coronal, and sagittal slices extracted from a 3D image. To
allow the ConvNet to analyze slices of different sizes, spatial pyramid pooling
is applied. After detection, 3D bounding boxes are created by combining the
output of the ConvNet in all slices.
In the experiments 200 chest CT, 100 cardiac CT angiography (CTA), and 100
abdomen CT scans were used. The heart, ascending aorta, aortic arch, and
descending aorta were localized in chest CT scans, the left cardiac ventricle
in cardiac CTA scans, and the liver in abdomen CT scans. Localization was
evaluated using the distances between automatically and manually defined
reference bounding box centroids and walls.
The best results were achieved in localization of structures with clearly
defined boundaries (e.g. aortic arch) and the worst when the structure boundary
was not clearly visible (e.g. liver). The method was more robust and accurate
in localization multiple structures.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,535 | Gradient estimates for heat kernels and harmonic functions | Let $(X,d,\mu)$ be a doubling metric measure space endowed with a Dirichlet
form $\E$ deriving from a "carré du champ". Assume that $(X,d,\mu,\E)$
supports a scale-invariant $L^2$-Poincaré inequality. In this article, we
study the following properties of harmonic functions, heat kernels and Riesz
transforms for $p\in (2,\infty]$:
(i) $(G_p)$: $L^p$-estimate for the gradient of the associated heat
semigroup;
(ii) $(RH_p)$: $L^p$-reverse Hölder inequality for the gradients of
harmonic functions;
(iii) $(R_p)$: $L^p$-boundedness of the Riesz transform ($p<\infty$);
(iv) $(GBE)$: a generalised Bakry-Émery condition.
We show that, for $p\in (2,\infty)$, (i), (ii) (iii) are equivalent, while
for $p=\infty$, (i), (ii), (iv) are equivalent.
Moreover, some of these equivalences still hold under weaker conditions than
the $L^2$-Poincaré inequality.
Our result gives a characterisation of Li-Yau's gradient estimate of heat
kernels for $p=\infty$, while for $p\in (2,\infty)$ it is a substantial
improvement as well as a generalisation of earlier results by
Auscher-Coulhon-Duong-Hofmann [7] and Auscher-Coulhon [6]. Applications to
isoperimetric inequalities and Sobolev inequalities are given. Our results
apply to Riemannian and sub-Riemannian manifolds as well as to non-smooth
spaces, and to degenerate elliptic/parabolic equations in these settings.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,536 | The Deep Underground Neutrino Experiment -- DUNE: the precision era of neutrino physics | The last decade was remarkable for neutrino physics. In particular, the
phenomenon of neutrino flavor oscillations has been firmly established by a
series of independent measurements. All parameters of the neutrino mixing are
now known and we have elements to plan a judicious exploration of new scenarios
that are opened by these recent advances. With precise measurements, we can
test the 3-neutrino paradigm, neutrino mass hierarchy and CP asymmetry in the
lepton sector. The future long-baseline experiments are considered to be a
fundamental tool to deepen our knowledge of electroweak interactions. The Deep
Underground Neutrino Experiment -- DUNE will detect a broad-band neutrino beam
from Fermilab in an underground massive Liquid Argon Time-Projection Chamber at
an L/E of about $10^3$ km / GeV to reach good sensitivity for CP-phase
measurements and the determination of the mass hierarchy. The dimensions and
the depth of the Far Detector also create an excellent opportunity to look for
rare signals like proton decay to study violation of baryonic number, as well
as supernova neutrino bursts, broadening the scope of the experiment to
astrophysics and associated impacts in cosmology. In this presentation, we will
discuss the physics motivations and the main experimental features of the DUNE
project required to reach its scientific goals.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,537 | Variations of $q$-Garnier system | We study several variants of q-Garnier system corresponding to various
directions of discrete time evolutions. We also investigate a relation between
the $q$-Garnier system and Suzuki's higher order $q$-Painlev/'e system by using
a duality of the $q$-KP system.
| 0 | 1 | 1 | 0 | 0 | 0 |
20,538 | Quantum Quench dynamics in Non-local Luttinger Model: Rigorous Results | We investigate, in the Luttinger model with fixed box potential, the time
evolution of an inhomogeneous state prepared as a localized fermion added to
the noninteracting ground state. We proved that, if the state is evolved with
the interacting Hamiltonian, the averaged density has two peaks moving in
opposite directions, with a constant but renormalized velocity. We also proved
that a dynamical `Landau quasi-particle weight' appears in the oscillating part
of the averaged density, asymptotically vanishing with large time. The results
are proved with the Mattis-Lieb diagonalization method. A simpler proof with
the exact Bosonization formulas is also provided.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,539 | Dynamics of Relaxed Inflation | The cosmological relaxation of the electroweak scale has been proposed as a
mechanism to address the hierarchy problem of the Standard Model. A field, the
relaxion, rolls down its potential and, in doing so, scans the squared mass
parameter of the Higgs, relaxing it to a parametrically small value. In this
work, we promote the relaxion to an inflaton. We couple it to Abelian gauge
bosons, thereby introducing the necessary dissipation mechanism which slows
down the field in the last stages. We describe a novel reheating mechanism,
which relies on the gauge-boson production leading to strong electromagnetic
fields, and proceeds via the vacuum production of electron-positron pairs
through the Schwinger effect. We refer to this mechanism as Schwinger
reheating. We discuss the cosmological dynamics of the model and the
phenomenological constraints from CMB and other experiments. We find that a
cutoff close to the Planck scale may be achieved. In its minimal form, the
model does not generate sufficient curvature perturbations and additional
ingredients, such as a curvaton field, are needed.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,540 | Clustering is semidefinitely not that hard: Nonnegative SDP for manifold disentangling | In solving hard computational problems, semidefinite program (SDP)
relaxations often play an important role because they come with a guarantee of
optimality. Here, we focus on a popular semidefinite relaxation of K-means
clustering which yields the same solution as the non-convex original
formulation for well segregated datasets. We report an unexpected finding: when
data contains (greater than zero-dimensional) manifolds, the SDP solution
captures such geometrical structures. Unlike traditional manifold embedding
techniques, our approach does not rely on manually defining a kernel but rather
enforces locality via a nonnegativity constraint. We thus call our approach
NOnnegative MAnifold Disentangling, or NOMAD. To build an intuitive
understanding of its manifold learning capabilities, we develop a theoretical
analysis of NOMAD on idealized datasets. While NOMAD is convex and the globally
optimal solution can be found by generic SDP solvers with polynomial time
complexity, they are too slow for modern datasets. To address this problem, we
analyze a non-convex heuristic and present a new, convex and yet efficient,
algorithm, based on the conditional gradient method. Our results render NOMAD a
versatile, understandable, and powerful tool for manifold learning.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,541 | Dispersive optical detection of magnetic Feshbach resonances in ultracold gases | Magnetically tunable Feshbach resonances in ultracold atomic systems are
chiefly identified and characterized through time consuming atom loss
spectroscopy. We describe an off-resonant dispersive optical probing technique
to rapidly locate Feshbach resonances and demonstrate the method by locating
four resonances of $^{87}$Rb, between the $|\rm{F} = 1, \rm{m_F}=1 \rangle$ and
$|\rm{F} = 2, \rm{m_F}=0 \rangle$ states. Despite the loss features being
$\lesssim0.1$ G wide, we require only 21 experimental runs to explore a
magnetic field range >18 G, where $1~\rm{G}=10^{-4}$ T. The resonances consist
of two known s-wave features in the vicinity of 9 G and 18 G and two previously
unobserved p-wave features near 5 G and 10 G. We further utilize the dispersive
approach to directly characterize the two-body loss dynamics for each Feshbach
resonance.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,542 | Unveiling Bias Compensation in Turbo-Based Algorithms for (Discrete) Compressed Sensing | In Compressed Sensing, a real-valued sparse vector has to be recovered from
an underdetermined system of linear equations. In many applications, however,
the elements of the sparse vector are drawn from a finite set. Adapted
algorithms incorporating this additional knowledge are required for the
discrete-valued setup. In this paper, turbo-based algorithms for both cases are
elucidated and analyzed from a communications engineering perspective, leading
to a deeper understanding of the algorithm. In particular, we gain the
intriguing insight that the calculation of extrinsic values is equal to the
unbiasing of a biased estimate and present an improved algorithm.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,543 | Accelerated Linear Convergence of Stochastic Momentum Methods in Wasserstein Distances | Momentum methods such as Polyak's heavy ball (HB) method, Nesterov's
accelerated gradient (AG) as well as accelerated projected gradient (APG)
method have been commonly used in machine learning practice, but their
performance is quite sensitive to noise in the gradients. We study these
methods under a first-order stochastic oracle model where noisy estimates of
the gradients are available. For strongly convex problems, we show that the
distribution of the iterates of AG converges with the accelerated
$O(\sqrt{\kappa}\log(1/\varepsilon))$ linear rate to a ball of radius
$\varepsilon$ centered at a unique invariant distribution in the 1-Wasserstein
metric where $\kappa$ is the condition number as long as the noise variance is
smaller than an explicit upper bound we can provide. Our analysis also
certifies linear convergence rates as a function of the stepsize, momentum
parameter and the noise variance; recovering the accelerated rates in the
noiseless case and quantifying the level of noise that can be tolerated to
achieve a given performance. In the special case of strongly convex quadratic
objectives, we can show accelerated linear rates in the $p$-Wasserstein metric
for any $p\geq 1$ with improved sensitivity to noise for both AG and HB through
a non-asymptotic analysis under some additional assumptions on the noise
structure. Our analysis for HB and AG also leads to improved non-asymptotic
convergence bounds in suboptimality for both deterministic and stochastic
settings which is of independent interest. To the best of our knowledge, these
are the first linear convergence results for stochastic momentum methods under
the stochastic oracle model. We also extend our results to the APG method and
weakly convex functions showing accelerated rates when the noise magnitude is
sufficiently small.
