arxiv_id,text 2401.00009v2,"Turing’s Test, a Beautiful Thought Experiment Bernardo Gonçalves ∗ Polytechnic School, University of São Paulo Brazil begoncalves@usp.br ABSTRACT In the wake of large language models, there has been a resurgence of claims and questions about the Turing test and its value for AI, which are reminiscent of decades of practical “Turing” tests. If AI were quantum physics, by now several “Schrödinger’s” cats could have been killed. Better late than never, it is time for a historical reconstruction of Turing’s beautiful thought experiment. In this paper I present a wealth of evidence, including new archival sources, give original answers to several open questions about Turing’s 1950 paper, and address the core question of the value of Turing’s test. KEYWORDS Alan Turing, Turing test, Thought experiment, Foundations of AI & computer science, Galileo Galilei, History of science, History of AI 1 INTRODUCTION In recent decades, the Turing test has been used as a practical experiment for publicity purposes and aptly criticized [31, 32, 39], and has been the whipping boy of AI [16], cognitive sciences and analytic philosophy [33], and increasingly, with the rise of AI, the humanities and social sciences [3]. It is not uncommon for criticism coming from all these areas to take Turing’s test literally, assuming that he encouraged deception as a criterion and/or proposed a crucial experiment to establish the existence of machine intelligence. Now, in the wake of large language models, science and technology outlets ask whether Turing’s test can be a ‘benchmark’ for AI [2], and whether it is ‘dead’ [40]. Based on recent primary research [10–14], in this paper I present a mass of evidence, including newly discovered archival sources, and a new perspective on Turing’s test. I address a few problems that we will keep track as we go along: (𝑃 1 ) Why would Turing design a test based on imitation, which can be seen as encouraging deception? (𝑃 2 ) Why to present multiple versions of a test, as opposed to a well-defined, controlled experiment? (𝑃 3 ) Why gender imitation in a test of machine intelligence, and why conversation for an intelligence task? (𝑃 4 ) Why are practical “Turing” tests circular, as Hayes and Ford [16] claimed? Finally, the core problem, (𝑃 5 ) What is the value of Turing’s test for AI? Section 2 presents a reading of Turing’s 1950 paper. Section 3 introduces newly discovered archival sources and examines Turing’s concept of imitation, addressing 𝑃 1 . Section 4 shows that his presentation of the imitation game fits “the basic method of thought experiments” [19], addressing 𝑃 2 . Section 5 reconstructs the historical conditions of Turing’s proposal, addressing 𝑃 3 . Section 6 draws a parallel with the history of “the most beautiful experiment in the history of science” [27], addressing 𝑃 4 . Finally, Section 7 revisits the history of AI, addressing 𝑃 5 , and Section 8 concludes the paper. ∗ Also Visiting Fellow at King’s College and Research Affiliate at the Department of History and Philosophy of Science, University of Cambridge. Figure 1: Alan Turing (1912-1954). Photographs of Alan Turing, copyright The Provost and Scholars of King’s College Cambridge 2023. Archives Centre, King’s College, Cambridge, AMT/K/7/12. Reproduced with permission. 2 WHAT IS THE TURING TEST? In 1950, Alan Turing (Fig. 1) published the second of his three seminal papers, ‘Computing machinery and intelligence’ [37]. The text has 28 pages, divided in seven sections, §1-§7. Three main logical steps can be identified in his argument: the proposal (§1-§3, 3+ pp.), the science (§4-§5, 6 pp.), and the discussion (§6-§7, 18+ pp.). The proposal sought to replace the question “Can machines think?,” which he considered “too meaningless to deserve discussion” (p. 442), 1 with the imitation game. The purpose was to change the common meaning of the word ‘machine’ (e.g., a steam engine, a bulldozer) in light of the new mathematical science of ‘universal’ digital computing. The imitation game would allow for a grounded discussion of ‘machine’ and ‘thinking,’ seeking to expand the meaning of ‘thinking’ and detach it from the human species, much as the meaning of ‘universe’ was once detached from the Earth. In 1950, one of the OED definitions of ‘machine’ was: 2 “a combination of parts moving mechanically as contrasted with a being having life, consciousness and will . . . Hence applied to a person 1 Turing was coming from unstructured multidisciplinary debates in at least two editions of a seminar, “Mind and Machine,” held at the Philosophy Department of Manchester University in October and December, 1949. Of the latter, one participant wrote in a Christmas postcard sent to Warren McCulloch: “I wish you had been with us a few days ago we had an amusing evening discussion with Thuring [sic], Williams, Max Newman, Polyani [sic], Jefferson, J Z Young & myself . . . An electronic analyser and a digital computer (universal type) might have sorted the arguments out a bit.” Jules Y. Bogue to McCulloch, c. December 1949. American Philosophical Society, Warren S. McCulloch Papers, Mss.B.M139_005. Thanks to J. Swinton for this archival finding. 2 New English Dictionary. Oxford, Vol. VI, Part II, M-N, p. 7." 2401.00018v1,"Combining Bayesian reconstruction entropy with maximum entropy method for analytic continuations of matrix-valued Green’s functions Songlin Yang, 1 Liang Du, 1, ∗ and Li Huang 1, † 1 College of Physics and Technology, Guangxi Normal University, Guilin, Guangxi 541004, China (Dated: January 2, 2024) The Bayesian reconstruction entropy is considered an alternative to the Shannon-Jaynes entropy, as it does not exhibit the asymptotic flatness characteristic of the Shannon-Jaynes entropy and obeys the scale invariance. It is commonly utilized in conjunction with the maximum entropy method to derive spectral functions from Euclidean time correlators produced by lattice QCD simulations. This study expands the application of the Bayesian reconstruction entropy to the reconstruction of spectral functions for Matsubara or imaginarytime Green’s functions in quantum many-body physics. Furthermore, it extends the Bayesian reconstruction entropy to implement the positive-negative entropy algorithm, enabling the analytic continuations of matrixvalued Green’s functions on an element-wise manner. Both the diagonal and off-diagonal components of the matrix-valued Green’s functions are treated equally. Benchmark results for the analytic continuations of synthetic Green’s functions indicate that the Bayesian reconstruction entropy, when combined with the preblur trick, demonstrates comparable performance to the Shannon-Jaynes entropy. Notably, it exhibits greater resilience to noises in the input data, particularly when the noise level is moderate. I. INTRODUCTION In quantum many-body physics, single-particle Green’s function holds significant importance [1, 2]. It is typically computed using numerical methods such as quantum Monte Carlo [3–5] and functional renormalization group [6, 7], or many-body perturbative techniques like random phase approximation [8, 9] and GW approximation [10–13], within the framework of imaginary time or Matsubara frequency formulation. This quantity provides valuable insights into the dynamic response of the system. However, it cannot be directly compared to real-frequency experimental observables. Therefore, it is necessary to convert the calculated values to real frequencies, which presents the fundamental challenge of the analytic continuation problem. In theory, the retarded Green’s function G R (ω) and the spectral function A(ω) can be derived from the imaginary-time Green’s function G(τ) or Matsubara Green’s function G(iω n ) by performing an inverse Laplace transformation [1, 2]. Due to the ill-conditioned nature of the transformation kernel, solving it directly is nearly impossible. In fact, the output for this inverse problem is highly sensitive to the input. Even minor fluctuations or noises in G(τ) or G(iω n ) can result in nonsensical changes for A(ω) or G R (ω), making analytic continuations extremely unstable. In recent decades, numerous techniques have been developed to address the challenges associated with analytic continuation problems. These methods include Padé approximation (PA) [14–17], maximum entropy method (MaxEnt) [18– 20], stochastic analytic continuation (SAC) [21–30], stochastic optimization method (SOM) [31–35], stochastic pole expansion (SPX) [36, 37], sparse modeling (SpM) [38, 39], Nevanlinna analytical continuation (NAC) [40, 41], causal projections [42], Prony fits [43–45], and machine learning assistant approaches [46–52], and so on. Each method has ∗ liangdu@gxnu.edu.cn † lihuang.dmft@gmail.com its own advantages and disadvantages. There is no doubt that the MaxEnt method is particularly popular due to its ability to maintain a balance between computational efficiency and accuracy [18–20]. Several open source toolkits, such as ΩMAXENT [53], QMEM [54], MAXENT by Kraberger et al. [55], MAXENT by Levy et al. [56], ALF [57], ACFlow [58], eDMFT [59], and ana cont [60], have been developed to implement this method. The MaxEnt method is rooted in Bayesian inference [61]. Initially, the spectral function A(ω) is constrained to be nonnegative and is interpreted as a probability distribution. Subsequently, the MaxEnt method endeavors to identify the most probable spectrum by minimizing a functional Q[A], which comprises the misfit functional L[A] and the entropic term S [A] [see Eq. (10)]. Here, L[A] quantifies the difference between the input and reconstructed Green’s function, while S [A] is employed to regulate the spectrum [18]. The Max- Ent method is well-established for the diagonal components of matrix-valued Green’s functions, as the corresponding spectral functions are non-negative (for fermionic systems). However, the non-negativity of the spectral functions cannot be assured for the off-diagonal components of matrix-valued Green’s functions. As a result, conventional MaxEnt method fails in this situation. Currently, there is a growing emphasis on obtaining the full matrix representation of the Green’s function (or the corresponding self-energy function) on the real axis [54, 62]. This is necessary for calculating lattice quantities of interest in Dyson’s equation [59]. Therefore, there is a strong demand for a reliable method to perform analytic continuation of the entire Green’s function matrix [41–43]. To meet this requirement, several novel approaches have been suggested in recent years as enhancements to the conventional MaxEnt method. The three most significant advancements are as follows: (1) Auxiliary Green’s function algorithm. It is possible to create an auxiliary Green’s function by combining the off-diagonal and diagonal elements of the matrix-valued Green’s function to ensure the positivity of the auxiliary spectrum [63–68]. The analytic continuation of the auxiliary Green’s function can" 2401.00037v1,"Messenger and Non-Coding RNA Design via Expected Partition Function and Continuous Optimization Ning Dai ∗ School of EECS Oregon State University Wei Yu Tang ∗ School of EECS Oregon State University David H. Mathews Dept. of Biochemistry & Biophysics, Center of RNA Biology, and Dept. of Biostatistics & Computational Biology University of Rochester Medical Center Tianshuo Zhou School of EECS Oregon State University Liang Huang ∗,† School of EECS and Dept. of Biochemistry & Biophysics Oregon State University Abstract The tasks of designing messenger RNAs and non-coding RNAs are discrete optimization problems, and several versions of these problems are NP-hard. As an alternative to commonly used local search methods, we formulate these problems as continuous optimization and develop a general framework for this optimization based on a new concept of “expected partition function”. The basic idea is to start with a distribution over all possible candidate sequences, and extend the objective function from a sequence to a distribution. We then use gradient descent-based optimization methods to improve the extended objective function, and the distribution will gradually shrink towards a one-hot sequence (i.e., a single sequence). We consider two important case studies within this framework, the mRNA design problem optimizing for partition function (i.e., ensemble free energy) and the non-coding RNA design problem optimizing for conditional (i.e., Boltzmann) probability. In both cases, our approach demonstrate promising preliminary results. We make our code available at https://github.com/KuNyaa/RNA_Design_codebase. 1 Introduction Ribonucleic acid (RNA) is of utmost importance in life because it plays both the informational role where messenger RNAs (mRNAs) pass genetic information from DNAs to proteins [Crick, 1970] as well as the functional roles where non-coding RNAs facilitate protein translation, catalyze reactions, and regulate gene expression [Eddy, 2001, Doudna and Cech, 2002]. By contrast, DNA has an informational role and protein only functional ones. In addition, the public became more aware of RNA because COVID-19 was caused by the RNA virus SARS-CoV-2 [Wu et al., 2020], which was then partially contained by mRNA vaccines [Baden et al., 2021, Polack et al., 2020]. The field of RNA design has applications in diagnostics and therapeutics [Zhang et al., 2023, Zhou et al., 2023]. There are two broad categories of RNA design problems, which correspond to the two roles of RNAs above. The first type (“information passing”) is to design optimal mRNAs given a protein, which aims to find the optimal mRNA in terms of factors such as stability and codon optimality among all the mRNA sequences that translate to that protein [Mauger et al., 2019, Cohen and Skiena, 2003, Terai et al., 2016]. For example, Zhang et al. [2023] designed an efficient algorithm for mRNA design that jointly optimizes minimum free energy (MFE) and codon optimality, by reducing the mRNA design problem to lattice parsing, where the design space is a regular language (encoded by a finite-state automata) and the objective function ∗ † equal contribution corresponding author: liang.huang.sh@gmail.com" 2401.00046v1,"Fluctuation Theorem on Riemannian Manifold Yifan Cai, ∗ Tao Wang, † and Liu Zhao ‡ School of Physics, Nankai University, Tianjin 300071, China (Dated: January 2, 2024) Based on the covariant underdamped and overdamped Langevin equations with Stratonovich coupling to multiplicative noises and the associated Fokker-Planck equations on Riemannian manifold, we present the first law of stochastic thermodynamics on the trajectory level. The corresponding fluctuation theorems are also established, with the total entropy production of the Brownian particle and the heat reservoir playing the role of dissipation function. Keywords: Langevin equation, Fokker-Planck equation, fluctuation theorem, Riemannian manifold I. INTRODUCTION Since the early 1990s, fluctuation theorems (FTs) [1– 3] have played an indispensable role in understanding the origin of macroscopic irreversibility. Such theorems, often realized in the form of unequal probabilities for the forward and reversed processes, greatly helped in resolving the long lasting puzzles and debates regarding Boltzmann’s H-theorem, known as Loschmidt paradox. Based on Sekimoto’s work [4] on stochastic energetics, Seifert [5] was able to establish a version of FT associated to the stochastic trajectories described by overdamped Langevin equation (OLE), and subsequent works [6–8] extended the construction to the cases of various generalized forms of Langevin equation (LE). Can we establish FTs on the trajectory level on curved Riemannian manifold? This is the question we wish to address in this work. In recent years, stochastic thermodynamics has gained increasing importance in understanding phenomena at the mesoscopic scale [9–13]. There are certain realistic scenarios, such as the diffusion of individual protein molecule on a biological membrane, which calls for a construction of LE and FT on Riemannian manifolds. Another motivation for the quest of stochastic thermodynamics and FT on Riemannian manifolds is to take it as a midway step towards general relativistic description of these fields, which is important because, in essence, every physics system must abide by the principles of relativity, whereas the spacetime symmetries in general relativity impose much stronger restrictions, making it harder to break the time reversal symmetry. In the past twenty five years or so, there have been some repeated attempts in the construction of LE on Riemannian manifolds in the mathematical literature [14– 19]. However, the first law and other thermodynamic relations were not considered in these works. Xing et al. [20, 21] explored an Ito-type nonlinear LE and established a FT on Riemannian manifold. It will be clear in the following main text that the meaning of “covariance” in their works is totally different from ours. II. LANGEVIN AND FOKKER-PLANCK EQUATIONS ON RIEMANNIAN MANIFOLD A. Underdamped case In [22], the relativistic covariant underdamped Langevin equation (ULE) on pseudo-Riemannian spacetime is established. The same procedure can be used for constructing LE on Riemannian space M with a positive definite metric g µν (x), so we directly present the result, dx̃ µt = p̃ µt dt,  m (1)  1 ∂ dp̃ µt = R µ a ◦ S d w̃ t a + R µ a ν R ν a dt 2 ∂p 1 µ ν 1 β µ − K ν p̃ t dt + f ex dt − Γ µ αβ p̃ α t p̃ t dt, m m (2) where R µ a represent the stochastic amplitudes which may depend on x̃ µ and p̃ µ , and d w̃ t a are Gaussian noises with probability distribution functions (PDFs) Pr[d w̃ t a = dw a ] =   δ ab dw a dw b 1 . (3) exp − 2dt (2πdt) d/2 The symbol ◦ S represents the Stratonovich coupling which ensures the chain rule in stochastic calculus. Greek indices label spatial directions and Latin indices label independent noises, which are all running from 1 to d. Tilded variables like d w̃ t a represent random variables, and the un-tilded symbols like dw a their realizations. Some remarks are in due here. ∗ caiyifan@mail.nankai.edu.cn † taowang@mail.nankai.edu.cn ‡ lzhao@nankai.edu.cn (1) The LE described above is a system of stochastic differential equations on the tangent bundle T M regarded as the space of micro states of the BP. Recall that" 2401.00057v1,"Generalization properties of contrastive world models Kandan Ramakrishnan ∗ Kandan.Ramakrishnan@bcm.edu R. James Cotton † rcotton@sralab.org Xaq Pitkow ∗‡§ xaq@cmu.edu Andreas S. Tolias ∗ astolias@bcm.edu Abstract Recent work on object-centric world models aim to factorize representations in terms of objects in a completely unsupervised or self-supervised manner. Such world models are hypothesized to be a key component to address the generalization problem. While self-supervision has shown improved performance however, OOD generalization has not been systematically and explicitly tested. In this paper, we conduct an extensive study on the generalization properties of contrastive world model. We systematically test the model under a number of different OOD generalization scenarios such as extrapolation to new object attributes, introducing new conjunctions or new attributes. Our experiments show that the contrastive world model fails to generalize under the different OOD tests and the drop in performance depends on the extent to which the samples are OOD. When visualizing the transition updates and convolutional feature maps, we observe that any changes in object attributes (such as previously unseen colors, shapes, or conjunctions of color and shape) breaks down the factorization of object representations. Overall, our work highlights the importance of object-centric representations for generalization and current models are limited in their capacity to learn such representations required for human-level generalization. 1 Introduction One of the main challenges in AI is to learn high-level causal variables from low-level variables like pixels in images that enable generalization. Learning world models [5, 7, 9, 19] in a self-supervised manner might be a key component for generalization [10]. Such world models also form a core component of human cognition [3]. A number of studies in cognitive psychology and neuroscience [13, 16, 20] show that world models aid in generalization and robust learning. For example, infants learn about the physical properties of objects as entities that behave consistently over time and are able to re-apply their knowledge to new scenarios involving previously unseen objects [14]. Thus, learning object-centric world models in a self-supervised manner seem to be a key component of cognition that allow humans to predict and generalize to novel situations. A desirable property of world models is their potential ability to generalize to novel objects as observed in infants [15]. While contrastive world models [8] have been previously evaluated for their prediction performance, very few studies have tested their effectiveness for generalization to novel data samples. In a recent study [1], world models are shown to have generalization abilities beyond their training environment or number of objects. This study evaluates generalization in terms of single ∗ Department of Neuroscience, Baylor College of Medicine. Shirley Ryan AbilityLab, Northwestern University ‡ Neuroscience Institute, Department of Machine Learning, Carnegie Mellon Univeristy § Department of ECE, Rice Univeristy † 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2401.00063v1,"Characterizing Hybrid Causal Structures with the Exclusivity Graph Approach Giovanni Rodari 1 , Davide Poderini 1,2 , Emanuele Polino 1,3 , Alessia Suprano 1 , Fabio Sciarrino 1 , and Rafael Chaves 2,4 1 Dipartimento di Fisica, Sapienza Università di Roma, Piazzale Aldo Moro 5, I-00185 Roma, Italy 2 International Institute of Physics, Federal University of Rio Grande do Norte, 59078-970, P. O. Box 1613, Natal, Brazil 3 Centre for Quantum Dynamics and Centre for Quantum Computation and Communication Technology, Griffith University, Yuggera Country, Brisbane, Queensland 4111, Australia 4 School of Science and Technology, Federal University of Rio Grande do Norte, Natal, Brazil 1 Introduction Analyzing the geometry of correlation sets constrained by general causal structures is of paramount importance for foundational and quantum technology research. Addressing this task is generally challenging, prompting the development of diverse theoretical techniques for distinct scenarios. Recently, novel hybrid scenarios combining different causal assumptions within different parts of the causal structure have emerged. In this work, we extend a graph theoretical technique to explore classical, quantum, and no-signaling distributions in hybrid scenarios, where classical causal constraints and weaker nosignaling ones are used for different nodes of the causal structure. By mapping such causal relationships into an undirected graph we are able to characterize the associated sets of compatible distributions and analyze their relationships. In particular we show how with our method we can construct minimal Bell-like inequalities capable of simultaneously distinguishing classical, quantum, and no-signaling behaviors, and efficiently estimate the corresponding bounds. The demonstrated method will represent a powerful tool to study quantum networks and for applications in quantum information tasks. Bell nonlocality [1, 2, 3] represents one of the most striking departures of quantum mechanics from our classical intuition. Since its inception, much work has been devoted to the development of theoretical concepts and computational tools to study this phenomenon [2, 3, 4, 5], driven both by its foundational content as well as its applications for quantum information processing [6, 7, 8, 9, 10]. The violation of Bell’s inequalities and more in general causal constraints, is a powerful tool to assess the nonclassicality of quantum systems in the so-called deviceindependent scenario where no assumptions are needed on the inner working of the employed apparatuses [11, 12]. Notably, the concept of quantum nonlocality has been extended to more complex scenarios involving multiple parties [13, 14] and general network configurations [15, 16, 17, 18, 19, 20, 21, 22, 23, 24]. This was possible also thanks to the realization that Bell’s theorem [1] can be seen as a particular instance of the incompatibility between quantum mechanics and classical causal reasoning [25, 26, 27, 28]. Recently [29, 30, 31, 32, 33], particular causal scenarios featuring additional compatibility constraints on the parties have been considered. The so-called broadcasting scenario can be thought of as an extension of the usual Bell bipartite scenario, where one of the two parties is split into two separated sub-parties on which one further imposes only weaker no-signaling constraints instead of the ones given by the assumption of local causality. In this context, it is essential to devise methods capable of characterizing general scenar- Fabio Sciarrino : fabio.sciarrino@uniroma1.it Rafael Chaves: rafael.chaves@ufrn.br 1" 2401.00085v1,"A dimension reduction approach for loss valuation in credit risk modelling Jian He , Asma Khedher 1 , and Peter Spreij 1, 2 Korteweg-de Vries Institute, University of Amsterdam, Amsterdam, The Netherlands 2 IMAPP, Radboud University, Nijmegen, The Netherlands 1 ∗1 January 2, 2024 Abstract This paper addresses the “curse of dimensionality” in the loss valuation of credit risk models. A dimension reduction methodology based on the Bayesian filter and smoother is proposed. This methodology is designed to achieve a fast and accurate loss valuation algorithm in credit risk modelling, but it can also be extended to valuation models of other risk types. The proposed methodology is generic, robust and can easily be implemented. Moreover, the accuracy of the proposed methodology in the estimation of expected loss and value-at-risk is illustrated by numerical experiments. The results suggest that, compared to the currently most used PCA approach, the proposed methodology provides more accurate estimation of expected loss and value-at-risk of a loss distribution. keywords: Bayesian filter, credit risk, loss valuation 2020 Mathematics Subject Classification: 62P05, 91G40 ∗ Corresponding author: j.he2@uva.nl 1" 2401.00089v1,"Conditions for eigenvalue configurations of two real symmetric matrices: a symmetric function approach Hoon Hong ∗1 , Daniel Profili †1 , and J. Rafael Sendra ‡2 1 Department of Mathematics, North Carolina State University, Raleigh, NC, USA 2 Department of Quantitative Methods, CUNEF-University, Spain January 2, 2024 Abstract For two real symmetric matrices, their eigenvalue configuration is the arrangement of their eigenvalues on the real line. We study the problem of determining a quantifier-free necessary and sufficient condition for two real symmetric matrices to realize a given eigenvalue configuration as a generalization of Descartes’ rule of signs. We exploit the combinatorial properties of our definition for eigenvalue configuration to reduce a two-polynomial root counting problem into several single-polynomial root counting problems of symmetric polynomials. We then leverage the fundamental theorem of symmetric polynomials to derive a final quantifier-free necessary and sufficient condition for two real symmetric matrices to realize a given eigenvalue configuration. 1 Introduction Let us take as a starting point for this introduction the problem of determining quantifier-free necessary and sufficient conditions on the coefficients of a polynomial such that its roots lie in a given subset of the plane. This is a fundamental problem in computational algebra and geometry and appears in the theory of stable polynomials, in combinatorics [9], in graph theory [15], and in functional analysis [1], among others. A particularly interesting case of this problem, that has been studied for centuries (see e.g. [11]), is the root counting problem. This type of problem can be addressed with quantifier elimination techniques, a very relevant area of research since Tarski proved, and provided an algorithm for, its feasibility over real closed fields (see [31] and [32]); see e.g. [22, 2, 14, 35, 13, 16, 17, 10, 18, 27, 7, 21, 34, 12, 23, 24, 3, 4, 29, 8, 6, 19] for further contributions in this active research field. The main drawback to applied these techniques is that the general algorithms in quantifier elimination have still doubly exponential time complexity, and furthermore their outputs grow very quickly toward being incomprehensible for even moderately sized inputs. As a consequence of these limitations, it seems natural to address the problem avoiding the use of general quantifier elimination techniques. This paper is framed in that context. In this paper we analyze the eigenvalue configuration of two real symmetric matrices; that is, the arrangement of their eigenvalues on the real line. In particular, the problem can be stated as follows: given an eigenvalue configuration provide necessary and sufficient conditions on the entries of two generic real symmetric matrices so that their eigenvalue configuration is the prescribed one. The main contribution of this paper is to provide a quantifier-free method to solve the problem above. For this purpose, we exploit the combinatorial structure of our definition of an eigenvalue configuration in ∗ hong@ncsu.edu † daprofil@ncsu.edu ‡ jrafael.sendra@cunef.edu 1" 2401.00093v1,"Fairness-Enhancing Vehicle Rebalancing in the Ride-hailing System Xiaotong Guo a , Hanyong Xu b , Dingyi Zhuang a , Yunhan Zheng b,∗ , Jinhua Zhao, Ph.D. b a Department of Civil and Environmental Engineering, Massachusetts Institute of Technology, Cambridge, MA, USA b Department of Urban Studies and Planning, Massachusetts Institute of Technology, Cambridge, MA, USA Abstract The rapid growth of the ride-hailing industry has revolutionized urban transportation worldwide. Despite its benefits, equity concerns arise as underserved communities face limited accessibility to affordable ride-hailing services. A key issue in this context is the vehicle rebalancing problem, where idle vehicles are moved to areas with anticipated demand. Without equitable approaches in demand forecasting and rebalancing strategies, these practices can further deepen existing inequities. In the realm of ride-hailing, three main facets of fairness are recognized: algorithmic fairness, fairness to drivers, and fairness to riders. This paper focuses on enhancing both algorithmic and rider fairness through a novel vehicle rebalancing method. We introduce an approach that combines a Socio-Aware Spatial-Temporal Graph Convolutional Network (SA-STGCN) for refined demand prediction and a fairnessintegrated Matching-Integrated Vehicle Rebalancing (MIVR) model for subsequent vehicle rebalancing. Our methodology is designed to reduce prediction discrepancies and ensure equitable service provision across diverse regions. The effectiveness of our system is evaluated using simulations based on real-world ride-hailing data. The results suggest that our proposed method enhances both accuracy and fairness in forecasting ride-hailing demand, ultimately resulting in more equitable vehicle rebalancing in subsequent operations. Specifically, the algorithm developed in this study effectively reduces the standard deviation and average customer wait times by 6.48% and 0.49%, respectively. This achievement signifies a beneficial outcome for ride-hailing platforms, striking a balance between operational efficiency and fairness. Keywords: Ride-hailing system, Vehicle Rebalancing, Fairness, Demand Prediction 1. Introduction Since its introduction in 2009, the ride-hailing industry has witnessed significant global growth. Fueled by technological advancements and the widespread adoption of mobile phones, ride-hailing services offered by Transportation Network Companies (TNCs) like Uber, Lyft, and Didi have revolutionized commuting, creating new economic opportunities. With a market size of approximately 30 billion USD and projected to reach 100 billion ∗ Corresponding author Email addresses: xtguo@mit.edu (Xiaotong Guo), hanyongx@mit.edu (Hanyong Xu), dingyi@mit.edu (Dingyi Zhuang), yunhan@mit.edu (Yunhan Zheng), jinhua@mit.edu (Jinhua Zhao, Ph.D.) Preprint submitted to Elsevier January 2, 2024" 2401.00099v1,"Strong ultrafast demagnetization due to the intraband transitions Mitsuko Murakami ∗ and G. P. Zhang † Department of Physics, Indiana State University, Terre Haute, IN 47809, USA (Dated: January 2, 2024) Abstract Demagnetization in ferromagnetic transition metals driven by a femtosecond laser pulse is a fundamental problem in solid state physics, and its understanding is essential to the development of spintronics devices. Ab initio calculation of time-dependent magnetic moment in the velocity gauge so far has not been successful in reproducing the large amount of demagnetization observed in experiments. In this work, we propose a method to incorporate intraband transitions within the velocity gauge through a convective derivative in the crystal momentum space. Our results for transition-element bulk crystals (bcc Fe, hcp Co and fcc Ni) based on the time-dependent quantum Liouville equation show a dramatic enhancement in the amount of demagnetization after the inclusion of an intraband term, in agreement with experiments. We also find that the effect of intraband transitions to each ferromagnetic material is distinctly different because of their band structure and spin property differences. Our finding has a far-reaching impact on understanding of ultrafast demagnetization. ∗ mitsuko@phys.ntu.edu.tw † guo-ping.zhang@outlook.com. https://orcid.org/0000-0002-1792-2701 1" 2401.00109v2,"Joint symbolic aggregate approximation of time series Xinye Chen Faculty of Mathematics and Physics Charles University Prague, Czech Republic xinye.chen@mff.cuni.cz ABSTRACT The increasing availability of temporal data poses a challenge to time-series and signal-processing domains due to its high numerosity and complexity. Symbolic representation outperforms raw data in a variety of engineering applications due to its storage efficiency, reduced numerosity, and noise reduction. The most recent symbolic aggregate approximation technique called ABBA demonstrates outstanding performance in preserving essential shape information of time series and enhancing the downstream applications. However, ABBA cannot handle multiple time series with consistent symbols, i.e., the same symbols from distinct time series are not identical. Also, working with appropriate ABBA digitization involves the tedious task of tuning the hyperparameters, such as the number of symbols or tolerance. Therefore, we present a joint symbolic aggregate approximation that has symbolic consistency, and show how the hyperparameter of digitization can itself be optimized alongside the compression tolerance ahead of time. Besides, we propose a novel computing paradigm that enables parallel computing of symbolic approximation. The extensive experiments demonstrate its superb performance and outstanding speed regarding symbolic approximation and reconstruction. KEYWORDS: time series analysis, symbolic aggregate approximation, data compression, parallel computing 1 INTRODUCTION Time series is of naturally high numerosity in the real world. Most algorithms are limited to the computational load for dealing with large-scale data. Therefore, it is very desired to compute a representation that reduces the numerosity while preserving the essential characteristics of time series, and the reasonable representation in time series often leads to a boost in algorithmic performance and dramatically alleviates the pressure of compute resources, i.e., symbolic approximation of time series has been demonstrated to speed up neural network inference [13]. However, computing symbolic representation for large-scale time series is tricky due to its high computational complexity. The adaptive Brownian bridge-based symbolic aggregation (ABBA) method as well as its accelerant variant fABBA is one of the state-ofthe-art symbolic approximation techniques regarding reconstruction error in time series domains. However, it requires transforming one single time series at a time, which shows clumsy behavior for multiple time series, especially in a large-scale manner. Besides, this method is inherently sequential, which makes it hard to fully utilize available computing resources. More importantly, the consistency of symbols is not guaranteed. The consistency here means each distinct symbol carries the same information in any sample of multiple time series. For example, the symbol “a” that appeared in a time series should be identical to the “a” in another time series. Besides, the parameter tuning is intractable without prior knowledge, although this problem is already mitigated with fABBA by using tolerance-dominated digitization. Our application of interests focuses on symbolizing multivariate/multiple time series in a unified manner. We propose a joint symbolic representation framework that addresses the aforementioned issues and enables parallelism. The extensive experiments demonstrate that the proposed algorithm can achieve significant speedup while retaining the competing performance of representation reconstruction, particularly for large-scale time series. The software has been integrated into PyPI registered software fABBA 1 . Our contribution is summarized as follows: (1) This paper analyzes the clustering in the digitization between ABBA and fABBA, and proposes a sampling-based k-means to accelerate the ABBA method while retaining its original accuracy. (2) A joint symbolic aggregate approximation method is proposed that enables a consistent symbolization for multivariate or multiple time series. Based on that, a novel parallel computing scheme for the symbolic approximation of time series, a multithreading test was performed to show its significant speedup over ABBA and fABBA. (3) Based on the Brownian bridge modeling, the provably errorbound method is proposed to automatically determine the hyper-parameter setting for fABBA digitization, which enables less prior knowledge of hyper-parameter tuning required for users. The remainder of this paper is structured as follows. Section 2 discusses related work of symbolic representation as well its applications. Section 3 reviews the necessary notions of ABBA framework. Section 4 expands the existing digitization analysis and presents a sampling-based algorithm that can speed up the vector quantization-based digitization, and also introduce a hyperparameter choosing method based on Brownian bridge modeling. Section 5 formally introduces our framework of joint symbolic approximation. Section 6 shows the empirical results of various competing algorithms and section 7 concludes the paper. 2 RELATED WORK Symbolic time series representation has important applications in time series analysis, such as clustering [20, 23, 32] and time series classification [19, 30, 34], forecasting [13], event prediction [37], anomaly detection [33], and motif discovery [15, 21, 23]. In this section, we briefly review some works on symbolic time series representation as well as its applications. The symbolic representation 1 https://github.com/nla-group/fABBA" 2401.00135v1,"> REPLACE THIS LINE WITH YOUR MANUSCRIPT ID NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Deep Radon Prior: A Fully Unsupervised Framework for Sparse-View CT Reconstruction Shuo Xu, Graduate Student Member, IEEE, Yucheng Zhang, Gang Chen, Xincheng Xiang, Peng Cong, and Yuewen Sun Abstract—Although sparse-view computed tomography (CT) has significantly reduced radiation dose, it also introduces severe artifacts which degrade the image quality. In recent years, deep learning-based methods for inverse problems have made remarkable progress and have become increasingly popular in CT reconstruction. However, most of these methods suffer several limitations: dependence on high-quality training data, weak interpretability, etc. In this study, we propose a fully unsupervised framework called Deep Radon Prior (DRP), inspired by Deep Image Prior (DIP), to address the aforementioned limitations. DRP introduces a neural network as an implicit prior into the iterative method, thereby realizing cross-domain gradient feedback. During the reconstruction process, the neural network is progressively optimized in multiple stages to narrow the solution space in radon domain for the under-constrained imaging protocol, and the convergence of the proposed method has been discussed in this work. Compared with the popular pre-trained method, the proposed framework requires no dataset and exhibits superior interpretability and generalization ability. The experimental results demonstrate that the proposed method can generate detailed images while effectively suppressing image artifacts. Meanwhile, DRP achieves comparable or better performance than the supervised methods. Index Terms—Computed tomography (CT), sparse-view CT, reconstruction algorithm, deep learning, unsupervised learning. A I. INTRODUCTION s a non-invasive imaging method, X-ray computed tomography (CT) has been utilized in a variety of fields, including security inspections, clinical applications, and nondestructive tests (NDTs). The potential harm caused by ionizing radiation has sparked growing concern regarding the minimization of CT dosages. One commonly employed technique is sparse-view CT, which involves a reduction in the number of projection views. Due to Nyquist sampling theorem, it is an extremely difficult task for traditional analytical and iterative CT reconstruction algorithms, such as filtered back-projection method(FBP), Expectation Maximization Algorithm (EM)[1], or simultaneous algebraic reconstruction technique(SART) [2], to get high-quality results Manuscript received xxx; revised xxx; accepted xxx. Date of publication xxx; date of current version xxx. (Corresponding authors: Yuewen Sun.) from sparse sampling data. Sparse sampling leads to data incompleteness in the projection domain, which may result in severe noise and artifacts in the reconstructed images. In recent decades, more and more researchers are focusing on deep learning techniques driven by their great success in computer vision. The reconstruction methods based on deep learning can be divided into two main approaches. (1) Data restoration. This type of method improves the quality of under-sampled measurement data by mapping projections and images separately into high-quality data. There are usually three ways for this method as following, image domain processing such as a deep convolutional neural network called FBPConvNet[3], projection domain processing such as a residual encoderdecoder CNN called RED-CNN[4], a denseNet deconvolution network called DD-Net[5], and hybrid domain processing like DuDoNet (Dual Domain Network)[6] and DRONE (Dual- Domain Residual-based Optimization Network)[7]. This type of algorithm can be easily deployed into the data flow of traditional algorithms and has certain advantages in terms of computation speed. Therefore, it has been widely researched in the fields of sparse view reconstruction, limited angle reconstruction and metal artifact removal. However, the consistency of the cross-domain progress between the original projection and the final image is not deliberated in this method, which leads to potential accuracy and robustness issues. (2) End-to-end learning. This approach takes the measurement values in radon domain as input and directly outputs the tomographic image, aiming to train a neural network to learn an inverse transformation operator corresponding to a specific imaging protocol, such as AUTOMAP[8] and iRadonMap[9]. However, this type of method is vulnerable to perturbation, which causes unstable results[10]. To improve the stability of the algorithm, an important branch is to combine neural networks with iterative algorithms. learned experts’ assessment-based reconstruction network (LEARN)[11] replaced the regularization term with a neural network. ISTA-Net[12] and FISTA-Net[13] used a shrinkage/soft-threshold step to update the gradient. The learned primal-dual hybrid gradient algorithm accounts for a (possibly non-linear) forward operator in a deep neural network Shuo Xu, Yucheng Zhang, Gang Chen, Xincheng Xiang, Peng Cong and Yuewen Sun are with the Institute of Nuclear and New Energy Technology (INET), Tsinghua University, Haidian District, Beijing, 100084, P. R. China, and also with Beijing Key Laboratory of Nuclear Detection Technology, Beijing, China (e-mail: xu-s19@mails.tsinghua.edu.cn; yuchengchengang910407@163.com; 18@mails.tsinghua.edu.cn; inetxxc@tsinghua.edu.cn; congp@tsinghua.edu.cn, syw15@mails.tsinghua.edu.cn)." 