| 1 | 0 | 0 | 1 | 0 | 0 |
20,544 | Compressed sensing with sparse corruptions: Fault-tolerant sparse collocation approximations | The recovery of approximately sparse or compressible coefficients in a
Polynomial Chaos Expansion is a common goal in modern parametric uncertainty
quantification (UQ). However, relatively little effort in UQ has been directed
toward theoretical and computational strategies for addressing the sparse
corruptions problem, where a small number of measurements are highly corrupted.
Such a situation has become pertinent today since modern computational
frameworks are sufficiently complex with many interdependent components that
may introduce hardware and software failures, some of which can be difficult to
detect and result in a highly polluted simulation result.
In this paper we present a novel compressive sampling-based theoretical
analysis for a regularized $\ell^1$ minimization algorithm that aims to recover
sparse expansion coefficients in the presence of measurement corruptions. Our
recovery results are uniform, and prescribe algorithmic regularization
parameters in terms of a user-defined a priori estimate on the ratio of
measurements that are believed to be corrupted. We also propose an iteratively
reweighted optimization algorithm that automatically refines the value of the
regularization parameter, and empirically produces superior results. Our
numerical results test our framework on several medium-to-high dimensional
examples of solutions to parameterized differential equations, and demonstrate
the effectiveness of our approach.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,545 | Learning to Remember Rare Events | Despite recent advances, memory-augmented deep neural networks are still
limited when it comes to life-long and one-shot learning, especially in
remembering rare events. We present a large-scale life-long memory module for
use in deep learning. The module exploits fast nearest-neighbor algorithms for
efficiency and thus scales to large memory sizes. Except for the
nearest-neighbor query, the module is fully differentiable and trained
end-to-end with no extra supervision. It operates in a life-long manner, i.e.,
without the need to reset it during training.
Our memory module can be easily added to any part of a supervised neural
network. To show its versatility we add it to a number of networks, from simple
convolutional ones tested on image classification to deep sequence-to-sequence
and recurrent-convolutional models. In all cases, the enhanced network gains
the ability to remember and do life-long one-shot learning. Our module
remembers training examples shown many thousands of steps in the past and it
can successfully generalize from them. We set new state-of-the-art for one-shot
learning on the Omniglot dataset and demonstrate, for the first time, life-long
one-shot learning in recurrent neural networks on a large-scale machine
translation task.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,546 | Stacking-dependent electronic structure of trilayer graphene resolved by nanospot angle-resolved photoemission spectroscopy | The crystallographic stacking order in multilayer graphene plays an important
role in determining its electronic structure. In trilayer graphene,
rhombohedral stacking (ABC) is particularly intriguing, exhibiting a flat band
with an electric-field tunable band gap. Such electronic structure is distinct
from simple hexagonal stacking (AAA) or typical Bernal stacking (ABA), and is
promising for nanoscale electronics, optoelectronics applications. So far clean
experimental electronic spectra on the first two stackings are missing because
the samples are usually too small in size (um or nm scale) to be resolved by
conventional angle-resolved photoemission spectroscopy (ARPES). Here by using
ARPES with nanospot beam size (NanoARPES), we provide direct experimental
evidence for the coexistence of three different stackings of trilayer graphene
and reveal their distinctive electronic structures directly. By fitting the
experimental data, we provide important experimental band parameters for
describing the electronic structure of trilayer graphene with different
stackings.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,547 | Interaction energy between vortices of vector fields on Riemannian surfaces | We study a variational Ginzburg-Landau type model depending on a small
parameter $\epsilon>0$ for (tangent) vector fields on a $2$-dimensional
Riemannian surface. As $\epsilon\to 0$, the vector fields tend to be of unit
length and will have singular points of a (non-zero) index, called vortices.
Our main result determines the interaction energy between these vortices as a
$\Gamma$-limit (at the second order) as $\epsilon\to 0$.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,548 | Multimodal Nonlinear Microscope based on a Compact Fiber-format Laser Source | We present a multimodal non-linear optical (NLO) laser-scanning microscope,
based on a compact fiber-format excitation laser and integrating coherent
anti-Stokes Raman scattering (CARS), stimulated Raman scattering (SRS) and
two-photon-excitation fluorescence (TPEF) on a single platform. We demonstrate
its capabilities in simultaneously acquiring CARS and SRS images of a blend of
6-{\mu}m poly(methyl methacrylate) beads and 3-{\mu}m polystyrene beads. We
then apply it to visualize cell walls and chloroplast of an unprocessed fresh
leaf of Elodea aquatic plant via SRS and TPEF modalities, respectively. The
presented NLO microscope, developed in house using off-the-shelf components,
offers full accessibility to the optical path and ensures its easy
re-configurability and flexibility.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,549 | The Diffuse Light of the Universe - On the microwave background before and after its discovery: open questions | In 1965, the discovery of a new type of uniform radiation, located between
radiowaves and infrared light, was accidental. Known today as Cosmic Microwave
background (CMB), this diffuse radiation is commonly interpreted as a fossil
light released in an early hot and dense universe and constitutes today the
main 'pilar' of the big bang cosmology. Considerable efforts have been devoted
to derive fundamental cosmological parameters from the characteristics of this
radiation that led to a surprising universe that is shaped by at least three
major unknown components: inflation, dark matter and dark energy. This is an
important weakness of the present consensus cosmological model that justifies
raising several questions on the CMB interpretation. Can we consider its
cosmological nature as undisputable? Do other possible interpretations exist in
the context of other cosmological theories or simply as a result of other
physical mechanisms that could account for it? In an effort to questioning the
validity of scientific hypotheses and the under-determination of theories
compared to observations, we examine here the difficulties that still exist on
the interpretation of this diffuse radiation and explore other proposed tracks
to explain its origin. We discuss previous historical concepts of diffuse
radiation before and after the CMB discovery and underline the limit of our
present understanding.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,550 | Classification of $5$-Dimensional Complex Nilpotent Leibniz Algebras | Leibniz algebras are certain generalization of Lie algebras. In this paper we
give the classification of $5-$dimensional complex non-Lie nilpotent Leibniz
algebras. We use the canonical forms for the congruence classes of matrices of
bilinear forms to classify the case $\dim(A^2)=3$ and $\dim(Leib(A))=1$ which
can be applied to higher dimensions. The remaining cases are classified via
direct method.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,551 | Haptics of Screwing and Unscrewing for its Application in Smart Factories for Disassembly | Reconstruction of skilled humans sensation and control system often leads to
a development of robust control for the robots. We are developing an unscrewing
robot for the automated disassembly which requires a comprehensive control
system, but unscrewing experiments with robots are often limited to several
conditions. On the contrary, humans typically have a broad range of screwing
experiences and sensations throughout their lives, and we conducted an
experiment to find these haptic patterns. Results show that people apply axial
force to the screws to avoid screwdriver slippage (cam-outs), which is one of
the key problems during screwing and unscrewing, and this axial force is
proportional to the torque which is required for screwing. We have found that
type of the screw head influences the amount of axial force applied. Using this
knowledge an unscrewing robot for the smart disassembly factory RecyBot is
developed, and experiments confirm the optimality of the strategy, used by
humans. Finally, a methodology for robust unscrewing algorithm design is
presented as a generalization of the findings. It can seriously speed up the
development of the screwing and unscrewing robots and tools.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,552 | $G$-invariant Szegö kernel asymptotics and CR reduction | Let $(X, T^{1,0}X)$ be a compact connected orientable CR manifold of
dimension $2n+1$ with non-degenerate Levi curvature. Assume that $X$ admits a
connected compact Lie group action $G$. Under certain natural assumptions about
the group action $G$, we show that the $G$-invariant Szegö kernel for $(0,q)$
forms is a complex Fourier integral operator, smoothing away $\mu^{-1}(0)$ and
there is a precise description of the singularity near $\mu^{-1}(0)$, where
$\mu$ denotes the CR moment map. We apply our result to the case when $X$
admits a transversal CR $S^1$ action and deduce an asymptotic expansion for the
$m$-th Fourier component of the $G$-invariant Szegö kernel for $(0,q)$ forms
as $m \to+\infty$. As an application, we show that if $m$ large enough,
quantization commutes with reduction.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,553 | Self-similar resistive circuits as fractal-like structures | In the present work we explore resistive circuits where the individual
resistors are arranged in fractal-like patterns. These circuits have some of
the characteristics typically found in geometric fractals, namely
self-similarity and scale invariance. Considering resistive circuits as graphs,
we propose a definition of self-similar circuits which mimics a self-similar
fractal. General properties of the resistive circuits generated by this
approach are investigated, and interesting examples are commented in detail.
Specifically, we consider self-similar resistive series, tree-like resistive
networks and Sierpinski's configurations with resistors.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,554 | DynaPhoPy: A code for extracting phonon quasiparticles from molecular dynamics simulations | We have developed a computational code, DynaPhoPy, that allow us to extract
the microscopic anharmonic phonon properties from molecular dynamics (MD)
simulations using the normal-mode-decomposition technique as presented by Sun
et al. [T. Sun, D. Zhang, R. Wentzcovitch, 2014]. Using this code we calculated
the quasiparticle phonon frequencies and linewidths of crystalline silicon at
different temperatures using both of first-principles and the Tersoff empirical
potential approaches. In this work we show the dependence of these properties
on the temperature using both approaches and compare them with reported
experimental data obtained by Raman spectroscopy [M. Balkanski, R. Wallis, E.
Haro, 1983 and R. Tsu, J. G. Hernandez, 1982].
| 0 | 1 | 0 | 0 | 0 | 0 |
20,555 | Lower Bounds for Two-Sample Structural Change Detection in Ising and Gaussian Models | The change detection problem is to determine if the Markov network structures
of two Markov random fields differ from one another given two sets of samples
drawn from the respective underlying distributions. We study the trade-off
between the sample sizes and the reliability of change detection, measured as a
minimax risk, for the important cases of the Ising models and the Gaussian
Markov random fields restricted to the models which have network structures
with $p$ nodes and degree at most $d$, and obtain information-theoretic lower
bounds for reliable change detection over these models. We show that for the
Ising model, $\Omega\left(\frac{d^2}{(\log d)^2}\log p\right)$ samples are
required from each dataset to detect even the sparsest possible changes, and
that for the Gaussian, $\Omega\left( \gamma^{-2} \log(p)\right)$ samples are
required from each dataset to detect change, where $\gamma$ is the smallest
ratio of off-diagonal to diagonal terms in the precision matrices of the
distributions. These bounds are compared to the corresponding results in
structure learning, and closely match them under mild conditions on the model
parameters. Thus, our change detection bounds inherit partial tightness from
the structure learning schemes in previous literature, demonstrating that in
certain parameter regimes, the naive structure learning based approach to
change detection is minimax optimal up to constant factors.
| 1 | 0 | 1 | 0 | 0 | 0 |
20,556 | How Usable are Rust Cryptography APIs? | Context: Poor usability of cryptographic APIs is a severe source of
vulnerabilities. Aim: We wanted to find out what kind of cryptographic
libraries are present in Rust and how usable they are. Method: We explored
Rust's cryptographic libraries through a systematic search, conducted an
exploratory study on the major libraries and a controlled experiment on two of
these libraries with 28 student participants. Results: Only half of the major
libraries explicitly focus on usability and misuse resistance, which is
reflected in their current APIs. We found that participants were more
successful using rust-crypto which we considered less usable than ring before
the experiment. Conclusion: We discuss API design insights and make
recommendations for the design of crypto libraries in Rust regarding the detail
and structure of the documentation, higher-level APIs as wrappers for the
existing low-level libraries, and selected, good-quality example code to
improve the emerging cryptographic libraries of Rust.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,557 | Augmenting End-to-End Dialog Systems with Commonsense Knowledge | Building dialog agents that can converse naturally with humans is a
challenging yet intriguing problem of artificial intelligence. In open-domain
human-computer conversation, where the conversational agent is expected to
respond to human responses in an interesting and engaging way, commonsense
knowledge has to be integrated into the model effectively. In this paper, we
investigate the impact of providing commonsense knowledge about the concepts
covered in the dialog. Our model represents the first attempt to integrating a
large commonsense knowledge base into end-to-end conversational models. In the
retrieval-based scenario, we propose the Tri-LSTM model to jointly take into
account message and commonsense for selecting an appropriate response. Our
experiments suggest that the knowledge-augmented models are superior to their
knowledge-free counterparts in automatic evaluation.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,558 | A framework for Multi-A(rmed)/B(andit) testing with online FDR control | We propose an alternative framework to existing setups for controlling false
alarms when multiple A/B tests are run over time. This setup arises in many
practical applications, e.g. when pharmaceutical companies test new treatment
options against control pills for different diseases, or when internet
companies test their default webpages versus various alternatives over time.
Our framework proposes to replace a sequence of A/B tests by a sequence of
best-arm MAB instances, which can be continuously monitored by the data
scientist. When interleaving the MAB tests with an an online false discovery
rate (FDR) algorithm, we can obtain the best of both worlds: low sample
complexity and any time online FDR control. Our main contributions are: (i) to
propose reasonable definitions of a null hypothesis for MAB instances; (ii) to
demonstrate how one can derive an always-valid sequential p-value that allows
continuous monitoring of each MAB test; and (iii) to show that using rejection
thresholds of online-FDR algorithms as the confidence levels for the MAB
algorithms results in both sample-optimality, high power and low FDR at any
point in time. We run extensive simulations to verify our claims, and also
report results on real data collected from the New Yorker Cartoon Caption
contest.
| 1 | 0 | 0 | 1 | 0 | 0 |
20,559 | Statistical Speech Enhancement Based on Probabilistic Integration of Variational Autoencoder and Non-Negative Matrix Factorization | This paper presents a statistical method of single-channel speech enhancement
that uses a variational autoencoder (VAE) as a prior distribution on clean
speech. A standard approach to speech enhancement is to train a deep neural
network (DNN) to take noisy speech as input and output clean speech. Although
this supervised approach requires a very large amount of pair data for
training, it is not robust against unknown environments. Another approach is to
use non-negative matrix factorization (NMF) based on basis spectra trained on
clean speech in advance and those adapted to noise on the fly. This
semi-supervised approach, however, causes considerable signal distortion in
enhanced speech due to the unrealistic assumption that speech spectrograms are
linear combinations of the basis spectra. Replacing the poor linear generative
model of clean speech in NMF with a VAE---a powerful nonlinear deep generative
model---trained on clean speech, we formulate a unified probabilistic
generative model of noisy speech. Given noisy speech as observed data, we can
sample clean speech from its posterior distribution. The proposed method
outperformed the conventional DNN-based method in unseen noisy environments.