2401.00161v1,"DiffHybrid-UQ: Uncertainty Quantification for Differentiable Hybrid Neural Modeling Deepak Akhare a , Tengfei Luo a,b,c , Jian-Xun Wang a,b,d,∗ a Department of Aerospace and Mechanical Engineering, University of Notre Dame, Notre Dame, IN, USA b Center for Sustainable Energy (ND Energy), University of Notre Dame, Notre Dame, IN, USA c Department of Chemical and Biomolecular Engineering, University of Notre Dame, Notre Dame, IN, USA d Lucy Family Institute for Data & Society, University of Notre Dame, Notre Dame, IN, USA Abstract The hybrid neural differentiable models mark a significant advancement in the field of scien- tific machine learning. These models, integrating numerical representations of known physics into deep neural networks, offer enhanced predictive capabilities and show great potential for data-driven modeling of complex physical systems. However, a critical and yet unaddressed challenge lies in the quantification of inherent uncertainties stemming from multiple sources. Addressing this gap, we introduce a novel method, DiffHybrid-UQ, for effective and efficient uncertainty propagation and estimation in hybrid neural differentiable models, leveraging the strengths of deep ensemble Bayesian learning and nonlinear transformations. Specifically, our approach effectively discerns and quantifies both aleatoric uncertainties, arising from data noise, and epistemic uncertainties, resulting from model-form discrepancies and data sparsity. This is achieved within a Bayesian model averaging framework, where aleatoric uncertainties are modeled through hybrid neural models. The unscented transformation plays a pivotal role in enabling the flow of these uncertainties through the nonlinear func- tions within the hybrid model. In contrast, epistemic uncertainties are estimated using an ensemble of stochastic gradient descent (SGD) trajectories. This approach offers a practical approximation to the posterior distribution of both the network parameters and the physical parameters. Notably, the DiffHybrid-UQ framework is designed for simplicity in implemen- ∗ Corresponding author. Tel: +1 540 3156512 Email address: jwang33@nd.edu (Jian-Xun Wang) Preprint submitted to Elsevier January 2, 2024" 2401.00195v1,"Information acquisition in Adapt/Exchange decisions: When do people check alternative solution principles? Romy Müller & Maria Pohl Faculty of Psychology, Chair of Engineering Psychology and Applied Cognitive Research, TUD Dresden University of Technology, Dresden, Germany Corresponding author: Romy Müller Chair of Engineering Psychology and Applied Cognitive Research TUD Dresden University of Technology Helmholtzstraße 10, 01069 Dresden, Germany Email: romy.mueller@tu-dresden.de Phone: +49 351 46335330 Fax: +49 351 46337741 ORCID: 0000-0003-4750-7952 1" 2401.00208v1,"Inpaint4DNeRF: Promptable Spatio-Temporal NeRF Inpainting with Generative Diffusion Models Han Jiang * HKUST Haosen Sun * HKUST Ruoxuan Li * HKUST hjiangav@connect.ust.hk hsunas@connect.ust.hk rliba@connect.ust.hk Chi-Keung Tang HKUST Yu-Wing Tai Dartmouth College cktang@cs.ust.hk yu-wing.tai@dartmouth.edu Abstract scene. Generative inpainting has a wide range of potential applications, including digital art creation, and VR/AR. Although several recent works have addressed the inpainting and text-guided content generation problem on NeRFs, they have various limitations in directly generating consistent novel content seamlessly with the background based on the text input. Specifically, [4, 24, 41] allow users to edit the appearance of an existing object in the NeRF based on the text prompt, but their generations are limited by the original target object, thus they cannot handle substantial geometry changes. In [19, 31] a given NeRF is inpainted by removing the target object and inferring the background, but their inpainting task is not generative as they do not match the inferred background with any other user input. Recent generative works [12, 21, 26, 32] produce new 3D or 4D content from the text input, but the generation is not conditioned on the existing background. While [27] can generate contents around the target object without removing it, generative inpainting on NeRF should allow users to remove target objects while filling the exposed region with plausible 3D content, which was previously totally or partially occluded in the given scene. While applying recent diffusion models [22] on generative 2D inpainting may largely solve the problem, simply extending diffusion models to higher dimensions to static or dynamic NeRFs introduces extensive challenges, including new and more complex network structures and sufficient higher-dimensional training data. On the other hand, NeRFs are continuous multiview estimations on its training images which provide a natural connection between 2D images and NeRF, enabling us to propagate the 2D inpainting results by diffusion models to the underlying scene. Thus, in this paper, we propose Inpaint4DNeRF, the first work on text-guided generative NeRF inpainting with diffusion models, which can be naturally extended to inpaint 4D dynamic NeRFs. Given a text prompt, and a target fore- Current Neural Radiance Fields (NeRF) can generate photorealistic novel views. For editing 3D scenes represented by NeRF, with the advent of generative models, this paper proposes Inpaint4DNeRF to capitalize on state-of-the-art stable diffusion models (e.g., ControlNet [39]) for direct generation of the underlying completed background content, regardless of static or dynamic. The key advantages of this generative approach for NeRF inpainting are twofold. First, after rough mask propagation, to complete or fill in previously occluded content, we can individually generate a small subset of completed images with plausible content, called seed images, from which simple 3D geometry proxies can be derived. Second and the remaining problem is thus 3D multiview consistency among all completed images, now guided by the seed images and their 3D proxies. Without other bells and whistles, our generative Inpaint4DNeRF baseline framework is general which can be readily extended to 4D dynamic NeRFs, where temporal consistency can be naturally handled in a similar way as our multiview consistency. 1. Introduction Recent development of Neural Radiance Fields (NeRF) [18] and its dynamic variants including [20, 25, 28] have shown their great potential in modeling scenes in 3D and 4D. This representation is suitable for scene editing from straightforward user inputs such as text prompts, eliminating the need for modeling and animating in detail. One important task in scene editing is generative inpainting, which refers to generating plausible content that is consistent with the background * Equal contribution. The order of authorship was determined alphabetically. 1" 2401.00251v1,"The Impact of Thermosolutal Convection on Melting Dynamics of Nano-enhanced Phase Change Materials (NePCM) Yousef M. F. El Hasadi ∗1,2 1 Eindhoven University of Technology, Mechanical Engineering Department, The Netherlands 2 Process and Energy department, Delft University of Technology,Leeghwaterstraat 39,2628 CB Delft, the Netherlands Abstract Nanoparticle-Enhanced Phase Change Materials (NePCM) have been a subject of intensive research owing to their potential for en- hanced thermo-physical properties. However, their behavior during phase change processes, such as melting or solidification, remains in- adequately understood. This investigation focuses on the melting pro- cess of NePCM in a square cavity, exploring distinct cases of melting from both the top and bottom sides. The NePCM comprises copper nanoparticles (2 nm in size) suspended in water. Our study involves ∗ Email address for correspondence: yme0001@auburn.edu,g.damianidis.al.chasanti@tue.nl 1" 2401.00292v1,"INFORMATICA, 2024, Vol. 0, No. 0, 0–0 © 2024 Vilnius University DOI: https://doi.org/0000 1 A general framework for providing interval representations of Pareto optimal outcomes for large-scale bi- and tri-criteria MIP problems Grzegorz FILCEK 1 , Janusz MIROFORIDIS 2,∗ 1 Ul. Wybrzeże Wyspiańskiego 27, 50-370 Wrocław, Wrocław University of Science and Technology, Poland 2 Ul. Newelska 6, 01-447 Warszawa, Systems Research Institute, Polish Academy of Sciences, Poland e-mail: grzegorz.filcek@pwr.edu.pl, janusz.miroforidis@ibspan.waw.pl Abstract. The Multi-Objective Mixed-Integer Programming (MOMIP) problem is one of the most challenging. To derive its Pareto optimal solutions one can use the well-known Chebyshev scalarization and Mixed-Integer Programming (MIP) solvers. However, for a large-scale instance of the MOMIP problem, its scalarization may not be solved to optimality, even by state-of-the-art optimization packages, within the time limit imposed on the optimization. If a MIP solver cannot derive the optimal solution within the assumed time limit, it provides the optimality gap, which gauges the quality of the approximate solution. However, for the MOMIP case, no information is provided on the lower and upper bounds of the components of the Pareto optimal outcome. For the MOMIP problem with two and three objective functions, an algorithm is proposed to provide the so-called interval representation of the Pareto optimal outcome designated by the weighting vector when there is a time limit on solving the Chebyshev scalarization. Such interval representations can be used to navigate on the Pareto front. The results of several numerical experiments on selected large-scale instances of the multi-objective, multidimensional 0-1 knapsack problem illustrate the proposed approach. The limitations and possible enhancements of the proposed method are also discussed. Key words: multi-objective mixed-integer programming, large-scale optimization, Chebyshev scalarization, Pareto front approximations, lower bounds, upper bounds. 1. Introduction The derivation of optimal solutions to large-scale instances of the Mixed-Integer Programming (MIP) problem can be impossible within a reasonable time limit even for contemporary commercial MIP solvers, e.g., GUROBI (Gurobi (2023)), CPLEX (IBM (2023)). In this case, a MIP solver provides the optimality gap (MIP gap) that gauges the quality of the approximate solution, i.e., the last feasible solution (incumbent). This optimality gap is calculated based on the incumbent and the so-called MIP best bound. ∗ Corresponding author." 2401.00313v3,"Matching of Users and Creators in Two-Sided Markets with Departures Daniel Huttenlocher 1 , Hannah Li 2 , Liang Lyu 1 , Asuman Ozdaglar 1 , and James Siderius 3 1 Massachusetts Institute of Technology, 77 Massachusetts Ave, Cambridge, Massachusetts, United States 02139 2 Columbia Business School, 665 West 130th Street, New York, New York, United States 10027 3 Tuck School of Business, Dartmouth College, 100 Tuck Hall, Hanover, New Hampshire, United States 03755 Abstract Many online platforms of today, including social media sites, are two-sided markets bridging content creators and users. Most of the existing literature on platform recommendation algorithms largely focuses on user preferences and decisions, and does not simultaneously address creator incentives. We propose a model of content recommendation that explicitly focuses on the dynamics of user-content matching, with the novel property that both users and creators may leave the platform permanently if they do not experience sufficient engagement. In our model, each player decides to participate at each time step based on utilities derived from the current match: users based on alignment of the recommended content with their preferences, and creators based on their audience size. We show that a user-centric greedy algorithm that does not consider creator departures can result in arbitrarily poor total engagement, relative to an algorithm that maximizes total engagement while accounting for two-sided departures. Moreover, in stark contrast to the case where only users or only creators leave the platform, we prove that with two-sided departures, approximating maximum total engagement within any constant factor is NP-hard. We present two practical algorithms, one with performance guarantees under mild assumptions on user preferences, and another that tends to outperform algorithms that ignore two-sided departures in practice. 1 Introduction Many platforms today, including most social media platforms, are in essence two-sided markets bringing content creators and users together. These platforms highly value intense engagement of users, because they generate revenue by selling digital ads to third parties or sometimes products and services to users, which become more profitable when users are more engaged. User engagement in turn depends on both the quality of the content created and how successfully this content is matched to the interests and preferences of users, making content recommendation algorithms a centerpiece of the operation of these platforms. Even though these algorithms vary between platforms such as Spotify, YouTube and Etsy to social media sites such as Facebook, X (formerly Twitter) and TikTok, all of these platforms rely on high-quality content and matching of this content to interested users. Content recommendations not only affect user behavior, but also production decisions of creators who aim to attract more users, either to more successfully monetize their offered content or because of intrinsic incentives (such as to get a bigger fan base). There is a growing literature exploring how platforms can best provide users with content aligned with their preferences, as well as a smaller body of work that looks at incentives of content creators. However, a common assumption among these is that agents on one side of the market are taken “as given,” and content recommenations affect either user or creator behavior, but not both simultaneously. In our paper, we endogenize both user and creator behaviors through platform participation constraints, where creators require sufficient viewership and users need access to the types of content they desire. Recommendations that do not meet these constraints will induce some users to leave, some creators to leave, or both. 1" 2401.00315v2,"Bidirectional Temporal Plan Graph: Enabling Switchable Passing Orders for More Efficient Multi-Agent Path Finding Plan Execution Yifan Su, Rishi Veerapaneni, Jiaoyang Li Carnegie Mellon University {yifansu,rveerapa}@andrew.cmu.edu, jiaoyangli@cmu.edu Abstract The Multi-Agent Path Finding (MAPF) problem involves planning collision-free paths for multiple agents in a shared environment. The majority of MAPF solvers rely on the assumption that an agent can arrive at a specific location at a specific timestep. However, real-world execution uncertainties can cause agents to deviate from this assumption, leading to collisions and deadlocks. Prior research solves this problem by having agents follow a Temporal Plan Graph (TPG), enforcing a consistent passing order at every location as defined in the MAPF plan. However, we show that TPGs are overly strict because, in some circumstances, satisfying the passing order requires agents to wait unnecessarily, leading to longer execution time. To overcome this issue, we introduce a new graphical representation called a Bidirectional Temporal Plan Graph (BTPG), which allows switching passing orders during execution to avoid unnecessary waiting time. We design two anytime algorithms for constructing a BTPG: BTPG-naı̈ve and BTPG-optimized. Experimental results show that following BTPGs consistently outperforms following TPGs, reducing unnecessary waits by 8-20%. 1 Introduction The Multi-Agent Path Finding (MAPF) problem involves finding paths for multiple agents to reach their respective destinations from their starting points in a shared environment without collisions (Stern et al. 2019). The importance of solving the MAPF problem is reflected in its wide range of applications, such as warehouse automation (Varambally, Li, and Koenig 2022), traffic management (Li et al. 2021a), and drone swarm coordination (Honig et al. 2018). The MAPF problem discretizes time into unit timesteps, assuming that an agent can reach a particular location at a particular timestep. However, in practice, agents face challenges such as communication delays, physical constraints, or hardware failures that prevent them from meeting this assumption. When an agent is unable to reach a location required by the MAPF plan at a specific timestep, it may result in deadlocks or collisions with other agents. To address this issue, Ma, Kumar, and Koenig (2017) proposed a MAPF with Delay Probability (MAPF-DP) model where, at each timestep, each agent has a certain probability of stopping in place, leading to delays. Both Ma, Kumar, and Koenig (2017) and Hoenig et al. (2016) show that as long as the agents adhere to the inter-agent dependencies required (a) Scenario 1. (b) Scenario 2. (c) TPG for Scenario 2. Figure 1: Motivating examples. In Scenario 1 (2), the MAPF plan requries the agents to follow the arrows with the green agent passing through location F (E) before the blue agent. by the MAPF plan, they can complete their respective paths without collisions or deadlocks. These dependencies ensure that the order in which the agents pass through every location is consistent with the planned path. Both studies capture these dependencies by defining a graph representation, called the Temporal Plan Graph (TPG). Requiring agents to execute according to the dependencies in the TPG ensures completion of the MAPF plan without collisions and deadlocks, even if agents reach some locations at different timesteps than specified in the MAPF plan. In Figure 1a, the MAPF plan specifies that the green agent should pass location F before the blue agent. If they follow the corresponding TPG, the green agent will pass F first. Switching this order would lead to a deadlock, with the blue agent trying to move from F to E and the green agent from E to F. In contrast, Figure 1b shows a different scenario. Here, the green agent is supposed to pass location E first. If the green agent is delayed at D, the TPG makes the blue agent wait at B until the green agent passes E. However, if the green agent is delayed, the blue agent can safely pass E first without causing a deadlock. This flexibility in switching the order of passing can reduce unnecessary waiting and shorten the overall execution time. The goal of this paper is to determine when the dependencies can be switched, allowing agents to pass such locations in a “first-come-first-served” manner in execution to minimize unnecessary waiting time. Our main contributions are: 1. Defining a new graphical representation called the Bidirectional Temporal Planning Graph (BTPG) for capturing all such switchable dependencies in a MAPF plan; 2. Introducing sufficient conditions for a BTPG to be prov-" 2401.00316v1,"RASP FOR LSASS: PREVENTING MIMIKATZ-RELATED ATTACKS Anna Revazova Igor Korkin, PhD Security Researcher Moscow, Russia igor.korkin@gmail.com Bachelor of Information Security, MEPhI Moscow, Russia aanrevazova@gmail.com ABSTRACT The Windows authentication system is implemented using the LSA (Local Security Authority) system and its process lsass.exe. This structure has a number of vulnerabilities, which makes it extremely attractive to intruders. Using known vulnerabilities from the CVE database or special mimikatz-type software, an attacker is able to obtain the user’s password-address information. This paper will consider some ways to prevent attacks on local authentication subsystem as well as show some practical results of some methods, including those formulated earlies, and consider their applicability in real life. Keywords: OS Security, LSASS, password attack, mimikatz, credentials. 1 INTRODUCTION Authentication Service (LSASS) is a part of the Windows operating system responsible for authorization of local users of a separate computer. The service is critical, since without it, logging in for local users (not registered in the domain) is impossible in principle. A very simple structure of Windows authentication is shown on Figure 1. Despite the growing popularity of other operating systems, nowdays the Windows operating system is one of the most popular and commonly used for PCs both for personal use and for developers. The process of local user authentication is implemented in the authentication service of the local security system. The Local Security System Figure 1 — Simple scheme of authentication The process checks the authorization data, and for the successful authorization, the service sets a flag about the possibility of logging in. If authorization was started by the user, the user shell startup flag is also set. If authorization was initialized by a service or application, this application is granted the rights of this user. and the method of transferring authorization data between components are not documented. In addition, the password is not transmitted in pure form, but in the form of a hash, which is compared with the hash of the real password. For further work, we should consider the local authentication scheme in a little more detail. When this service becomes infected with viruses or when intruder gets full access to this service, the system obeys the attacker, who can get full rights to access the target computer. Therefore, the encryption method First of all, let's start with local authentication, when a user wants to log in directly to a workstation that is not part of the domain. What happens after the user has 1" 2401.00344v1,"Universality in block dependent linear models with applications to nonparametric regression Samriddha Lahiry *,a and Pragya Sur *,b * Department of Statistics, Harvard University, a slahiry@fas.harvard.edu, b pragya@fas.harvard.edu January 2, 2024 Abstract Over the past decade, characterizing the exact asymptotic risk of regularized estimators in highdimensional regression has emerged as a popular line of work. This literature considers the proportional asymptotics framework, where the number of features and samples both diverge, at a rate proportional to each other. Substantial work in this area relies on Gaussianity assumptions on the observed covariates. Further, these studies often assume the design entries to be independent and identically distributed. Parallel research investigates the universality of these findings, revealing that results based on the i.i.d. Gaussian assumption extend to a broad class of designs, such as i.i.d. sub-Gaussians. However, universality results examining dependent covariates so far focused on correlation-based dependence or a highly structured form of dependence, as permitted by right rotationally invariant designs. In this paper, we break this barrier and study a dependence structure that in general falls outside the purview of these established classes. We seek to pin down the extent to which results based on i.i.d. Gaussian assumptions persist. We identify a class of designs characterized by a block dependence structure that ensures the universality of i.i.d. Gaussian-based results. We establish that the optimal values of the regularized empirical risk and the risk associated with convex regularized estimators, such as the Lasso and ridge, converge to the same limit under block dependent designs as they do for i.i.d. Gaussian entry designs. Our dependence structure differs significantly from correlation-based dependence, and enables, for the first time, asymptotically exact risk characterization in prevalent nonparametric regression problems in high dimensions. Finally, we illustrate through experiments that this universality becomes evident quite early, even for relatively moderate sample sizes. 1 Introduction Over the past decade, a novel regime to exploring high-dimensional asymptotics has emerged in supervised learning. This paradigm posits that the number of features (p) and the number of samples (n) both diverge with the ratio p/n converging to a positive constant. For natural reasons, this paradigm is referred to as the proportional asymptotics regime. Numerous parallel techniques have emerged to address statistical and probabilistic questions within this framework, including random matrix theory [MP67], approximate message passing theory [DMM09, BM11, BM12, Ran11, JM13, ZK16, DM16, SC19, BKM + 19, WWM20, MV21, FVRS22, LFW23], the leave-one-out/cavity method [MPV87, Tal03, MM09, KBB + 13, BBKY13, EK18, ZK16, SCC19, SC19, CCFM21], convex Gaussian min-max theorem [Sto13a, Sto13b, Sto13c, OTH13, TOH15, TAH18], etc. The widespread adoption of this paradigm in statistical research can, in part, be attributed to its precise asymptotic results, which showcase exceptional performance when tested on finite samples (cf. [CS20, SC19, SCC19, ZSC22, SC18, ZK16, FVRS22, MS22b, LS22, JMSS22] and references cited therein). Moreover, this paradigm liberates researchers from stringent sparsity assumptions on underlying signals, accommodating structured classes of both dense and sparse signals. 1" 2401.00356v1,"Understanding Driver Agency in RideSharing IYADUNNI ADENUGA, Pennsylvania State University, USA BENJAMIN HANRAHAN, Pennsylvania State University, USA Agency is an important human characteristic that users of automated complex technologies are usually denied. This affects the user’s experience leading to decreased satisfaction and productivity. In this paper, we consider the ridesharing context and interviewed 7 drivers to understand the controls that would improve the agency they feel. The results show that they desire transparency, community and an effective ability to seek redress. CCS Concepts: • Human-centered computing → Empirical studies in HCI. Additional Key Words and Phrases: User Agency, Ridesharing 1 INTRODUCTION Many complex systems affect our lives directly or indirectly, while running automated algorithms that are not created to be explainable, answerable or amenable to people. These complex systems are usually, not adaptable and are not designed to consider or react to possible imprecise actions from users [19]. Today, progress in the development of complex systems, such as systems that use artificial intelligence (AI) technology, is accompanied by the automation and erasure of human inputs and efforts. For laborious, manual, repetitive tasks, automation is usually welcome but people notice and care about the loss of agency [20]. End-users are encountering these ever-increasing number of complex algorithms in their daily lives in a wide range of applications and so, there have been many calls for algorithmic transparency in a number of domains [9, 23, 31]. These calls for transparency are because users rarely understand how these complex algorithms function and rarely know how to affect them to better support their own interests and goals. Social “non-technical” societies, including the European commission, regard human agency especially, at the audit level as an important requirement for deployed AI systems [11, 18]. For relatable human-human scenarios (e.g. teacher-student, manager-employee), introduction of agency attributes (i.e. perceived self-efficacy) and increasing a sense of agency, has been shown to improve user experience, output productivity and performance [8]. Research shows that the presence of elements such as immediacy behaviours and user agency influence human trust in technological systems positively, even when such systems provide inaccurate results[14]. Still, it is usually an afterthought to design user agency in autonomous situations. Ridesharing is an example of a laborious activity that is supported by automated AI algorithms for algorithmic management. There are many stakeholders involved in this activity and they’re usually affected by output from these ridesharing AI platforms. Examples of these stakeholders include drivers and passengers. Drivers depend on these platforms for work opportunities but they usually do not feel agency over their experiences [29]. This leads to decreased satisfaction and productivity. To improve these platforms, it’s important to initially understand what agency means to drivers and how they navigate current platforms they interact with. In this preliminary work, using value-sensitive design principles, we interviewed 7 drivers to understand how they handle different ride scenarios and the tools they employ to improve their experiences. Authors’ addresses: Iyadunni Adenuga, ija5027@psu.edu, Pennsylvania State University, Westgate Building, University Park, PA, USA, 16802; Benjamin Hanrahan, bvh10@psu.edu, Pennsylvania State University, Westgate Building, University Park, PA, USA, 16802. 1" 2401.00368v2,"Improving Text Embeddings with Large Language Models Liang Wang ∗ , Nan Yang, Xiaolong Huang, Linjun Yang, Rangan Majumder, Furu Wei Microsoft Corporation https://aka.ms/GeneralAI Abstract In this paper, we introduce a novel and simple method for obtaining high-quality text embeddings using only synthetic data and less than 1k training steps. Unlike existing methods that often depend on multi-stage intermediate pre-training with billions of weakly-supervised text pairs, followed by fine-tuning with a few labeled datasets, our method does not require building complex training pipelines or relying on manually collected datasets that are often constrained by task diversity and language coverage. We leverage proprietary LLMs to generate diverse synthetic data for hundreds of thousands of text embedding tasks across nearly 100 languages. We then fine-tune open-source decoder-only LLMs on the synthetic data using standard contrastive loss. Experiments demonstrate that our method achieves strong performance on highly competitive text embedding benchmarks without using any labeled data. Furthermore, when fine-tuned with a mixture of synthetic and labeled data, our model sets new state-of-the-art results on the BEIR and MTEB benchmarks. 1 Introduction Text embeddings are vector representations of natural language that encode its semantic information. They are widely used in various natural language processing (NLP) tasks, such as information retrieval (IR), question answering, semantic textual similarity, bitext mining, item recommendation, etc. In the field of IR, the first-stage retrieval often relies on text embeddings to efficiently recall a small set of candidate documents from a large-scale corpus using approximate nearest neighbor search techniques. Embedding-based retrieval is also a crucial component of retrieval-augmented generation (RAG) [21], which is an emerging paradigm that enables large language models (LLMs) to access dynamic external knowledge without modifying the model parameters. Source attribution of generated text is another important application of text embeddings [14] that can improve the interpretability and trustworthiness of LLMs. Previous studies have demonstrated that weighted average of pre-trained word embeddings [35, 1] is a strong baseline for measuring semantic similarity. However, these methods fail to capture the rich contextual information of natural language. With the advent of pre-trained language models [11], Sentence-BERT [37] and SimCSE [13] have been proposed to learn text embeddings by finetuning BERT on natural language inference (NLI) datasets. To further enhance the performance and robustness of text embeddings, state-of-the-art methods like E5 [46] and BGE [48] employ a more complex multi-stage training paradigm that first pre-trains on billions of weakly-supervised text pairs, and then fine-tunes on several labeled datasets. Existing multi-stage approaches suffer from several drawbacks. Firstly, they entail a complex multi-stage training pipeline that demands substantial engineering efforts to curate large amounts ∗ Correspondence to {wangliang,nanya,fuwei}@microsoft.com Technical Report." 2401.00393v1,"Generative Model-Driven Synthetic Training Image Generation: An Approach to Cognition in Rail Defect Detection Rahatara Ferdousi 1 , Chunsheng Yang 2 , M. Anwar Hossain 3 , Fedwa Laamarti 1,4 , M. Shamim Hossain 5 , Abdulmotaleb El Saddik 1,4 1 The University of Ottawa, Ottawa, Ontario, Canada 2 National Research Council Canada, Ottawa, Ontario, Canada 3 School of Computing, Queen’s University, Kingston, Ontario, Canada 4 Computer Vision Department, Mohamed bin Zayed University of Artificial Intelligence, UAE 5 Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Saudi Arabia. Corresponding author: Rahatara Ferdousi (e-mail: rferd068@uottawa.ca); M. Shamim Hossain (e-mail: mshossain@ksu.edu.sa.) Abstract Recent advancements in cognitive computing, with the integration of deep learning techniques, have facilitated the development of intelligent cognitive systems (ICS). This is particularly beneficial in the context of rail defect detection, where the ICS would emulate human-like analysis of image data for defect patterns. Despite the success of Convolutional Neural Networks (CNN) in visual defect classification, the scarcity of large datasets for rail defect detection remains a challenge due to infrequent accident events that would result in defective parts and images. Contemporary researchers have addressed this data scarcity challenge by exploring rule-based and generative data augmentation models. Among these, Variational Autoencoder (VAE) models can generate realistic data without extensive baseline datasets for noise modeling. This study proposes a VAE-based synthetic image generation technique for rail defects, incorporating weight decay regularization and image reconstruction loss to prevent overfitting. The proposed method is applied to create a synthetic dataset for the Canadian Pacific Railway (CPR) with just 50 real sam-ples across five classes. Remarkably, 500 synthetic samples are generated with a minimal reconstruction loss of 0.021. A Visual Transformer (ViT) model underwent fine-tuning using this synthetic CPR dataset, achieving high accuracy rates (98%-99%) in classifying the five defect classes. This research offers a promising solution to the data scarcity challenge in rail defect detection, showcasing the potential for robust ICS development in this domain. A comprehensive video presentation is available for viewing via this link: Video Presentation on SharePoint. 1" 2401.00423v1,"MSGNet: Learning Multi-Scale Inter-Series Correlations for Multivariate Time Series Forecasting Wanlin Cai 1 , Yuxuan Liang 2 , Xianggen Liu 1 , Jianshuai Feng 3 , Yuankai Wu 1 * 1 Sichuan University The Hong Kong University of Science and Technology (Guangzhou) 3 Beijing Institute of Technology yozhiboo@gmail.com, yuxliang@outlook.com, liuxgcs@foxmail.com, 3120185238@bit.edu.cn, wuyk0@scu.edu.cn Abstract Multivariate time series forecasting poses an ongoing challenge across various disciplines. Time series data often exhibit diverse intra-series and inter-series correlations, contributing to intricate and interwoven dependencies that have been the focus of numerous studies. Nevertheless, a significant research gap remains in comprehending the varying inter-series correlations across different time scales among multiple time series, an area that has received limited attention in the literature. To bridge this gap, this paper introduces MSGNet, an advanced deep learning model designed to capture the varying inter-series correlations across multiple time scales using frequency domain analysis and adaptive graph convolution. By leveraging frequency domain analysis, MS- GNet effectively extracts salient periodic patterns and decomposes the time series into distinct time scales. The model incorporates a self-attention mechanism to capture intra-series dependencies, while introducing an adaptive mixhop graph convolution layer to autonomously learn diverse inter-series correlations within each time scale. Extensive experiments are conducted on several real-world datasets to showcase the effectiveness of MSGNet. Furthermore, MSGNet possesses the ability to automatically learn explainable multi-scale inter-series correlations, exhibiting strong generalization capabilities even when applied to out-of-distribution samples. Code is available at https://github.com/YoZhibo/MSGNet. Introduction Throughout centuries, the art of forecasting has been an invaluable tool for scientists, policymakers, actuaries, and salespeople. Its foundation lies in recognizing that hidden outcomes, whether in the future or concealed, often reveal patterns from past observations. Forecasting involves skillfully analyzing available data, unveiling interdependencies and temporal trends to navigate uncharted territories with confidence and envision yet-to-be-encountered instances with clarity and foresight. In this context, time series forecasting emerges as a fundamental concept, enabling the analysis and prediction of data points collected over time, offering insights into variables like stock prices (Cao 2022), weather conditions (Bi et al. 2023), or customer behavior (Salinas et al. 2020). * Corresponding author Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. value 2 pos corr Graph for scale 1 neg corr scale 1 observation time scale 2 observation Graph for scale 2 Figure 1: In the longer time scale 1 , the green and red time series are positively correlated, whereas in the shorter time scale 2 , they exhibit a negative correlation. Consequently, we observe two distinct graph structures in these two different time scales. Two interconnected realms within time series forecasting come into play: intra-series correlation modeling, which predicts future values based on patterns within a specific time series, and inter-series correlation modeling, which explores relationships and dependencies between multiple time series. Recently, deep learning models have emerged as a catalyst for breakthroughs in time series forecasting. On one hand, Recurrent Neural Networks (RNNs) (Salinas et al. 2020), Temporal Convolution Networks (TCNs) (Yue et al. 2022), and Transformers (Zhou et al. 2021) have demonstrated exceptional potential in capturing temporal dynamics within individual series. Simultaneously, a novel perspective arises when considering multivariate time series as graph signals. In this view, the variables within a multivariate time series can be interpreted as nodes within a graph, interconnected through hidden dependency relationships. Consequently, Graph Neural Networks (GNNs) (Kipf and Welling 2017) offer a promising avenue for harnessing the intricate interdependencies among multiple time series. Within the domain of time series analysis, there is a significant oversight concerning the varying inter-series correlations across different time scales among multiple time series, which the existing deep learning models fail to accurately describe. For instance, in the realm of finance, the correlations among various asset prices, encompassing" 2401.00431v1,"Wild2Avatar: Rendering Humans Behind Occlusions Tiange Xiang 1 * , Adam Sun 1 , Scott Delp 1 , Kazuki Kozuka 2 , Li Fei-Fei 1 , Ehsan Adeli 1* 1 Stanford University 2 Panasonic https://cs.stanford.edu/˜xtiange/projects/wild2avatar/ Figure 1. In this paper, we introduce Wild2Avatar, a method to render high fidelity human avatars from in-the-wild monocular videos behind occlusions. To achieve photo-realistic rendering, we parameterize the scene into three parts: occlusion→human→background and decouple the renderings through novel optimization objectives. Faces in the figure are blurred for anonymity. camera view, these methods are able to render the human accurately from novel views. However, most existing human rendering methods are designed for ideal experimental scenes with little to no obstacles and a full view of the human in each frame. In real-world scenes, however, humans might move behind objects and move them around, causing the objects to block the camera’s view. Most neural rendering methods face difficulty with realworld occluded scenarios for one main reason – lack of supervision. More specifically, in-the-wild scenarios usually do not provide ground-truth supervision of the appearance, shape, and pose of the human, making it necessary for the model to infer this information based on sparse evidence. This can be challenging, especially when a large portion of the human body is invisible. Due to the point-based rendering scheme of many neural methods, two very close coordinates can create a dramatic difference in rendering output when one is occluded and one is not [28, 46]. As a result, methods that are not adapted to occluded scenarios frequently display incomplete human bodies or render floaters and other artifacts when they encounter occlusions. In this work, we address these shortcomings by introducing Wild2Avatar (Figure 1), an improved method for rendering humans under occlusion. Our method models the occlusions, human, and background as three separate neural fields, allowing a clean 3D reconstruction of the human regardless of occlusion. To accomplish this, we utilize scene self-decomposition. Extending upon inverted sphere parametrization [53], we propose occlusion-aware Abstract Rendering the visual appearance of moving humans from occluded monocular videos is a challenging task. Most existing research renders 3D humans under ideal conditions, requiring a clear and unobstructed scene. Those methods cannot be used to render humans in real-world scenes where obstacles may block the camera’s view and lead to partial occlusions. In this work, we present Wild2Avatar, a neural rendering approach catered for occluded in-the-wild monocular videos. We propose occlusion-aware scene parameterization for decoupling the scene into three parts - occlusion, human, and background. Additionally, extensive objective functions are designed to help enforce the decoupling of the human from both the occlusion and the background and to ensure the completeness of the human model. We verify the effectiveness of our approach with experiments on in-the-wild videos. 1. Introduction Rendering humans from videos has a wide variety of applications in many fields, including AR/VR [9, 12], film [3], and healthcare [6]. Videos from single cameras are widespread and easy to acquire, so rendering humans from monocular videos has been the target of copious research. Methods to accomplish this task such as Vid2Avatar [9], MonoHuman [51], and NeuMan [19] have achieved impressive performance. Despite being provided with only one * Correspondence to {xtiange,eadeli}@stanford.edu 1" 2401.00466v1,"ONLINE SYMBOLIC MUSIC ALIGNMENT WITH OFFLINE REINFORCEMENT LEARNING Silvan David Peter Institute of Computational Perception, Johannes Kepler University Linz, Austria silvan.peter@jku.at ABSTRACT Symbolic Music Alignment is the process of matching performed MIDI notes to corresponding score notes. In this paper, we introduce a reinforcement learning (RL)- based online symbolic music alignment technique. The RL agent — an attention-based neural network — iteratively estimates the current score position from local score and performance contexts. For this symbolic alignment task, environment states can be sampled exhaustively and the reward is dense, rendering a formulation as a simplified offline RL problem straightforward. We evaluate the trained agent in three ways. First, in its capacity to identify correct score positions for sampled test contexts; second, as the core technique of a complete algorithm for symbolic online note-wise alignment; and finally, as a real-time symbolic score follower. We further investigate the pitch-based score and performance representations used as the agent’s inputs. To this end, we develop a second model, a twostep Dynamic Time Warping (DTW)-based offline alignment algorithm leveraging the same input representation. The proposed model outperforms a state-of-the-art reference model of offline symbolic music alignment. 1. INTRODUCTION Music alignment refers to matching at least two different versions of the same musical material. In this paper, we address symbolic music alignment, for our purposes defined as models that match individual notes of a performance recorded as MIDI file to individual notes of a score encoded as MusicXML file. Alignment procedures can be separated into online or offline classes. If the alignment procedure is carried out with access to the full versions of the musical material, we refer to it as offline alignment. Conversely, if one version is only known up to the point currently to be matched, we refer to it as online. We introduce a reinforcement learning (RL)-based online symbolic music alignment technique. It aligns symbolically encoded music or, more specifically, MIDI performances to their corresponding MusicXML scores by © S. Peter. Licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0). Attribution: S. Peter, “Online Symbolic Music Alignment with Offline Reinforcement Learning”, in Proc. of the 24th Int. Society for Music Information Retrieval Conf., Milan, Italy, 2023. matching individual notes of each version. The RL agent – a small attention-based neural network – is trained to iteratively predict the current score position from limited score and past performance contexts. The current performance note and estimated score position are then processed to compute a symbolic note-wise matching. RL terminology introduces another online versus offline differentiation. RL is termed online if the agent learns from data created by the agent’s interaction with its environment during training. In our case, we use offline RL, that is, the agent is trained using a dataset of exhaustively sampled environment states and associated rewards, effectively turning agent training into a supervised learning problem. Once trained in an offline fashion, the agent can be used in online alignment. The agent processes a purely pitch-based representation and timing information is only incorporated in a postprocessing step. Before addressing the online problem, we investigate the same separation of pitch and time processing in an offline setting: we develop a two-step (first pitch, then time) Dynamic Time Warping (DTW) offline model and evaluate it against the state of the art in notewise alignment in Section 3. The subsequent Section 4 addresses the RL-based online model reusing the input setup. The rest of this paper is thus structured as follows: Section 2 introduces related work. Section 3 discusses offline symbolic music alignment. We develop as well as evaluate an offline symbolic music alignment algorithm based on two different applications of DTW, first on pitch information, then on onset times. Starting from these results, section 4 introduces a formulation of online alignment as reinforcement learning problem. In particular, we train an agent’s value function in an offline setting. In section 5 we evaluate the trained agent in three ways: as a standalone score onset identification model, as an online symbolic alignment model (where the aim is the production of correct note-wise alignments), and in a score following scenario (where the aim is the precise temporal tracking the current score position). Finally, Section 6 concludes the paper with a critical appraisal of our models as well as recommendations for future research. 2. RELATED WORK Symbolic music alignment has been a popular research area for many years. We begin our review of related work with online symbolic music alignment, then we progress" 2401.00471v1,"Sounding Out Reconstruction Error-Based Evaluation of Generative Models of Expressive Performance Silvan David Peter Carlos Eduardo Cancino-Chacón silvan.peter@jku.at Johannes Kepler University Linz, Austria carlos_eduardo.cancino_chacon@jku.at Johannes Kepler University Linz, Austria Emmanouil Karystinaios Gerhard Widmer emmanouil.karystinaios@jku.at Johannes Kepler University Linz, Austria gerhard.widmer@jku.at Johannes Kepler University Linz, Austria ABSTRACT Generative models of expressive piano performance are usually assessed by comparing their predictions to a reference human performance. A generative algorithm is taken to be better than competing ones if it produces performances that are closer to a human reference performance. However, expert human performers can (and do) interpret music in different ways, making for different possible references, and quantitative closeness is not necessarily aligned with perceptual similarity, raising concerns about the validity of this evaluation approach. In this work, we present a number of experiments that shed light on this problem. Using precisely measured high-quality performances of classical piano music, we carry out a listening test indicating that listeners can sometimes perceive subtle performance difference that go unnoticed under quantitative evaluation. We further present tests that indicate that such evaluation frameworks show a lot of variability in reliability and validity across different reference performances and pieces. We discuss these results and their implications for quantitative evaluation, and hope to foster a critical appreciation of the uncertainties involved in quantitative assessments of such performances within the wider music information retrieval (MIR) community. CCS CONCEPTS • Applied computing → Sound and music computing; Performing arts; • Information systems → Evaluation of retrieval results. KEYWORDS Performance, Expression, Evaluation, Validity, Listening Study ACM Reference Format: Silvan David Peter, Carlos Eduardo Cancino-Chacón, Emmanouil Karystinaios, and Gerhard Widmer. 