| 1 | 0 | 0 | 1 | 0 | 0 |
20,560 | BPGrad: Towards Global Optimality in Deep Learning via Branch and Pruning | Understanding the global optimality in deep learning (DL) has been attracting
more and more attention recently. Conventional DL solvers, however, have not
been developed intentionally to seek for such global optimality. In this paper
we propose a novel approximation algorithm, BPGrad, towards optimizing deep
models globally via branch and pruning. Our BPGrad algorithm is based on the
assumption of Lipschitz continuity in DL, and as a result it can adaptively
determine the step size for current gradient given the history of previous
updates, wherein theoretically no smaller steps can achieve the global
optimality. We prove that, by repeating such branch-and-pruning procedure, we
can locate the global optimality within finite iterations. Empirically an
efficient solver based on BPGrad for DL is proposed as well, and it outperforms
conventional DL solvers such as Adagrad, Adadelta, RMSProp, and Adam in the
tasks of object recognition, detection, and segmentation.
| 1 | 0 | 0 | 1 | 0 | 0 |
20,561 | Lagrangian Flow Network approach to an open flow model | Concepts and tools from network theory, the so-called Lagrangian Flow Network
framework, have been successfully used to obtain a coarse-grained description
of transport by closed fluid flows. Here we explore the application of this
methodology to open chaotic flows, and check it with numerical results for a
model open flow, namely a jet with a localized wave perturbation. We find that
network nodes with high values of out-degree and of finite-time entropy in the
forward-in-time direction identify the location of the chaotic saddle and its
stable manifold, whereas nodes with high in-degree and backwards finite-time
entropy highlight the location of the saddle and its unstable manifold. The
cyclic clustering coefficient, associated to the presence of periodic orbits,
takes non-vanishing values at the location of the saddle itself.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,562 | Some new gradient estimates for two nonlinear parabolic equations under Ricci flow | In this paper, by maximum principle and cutoff function, we investigate
gradient estimates for positive solutions to two nonlinear parabolic equations
under Ricci flow. The related Harnack inequalities are deduced. An result about
positive solutions on closed manifolds under Ricci flow is abtained. As
applications, gradient estimates and Harnack inequalities for positive
solutions to the heat equation under Ricci flow are derived. These results in
the paper can be regard as generalizing the gradient estimates of Li-Yau, J. Y.
Li, Hamilton and Li-Xu to the Ricci flow. Our results also improve the
estimates of S. P. Liu and J. Sun to the nonlinear parabolic equation under
Ricci flow.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,563 | On the pointwise iteration-complexity of a dynamic regularized ADMM with over-relaxation stepsize | In this paper, we extend the improved pointwise iteration-complexity result
of a dynamic regularized alternating direction method of multipliers (ADMM) for
a new stepsize domain. In this complexity analysis, the stepsize parameter can
even be chosen in the interval $(0,2)$ instead of interval
$(0,(1+\sqrt{5})/2)$. As usual, our analysis is established by interpreting
this ADMM variant as an instance of a hybrid proximal extragradient framework
applied to a specific monotone inclusion problem.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,564 | DeepBrain: Functional Representation of Neural In-Situ Hybridization Images for Gene Ontology Classification Using Deep Convolutional Autoencoders | This paper presents a novel deep learning-based method for learning a
functional representation of mammalian neural images. The method uses a deep
convolutional denoising autoencoder (CDAE) for generating an invariant, compact
representation of in situ hybridization (ISH) images. While most existing
methods for bio-imaging analysis were not developed to handle images with
highly complex anatomical structures, the results presented in this paper show
that functional representation extracted by CDAE can help learn features of
functional gene ontology categories for their classification in a highly
accurate manner. Using this CDAE representation, our method outperforms the
previous state-of-the-art classification rate, by improving the average AUC
from 0.92 to 0.98, i.e., achieving 75% reduction in error. The method operates
on input images that were downsampled significantly with respect to the
original ones to make it computationally feasible.
| 1 | 0 | 0 | 1 | 0 | 0 |
20,565 | Nonlocal heat equations in the Heisenberg group | We study the following nonlocal diffusion equation in the Heisenberg group
$\mathbb{H}_n$, \[ u_t(z,s,t)=J\ast u(z,s,t)-u(z,s,t), \] where $\ast$ denote
convolution product and $J$ satisfies appropriated hypothesis. For the Cauchy
problem we obtain that the asymptotic behavior of the solutions is the same
form that the one for the heat equation in the Heisenberg group. To obtain this
result we use the spherical transform related to the pair
$(U(n),\mathbb{H}_n)$. Finally we prove that solutions of properly rescaled
nonlocal Dirichlet problem converge uniformly to the solution of the
corresponding Dirichlet problem for the classical heat equation in the
Heisenberg group.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,566 | Motion Planning Networks | Fast and efficient motion planning algorithms are crucial for many
state-of-the-art robotics applications such as self-driving cars. Existing
motion planning methods such as RRT*, A*, and D*, become ineffective as their
computational complexity increases exponentially with the dimensionality of the
motion planning problem. To address this issue, we present a neural
network-based novel planning algorithm which generates end-to-end
collision-free paths irrespective of the obstacles' geometry. The proposed
method, called MPNet (Motion Planning Network), comprises of a Contractive
Autoencoder which encodes the given workspaces directly from a point cloud
measurement, and a deep feedforward neural network which takes the workspace
encoding, start and goal configuration, and generates end-to-end feasible
motion trajectories for the robot to follow. We evaluate MPNet on multiple
planning problems such as planning of a point-mass robot, rigid-body, and 7 DOF
Baxter robot manipulators in various 2D and 3D environments. The results show
that MPNet is not only consistently computationally efficient in all 2D and 3D
environments but also show remarkable generalization to completely unseen
environments. The results also show that computation time of MPNet consistently
remains less than 1 second which is significantly lower than existing
state-of-the-art motion planning algorithms. Furthermore, through transfer
learning, the MPNet trained in one scenario (e.g., indoor living places) can
also quickly adapt to new scenarios (e.g., factory floors) with a little amount
of data.
| 1 | 0 | 0 | 1 | 0 | 0 |
20,567 | Query Expansion Techniques for Information Retrieval: a Survey | With the ever increasing size of web, relevant information extraction on the
Internet with a query formed by a few keywords has become a big challenge. To
overcome this, query expansion (QE) plays a crucial role in improving the
Internet searches, where the user's initial query is reformulated to a new
query by adding new meaningful terms with similar significance. QE -- as part
of information retrieval (IR) -- has long attracted researchers' attention. It
has also become very influential in the field of personalized social document,
Question Answering over Linked Data (QALD), and, Text Retrieval Conference
(TREC) and REAL sets. This paper surveys QE techniques in IR from 1960 to 2017
with respect to core techniques, data sources used, weighting and ranking
methodologies, user participation and applications (of QE techniques) --
bringing out similarities and differences.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,568 | Method for Aspect-Based Sentiment Annotation Using Rhetorical Analysis | This paper fills a gap in aspect-based sentiment analysis and aims to present
a new method for preparing and analysing texts concerning opinion and
generating user-friendly descriptive reports in natural language. We present a
comprehensive set of techniques derived from Rhetorical Structure Theory and
sentiment analysis to extract aspects from textual opinions and then build an
abstractive summary of a set of opinions. Moreover, we propose aspect-aspect
graphs to evaluate the importance of aspects and to filter out unimportant ones
from the summary. Additionally, the paper presents a prototype solution of data
flow with interesting and valuable results. The proposed method's results
proved the high accuracy of aspect detection when applied to the gold standard
dataset.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,569 | Commutativity of integral quasi-arithmetic means on measure spaces | Let $(X, \mathscr{L}, \lambda)$ and $(Y, \mathscr{M}, \mu)$ be finite measure
spaces for which there exist $A \in \mathscr{L}$ and $B \in \mathscr{M}$ with
$0 < \lambda(A) < \lambda(X)$ and $0 < \mu(B) < \mu(Y)$, and let $I\subseteq
\mathbf{R}$ be a non-empty interval. We prove that, if $f$ and $g$ are
continuous bijections $I \to \mathbf{R}^+$, then the equation $$
f^{-1}\!\left(\int_X f\!\left(g^{-1}\!\left(\int_Y g \circ
h\;d\mu\right)\right)d \lambda\right)\! = g^{-1}\!\left(\int_Y
g\!\left(f^{-1}\!\left(\int_X f \circ h\;d\lambda\right)\right)d \mu\right)$$
is satisfied by every $\mathscr{L} \otimes \mathscr{M}$-measurable simple
function $h: X \times Y \to I$ if and only if $f=c g$ for some $c \in
\mathbf{R}^+$ (it is easy to see that the equation is well posed). An
analogous, but essentially different, result, with $f$ and $g$ replaced by
continuous injections $I \to \mathbf R$ and $\lambda(X)=\mu(Y)=1$, was recently
obtained in [Indag. Math. 27 (2016), 945-953].