2023. Sounding Out Reconstruction Error- Based Evaluation of Generative Models of Expressive Performance. In 10th International Conference on Digital Libraries for Musicology (DLfM Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). DLfM 2023, November 10, 2023, Milan, Italy © 2023 Copyright held by the owner/author(s). ACM ISBN 978-1-4503-XXXX-X/18/06. https://doi.org/10.1145/3625135.3625141 2023), November 10, 2023, Milan, Italy. ACM, New York, NY, USA, 9 pages. https://doi.org/10.1145/3625135.3625141 1 INTRODUCTION The recent years have seen the creation and publication of several corpora of precisely measured and score-aligned piano performances within MIR and digital musicology communities [17, 23, 29]. This renewed interest in computational models of expressive piano performance, in particular the data-driven kind. Yet it also rekindled concerns surrounding the direct applicability of large scale data processing and machine learning techniques to this type of data. This paper addresses one such concern, namely issues of quantitatively evaluating generative models of expressive piano performance (GMEPP) at scale. Quantitative evaluation in itself is nothing new, GMEPPs are routinely evaluated in terms of how close their predictions are to actual human expert performances. This closeness is generally estimated with figures of merit such as reconstruction errors [7, 17] or likelihood functions [10, 15, 18]. One issue with this type of evaluation arises from the fact that having a model produce a performance that is numerically close (in some aspect yet to be clarified) to an expert piano performance — i.e., a model that does well according to generally accepted figures of merit — possibly misses the mark of GMEPP; the goal of producing convincing, musical, and consistent performances for human listeners. Evaluating by asking such listeners is, however, only an option in a minority of situations, and most of the time the training, development, and evaluation of GMEPP requires scalable, automated metrics. This potential goal misalignment raises at least two problems: is a measured distance to a human reference performance related to the perceptual similarity of performances? And is the choice of an arbitrary human reference performance immaterial for evaluative outcome? These questions tap into profound epistemic, perceptual, and axiological issues beyond the scope this article. What we can and do address in the following, are three smaller, but nevertheless operatively useful questions about current reconstruction errorbased evaluation (REE) techniques: • Can listeners discern performances that are indistinguishable under REE? • To what extent does REE reliably favor [performances by] the same model under different reference and piece conditions?" 2401.00483v1,"Magnetic properties at various fillings of the quasiflat band in a fermionic two-leg ladder model Paban Kumar Patra, 1, ∗ Yixuan Huang, 2, 3 and Hridis K. Pal 1, † 1 Department of Physics, Indian Institute of Technology Bombay, Powai, Mumbai 400076, India Theoretical Division, Los Alamos National Laboratory, Los Alamos, New Mexico 87545, USA 3 Center for Integrated Nanotechnologies, Los Alamos National Laboratory, Los Alamos, New Mexico 87545, USA (Dated: January 2, 2024) 2 A recent study has demonstrated that a fermionic two-leg ladder model, threaded by a flux and characterized by a spatially varying interleg hopping term, gives rise to a quasiflat low-energy band. This band exhibits an unusual ground state at half filling in the presence of interaction—a ferromagnetic Mott insulator. In this paper, we extend the study of this model to other fillings of the quasiflat band and explore the magnetic properties of the ground state at these fillings. In particular, we study four fillings: one-quarter, three-quarters, slightly above half filling (half filling plus two electrons), and slightly below half-filling (half filling minus two electrons). Incorporating interaction within the Hubbard model and using the Density Matrix Renormalization Group method to find the ground states, we find that the spin-spin correlation is ferromagnetic at fillings less than half, similar to that observed at half filling, but is antiferromagnetic beyond half filling. Interestingly, these results hold only when mixing between the lowest quasiflat band and the next-to-lowest dispersive band is negligible; once mixing between the two bands is facilitated by increasing the interaction strength, the correlation becomes ferromagnetic above half filling as well. Additionally, by reducing the strength of the interaction in comparison to the bandwidth, a transition from the ferromagnetic to the antiferromagnetic state is observed in all the cases. I. INTRODUCTION The interplay of reduced dimension and strong correlations often leads to interesting ground states in quantum many-body systems. The simplest fermionic model studied in this regard is the Hubbard model in one dimension (1D) with nearest-neighbor hopping t and onsite interaction U . By changing the two parameters, one can easily tune the interaction strength with respect to the bandwidth, and study its effect on the ground state properties. The 1D Hubbard model has been studied extensively over the past decades across the parameter space of t and U , and a variety of interesting phases have been discovered, both in the charge and the spin sectors [1–5]. An interesting exact result in the spin sector is due to Lieb and Mattis [6] which asserts that the ground state has the smallest possible spin at any filling, thus precluding the appearance of ferromagnetism. Nevertheless, certain models that incorporate beyond-nearest-neighbor hopping terms at the noninteracting level (thereby circumventing Lieb and Mattis’s theorem) can give rise to ferromagnetism [7–10]. An essential feature of these models is that they all host a low-energy flat band at the noninteracting level and the effect of interaction is nonperturbative. In a recent work [11], a one-dimensional model supporting a low-energy quasiflat band was proposed. The model, at the noninteracting level, consists of a two-leg ladder pierced by a constant flux with a spatially varying ∗ paban.patra@iitb.ac.in † hridis.pal@iitb.ac.in interleg hopping term. In a certain parameter regime, the bandwidth of the lowest-energy band becomes very small leading to a quasiflat band. The model does not employ any beyond-nearest-neighbor hopping terms and is qualitatively distinct from those mentioned earlier. The effect of interaction was studied at half filling of the quasiflat band [11] and the ground state was found to be that of a ferromagnetic Mott insulator, instead of an antiferromagnetic one as found conventionally [2, 12]. In light of the above findings, it is natural to ask whether the unusual features of the ground state persist at fillings other than half filling of the quasiflat band. We address the question in this work by studying the spin-spin correlation within the Hubbard model at onequarter, three-quarters, slightly above half, and slightly below half fillings of the quasiflat band. Our key findings are as follows: (1) For values of U where band mixing can be ignored, the ground state exhibits ferromagnetic correlations at fillings less than half, akin to half filling, but displays antiferromagnetic correlation above half filling. (2) However, at larger values of U allowing for mixing between the lowest quasiflat band and the next-to-lowest band, the correlation becomes ferromagnetic above half filling as well, i.e., the ground state exhibits ferromagnetism irrespective of the filling. Additionally, whenever the ground state is ferromagnetic, on reducing the strength of the interaction with respect to the bandwidth, the spin-spin correlation undergoes a transition to the antiferromagnetic state. The rest of the paper is organized as follows. In Section II, we introduce our model and describe the method we employ to calculate the ground state. In Section III we present our main results—the spin-spin correlation at various fillings of the quasiflat band. In Section IV, we" 2401.00515v2,"Empirical Analysis of Vulnerabilities Life Cycle in Golang Ecosystem Jinchang Hu ∗ Lyuye Zhang ∗ Chengwei Liu † College of Command and Control Engineering, Army Engineering University of PLA Nanjing, China hujinchang@aeu.edu.cn Continental-NTU Corporate Lab, Nanyang Technological University Singapore, Singapore zh0004ye@e.ntu.edu.sg School of Computer Science and Engineering, Nanyang Technological University Singapore, Singapore chengwei001@e.ntu.edu.sg Sen Yang Song Huang † Yang Liu Academy of Military Science Nanjing, China yangsen0310@aeu.edu.cn College of Command and Control Engineering, Army Engineering University of PLA Nanjing, China huangsong@aeu.edu.cn School of Computer Science and Engineering, Nanyang Technological University Singapore, Singapore yangliu@ntu.edu.sg ABSTRACT KEYWORDS Open-source software (OSS) greatly facilitates program development for developers. However, the high number of vulnerabilities in open-source software is a major concern, including in Golang, a relatively new programming language. In contrast to other commonly used OSS package managers, Golang presents a distinctive feature whereby commits are prevalently used as dependency versions prior to their integration into official releases. This attribute can prove advantageous to users, as patch commits can be implemented in a timely manner before the releases. However, Golang employs a decentralized mechanism for managing dependencies, whereby dependencies are upheld and distributed in separate repositories. This approach can result in delays in the dissemination of patches and unresolved vulnerabilities. To tackle the aforementioned concern, a comprehensive investigation was undertaken to examine the life cycle of vulnerability in Golang, commencing from its introduction and culminating with its rectification. To this end, a framework was established by gathering data from diverse sources and systematically amalgamating them with an algorithm to compute the lags in vulnerability patching. It turned out that 66.10% of modules in the Golang ecosystem were affected by vulnerabilities. Within the vulnerability life cycle, we found two kinds of lag impeding the propagation of vulnerability fixing. By analyzing reasons behind non-lagged and lagged vulnerabilities, timely releasing and indexing patch versions could significantly enhance ecosystem security. Vulnerability life cycle, Golang, Open-source software ∗ These authors contributed equally to this work † These authors are the corresponding authors. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE ’24, April 14–20, 2024, Lisbon, Portugal © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0217-4/24/04. . . $15.00 https://doi.org/10.1145/3597503.3639230 ACM Reference Format: Jinchang Hu, Lyuye Zhang, Chengwei Liu, Sen Yang, Song Huang, and Yang Liu. 2024. Empirical Analysis of Vulnerabilities Life Cycle in Golang Ecosystem. In 2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE ’24), April 14–20, 2024, Lisbon, Portugal. ACM, Lisbon, Portugal, 13 pages. https://doi.org/10.1145/3597503.3639230 1 INTRODUCTION The growth of software complexity has boosted the adoption of third-party libraries (TPLs) as dependencies, to reduce development costs. However, this also poses a new threat that vulnerabilities in TPLs can be widely propagated through dependencies. For instance, CVE-2022-41723 [5] existing in golang.org/x/net, a fundamental Golang networking library, could influence over 170K downstream packages, according to Open Source Insights [11]. Many existing works and tools have been proposed to demystify the impact of TPL vulnerabilities in different ecosystems. Some researchers [26, 38, 39, 41] investigate the vulnerability impact and their life spans from the perspective of ecosystems, some researchers [31, 34, 35, 42, 50] conduct empirical studies on technical lags from the perspective of user projects (i.e., the delays of upgrading vulnerable dependencies). Tools like SCA (Software Composition Analysis) [24] are also proposed to identify TPL vulnerabilities in user projects. Moreover, some existing work [27, 29, 52] study the adoption of Dependabot [7] to remediate vulnerable dependencies. All these existing works are conducted in mature ecosystems that are established on package managers, supported by centralized registries following Semantic Versioning [1] (SemVer). However, as the first attempt at decentralized registries, Golang embraces the Git system to manage dependencies [2]. Specifically, unlike traditional centralized registries where developers mostly define dependencies by released version tags, commits are widely used as version references in Golang. Though Golang Index [16], a centralized proxy, was introduced to mirror packages, there are still huge differences in broadcasting newly released versions (e.g.," 2401.00524v1,"Effect of Optimizer, Initializer, and Architecture of Hypernetworks on Continual Learning from Demonstration Sayantan Auddy 1 , Sebastian Bergner 1 , and Justus Piater 1,2 1 Department of Computer Science, University of Innsbruck, Innsbruck, Austria {sayantan.auddy, justus.piater}@uibk.ac.at sebastian.bergner@student.uibk.ac.at 2 Digital Science Center, University of Innsbruck, Innsbruck, Austria Abstract. In continual learning from demonstration (CLfD), a robot learns a sequence of real-world motion skills continually from human demonstrations. Recently, hypernetworks have been successful in solving this problem. In this paper, we perform an exploratory study of the effects of different optimizers, initializers, and network architectures on the continual learning performance of hypernetworks for CLfD. Our results show that adaptive learning rate optimizers work well, but initializers specially designed for hypernetworks offer no advantages for CLfD. We also show that hypernetworks that are capable of stable trajectory predictions are robust to different network architectures. Our open-source code is available at https://github.com/sebastianbergner/ExploringCLFD. Keywords: Learning from Demonstration, Continual Learning, Hypernetworks 1 Introduction Learning from Demonstrations (LfD) [1] is an intuitive way for humans to train robots without explicit programming. While the majority of research on LfD addresses single skill acquisition, some recent methods investigate continual learning from demonstration (CLfD) [2, 3], i.e. learning multiple LfD motion skills sequentially in an open-ended way. Auddy et al. [2] propose a system of hypernetwork-generated neural ordinary differential equation solvers (NODEs) for continually learning a sequence of real-world 6-DoF trajectory learning tasks (e.g.opening a box, shelving a bottle, pouring from a cup, etc.) from human demonstrations. More recent work [3], shows that by enforcing stable trajectory predictions through hypernetwork-generated stable NODEs [4], the continual learning performance is greatly enhanced in addition to the expected guarantee of non-divergent and safe trajectory predictions. Hypernetworks have also been utilized for continual reinforcement learning with robots [5, 6]. The popularity of hypernetworks for robotic continual learning is mainly due to desirable features such as not having to store and retrain on data of past tasks, negligible parameter growth with additional tasks, and low catastrophic forgetting [7]." 2401.00529v1,"G RAPH GPT: G RAPH L EARNING WITH G ENERATIVE P RE - TRAINED T RANSFORMERS Qifang Zhao, Weidong Ren, Tianyu Li, Xiaoxiao Xu & Hong Liu Alibaba Group, Hangzhou, China {james.zqf,renweidong.rwd}@alibaba-inc.com {qianchuan.lty,xiaoxiao.xuxx,liuhong.liu}@alibaba-inc.com A BSTRACT We introduce GraphGPT, a novel model for Graph learning by self-supervised Generative Pre-training Transformers. Our model transforms each graph or sampled subgraph into a sequence of tokens representing the node, edge and attributes reversibly using the Eulerian path first. Then we feed the tokens into a standard transformer decoder and pre-train it with the next-token-prediction (NTP) task. Lastly, we fine-tune the GraphGPT model with the supervised tasks. This intuitive, yet effective model achieves superior or close results to the state-of-the-art methods for the graph-, edge- and node-level tasks on the large scale molecular dataset PCQM4Mv2, the protein-protein association dataset ogbl-ppa and the ogbn-proteins dataset from the Open Graph Benchmark (OGB). Furthermore, the generative pre-training enables us to train GraphGPT up to 400M+ parameters with consistently increasing performance, which is beyond the capability of GNNs and previous graph transformers. The source code and pre-trained checkpoints will be released soon 1 to pave the way for the graph foundation model research, and also to assist the scientific discovery in pharmaceutical, chemistry, material and bio-informatics domains, etc. 1 I NTRODUCTION After the breakthrough of deep learning in 2012 (Krizhevsky et al., 2012), the computer vision (CV) and natural language processing (NLP) communities prosper till now. Graph community also benefits from this paradigm shifting from traditional machine learning to deep learning with the proposal of various graph neural networks (GNNs) (Kipf & Welling, 2017; Hamilton et al., 2017; Zhang & Chen, 2018; Wu et al., 2020). Nowadays, both CV (Dosovitskiy et al., 2021; Liu et al., 2021) and NLP (Devlin et al., 2019; Radford et al., 2018) adopt the transformer backbone as the canonical architecture, and expand the model scale to billions or even hundreds of billions of parameters (Liu et al., 2021; Brown et al., 2020). These large models are trained with web-scale data (Schuhmann et al., 2022; Touvron et al., 2023), and achieve performance superior to human beings in many benchmark datasets (Deng et al., 2009; Wang et al., 2019b;a). These works also boost the commercial applications like Midjourney (Midjourney, 2023) and ChatGPT (Open-AI, 2023). However, GNNs are still suffering from the over-smoothing (Rusch et al., 2023) and over-squashing (Alon & Yahav, 2021) problems, which limit them to be expanded to larger scale and trained with larger amount of graph data. In recent years, there are many works that tried to utilize transformers to model the graph data, and obtained good performance in certain graph datasets (Ying et al., 2021; Kim et al., 2022; Luo et al., 2023; Müller et al., 2023). Nevertheless, they often use complex tricks to handcraft features to encode structure information explicitly, and then inject them into either the input or the attention layers. These tricks restrain the generalization beyond specific datasets. In addition, these graph transformers (GTs) often perform well in graph-level tasks, but not applicable for the edge-/nodelevel tasks (Müller et al., 2023). Last but not least, self-supervised generative pre-training is the key of the success of GPTs (Radford et al., 2018), but it is hardly incorporated in the GTs (Min et al., 2022; Müller et al., 2023). 1 https://github.com/alibaba/graph-gpt 1" 2401.00532v1,"O N THE N ECESSITY OF M ETALEARNING : L EARNING S UITABLE P ARAMETERIZATIONS L EARNING P ROCESSES FOR Massinissa Hamidi Laboratoire IBISC Université Évry Paris-Saclay massinissa.hamidi@univ-evry.fr Aomar Osmani Laboratoire LIPN-UMR CNRS 7030 Université Sorbonne Paris Nord aomar.osmani@lipn.univ-paris13.fr A BSTRACT In this paper we will discuss metalearning and how we can go beyond the current classical learning paradigm. We will first address the importance of inductive biases in the learning process and what is at stake: the quantities of data necessary to learn. We will subsequently see the importance of choosing suitable parameterizations to end up with well-defined learning processes. Especially since in the context of real-world applications, we face numerous biases due, e.g., to the specificities of sensors, the heterogeneity of data sources, the multiplicity of points of view, etc. This will lead us to the idea of exploiting the structuring of the concepts to be learned in order to organize the learning process that we published previously. We conclude by discussing the perspectives around parameter-tying schemes and the emergence of universal aspects in the models thus learned. 1 I NTRODUCTION Metalearning (learning-to-learn) offers promising levels of flexibility and generalization while reducing the quantities of data needed to learn (or adapt). Few-shot and zero-shot learning are examples of metalearning approaches that allow easy adaptation to new tasks (or domains), using few examples for the former or no examples at all for the latter. Metalearning involves the study of regularities (structural dependencies) across models and tasks, where “task” is taken in its broader sense and includes • the classical learning tasks, e.g., image classification and segmentation, activity recognition from on-body sensor deployments, etc.; • robot configurations, e.g., Cully et al. (2015); • topologies of sensor deployment, e.g., Hamidi & Osmani (2021); • multiple views (or perspectives) on a given phenomena, e.g., Hamidi et al. (2020); • clients in a federated deployment, e.g., Hamidi & Osmani (2022); What characterizes a task is the tailored family of inductive biases (search or representation) that makes the learning process converge into a satisfactory solution. The study of regularities revolves around reasoning about families of inductive biases that allow finding suitable parameterizations for the learning process. 1" 2401.00546v1,"AllSpark: a multimodal spatiotemporal general model Run Shao a , Cheng Yang a , Qiujun Li a , Qing Zhu b , Yongjun Zhang c , YanSheng Li c , Yu Liu d , Yong Tang e , Dapeng Liu e , Shizhong Yang f , Jiayi Ma c , Haifeng Li a,∗ a Central South University Southwest Jiaotong University c Wuhan University d Peking University e Huawei Technologies Co., Ltd f BDS Micro Chip Inc. b Abstract RGB, infrared, multispectral, and other modal data fundamentally represent different observational approaches to the same geographic object. Therefore, leveraging multimodal data is an inherent requirement for comprehending geographic objects. However, for a long time, due to the high heterogeneity in structure and semantics among various spatiotemporal modal data, the joint interpretation of multimodal spatiotemporal data has been an extremely challenging problem. The primary challenge resides in striking a trade-off between the cohesion and autonomy of diverse modalities, and this trade-off exhibits a progressively nonlinear nature as the number of modalities expands. Inspired by the human cognitive system and linguistic philosophy, where perceptual signals from the five senses converge into language, we introduce the Language as Reference Framework (LaRF), a fundamental principle for constructing a multimodal unified model, aiming to strike a trade-off between the cohesion and autonomy among different modalities. Building upon this, we propose a multimodal spatiotemporal general artificial intelligence model, called AllSpark. Our model integrates thirteen different modalities into a unified framework, including one-dimensional (text, code), two-dimensional (RGB, infrared, SAR, multispectral, hyperspectral, tables, graphs, trajec- ∗ Corresponding author Email addresses: shaorun@csu.edu.cn (Run Shao), lihaifeng@csu.edu.cn (Haifeng Li ) Preprint submitted to Elsevier January 2, 2024" 2401.00563v1,"KernelGPT: Enhanced Kernel Fuzzing via Large Language Models Chenyuan Yang UIUC cy54@illinois.edu Zijie Zhao UIUC zijie4@illinois.edu Abstract Bugs in operating system kernels can affect billions of devices and users all over the world. As a result, a large body of research has been focused on kernel fuzzing, i.e., automatically generating syscall (system call) sequences to detect potential kernel bugs or vulnerabilities. Syzkaller, one of the most widely studied kernel fuzzers, aims to generate valid syscall sequences based on predefined specifications written in syzlang, a domain-specific language for defining syscalls, their arguments, and the relationships between them. While there has been existing work trying to automate Syzkaller specification generation, this still remains largely manual work and a large number of important syscalls are still uncovered. In this paper, we propose KernelGPT, the first approach to automatically inferring Syzkaller specifications via Large Language Models (LLMs) for enhanced kernel fuzzing. Our basic insight is that LLMs have seen massive kernel code, documentation, and use cases during pre-training, and thus can automatically distill the necessary information for making valid syscalls. More specifically, KernelGPT leverages an iterative approach to automatically infer all the necessary specification components, and further leverages the validation feedback to repair/refine the initial specifications. Our preliminary results demonstrate that KernelGPT can help Syzkaller achieve higher coverage and find multiple previously unknown bugs. Moreover, we also received a request from the Syzkaller team to upstream specifications inferred by KernelGPT. 1 Introduction Operating system kernels are among the most critical systems globally, as all other types of systems rely on and operate on them. Vulnerabilities in a kernel, such as crashes or outof-bounds writes, can be maliciously exploited, potentially causing substantial harm to all users of that operating system kernel. To ensure the correctness and security of these fundamental systems, fuzzing (or fuzz testing) [42, 55] has been employed for decades. Such techniques automatically Lingming Zhang UIUC lingming@illinois.edu generate a vast number of system calls (syscalls) as test inputs, intending to detect potential kernel bugs. Among various kernel fuzzing techniques [19, 23, 34], Syzkaller [3] stands out as one of the most popular and effective, having identified over 4.9K bugs that were later fixed by developers [2]. Concurrently, numerous research efforts have focused on enhancing Syzkaller, targeting areas such as seed generation [35, 37], seed selection [45], guided mutation [18, 41], and syscall specification generation [11, 12, 21, 40]. Among these advancements, the syscall descriptions written in syzlang [4] stand out as one of the most crucial components, significantly contributing to the effectiveness of Syzkaller and allowing it to cover more kernel modules. These descriptions specify the types of syscalls and their inter-dependencies, enabling the generation of more valid syscall sequences that probe deeper into the kernel code logic. However, crafting syscall specifications is predominantly a manual process, requiring in-depth kernel knowledge. To address this issue, recent research has focused on automating the generation of syscall specifications, particularly for device drivers. For instance, DIFUSE [12] and SyzDescribe [21] employ static code analysis to identify device driver syscall handlers and infer their corresponding descriptions. Figure 1 illustrates the workflow of static analysis-based techniques in the upper part. Initially, experts manually define rules to translate device source code into descriptions, drawing upon their own understanding of the kernel codebase and existing Syzkaller examples. These rules are then laboriously hard-coded into the static analysis tool, a process that is both challenging and time-consuming. The accuracy and effectiveness of the generated syscall descriptions depend heavily on the comprehensiveness of these mapping rules, a task that is often challenging, costly, and tedious. Moreover, as the kernel codebase evolves, these mapping rules are subject to frequent changes. Keeping up with these evolving scenarios is a significant challenge for static analysis methods, particularly given the extensive implementation efforts involved. Take, for instance, Figure 2a and Figure 2b, which illustrates the source code of two struct variables, associated" 2401.00627v1,"Student and AI responses to physics problems examined through the lenses of sensemaking and mechanistic reasoning Amogh Sirnoorkar, Dean Zollman b , James T Laverty b , Alejandra J Magana c , Sanjay Rebello d,e , Lynn A Bryan a,d,e a Centre for the Advancement of Teaching and Learning of STEM (CATALYST), Purdue University, 100 N University St, West Lafayette, 47907, Indiana, USA b Department of Physics, Kansas State University, Cardwell Hall, 1228 N Martin Luther King Junior Drive, Manhattan, 66506, Kansas, USA c Computer and Information Technology, Purdue University, 401 Grant Street, West Lafayette, 47907, Indiana, USA d Department of Physics and Astronomy, Purdue University, 525 Northwestern Avenue, West Lafayette, 47907, Indiana, USA e Department of Curriculum and Instruction, Purdue University, 100 N University St, West Lafayette, 47907, Indiana, USA Abstract Several reports in education have called for transforming physics learning environments by promoting sensemaking of real-world scenarios in light of curricular ideas. Recent advancements in Generative-Artificial Intelligence has garnered increasing traction in educators’ community by virtue of its potential in transforming STEM learning. In this exploratory study, we adopt a mixed-methods approach in comparatively examining student- and AI-generated responses to two different formats of a physics problem through the cognitive lenses of sensemaking and mechanistic reasoning. The student data is derived from think-aloud interviews of introductory students and the AI data comes from ChatGPT’s solutions collected using Zero shot approach. The results highlight AI responses to evidence most features of the two processes through well-structured solutions and student responses to effectively leverage representations in their solutions through iterative refinement of arguments. In other words, while AI responses reflect how physics is talked about, the student responses reflect how physics is practiced. Implications of these results in light of development and deployment of AI systems in physics pedagogy are discussed. Keywords: Generative-AI, Sensemaking, Mechanistic Reasoning, Physics problem solving 1. Introduction Contemporary reports on higher education have called for shifting the focus of classroom learning from rote-memorization of concepts to sensemaking of real-world scenarios using curricular ideas [1]. Consequently, several studies in science education have explored the process of “making sense of a phenomenon” [2, 3] along with developing learning materials that push students to blend everyday and formal ideas [4]. While the former group of studies have put forth several theoretical and analytical accounts of sensemaking, the latter have focused on developing research-based assessments to facilitate this process. Sensemaking is a common cognitive process through which we integrate new information into our knowledge Email address: asirnoor@purdue.edu (Amogh Sirnoorkar) 1 Centre for the Advancement of Teaching and Learning of STEM (CATALYST), Purdue University Preprint submitted to Elsevier system [2]. Through sensemaking, students develop sophisticated epistemology, the feature of making effective transitions between different forms of knowledge (e.g., conceptual, procedural, intuitive, etc.) [5]. Sensemaking also leads to generation of new knowledge using existing ideas [6] which in turn, leads into enhanced content understanding [7]. Given this significance, there has been an uptick in investigations focused on promoting sensemaking in the learning of physics [8, 9]. The Generative-Artificial Intelligence (AI), particularly ChatGPT, has garnered significant traction among educators’ community in the last year [10]. The Generative-AI is a Large Language Model that is pretrained on vast multi-modal data, including texts and images, to generate probabilistic responses. The chatbot’s feature to produce human-like, grammatically sound, and assertive responses to a wide variety of tasks has promised a huge potential in transforming science, technology, engineering, and mathematics (STEM) education. In physics education, studies have focused on January 2, 2024" 2401.00632v1,"MANUSCRIPT DRAFT 1 T B D D : A New Trust-based, DRL-driven Framework for Blockchain Sharding in IoT Zixu Zhang, Guangsheng Yu, Caijun Sun*, Xu Wang, Ying Wang, Ming Zhang, Wei Ni, Ren Ping Liu, Nektarios Georgalas, and Andrew Reeves Abstract—Integrating sharded blockchain with IoT presents a solution for trust issues and optimized data flow. Sharding boosts blockchain scalability by dividing its nodes into parallel shards, yet it’s vulnerable to the 1% attacks where dishonest nodes target a shard to corrupt the entire blockchain. Balancing security with scalability is pivotal for such systems. Deep Reinforcement Learning (DRL) adeptly handles dynamic, complex systems and multi-dimensional optimization. This paper introduces a Trustbased and DRL-driven (T B D D ) framework, crafted to counter shard collusion risks and dynamically adjust node allocation, enhancing throughput while maintaining network security. With a comprehensive trust evaluation mechanism, T B D D discerns node types and performs targeted resharding against potential threats. The model maximizes tolerance for dishonest nodes, optimizes node movement frequency, ensures even node distribution in shards, and balances sharding risks. Rigorous evaluations prove T B D D ’s superiority over conventional random-, community-, and trust-based sharding methods in shard risk equilibrium and reducing cross-shard transactions. Index Terms—blockchain, sharding, collusion attacks, trustworthiness, deep reinforcement learning, internet-of-things I. I NTRODUCTION By interconnecting devices, vehicles, and appliances, the Internet of Things (IoT) has transformed sectors ranging from smart cities [1], which optimize traffic and energy use, to autonomous vehicles [2] that aim for safer roads, industrial networks [3] that redefine production processes, ehealth solutions [4] that prioritize patient care, and smart homes [5] that enrich daily living. The massive and sensitive nature of the data generated demands strong security and integrity, leading to the integration of IoT and blockchain [6]– [10]. This convergence, with its decentralized, immutable, and traceable features, offers a foundational structure for secure data exchanges [11]. Sharding, a key strategy in blockchain, addresses vast data needs and ensures scalability [12]. By dividing the network into smaller segments, sharding enables Z. Zhang, X. Wang, and R. Liu are with the Global Big Data Technologies Centre, University of Technology Sydney, Australia, 2007 (e-mail: zixu.zhang@student.uts.edu.au; {xu.wang-1, renping.liu}@uts.edu.au) G. Yu and W. Ni are with the Data61, CSIRO, Sydney, Australia, 2015 (email: {saber.yu, wei.ni}@data61.csiro.au) C. Sun* is the corresponding author with Zhejiang Lab, Hangzhou, China (email: sun.cj@zhejianglab.com) Y. Wang is with the School of Electronics and Information, Hangzhou Dianzi University, Hangzhou 310018, China (email:90023@hdu.edu.cn) M. Zhang is with the School of Cyber Engineering, Xidian University, Xi’an, 710071, P.R. China (email: Xidianmingz@gmail.com) N. Georgalas and A. Reeves are with Applied Research, British Telecom, Martlesham, UK (email: {nektarios.georgalas, andrew.reeves}@bt.com; @bt.com) simultaneous transaction processing, lightening the load on nodes and increasing transaction throughput. As the IoT landscape expands, managing and securing vast networks becomes more intricate. However, while various sharding techniques like random-based [13]–[16], communitybased [17], and trust-based [18] methods enhance the scalability and distribution of dishonest nodes, they remain vulnerable to advanced threats such as adaptive collusion attacks. In such attacks, dishonest nodes manipulate sharding systems by modifying their behavior to focus on specific shards, potentially initiating the 1% attack [19], which significantly compromises the blockchain’s security, trustworthiness, and immutability. Deep Reinforcement Learning (DRL) has become instrumental in the confluence of IoT and blockchain sharding due to its proficiency in handling multiple sharding variables [20]– [25]. Amidst the surging blockchain transaction data, DRL provides real-time adaptability, fostering dynamic shard adjustments that enhance resource use and overall system efficiency. However, many DRL-focused studies underestimate the challenges of strategic collusion attacks, where dishonest nodes might disguise their identity or increase cross-shard transactions to hide their intent. This study investigates the expansion and fortification of blockchain sharding by introducing an innovative framework that utilizes trust tables and DRL. The introduced trust table advances the sharding process by incorporating a multidimensional approach to gather feedback within the voting mechanism. This multi-faceted feedback includes direct feedback, indirect feedback, and historical behaviors during the voting process, all contributing to a robust defense mechanism against 1% attack risks. Concurrently, the DRL-driven sharding framework is designed to dynamically allocate shards in real-time, which streamlines node synchronization and minimizes cross-shard transactions (CSTs). This approach also ensures a balanced distribution of dishonest nodes, aiming to decrease the necessity for frequent resharding. The study suggests security thresholds for this DRL approach to enhance training and fortify the sharded blockchain’s security. The primary contributions of this study can be summarized as follows: • We propose a secure, scalable, sharded blockchain system architecture for IoT scenarios. Our proposed system effectively mitigates the risks associated with 1% attacks and reduces CST, striking a balance between security and scalability." 2401.00637v1,"Nonlinear vibration of a dipteran flight robot system with rotational geometric nonlinearity Yanwei Han a , Zijian Zhang b,* a School of Civil Engineering and Architecture, Henan University and Science and Technology, Luoyang 471023, China; b College of Astronautics, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China * Corresponding author. E-mail address: zj.zhang@nuaa.edu.cn (Z. Zhang) Abstract: The dipteran flight mechanism of the insects is commonly used to design the nonlinear flight robot system. However, the dynamic response of the click mechanism of the nonlinear robot system with multiple stability still unclear. In this paper, a novel dipteran robot model with click mechanism proposed based on the multiple stability of snap-through buckling. The motion of equation of the nonlinear flight robot system is obtained by using the Euler-Lagrange equation. The nonlinear potential energy, the elastic force, equilibrium bifurcation, as well as equilibrium stability are investigated to show the multiple stability characteristics. The transient sets of bifurcation and persistent set of regions in the system parameter plane and the corresponding phase portraits are obtained with multiple stability of single and double well behaviors. Then, the periodic free vibration response are defined by the analytical solution of three kinds of elliptical functions, as well as the amplitude frequency responses are investigated by numerical integration. Based on the topological equivalent method, the chaotic thresholds of the homo-clinic orbits for the chaotic vibration of harmonic forced robot system are derived to show the chaotic parametric condition. Finally, the prototype of nonlinear flapping robot is manufactured and the experimental system is setup. The nonlinear static moment of force curves, periodic response and dynamic flight vibration of dipteran robot system are carried out. It is shown that the test results are agree well with the theoretical analysis and numerical simulation. Those result have the potential application for the structure design of the efficient flight robot. Key Words: Dipteran robot system; equilibrium bifurcation and stability; periodic solutions; amplitude frequency; chaotic threshold. 1. Introduction The dipteran insects of butterflies, dragonflies and mosquitoes with the double flapping wings are widely distributed worldwide, such as in the tropics, arctic, oceans, lakes, and high mountains [1]. There are some debate on the nonlinear mechanism of how excellent flight performance of flight motor of diptera. As shown in Fig. 1(a), Leonardo da Vinci designed a variety of aircraft and gliders to realize his dream of flying [2]. During the last decade, the flight mechanism of diptera have been proposed and studied with nonlinear restoring and linear or quadratic damping force. As illustrated in Fig. 1(b), many researchers are trying to reveal the flight mechanism of the dipteran insect by methods of theoretical biology and view of dynamical mechanics [3]. The bionic flapping wing aircraft is a flight mode that imitates the flapping wings of birds and other creatures. Such a flight mode has the potential to achieve long-distance flight at the scale of micro and small aircraft. At the same time, flapping wings have more freedom of movement and strong maneuverability. Not only that, bionic flapping wing aircraft has the characteristics of bionics, concealment and portability, which are generally hand throwing takeoff, gliding and landing. The flapping robot not only could take off and landing without limited by the site, but also can achieve rapid high flight, long-distance cruise, etc. like micro and small fixed wing aircraft. Recently, the flapping insect flight performance and click mechanism have been widely investigated by methods of theoretical analysis, numerical simulation and experimental test. Firstly, the rigid body dynamics of the configuration design of flight robot are extensively investigated. Thomson et al. analyzed the kinematic characteristics of the wing beat in dipteran flight model by using of the anatomical and physiological parameters, mathematical model and the catastrophe theory [4]. Branan et al. presented the dynamic analysis of a simplified model with the flight “click” mechanism which exhibited distinct advantages over a system at the resonant frequency [5]. Lau et al. developed the compliant design of 1" 2401.00641v2,"Hierarchical Bayesian Modeling for Time-Dependent Inverse Uncertainty Quantification Chen Wang a,∗ a Department of Nuclear, Plasma and Radiological Engineering, University of Illinois Urbana Champaign, Abstract This paper introduces a novel hierarchical Bayesian model specifically designed to address challenges in Inverse Uncertainty Quantification (IUQ) for time-dependent problems in nuclear Thermal Hydraulics (TH) systems. The unique characteristics of time-dependent data, such as high dimensionality and correlation in model outputs requires special attention in the IUQ process. By integrating Gaussian Processes (GP) with Principal Component Analysis (PCA), we efficiently construct surrogate models that effectively handle the complexity of dynamic TH systems. Additionally, we incorporate Neural Network (NN) models for time series regression, enhancing the computational accuracy and facilitating derivative calculations for efficient posterior sampling using the Hamiltonian Monte Carlo Method - No U-Turn Sampler (NUTS). We demonstrate the effectiveness of this hierarchical Bayesian approach using the transient experiments in the PSBT benchmark. Our results show improved estimates of Physical Model Parameters’ posterior distributions and a reduced tendency for over-fitting, compared to conventional single-level Bayesian models. This approach offers a promising framework for extending IUQ to more complex, time-dependent problems. Keywords: Hierarchical Bayesian Model, Time-Dependent Modeling, Inverse Uncertainty Quantification, Thermal Hydraulics, Markov Chain Monte Carlo, Surrogate Models 1. Introduction In recent years, the field of nuclear Thermal Hydraulics (TH) has increasingly relied on computational simulations to predict the behavior of nuclear reactor systems under various conditions. These simulations are crucial for ensuring the safety and efficiency of nuclear reactors. However, they are inherently uncertain due to limitations in accurately modeling complex physical phenomena. This uncertainty becomes particularly pronounced in time-dependent simulations, where the dynamics of the system introduce additional layers of complexity. Inverse Uncertainty Quantification (IUQ) has emerged as a pivotal methodology to address these uncertainties, specifically by quantifying the uncertainties associated with Physical Model Parameters (PMPs) in these systems. The final report of the BEMUSE project (Perez et al. (2011)) underscores the necessity of input uncertainty quantification as a pivotal element in probabilistic uncertainty analysis within ∗ Corresponding author. Email address: chenw3@illinois.edu Preprint submitted to Elsevier January 3, 2024" 2401.00647v1,"Tuning Thermal Conductivity of Hybrid Perovskites through Halide Alloying Guang Wang 1# , Hongzhao Fan 1# , Zhongwei Chen 2# , Yufei Gao 3 , Zuankai Wang 4 , Zhigang Li 1 , Haipeng Lu 2* and Yanguang Zhou 1* 1 Department of Mechanical and Aerospace Engineering, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong SAR 2 Department of Chemistry, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong SAR 3 Key Laboratory of Ocean Energy Utilization and Energy Conservation of Ministry of Education, School of Energy and Power Engineering, Dalian University of Technology, Dalian, China 4 Department of Mechanical Engineering, The Hong Kong Polytechnic University, Hong Kong SAR Abstract Tuning the thermal transport properties of hybrid halide perovskites is critical for their applications in optoelectronics, thermoelectrics, and photovoltaics. Here, we demonstrate an effective strategy to modulate the thermal transport property of hybrid perovskites by halide alloying. A highly tunable thermal conductivity of mixed-halide hybrid perovskites is achieved due to halide-alloying and structural distortion. Our experimental measurements show that the room temperature thermal conductivity of MAPb(Br x I 1-x ) 3 (x = 0─1) can be largely modulated from 0.27±0.07 W/mK (x = 0.5) to 0.47±0.09 W/mK (x = 1). Molecular dynamics simulations further demonstrate that the thermal conductivity reduction of hybrid halide perovskites results from the suppression of the mean free paths of the low-frequency acoustic and optical phonons. It is found that halide alloying and the induced structural distortion can largely increase the scatterings of optical and acoustic phonons, respectively. The confined diffusion of MA + cations in the octahedra cage is found to act as an additional thermal transport channel in hybrid # These authors contribute equally. * Author to whom all correspondence should be addressed. Email: haipenglu@ust.hk and maeygzhou@ust.hk 1" 2401.00652v1,"FROM COVERT HIDING TO VISUAL EDITING: ROBUST GENERATIVE VIDEO STEGANOGRAPHY Xueying Mao, Xiaoxiao Hu, Wanli Peng, Zhenliang Gan, Qichao Ying, Zhenxing Qian ∗ , Sheng Li, Xinpeng Zhang School of Computer Science, Fudan University, China {xymao22@m., xxhu23@m., pengwanli, zlgan23@m., qcying20@, zxqian@, lisheng@, zhangxinpeng@} fudan.edu.cn ABSTRACT Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature for steganography during the video editing process. Although existing traditional video steganography methods display a certain level of security and embedding capacity, they lack adequate robustness against common distortions in online social networks (OSNs). In this paper, we introduce an end-to-end robust generative video steganography network (RoGVS), which achieves visual editing by modifying semantic feature of videos to embed secret message. We employ face-swapping scenario to showcase the visual editing effects. We first design a secret message embedding module to adaptively hide secret message into the semantic feature of videos. Extensive experiments display that the proposed RoGVS method applied to facial video datasets demonstrate its superiority over existing video and image steganography techniques in terms of both robustness and capacity. Index Terms— Generative video steganography, Robust steganography, Semantic modification 1. INTRODUCTION Steganography is the science and technology of embedding secret message into natural digital carriers, such as image, video, text, etc. Generally, the natural digital carriers are called “cover” and the digital media with secret message are called “stego”. Conventional image steganography methods [49, 12, 31] primarily modify high-frequency components to embed secret message. They commonly utilize methodologies such as pixel value manipulation or integrating secret message into the cover image before inputting it into an encoder for steganographic purposes. In the past few years, as the rise of short video software applications like TikTok, YouTube, Snapchat, etc., video has become a suitable carrier for steganography. Traditional ∗ indicates the corresponding author. This work was supported by the National Natural Science Foundation of China under Grants U20B2051 and U1936214. 0 1 1 0 1 … Sender Receiver Edited stego video Edited stego video Reference image Cover video Extraction Network Embedding Network 0 1 1 0 1 … OSNs Fig. 1. Methodology of RoGVS. We modulate semantic feature with secret message to edit videos, such as the identity feature in facial videos. Our RoGVS can generate highquality stego videos even in the presence of various distortions. video steganographic methods, utilizing direct pixel value manipulation [32], coding mapping [34], or adaptive distortion function [36], exploit video data redundancy for information hiding. Nevertheless, while successful in security and embedding capacity, these methods on modifying covert space can be erased by common post-processing operations easily. So they are vulnerable to mitigate diverse distortions that may occur in lossy channel transmission. Visual editing on videos can be seen as the process of modifying the semantic information of objects within them. Instead of hiding secret message in covert space, we embed secret message within semantic feature of videos for visual edition. The advanced semantic feature is less susceptible to distortions, making this method inherently robust. In order to improve the robustness of video steganography, we propose an end-to-end robust generative video steganography network (RoGVS), which consists of four modules, containing information encoding module, secret message embedding model, attacking layer, and secret message extraction module. For evaluation, we use face-swapping technology as an example to show the effectiveness of our method, while it can be easily extended to other applications. Comprehensive experiments have showcased that our method surpasses stateof-the-art techniques, attaining commendable robustness and generalization capabilities." 2401.00663v1,"1st Place Solution for 5th LSVOS Challenge: Referring Video Object Segmentation Zhuoyan Luo 1† , Yicheng Xiao 1† , Yong Liu 1,2†‡ , Yitong Wang 2 , Yansong Tang 1 , Xiu Li 1 , Yujiu Yang 1 1 Tsinghua Shenzhen International Graduate School, Tsinghua University 2 ByteDance Inc. {luozy23, xiaoyc23, liu-yong20}@mails.tsinghua.edu.cn Abstract The recent transformer-based models have dominated the Referring Video Object Segmentation (RVOS) task due to the superior performance. Most prior works adopt unified DETR framework to generate segmentation masks in query-to-instance manner. In this work, we integrate strengths of that leading RVOS models to build up an effective paradigm. We first obtain binary mask sequences from the RVOS models. To improve the consistency and quality of masks, we propose Two-Stage Multi-Model Fusion strategy. Each stage rationally ensembles RVOS models based on framework design as well as training strategy, and leverages different video object segmentation (VOS) models to enhance mask coherence by object propagation mechanism. Our method achieves 75.7% J &F on Ref-Youtube-VOS validation set and 70% J &F on test set, which ranks 1st place on 5th Large-scale Video Object Segmentation Challenge (ICCV 2023) track 3. Code is available at https://github.com/RobertLuo1/iccv2023 RVOS Challenge. 1. Introduction Referring Video Object Segmentation aims to segment and track the target object referred by the given text description in a video. This emerging field has garnered attention due to its potential applications in video editing and humanrobot interaction. The critical challenge in RVOS lies in the pixel-level alignment between different modalities and time steps, primarily due to the varied nature of video content and unrestricted language expression. Most early approaches [1, 7, 8] adopt multi-stage and complex pipelines that take the bottom-up or top-down paradigms to segment each frame separately, while recent works MTTR [2], Referformer [15] propose to unify cross-modal interaction with pixel-level understanding into transformer structure. For example, † Equal Contribution ‡ Project lead, done during internships at ByteDance Input: {𝐼 ! } $ !""# & ℰ Output Query: a horse is standing second on the top row from the left Multi-RVOS-Model Fusion & DeAOT SOC & AOT Key Frame UNINEXT SOC Referformer Key Frame Multi-RVOS-Model Fusion & AOT STAGE-1 MUTR Referformer STAGE-2 Figure 1. The overall architecture of our method. 2022 first winner [6] simply employs fine-tuned Referformer as backbone to generate a series of high quality masks. However, these methods may lose the perception of target objects for language descriptions expressing temporal variations of objects due to the lack of video-level multi-modal understanding. To address this issue, SOC [9], MUTR [17] efficiently aggregate inter and intra-frame information. Meanwhile, UNINEXT [16] proposes a unified prompt-guided formulation for universal instance perception, reuniting previously fragmented instance-level subtasks into a whole and achieve good performance for the RVOS task. In our work, we incorporate benefits of the previous mainstream works to provide an effective paradigm. By utilizing the model ensemble strategy as well as semisupervised VOS approaches as post-process to enhance the masks quality in each stage, we develop a Two-Stage Multimodel Fusion strategy. Specifically, we select AOT [18] to preliminary improve the masks quality in the first stage, but with the increase of propagation layers and number of RVOS models that are processed by that, it will inevitably lead to loss of information unrelated to the object, which may weaken the effect of the consequent model fusion. Therefore, on the basis of the high quality mask sequences from the first stage, we further exploit the potential of multi-" 2401.00678v1,"General-purpose foundation models for increased autonomy in robot-assisted surgery Samuel Schmidgall 1* , Ji Woong Kim 1 , Alan Kuntz 2 , Ahmed Ezzat Ghazi 1 , and Axel Krieger 1 1 Johns Hopkins University 2 University of Utah * sschmi46@jhu.edu ABSTRACT The dominant paradigm for end-to-end robot learning focuses on optimizing task-specific objectives that solve a single robotic problem such as picking up an object or reaching a target position. However, recent work on high-capacity models in robotics has shown promise toward being trained on large collections of diverse and task-agnostic datasets of video demonstrations 1–5 . These models have shown impressive levels of generalization to unseen circumstances, especially as the amount of data and the model complexity scale. Surgical robot systems that learn from data have struggled to advance as quickly as other fields of robot learning for a few reasons 6–10 : (1) there is a lack of existing large-scale open-source data to train models, (2) it is challenging to model the soft-body deformations that these robots work with during surgery because simulation cannot match the physical and visual complexity of biological tissue, and (3) surgical robots risk harming patients when tested in clinical trials and require more extensive safety measures. This perspective article aims to provide a path toward increasing robot autonomy in robot-assisted surgery through the development of a multi-modal, multi-task, vision-language-action model for surgical robots. Ultimately, we argue that surgical robots are uniquely positioned to benefit from general-purpose models and provide three guiding actions toward increased autonomy in robot-assisted surgery. It was April 11 th 1985 at the Long Beach Memorial Medical Center that the earliest robotic surgery was first performed 11 . This was the culmination of three years of work during which Dr. Yik San Kwoh and colleagues redesigned a standard industrial robot arm (the Puma 560) to place a needle for a brain biopsy, guided by computed tomography (CT). Kwoh’s surgical device was demonstrated effective on three human brain surgeries, culminating in excitement for Kwoh and colleagues, but mixed emotions from both patients, doctors, and scientists. While it was an outstanding technical success, the company marketing the Puma 560 (Westinghouse Limited) refused to allow Kwoh to continue his robot-assisted surgeries due to safety concerns. Despite this promising work, it would be almost a decade before the first surgical robot, AESOP, would receive approval for clinical use in 1992. Forty years later there are surgical procedures rarely performed without robot assistance 12 . For example, 85 percent of radical prostatectomies (a surgical procedure to remove the prostate gland and seminal vesicles) in the USA are performed with robot-assistance 12 . More generally, the use of robot assistance across all surgeries increased from 1.8 percent to 15.1 percent from 2012 to 2018 in the US 13 . For certain procedures, the advantages of robot assistance are clear. However, for many other procedures, the benefits still remain uncertain 14 . The most frequently cited disadvantages of robot-assistance are the need for expensive specialized training together with the high cost for these robots and disposable tools despite requiring the same surgeon workload. This overhead causes some to question the use of robot-assistance at all 15 . Toward overcoming these obstacles, the up-and-coming field of research in autonomous robot-assisted surgery (RAS) has the potential to address several of these major problems— including high surgeon training costs and reducing surgeon workload. Furthering autonomy in RAS has begun demonstrating benefits in pre-clinical studies, showing more consistent instrument placement and the potential for improved surgical outcomes with lower complication rates 16–18 . As currently envisioned, greater autonomy in robotic surgery could enable surgeons to supervise multiple surgeries at once with the aid of robots, alleviating long patient wait times, reducing hospital costs, and increasing surgeon productivity. Nonetheless, the current paradigm for autonomous robots still requires input from the surgeon as well as close oversight, mitigating the potential benefits of an autonomous robot. The algorithms for these systems are generally designed at the task-level, such as placing sutures 17 or suctioning blood 19 , while factors like the ""when"" and ""where"" of the task still require human input. While advancements toward greater autonomy have been made in recent years, fully autonomous surgery still seems like a distant possibility. In the meantime, great progress has been made toward building general-purpose task solving models in other areas of robotics 1–5 . These models are trained on large-scale, realworld robotics datasets, taking a history of images from a robot’s camera along with task descriptions expressed in natural language and directly outputting actions. The resulting controllers exhibit improved generalization to unseen situations compared with prior techniques, being capable of solv-" 2401.00685v1,"IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (JSAC), Forthcoming, 2024 Communication-Efficient Federated Learning for LEO Constellations Integrated with HAPs Using Hybrid NOMA-OFDM Mohamed Elmahallawy, Student Member, IEEE, Tie Luo ∗ , Senior Member, IEEE, and Khaled Ramadan offers a potential solution as it replaces data transmission with model transmission, where each satellite trains an ML model onboard using its own data and then only sends the trained model to the GS. This substantially reduces the demand for bandwidth and gains the additional benefit of preserving data privacy. However, integrating FL with SatCom is non-trivial and involves significant challenges. This is because FL entails an iterative training process that typically involves hundreds of communication rounds between clients and the parameter server (PS). While this is not a big issue in usual networks, it is a critical bottleneck in SatCom/LEO, where clients are LEO satellites and the PS is the GS, due to four factors. First, the highly sporadic, intermittent, and irregular connectivity pattern between LEO satellites and the GS. This is caused by the distinction of travel trajectories and speeds between LEO satellites and the PS, where satellites orbit the earth with an inclination angle between 0–90 o while PS travels along the Earth rotation direction. Second, the long propagation and transmission delays in SatCom, due to the long distance and low data rate. Third, FL models are often large (e.g., 528/549MB for VGG16/19, 232MB for ResNet152, 479MB for EfficientNetV2L) because of the high image resolution and accuracy dictated by satellite applications such as national and homeland security, disaster and weather monitoring. Lastly, the wireless channels between LEO satellites and GS are unreliable due to adverse weather conditions like rain, fog, wind turbulence, and interference from other radio signals especially near the Earth’s surface. As a result, the short visible time window between a satellite and the PS is often insufficient to allow the complete transmission of a model, especially when multiple satellites’ transmissions are involved. Ultimately, the above challenges significantly impede the FL training process and result in slow convergence that takes days or even weeks [6], [7]. In this paper, we propose a novel FL-SatCom framework called NomaFedHAP that is tailored to LEO satellites to address the above challenges. First, it introduces non-orthogonal multiple access (NOMA) as a spectrum-efficient communication scheme into FL-SatCom to enable satellites at different orbit shells (hence different altitudes) to transmit models concurrently from/to the PS. Second, following our previous work [8], NomaFedHAP utilizes multiple high-altitude platforms (HAPs) in lieu of GSs to act as distributed PSs to improve satellite visibility. But unlike [8], NomaFedHAP introduces a new satellite-HAP communication topology in Abstract—Space AI has become increasingly important and sometimes even necessary for government, businesses, and society. An active research topic under this mission is integrating federated learning (FL) with satellite communications (SatCom) so that numerous low Earth orbit (LEO) satellites can collaboratively train a machine learning model. However, the special communication environment of SatCom leads to a very slow FL training process up to days and weeks. This paper proposes NomaFedHAP, a novel FL-SatCom approach tailored to LEO satellites, that (1) utilizes high-altitude platforms (HAPs) as distributed parameter servers (PSs) to enhance satellite visibility, and (2) introduces non-orthogonal multiple access (NOMA) into LEO to enable fast and bandwidth-efficient model transmissions. In addition, NomaFedHAP includes (3) a new communication topology that exploits HAPs to bridge satellites among different orbits to mitigate the Doppler shift, and (4) a new FL model aggregation scheme that optimally balances models between different orbits and shells. Moreover, we (5) derive a closed-form expression of the outage probability for satellites in near and far shells, as well as for the entire system. Our extensive simulations have validated the mathematical analysis and demonstrated the superior performance of NomaFedHAP in achieving fast and efficient FL model convergence with high accuracy as compared to the state-of-the-art. Index Terms—Low Earth orbit (LEO), federated Learning, high altitude platform (HAP), non-orthogonal multiple Access (NOMA). I. I NTRODUCTION Atellite communication (SatCom) technology is considered a major player of the Internet of Remote Things (IoRT) [1]. Recent advancements in SatCom have stimulated giant companies such as SpaceX, Amazon, and OneWeb, as well as government agencies such as ESA and NASA, to launch a large number of small satellites into space on low Earth orbits (LEOs) [2]. These satellites are equipped with high-resolution cameras and collect massive satellite imagery [3]. Meanwhile, the booming developments of AI have motivated the leverage of machine learning (ML) to perform satellite data analytics. However, traditional ML approaches which require downloading the massive imagery from satellites to a ground station (GS) are not practical due to the limited SatCom bandwidth. In this regard, federated Learning (FL) [4], [5] S ∗ Corresponding author. M. Elmahallawy and T. Luo are with the Department of Computer Science, Missouri University of Science and Technology, USA (e-mail: {meqxk, tluo}@mst.edu). K. Ramadan is with the Department of Electronics and Communication Engineering, The Higher Institute of Engineering in Elshorouk City, Cairo, Egypt (e-mail: k.ramadan@sha.edu.eg). This work was supported by the National Science Foundation (NSF) under Grant No. 2008878. 1" 2401.00689v1,"Large language model for Bible sentiment analysis: Sermon on the Mount Mahek Vora a , Tom Blau b , Vansh Kachhwal c , Ashu M. G. Solo d , Rohitash Chandra e,f, a Indian Institute of Technology Guwahati, Assam, India b Data61, Commonwealth Scientific and Industrial Research Organisation, Sydney, Australia c Indian Institute of Technology Delhi, India d Maverick Trailblazers Inc., Wilmington, Delaware, U.S.A. e Transitional Artificial Intelligence Research Group, School of Mathematics and Statistics, UNSW Sydney, Sydney, Australia f Pingala Institute of Artificial Intelligence, Sydney, Australia Abstract The revolution of natural language processing via large language models has motivated its use in multidisciplinary areas that include social sciences and humanities and more specifically, comparative religion. Sentiment analysis provides a mechanism to study the emotions expressed in text. Recently, sentiment analysis has been used to study and compare translations of the Bhagavad Gita, which is a fundamental and sacred Hindu text. In this study, we use sentiment analysis for studying selected chapters of the Bible. These chapters are known as the Sermon on the Mount. We utilize a pre-trained language model for sentiment analysis by reviewing five translations of the Sermon on the Mount, which include the King James version, the New International Version, the New Revised Standard Version, the Lamsa Version, and the Basic English Version. We provide a chapter-by-chapter and verse-by-verse comparison using sentiment and semantic analysis and review the major sentiments expressed. Our results highlight the varying sentiments across the chapters and verses. We found that the vocabulary of the respective translations is significantly different. We detected different levels of humour, optimism, and empathy in the respective chapters that were used by Jesus to deliver his message. Keywords: BERT, natural language processing, comparative religion, Bible, sentiment analysis 1. Introduction Natural language processing (NLP) enables computers to read, interpret, translate, analyze, and understand written and oral forms of language [1, 2, 3]. NLP includes tasks such as language translation, speech recognition, topic modelling, and semantic and sentiment analysis [2] and is typically implemented using machine learning and deep learning [4, 5, 6]. Sentiment analysis of written and oral text provides an understanding of human emotions and affective states [7, 8, 9]. Semantic analysis has a wide range of applications that mainly include marketing with applications in recommender systems in social media [10, 11]. Semantic analysis has been used in market research to determine customer viewpoints about products or services in[12, 13]. Sentiment analysis has a wide range of social media applications [14] that can guide sociologists, political scientists, and policymakers. Sentiment analysis has been used to study public behaviour and voting preferences during the 2020 United States presidential elections [15]. There is also research on sentiment analysis from social media during COVID-19 [16] and vaccine-related COVID-19 sentiments In a recent study, Chandra and Kulkarni [17] used sentiment analysis to study and compare translations of the sacred Hindu text known as the Bhagavad Gita. The study reported that although the style and Email address: rohitash.chandra@unsw.edu.au (Rohitash Chandra ) Preprint submitted to Elsevier vocabulary of the translations differ substantially, the semantic and sentiment analysis showed similarity in the majority of the verses. The study also showed how sentiment analysis captures the changing topics of the conversation between the protagonists, Lord Krishna and Arjuna, over time. Chandra et al. [18] used sentiment analysis to compare the Sanskrit translation of the Bhagavad Gita with expert (human) translators and reported major discrepancies in Google Translate. These applications have motivated us to use sentiment analysis in this study of selected chapters of the Bible. The Bible is one of the most influential texts in history and has attracted an immense volume of scholarship. [19, 20, 21] The field of biblical scholarship also has a history of using noncomputational linguistic tools and theory to study the structure, meaning, authorship, and authenticity of different parts, versions, and translations of the Bible [22, 23, 24, 25]. Artificial intelligence and computational linguistics have also been applied to the study of the Bible. This began with rule and grammar-based methods of computational linguistics [26] and continues with modern deep learning-based NLP [27]. NLP serves as an ideal resource for the study of the Bible and related texts because they are large and highly structured and have been translated into hundreds of languages with most versions in the public domain. The large and diverse set of English language translations raises the need for comparisons between different styles of translations to verify if they feature similarity in the core meaning [28]. At the same time, the availability January 2, 2024" 2401.00701v1,"Towards Efficient and Effective Text-to-Video Retrieval with Coarse-to-Fine Visual Representation Learning Kaibin Tian, Yanhua Cheng, Yi Liu, Xinglin Hou, Quan Chen, Han Li Abstract In recent years, text-to-video retrieval methods based on CLIP have experienced rapid development. The primary direction of evolution is to exploit the much wider gamut of visual and textual cues to achieve alignment. Concretely, those methods with impressive performance often design a heavy fusion block for sentence (words)-video (frames) interaction, regardless of the prohibitive computation complexity. Nevertheless, these approaches are not optimal in terms of feature utilization and retrieval efficiency. To address this issue, we adopt multi-granularity visual feature learning, ensuring the model’s comprehensiveness in capturing visual content features spanning from abstract to detailed levels during the training phase. To better leverage the multi-granularity features, we devise a two-stage retrieval architecture in the retrieval phase. This solution ingeniously balances the coarse and fine granularity of retrieval content. Moreover, it also strikes a harmonious equilibrium between retrieval effectiveness and efficiency. Specifically, in training phase, we design a parameter-free text-gated interaction block (TIB) for fine-grained video representation learning and embed an extra Pearson Constraint to optimize cross-modal representation learning. In retrieval phase, we use coarse-grained video representations for fast recall of top-k candidates, which are then reranked by fine-grained video representations. Extensive experiments on four benchmarks demonstrate the efficiency and effectiveness. Notably, our method achieves comparable performance with the current state-of-the-art methods while being nearly 50 times faster. Introduction With the explosive growth of videos uploaded online every day from platforms like TikTok, Kwai, YouTube, and Netflix, text-to-video retrieval is a crucial and fundamental task for multi-modal representation learning (Fang et al. 2021; Ge et al. 2022; Gorti et al. 2022; Luo et al. 2022; Ma et al. 2022). Recently, the pre-trained text-image matching models (CLIP (Radford et al. 2021)) from a large scale of web-collected image-text pairs show the great success on diverse vision-language downstream tasks (Nichol et al. 2021; Ramesh et al. 2022; Mokady, Hertz, and Bermano 2021; Hu et al. 2022b; Li et al. 2022; Conde and Turgutlu 2021). In light of the well-learned visual features, a preliminary study Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. DRL, arXiv22 E ff e c t i v e n e s s ( M e a n R 1 , R 5 , R 1 0 ) Kuaishou Technology {tiankaibin, chengyanhua, liuyi24, houxinglin, chenquan06, lihan08}@kuaishou.com EERCF 68.33 TS2-Net, ECCV22 66.67 X-Pool, CVPR22 CLIP-ViP, ICLR23 LAFF, ECCV22 CenterCLIP, SIGIR22 65.00 X-CLIP, MM22 CLIP4Clip, Neurocom22 63.33 MMT, ECCV20 61.67 W2VV++, MM19 10 3 10 4 10 5 10 6 Efficiency (Estimated FLOPs per video-text matching, log scale) Figure 1: Effectiveness and efficiency for text-to-video retrieval models. We evaluate our approach under the settings of MSRVTT-1K-Test and backbone CLIP(ViT-B/32). The current trend of mainstream is reflected from the lower left to the upper right corner. Our method achieves the best balance, positioned at the upper left corner. is conducted by CLIP4Clip (Luo et al. 2022), which transfers the pre-trained CLIP to video-language domain with simple MeanPooling and achieves a certain level of promotion. A problem arises where, unlike relatively less visual information in text-image matching, aggregating the entire video as a representation in text-to-video retrieval can lead to over-abstraction and be misleading. As one sentence generally describes video sub-regions of interest. Therefore, a natural idea is to consider how to align text and video representations at a finer granularity. The development of CLIP variants can be divided into two main categories to address the above problem. One category focuses on designing a heavy fusion block to strengthen the interaction between visual (video, frames) and text (sentence, words) cues for better alignment of the two modalities (Liu et al. 2021; Ma et al. 2022). The other one optimizes text-driven video representations by keeping multi-grained features including videolevel and frame-level for brute-force search (Gorti et al. 2022; Wang et al. 2022)." 2401.00717v1,"HENO-MAC: Hybrid Energy Harvesting-based Energy Neutral Operation MAC Protocol for Delay- Sensitive IoT Applications Sohail Sarang 1 , Goran M Stojanović 1 , Micheal Drieberg 2 , Varun Jeoti 1 and Mikko Valkama 3 1 Faculty of Technical Sciences, University of Novi Sad, 21000 Novi Sad, Serbia 2 Department of Electrical & Electronic Engineering, Universiti Teknologi PETRONAS, 32610 Seri Iskandar, Malaysia 3 Department of Electrical Engineering, Tampere University, 33720 Tampere, Finland 1 {sohail, goran, varunjeoti}@uns.ac.rs, 2 mdrieberg@utp.edu.my, 3 mikko.valkama@tuni.fi Abstract— The Internet of Things (IoT) technology uses small and cost-effective sensors for various applications, such as Industrial IoT. However, these sensor nodes are powered by fixedsize batteries, which creates a trade-off between network performance and long-term sustainability. Moreover, some applications require the network to provide a certain level of service, such as a lower delay for critical data, while ensuring the operational reliability of sensor nodes. To address this energy challenge, external energy harvesting sources, such as solar and wind, offer promising and eco-friendly solutions. However, the available energy from a single energy source is insufficient to meet these requirements. This drives the utilization of a hybrid energy harvesting approach, such as the integration of solar and wind energy harvesters, to increase the amount of harvested energy. Nevertheless, to fully utilize the available energy, which is dynamic in nature, the sensor node must adapt its operation to ensure sustainable operation and enhanced network performance. Therefore, this paper proposes a hybrid energy harvesting-based energy neutral operation (ENO) medium access control (MAC) protocol, called HENO-MAC, that allows the receiver node to harvest energy from the solar-wind harvesters and adapt its duty cycle accordingly. The performance of the proposed HENO-MAC was evaluated using the latest realistic solar and wind data for two consecutive days in GreenCastalia. The simulation results demonstrate that the duty cycle mechanism of HENO-MAC effectively utilizes the harvested energy to achieve ENO and uses the available energy resources efficiently to reduce the packet delay for all packets and the highest priority packet by up to 28.5% and 27.3%, respectively, when compared with other existing MAC protocols. Keywords— Hybrid energy harvesting, energy neutral operation, MAC protocol, duty cycle, delay-sensitive application, sensor network, IoT. I. I NTRODUCTION The Internet of Things (IoT) is one of the most significant technologies that supports a wide range of applications, such as environmental and industrial process monitoring, healthcare, and agriculture [1]. Wireless sensor network (WSN) is an integral part of IoT and has gained significant attention due to its features such as small, inexpensive, and low-power nodes. These sensor nodes are powered by limited-size batteries [2]; as a result, they have a limited lifetime. In addition, batteries need to be changed regularly, which is time-consuming and hinders network operation. Energy harvesting technology has enabled sensor nodes to collect external energy using different sources, such as solar, wind, radio frequency (RF), thermal, and mechanical, as shown in Figure 1. However, these ambient energy sources have different energy harvesting abilities that are dependent on Fig. 1. Energy harvesting sources various factors, such as time, weather conditions (sunny or rainy days), indoor or outdoor conditions, and atmospheric pressure [3]. Therefore, long-term network sustainability requires a balance between the available external energy and energy consumption, which is called energy neutral operation (ENO) [4]. When the external source does not provide sufficient energy under low harvesting conditions, the node relies on its stored energy in a battery, which can lead to a limited network lifetime, as shown in Figure 2. Therefore, the uncertainty in energy harvesting conditions and the amount of harvested energy from the single energy source is not adequate to achieve ENO, which can lead to limited network lifetime [1, 5]. This challenge motivates the integration of different energy harvesters to increase harvested energy to achieve long-term sustainability and desired performance goals [6]. In energy harvesting IoT, the key design objective of the medium access control (MAC) protocol is to use the harvested energy efficiently to maximize performance [7]. This can be achieved by developing smart energy allocation strategies based on the current energy harvesting conditions and overall available energy resources. In the literature, several energyharvesting-aware MAC protocols have been developed for different applications, such as environmental monitoring, agriculture, and delay-sensitive applications [8-10]. They incorporated harvested energy information to set different parameters, such as access probability, duty cycle, node priority, and relay node selection. However, the performance of existing protocols primarily relies on a single harvesting source; thus, they may not provide sufficient energy at all times. Moreover, in dynamic harvesting scenarios, such as rainy days or low wind conditions, sensor nodes may be required to" 2401.00736v1,"1 Diffusion Models, Image Super-Resolution And Everything: A Survey Brian B. Moser 1,2 , Arundhati S. Shanbhag 1,2 , Federico Raue 1 , Stanislav Frolov 1,2 , Sebastian Palacio 1 , Andreas Dengel 1,2 1 German Research Center for Artificial Intelligence (DFKI), Germany 2 Rheinland-Pfälzische Technische Universität Kaiserslautern-Landau, Germany first.second@dfki.de Abstract—Diffusion Models (DMs) represent a significant advancement in image Super-Resolution (SR), aligning technical image quality more closely with human preferences and expanding SR applications. DMs address critical limitations of previous methods, enhancing overall realism and details in SR images. However, DMs suffer from color-shifting issues, and their high computational costs call for efficient sampling alternatives, underscoring the challenge of balancing computational efficiency and image quality. This survey gives an overview of DMs applied to image SR and offers a detailed analysis that underscores the unique characteristics and methodologies within this domain, distinct from broader existing reviews in the field. It presents a unified view of DM fundamentals and explores research directions, including alternative input domains, conditioning strategies, guidance, corruption spaces, and zero-shot methods. This survey provides insights into the evolution of image SR with DMs, addressing current trends, challenges, and future directions in this rapidly evolving field. Index Terms—Diffusion Models, Image Super-Resolution, Artificial Intelligence, Survey. ✦ 1 I I NTRODUCTION N the ever-evolving field of computer vision, Super- Resolution (SR) – the enhancement of Low-Resolution (LR) images into High-Resolution (HR) ones – stands as a longstanding yet still perplexing challenge, owing to its inherently ill-posed nature: Several HR images can be valid for any given LR image due to many aspects like brightness and coloring [1]. Spanning applications from natural [2], [3] to sophisticated satellite [4] and medical imaging [5], SR’s progress has been fueled by rapid strides in deep learning. Diffusion Models (DMs) have recently risen to prominence as a leading family of generative models, challenging the longstanding dominance of Generative Adversarial Networks (GANs) [6], [7], [8], [9]. While earlier generative models showcased impressive image-generation capabilities, they carried inherent limitations. For instance, Autoregressive models can be prohibitively costly for generating HR images [10], [11], [12]. On the other hand, NFs and VAEs often produce samples of sub-optimal quality. Furthermore, GANs demand carefully designed regularization and optimization strategies to manage optimization instability and prevent mode collapse [13]. Nevertheless, these models collectively contributed significantly to the field of SR. The advent of DMs heralded a new era of generative models and profoundly impacted the realm of generative AI, reinvigorating the field of image SR once again. However, as the volume of research on DMs continues to expand, it is becoming more challenging, particularly for those new to the field, to stay updated on the latest developments. The sheer breadth of this research area can obscure overarching trends and potentially hinder the progression of further research. We tackle these issues by delivering a comprehensive overview of the current research on DMs in image SR. This survey builds upon our previous work Hitchhiker’s Guide to Super-Resolution [14], which gives a broad overview of the field of image SR in general. We aim to provide a valuable entry point for those new to the domain of DMs in image SR while offering a broader perspective to those already experienced. The structure of this paper is organized as follows: Section 2 - Super-Resolution Basics: This section provides fundamental definitions and introduces standard datasets, methods, and metrics for assessing image quality commonly utilized in image SR publications. Section 3 - Diffusion Models Basics: Introduces the principles and various formulations of DMs, including Denoising Diffusion Probabilistic Models (DDPMs), Score-based Generative Models (SGMs), and Stochastic Differential Equations (SDEs). This section also explores how DMs relate to other generative models. Section 4 - Improvements for Diffusion Models: Common practices for enhancing DMs, focusing on efficient sampling techniques and improved likelihood estimation. Section 5 - Diffusion Models for Image SR: Presents concrete realizations of DMs in SR, explores alternative domains (latent space and wavelet domain), discusses architectural designs and multiple tasks with Null-Space Models, and examines alternative corruption spaces. Section 6 - Domain-Specific Applications: DM-based SR applications, namely medical imaging, blind face restoration, atmospheric turbulence in face SR, and remote sensing. Section 7 - Discussion and Future Work: Common problems of DMs for image SR and noteworthy research avenues for DMs specific to image SR. Section 8 - Conclusion: Summarizes the survey." 2401.00737v1,"Searching, fast and slow, through product catalogs Dayananda Ubrangala 1 Juhi Sharma 1 Sharath Kumar Rangappa 1 Kiran R 1 Ravi Prasad Kondapalli 1 Laurent Boué 1 Abstract String matching algorithms in the presence of abbreviations, such as in Stock Keeping Unit (SKU) product catalogs, remains a relatively unexplored topic. In this paper, we present a unified architecture for SKU search that provides both a real-time suggestion system (based on a Trie data structure) as well as a lower latency search system (making use of character level TF-IDF in combination with language model vector embeddings) where users initiate the search process explicitly. We carry out ablation studies that justify designing a complex search system composed of multiple components to address the delicate trade-off between speed and accuracy. Using SKU search in the Dynamics CRM as an example, we show how our system vastly outperforms, in all aspects, the results provided by the default search engine. Finally, we show how SKU descriptions may be enhanced via generative text models (using gpt-3.5-turbo) so that the consumers of the search results may get more context and a generally better experience when presented with the results of their SKU search. Keywords: String matching ; Data structures ; Large Language Models ; Search Engine Architecture 1. Introduction Our goal is to describe the multiple components we have put into place to design a comprehensive and production-ready search system that not only supports abbreviated strings but also offers a vastly superior performance and user experience to that of the existing Dynamics CRM. Having a dependable and efficient search engine embedded within a Customer Relationship Management (CRM) system is vital. It empowers sales teams and support staff to swiftly retrieve pricing, availability, and other product details, enabling them to respond accurately and promptly to customer queries. Unfortunately, due to their multifaceted nature, the search functionality of CRMs often leans towards simplicity. The resulting reduced search accuracy is especially pronounced when users seek information with complex abbreviations as is a common scenario for searching through Stock Keeping Units (SKUs) catalogs. We start in Section 3 by describing a minimal dataset of features one may use for SKU search. Next, we realize that a useful search engine requires the capability to handle both dynamic search (which provides instant results as the user types each character) and complete search (activated when the user hits the search button). Dynamic search offers rapid feedback allowing users to refine their queries on the fly. In Section 5, we show how dynamic search may be solved using a Trie data structure. We continue in Section 6 by showing how top accuracy may be achieved by combining character-level TF-IDF with language model embeddings together. This leads to Section 6.4 where we describe the overall search system that strikes a balance between speed and accuracy. Finally, we show in Section 8 how the SKUs descriptions’ may be enhanced using a GPT- based generative text model. In this work, we use the Dynamics CRM as an example of where SKU search is performed daily by thousands of Microsoft sellers. At the time of writing, the product catalog contains ≈ 87, 000 active SKUs from multiple pricelists. 1 Microsoft, CX Data Cloud + AI. Correspondence to: Laurent Boué . 1" 2401.00744v5,"Harmonizing Covariance and Expressiveness for Deep Hamiltonian Regression in Crystalline Material Research: a Hybrid Cascaded Regression Framework Shi Yin † 1 Xinyang Pan 2 Xudong Zhu 1 2 Tianyu Gao 2 Haochong Zhang 1 Feng Wu 1 2 Lixin He † 1 2 Abstract stone in the field of materials science, offering unparalleled insights into the properties of materials. Within this framework, the Kohn-Sham Hamiltonian plays an essential role in understanding a wide range of material properties, including electronic structures, magnetic properties, optics, transport, and numerous other properties. However, obtaining the Hamiltonian through DFT involves complex and costly self-consistent iterations, which have become a major bottleneck when applying this method to large-scale material systems. Recently, deep learning methods (Schütt et al., 2019; Unke et al., 2021; Gu et al., 2022; Li et al., 2022; Gong et al., 2023) have emerged as a promising trend for predicting Hamiltonians. These methods have demonstrated potential in terms of prediction accuracy and offer a way to bypass the computationally exhaustive self-consistent steps, thereby providing a viable pathway for the effective simulation of large-scale atomic systems. Deep learning for Hamiltonian regression of quantum systems in material research necessitates satisfying the covariance laws, among which achieving SO(3)-equivariance without sacrificing the expressiveness capability of networks remains an elusive challenge due to the restriction to non-linear mappings on guaranteeing theoretical equivariance. To alleviate the covarianceexpressiveness dilemma, we propose a hybrid framework with two cascaded regression stages. The first stage, i.e., a theoretically-guaranteed covariant neural network modeling symmetry properties of 3D atom systems, predicts baseline Hamiltonians with theoretically covariant features extracted, assisting the second stage in learning covariance. Meanwhile, the second stage, powered by a non-linear 3D graph Transformer network we propose for structural modeling of atomic systems, refines the first stage’s output as a fine-grained prediction of Hamiltonians with better expressiveness capability. The combination of a theoretically covariant yet inevitably less expressive model with a highly expressive non-linear network enables precise, generalizable predictions while maintaining robust covariance under coordinate transformations. Our method achieves stateof-the-art performance in Hamiltonian prediction for electronic structure calculations, confirmed through experiments on six crystalline material databases. The codes and configuration scripts are available in the supplementary material. However, applying deep learning techniques to the Hamiltonian prediction task continues to present substantial challenges. An accuracy to the meV scale (10 −3 eV) is required and accuracy to the sub-meV scale (10 −4 eV) is welcomed, to achieve a satisfactory level of accuracy for calculating the down-stream physical quantities such as band structures. Furthermore, the fidelity of Hamiltonian predictions should not be confined to a specific coordinate system; rather, the results must demonstrate robust symmetry and generalizability across various choices of reference frames. This necessitates that deep learning methods capture the intrinsic symmetries of the Hamiltonian with respect to transformations of the coordinate system, thereby ensuring the consistency with physical principles covariant to these transformations. In the context of Hamiltonian prediction, the key covariance principles are 3D translational invariance and rotational equivariance. By utilizing relative coordinates, 3D translational invariance has been effortlessly achieved, while 3D rotational equivariance, i.e., equivariance to the SO(3) group, remains a challenging target to guarantee. This difficulty arises because the Hamiltonian of each pair of atoms is usually high-dimensional, and its variation space under rotational disturbance is large. Consequently, it is difficult to cover the vast variability space they inhabit merely depending on discrete training samples. To address this, several works, such as DeepHE3 (Gong et al., 2023), ap- 1. Introduction Currently, Density Functional Theory (DFT) (Hohenberg & Kohn, 1964; Kohn & Sham, 1965) stands as a corner- 1 Institute of Artificial Intelligence, Hefei Comprehensive National Science Center 2 University of Science and Technology of China. Correspondence to: Shi Yin , Lixin He . 