| 0 | 0 | 1 | 0 | 0 | 0 |
20,570 | Moderate Deviation for Random Elliptic PDEs with Small Noise | Partial differential equations with random inputs have become popular models
to characterize physical systems with uncertainty coming from, e.g., imprecise
measurement and intrinsic randomness. In this paper, we perform asymptotic rare
event analysis for such elliptic PDEs with random inputs. In particular, we
consider the asymptotic regime that the noise level converges to zero
suggesting that the system uncertainty is low, but does exists. We develop
sharp approximations of the probability of a large class of rare events.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,571 | Music Transformer | Music relies heavily on repetition to build structure and meaning.
Self-reference occurs on multiple timescales, from motifs to phrases to reusing
of entire sections of music, such as in pieces with ABA structure. The
Transformer (Vaswani et al., 2017), a sequence model based on self-attention,
has achieved compelling results in many generation tasks that require
maintaining long-range coherence. This suggests that self-attention might also
be well-suited to modeling music. In musical composition and performance,
however, relative timing is critically important. Existing approaches for
representing relative positional information in the Transformer modulate
attention based on pairwise distance (Shaw et al., 2018). This is impractical
for long sequences such as musical compositions since their memory complexity
for intermediate relative information is quadratic in the sequence length. We
propose an algorithm that reduces their intermediate memory requirement to
linear in the sequence length. This enables us to demonstrate that a
Transformer with our modified relative attention mechanism can generate
minute-long compositions (thousands of steps, four times the length modeled in
Oore et al., 2018) with compelling structure, generate continuations that
coherently elaborate on a given motif, and in a seq2seq setup generate
accompaniments conditioned on melodies. We evaluate the Transformer with our
relative attention mechanism on two datasets, JSB Chorales and
Piano-e-Competition, and obtain state-of-the-art results on the latter.
| 1 | 0 | 0 | 1 | 0 | 0 |
20,572 | Residual-Based Detections and Unified Architecture for Massive MIMO Uplink | Massive multiple-input multiple-output (M-MIMO) technique brings better
energy efficiency and coverage but higher computational complexity than
small-scale MIMO. For linear detections such as minimum mean square error
(MMSE), prohibitive complexity lies in solving large-scale linear equations.
For a better trade-off between bit-error-rate (BER) performance and
computational complexity, iterative linear algorithms like conjugate gradient
(CG) have been applied and have shown their feasibility in recent years. In
this paper, residual-based detection (RBD) algorithms are proposed for M-MIMO
detection, including minimal residual (MINRES) algorithm, generalized minimal
residual (GMRES) algorithm, and conjugate residual (CR) algorithm. RBD
algorithms focus on the minimization of residual norm per iteration, whereas
most existing algorithms focus on the approximation of exact signal. Numerical
results have shown that, for $64$-QAM $128\times 8$ MIMO, RBD algorithms are
only $0.13$ dB away from the exact matrix inversion method when BER$=10^{-4}$.
Stability of RBD algorithms has also been verified in various correlation
conditions. Complexity comparison has shown that, CR algorithm require $87\%$
less complexity than the traditional method for $128\times 60$ MIMO. The
unified hardware architecture is proposed with flexibility, which guarantees a
low-complexity implementation for a family of RBD M-MIMO detectors.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,573 | Sparsity constrained split feasibility for dose-volume constraints in inverse planning of intensity-modulated photon or proton therapy | A split feasibility formulation for the inverse problem of
intensity-modulated radiation therapy (IMRT) treatment planning with
dose-volume constraints (DVCs) included in the planning algorithm is presented.
It involves a new type of sparsity constraint that enables the inclusion of a
percentage-violation constraint in the model problem and its handling by
continuous (as opposed to integer) methods. We propose an iterative algorithmic
framework for solving such a problem by applying the feasibility-seeking
CQ-algorithm of Byrne combined with the automatic relaxation method (ARM) that
uses cyclic projections. Detailed implementation instructions are furnished.
Functionality of the algorithm was demonstrated through the creation of an
intensity-modulated proton therapy plan for a simple 2D C-shaped geometry and
also for a realistic base-of-skull chordoma treatment site. Monte Carlo
simulations of proton pencil beams of varying energy were conducted to obtain
dose distributions for the 2D test case. A research release of the Pinnacle3
proton treatment planning system was used to extract pencil beam doses for a
clinical base-of-skull chordoma case. In both cases the beamlet doses were
calculated to satisfy dose-volume constraints according to our new algorithm.
Examination of the dose-volume histograms following inverse planning with our
algorithm demonstrated that it performed as intended. The application of our
proposed algorithm to dose-volume constraint inverse planning was successfully
demonstrated. Comparison with optimized dose distributions from the research
release of the Pinnacle3 treatment planning system showed the algorithm could
achieve equivalent or superior results.
| 0 | 1 | 1 | 0 | 0 | 0 |
20,574 | On 2-Verma modules for quantum $\mathfrak{sl}_2$ | In this paper we study the superalgebra $A_n$, introduced by the authors in
previous work on categorification of Verma modules for quantum
$\mathfrak{sl}_2$. The superalgebra $A_n$ is akin to the nilHecke algebra, and
shares similar properties. In particular, we prove a uniqueness result about
2-Verma modules on $\Bbbk$-linear 2-categories.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,575 | On the Number of Single-Peaked Narcissistic or Single-Crossing Narcissistic Preference Profiles | We investigate preference profiles for a set $\mathcal{V}$ of voters, where
each voter $i$ has a preference order $\succ_i$ on a finite set $A$ of
alternatives (that is, a linear order on $A$) such that for each two
alternatives $a,b\in A$, voter $i$ prefers $a$ to $b$ if $a\succ_i b$. Such a
profile is narcissistic if each alternative $a$ is preferred the most by at
least one voter. It is single-peaked if there is a linear order
$\triangleright^{\text{sp}}$ on the alternatives such that each voter's
preferences on the alternatives along the order $\triangleright^{\text{sp}}$
are either strictly increasing, or strictly decreasing, or first strictly
increasing and then strictly decreasing. It is single-crossing if there is a
linear order $\triangleright^{\text{sc}}$ on the voters such that each pair of
alternatives divides the order $\triangleright^{\text{sc}}$ into at most two
suborders, where in each suborder, all voters have the same linear order on
this pair.