1" 2401.00745v1,"Radon-type transforms for holomorphic and Hermitian monogenic functions ⋆ Ren Hu a , Pan Lian b a Department of Basis Courses, Tianjin Sino-German University of Applied Sciences b School of Mathematical Sciences, Tianjin Normal University Abstract The standard Radon transform of holomorphic functions is not always well defined, as the integration of such functions over planes may not converge. In this paper, we introduce new Radon-type transforms of co-(real)dimension 2 for harmonic and holomorphic functions on the unit ball. These transforms are abstractly defined as orthogonal projections onto spaces of complex harmonic and holomorphic plane waves, respectively. The inversion formulas are derived based on the dual transform, while the latter is defined as an integration on a complex Stiefel manifold. Our transforms are extended to the Fock space and give rise to a new transform defined on the entire L 2 (R n ) through the Segal-Bargmann transform. Furthermore, we develop these transforms for Hermitian monogenic functions on the unit ball, thereby refining the Szegö-Radon transform for monogenic functions introduced by Colombo, Sabadini and Sommen. Keywords: Szegö-Radon transform, Dirac operator, Fock space, spherical harmonics, Clifford algebra, Hermitian monogenic 2020 MSC: 30G35, 44A12 Contents 1 Introduction 2 2 Preliminaries 2.1 Real spherical harmonics . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Complex spherical harmonics . . . . . . . . . . . . . . . . . . . . . . 6 6 8 ⋆ Dedicated to Prof. Dr. Franciscus Sommen Email addresses: huren@tsguas.edu.cn (Ren Hu), panlian@tjnu.edu.cn (Pan Lian) Preprint submitted to Elsevier January 2, 2024" 2401.00751v1,"1 Machine Translation Testing via Syntactic Tree Pruning QUANJUN ZHANG, State Key Laboratory for Novel Software Technology, Nanjing University, China JUAN ZHAI, Manning College of Information & Computer Sciences, University of Massachusetts Amherst, USA CHUNRONG FANG ∗ , State Key Laboratory for Novel Software Technology, Nanjing University, China JIAWEI LIU, State Key Laboratory for Novel Software Technology, Nanjing University, China WEISONG SUN, State Key Laboratory for Novel Software Technology, Nanjing University, China HAICHUAN HU, State Key Laboratory for Novel Software Technology, Nanjing University, China QINGYU WANG, State Key Laboratory for Novel Software Technology, Nanjing University, China Machine translation systems have been widely adopted in our daily life, making life easier and more convenient. Unfortunately, erroneous translations may result in severe consequences, such as financial losses. This requires to improve the accuracy and the reliability of machine translation systems. However, it is challenging to test machine translation systems because of the complexity and intractability of the underlying neural models. To tackle these challenges, we propose a novel metamorphic testing approach by syntactic tree pruning (STP) to validate machine translation systems. Our key insight is that a pruned sentence should have similar crucial semantics compared with the original sentence. Specifically, STP (1) proposes a core semantics-preserving pruning strategy by basic sentence structures and dependency relations on the level of syntactic tree representation; (2) generates source sentence pairs based on the metamorphic relation; (3) reports suspicious issues whose translations break the consistency property by a bag-of-words model. We further evaluate STP on two state-of-the-art machine translation systems (i.e., Google Translate and Bing Microsoft Translator) with 1,200 source sentences as inputs. The results show that STP accurately finds 5,073 unique erroneous translations in Google Translate and 5,100 unique erroneous translations in Bing Microsoft Translator (400% more than state-of-the-art techniques), with 64.5% and 65.4% precision, respectively. The reported erroneous translations vary in types and more than 90% of them are not found by state-of-the-art techniques. There are 9,393 erroneous translations unique to STP, which is 711.9% more than state-of-the-art techniques. Moreover, STP is quite effective in detecting translation errors for the original sentences with a recall reaching 74.0%, improving state-of-the-art techniques by 55.1% on average. CCS Concepts: • Software and its engineering → Software testing and debugging. Additional Key Words and Phrases: Software testing, Machine translation, Metamorphic testing ∗ Chunrong Fang is the corresponding author. Authors’ addresses: Quanjun Zhang, quanjun.zhang@smail.nju.edu.cn, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093; Juan Zhai, juan.zhai@rutgers.edu, Manning College of Information & Computer Sciences, University of Massachusetts Amherst, Amherst, MA, USA, 01003; Chunrong Fang, fangchunrong@nju. edu.cn, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093; Jiawei Liu, jw.liu@smail.nju.edu.cn, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093; Weisong Sun, weisongsun@smail.nju.edu.cn, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093; Haichuan Hu, 181250046@smail.nju.edu.cn, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093; Qingyu Wang, wangqingyu2012@gmail.com, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China, 210093. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. 1049-331X/2023/0-ART1 $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn ACM Trans. Softw. Eng. Methodol., Vol. 0, No. 0, Article 1. Publication date: 2023." 2401.00769v1,"Under consideration for publication in J. Fluid Mech. 1 Banner appropriate to article type will appear here in typeset article Cavitation bubble dynamics inside a droplet suspended in a different host fluid Shuai Li 1 , Zhesheng Zhao 1 , A-Man Zhang 1 †, and Rui Han 2 1 College of Shipbuilding Engineering, Harbin Engineering University, Harbin, China 2 Heilongjiang Provincial Key Laboratory of Nuclear Power System & Equipment, Harbin Engineering University, Harbin, China (Received xx; revised xx; accepted xx) In this paper, we present a theoretical, experimental, and numerical study of the dynamics of cavitation bubbles inside a droplet suspended in another host fluid. On the theoretical side, we provided a modified Rayleigh collapse time and natural frequency for spherical bubbles in our particular context, characterized by the density ratio between the two liquids and the bubble-todroplet size ratio. Regarding the experimental aspect, experiments were carried out for laser-induced cavitation bubbles inside oil-in-water (O/W) or water-in-oil (W/O) droplets. Two distinct fluid-mixing mechanisms were unveiled in the two systems, respectively. In the case of O/W droplets, a liquid jet emerges around the end of the bubble collapse phase, effectively penetrating the droplet interface. We offer a detailed analysis of the criteria governing jet penetration, involving the standoff parameter and impact velocity of the bubble jet on the droplet surface. Conversely, in the scenario involving W/O droplets, the bubble traverses the droplet interior, inducing global motion and eventually leading to droplet pinchoff when the local Weber number exceeds a critical value. This phenomenon is elucidated through the equilibrium between interfacial and kinetic energies. Lastly, our boundary integral model faithfully reproduces the essential physics of nonspherical bubble dynamics observed in the experiments. We conduct a parametric study spanning a wide parameter space to investigate bubble-droplet interactions. The insights from this study could serve as a valuable reference for practical applications in the field of ultrasonic emulsification, pharmacy, etc. Key words: Bubble dynamics; Cavitation; Multiphase flow 1. Introduction The dynamics of cavitation bubbles inside liquid droplets have been attracting increasing interest in the scientific community. This is mainly because confined boundaries can lead to surprisingly rich dynamics, and the phenomena have many † Email address for correspondence: zhangaman@hrbeu.edu.cn Abstract must not spill onto p.2" 2401.00788v1,"A STRAIOS : Parameter-Efficient Instruction Tuning Code Large Language Models Terry Yue Zhuo 1,2 Leandro von Werra 3 1 Armel Zebaze 3∗ Harm de Vries 4 Nitchakarn Suppattarachai 1 Qian Liu 5 Niklas Muennighoff 6 2 3 Monash University CSIRO’s Data61 Hugging Face 5 6 ServiceNow Research Sea AI Lab Contextual AI terry.zhuo@monash.edu ‡ https://github.com/bigcode-project/astraios 4 Abstract The high cost of full-parameter fine-tuning (FFT) of Large Language Models (LLMs) has led to a series of parameter-efficient fine-tuning (PEFT) methods. However, it remains unclear which methods provide the best cost-performance trade-off at different model scales. We introduce A STRAIOS , a suite of 28 instruction-tuned OctoCoder models using 7 tuning methods and 4 model sizes up to 16 billion parameters. Through investigations across 5 tasks and 8 different datasets encompassing both code comprehension and code generation tasks, we find that FFT generally leads to the best downstream performance across all scales, and PEFT methods differ significantly in their efficacy based on the model scale. LoRA usually offers the most favorable trade-off between cost and performance. Further investigation into the effects of these methods on both model robustness and code security reveals that larger models tend to demonstrate reduced robustness and less security. At last, we explore the relationships among updated parameters, cross-entropy loss, and task performance. We find that the tuning effectiveness observed in small models generalizes well to larger models, and the validation loss in instruction tuning can be a reliable indicator of overall downstream performance. 30 25 (IA) 3 LoRA 0.01% 0.21% P Tuning Parallel Adapter P Adapter H FFT 1.52% 0.82% 100% 2.87% 1.46% 20 15 10 5 0 1B 3B 7B 16B Figure 1: Mean task performance of A STRAIOS models across 5 representative tasks and 8 datasets. We indicate the average percentage of total parameters updated for each PEFT method. ∗ The work was partially done at Hugging Face." 2401.00792v1,"Probing Grand Unification with Quantum Sensors Xavier Calmet ∗ and Nathaniel Sherrill † Department of Physics and Astronomy, University of Sussex, Brighton, BN1 9QH, United Kingdom Abstract We discuss how grand unification can be probed with experiments at low energies using quantum sensors. Specifically, we show that scalar multiplets coupled to the gauge sector of a grand unified theory provide a mechanism for a time-varying unified coupling which has low-energy consequences which can be probed with quantum sensors. We then assume that the multiplets represent ultra light dark matter. Constraints on ultra light dark matter couplings to regular matter are extracted using atomic clock comparisons, pulsar timing arrays (NANOGrav) and MICROSCOPE. ∗ † Electronic address: x.calmet@sussex.ac.uk Electronic address: n.sherrill@sussex.ac.uk 1" 2401.00808v1,"MNRAS 000, 1–?? (2024) Preprint 2 January 2024 Compiled using MNRAS L A TEX style file v3.0 OGHReS: Star formation in the Outer Galaxy (ℓ = 250 ◦ -280 ◦ ) ⋆ J. S. Urquhart, 1 † C. König, 2 D. Colombo, 3,2 A. Karska, 2,3,4 F. Wyrowski, 2 K. M. Menten, 2 T. J. T. Moore, 5 J. Brand, 6 D. Elia, 7 A. Giannetti, 6 S. Leurini, 8 M. Figueira, 9,4 M.-Y. Lee, 10 M. Dumke, 11,2 1 Centre for Astrophysics and Planetary Science, University of Kent, Canterbury, CT2 7NH, UK 2 Max-Planck-Institut für Radioastronomie (MPIfR), Auf dem Hügel 69, 53121 Bonn, Germany 3 Argelander-Institut für Astronomie, Universität Bonn, Auf dem Hügel 71, 53121 Bonn, Germany 4 Institute of Astronomy, Faculty of Physics, Astronomy and Informatics, Nicolaus Copernicus University, Grudzi adzka ˛ 5, 87-100 Toruń, Poland 5 Astrophysics Research Institute, Liverpool John Moores University, Liverpool Science Park, 146 Brownlow Hill, Liverpool, L3 5RF, UK 6 INAF - Istituto di Radioastronomia, Via P. Gobetti 101, I-40129 Bologna, Italy 7 INAF - Istituto di Astrofisica e Planetologia Spaziali, Via Fosso del Cavaliere 100, I-00133 Roma, Italy 8 INAF - Osservatorio Astronomico di Cagliari, Via della Scienza 5, I-09047 Selargius (CA), Italy 9 National Centre for Nuclear Research, Pasteura 7, 02-093 Warszawa, Poland 10 Korea Astronomy and Space Science Institute, 776 Daedeok-daero, Yuseong-gu, Daejeon 34055, Republic of Korea 11 Centro de Astro-Ingeniería, Pontificia Universidad Católica de Chile, Av. Vicuña Mackenna 4860, Macul, Santiago, Chile Accepted XXX. Received YYY; in original form ZZZ ABSTRACT We have used data from the Outer Galaxy High-Resolution Survey (OGHReS) to refine the velocities, distances, and physical properties of a large sample of 3 584 clumps detected in far infrared/submillimetre emission in the Hi-GAL survey located in the ℓ = 250 ◦ − 280 ◦ region of the Galactic plane. Using 12 CO and 13 CO spectra, we have determined reliable velocities to 3 412 clumps (95 per cent of the sample). In comparison to the velocities from the Hi-GAL catalogue, we find good agreement for 80 per cent of the sample (within 5 km s −1 ). Using the higher resolution and sensitivity of OGHReS has allowed us to correct the velocity for 632 clumps and provide velocities for 687 clumps for which no velocity had been previously allocated. The velocities are used with a rotation curve to refine the distances to the clumps and to calculate the clumps’ properties using a distance-dependent gas-to-dust ratio. We have determined reliable physical parameters for 3 200 outer Galaxy dense clumps (∼90 per cent of the Hi-GAL sources in the region). We find a trend of decreasing luminosity-to-mass ratio with increasing Galactocentric distance, suggesting the star formation efficiency is lower in the outer Galaxy or that it is resulting in more lower mass stars than in the inner Galaxy. We also find a similar surface density for protostellar clumps located in the inner and outer Galaxy, revealing that the surface density requirements for star formation are the same across the Galactic disc. Key words: stars: formation – stars: protostars – ISM: molecules – Galaxy: structure – infrared: stars 1 INTRODUCTION Star formation is a fundamental process in astrophysics that determines the structure of galaxies and drives their evolution (Kennicutt 2005). Star formation rates are found to be very different in different kinds of galaxies; they are lower in irregular and dwarf galaxies than in spiral galaxies (Kennicutt & Evans 2012). Star formation rates are also found to vary significantly within galaxies due to different environmental factors (e.g. density, metallicity, location). If we are to understand the processes that drive galaxy evolution, it is crucial to determine the role played by environmental effects in the formation and evolution of molecular clouds, and how these, in turn, affect star ⋆ The full version of Tables 1 and 2 are only available in electronic form at the CDS via anonymous ftp to cdsarc.u-strasbg.fr (130.79.125.5) or via http://cdsweb.u-strasbg.fr/cgi-bin/qcat?J/MNRAS/. † E-mail: j.s.urquhart@kent.ac.uk © 2024 The Authors formation. To do this, we need to study the properties of molecular clouds over a large range of environments. We are unable to study star formation in sufficient detail in external galaxies due to limited physical resolution (e.g. > 30 pc; Leroy et al. 2021). The Milky Way, however, presents a wide range of environments that are analogous to those found in other types of galaxies. In the extreme environment of the Galactic Centre (Galactocentric distance R gc < 2 kpc) conditions are similar to those found in star-burst galaxies (e.g. high uv-radiation flux, density, turbulence and cosmic ray flux), while the conditions found in the inner disc (2 kpc < R gc < 8.15 kpc), are similar to those in nearby spiral galaxies (Kennicutt & Evans 2012). The low-density and low metallicity environment found in the outer Galaxy (R gc > 8.15 kpc; Lépine et al. 2011) are similar to what is found in irregular and dwarf galaxies, such as in our nearest neighbour galaxies in the Magellanic system (Sewiło et al. 2019), and also comparable to the interstellar environments found at high redshift (Kruijssen & Longmore 2013)." 2401.00809v1,"A REVIEW ON DIFFERENT TECHNIQUES USED TO COMBAT THE NON - IID AND HETEROGENEOUS NATURE OF DATA IN FL A P REPRINT Venkataraman Natarajan Iyer Mechanical and Aerospace Engineering Nanyang Technological University Singapore venkataramannatarajan2001@gmail.com A BSTRACT Federated Learning (FL) is a machine-learning approach enabling collaborative model training across multiple decentralized edge devices that hold local data samples, all without exchanging these samples. This collaborative process occurs under the supervision of a central server orchestrating the training or via a peer-to-peer network. The significance of FL is particularly pronounced in industries such as healthcare and finance, where data privacy holds paramount importance. However, training a model under the Federated learning setting brings forth several challenges, with one of the most prominent being the heterogeneity of data distribution among the edge devices. The data is typically non-independently and non-identically distributed (non-IID), thereby presenting challenges to model convergence. This report delves into the issues arising from non-IID and heterogeneous data and explores current algorithms designed to address these challenges. 1 Introduction Traditional machine learning involves the collection of extensive data, followed by pre-processing, enabling the training of large-scale models in a centralized manner. The pre-processing step is crucial, enhancing data quality and facilitating the model’s ability to learn patterns for accurate predictions. In centralized machine learning scenarios, where data is sourced from a single, well-controlled environment, the assumption of Independent and Identically Distributed (IID) data is often reasonable. The term Federated learning was introduced by Google in 2016 as part of a paper that aimed to solve the problem of training a centralized machine learning model, specifically Google Keyboard, from data distributed among millions of clients, specifically mobile phones. Training in Federated learning can be done under two different settings, namely, Centralized Federated learning and Decentralized Federated learning. Figure 1: Federated learning" 2401.00833v1,"Rethinking RAFT for Efficient Optical Flow Navid Eslami, Farnoosh Arefi, Amir M. Mansourian, Shohreh Kasaei Department of Computer Engineering Sharif University of Technology Tehran, Iran Email: {navid.eslami, far.arefi, amir.mansurian, kasaei}@sharif.edu Abstract—Despite significant progress in deep learning-based optical flow methods, accurately estimating large displacements and repetitive patterns remains a challenge. The limitations of local features and similarity search patterns used in these algorithms contribute to this issue. Additionally, some existing methods suffer from slow runtime and excessive graphic memory consumption. To address these problems, this paper proposes a novel approach based on the RAFT framework. The proposed Attention-based Feature Localization (AFL) approach incorporates the attention mechanism to handle global feature extraction and address repetitive patterns. It introduces an operator for matching pixels with corresponding counterparts in the second frame and assigning accurate flow values. Furthermore, an Amorphous Lookup Operator (ALO) is proposed to enhance convergence speed and improve RAFT’s ability to handle large displacements by reducing data redundancy in its search operator and expanding the search space for similarity extraction. The proposed method, Efficient RAFT (Ef-RAFT), achieves significant improvements of 10% on the Sintel dataset and 5% on the KITTI dataset over RAFT. Remarkably, these enhancements are attained with a modest 33% reduction in speed and a mere 13% increase in memory usage. The code is available at: https://github.com/n3slami/Ef-RAFT Index Terms—Optical Flow, Large Displacement, Repetitive Patterns, Attention Mechanism, Deep Neural Networks I. I NTRODUCTION Optical Flow is a fundamental challenge in computer vision, focusing on determining the displacement vector for each pixel between two consecutive frames. This technique holds immense significance across downstream tasks, like visual tracking [1], video segmentation [2], and robot navigation [3]. Traditionally, the problem has been tackled using different classical computer vision methods such as correlation-based [4], block matching [5], and energy minimization-based [6] techniques. However, these approaches have proven to be computationally expensive, making them impractical for realtime applications. In recent years, deep learning has emerged as a promising alternative to conventional approaches. Deep learning techniques have the advantage of bypassing the need to formulate optimization problems and instead train networks to directly predict the optical flow. These methods [7]–[9] have demonstrated comparable performance to the top traditional methods while significantly reducing the inference time, making them faster and more efficient. In general, neural network models take a pair of consecutive images captured by a frame-based camera as input and generate predictions for the optical flow that effectively warps pixels from one image to the other. RAFT [10], which stands for Recurrent All-Pairs Field Transforms, is considered one of the most successful learningbased methods for optical flow estimation. It has gained significant popularity as a simple yet robust baseline approach in the field. While this method exhibits efficient performance when evaluated on benchmark datasets, it can still encounter challenges under specific conditions. For instance, when dealing with significant displacements or untextured/repetitive patterns, there is a possibility of encountering large errors in the estimated optical flow. To enhance the performance of optical flow estimation, advanced techniques have been developed specifically for enhancing the RAFT method. These techniques encompass attention-based operations [11], [12], graph models [13], and latent cost-volume augmentation [14]. However, it is important to note that these methods typically require additional computational resources and introduce significant inference time, which limits their practical application in realworld scenarios. To tackle the challenges posed by large displacements and repetitive patterns in the RAFT method, this paper introduces two novel mechanisms: 1) the Amorphous Lookup Operator (ALO), and 2) the Attention-based Feature Localizer (AFL). The former replaces the original lookup operator of RAFT, allowing the network to vary the distribution of the correlation queries based on the input frames, resulting in the ability to recognize larger displacements. The latter transforms the resultant features of the feature encoders in such a way that the network can differentiate and match the pixels in a poorly textured region, reducing the ambiguities that stem from these regions and thus, mitigating the resultant errors in estimation. In summary, the main contributions of this work are as follows: Proposing the Amorphous Lookup Operator (ALO) as a novel method for tackling large displacement problem of the optical flow estimation methods. • Proposing the Attention-based Feature Localizer (AFL) as a novel method for tackling repetitive patterns problem of the optical flow estimation methods. • Validating the effectiveness of the proposed methods by conducting extensive experiments on the Sintel and KITTI datasets. •" 2401.00853v1,"Wave momentum shaping for moving objects in heterogeneous and dynamic media Bakhtiyar Orazbayev, 1, 2 Matthieu Malléjac, 1 Nicolas Bachelard, 3 Stefan Rotter, 4 and Romain Fleury 1, ∗ 1 Laboratory of Wave Engineering, École Polytechnique Fédérale de Lausanne, Switzerland. 2 Department of Physics, Nazarbayev University, Astana, Kazakhstan. 3 Université de Bordeaux, CNRS, LOMA, UMR 5798, F-33405, Talence, France. 4 Institute of Theoretical Physics, Vienna University of Technology (TU Wien), Vienna, Austria (Dated: January 3, 2024) Light and sound waves have the fascinating property that they can move objects through the transfer of linear or angular momentum. This ability has led to the development of optical and acoustic tweezers, with applications ranging from biomedical engineering to quantum optics. Although impressive manipulation results have been achieved, the stringent requirement for a highly controlled, low-reverberant, and static environment still hinders the applicability of these techniques in many scenarios. Here, we overcome this challenge and demonstrate the manipulation of objects in disordered and dynamic media, by optimally tailoring the momentum of sound waves iteratively in the far field. The method does not require information about the object’s physical properties or the spatial structure of the surrounding medium but relies only on a real-time scattering matrix measurement and a positional guidestar. Our experiment demonstrates the possibility of optimally moving and rotating objects, extending the reach of wave-based object manipulation to complex and dynamic scattering media. We envision new opportunities for biomedical applications, sensing, or manufacturing. Keywords: Object manipulation, wave-momentum shaping, scattering, adaptive acoustics. Ever since the emergence of optical tweezers [1, 2], the non-contact manipulation of objects using electromagnetic [3, 4] and acoustic waves [5–7] has become a central paradigm in quite diverse fields ranging from optomechanics to bio-acoustics. Sound waves, in particular, offer distinct advantages, as they are bio-compatible and harmless, while their short wavelengths can penetrate a wide range of heterogeneous, opaque, and absorbing media. Another key feature of acoustics is its wide frequency range, spanning from Hertz to Gigahertz, which facilitates the manipulation of particles varying in size from a few centimeters to a few micrometers. In this way, not only Mie [8–10] and Rayleigh particles can be addressed, but also complex objects including individual biological cells [11–13]. While various strategies have already been developed to collectively or selectively manipulate objects and particles, these techniques always rely on controlled and static environments. Collective dynamic positioning of particles trapped in the potential wells of a pressure field has been achieved in 1D [14], 2D [15, 16] or 3D [17–20]. Typically, by generating appropriate standing waves [21], particles or objects are trapped either on the pressure nodes or antinodes, depending on their contrast ratio with the surrounding fluid [13]. More advanced strategies have also been developed to address the selectivity problem of standing-wave-based trapping, involving acoustic vortices [22], or the use of additional systems such as lenses [23], metasurfaces [24] or holograms [18, 25–28]. Considerable attention has also been paid to the development of on-chip acoustofluidic and acoustophoretic de- ∗ romain.fleury@epfl.ch vices [12, 29–31] and wave-controlled micro-robots [32– 38] for lab-on-a-chip and biomedical applications. However, the requirement for precisely controlled static environments and proximity to the target significantly restricts the applicability of these various techniques in many real-world scenarios. Practical cases involve disordered or dynamic environments where manipulation must occur at a considerable distance from the object that needs to be manipulated. Here, we propose and experimentally demonstrate a wave momentum shaping approach, which only requires far-field information and allows us to move and rotate objects even in disordered or dynamic environments. Instead of relying on potential wells to trap the object, we continuously find and send the optimal mode mixture that transfers an optimal amount of momentum to the object. This mode mixture is updated during the motion as the scattering changes. The method is experimentally demonstrated in a macroscopic 2D acoustic cavity containing a movable object and a collection of scatterers. Far-field scattering matrix measurements allow us to determine the optimal wavefronts for shifting or rotating the object at each moment in time. Remarkably, the method neither requires the knowledge or modelling of acoustic forces nor any prior information on the physical properties of the object or disorder. Only a guidestar measurement of the object’s position or rotation angle is needed, which is here provided by a camera. The remarkable robustness of the method is emphasized by implementing it in a dynamic scenario, where the scatterers composing the environment move randomly. The method may be transposed to other platforms and scales, such as ultrasounds or light for the motion of microscopic bodies." 2401.00865v1,"Xorbits: Automating Operator Tiling for Distributed Data Science Weizheng Lu 1 , Kaisheng He 2 , Xuye Qin ∗2 , Chengjie Li 2 , Zhong Wang 2 , Tao Yuan 3 Feng Zhang 1 , Yueguo Chen ∗1 , Xiaoyong Du 1 1 Renmin University of China, 2 Xorbits Inc., 3 China Communications Information Technology Group Co. , Ltd. luweizheng@ruc.edu.cn, { hekaisheng, qinxuye, lichengjie, wangzhong } @xprobe.io, yuantao10@ccccltd.cn, { fengzhang, chenyueguo, duyong } @ruc.edu.cn, Abstract—Data science pipelines commonly utilize dataframe and array operations for tasks such as data preprocessing, analysis, and machine learning. The most popular tools for these tasks are pandas and NumPy. However, these tools are limited to executing on a single node, making them unsuitable for processing large-scale data. Several systems have attempted to distribute data science applications to clusters while maintaining interfaces similar to single-node libraries, enabling data scientists to scale their workloads without significant effort. However, existing systems often struggle with processing large datasets due to Out-of-Memory (OOM) problems caused by poor data partitioning. To overcome these challenges, we develop Xorbits, a high-performance, scalable data science framework specifically designed to distribute data science workloads across clusters while retaining familiar APIs. The key differentiator of Xorbits is its ability to dynamically switch between graph construction and graph execution. Xorbits has been successfully deployed in production environments with up to 5k CPU cores. Its applications span various domains, including user behavior analysis and recommendation systems in the e-commerce sector, as well as credit assessment and risk management in the finance industry. Users can easily scale their data science workloads by simply changing the import line of their pandas and NumPy code. Our experiments demonstrate that Xorbits can effectively process very large datasets without encountering OOM or dataskewing problems. Over the fastest state-of-the-art solutions, Xorbits achieves an impressive 2.66× speedup on average. In terms of API coverage, Xorbits attains a compatibility rate of 96.7%, surpassing the fastest framework by an impressive margin of 60 percentage points. Xorbits is available at https: //github.com/xorbitsai/xorbits. Index Terms—scalable data science, dataframe, array, tiling, computation graph I. I NTRODUCTION Data science (DS) pipelines are increasingly prevalent in today’s world, owing to the emerging applications of machine learning (ML), artificial intelligence (AI), and datadriven business intelligence (BI) [1], [2]. Dataframe and array systems, specifically pandas [4] and NumPy [5], form the most substantial portion of data science pipelines. The two libraries have gained widespread recognition among developers globally [6] primarily attributed to their various operators, flexible usage, and user-friendly interfaces. However, these two packages suffer scalability problems as they cannot distribute ∗ Corresponding authors: Yueguo Chen and Xuye Qin. to multi-cores or multi-nodes, missing big data processing capability [7]. As datasets rapidly grow and workloads become more complex, there is an ever-increasing need to scale these libraries by utilizing computational resources far beyond what a single CPU-only node can offer. Several frameworks, such as PySpark [8], Dask [9], Ray [10], mpi4py [11], and Modin [12], have been developed to address scalability concerns for data science workloads. However, our empirical studies reveal two significant issues with these tools. First, they struggle with handling extremely large datasets due to poor data partitioning and out-of-memory (OOM) problems, particularly in data-skewing scenarios. These systems build the computation graphs and partition data primarily by estimating the size of initial data sources ahead of runtime [2]. However, the size of in-memory data can fluctuate after executing a series of data science operators, potentially diverging from the initial size. This can lead to memory exhaustion on specific worker nodes, especially during shuffle-intensive operations such as groupby or merge. Second, they are not fully compatible with widely-used pandas and NumPy APIs [13], [14]. This necessitates substantial code rewriting from users and is problematic as most data scientists only specialize in data modeling rather than parallel programming. These challenges significantly hinder users aiming to scale their data science workloads. To address these problems, we develop Xorbits, a scalable data science engine that enables parallel execution of workloads like data-loading, preprocessing, scientific computing, analyzing, machine learning, etc. First, to optimize computation graphs at a finer granularity, we design three types of graphs—tileable graph (logical plan), chunk graph (coarsegrained physical plan), and subtask graph (fine-grained physical plan), in conjunction with a multi-stage map-combinereduce programming model. Second, we introduce a novel dynamic tiling approach for automatic graph construction. This approach can switch between graph construction and graph execution, enabling us to build graphs by leveraging metadata from execution. It considers the current operator’s actual input data shape. Leveraging this real-time metadata, Xorbits can effectively partition and process data without encountering OOM issues, even when the data’s shape substantially deviates from the initial data source. Third, given the tiled graph, we" 2401.00873v1,"A Bayesian Unification of Self-Supervised Clustering and Energy-Based Models Emanuele Sansone emanuele.sansone@kuleuven.be Department of Electrical Engineering KU Leuven Leuven, 3001, Belgium Robin Manhaeve robin.manhaeve@kuleuven.be Department of Computer Science KU Leuven Leuven, 3001, Belgium Abstract Self-supervised learning is a popular and powerful method for utilizing large amounts of unlabeled data, for which a wide variety of training objectives have been proposed in the literature. In this study, we perform a Bayesian analysis of state-of-the-art selfsupervised learning objectives, elucidating the underlying probabilistic graphical models in each class and presenting a standardized methodology for their derivation from first principles. The analysis also indicates a natural means of integrating self-supervised learning with likelihood-based generative models. We instantiate this concept within the realm of cluster-based self-supervised learning and energy models, introducing a novel lower bound which is proven to reliably penalize the most important failure modes. Furthermore, this newly proposed lower bound enables the training of a standard backbone architecture without the necessity for asymmetric elements such as stop gradients, momentum encoders, or specialized clustering layers—typically introduced to avoid learning trivial solutions. Our theoretical findings are substantiated through experiments on synthetic and real-world data, including SVHN, CIFAR10, and CIFAR100, thus showing that our objective function allows to outperform existing self-supervised learning strategies in terms of clustering, generation and out-of-distribution detection performance by a wide margin. We also demonstrate that GEDI can be integrated into a neural-symbolic framework to mitigate the reasoning shortcut problem and to learn higher quality symbolic representations thanks to the enhanced classification performance. Keywords: self-supervised learning, energy-based models, deep learning, neural-symbolic integration. 1 Introduction Self-supervised learning (SSL) has achieved impressive results in recent years due to its ability to learn good representations from a large amount of unlabeled data. A significant amount of effort has been dedicated to analyzing existing SSL approaches in order to identify fundamental principles that can guide the design of new SSL objectives and algorithms. However, a common framework or methodology capable of encompassing, explaining, or deriving the multitude of objectives developed in recent years is currently lacking. In this work, we present a Bayesian interpretation of recent SSL objectives by uncovering their underlying probabilistic graphical models. This approach highlights a common methodol- ©2023 Emanuele Sansone and Robin Manhaeve. License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/." 2401.00879v1,"SoK: Demystifying Privacy Enhancing Technologies Through the Lens of Software Developers MAISHA BOTEJU, The University of Auckland, New Zealand THILINA RANBADUGE, Data61, CSIRO, Australia DINUSHA VATSALAN, Macquarie University, Australia NALIN ASANKA GAMAGEDARA ARACHCHILAGE, The University of Auckland, New Zealand In the absence of data protection measures, software applications lead to privacy breaches, posing threats to end-users and software organisations. Privacy Enhancing Technologies (PETs) are technical measures that protect personal data, thus minimising such privacy breaches. However, for software applications to deliver data protection using PETs, software developers should actively and correctly incorporate PETs into the software they develop. Therefore, to uncover ways to encourage and support developers to embed PETs into software, this Systematic Literature Review (SLR) analyses 39 empirical studies on developers’ privacy practices. It reports the usage of six PETs in software application scenarios. Then, it discusses challenges developers face when integrating PETs into software, ranging from intrinsic challenges, such as the unawareness of PETs, to extrinsic challenges, such as the increased development cost. Next, the SLR presents the existing solutions to address these challenges, along with the limitations of the solutions. Further, it outlines future research avenues to better understand PETs from a developer perspective and minimise the challenges developers face when incorporating PETs into software. CCS Concepts: • Security and privacy → Human and societal aspects of security and privacy; • Software and its engineering → Software development process management; Designing software; • General and reference → Surveys and overviews. Additional Key Words and Phrases: Privacy Enhancing Technologies, data protection, developers, secure computation ACM Reference Format: Maisha Boteju, Thilina Ranbaduge, Dinusha Vatsalan, and Nalin Asanka Gamagedara Arachchilage. 2023. SoK: Demystifying Privacy Enhancing Technologies Through the Lens of Software Developers. ACM Comput. Surv. 37, 4, Article 111 (August 2023), 35 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Software applications pose a significant threat to the privacy of their end-users [15, 34, 42]. They routinely and excessively collect personal data, such as personally identifiable information (e.g., names, locations) and sensitive data (e.g., healthcare data), in exchange for their services [44, 88]. For instance, in 2018, the New York Times found that some software track the location of 200 million mobile users in the United States, collecting accurate location data over 14,000 times daily [107]. Therefore, if software applications do not provide means to protect these personal data, end-users could lose them to unknown parties who might sometimes be malicious, causing end-users financial losses, Authors’ addresses: Maisha Boteju, The University of Auckland, Auckland, New Zealand, mbot450@aucklanduni.ac.nz; Thilina Ranbaduge, Data61, CSIRO, Canberra, Australia, thilina.ranbaduge@anu.edu.au; Dinusha Vatsalan, Macquarie University, Sydney, Australia, dinusha.vatsalan@mq.edu.au; Nalin Asanka Gamagedara Arachchilage, The University of Auckland, Auckland, New Zealand, nalin.arachchilage@auckland.ac.nz. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2018 Association for Computing Machinery. Manuscript submitted to ACM Manuscript submitted to ACM 1" 2401.00896v1,"T RAIL B LAZER : T RAJECTORY C ONTROL FOR D IFFUSION -B ASED V IDEO G ENERATION A P REPRINT Wan-Duo Kurt Ma Victoria University of Wellington mawand@ecs.vuw.ac.nz J. P. Lewis NVIDIA Research jpl@nvidia.com W. Bastiaan Kleijn Victoria University of Wellington bastiaan.kleijn@vuw.ac.nz January 3, 2024 An astronaut walking on the moon A cat running on the grass field A tiger walking on the road A cat [ sitting -> running ] on the grass { { A dog [ watching -> playing with ] the red balls on the road A cat and dog playing [on the moon | in the city | in the garden] Figure 1: TrailBlazer extends a pre-trained video diffusion model to introduce trajectory control over one or multiple subjects. Its primary contribution lies in the ability to animate the synthesized subject using a bounding box (bbox), whether it remains static (Top-left) or dynamic in terms of location (Top-right), bbox size (Middle-left), and varied movement speed (Middle-right, the cat sitting in the early half of video in red bbox, and then moving with cyan bbox), achieved through keyframing. The moving subjects fit naturally within an environment specified by the overall prompt (Bottom-right). Additionally, the speed of the subjects can be controlled through keyframing (Bottom-left). A BSTRACT Within recent approaches to text-to-video (T2V) generation, achieving controllability in the synthesized video is often a challenge. Typically, this issue is addressed by providing low-level per-frame guidance in the form of edge maps, depth maps, or an existing video to be altered. However, the process of obtaining such guidance can be labor-intensive. This paper focuses on enhancing controllability in video synthesis by employing straightforward bounding boxes to guide the subject in various ways, all without the need for neural network training, finetuning, optimization at inference time, or the use of pre-existing videos. Our algorithm, TrailBlazer, is constructed upon a pre-trained (T2V) model, and easy to implement. 1 The subject is directed by a bounding box through the proposed spatial and temporal attention map editing. Moreover, we introduce the concept of keyframing, allowing the subject trajectory and overall appearance to be guided by both a moving bounding box and corresponding prompts, without the need to provide a detailed mask. The method is efficient, with negligible additional computation relative to the underlying pre-trained model. Despite the simplicity of the bounding box guidance, the resulting motion is surprisingly natural, with emergent effects including perspective and movement toward the virtual camera as the box size increases. 1 Our project page: https://hohonu-vicml.github.io/Trailblazer.Page/" 2401.00908v1,"D OC LLM: A LAYOUT - AWARE GENERATIVE LANGUAGE MODEL FOR MULTIMODAL DOCUMENT UNDERSTANDING Dongsheng Wang ∗ , Natraj Raman ∗ , Mathieu Sibue ∗ Zhiqiang Ma, Petr Babkin, Simerjot Kaur, Yulong Pei, Armineh Nourbakhsh, Xiaomo Liu JPMorgan AI Research {first.last}@jpmchase.com A BSTRACT Enterprise documents such as forms, invoices, receipts, reports, contracts, and other similar records, often carry rich semantics at the intersection of textual and spatial modalities. The visual cues offered by their complex layouts play a crucial role in comprehending these documents effectively. In this paper, we present DocLLM, a lightweight extension to traditional large language models (LLMs) for reasoning over visual documents, taking into account both textual semantics and spatial layout. Our model differs from existing multimodal LLMs by avoiding expensive image encoders and focuses exclusively on bounding box information to incorporate the spatial layout structure. Specifically, the cross-alignment between text and spatial modalities is captured by decomposing the attention mechanism in classical transformers to a set of disentangled matrices. Furthermore, we devise a pre-training objective that learns to infill text segments. This approach allows us to address irregular layouts and heterogeneous content frequently encountered in visual documents. The pre-trained model is fine-tuned using a large-scale instruction dataset, covering four core document intelligence tasks. We demonstrate that our solution outperforms SotA LLMs on 14 out of 16 datasets across all tasks, and generalizes well to 4 out of 5 previously unseen datasets. Keywords DocAI · VRDU · LLM · GPT · Spatial Attention 1 Introduction Documents with rich layouts, including invoices, receipts, contracts, orders, and forms, constitute a significant portion of enterprise corpora. The automatic interpretation and analysis of these documents offer considerable advantages [1], which has spurred the development of AI-driven solutions. These visually rich documents feature complex layouts, bespoke type-setting, and often exhibit variations in templates, formats and quality. Although Document AI (DocAI) has made tremendous progress in various tasks including extraction, classification and question answering, there remains a significant performance gap in real-world applications. In particular, accuracy, reliability, contextual understanding and generalization to previously unseen domains continues to be a challenge [2]. Document intelligence is inherently a multi-modal problem with both the text content and visual layout cues being critical to understanding the documents. It requires solutions distinct from conventional large language models such as GPT-3.5 [3], Llama [4], Falcon [5] or PaLM [6] that primarily accept text-only inputs and assume that the documents exhibit simple layouts and uniform formatting, which may not be suitable for handling visual documents. Numerous vision-language frameworks [7, 8] that can process documents as images and capture the interactions between textual and visual modalities are available. However, these frameworks necessitate the use of complex vision backbone architectures [9] to encode image information, and they often make use of spatial information as an auxiliary contextual signal [10, 11]. In this paper we present DocLLM, a light-weight extension to standard LLMs that excels in several visually rich form understanding tasks. Unlike traditional LLMs, it models both spatial layouts and text semantics, and therefore is * These authors contributed equally to this work." 2401.00928v1,"OSINT Research Studios: A Flexible Crowdsourcing Framework to Scale Up Open Source Intelligence Investigations Anirban Mukhopadhyay Department of Computer Science, Virginia Tech Blacksburg, VA, USA anirban@vt.edu Sukrit Venkatagiri Department of Computer Science, Swarthmore College Swarthmore, PA, USA sukrit@swarthmore.edu Kurt Luther Department of Computer Science, Virginia Tech Arlington, VA, USA kluther@vt.edu ABSTRACT 1 Open Source Intelligence (OSINT) investigations, which rely entirely on publicly available data such as social media, play an increasingly important role in solving crimes and holding governments accountable. The growing volume of data and complex nature of tasks, however, means there is a pressing need to scale and speed up OSINT investigations. Expert-led crowdsourcing approaches show promise, but tend to either focus on narrow tasks or domains, or require resource-intense, long-term relationships between expert investigators and crowds. We address this gap by providing a flexible framework that enables investigators across domains to enlist crowdsourced support for discovery and verification of OS- INT. We use a design-based research (DBR) approach to develop OSINT Research Studios (ORS), a sociotechnical system in which novice crowds are trained to support professional investigators with complex OSINT investigations. Through our qualitative evaluation, we found that ORS facilitates ethical and effective OSINT investigations across multiple domains. We also discuss broader implications of expert–crowd collaboration and opportunities for future work. Open Source Intelligence (OSINT) involves the use of publicly available information to generate intelligence that addresses a particular need [133]. OSINT analysis is increasingly used by journalists [75], human rights activists [56, 80], and law enforcement [59, 100], among other professions. For example, OSINT is used to verify breaking news and combat disinformation, monitor international weapons development, locate suspected terrorists and victims of human trafficking, and document war crimes [36, 42, 80, 134]. These investigations are widely recognized for their ability to use data sources like social media, satellite imagery, flight tracking information, and metadata from smartphones and IoT devices to conduct investigations [93, 134]. There is a pressing need to scale and speed up OSINT investigations, especially those focused on time-sensitive topics such as documenting war crimes or addressing disinformation. Apart from time pressure, investigators find it difficult to manage the growing volume of data that they must process [5, 65]. The ephemerality of online information [56] and prevalence of misleading or misrepresented content [56, 78] pose additional challenges. Many investigators may also lack the data science and software development skills required to fully utilize OSINT tools and techniques [91], presenting another barrier to the adoption of OSINT. There are two common approaches to scale and speed up such investigations: automation [62, 73, 115] and crowdsourcing [3, 53, 90, 104]. OSINT investigations require creatively leveraging multiple tools and techniques [36]. Thus, software tools cannot fully automate and scale up the complex sensemaking involved in investigative work [88]. Computational methods have produced high volumes of unverifiable information, which has low utility for experts [95]. OSINT analysts also aim to minimize dependency on custom-built tools, as they can easily become obsolete [97]. Crowdsourcing provides a second, more flexible way to augment investigators’ complex sensemaking efforts. However, unfettered access to information as with OSINT investigations have resulted in “bottom-up” crowdsourced investigations that exhibit biased results [29], doxxing [98], and even sabotaging of ongoing investigations [121]. Expert supervision has sometimes resulted in more successful investigations in terms of both process (ethical, safe, and privacyprotecting) and outcomes (results). For example, CrowdSolve [124] described an effort in which law enforcement officials and experts supervised a crowd of 250 true crime enthusiasts in investigating two cold cases in a co-located, weekend-long event where information was tightly controlled rather than publicly available or open source. The Human Rights Center (HRC) at the University of California, Berkeley trains law students to partner with professional CCS CONCEPTS • Human-centered computing → Collaborative and social computing systems and tools; Empirical studies in HCI. KEYWORDS OSINT, open source intelligence, design-based research, social media investigation, collaboration, crowdsourcing ACM Reference Format: Anirban Mukhopadhyay, Sukrit Venkatagiri, and Kurt Luther. 2024. OSINT Research Studios: A Flexible Crowdsourcing Framework to Scale Up Open Source Intelligence Investigations. In Proceedings of Conference on Computer- Supported Cooperative Work & Social Computing (CSCW ’24). ACM, New York, NY, USA, 24 pages. https://doi.org/XXXXXXX.XXXXXXX Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CSCW ’24, November 9–13, 2024, San José, Costa Rica © 2024 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX INTRODUCTION" 2401.00932v1,"Black holes surrounded by generic matter distributions: polar perturbations and energy flux Nicholas Speeney, 1, ∗ Emanuele Berti, 1, † Vitor Cardoso, 2, 3, 4, ‡ and Andrea Maselli 5, 6, § 1 William H. Miller III Department of Physics and Astronomy, Johns Hopkins University, 3400 N. Charles Street, Baltimore, Maryland, 21218, USA 2 Niels Bohr International Academy, Niels Bohr Institute, Blegdamsvej 17, 2100 Copenhagen, Denmark 3 CENTRA, Departamento de Física, Instituto Superior Técnico – IST, Universidade de Lisboa – UL, Avenida Rovisco Pais 1, 1049-001 Lisboa, Portugal 4 Yukawa Institute for Theoretical Physics, Kyoto University, Kyoto 5 Gran Sasso Science Institute (GSSI), I-67100 L’Aquila, Italy 6 INFN, Laboratori Nazionali del Gran Sasso, I-67100 Assergi, Italy (Dated: January 3, 2024) We develop a numerical approach to compute polar parity perturbations within fully relativistic models of black hole systems embedded in generic, spherically symmetric, anisotropic fluids. We apply this framework to study gravitational wave generation and propagation from extreme mass-ratio inspirals in the presence of several astrophysically relevant dark matter models, namely the Hernquist, Navarro-Frenk-White, and Einasto profiles. We also study dark matter spike profiles obtained from a fully relativistic calculation of the adiabatic growth of a BH within the Hernquist profile, and provide a closed-form analytic fit of these profiles. Our analysis completes prior numerical work in the axial sector, yielding a fully numerical pipeline to study black hole environmental effects. We study the dependence of the fluxes on the DM halo mass and compactness. We find that, unlike the axial case, polar fluxes are not adequately described by simple gravitational-redshift effects, thus offering an exciting avenue for the study of black hole environments with gravitational waves. I. INTRODUCTION Astrophysical black hole (BH) binaries are, in general, nonvacuum systems. The environment surrounding a BH binary is expected to play an important role in the generation and propagation of gravitational waves (GWs) by modifying the orbital trajectory of the binary and the GW phase [1–3]. These modifications are particularly interesting because the properties of the environment are encoded in the gravitational radiation. The relation between the GW signal and the properties of the environment has been studied in many cases of interest, including accretion disks [2, 4], dark matter (DM) clouds and overdensities [5–12], bosonic clouds [13–18], etcetera. All of these prior studies are based on simplifying assumptions. Very often, the effect of the environment is modeled by including Newtonian corrections to the GW quadrupole formula (see e.g. [5, 6]). In the few cases in which the environment is treated relativistically [12, 17], the orbital trajectory and GW emission are modeled within the post-Newtonian (PN) approximation, a perturbative expansion in the ratio v/c of the binary’s orbital velocity to the speed of light. Extreme mass-ratio inspirals (EMRIs) of stellar-mass objects with mass m p around massive BHs, with mass ratios q = m p /M BH ∼ O(10 −5 − 10 −8 ), can spend ∼ 10 5 orbital cycles in the low-frequency regime accessible to ∗ nspeene1@jhu.edu † berti@jhu.edu ‡ vitor.cardoso@tecnico.ulisboa.pt § andrea.maselli@gssi.it space-based detectors such as the Laser Interferometer Space Antenna (LISA) [19], and they are expected to lead to the best constraints on environmental effects [3]. The approximations commonly used in the treatment of environmental effects are not accurate enough for EM- RIs. These binaries are not well modeled within the PN framework, which is more amenable to comparable mass systems [20–22]. In addition, these studies do not consistently include the backreaction effect of the environment on the background solution (which is also expected to modify the orbital dynamics and the GW signal) in a fully relativistic manner. It is therefore imperative to correctly model the environment and the orbital dynamics as precisely as possible to fully capture secular effects which may accumulate throughout the orbit. Recent work has established a fully relativistic approach to address the need for accurate modeling of EMRIs embedded in astrophysical environments. This program was initiated in Ref. [23], which employed an extension of the Einstein cluster model to find relativistic solutions for the background spacetime and to compute observable quantities. Later work established a complete framework to study the coupled gravitational and fluid perturbations of either parity (axial or polar) for generic, spherically symmetric density distributions affecting EMRI inspirals [24]. While the framework developed in these works is generic, the analysis focused on the Hernquist distribution [25], which yields closed-form analytic results for the background metric. Further progress was made in Ref. [26], which developed a fully numerical pipeline to treat generic density distributions in the axial sector. In this paper we complete this research program by extending the analysis of Ref. [26] to include polar per-" 2401.00942v1,"The Influence of Biomedical Research on Future Business Funding: Analyzing Scientific Impact and Content in Industrial Investments Reza Khanmohammadi 1,* , Simerjot Kaur 2 , Charese H. Smiley 2 , Tuka Alhanai 3 , Ivan Brugere 2 , Armineh Nourbakhsh 2 , and Mohammad M. Ghassemi 1 1 Michigan State University, Computer Science and Engineering, East Lansing, USA 2 JPMorgan Chase, Artificial Intelligence Research, New York, USA 3 New York University Abu Dhabi, Computer Engineering, Abu Dhabi, UAE * khanreza@msu.edu ABSTRACT This paper investigates the relationship between scientific innovation in biomedical sciences and its impact on industrial activities, focusing on how the historical impact and content of scientific papers influenced future funding and innovation grant application content for small businesses. The research incorporates bibliometric analyses along with SBIR (Small Business Innovation Research) data to yield a holistic view of the science-industry interface. By evaluating the influence of scientific innovation on industry across 10,873 biomedical topics and taking into account their taxonomic relationships, we present an in-depth exploration of science-industry interactions where we quantify the temporal effects and impact latency of scientific advancements on industrial activities, spanning from 2010 to 2021. Our findings indicate that scientific progress substantially influenced industrial innovation funding and the direction of industrial innovation activities. Approximately 76% and 73% of topics showed a correlation and Granger-causality between scientific interest in papers and future funding allocations to relevant small businesses. Moreover, around 74% of topics demonstrated an association between the semantic content of scientific abstracts and future grant applications. Overall, the work contributes to a more nuanced and comprehensive understanding of the science-industry interface, opening avenues for more strategic resource allocation and policy developments aimed at fostering innovation. Introduction It is widely believed that scientific innovation influences present-day or future industrial activities; this influence is especially pronounced in the biomedical and health sciences, where scientific validation is often a pre-requisite to commercial translation 1 . CRISPR-Cas9 2 is one recent example, illustrated in Figure 1, that demonstrates how scientific innovation can influence the direction of industrial activity. Originating from basic biological research into the immune systems of bacteria, CRISPR-Cas9 has impacted the biomedical industry by introducing a more efficient and precise method for gene editing; this in-turn has led to numerous downstream industrial applications, including more effective gene therapies 3 . However, the magnitude and time-scale of a given scientific innovation’s impact on downstream industrial activities can vary dramatically by research topic, and a host of other complex forces including government regulation, economic conditions, and societal perceptions. For instance, research on the role of Telomere decomposition in the aging process has provided important insights into how and why biological organisms age 4 , but has not (yet) resulted in downstream industrial applications. To date, a detailed characterization of the magnitude and time-scale of scientific activities’ impact on downstream industrial activities is missing — addressing this gap is the primary objective of this research paper. Understanding the relationship between scientific innovation and industrial activity has substantial practical implications. Identifying scientific areas with a significant impact on the industry will enable businesses to anticipate future trends and adapt investment strategies accordingly. Conversely, when researchers are familiar with the commercial implications of their research, they are more likely to conduct research that has a high chance of being translated into practical applications. For example, knowing the industrial relevance of developing more effective antibiotics can guide biomedical researchers to focus their efforts on this area, potentially resulting in improved public health outcomes and opportunities for economic growth in the pharmaceutical sector." 2401.00945v1,"A review of Monte Carlo-based versions of the EM algorithm William Ruth 1 1 Corresponding Author - Department of Statistics and Actuarial Science , Simon Fraser University , Burnaby, BC Canada , wruth@sfu.ca Abstract The EM algorithm is a powerful tool for maximum likelihood estimation with missing data. In practice, the calculations required for the EM algorithm are often intractable. We review numerous methods to circumvent this intractability, all of which are based on Monte Carlo simulation. We focus our attention on the Monte Carlo EM (MCEM) algorithm and its various implementations. We also discuss some related methods like stochastic approximation and Monte Carlo maximum likelihood. Generating the Monte Carlo samples necessary for these methods is, in general, a hard problem. As such, we review several simulation strategies which can be used to address this challenge. Given the wide range of methods available for approximating the EM, it can be challenging to select which one to use. We review numerous comparisons between these methods from a wide range of sources, and offer guidance on synthesizing the findings. Finally, we give some directions for future research to fill important gaps in the existing literature on the MCEM algorithm and related methods. 1 Introduction The EM algorithm (Dempster et al., 1977) is a very influential method for the analysis of missing data. In fact, the original paper detailing this method has ranked among the most cited papers both within the statistics literature (Ryan and Woodall, 2005), and among science as a whole (Van Noorden et al., 2014). The EM algorithm is an iterative method which can be used when the observed data are framed as a partial observation from some unobserved ‘complete’ dataset. Unfortunately, there are certain technical barriers which can make the EM algorithm intractable in practice. One such challenge is how to compute conditional expectations given the observed data. A popular way to address this challenge is by replacing conditional expectations with Monte Carlo averages. We refer to such a method which makes this substitution as a Monte Carlo EM (MCEM) algorithm. The practical implementation of the MCEM algorithm is plagued by numerous obstacles, including when to terminate and what Monte Carlo sample size to use. It is 1" 2401.00971v1,"E FFICIENT M ULTI - DOMAIN T EXT R ECOGNITION D EEP N EURAL N ETWORK P ARAMETERIZATION WITH R ESIDUAL A DAPTERS A P REPRINT Jiayou Chao Stony Brook University jiayou.chao@stonybrook.edu Wei Zhu Stony Brook University wei.zhu@stonybrook.edu January 3, 2024 A BSTRACT Recent advancements in deep neural networks have markedly enhanced the performance of computer vision tasks, yet the specialized nature of these networks often necessitates extensive data and high computational power. Addressing these requirements, this study presents a novel neural network model adept at optical character recognition (OCR) across diverse domains, leveraging the strengths of multi-task learning to improve efficiency and generalization. The model is designed to achieve rapid adaptation to new domains, maintain a compact size conducive to reduced computational resource demand, ensure high accuracy, retain knowledge from previous learning experiences, and allow for domain-specific performance improvements without the need to retrain entirely. Rigorous evaluation on open datasets has validated the model’s ability to significantly lower the number of trainable parameters without sacrificing performance, indicating its potential as a scalable and adaptable solution in the field of computer vision, particularly for applications in optical text recognition. Keywords Deep Neural Network • Optical Character Recognition • Multi-domain Adapter • Multi-task Learning • Continual Learning 1 Introduction As deep neural networks continue to dramatically improve results for nearly all traditional computer vision problems, the community has begun to shift its focus to more ambitious objectives (LeCun, Bengio, and Hinton 2015). One prevalent pragmatic constraint associated with deep neural networks is related to their notable propensity for specialization towards a singular task, as well as their substantial requirements in terms of data size and computational resources (Ruder 2017; Reeve, Cannings, and Samworth 2021). This holds particularly true for the most efficacious deep neural networks, which are commonly trained on extensive datasets comprising millions of images. This issue poses a challenge in numerous applications where the available data is constrained and the computational resources are limited (Li et al. 2018; Cannings, Fan, and Samworth 2019). An additional limitation of this method is its lack of scalability, particularly when confronted with an increasing number of problems to be resolved. Furthermore, this approach lacks efficiency due to the repetitive acquisition of the same information and the inability of models to transfer knowledge across different tasks (Misra et al. 2016; S. Liu et al. 2022; S. Liu, Johns, and Davison 2019; Sinha et al. 2020; Rothenhäusler and Bühlmann 2023). The concept of employing a singular model to address multiple tasks is highly attractive due to its capacity to facilitate the transfer of acquired knowledge from one task to another. The significance" 2401.00997v1,"Φ index: A standardized scale-independent citation indicator Manolis Antonoyiannakis American Physical Society, 1 Physics Ellipse, College Park, MD 20740 Abstract The sensitivity of Impact Factors (IFs) to journal size causes systematic bias in IF rankings, in a process akin to stacking the cards: A random √ “journal” of n papers can attain a range of IF values that decreases rapidly with size, as ∼ 1/ n . The Central Limit Theorem, which underlies this effect, allows us also to correct for it by standardizing citation averages for scale and subject in a geometrically intuitive manner analogous to calculating the z-score. We thus propose the Φ index, a standardized scale- and subject-independent citation average. The Φ index passes the “random sample test”, a simple check for scale and subject independence that we argue ought to be used for every citation indicator. We present Φ index rankings for 12,173 journals using data from the 2020 Journal Citation Reports. We show how scale standardization alone affects rankings, then we demonstrate the additional effect of subject standardization for monodisciplinary journals, and we discuss how to treat multidisciplinary journals. Φ index rankings offer a clear improvement over IF rankings. And because the Φ index methodology is general, it can also be applied to compare individual researchers, universities, or countries. Keywords: Science of Science, Impact Factor, Citation Distributions, Bibliostatistics, Φ index 1. Why a scale-independent citation indicator? 1.1. Impact Factors are scale-dependent Every year at the end of June, when the Journal Impact Factors are announced by Clarivate Analytics, a familiar pattern occurs (Antonoyiannakis, 2018): (a) The high-Impact-Factor ranks are always populated by small journals that typically publish no more than a few hundred papers per discipline per year. For example, all the top 50 IF ranks—and all but 13 of the top 51–250 ranks—of the 2020 Journal Citation Reports (JCR) are filled by journals that publish fewer than 1000 papers/year. Of the 13 slots in the ranks 51–250 that are not occupied by small journals, we find 12 mid-sized journals (between 1000-5000 papers/year), and only one large journal (> 5000 papers/year), in the 196 th rank. (b) Small journals also occupy the low-Impact-Factor ranks—for example, all but one of the bottom 1000 ranks in the 2020 JCR, the one exception being a midsized journal. (c) Large journals that publish more than 5000 papers/year have modest Impact Factors that are neither very small nor very large, and tend to occupy unremarkable positions in the ranks—for example, there are 10 large journals with IF ranging from 2.5–14 and rank Email address: manolis@aps.org () URL: www.bibliostatistics.org () Preprint submitted to arXiv January 3, 2024" 2401.01003v1,"Rink-Agnostic Hockey Rink Registration Jia Cheng Shang University of Waterloo Waterloo, Ontario, Canada Yuhao Chen University of Waterloo Waterloo, Ontario, Canada Mohammad Javad Shafiee University of Waterloo Waterloo, Ontario, Canada jcshang@uwaterloo.ca yuhao.chen1@uwaterloo.ca mjshafiee@uwaterloo.ca David A. Clausi University of Waterloo Waterloo, Ontario, Canada dclausi@uwaterloo.ca Abstract [4]. This means that each rink is the same size, with the same positions for rink features such as faceoff circles, blue lines, and goal lines. However, non-NHL rinks also exist. For example, many European rinks follow the International Ice Hockey Federation (IIHF)/Olympic hockey rink format, which is wider than the NHL standard [5]. This standardization is not as strict, resulting in varying rink sizes and feature location changes in different rinks. For example, some arenas in Finland have sizes that fall between IIHF and NHL sizes [6]. Also, minor leagues and recreational rinks may not follow standards as strictly, resulting in more differences. Examples of different rinks can be seen in Figure 2. In these situations, rink registration systems trained on NHL data do not perform well, often resulting in incorrect warps in our tests. They would need new ground truth homography data on these new rinks in order to function correctly, which is a costly and time-consuming task. Furthermore, different rink setups and sizes would need different trained models. Thus, existing models lack generalizability for rink setups, and this is difficult to resolve without a large quantity of data from a variety of rinks. We propose a novel pipeline with three main modules (models) to resolve the aforementioned issues. The first model performs semantic segmentation on the input image to produce a segmentation map. The following two models estimate and refine a homography estimation based on the segmentation map and the corresponding rink template. To address the lack of data for non-NHL rinks, we implement domain adaptation techniques, use improved augmentations, and use synthetic data to simulate different possible rinks. To the best of our knowledge, this pipeline is the first system designed for sports rink registration that is able to work on a variety of rink types, making it rink-agnostic. It Hockey rink registration is a useful tool for aiding and automating sports analysis. When combined with player tracking, it can provide location information of players on the rink by estimating a homography matrix that can warp broadcast video frames onto an overhead template of the rink, or vice versa. However, most existing techniques require accurate ground truth information, which can take many hours to annotate, and only work on the trained rink types. In this paper, we propose a generalized rink registration pipeline that, once trained, can be applied to both seen and unseen rink types with only an overhead rink template and the video frame as inputs. Our pipeline uses domain adaptation techniques, semi-supervised learning, and synthetic data during training to achieve this ability and overcome the lack of non-NHL training data. The proposed method is evaluated on both NHL (source) and non-NHL (target) rink data and the results demonstrate that our approach can generalize to non-NHL rinks, while maintaining competitive performance on NHL rinks. 1. Introduction Rink registration plays a crucial role in automatic hockey game analysis. Rink registration is the process of mapping video frame pixels onto an overhead view of the rink template in order to determine the locations of everything on the ice. This location information of players is necessary for many types of further hockey analysis, such as interactions between players and determining better scoring opportunities. An example of how rink registration works can be seen in Figure 1. Most existing rink registration systems focus on NHL rinks, which have a strict standardization system [1] [2] [3] 1" 2401.01004v1,"PREDICTING THE ACTIVITY OF CHEMICAL COMPOUNDS BASED ON MACHINE LEARNING APPROACHES Do Hoang Tu 1 , Tran Van Lang 2* , Pham Cong Xuyen 1 , Le Mau Long 1,3, 1 Lac Hong University, Vietnam 2 HCMC University of Foreign Languages - Information Technology, Vietnam 3 Nguyen Tat Thanh University, Vietnam dhtus.vn@gmail.com, langtv@huflit.edu.vn, pcxuyen@lhu.edu.vn, lmaulong@gmail.com ABSTRACT — Exploring methods and techniques of machine learning (ML) to address specific challenges in various fields is essential. In this work, we tackle a problem in the domain of Cheminformatics; that is, providing a suitable solution to aid in predicting the activity of a chemical compound to the best extent possible. To address the problem at hand, this study conducts experiments on 100 different combinations of existing techniques. These solutions are then selected based on a set of criteria that includes the G- means, F1-score, and AUC metrics. The results have been tested on a dataset of about 10,000 chemical compounds from PubChem that have been classified according to their activity. KEYWORDS — Cheminformatics, Data imbalance, Loss function, GAN model, Ensemble learning I. INTRODUCTION In datasets used in biological experiments for measuring the activity of various compounds against different biological targets, often used in screening, there is usually a significant imbalance between active and inactive compounds, with the number of inactive data points being much larger. Therefore, training requires the use of suitable machine learning models. Additionally, preprocessing before using machine learning methods for training is also a crucial issue. The following issues are approached to address the problem of predicting the activity of chemical compounds using chemistry-related datasets: • Investigating the dependency of attributes or features in the dataset to potentially reduce the number of features. This can be done using methods such as ANOVA F-test to assess the dependency of each feature on the target variable or by using correlation coefficients. • Data normalization to mitigate the variance of observations (dataset) within the same feature. • Handling data imbalance using resampling techniques such as oversampling or undersampling. • Combining grid search, cross-validation, and Bayesian optimization techniques to search for hyperparameters, including sensitive parameters like learning rate, epochs, batch size, and insensitive parameters to find suitable hyperparameters for the model. II. RELATED WORKS Predicting the activity of chemical compounds is a crucial area in pharmacology and chemoinformatics research. Several noteworthy research works in this field are as follows. The paper ""A Deep Learning Approach to Antibiotic Discovery"" [1] explores the use of deep learning to predict the antibiotic activity of compounds, aiding in identifying compounds with antibacterial properties. The study experimented with over 107 million molecules from the ZINC15 database. The results identified eight antibacterial compounds with distinct structures from known antibiotics. This research highlights the role of deep learning methods in expanding the arsenal of antibiotics by discovering structurally different antibacterial molecules. It represents a significant breakthrough in antibiotic discovery, potentially aiding in finding new compounds to combat antibiotic-resistant bacteria. The paper ""Predicting Antitumor Activity of Peptides by Consensus of Regression Models Trained on a Small Data Sample"" [2] focuses on solving regression problems with a small dataset of only 429 compounds. The study employs various methods such as linear regression, polynomial regression, Gaussian kernel regression, neural networks, k-nearest neighbors (kNN), and support vector machines (SVM) to address overfitting. It develops a method to predict the anti-tumor activity of peptides using a consensus of regression models trained on a small dataset. This approach demonstrates higher accuracy compared to previous methods, even with limited data. It can be used to develop new anti-cancer drugs and streamline the screening of active peptides, saving research time and costs. To handle overfitting issues in the training process and improve model performance, the work ""Large-scale evaluation of k-fold cross-validation ensembles for uncertainty estimation"" [3] was published in the Journal of Cheminformatics in 2023. The paper ""Chemprop: A Machine Learning Package for Chemical Property Prediction"" [4] introduces a new software package called Chemprop. This software can be used to build and train machine learning models to predict chemical properties of compounds. Chemprop employs a novel artificial neural network architecture called Directed Message-Passing Neural Network (D-MPNN) and has been proven effective in predicting chemical properties of compounds. The paper evaluated Chemprop's effectiveness on a dataset comprising over 100,000 compounds, showing its ability to predict chemical properties with higher accuracy compared to other methods. * Corresponding Author" 2401.01011v1,"Fixing Your Own Smells: Adding a Mistake-Based Familiarisation Step When Teaching Code Refactoring Ivan Tan Christopher M. Poskitt Singapore Management University Singapore ivantan@smu.edu.sg Singapore Management University Singapore cposkitt@smu.edu.sg ABSTRACT 1 Programming problems can be solved in a multitude of functionally correct ways, but the quality of these solutions (e.g. readability, maintainability) can vary immensely. When code quality is poor, symptoms emerge in the form of ‘code smells’, which are specific negative characteristics (e.g. duplicate code) that can be resolved by applying refactoring patterns. Many undergraduate computing curricula train students on this software engineering practice, often doing so via exercises on unfamiliar instructor-provided code. Our observation, however, is that this makes it harder for novices to internalise refactoring as part of their own development practices. In this paper, we propose a new approach to teaching refactoring, in which students must first complete a programming exercise constrained to ensure they will produce a code smell. This simple intervention is based on the idea that learning refactoring is easier if students are familiar with the code (having built it), that it brings refactoring closer to their regular development practice, and that it presents a powerful opportunity to learn from a ‘mistake’. We designed and conducted a study with 35 novice undergraduates in which they completed various refactoring exercises alternately taught using a traditional and our ‘mistake-based’ approach, finding that students were significantly more effective and confident at completing exercises using the latter. Given any reasonably complex programming problem, there will be a multitude of functionally correct implementations that solve it. Two solutions that always generate the intended outputs, however, are not always equally good. Students are exposed to this fact early when they compare the performance of alternative solutions using recursion vs. iteration, or quicksort vs. bogosort [13]. Runtime performance, however, is not the only way that two solutions can differ: their code quality can vary immensely too. ‘Code quality’ encompasses non-functional structural properties that arise from good engineering practices, e.g. readability and maintainability [7, 26]. In particular, a high-quality codebase is said to exhibit high cohesion and low coupling [20]: functionally related elements are grouped together in modules, and those modules are sufficiently independent such that implementation changes in one should not cause another to inexplicably break. When these principles are violated, concrete symptoms can emerge in the form of code smells [28], which are characteristics (e.g. the presence of duplicate code) that may indicate deeper problems. In order to remove smells and improve code quality, software engineers apply refactoring patterns that produce functionally equivalent but ‘odourless’ code [10]. In undergraduate computing curricula, refactoring is typically introduced in software engineering modules taken after learning the fundamentals of programming. A traditional delivery of the topic might teach a few examples of code smells, some corresponding refactoring patterns, and then challenge the students to apply them to some functionally correct (but smelly) instructor-provided code. These exercises can be facilitated in a classroom or as part of an interactive online tutoring system [19]. While this mode of delivery has many advantages—the provided code is already working and simply needs refactoring—our own experiences have suggested that using instructor-provided code can make it harder for novices to internalise the concept into their own development practices. This is because refactoring is introduced as a standalone exercise on someone else’s code, rather than introducing it as a regular activity to be undertaken in any project they are developing. In this paper, we propose a new approach to teaching code refactoring that embeds the concept as part of a multi-step exercise. Students are first tasked to complete a programming exercise that is designed to ensure they will unwittingly produce smelly (but functionally correct) code. The goal of this step is not to ‘bait’ students, but to ensure that they are familiar with the code to be refactored. Following this, they are taught to identify the smell that is present, and how to refactor it towards an odourless solution. This simple intervention is based on three key ideas: (1) that learning refactoring is simpler if students are already familiar with the targeted code, having written it themselves; (2) that the approach CCS CONCEPTS • Social and professional topics → Computing education; • Software and its engineering → Maintaining software. KEYWORDS Refactoring, code smells, code quality, software maintenance, software engineering, mistake-based learning, undergraduate course ACM Reference Format: Ivan Tan and Christopher M. Poskitt. 2024. Fixing Your Own Smells: Adding a Mistake-Based Familiarisation Step When Teaching Code Refactoring. In Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1 (SIGCSE 2024), March 20–23, 2024, Portland, OR, USA. ACM, New York, NY, USA, 7 pages. https://doi.org/10.1145/3626252.3630856 This work is licensed under a Creative Commons Attribution International 4.0 License. SIGCSE 2024, March 20–23, 2024, Portland, OR, USA © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0423-9/24/03. https://doi.org/10.1145/3626252.3630856 INTRODUCTION" 2401.01035v1,"Online Continual Domain Adaptation for Semantic Image Segmentation Using Internal Representations Serban Stan and Mohammad Rostami University of Southern California, Los Angeles, CA, USA Correspondence*: Mohammad Rostami rostamim@usc.edu ABSTRACT Semantic segmentation models trained on annotated data fail to generalize well when the input data distribution changes over extended time period, leading to requiring re-training to maintain performance. Classic Unsupervised domain adaptation (UDA) attempts to address a similar problem when there is target domain with no annotated data points through transferring knowledge from a source domain with annotated data. We develop an online UDA algorithm for semantic segmentation of images that improves model generalization on unannotated domains in scenarios where source data access is restricted during adaptation. We perform model adaptation is by minimizing the distributional distance between the source latent features and the target features in a shared embedding space. Our solution promotes a shared domain-agnostic latent feature space between the two domains, which allows for classifier generalization on the target dataset. To alleviate the need of access to source samples during adaptation, we approximate the source latent feature distribution via an appropriate surrogate distribution, in this case a Gassian mixture model (GMM). We evaluate our approach on well established semantic segmentation datasets and demonstrate it compares favorably against state-of-the-art (SOTA) UDA semantic segmentation methods. 1 1 INTRODUCTION Recent progress in deep learning has led to developing semantic segmentation algorithms that are being adopted in many real world tasks. Autonomous driving Zhang et al. (2016); Feng et al. (2020), object tracking Kalake et al. (2021) or aerial scene parsing Sun et al. (2021) are just a few examples of these applications. Deep neural networks (DNNs) have proven indispensable for reaching above human performance in semantic segmentation tasks, given the ability of large networks to approximate complex decision functions He et al. (2015). Training such networks however requires access to large continuously annotated datasets. Given that in semantic segmentation each image pixel requires a label, generating 1 Partial results of this work were presented in the AAAI Conference Stan and Rostami (2021b). 1" 2401.01053v3,"Cheetah : Natural Language Generation for 517 African Languages Ife Adebara 1,⋆ AbdelRahim Elmadany 1,⋆ Muhammad Abdul-Mageed 1,2 1 Deep Learning & Natural Language Processing Group, The University of British Columbia 2 Department of Natural Language Processing & Department of Machine Learning, MBZUAI {ife.adebara@,a.elmadany@,muhammad.mageed@}ubc.ca Abstract Low-resource African languages pose unique challenges for natural language processing (NLP) tasks, including natural language generation (NLG). In this paper, we develop Cheetah, a massively multilingual NLG language model for African languages. Cheetah supports 517 African languages and language varieties, allowing us to address the scarcity of NLG resources and provide a solution to foster linguistic diversity. We demonstrate the effectiveness of Cheetah through comprehensive evaluations across six generation downstream tasks. In five of the six tasks, Cheetah significantly outperforms other models, showcasing its remarkable performance for generating coherent and contextually appropriate text in a wide range of African languages. We additionally conduct a detailed human evaluation to delve deeper into the linguistic capabilities of Cheetah. The introduction of Cheetah has far-reaching benefits for linguistic diversity. By leveraging pretrained models and adapting them to specific languages, our approach facilitates the development of practical NLG applications for African communities. The findings of this study contribute to advancing NLP research in low-resource settings, enabling greater accessibility and inclusion for African languages in a rapidly expanding digital landscape. We will publicly release our models for research. 