We show that for $n$ voters and $n$ alternatives,the number of single-peaked
narcissistic profiles is $\prod_{i=2}^{n-1} \binom{n-1}{i-1}$ while the number
of single-crossing narcissistic profiles is $2^{\binom{n-1}{2}}$.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,576 | Planet formation and disk-planet interactions | This review is based on lectures given at the 45th Saas-Fee Advanced Course
'From Protoplanetary Disks to Planet Formation' held in March 2015 in Les
Diablerets, Switzerland. Starting with an overview of the main characterictics
of the Solar System and extrasolar planets, we describe the planet formation
process in terms of the sequential accretion scenario. First the growth
processes of dust particles to planetesimals and subsequently to terrestrial
planets or planetary cores are presented. This is followed by the formation
process of the giant planets either by core accretion or gravitational
instability. Finally, the dynamical evolution of the orbital elements as driven
by disk-planet interaction and the overall evolution of multi-object systems is
presented.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,577 | Cherednik algebras and Calogero-Moser cells | Using the representation theory of Cherednik algebras at $t=0$ and a Galois
covering of the Calogero-Moser space, we define the notions of left, right and
two-sided Calogero-Moser cells for any finite complex reflection group. To each
Caloger-Moser two-sided cell is associated a Calogero-Moser family, while to
each Calogero-Moser left cell is associated a Calogero-Moser cellular
representation. We study properties of these objects and we conjecture that,
whenever the reflection group is real (i.e. is a Coxeter group), these notions
coincide with the one of Kazhdan-Lusztig left, right and two-sided cells,
Kazhdan-Lusztig families and Kazhdan-Lusztig cellular representations.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,578 | Khovanov complexes of rational tangles | We show that the Khovanov complex of a rational tangle has a very simple
representative whose backbone of non-zero morphisms forms a zig-zag.
Furthermore, this minimal complex can be computed quickly by an inductive
algorithm. (For example, we calculate $Kh(8_2)$ by hand.) We find that the
bigradings of the subobjects in these minimal complexes can be described by
matrix actions, which after a change of basis is the reduced Burau
representation of $B_3$.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,579 | Asymmetric Connectedness of Fears in the U.S. Financial Sector | We study how shocks to the forward-looking expectations of investors buying
call and put options transmit across the financial system. We introduce a new
contagion measure, called asymmetric fear connectedness (AFC), which captures
the information related to "fear" on the two sides of the options market and
can be used as a forward-looking systemic risk monitoring tool. The decomposed
connectedness measures provide timely predictive information for near-future
macroeconomic conditions and uncertainty indicators, and they contain
additional valuable information that is not included in the aggregate
connectedness measure. The role of a positive/negative "fear"
transmitter/receiver emerges clearly when we focus more closely on
idiosyncratic events for financial institutions. We identify banks that are
predominantly positive/negative receivers of "fear", as well as banks that
positively/negatively transmit "fear" in the financial system.
| 0 | 0 | 0 | 0 | 0 | 1 |
20,580 | Neural Network Based Speaker Classification and Verification Systems with Enhanced Features | This work presents a novel framework based on feed-forward neural network for
text-independent speaker classification and verification, two related systems
of speaker recognition. With optimized features and model training, it achieves
100% classification rate in classification and less than 6% Equal Error Rate
(ERR), using merely about 1 second and 5 seconds of data respectively. Features
with stricter Voice Active Detection (VAD) than the regular one for speech
recognition ensure extracting stronger voiced portion for speaker recognition,
speaker-level mean and variance normalization helps to eliminate the
discrepancy between samples from the same speaker. Both are proven to improve
the system performance. In building the neural network speaker classifier, the
network structure parameters are optimized with grid search and dynamically
reduced regularization parameters are used to avoid training terminated in
local minimum. It enables the training goes further with lower cost. In speaker
verification, performance is improved with prediction score normalization,
which rewards the speaker identity indices with distinct peaks and penalizes
the weak ones with high scores but more competitors, and speaker-specific
thresholding, which significantly reduces ERR in the ROC curve. TIMIT corpus
with 8K sampling rate is used here. First 200 male speakers are used to train
and test the classification performance. The testing files of them are used as
in-domain registered speakers, while data from the remaining 126 male speakers
are used as out-of-domain speakers, i.e. imposters in speaker verification.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,581 | Slimness of graphs | Slimness of a graph measures the local deviation of its metric from a tree
metric. In a graph $G=(V,E)$, a geodesic triangle $\bigtriangleup(x,y,z)$ with
$x, y, z\in V$ is the union $P(x,y) \cup P(x,z) \cup P(y,z)$ of three shortest
paths connecting these vertices. A geodesic triangle $\bigtriangleup(x,y,z)$ is
called $\delta$-slim if for any vertex $u\in V$ on any side $P(x,y)$ the
distance from $u$ to $P(x,z) \cup P(y,z)$ is at most $\delta$, i.e. each path
is contained in the union of the $\delta$-neighborhoods of two others. A graph
$G$ is called $\delta$-slim, if all geodesic triangles in $G$ are
$\delta$-slim. The smallest value $\delta$ for which $G$ is $\delta$-slim is
called the slimness of $G$. In this paper, using the layering partition
technique, we obtain sharp bounds on slimness of such families of graphs as (1)
graphs with cluster-diameter $\Delta(G)$ of a layering partition of $G$, (2)
graphs with tree-length $\lambda$, (3) graphs with tree-breadth $\rho$, (4)
$k$-chordal graphs, AT-free graphs and HHD-free graphs. Additionally, we show
that the slimness of every 4-chordal graph is at most 2 and characterize those
4-chordal graphs for which the slimness of every of its induced subgraph is at
most 1.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,582 | SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems | Despite their immense popularity, deep learning-based acoustic systems are
inherently vulnerable to adversarial attacks, wherein maliciously crafted
audios trigger target systems to misbehave. In this paper, we present
SirenAttack, a new class of attacks to generate adversarial audios. Compared
with existing attacks, SirenAttack highlights with a set of significant
features: (i) versatile -- it is able to deceive a range of end-to-end acoustic
systems under both white-box and black-box settings; (ii) effective -- it is
able to generate adversarial audios that can be recognized as specific phrases
by target acoustic systems; and (iii) stealthy -- it is able to generate
adversarial audios indistinguishable from their benign counterparts to human
perception. We empirically evaluate SirenAttack on a set of state-of-the-art
deep learning-based acoustic systems (including speech command recognition,
speaker recognition and sound event classification), with results showing the
versatility, effectiveness, and stealthiness of SirenAttack. For instance, it
achieves 99.45% attack success rate on the IEMOCAP dataset against the ResNet18
model, while the generated adversarial audios are also misinterpreted by
multiple popular ASR platforms, including Google Cloud Speech, Microsoft Bing
Voice, and IBM Speech-to-Text. We further evaluate three potential defense
methods to mitigate such attacks, including adversarial training, audio
downsampling, and moving average filtering, which leads to promising directions
for further research.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,583 | k-server via multiscale entropic regularization | We present an $O((\log k)^2)$-competitive randomized algorithm for the
$k$-server problem on hierarchically separated trees (HSTs). This is the first
$o(k)$-competitive randomized algorithm for which the competitive ratio is
independent of the size of the underlying HST. Our algorithm is designed in the
framework of online mirror descent where the mirror map is a multiscale
entropy. When combined with Bartal's static HST embedding reduction, this leads
to an $O((\log k)^2 \log n)$-competitive algorithm on any $n$-point metric
space. We give a new dynamic HST embedding that yields an $O((\log k)^3 \log
\Delta)$-competitive algorithm on any metric space where the ratio of the
largest to smallest non-zero distance is at most $\Delta$.
| 1 | 0 | 1 | 0 | 0 | 0 |
20,584 | Some Large Sample Results for the Method of Regularized Estimators | We present a general framework for studying regularized estimators; i.e.,
estimation problems wherein "plug-in" type estimators are either ill-defined or
ill-behaved. We derive primitive conditions that imply consistency and
asymptotic linear representation for regularized estimators, allowing for
slower than $\sqrt{n}$ estimators as well as infinite dimensional parameters.