1 1 Introduction The linguistic diversity present in African languages poses unique challenges for NLG systems. With over 2, 000 languages spoken across the African continent (Eberhard et al., 2021), the need for effective NLG solutions that can accommodate this rich linguistic ecosystem cannot be 1 https://github.com/UBC-NLP/Cheetah ⋆ Authors contributed equally. Figure 1: Cheetah is trained on 517 African languages and language varieties across 14 language families. The languages are domiciled in 50 of 54 African countries and are written in six different scripts. over-emphasized. This is especially important because traditional NLG approaches have primarily focused on high-resource languages, such as English and French due to the availability of large-scale datasets and resources. Consequently, low-resource languages, including numerous African languages, have been marginalized in NLG research and development. Developing robust NLG systems for the diverse needs of African communities is challenging due to the scarcity of extensive language datasets, limited linguistic research, and variations across these languages. To address these challenges, recent advancements in language modeling and transfer learning techniques have shown promise in supporting NLG in low-resource languages. Pretrained language models, such as GPT-3 (Radford et al., 2018, 2019; Brown et al., 2020), mT5 (Xue et al., 2021), and mT0 (Muennighoff et al., 2022), have demonstrated remarkable capabilities in understanding and generating human-like text. These models capture the statistical regularities" 2401.01054v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Elastic Multi-Gradient Descent for Parallel Continual Learning Abstract—The goal of Continual Learning (CL) is to continuously learn from new data streams and accomplish the corresponding tasks. Previously studied CL assumes that data are given in sequence nose-to-tail for different tasks, thus indeed belonging to Serial Continual Learning (SCL). This paper studies the novel paradigm of Parallel Continual Learning (PCL) in dynamic multi-task scenarios, where a diverse set of tasks is encountered at different time points. PCL presents challenges due to the training of an unspecified number of tasks with varying learning progress, leading to the difficulty of guaranteeing effective model updates for all encountered tasks. In our previous conference work, we focused on measuring and reducing the discrepancy among gradients in a multi-objective optimization problem, which, however, may still contain negative transfers in every model update. To address this issue, in the dynamic multi-objective optimization problem, we introduce task-specific elastic factors to adjust the descent direction towards the Pareto front. The proposed method, called Elastic Multi-Gradient Descent (EMGD), ensures that each update follows an appropriate Pareto descent direction, minimizing any negative impact on previously learned tasks. To balance the training between old and new tasks, we also propose a memory editing mechanism guided by the gradient computed using EMGD. This editing process updates the stored data points, reducing interference in the Pareto descent direction from previous tasks. Experiments on public datasets validate the effectiveness of our EMGD in the PCL setting. Index Terms—parallel continual learning, catastrophic forgetting, training conflict, multi-objective optimization, Pareto optimum. Data Stream for task 1 Data Stream for task 2 ··· Fan Lyu ∗ , Member, IEEE, Wei Feng ∗ , Member, IEEE, Yuepan Li, Qing Sun, Fanhua Shang, Member, IEEE, Liang Wan, Member, IEEE, Liang Wang, Fellow, IEEE Data Stream for task T Task Conflict (a) Multi-Task Learning Catastrophic Forgetting Data Stream for task 1 Data Stream for task 2 (b) Serial Continual Learning Catastrophic Forgetting Data Stream for task 1 Catastrophic Forgetting Data Stream for task 2 Data Stream for task 3 Task Conflict … (c) Parallel Continual Learning Fig. 1. Comparisons of Multi-Task Learning (MTL), Serial Continual Learning (SCL) and Parallel Continual Learning (PCL). (a) MTL relies on a fixed number of different tasks without adaptive incremental learning for new tasks. (b)SCL learns from sequential multiple tasks, where new tasks have to wait for the completion of previous training. (c) PCL enables training of multiple tasks based on their access time, allowing new tasks to be incorporated immediately. I. I NTRODUCTION OW to learn a single model for multiple tasks from are trained in parallel at the same time. The challenge of multiple data sources has been a long-standing research MTL is the competition between tasks, i.e., task conflict. To topic [53], [39], [9], with applications in various fields, such address the task conflict, traditional MTL solutions can be as recommendation systems [85] and machine translation [81]. mainly grouped into feature-based [55], [74] and parameter- Two major paradigms (i.e., Multi-Task Learning (MTL) and based [72], [10], [36] approaches. In recent years, some studies Continual Learning (CL)) have emerged for learning a unified focus on reweighting multi-task training for task balancing, model, and they differ in terms of their approach to data access. which can be categorized into three kinds, including learningbased methods [19], [45], solving-based methods [66], and Fig. 1(a) and (b) provide an overview of MTL and CL. MTL [76], [57], [31] receives a fixed number of data calculating-based methods [46], [20], [79], [33], [42]. Different from MTL, CL [37], [40], [50] aims to continuously pipes (from one to many) for different tasks, where all tasks learn new knowledge from a sequence of tasks with non- F. Lyu and L. Wang is with the Center for Research on Intelligent Perception overlapping data streams over a lifelong time. Because the and Computing (CRIPAC) Institute of Automation, Chinese Academy of Sciences (CASIA), Beijing, 100190 China. Contacts: fan.lyu@cripac.ia.ac.cn, data of each task comes in sequence, the challenge of CL wangliang@nlpr.ia.ac.cn is catastrophic forgetting of old tasks or finished tasks. The W. Feng, Y. Li, Q. Sun, F. Shang, L. Wan are with the College of existing CL methods are grouped into three types[22], i.e., Intelligence and Computing, Tianjin University, Tianjin, 300350 China. regularization-based methods [37], [15], [24], [80], [1], [28], Contacts: ({yuepanli, sssunqing, fhshang, lwan}@tju.edu.cn, wfeng@ieee.org) *Equal Contribution. [27], architecture-based methods [54], [77], [65], [64]. and This study was done when F. Lyu was working for his PhD in Tianjin rehearsal-based methods [50], [17], [34], [6], [68], [58], University. [52]. Specifically, rehearsal has been proven effective against The corresponding author is Wei Feng. Manuscript received ** **, 20**; revised August **, **. forgetting, which stores a small sample from old tasks and H" 2401.01063v1,"Trade-off relations of quantum resource theory in Heisenberg models Asad Ali 1 , 1, ∗ Saif Al-Kuwari , 1, † and Saeed Haddadi 2, ‡ Qatar Centre for Quantum Computing (QC2), College of Science and Engineering, Hamad Bin Khalifa University, Qatar Foundation, Doha, Qatar 2 Faculty of Physics, Semnan University, P.O. Box 35195-363, Semnan, Iran Studying the relations between entanglement and coherence is essential in many quantum information applications. For this, we consider the concurrence, intrinsic concurrence and first-order coherence, and evaluate the proposed trade-off relations between them. In particular, we study the temporal evolution of a general two-qubit XYZ Heisenberg model with asymmetric spin-orbit interaction under decoherence and analyze the trade-off relations of quantum resource theory. For XYZ Heisenberg model, we confirm that the trade-off relation between intrinsic concurrence and first-order coherence holds. Furthermore, we show that the lower bound of intrinsic concurrence is universally valid, but the upper bound is generally not. These relations in Heisenberg models can provide a way to explore how quantum resources are distributed in spins, which may inspire future applications in quantum information processing. Keywords: Trade-off relations, First-order coherence, Intrinsic concurrence, Heisenberg models I. INTRODUCTION In quantum resource theory, entanglement and coherence are essential resources to exploit the properties of quantum systems. Entanglement measures non-classical correlations between subsystems, while coherence represents the superposition of systems as a whole. For multipartite systems, quantum coherence is operationally equivalent to entanglement [1]. Therefore, it is natural to seek a functional relationship between these two concepts. For pure two-qubit systems, a complementary relationship exists between first-order coherence (FOC) and concurrence (C) [2–4]. However, this relationship does not hold for mixed states. To address this, researchers in the same work [2] have proposed a new quantity, intrinsic concurrence (IC), which exhibits a trade-off with FOC in two-qubit mixed states. Although IC is not generally an entanglement monotone, it becomes equivalent to concurrence for two-qubit pure states. Additionally, the authors in [5] have tried to relate IC and concurrence through an inequality relation without providing a rigorous mathematical proof. They claimed that this is true for any arbitrary two-qubit quantum system. Spin chains have gained increasing attention within various theoretical and experimental quantum computing platforms, mainly due to their integrability and scalability [6–11]. In fact, spin chains have become valuable tools for realizing quantum coherence and correlations, particularly in the context of Heisenberg models [12–35]. Owing to the various configurations of spin correlation, spin chain models have significant amounts of quantum resources in entanglement and coherence. This has led to their use in quantum computers and quantum net- ∗ asal68826@hbku.edu.qa † smalkuwari@hbku.edu.qa ‡ haddadi@semnan.ac.ir works [7, 36–41]. The two-qubit Heisenberg XYZ model is an example of the smallest yet most general spin chain, which has recently motivated the research community to rapidly adopt the Heisenberg XYZ model [12–35]. We, too, are motivated to consider the dissipative two-qubit Heisenberg XYZ under Dzyaloshinsky-Moriya (DM) interaction [42–44] and to study the trade-off relations for this model. Furthermore, we test whether the proposed inequality relation holds for this system and analyze the trade-off relation to gain insights into the collective behavior of entanglement and coherence over time for varying system parameters such as purity of initially established state, strength of DM interaction, and damping parameter. The contribution of this paper is twofold. First, we show that the trade-off relation between IC and FOC holds tightly for the Heisenberg XYZ model. Second, although the lower bound of IC is universally valid, we show that the upper bound is generally not. The rest of this article is organized as follows: in Sect. II, we briefly introduce C, FOC, and IC. We also discuss the trade-off relations between FOC and IC, and the restricted inequality relation between IC and C. We use the Heisenberg XYZ model to analyze the trade-off relations between C and IC in Sec. III. In Sec. IV, we present our results and findings, and finally conclude the paper in Sec. V. II. PRELIMINARIES In this section, we first provide the definitions of IC, C, and FOC. Then, we discuss the trade-off relation between IC and FOC. Finally, we present the inequality relation between IC and C. For a bipartite system, C gives a measure of entanglement. For two-qubit pure states |ψ⟩, it is defined as q q C(|ψ⟩) = 2{1 − tr[(ρ A ) 2 ]} = 2{1 − tr[(ρ B ) 2 ]}, (1)" 2401.01068v1,"Discovering Significant Topics from Legal Decisions with Selective Inference JERROLD SOH TSIN HOWE ∗ January 3, 2024 Abstract We propose and evaluate an automated pipeline for discovering significant topics from legal decision texts by passing features synthesized with topic models through penalised regressions and post-selection significance tests. The method identifies case topics significantly correlated with outcomes, topic-word distributions which can be manually-interpreted to gain insights about significant topics, and case-topic weights which can be used to identify representative cases for each topic. We demonstrate the method on a new dataset of domain name disputes and a canonical dataset of European Court of Human Rights violation cases. Topic models based on latent semantic analysis as well as language model embeddings are evaluated. We show that topics derived by the pipeline are consistent with legal doctrines in both areas and can be useful in other related legal analysis tasks. Keywords: Legal Language Processing, Topic Models, Text-as-Data, Domain Name Disputes, European Court of Human Rights Yong Pung How School of Law, Singapore Management University (jerroldsoh@smu.edu.sg, https://orcid.org/0000-0003-0270-5015). This is an accepted manuscript of work forthcoming in PhilTrans A; please cite the publisher’s version only. I thank Georgios Georgiou, James Greiner, Alma Cohen, Lucian Bebchuk, William Hubbard, Michael Livermore, and Kevin Ashley, and participants of the Complexity in Law & Governance Works in Progress Workshop for constructive comments, including on very early versions of this work. All errors are mine. ∗ i" 2401.01071v1,"Cartesian closed and stable subconstructs of Q-Ord Hongliang Lai, Qingzhu Luo ∗ School of Mathematics, Sichuan University, Chengdu 610064, China Abstract It is shown that the category of fuzzy ordered sets and order-preserving maps valued in the quantale based on a continuous triangular norm on the unit interval contains a largest Cartesian closed and stable subconstruct which contains all crisp ordered sets. Keywords: category, quantale, fuzzy ordered set, continuous triangular norm, stable subconstruct, Cartesian closed category. 1. Introduction Let Q = (𝑄, ⊗, 𝑘) be a commutative and unital quantale. It is often regarded as the truth value table in the fuzzy set theory. Reflexive and transitive Q-valued relations are called fuzzy orders[3], or Q-orders, which include crisp orders, generalized metric spaces[14] and fuzzy preorders introduced by Zadeh in 1973[24] as special examples. Since a quantale Q has a “quantitative” logic flavor [14], Q-orders are treated as quantitative valued orders and play the key role in the quatitative domain theory[7, 8, 9, 21, 22]. Cartesian closedness is a fundamental property in category theory[2, 19], and it is of particular interest in domain theory[10], as explained: “One of the most noteworthy features of DCPO is that it is Cartesian closed. Not only is this fundamental for the application of continuous lattices and domains to logic and computing, but it also provides evidence of the mathematical naturalness of the notion.” Therefore, there have been also continuous efforts to search for Cartesian closed categories in quantitative domains. In fact, some subcategories of Q-Ord consisting of Q-ordered sets and Q- order preserving maps are shown to be Cartesian closed[11, 15, 16, 17, 23]. However, it is usually more difficult to find out Cartesian closed categories in quatitative domain thoery because, unlike its classical counterpart, the category Q-Ord may not be Cartesian closed in general [5, 6, 13], unless the quantale Q is a frame. Observe that the category Q-Ord contains a Cartesian closed and stable subcategory Ord, consisting of all crisp ordered sets and order-preserving maps. Furthermore, in a particular case, let L = ( [0, 1], ⊗, 1), where ⊗ is the Lukasiewicz triangular norm, and L 3 = ({0, 0.5, 1}, ⊗, 1) be the subquantale of L, then the category L-Ord has another Cartesian closed and stable subcategory L 3 -Ord. Obviously, one has a chain Ord ⊆ L 3 -Ord ⊆ L-Ord. It is shown by this example that there may be non-trivial Cartesian closed and stable subcategories of Q-Ord which is larger than Ord even if the quantale Q is not a frame. Therefore, in general, one can ask a question: Are there always non-trivial Cartesian closed and stable subcategories of Q-Ord containing Ord? In this paper, it is shown that, when Q = ( [0, 1], ⊗, 1) with ⊗ being a continuous triangular norm on the unit interval [0, 1], a subcategory A of Q-Ord containing Ord is Cartesian closed and stable if and only if A = K-Ord, where K = (𝐾, ⊗, 1) is a subquantale of ( [0, 1], ⊗, 1) such that 𝐾 is a closed set ∗ Corresponding author. Email addresses: hllai@scu.edu.cn (Hongliang Lai), luoqingzhu@foxmail.com (Qingzhu Luo) Preprint submitted to Elsevier January 3, 2024" 2401.01132v1,"Hereditary completeness of Exponential systems {e λ n t } ∞ n=1 in their closed span in L 2 (a, b) and Spectral Synthesis Elias Zikkos ∗ and Gajath Gunatillake † January 3, 2024 Abstract Suppose that {λ n } ∞ of distinct positive real numbers satisfying the conditions n=1 is P a ∞ sequence −1 inf{λ n+1 − λ n } > 0, and < ∞. We prove that the exponential system {e λ n t } ∞ n=1 is n=1 λ n 2 hereditarily complete in the closure of the subspace spanned by {e λ n t } ∞ n=1 in the space L (a, b). We also give an example of a class of compact non-normal operators defined on this closure which admit spectral synthesis. Mathematics Subject Classification: 30B60, 30B50, 47A10, 46C05. Keywords: Müntz-Szász theorem, Exponential Systems, Closed Span, Hereditary completeness, Spectral Synthesis, Compact Operators. 1 Introduction Let (a, b) be a bounded interval on the real line and let L 2 (a, b) be the space of square integrable complex valued functions on (a, b), equipped with the norm ||f || L 2 (a,b) := Z b a 2 |f (x)| dx  12 , and endowed with the inner product hf, gi := Z b f (x)g(x) dx. a Let Λ denote the sequence of distinct positive real numbers {λ n } ∞ n=1 . Assume that ∞ X 1 n=1 λ n < ∞, and λ n+1 − λ n ≥ c, (1.1) for some positive constant c and all n. Consider the associated exponential system {e λ n t } n∈N of Λ. We will denote this system by E Λ . Let H Λ (a, b) denote the closed span of E Λ in L 2 (a, b). P −1 Since the series λ n converges, it follows from the Müntz-Szász theorem that E Λ is not complete in L 2 (a, b), that is, H Λ (a, b) is a proper subspace of L 2 (a, b) (see [7, Theorem 6.1], [4, Theorem 4.2.6], and [6]). Moreover, E Λ is a minimal system, that is, each function e λ n t does not belong to the closed span of the remaining vectors of E Λ in L 2 (a, b) (see [7, relation (1.9)]). ∗ Department of Mathematics, Khalifa University, Abu Dhabi, United Arab Emirates, email address: elias.zikkos@ku.ac.ae and eliaszikkos@yahoo.com † Department of Mathematics and Statistics, American University of Sharjah, Sharjah, United Arab Emirates, email address: mgunatillake@aus.edu 1" 2401.01133v1,"A Stochastic-MILP dispatch optimization model for Concentrated Solar Thermal under uncertainty Navid Mohammadzadeh (a,*) , Huy Truong-Ba (a) , Michael E. Cholette (a) , Theodore A. Steinberg (a) ,Giampaolo Manzolini (b) (a) School of Mechanical, Medical and Process Engineering, Queensland University of Technology, Australia (b) Department of Energy, Politecnico di Milano, Italy ( * ) Corresponding author, Mechanical, Medical and Process Engineering Department, Queensland University of Technology, 4000 Brisbane, Australia. Email address: n.mohammadzadeh@qut.edu.au Abstract Concentrated Solar Thermal (CST) offers a promising solution for large-scale solar energy utilization as Thermal Energy Storage (TES) enables electricity generation independent of daily solar fluctuations, shifting to high-priced electricity intervals. The development of dispatch planning tools is mandatory to account for uncertainties associated with solar irradiation and electricity price forecasts as well as limited storage capacity. This study proposes the Stochastic Mixed Integer Linear Program (SMILP) to maximize expected profit within a specified scenario space. The SMILP scenario space is generated by different Empirical Cumulative Distribution Function (ECDF) percentiles of the potential solar energy to accumulate in storage and the expected profit is estimated using the Sample Average Approximation (SAA) method. SMILP exhibits robust performance, however, its computational time poses a challenge. Thus, three heuristic solutions are developed which run a set of deterministic optimizations on different historical weather profiles to generate candidate dispatching plans (DPs). The candidate DP with the best average performance on all profiles is then selected. The new methods are applied to a case study for a 115 MW CST plant in South Australia. When the historical database has a limited set of historical weather profiles, the SMILP achieves 6% to 9% higher profit than the closest benchmark when the DP is applied to novel weather conditions. With a large historical weather data, the performance of SMILP and closet Heuristic becomes nearly identical due to the fact that the SMILP can only utilize a limited number of trajectories for optimization without becoming computationally infeasible. In this case, the heuristic emerges a practical alternative, since it provides similar average profit in a reasonable time (saving about 7 hours in computing time). Taken together, the results illustrate the importance of considering uncertainty in DP and indicate that straightforward heuristics on a large database are a practical method for addressing uncertainty. Keywords: Stochastic Mixed Integer Linear Program, Concentrated Solar Thermal, Dispatch Planning under Uncertainty, Sample Average Approximation" 2401.01139v1,"From transient elastic linkages to friction: a complete study of a penalized fourth order equation with delay Vuk Milišić a , Philippe Souplet b a Univ. Brest, CNRS UMR 6205 Laboratoire de Mathématiques de Bretagne Atlantique, 6, avenue Victor Le Gorgeu, 29200, Brest, France b Université Sorbonne Paris Nord, LAGA, CNRS UMR 7539, 99, avenue Jean-Baptiste Clément, 93430, Villetaneuse, France Abstract In this paper we consider a fourth order nonlinear parabolic delayed problem modelling a quasi-instantaneous turn-over of linkages in the context of cell-motility. The model depends on a small parameter ε which represents a typical time scale of the memory effect. We first prove global existence and uniqueness of solutions for ε fixed. This is achieved by combining suitable fixed-point and energy arguments and by uncovering a nonlocal in time, integral conserved quantity. After giving a complete classification of steady states in terms of elliptic functions, we next show that every solution converges to a steady state as t → ∞. When ε → 0, we then establish convergence results on finite time intervals, showing that the solution tends in a suitable sense towards the solution of a parabolic problem without delay. Moreover, we establish the convergence of energies as ε → 0, which enables us to show that, for ε small enough, the ε-dependent problem inherits part of the large time asymptotics of the limiting parabolic problem. Keywords: integral equations, memory effects, cell motility, parabolic equations, nonlinear penalized pointwise constraint, adhesion, Allen-Cahn equation, limit sets, steady states, fourth order elliptic problems. 2000 MSC: 35Q92 1. Introduction This article is a contribution to the mathematical study of adhesion forces in the context of cell motility, in continuation to the project [7, 8, 9, 10]. Cell adhesion and migration play a crucial role in many biological phenomena such as embryonic development, inflammatory responses, wound healing and tumor metastasis. The main motivation comes from the seminal papers [13, 11], where the authors built a complex and realistic model of the Lamellipodium. It is a cytoskeletal quasi-two-dimensional actin mesh, and the whole structure propels the cell on the substrate. In this setting, the authors of [13, 11] consider an axi-symmetric idealization of the network. It is represented by two families of filaments (clockwise and anti-clockwise) interacting with each other. Thanks to these hypotheses, the problem reduces to a single equation whose solution is the position z(s, t) ∈ R 2 of a single filament evolving in time t ∈ R + and with respect to a reference configuration s ∈ (0, L). Using gradient flow techniques, the authors obtain a nonlinear equation:   ′′′′  ′ ⊥  ′ A ′  ′ ′  + µ D z (z 0 ) + D t ϕz ⊥ 0 = 0 − ϕ + arccos |z | ) − (λz z  t 0 0 0  0 0  | {z } | |{z}  |{z} {z } |{z}  (1.1) stretching bending unextensibility adhesion  twisting      |∂ z | = 1, s 0 Email addresses: vuk.milisic@univ-brest.fr (Vuk Milišić), souplet@math.univ-paris13.fr (Philippe Souplet) 1" 2401.01151v1,"Identification of Secondary Resonances of Nonlinear Systems using Phase-Locked Loop Testing Tong Zhou ∗ , Gaëtan Kerschen Space Structures and Systems Laboratory, Aerospace and Mechanical Engineering Department, University of Liege, Belgium Abstract One unique feature of nonlinear dynamical systems is the existence of superharmonic and subharmonic resonances in addition to primary resonances. In this study, an effective vibration testing methodology is introduced for the experimental identification of these secondary resonances. The proposed method relies on phase-locked loop control combined with adaptive filters for online Fourier decomposition. To this end, the concept of a resonant phase lag is exploited to define the target phase lag to be followed during the experimental continuation process. The method is demonstrated using two systems featuring cubic nonlinearities, namely a numerical Duffing oscillator and a physical experiment comprising a clamped-clamped thin beam. The obtained results highlight that the control scheme can accurately characterize secondary resonances as well as track their backbone curves. A particularly salient feature of the developed algorithm is that, starting from the rest position, it facilitates an automatic and smooth dynamic state transfer toward one point of a subharmonic isolated branch, hence, inducing branch switching. Keywords: Phase-locked loop testing, Superharmonics, Subharmonics, Mode identification PACS: 1. Introduction Experimental modal analysis is the most common approach for identifying the dynamical characteristics of a mechanical system. Specifically, the objective is to determine the modal parameters, namely the vibration modes, resonance frequencies and damping ratios, from the analysis of free or forced vibrations. At the root of experimental modal analysis is the assumption of linear dynamical behavior. However, nonlinear phenomena are more and more frequently encountered during vibration testing of modern engineering structures [1]. Typical examples include commercial aircraft [2], satellites [3], turbomachinery [4] and microelectromechanical systems (MEMS) [5]. This is why there is currently a burgeoning interest in developing methodologies that can tackle nonlinear behaviors. Nonlinear systems are known for exhibiting rich and sophisticated dynamical phenomena which include the dependence of resonance frequency on motion amplitude and the resulting hardening and softening phenomena, co-existence of multiple stable vibration states and jumps between different states due to external perturbations, existence of unstable branches in the nonlinear frequency response curves (NFRCs) that are interconnected with stable portions at ∗ Corresponding author Email address: tong.zhou@uliege.be (Tong Zhou) Preprint submitted to Elsevier January 3, 2024" 2401.01152v1,"The social graph based on real data ∗ Tomasz M. Gwizda l la † and Aleksandra Piecuch Faculty of Physics and Applied Informatics, University of Lodz, Lodz, Poland Abstract In this paper, we propose a model enabling the creation of a social graph corresponding to real society. The procedure uses data describing the real social relations in the community, like marital status or number of kids. Results show the power-law behavior of the distribution of links and, typical for small worlds, the independence of the clustering coefficient on the size of the graph. 1 Introduction and Model The computational study of different social processes requires knowledge of the structure of the community studied. Among the seminal papers devoted to study of graph representations of communities we have especially to mention the Pastor-Satorras paper [10] where different properties of graphs are studied in the context of epidemic. Now, a lot of problems can be studied with the use of social graphs. We can mention here the processes which can be generally called social contagion [1]. Particularly, such topics like disease spreading [6, 5, 4], transfer of information [9], opinion formation [8, 11] or innovation emergence [12] are studied with the use of particular graphs. It is important to emphasize that speaking about social network in the context of studied problem we have take into account the real community which structure does not necessarily correspond to the structures obtained by studying, recently very popular, online networks. The technique which have recently become popular for such networks is the study of homophily effect [13, 14]. In our paper, we will present a new approach to creating a society graph, based on the real statistics describing it. The special attention is devoted to study the real social links like families, acquaintances. Due to ease of access, we use the data provided for Polish society, mainly our city - Lodz. The population is typically presented as an undirected, connected graph, where nodes correspond to individuals and edges to relations between them. ∗ Preprint of paper presented at ICCS’23, https://doi.org/10.1007/978-3-031-36027-5 1 † tomasz.gwizdalla@uni.lodz.pl 1" 2401.01217v1,"1 KCES: A Workflow Containerization Scheduling Scheme Under Cloud-Edge Collaboration Framework Chenggang Shan, Runze Gao, Qinghua Han, Zhen Yang, Jinhui Zhang, and Yuanqing Xia, Fellow, IEEE Abstract—As more IoT applications gradually move towards the cloud-edge collaborative mode, the containerized scheduling of workflows extends from the cloud to the edge. However, given the high delay of the communication network, loose coupling of structure, and resource heterogeneity between cloud and edge, workflow containerization scheduling in the cloudedge scenarios faces the difficulty of resource coordination and application collaboration management. To address these two issues, we propose a KubeEdge-Cloud-Edge-Scheduling scheme named KCES, a workflow containerization scheduling scheme for the KubeEdge cloud-edge framework. The KCES includes a cloud-edge workflow scheduling engine for KubeEdge and workflow scheduling strategies for task horizontal roaming and vertical offloading. Considering the scheduling optimization of cloud-edge workflows, this paper proposes a cloud-edge workflow scheduling model and cloud-edge node model and designs a cloud-edge workflow scheduling engine to maximize cloud-edge resource utilization under the constraint of workflow task delay. A cloud-edge resource hybrid management technology is used to design the cloud-edge resource evaluation and resource allocation algorithms to achieve cloud-edge resource collaboration. Based on the ideas of distributed functional roles and the hierarchical division of computing power, the horizontal roaming among the edges and vertical offloading strategies between the cloud and edges for workflow tasks are designed to realize the cloud-edge application collaboration. Through a customized IoT application workflow instance, experimental results show that KCES is superior to the baseline in total workflow duration, average workflow duration, and resource usage and has the capabilities of horizontal roaming and vertical offloading for workflow tasks. Index Terms—Workflow scheduling, cloud-edge collaboration, resource collaboration, application collaboration, horizontal roaming, vertical offloading. I. I NTRODUCTION W ITH the rapid development of the Internet of Thing (IoT) and artificial intelligence technology, the massive data created by vast access devices is exponential growth, putting enormous pressure on network bandwidth and servers [1]. Traditional cloud computing gradually presents problems such as poor real-time performance, insufficient bandwidth, high energy consumption, and lack of data security [2], [3]. To this end, edge computing, as a new computing C. Shan, Q. Han, and Z. Yang are with the School of Artificial Intelligence, Zaozhuang University, Zaozhuang, Shandong, 277160, China. E- mail: {uzz scg, hanqinghua123, yang zh99}@163.com R. Gao, J, Zhang, and Y. Xia are with the School of Automation, Beijing institute of technology, Beijing, 10081, China. E-mail: {runze gao, zhangjinh, xia yuanqing}@bit.edu.cn (Corresponding authors: Zhen Yang; Jinhui Zhang; Yuanqing Xia) model, provides an edge-assisted cloud way to cope with the shortcomings of cloud computing. It provides a cloud-edge collaborative distributed computing architecture closer to data sources, integrated computing, network, storage, and applications, and meets key needs of agile link, real-time business, application intelligence, and security and privacy protection in the IoT field through near-device service mode [4]. Cloud workflow scheduling is a significant means to realize the efficient execution of workflow on the cloud platform. It achieves the best resource match between workflow tasks and cloud computing resources by optimizing scheduling [5]. In the cloud-native era, container technology facilitates the gradual extension of cloud workflow scheduling from the cloud to the edge [6]–[8]. In addition to dealing with the processing of massive data of edge devices, the distributed computing architecture of cloud-edge collaboration can release the execution ability of cloud workflows to the edge [9] and meet the practical needs of workflow containerization applications in the IoT and industrial internet field. However, because of the high time delay, loose coupling structure, and resource heterogeneity of the communication network between cloud and edges, workflow containerization scheduling in cloud-edge collaborative architecture faces two challenges. This paper explains how we address these two challenges and comprehensively describes our solution. One notable challenge is the difficulty of collaborative management of cloud-edge resources. The loose coupling structure and high time latency of the cloud-edge network make the workflow containerization scheduling under the cloud-edge framework unable to obtain the cloud-edge resource utilization rate in time and delay the best time of task optimization schedule [10], [11]. Another challenge is the difficulty of application collaboration management. Cloudedge application collaboration enables cloud and edge to host workflow task containers through workflow containerization scheduling, realizes vertical offloading between cloud and edges and horizontal roaming among edges for workflow tasks, and completes workflow containerization execution under task dependency and delay constraints. However, the high time delay of the communication network between cloud and edges restricts the real-time communication of cloud-edge hosting tasks, and resource heterogeneity makes the same task depend on different container images on cloud and edge nodes, along with loose coupling structure, which affects the roaming and offloading of cloud-edge tasks and poses challenges to application collaboration management [12], [13]." 2401.01223v1,"Twinning induced by elastic anisotropy in FCC crystals Jie Huang a , Mingyu Lei a , Guangpeng Sun a , Guochun Yang a,b, * , Bin Wen a, * a State Key Laboratory of Metastable Materials Science and Technology, Yanshan University, Qinhuangdao 066004, China. b Key Laboratory for Microstructural Material Physics of Hebei Province, School of Science, Yanshan University, Qinhuangdao 066004, China. *Corresponding authors. E-mail addresses: yanggc468@nenu.edu.cn (Guochun Yang), wenbin@ysu.edu.cn (Bin Wen). Abstract Dislocation slip and deformation twin are widely regarded as two important mechanisms of active competition in the process of plastic deformation. Calculating and comparing the critical resolved shear stress (CRSS) of two deformation modes are the key to discussing the mechanical properties reflected by different mechanisms in crystals. Here, the paper proposes a model to predict the CRSS of discrete twins, resembling thin layers, using the elastic anisotropy theory and a macroscopic energy perspective. In addition, the directionality of deformation twinning is also verified. We investigated twinning in FCC crystals to illustrate the methodology, and predicted the CRSS of twinning under different variables such as temperature and strain rate, both of which were in excellent agreement with experimental and other theory results. It draws the conclusion that we can promote twinning nucleation by applying shear stress along the <112> direction to reduce the interface energy as a resistance term and increase the difference in strain energy for twinning nucleation. This conclusion provides a guiding direction for exploring and accurately predicting the conditions of twinning in FCC crystals in future. Key words: Twinning, elastic anisotropy, dislocation slip, FCC crystals, CRSS, temperature, Page 1" 2401.01245v2,"Gabor-Type Holography Solved Analytically for Complex-valued Phase Disks Jesper Glückstad a,∗ , Andreas Erik Gejl Madsen a a SDU Centre for Photonics Engineering University of Southern Denmark DK-5230 Odense M, Denmark Abstract Solving the holography equation has long been a numerical task. While effective, the numeric approach has its own set of limitations. Relying solely on numerical approaches often obscures the intricate interplay and influence of the individual terms within the equation. This not only hampers a deeper understanding of the underlying physics but also makes it challenging to predict or control specific outcomes. In this study, we address these challenges by leveraging our recently published [1] updated Fraunhofer diffraction expression. This approach allows us to derive an analytic solution for complex-valued phase disks in on-axis holography. This solution facilitates the direct computation of each term’s influence within the holographic equation, paving the way for a more profound comprehension and application of the holographic process. When compared to experimental results and the numeric Fresnel diffraction solution, our analytic approach shows impressive accuracy, considering the inherent approximations. Notably, it remains precise for Fresnel numbers that extend well beyond the traditionally accepted boundaries of the Fraunhofer regime. Keywords: Holography, Holographic reconstruction, Fourier Optics, Fraunhofer Diffraction, Fresnel Diffraction the complex conjugate. The four terms comprising the equation are RR ∗ , the directly transmitted unscattered Holography [2] has, since its invention, found uses in nureference wave, OO ∗ , the scattered object wave interfermerous areas of academia and industry, including microscopy ing with itself, thus denoted here as a “self-inteference” [3–13], light-shaping [14–22], particle trapping and manipterm, and OR ∗ and O ∗ R, real and virtual images of the ulation [23–28], cryptography [29–32], etc. original object wavefront, scaled by the reference wave, Interestingly, while holography’s foundational princicontaining both amplitude and phase information of the ples were laid by Denis Gabor, he faced the persistent object. Typically, due to the complex conjugate, the term challenge of the twin-image problem. At the time, there O ∗ R is often denoted as the “twin-image” of the object. was no analytical solution to quantify or eliminate this Now, to extract the amplitude and phase of the origtwin-image issue, leading Gabor to effectively abandon his inal object wavefront, the term OR ∗ must be isolated to on-axis holography research after exploring various optithe greatest extent. In off-axis holography, in which the cal setups. This decision stands in stark contrast to the illuminating light is split into an object beam and an ansubsequent proliferation and significance of holography in gled reference beam, thus introducing a carrier wave, the diverse fields. The ability to regain both amplitude and four terms of Equation (1) can “simply” be separated in phase information of an optical wavefront after its record- Fourier space [33–35]. However, when discussing on-axis ing by an intensity-sensitive detector is a key factor of its holography, the object illuminating light source serves as popularity. The holographic equation, which reveals this both the object and reference wave. It is conceptually diproperty of holographic image capture, can be written as vided into the two waves, but originates from the same the intensity of the superposition of two incident wavelight beam. Thus, both wavefronts propagate axially infronts - the object and reference: line, not allowing for spatial separation of the terms. The reconstruction of the object beam in on-axis holog- I = (O + R)(O + R) ∗ raphy is typically undertaken with iterative numerical meth- = RR ∗ + OO ∗ + OR ∗ + O ∗ R (1) ods, namely derivations of the well-known Gerchberg-Saxton algorithm [14, 20–22, 36, 37]. While good results can be where I is the resultant intensity, O and R are the obachieved, the algorithm is inherently non-convex, not enject and reference wavefronts, respectively, and ∗ denotes suring convergence to the global minimum. In addition, the iterative nature limits the reconstruction speed. In ∗ Corresponding author the last decade, machine learning methods [8, 13, 38–41] Email addresses: jegl@mci.sdu.dk (Jesper Glückstad), tackling the same problem of wavefront retrieval have been 1. Introduction gejl@mci.sdu.dk (Andreas Erik Gejl Madsen) Preprint submitted to Elsevier January 4, 2024" 2401.01257v1,"Profiling Programming Language Learning WILL CRICHTON and SHRIRAM KRISHNAMURTHI, Brown University, USA This paper documents a year-long experiment to “profile” the process of learning a programming language: gathering data to understand what makes a language hard to learn, and using that data to improve the learning process. We added interactive quizzes to The Rust Programming Language, the official textbook for learning Rust. Over 13 months, 62,526 readers answered questions 1,140,202 times. First, we analyze the trajectories of readers. We find that many readers drop-out of the book early when faced with difficult language concepts like Rust’s ownership types. Second, we use classical test theory and item response theory to analyze the characteristics of quiz questions. We find that better questions are more conceptual in nature, such as asking why a program does not compile vs. whether a program compiles. Third, we performed 12 interventions into the book to help readers with difficult questions. We find that on average, interventions improved quiz scores on the targeted questions by +20%. Fourth, we show that our technique can likely generalize to languages with smaller user bases by simulating our statistical inferences on small 𝑁 . These results demonstrate that quizzes are a simple and useful technique for understanding language learning at all scales. CCS Concepts: • Applied computing → E-learning; • Software and its engineering → General programming languages. Additional Key Words and Phrases: rust education, digital textbooks, item response theory 1 INTRODUCTION Teaching prospective users is an inescapable part of programming language adoption. Yet, teaching PLs is more art than science. PL learning resources are designed based on the intuitions of their authors. Feedback on these resources only comes at the macro-scale, such as whether programmers end up successfully adopting a language. This disconnect is becoming more salient as the learning curves for modern languages grow ever steeper. For instance, user surveys within the communities of OCaml [OCaml Software Foundation 2022], Haskell [Fausak 2022], Rust [The Rust Survey Team 2020], Scala [Scala Center Team 2022], Clojure [Randolph 2022], and even Go [Merrick 2023] all report that the language’s learning curve is one of the biggest problems in the language’s ecosystem. Heeding the call of Meyerovich and Rabkin [2013] to build a scientific foundation for “socio-PLT,” we set out to gather data about how people learn a new programming language, and to develop a generalizable methodology for improving PL learning resources. This paper reports on a year-long experiment to profile the process of PL learning within an online textbook. We use “profile” in the same sense as performance profiling for software — our goal was to gather fine-grained data to help identify “hot-spots” where learners are struggling. Concretely, we studied The Rust Programming Language (trpl) [Klabnik and Nichols 2022], the official textbook for learning Rust. We chose to study Rust both because the Rust community has been exceptionally open to facilitating educational research, and because many people were seeking to learn Rust in 2022-23. The central idea of the experiment is to add interactive quizzes to each chapter of trpl, a total of 221 questions. The quizzes acted as profiling probes that gathered data about individual challenges faced by learners. From September 2022 to October 2023, we gathered 1,140,202 answers from 62,526+ participants. The contribution of this paper is analyzing this data to answer four questions: Authors’ address: Will Crichton; Shriram Krishnamurthi, Department of Computer Science, Brown University, Providence, Rhode Island, 02912, USA, wcrichto@brown.edu. © 2024 Copyright held by the owner/author(s). This is the author’s version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Proceedings of the ACM on Programming Languages. Proc. ACM Program. Lang., Vol. , No. OOPSLA1, Article . Publication date: January 2024." 2401.01276v1,"Building Three-Dimensional Differentiable Manifolds Numerically II: Limitations Lee Lindblom a,b,∗ , Oliver Rinne c a Center for Astrophysics and Space Sciences, University of California at San Diego, 9500 Gilman Drive, La Jolla, CA 92093, USA b Center for Computational Mathematics, University of California at San Diego, 9500 Gilman Drive, La Jolla, CA 92093, USA c Faculty 4, HTW Berlin – University of Applied Sciences, Treskowallee 8, 10318 Berlin, Germany 1. Summary Methods were developed in Ref. [1] for constructing reference metrics (and from them differentiable structures) on three-dimensional manifolds with topologies specified by suitable triangulations. This note generalizes those methods by expanding the class of suitable triangulations, significantly increasing the number of manifolds to which these methods apply. These new results show that this expanded class of triangulations is still a small subset of all possible triangulations. This demonstrates that fundamental changes to these methods are needed to further expand the collection of manifolds on which differentiable structures can be constructed numerically. 2. Fixing the Dihedral Angles The method for constructing reference metrics in Ref. [1] begins with the construction of a flat metric in the neighborhood of each vertex of a multicube structure, which can be obtained from a triangulation of that manifold. These flat metrics are then combined using partition of unity functions to produce a global C 0 metric, and then smoothed to C 1 by a sequence of additional steps described in Ref. [1]. These flat metrics are constructed by fixing the dihedral angles of each cube edge. The simple method used in Ref. [1] fixes those dihedral angles to be 2π/K, where K is the number of cube edges that intersect along a particular edge. This choice ensures the sum of the dihedral angles around each edge is 2π, the condition needed to avoid a conical singularity there. This uniform dihedral angle condition severely limits the class of multicube structures on which it can be applied. This simple condition is replaced here with more complicated but less restrictive conditions. The basic adjustable parameters that determine these flat metrics are the dihedral angles, ψ A{αβ} , where the index A ∈ h1, ..., N cubes i labels the cubes in the multicube structure and {αβ} ∈ {−x−y}, {−x+y}, {−x−z}, {−x+z}, {+x−y}, {+x+y}, {+x−z}, {+x+z}, {−y−z}, {−y+z}, {+y−z}, {+y+ z} labels the edge formed by the intersection of the {α} and {β} ∈ {−x}, {+x}, {−y}, {+y}, {−z}, {+z} ∗ Corresponding author Email addresses: llindblom@ucsd.edu (Lee Lindblom), oliver.rinne@htw-berlin.de (Oliver Rinne) Preprint submitted to Elsevier January 3, 2024" 2401.01285v1,"Socially Responsible Computing in an Introductory Course Aakash Gautam Anagha Kulkarni Sarah Hug University of Pittsburgh Pittsburgh, PA, USA aakash@pitt.edu San Francisco State University San Francisco, CA, USA ak@sfsu.edu CERC Westminster, CO, USA hug@colorado.edu Jane Lehr Ilmi Yoon Cal Poly San Luis Obispo San Luis Obispo, CA, USA jlehr@calpoly.edu San Francisco State University San Francisco, CA, USA ilmi@sfsu.edu ABSTRACT 1 INTRODUCTION “Undergraduates need to understand the basic cultural, social, legal, and ethical issues inherent in the discipline of computing ... They should understand their individual roles in this process” argue the 1991 Report of the ACM/IEEE-CS Joint Curriculum Task Force [46]. Similar arguments to integrate ethics have been repeatedly made over the years (e.g., [6, 9–12, 23, 27, 33, 34, 36, 49, 51]). The growing awareness of computing systems’ potential to inflict harm and injustice on society has strengthened the argument for integrating ethical responsibilities in computing curricula [21, 30, 50]. Equally importantly, education researchers have long since argued for the importance of ensuring goal congruity, which posits that students need to perceive an alignment between their personal goals and their ability to fulfill those goals by participating in the field of study (called goal affordances) for them to pursue a career path in that field [17]. In computing education, a greater emphasis on agentic goals, which has an inward focus on “the self, selfefficacy, and working with things (instead of people)” in contrast to communal goals, which has an outward focus on “working with, or in service of others” has been found to be a barrier in enhancing diversity and inclusion in computing [2, 3, 44]. Evidence from early CS courses that promoted affordances to meet communal goal have been shown to be successful in increasing participation of women, African American, and Hispanic students [3, 13, 38]. Despite repeated calls and well-established benefits, we continue CCS CONCEPTS to struggle in incorporating ethics in CS. Scholars have highlighted • Social and professional topics → Computing education. persistence challenges such as lack of faculty expertise [20, 42], faculty resistance [33, 42], time and resource constraints [5, 20], KEYWORDS and the perception that ethics is outside the scope of computing SRC, responsibility, social impact, ethics, power, critical pedagogy [11, 43]. Efforts to integrate ethics into CS courses are ongoing, with various models and solutions being proposed, ranging from ACM Reference Format: a stand-alone course to incorporating it across CS courses [11, 16, Aakash Gautam, Anagha Kulkarni, Sarah Hug, Jane Lehr, and Ilmi Yoon. 21, 26, 29]. While we have yet to fully integrate ethics in CS, we 2024. Socially Responsible Computing in an Introductory Course. In Proalso know that ethics integration is not enough. We need praxisceedings of the 55th ACM Technical Symposium on Computer Science Educaoriented computing courses that build upon ethical considerations tion V. 1 (SIGCSE 2024), March 20–23, 2024, Portland, OR, USA. ACM, New toward encouraging students to take responsibility by understand- York, NY, USA, 8 pages. https://doi.org/10.1145/3626252.3630926 ing the power and social impact of technology — that is, engaging with socially responsible computing. Socially responsible computing goes beyond ethical consid- This work is licensed under a Creative Commons Attribution International 4.0 License. erations. It acknowledges that computing enacts a form of power, thus computing professionals need to develop a critical understand- SIGCSE 2024, March 20–23, 2024, Portland, OR, USA ing of how technology can perpetuate or challenge societal inequities © 2024 Copyright held by the owner/author(s). [11, 29, 40]. The goal is to support computing students, who are ACM ISBN 979-8-4007-0423-9/24/03. Given the potential for technology to inflict harm and injustice on society, it is imperative that we cultivate a sense of social responsibility among our students as they progress through the Computer Science (CS) curriculum. Our students need to be able to examine the social complexities in which technology development and use are situated. Also, aligning students’ personal goals and their ability to achieve them in their field of study is important for promoting motivation and a sense of belonging. Promoting communal goals while learning computing can help broaden participation, particularly among groups who have been historically marginalized in computing. Keeping these considerations in mind, we piloted an introductory Java programming course in which activities engaging students in ethical and socially responsible considerations were integrated across modules. Rather than adding social on top of the technical content, our curricular approach seeks to weave them together. The data from the class suggests that the students found the inclusion of the social context in the technical assignments to be more motivating and expressed greater agency in realizing social change. We share our approach to designing this new introductory socially responsible computing course and the students’ reflections. We also highlight seven considerations for educators seeking to incorporate socially responsible computing. https://doi.org/10.1145/3626252.3630926" 2401.01288v1,"1 Physics-informed Generalizable Wireless Channel Modeling with Segmentation and Deep Learning: Fundamentals, Methodologies, and Challenges Ethan Zhu ∗ , Haijian Sun † , Mingyue Ji ‡ ∗ † Green Canyon High School, 2960 Wolf Pack Wy North, North Logan, UT USA. School of Electrical and Computer Engineering, University of Georgia, Athens, GA USA. † Department of Electrical and Computer Engineering, University of Utah, Salt Lake City, UT USA. Emails: ∗ ethanzhu987@gmail.com, † hsun@uga.edu, ‡ mingyue.ji@utah.edu Abstract Channel modeling is fundamental in advancing wireless systems and has thus attracted considerable research focus. Recent trends have seen a growing reliance on data-driven techniques to facilitate the modeling process and yield accurate channel predictions. In this work, we first provide a concise overview of data-driven channel modeling methods, highlighting their limitations. Subsequently, we introduce the concept and advantages of physics- informed neural network (PINN)-based modeling and a summary of recent contributions in this area. Our findings demonstrate that PINN-based approaches in channel modeling exhibit promising attributes such as generalizability, interpretability, and robustness. We offer a comprehensive architecture for PINN methodology, designed to inform and inspire future model development. A case-study of our recent work on precise indoor channel prediction with semantic segmentation and deep learning is presented. The study concludes by addressing the challenges faced and suggesting potential research directions in this field. Index Terms wireless channel modeling, physics-based modeling, deep learning, 3D segmentation, knowledge distillation. January 3, 2024 DRAFT" 2401.01301v1,"Large Legal Fictions: Profiling Legal Hallucinations in Large Language Models Matthew Dahl Yale University Varun Magesh Stanford University Mirac Suzgun Stanford University Daniel E. Ho Stanford University matthew.dahl@yale.edu vim@stanford.edu msuzgun@stanford.edu deho@stanford.edu Abstract 1.0 1 Mean Hallucination Rate Large language models (LLMs) have the potential to transform the practice of law, but this potential is threatened by the presence of legal hallucinations—responses from these models that are not consistent with legal facts. We investigate the extent of these hallucinations using an original suite of legal queries, comparing LLMs’ responses to structured legal metadata and examining their consistency. Our work makes four key contributions: (1) We develop a typology of legal hallucinations, providing a conceptual framework for future research in this area. (2) We find that legal hallucinations are alarmingly prevalent, occurring between 69% of the time with ChatGPT 3.5 and 88% with Llama 2, when these models are asked specific, verifiable questions about random federal court cases. (3) We illustrate that LLMs often fail to correct a user’s incorrect legal assumptions in a contra-factual question setup. (4) We provide evidence that LLMs cannot always predict, or do not always know, when they are producing legal hallucinations. Taken together, these findings caution against the rapid and unsupervised integration of popular LLMs into legal tasks. Even experienced lawyers must remain wary of legal hallucinations, and the risks are highest for those who stand to benefit from LLMs the most—pro se litigants or those without access to traditional legal resources. 