We also provide data-driven methods for choosing tuning parameters that, under
some conditions, achieve the aforementioned results. We illustrate the scope of
our approach by studying a wide range of applications, revisiting known results
and deriving new ones.
| 0 | 0 | 1 | 0 | 0 | 0 |
20,585 | Coregionalised Locomotion Envelopes - A Qualitative Approach | 'Sharing of statistical strength' is a phrase often employed in machine
learning and signal processing. In sensor networks, for example, missing
signals from certain sensors may be predicted by exploiting their correlation
with observed signals acquired from other sensors. For humans, our hands move
synchronously with our legs, and we can exploit these implicit correlations for
predicting new poses and for generating new natural-looking walking sequences.
We can also go much further and exploit this form of transfer learning, to
develop new control schemas for robust control of rehabilitation robots. In
this short paper we introduce coregionalised locomotion envelopes - a method
for multi-dimensional manifold regression, on human locomotion variates. Herein
we render a qualitative description of this method.
| 1 | 0 | 0 | 1 | 0 | 0 |
20,586 | Optimal Invariant Tests in an Instrumental Variables Regression With Heteroskedastic and Autocorrelated Errors | This paper uses model symmetries in the instrumental variable (IV) regression
to derive an invariant test for the causal structural parameter. Contrary to
popular belief, we show there exist model symmetries when equation errors are
heteroskedastic and autocorrelated (HAC). Our theory is consistent with
existing results for the homoskedastic model (Andrews, Moreira and Stock(2006}
and Chamberlain (2007}), but in general uses information on the structural
parameter beyond the Anderson-Rubin, score, and rank statistics. This suggests
that tests based only the Anderson-Rubin and score statistics discard
information on the causal parameter of interest. We apply our theory to
construct designs in which these tests indeed have power arbitrarily close to
size. Other tests, including other adaptations to the CLR test, do not suffer
the same deficiencies. Finally, we use the model symmetries to propose novel
weighted-average power tests for the HAC-IV model.
| 0 | 0 | 1 | 1 | 0 | 0 |
20,587 | Longitudinal electric field: from Maxwell equation to non-locality in time and space | In this paper we use the classical electrodynamics to show that the Lorenz
gauge can be incompatible with some particular solutions of the d Alembert
equations for electromagnetic potentials. In its turn, the d Alembert equations
for the elec- tromagnetic potentials is the result of application of the Lorenz
gauge to general equations for the potentials. The last ones is the
straightforward consequence of Maxwell equations. Since the d Alembert
equations and the electromagnetic poten- tials are necessary for quantum
electrodynamics formulation, one should oblige to satisfy these equations also
in classical case. The solution of d Alembert equations, which modifies
longitudinal electric field is found. The requirement of this modifi- cation
follows from the necessity to satisfy the physical condition of impossibility
of instantaneous transferring of interaction in space.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,588 | Estimating linear functionals of a sparse family of Poisson means | Assume that we observe a sample of size n composed of p-dimensional signals,
each signal having independent entries drawn from a scaled Poisson distribution
with an unknown intensity. We are interested in estimating the sum of the n
unknown intensity vectors, under the assumption that most of them coincide with
a given 'background' signal. The number s of p-dimensional signals different
from the background signal plays the role of sparsity and the goal is to
leverage this sparsity assumption in order to improve the quality of estimation
as compared to the naive estimator that computes the sum of the observed
signals. We first introduce the group hard thresholding estimator and analyze
its mean squared error measured by the squared Euclidean norm. We establish a
nonasymptotic upper bound showing that the risk is at most of the order of
{\sigma}^2(sp + s^2sqrt(p)) log^3/2(np). We then establish lower bounds on the
minimax risk over a properly defined class of collections of s-sparse signals.
These lower bounds match with the upper bound, up to logarithmic terms, when
the dimension p is fixed or of larger order than s^2. In the case where the
dimension p increases but remains of smaller order than s^2, our results show a
gap between the lower and the upper bounds, which can be up to order sqrt(p).
| 0 | 0 | 1 | 1 | 0 | 0 |
20,589 | Fabrication of porous microrings via laser printing and ion-beam post-etching | Pulsed-laser dry printing of noble-metal microrings with a tunable internal
porous structure, which can be revealed via an ion-beam etching post-procedure,
was demonstrated. Abundance and average size of the pores inside the microrings
were shown to be tuned in a wide range by varying incident pulse energy and a
nitrogen doping level controlled in the process of magnetron deposition of the
gold film in the appropriate gaseous environment. The fabricated porous
microrings were shown to provide many-fold near-field enhancement of incident
electromagnetic fields, which was confirmed by mapping of the characteristic
Raman band of a nanometer-thick covering layer of Rhodamine 6G dye molecules
and supporting finite-difference time-domain calculations. The proposed laser
printing/ion-beam etching approach is demonstrated to be a unique tool aimed at
designing and fabricating multifunctional plasmonic structures and metasurfaces
for spectroscopic bioidentification based on surface-enhanced infrared
absorption, Raman scattering and photoluminescence detection schemes.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,590 | Performance Measurements of Supercomputing and Cloud Storage Solutions | Increasing amounts of data from varied sources, particularly in the fields of
machine learning and graph analytics, are causing storage requirements to grow
rapidly. A variety of technologies exist for storing and sharing these data,
ranging from parallel file systems used by supercomputers to distributed block
storage systems found in clouds. Relatively few comparative measurements exist
to inform decisions about which storage systems are best suited for particular
tasks. This work provides these measurements for two of the most popular
storage technologies: Lustre and Amazon S3. Lustre is an open-source, high
performance, parallel file system used by many of the largest supercomputers in
the world. Amazon's Simple Storage Service, or S3, is part of the Amazon Web
Services offering, and offers a scalable, distributed option to store and
retrieve data from anywhere on the Internet. Parallel processing is essential
for achieving high performance on modern storage systems. The performance tests
used span the gamut of parallel I/O scenarios, ranging from single-client,
single-node Amazon S3 and Lustre performance to a large-scale, multi-client
test designed to demonstrate the capabilities of a modern storage appliance
under heavy load. These results show that, when parallel I/O is used correctly
(i.e., many simultaneous read or write processes), full network bandwidth
performance is achievable and ranged from 10 gigabits/s over a 10 GigE S3
connection to 0.35 terabits/s using Lustre on a 1200 port 10 GigE switch. These
results demonstrate that S3 is well-suited to sharing vast quantities of data
over the Internet, while Lustre is well-suited to processing large quantities
of data locally.
| 1 | 1 | 0 | 0 | 0 | 0 |
20,591 | Multi-Objective Event-triggered Consensus of Linear Multi-agent Systems | This paper proposes a distributed consensus algorithm for linear event-based
heterogeneous multi-agent systems (MAS). The proposed scheme is event-triggered
in the sense that an agent selectively transmits its information within its
local neighbourhood based on a directed network topology under the fulfillment
of certain conditions. Using the Lyapunov stability theorem, the system
constraints and event-triggering condition are expressed in terms of several
linear matrix inequalities (LMIs) to derive the consensus parameters. The
objective is to design the transmission threshold and minimum-norm
heterogeneous control gains which collectively ensure an exponential consensus
convergence rate for the closed-loop systems. The LMI computed control gains
are robust to uncertainty with some deviation from their nominal values
allowed. The practicability of the proposed event-based framework is further
studied by proving the Zeno behaviour exclusion. Numerical simulations quantify
the advantages of our event-triggered consensus approach in second-order,
linear and heterogeneous multi-agent systems.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,592 | Private and Secure Coordination of Match-Making for Heavy-Duty Vehicle Platooning | A secure and private framework for inter-agent communication and coordination
is developed. This allows an agent, in our case a fleet owner, to ask questions
or submit queries in an encrypted fashion using semi-homomorphic encryption.
The submitted query can be about the interest of the other fleet owners for
using a road at a specific time of the day, for instance, for the purpose of
collaborative vehicle platooning. The other agents can then provide appropriate
responses without knowing the content of the questions or the queries. Strong
privacy and security guarantees are provided for the agent who is submitting
the queries. It is also shown that the amount of the information that this
agent can extract from the other agent is bounded. In fact, with submitting one
query, a sophisticated agent can at most extract the answer to two queries.
This secure communication platform is used subsequently to develop a
distributed coordination mechanisms among fleet owners.
| 1 | 0 | 1 | 0 | 0 | 0 |
20,593 | Kernel Robust Bias-Aware Prediction under Covariate Shift | Under covariate shift, training (source) data and testing (target) data
differ in input space distribution, but share the same conditional label
distribution. This poses a challenging machine learning task. Robust Bias-Aware
(RBA) prediction provides the conditional label distribution that is robust to
the worstcase logarithmic loss for the target distribution while matching
feature expectation constraints from the source distribution. However,
employing RBA with insufficient feature constraints may result in high
certainty predictions for much of the source data, while leaving too much
uncertainty for target data predictions. To overcome this issue, we extend the
representer theorem to the RBA setting, enabling minimization of regularized
expected target risk by a reweighted kernel expectation under the source
distribution. By applying kernel methods, we establish consistency guarantees
and demonstrate better performance of the RBA classifier than competing methods
on synthetically biased UCI datasets as well as datasets that have natural
covariate shift.
| 1 | 0 | 0 | 1 | 0 | 0 |
20,594 | Degeneration in VAE: in the Light of Fisher Information Loss | While enormous progress has been made to Variational Autoencoder (VAE) in
recent years, similar to other deep networks, VAE with deep networks suffers
from the problem of degeneration, which seriously weakens the correlation
between the input and the corresponding latent codes, deviating from the goal
of the representation learning. To investigate how degeneration affects VAE
from a theoretical perspective, we illustrate the information transmission in
VAE and analyze the intermediate layers of the encoders/decoders. Specifically,
we propose a Fisher Information measure for the layer-wise analysis. With such
measure, we demonstrate that information loss is ineluctable in feed-forward
networks and causes the degeneration in VAE. We show that skip connections in
VAE enable the preservation of information without changing the model
architecture. We call this class of VAE equipped with skip connections as SCVAE
and perform a range of experiments to show its advantages in information
preservation and degeneration mitigation.
| 0 | 0 | 0 | 1 | 0 | 0 |
20,595 | Room-temperature spin transport in n-Ge probed by four-terminal nonlocal measurements | We demonsrtate electrical spin injection and detection in $n$-type Ge
($n$-Ge) at room temperature using four-terminal nonlocal spin-valve and
Hanle-effect measurements in lateral spin-valve (LSV) devices with
Heusler-alloy Schottky tunnel contacts. The spin diffusion length
($\lambda$$_{\rm Ge}$) of the Ge layer used ($n \sim$ 1 $\times$ 10$^{19}$
cm$^{-3}$) at 296 K is estimated to be $\sim$ 0.44 $\pm$ 0.02 $\mu$m.
Room-temperature spin signals can be observed reproducibly at the low bias
voltage range ($\le$ 0.7 V) for LSVs with relatively low resistance-area
product ($RA$) values ($\le$ 1 k$\Omega$$\mu$m$^{2}$). This means that the
Schottky tunnel contacts used here are more suitable than ferromagnet/MgO
tunnel contacts ($RA \ge$ 100 k$\Omega$$\mu$m$^{2}$) for developing Ge
spintronic applications.
| 0 | 1 | 0 | 0 | 0 | 0 |
20,596 | Synthesizing Neural Network Controllers with Probabilistic Model based Reinforcement Learning | We present an algorithm for rapidly learning controllers for robotics
systems. The algorithm follows the model-based reinforcement learning paradigm,
and improves upon existing algorithms; namely Probabilistic learning in Control
(PILCO) and a sample-based version of PILCO with neural network dynamics
(Deep-PILCO). We propose training a neural network dynamics model using
variational dropout with truncated Log-Normal noise. This allows us to obtain a
dynamics model with calibrated uncertainty, which can be used to simulate
controller executions via rollouts. We also describe set of techniques,
inspired by viewing PILCO as a recurrent neural network model, that are crucial
to improve the convergence of the method. We test our method on a variety of
benchmark tasks, demonstrating data-efficiency that is competitive with PILCO,
while being able to optimize complex neural network controllers. Finally, we
assess the performance of the algorithm for learning motor controllers for a
six legged autonomous underwater vehicle. This demonstrates the potential of
the algorithm for scaling up the dimensionality and dataset sizes, in more
complex control tasks.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,597 | Stealthy Deception Attacks Against SCADA Systems | SCADA protocols for Industrial Control Systems (ICS) are vulnerable to
network attacks such as session hijacking. Hence, research focuses on network
anomaly detection based on meta--data (message sizes, timing, command
sequence), or on the state values of the physical process. In this work we
present a class of semantic network-based attacks against SCADA systems that
are undetectable by the above mentioned anomaly detection. After hijacking the
communication channels between the Human Machine Interface (HMI) and
Programmable Logic Controllers (PLCs), our attacks cause the HMI to present a
fake view of the industrial process, deceiving the human operator into taking
manual actions. Our most advanced attack also manipulates the messages
generated by the operator's actions, reversing their semantic meaning while
causing the HMI to present a view that is consistent with the attempted human
actions. The attacks are totaly stealthy because the message sizes and timing,
the command sequences, and the data values of the ICS's state all remain
legitimate.
We implemented and tested several attack scenarios in the test lab of our
local electric company, against a real HMI and real PLCs, separated by a
commercial-grade firewall. We developed a real-time security assessment tool,
that can simultaneously manipulate the communication to multiple PLCs and cause
the HMI to display a coherent system--wide fake view. Our tool is configured
with message-manipulating rules written in an ICS Attack Markup Language (IAML)
we designed, which may be of independent interest. Our semantic attacks all
successfully fooled the operator and brought the system to states of blackout
and possible equipment damage.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,598 | Beta-rhythm oscillations and synchronization transition in network models of Izhikevich neurons: effect of topology and synaptic type | Despite their significant functional roles, beta-band oscillations are least
understood. Synchronization in neuronal networks have attracted much attention
in recent years with the main focus on transition type. Whether one obtains
explosive transition or a continuous transition is an important feature of the
neuronal network which can depend on network structure as well as synaptic
types. In this study we consider the effect of synaptic interaction (electrical
and chemical) as well as structural connectivity on synchronization transition
in network models of Izhikevich neurons which spike regularly with beta
rhythms. We find a wide range of behavior including continuous transition,
explosive transition, as well as lack of global order. The stronger electrical
synapses are more conducive to synchronization and can even lead to explosive
synchronization. The key network element which determines the order of
transition is found to be the clustering coefficient and not the small world
effect, or the existence of hubs in a network. These results are in contrast to
previous results which use phase oscillator models such as the Kuramoto model.
Furthermore, we show that the patterns of synchronization changes when one goes
to the gamma band. We attribute such a change to the change in the refractory
period of Izhikevich neurons which changes significantly with frequency.
| 0 | 0 | 0 | 0 | 1 | 0 |
20,599 | Renyi Differential Privacy | We propose a natural relaxation of differential privacy based on the Renyi
divergence. Closely related notions have appeared in several recent papers that
analyzed composition of differentially private mechanisms. We argue that the
useful analytical tool can be used as a privacy definition, compactly and
accurately representing guarantees on the tails of the privacy loss.
We demonstrate that the new definition shares many important properties with
the standard definition of differential privacy, while additionally allowing
tighter analysis of composite heterogeneous mechanisms.
| 1 | 0 | 0 | 0 | 0 | 0 |
20,600 | Enhancing Quality for VVC Compressed Videos by Jointly Exploiting Spatial Details and Temporal Structure | In this paper, we propose a quality enhancement network for Versatile Video
Coding (VVC) compressed videos by jointly exploiting spatial details and
temporal structure (SDTS). The network consists of a temporal structure
prediction subnet and a spatial detail enhancement subnet. The former subnet is
used to estimate and compensate the temporal motion across frames, and the
spatial detail subnet is used to reduce the compression artifacts and enhance
the reconstruction quality of the VVC compressed video. Experimental results
demonstrate the effectiveness of our SDTS-based approach. It offers over
7.82$\%$ BD-rate saving on the common test video sequences and achieves the
state-of-the-art performance.
| 1 | 0 | 0 | 0 | 0 | 0 |