1 0.69 0.72 GPT 3.5 PaLM 2 0.6 0.4 0.2 0.0 Llama 2 Figure 1: Hallucinations are common across all the LLMs we test when they are asked a direct, verifiable question about a federal court case. (Figure pools all reference-based tasks.) et al., 2023), many have started asking whether AI tools and systems might soon displace human lawyers altogether (Bommasani et al., 2022; Perlman, 2023, inter alia). Despite their potential to reform how legal work is performed, however, there remains a critical challenge to LLMs’ widespread adoption: the issue of hallucinations. LLMs like ChatGPT can sometimes generate text that is inconsistent with current legal doctrine and case law, and in the legal field, where adherence to the source text is paramount, unfaithful or imprecise interpretations of law can lead to nonsensical—or worse, harmful and inaccurate—legal advice or decisions. In this work, we present the first evidence documenting the nature and frequency of hallucinations in the legal domain. While anecdotal discussion of this problem has surfaced in national media—for instance, the New York Times reported on a lawyer who faced sanctions for using ChatGPT-generated fictional case citations in a brief (Weiser, 2023), and SCOTUSBlog highlighted ChatGPT’s misinformation regarding a supposed dissent by Justice Ruth Bader Ginsburg in the landmark gay rights case Obergefell v. Hodges (Romoser, 2023)—a sys- Introduction The legal industry is on the cusp of a technological metamorphosis, driven by recent advancements in AI—particularly in the form of large language models (LLMs). As these AI models have shown increasing proficiency in law-related tasks, such as first-year law school exams (Choi et al., 2022), the uniform bar exam (OpenAI, 2023b), statutory reasoning (Blair-Stanek et al., 2023), and issuerule-application-conclusion (IRAC) analysis (Guha 1 0.8 0.88 All our code, raw data, prompts, and results are available at: https://github.com/reglab/legal_hallucinations. 1" 2401.01303v1,"Integrating Edges into U-Net Models with Explainable Activation Maps for Brain Tumor Segmentation using MR Images Subin Sahayam a,b,∗ , Umarani Jayaraman b a Department of Computer Science and Engineering, Shiv Nadar University Chennai, Kalavakkam - 603110, Tamil Nadu, India b Department of Computer Science and Engineering, Indian Institute of Information Technology Design and Manufacturing Kancheepuram, Chennai - 600127, Tamil Nadu, India Abstract Manual delineation of tumor regions from magnetic resonance (MR) images is time-consuming, requires an expert, and is prone to human error. In recent years, deep learning models have been the go-to approach for the segmentation of brain tumors. U-Net and its’ variants for semantic segmentation of medical images have achieved good results in the literature. However, U-Net and its’ variants tend to over-segment tumor regions and may not accurately segment the tumor edges. The edges of the tumor are as important as the tumor regions for accurate diagnosis, surgical precision, and treatment planning. In the proposed work, the authors aim to extract edges from the ground truth using a derivative- like filter followed by edge reconstruction to obtain an edge ground truth in addition to the brain tumor ground truth. Utilizing both ground truths, the author studies several U-Net and its’ variant architectures with and without tumor edges ground truth as a target along with the tumor ground truth for brain tumor segmentation. The author used the BraTS2020 benchmark dataset to perform the study and the results are tabulated for the dice and Hausdorff95 metrics. The mean and median metrics are calculated for the whole tumor ∗ Corresponding author Email addresses: subinsahayamm@snuchennai.edu.in, coe18d001@iiitdm.ac.in (Subin Sahayam), umarani@iiitdm.ac.in (Umarani Jayaraman) Preprint submitted to Computers in Biology and Medicine January 3, 2024" 2401.01313v3,"A Comprehensive Survey of Hallucination Mitigation Techniques in Large Language Models S.M Towhidul Islam Tonmoy 1 , S M Mehedi Zaman 1 , Vinija Jain 3,4∗ , Anku Rani 2 , Vipula Rawte 2 , Aman Chadha 3,4∗ , Amitava Das 2 1 Islamic University of Technology, Bangladesh 2 AI Institute, University of South Carolina, USA 3 Stanford University, USA, 4 Amazon AI, USA towhidulislam@iut-dhaka.edu Abstract As Large Language Models (LLMs) continue to advance in their ability to write human-like text, a key challenge remains around their tendency to “hallucinate” – generating content that appears factual but is ungrounded. This issue of hallucination is arguably the biggest hindrance to safely deploying these powerful LLMs into real-world production systems that impact people’s lives (Jain, 2023). The journey toward widespread adoption of LLMs in practical settings heavily relies on addressing and mitigating hallucinations. Unlike traditional AI systems focused on limited tasks, LLMs have been exposed to vast amounts of online text data during training. While this allows them to display impressive language fluency, it also means they are capable of extrapolating information from the biases in training data, misinterpreting ambiguous prompts, or modifying the information to align superficially with the input. This becomes hugely alarming when we rely on language generation capabilities for sensitive applications, such as summarizing medical records, customer support conversations, financial analysis reports, and providing erroneous legal advice. Small errors could lead to harm, revealing the LLMs’ lack of actual comprehension despite advances in self-learning. This paper presents a comprehensive survey of over thirty-two techniques developed to mitigate hallucination in LLMs. Notable among these are Retrieval-Augmented Generation (RAG) (Lewis et al., 2021), Knowledge Retrieval (Varshney et al., 2023), CoNLI (Lei et al., 2023), and CoVe (Dhuliawala et al., 2023). Furthermore, we introduce a detailed taxonomy categorizing these methods based on various parameters, such as dataset utilization, common tasks, feedback mechanisms, and retriever types. This classification helps distinguish the diverse approaches specifically designed to tackle hallucination issues in LLMs. Additionally, we analyze the challenges and ∗ Work does not relate to position at Amazon. limitations inherent in these techniques, providing a solid foundation for future research in addressing hallucinations and related phenomena within the realm of LLMs. 1 Introduction Hallucination in Large Language Models (LLMs) entails the creation of factually erroneous information spanning a multitude of subjects. Given the extensive domain coverage of LLMs, their application extends across numerous scholarly and professional areas. These include, but are not limited to, academic research, programming, creative writing, technical advisement, and the facilitation of skill acquisition. Consequently, LLMs have emerged as an indispensable component in our daily lives, playing a crucial role in dispensing accurate and reliable information. Nevertheless, a fundamental issue with LLMs is their propensity to yield erroneous or fabricated details about real-world subjects. This tendency to furnish incorrect data, commonly referred to as hallucination, poses a significant challenge for researchers in the field. It leads to scenarios where advanced models like GPT-4 and others of its ilk may generate references that are inaccurate or completely unfounded (Rawte et al., 2023). This issue arises due to the training phase’s pattern generation techniques and the absence of real-time internet updates, contributing to discrepancies in the information output (Ray, 2023). In contemporary computational linguistics, mitigating hallucination is a critical focus. Researchers have proposed various strategies, encompassing feedback mechanisms, external information retrieval, and early refinement in language model generation, to address this challenge. This paper assumes significance by consolidating and organizing these diverse techniques into a comprehensive taxonomy. In essence, the contributions of this paper to the realm of LLM hallucination are threefold:" 2401.01314v1,"Classifying Words with 3-sort Automata Research paper Tomasz Jastrząb Frédéric Lardeux Eric Monfroy Silesian University of Technology Gliwice, Poland Tomasz.Jastrzab@polsl.pl LERIA, University of Angers Angers, France Frederic.Lardeux@univ-angers.fr LERIA, University of Angers Angers, France Eric.Monfroy@univ-angers.fr ABSTRACT Grammatical inference consists in learning a language or a grammar from data. In this paper, we consider a number of models for inferring a non-deterministic finite automaton (NFA) with 3 sorts of states, that must accept some words, and reject some other words from a given sample. We then propose a transformation from this 3-sort NFA into weighted-frequency and probabilistic NFA, and we apply the latter to a classification task. The experimental evaluation of our approach shows that the probabilistic NFAs can be successfully applied for classification tasks on both real-life and superficial benchmark data sets. CCS CONCEPTS • Theory of computation → Formal languages and automata theory; • Computing methodologies → Supervised learning by classification. ACM Reference Format: Tomasz Jastrząb, Frédéric Lardeux, and Eric Monfroy. 2024. Classifying Words with 3-sort Automata: Research paper. In Proceedings of ACM SAC Conference (SAC’24). ACM, New York, NY, USA, Article 4, 8 pages. https: //doi.org/xx.xxx/xxx_x 1 INTRODUCTION Many real-world phenomena may be represented as syntactically structured sequences such as DNA, natural language sentences, electrocardiograms, chain codes, etc. Grammatical Inference refers to learning grammars and languages from data, i.e., from such syntactically structured sequences. Machine learning of grammars has various applications in syntactic pattern recognition, adaptive intelligent agents, diagnosis, computational biology, systems modeling, prediction, etc.We are here interested in learning grammars as finite state automata, with respect to a sample of the language composed of positive sequences that must be elements of the language, and negative sequences that the automaton must reject. The problem of learning finite automata has been explored from multiple angles: ad-hoc methods such as DeLeTe2 [2] which merges states from the prefix tree acceptor (PTA), a family of algorithms for regular language inference presented in [13], metaheuristics such Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. SAC’24, April 8 –April 12, 2024, Avila, Spain © 2024 Association for Computing Machinery. ACM ISBN 979-8-4007-0243-3/24/04. . . $15.00 https://doi.org/xx.xxx/xxx_x as hill-climbing in [12], or modeling the problem as a Constraint Satisfaction Problem (CSP) and solving it with generic tools (such as non-linear programming [14], or Boolean formulas [4–7]). However, all these works consider Deterministic Finite Automata (DFA), or Non-deterministic Finite Automata (NFA). In both cases, this means that when using the automata on a word, the answer is ""Yes, this word is part of the language"", or ""No, this word is not part of the language"". Since samples are finite and usually not very large (a maximum of hundreds of words), and regular languages are infinite, this classification may be too restrictive or too strong. One could be interested in probabilistic answers such as ""this word is part of the language with a probability of x%"". However, the question is now ""How can I learn a probabilistic automaton from a sample of positive and negative words?"". In this paper, we propose a technique to derive a probabilistic automaton from a sample of positive and negative words. We first learn Non-deterministic Finite Automata with 3 sorts of states: accepting final states which validate positive words, rejecting final states which reject negative words, and whatever states that are not conclusive. We use these 3-sort NFA which seems of reasonable use for our goal (the usefulness of this kind of NFA is presented in [3]). To improve the efficiency for generating such automata, we use a similar property to the one that was used for 2-sort NFA in [5]: here, we build a 3-sort automaton with only one accepting final state and one rejecting final state, and some extra constraints to reduce this size 𝑘 + 2 automaton into a size 𝑘 automaton. Then, we want to reflect frequencies based on the sample, such as: how many positive words of the sample terminate in this accepting final state? How many times has a negative word of the sample passed by this transition? But we also want to be a bit more specific. For example, how many negative words of the sample passed by this transition and terminated in a rejecting final state (vs. a whatever state). To this end, we need to weigh differently some cases and patterns. We thus need to define what we call 3-sort Weighted-Frequency NFA, and we present the transformation of a 3-sort NFA into a 3-sort Weighted-Frequency NFA. This last can then be converted into a probabilistic NFA once weights have been instantiated. The probabilistic NFA can then be used to determine the probability for a word to be a part of the language, or the probability of it not being a part of the language. Note that by modifying the weights, we can obtain more accepting or more rejecting automata. We conduct a number of experiments on the Waltz DB database to classify peptides into amyloid ones that are dangerous, or non-amyloid ones that are harmless. We perform similar studies with languages generated by a regular expression. Our results look promising, leaving also some space for weights tuning depending" 2401.01326v2,"An Autoregressive Text-to-Graph Framework for Joint Entity and Relation Extraction Urchade Zaratiana 1,2 , Nadi Tomeh 2 , Pierre Holat 1,2 , Thierry Charnois 2 1 2 FI Group, Puteaux, France LIPN - Université Sorbonne Paris Nord - CNRS UMR 7030, Villetaneuse, France {zaratiana, tomeh, charnois}@lipn.fr, pierre.holat@fi-group.com Abstract In this paper, we propose a novel method for joint entity and relation extraction from unstructured text by framing it as a conditional sequence generation problem. In contrast to conventional generative information extraction models that are left-to-right token-level generators, our approach is span-based. It generates a linearized graph where nodes represent text spans and edges represent relation triplets. Our method employs a transformer encoder-decoder architecture with pointing mechanism on a dynamic vocabulary of spans and relation types. Our model can capture the structural characteristics and boundaries of entities and relations through span representations while simultaneously grounding the generated output in the original text thanks to the pointing mechanism. Evaluation on benchmark datasets validates the effectiveness of our approach, demonstrating competitive results. Code is available at https://github.com/urchade/ATG. Introduction Joint entity and relation extraction is a fundamental task in Natural Language Processing (NLP), serving as the basis for various high-level applications such as Knowledge Graph construction (Ye et al. 2022b) and question answering (Chen et al. 2017). Traditionally, this task was tackled via pipeline models that independently trained and implemented entity recognition and relation extraction, often leading to error propagation (Brin 1999). Deep learning has led to the creation of end-to-end models, allowing for the use of shared representations and joint optimization of loss functions for both tasks (Wadden et al. 2019; Wang and Lu 2020; Zhao et al. 2021; Zhong and Chen 2021; Yan et al. 2021). Despite this advancement, these models essentially remain pipelinebased, with entity and relation predictions executed by separate classification heads, thereby ignoring potential interactions between these tasks. Recent advancements have seen a shift towards “real” end-to-end solutions, where the prediction of entities and relations is intertwined, accomplished through autoregressive models. These models treat the joint entity-relation task as a process of generating plain text, employing augmented languages to encode and decode structural information (Paolini et al. 2021; Lu et al. 2022; Liu et al. 2022; Fei et al. 2022). Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. While these models have achieved remarkable performance, we argue that they also expose room for improvement, especially in terms of grounding the output in the input text. In this paper, we present an autoregressive transformer encoder-decoder model that generates a linearized graph instead of generating plain text. Our model makes use of a pointing mechanism (Vinyals, Fortunato, and Jaitly 2015) on a dynamic vocabulary of spans and relations, providing explicit grounding in the original text. In fact, without grounding, models can generate output that are semantically coherent but contextually detached from the input. Our pointing mechanism mitigates this issue by ensuring that the decoder’s outputs, specifically the entity spans, are directly tied to the input text. Furthermore, by generating spans and relations directly from the text, rather than producing standalone plain text, our model encode the structural characteristics and boundaries of entities/spans more accurately, which can be missed by previous generative information extraction models. The cornerstone of our solution is the explicit enumeration of all spans 1 at the encoder’s output, making them readily available to the decoder. Although the number of spans can be extensive, we note that when bounding the span size, our model’s vocabulary is typically smaller than that of traditional language models (Devlin et al. 2019; Raffel et al. 2019), as discussed in subsequent sections. Moreover, as previous generative IE models operate at the token level, they scatter the information regarding an entity’s span and its boundaries over multiple decoding steps. In contrast, generating an entity and its type in our approach is accomplished in a single decoding step, resulting in shorter sequence (Figure 5). Additionally, our method naturally ensures the well-formedness of the output while some generative IE models that produce text, often require non-regular constraints. As an example, in TANL (Paolini et al. 2021), if a portion of the generated sentence has an invalid format, that segment is discarded. Such issues are readily addressed in our model since the vocabulary can be fully controlled. We evaluated our model on three benchmark datasets for joint entity and relation extraction: CoNLL 2004, SciERC, and ACE 05. Our model demonstrated competitive performance on all datasets. Our contributions can be summarized as follows: 1 Up to a certain length in practice." 2401.01356v1,"E FFICIENT I NDEXING OF M ETA -D ATA ( EXTRACTED FROM EDUCATIONAL VIDEOS ) Shalika Kumbham Indian Institute of Technology, Kharagpur shalika@iitkgp.ac.in Abhijit Debnath Indian Institute of Technology, Kharagpur abhijitdebnath@iitkgp.ac.in Krothapalli Sreenivasa Rao Indian Institute of Technology, Kharagpur ksrao@cse.iitkgp.ac.in A BSTRACT Video lectures are becoming more popular and in demand as online classroom teaching is becoming more prevalent. Massive Open Online Courses (MOOCs), such as NPTEL, have been creating high-quality educational content that is freely accessible to students online. A large number of colleges across the country are now using NPTEL videos in their classrooms. So more video lectures are being recorded, maintained, and uploaded. These videos generally contain information about that video before the lecture begins. We generally observe that these educational videos have metadata containing five to six attributes: Institute Name, Publisher Name, Department Name, Professor Name, Subject Name, and Topic Name. It would be easy to maintain these videos if we could organize them according to their categories. The indexing of these videos based on this information is beneficial for students all around the world to efficiently utilise these videos. In this project, we are trying to get the metadata information mentioned above from the video lectures. 1 Introduction Students are going through numerous changes as they adjust to the COVID situation. The mode of classes is one of the most affected. A video is a digitally recorded and saved programme, movie, or other visual media product that contains moving visuals with or without audio. The frame is a single image in a sequence of pictures. In most cases, one second of video is made up of 24 or 30 frames per second (FPS). The frame is made up of the image and the time the image was exposed to the view when it was taken. The animation is created by extracting a series of frames in a row. Creating and managing web videos is a difficult task. It would be a lot easier if we could automatically categorise them without much human interaction. It saves a significant amount of time and work. As a result, we’re attempting to create an interface for obtaining the necessary data and organising it into the appropriate categories. If you give it a video, it will provide you with information from those categories. For example, if there is an NPTEL video on Image Processing taught by Prof. K S Rao from IIT Kharagpur’s Computer Science Department, we must map the information to the appropriate column, such as Publisher Name - NPTEL, Professor Name - K S Rao, Department Name - Computer Science, and so on. 2 Literature Review Yan et al. (2018) talked about key frame extraction from videos (human action videos) using a deep learning approach. An algorithm has been proposed that is mostly focused on the fusion of deep features and histograms to reduce the number of redundant frames. Because of the combined elements of human position in movement and the background, detecting representative frames in movies based on human actions is fairly difficult. Gawande et al. (2020) address the issue and define key frame detection as the process of identifying the video frames that contribute the most to distinguishing the underlying action" 2401.01375v2,"Article Mapping Walnut Water Stress with High Resolution Multispectral UAV Imagery and Machine Learning Kaitlyn Wang 1,†,‡ and Yufang Jin 2, * 1 2 * The Harker School, 500 Saratoga Ave, San Jose, CA 95129, USA; 24kaitlynw@students.harker.org Dept of Land, Air and Water Resources, UC Davis, CA 95616, USA; yujin@ucdavis.edu Correspondence: 24kaitlynw@students.harker.org Abstract: Effective monitoring of walnut water status and stress level across the whole orchard is an essential step towards precision irrigation management of walnuts, a significant crop in California. This study presents a machine learning approach using Random Forest (RF) models to map stem water potential (SWP) by integrating high-resolution multispectral remote sensing imagery from Unmanned Aerial Vehicle (UAV) flights with weather data. From 2017 to 2018, five flights of an UAV equipped with a seven-band multispectral camera were conducted over a commercial walnut orchard, paired with concurrent ground measurements of sampled walnut plants. The RF regression model, utilizing vegetation indices derived from orthomosaiced UAV imagery and weather data, effectively estimated ground-measured SWPs, achieving an R 2 of 0.70 and a mean absolute error (MAE) of 0.80 bars. The integration of weather data was particularly crucial for consolidating data across various flight dates. Significant variables for SWP estimation included wind speed and vegetation indices such as NDVI, NDRE, and PSRI. As a comparison, a reduced RF model excluding red-edge indices of NDRE and PSRI, demonstrated slightly reduced accuracy (R 2 = 0.63). Subsequently, a random-forest classification model was developed to categorize the severity of walnut plant water stress to three distinct stress levels: low stress, moderate stress, and severe stress.The RF classification model predicted water stress levels in walnut trees with 85% accuracy, surpassing the 80% accuracy of the reduced classification model. The results affirm the efficacy of UAV-based multispectral imaging combined with machine learning, incorporating thermal data, NDVI, red-edge indices, and weather data (wind, temperature, VPD), in walnut water stress estimation and assessment. This methodology enables a scalable, cost-effective tool for data-driven precision irrigation management at an individual plant level in walnut orchards. It highlights the promising capability to replace manual, labor-intensive measurements with precise, targeted irrigation, marking a significant advancement in refining and optimizing irrigation strategies. Keywords: vegetation index, unmanned aerial vehicles, multispectral imagery, stem water potential, water stress, machine learning, random forest Citation: Wang, K.; Jin, Y. Mapping Walnut Water Stress with High Resolution Multispectral UAV Imagery and Machine Learning. Remote Sensing 2024, 1, 0. https://doi.org/10.48550/arXiv.2401 01375 Copyright: © 2024 by the authors. Submitted to Remote Sensing for possible open access publication under the terms and conditions of the Creative Commons Attri- bution (CC BY) license (https:// creativecommons.org/licenses/by/ 1. Introduction California’s Central Valley is a pivotal region for walnut production, contributing over 99% of the walnuts grown in the U.S. and supplying about half of the global walnut trade. This makes walnuts one of the most economically significant specialty crops in California, with an annual retail value exceeding $15.4 billion (Federal Register 2023). However, the region’s recent severe drought conditions have compelled growers to rely heavily on groundwater pumping, leading to alarmingly rapid rates of groundwater depletion [1]. In response to these challenges, the optimization of water management practices has become a critical necessity for crop producers, especially given the escalating water demands tied to the expansion of specialty crops in the Central Valley. Timely and accurate mapping of water status across entire blocks is essential for implementing adaptive and precision irrigation management at both zonal and individual walnut plant 4.0/). Remote Sensing https://www.mdpi.com/journal/remotesensing" 2401.01376v1,"ALPC IS IN DANGER: ALPCHECKER DETECTS SPOOFING AND BLINDING Anastasiia Kropova Bachelor of Information Security, MEPhI Moscow, Russia kropovaanastasiia@gmail.com Igor Korkin, PhD Security Researcher Moscow, Russia igor.korkin@gmail.com ABSTRACT The purpose of this study is to evaluate the possibility of implementing an attack on ALPC connection in the Windows operating system through the kernel without closing the connection covertly from programs and the operating system and to propose a method of protection against this type of attacks. Asynchronous Local Procedure Call technology (ALPC) is used in various Windows information protection systems, including antivirus systems (AV) and Endpoint Detection and Response systems (EDR). To ensure the concealment of malicious software, attackers need to disrupt the operation of AV, EDR tools, which in turn can be achieved by destructive impact on the components of the ALPC technology. Examples of such attacks already exist and are covered in this paper. To counteract such new threats, it is necessary to advance the improvement of information security systems and the ALPC security research was conducted. The most difficult case, Windows kernel driver attack, was considered. Three attacks on the ALPC connection were carried out, based on changing the ALPC structures in the kernel memory, which led to creation of illegitimate connections in the system and the disruption of correct connections. ALPChecker protection tool has been developed. The tool was successfully tested on three demonstrated attacks . Keywords: kernel driver, ALPC mechanism, interprocess communication, Connection Port, client process, server process. 1. INTRODUCTION According to statistics Statcounter.com (Statcounter.com, 2023), the most popular operating system for computers is Windows. It is installed on 74.14% of computers. OS X takes the 2nd place – 15.33%, followed by Linux – 2.91%. With each version, more and more security features appear and improve in Windows, but the system is still not fully protected (Korkin, 2022). Attackers still continue to find gaps in the protection of the operating system, bypassing security features (Klein, Kotler, 2019). The popularity of Windows makes it a desirable target for attackers (Pei et al., 2016). A huge number of attacks on Windows are carried out in kernel mode using drivers. All loaded kernel drivers use the same address space as the Windows kernel itself. According to Pogonin (Pogonin, Korkin, 2022), there is no built-in solution to control and restrict all memory access between these drivers and sensitive kernel data. Therefore, the Windows operating system continues to be at risk of attacks from kernel drivers. Windows security mechanisms cannot prevent driver-based attacks Various mechanisms have been created in order to protect Windows from attacks in kernel mode. Among them are DSE (Driver Signature Enforcement), prohibiting the download of malicious drivers, PatchGuard in Windows 8.1 and MmProtectDriverSection in Windows 11, protecting DSE from changing the nt!g_CiEnabled kernel variable and disabling it (Pogonin, Korkin, 2022). Attackers began to use official, Microsoft-signed drivers with known vulnerabilities, embedding 1" 2401.01379v1,"The predictive power of the Blockhain transaction networks: Towards a new generation of network science market indicators M. Grande, 1, 2, ∗ F. Borondo, 3, † and J. Borondo 2, 4, ‡ 1 Grupo de Sistemas Complejos; Universidad Politécnica de Madrid; 28035 Madrid (Spain) 2 AgrowingData; Navarro Rodrigo 2 AT; 04001 Almería (Spain) 3 Departamento de Química; Universidad Autónoma de Madrid; CANTOBLANCO - 28049 Madrid, Spain 4 Departamento de Gestión Empresarial; Universidad Pontificia de Comillas ICADE; Alberto Aguilera 23; 28015 Madrid (Spain) (Dated: January 4, 2024) Currently cryptocurrencies and Decentralized Finance (DeFi), which enable financial services on public blockchains, represents a new growing trend in finance. In contrast to financial markets, ruled by traditional corporations, DeFi is completely transparent as it keeps records of all transactions that occur in the network and makes them publicly available. The availability of the data represents an opportunity to analyze and understand the market from the complexity that emerges from the interactions of the actors (users, bots and companies) operating in the embedded market. In this paper we focus on the Ethereum network and our main goal is to show that the properties of the underlying transaction network provide further and useful information to forecast the evolution of the market. We aim to separate the non-redundant effects of the blockchain transaction network properties from classic technical indicators and social media trends in the future price of Ethereum. To this end, we build two machine learning models to predict the future trend of the market. The first one serves as a base model and considers a set of the most relevant features according to the current scientific literature—including technical indicators and social media trends. The second model considers the features of the base model, together with the network properties computed from the transaction networks. We found that the full model outperforms the base model and can anticipate 46% more rises in the price than the base model and 19% more falls. Thus, we conclude that indicators based on network properties provide valuable information to forecast the future direction of the market that can not be explained neither by traditional indicators, or social media trends. Hence, our results represent a first step towards a new family of DeFi market indicators based on the complexity of the underlying transaction network. I. INTRODUCTION Cryptocurrencies and Decentralized Finance (DeFi), an emerging financial technology based on secure distributed ledgers, represent a new trend in finance that is growing exponentially, taking components of traditional financial markets and transforming them into transparent and decentralized protocols through smart contracts and tokens. The appeal that this new paradigm offers to the population is clear: access to all imaginable financial services — savings accounts, insurance, loans, commerce— in an open and borderless way. In this new scenario, all financial services are carried out through decentralized applications that run on the blockchain and therefore eliminate the need for a central authority, which is its differential advantage over traditional markets. Moreover, during the last decade the cryptocurrencies and DeFi market has become the fastest-growing alternative investment option, gaining widespread public and investors attention due to their extraordinary returns in phases of extreme price growth. Another differential advantage of this new market for investors is that, because of its decentralized nature, it does not react to economic factors. Thus, the failure of governments and central banks in the 2008 financial crisis alongside the European Sovereign Debt Crisis, represented an incentive for investors and other economic actors towards ∗ Email address: mar.grande@alumnos.upm.es † E–mail address: f.borondo@uam.es ‡ Corresponding author email address: jborondo@gmail.com cryptocurrencies that began to see them as an attractive investment alternative. However, the cryptocurrency market is still in the nascent stages which involves a high volatility, presenting remarkable fluctuations and unexpected massive crashes. The dynamics of the cryptocurrency market have attracted the interest of financial institutions and researchers seeking to understand its high volatility and price fluctuations. The behavior and evolution of all financial markets depends largely on the behaviors of traders and investors operating in such markets, and the cryptocurrencies and DeFi markets are no exception. Seeking to take advantage of this behavior researchers developed over the past century Technical Analysis (TA) [1–3], a methodology to analyze and forecast the direction of prices through the study of past market data (only considering price and volume). This theory is founded on the principle that a market’s price time series reflects all relevant information impacting that market. Thus, researchers in this field have developed over the past decades TA indicators based on the history of an asset or commodity’s trading patterns. The most well-known types of systems are moving averages, channels (support and resistance) and momentum oscillators. Several studies have already applied TA to study and forecast cryptocurrencies price series, focusing mainly in Bitcoin and Ethereum, and finding a correlation between some technical indicators and their future price [4–6]. More recently, other scholars have highlighted the power of social media to capture the sentiment and behavior of users. Thus, a recent line of research focuses on generating indicators based on social media trends to forecast financial markets. Several studies have focused on exploring the relation between social" 2401.01381v1,"Symmetry analysis involving meson mixing for charmonium decay X.H.Mo 1,2 1 2 Institute of High Energy Physics, CAS, Beijing 100049, China University of Chinese Academy of Sciences, Beijing 100049, China ∗ (Dated: January 4, 2024) In the light of SU (3) flavor symmetry, the effective interaction Hamiltonian in tensor form is obtained by virtue of group representation theory. The strong and electromagnetic breaking effects are treated as a spurion octet so that the flavor singlet principle can be utilized as the criterion to determine the form of effective Hamiltonian for all charmonium two body decays. Moreover, a synthetical nonet is introduced to include both octet and singlet representations for meson description, and resorting to the mixing angle the pure octet and singlet states are combined into the observable pseudoscalar and vector particles, so that the empirically effective Hamiltonian can be obtained in a concise way. As an application, by virtue of this scenario the relative phase between the strong and electromagnetic amplitudes is studied for vector-pseudoscalar meson final state. In data analysis of samples taken in e + e − collider, the details of experimental effects, such as energy spread and initial state radiative correction are taken into consideration in order to make full use of experimental information and acquire the accurate and delicate results. PACS numbers: 12.38.Qk, 12.39.Hg, 13.25.Gv, 13.40.Gp, 14.20.-c,14.40.-n I. INTRODUCTION Since the upgraded Beijing Electron-Positron Collider (BEPCII) and spectrometer detector (BESIII) started data taking in 2008 [1, 2], the colossal charm and charmonium data samples in the world were collected, especially the data at J/ψ and ψ ′ resonance peaks, which provide an unprecedented opportunity to acquire useful information for understanding the interaction dynamics by analyzing various decay final states. Although the Standard Model (SM) has been accepted as a universally appreciated theory basis in the high energy community, it is still hard to calculate the wanted experimental observable from the first principle of the SM for a great many of processes, especially when the strong interaction is involved. Quantum chromodynamics (QCD) as a widely appreciated theory of strong interaction, has been proved to be very successful at high energy when the calculation can be executed perturbatively. Nevertheless, its validity at the nonperturbative regime needs more experimental guidance. As an exploratory step, it is necessary to develop a reliable and extensively applicable phenomenological model (PM). The advantage of PM lies in that a well-defined PM contains few experimentally determined parameters which have clear physical meaning; moreover, with only few parameters determined from experiment, PM could produce concrete results which can be directly confirmed or falsified by experiment and may guide further experimental searches. Such a model has a good relation with ∗ Electronic address: moxh@ihep.ac.cn elementary principle of the theory, and if applicable, can be used for further theoretical refinement. This point is noteworthy for the time being, since the general QCD can hardly provide solutions for special problems; conversely, we have to establish certain effective empirical model to advance our understanding for generic QCD principle. As a matter of fact, many models are constructed [3– 12], the parametrization of various decay modes are obtained, such as the pseudoscalar and pseudoscalar mesons (PP), vector and pseudoscalar mesons (VP), octet baryon-pair, and so on. Especially in Ref. [12], by virtue of SU (3) flavor symmetry, the effective interaction Hamiltonian in tensor form is obtained according to group representation theory. In the light of flavor singlet principle, systematical parametrization is realized for all charmonium two-body decay, including both baryonic and mesonic final states. The parametrizations of ψ ′ or J/ψ decaying to octet baryon pair, decuplet baryon pair, decuplet-octet baryon final state, vector-pseudoscalar meson final state, and pseudoscalarpseudoscalar meson final state, are presented. However, in the previous study [12] mesons are merely treated as pure octet states while the actual particles are the mixing of both octet and singlet states. Therefore, this paper concentrates on the meson mixing issue. With nonet concept and mixing angle, both octet and singlet states are mixed into mass eigenvalue states so that the pragmatically effective Hamiltonian can be constructed in a concise way. Such a treatment finalizes the parametrization scheme proposed in the previous symmetry analysis of charmonium decay. In the next section, the parametrization scheme will be expounded first, a synthetical nonet is introduced to combine both octet and singlet representations for meson" 2401.01392v1,"IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 1 Attribute Fusion-based Evidential Classifier on Quantum Circuits Hao Luo, Qianli Zhou ∗ , Lipeng Pan, Zhen Li, and Yong Deng ∗ Abstract—Dempster-Shafer Theory (DST) as an effective and robust framework for handling uncertain information is applied in decision-making and pattern classification. Unfortunately, its real-time application is limited by the exponential computational complexity. People attempt to address the issue by taking advantage of its mathematical consistency with quantum computing to implement DST operations on quantum circuits and realize speedup. However, the progress so far is still impractical for supporting large-scale DST applications. In this paper, we find that Boolean algebra as an essential mathematical tool bridges the definition of DST and quantum computing. Based on the discovery, we establish a flexible framework mapping any settheoretically defined DST operations to corresponding quantum circuits for implementation. More critically, this new framework is not only uniform but also enables exponential acceleration for computation and is capable of handling complex applications. Focusing on tasks of classification, we based on a classical attribute fusion algorithm putting forward a quantum evidential classifier, where quantum mass functions for attributes are generated with a simple method and the proposed framework is applied for fusing the attribute evidence. Compared to previous methods, the proposed quantum classifier exponentially reduces the computational complexity to linear. Tests on real datasets validate the feasibility. Index Terms—Dempster-Shafer Theory, Quantum circuit, Classification, Information fusion, Quantum computing. I. I NTRODUCTION D EMPSTER-SHAFER Theory (DST) [1], [2], also referred to as evidence theory, is a mathematical framework to handle uncertain information. For a Frame of Discernment (FoD), DST assigns beliefs on the power set to describe the uncertain environment. Besides, evidence combination rules [3], [4] enable DST to fuse the conflicted evidence from multiple sources with different reliability levels. Thus, DST has been widely applied in decision-making [5]–[7], pattern classification [8]–[10], information fusion [11]–[13]. Besides, to handle uncertain complex data, DST framework is The work is supported by National Natural Science Foundation of China (Grant No. 62373078) Hao Luo is with the Institute of Fundamental and Frontier Science, University of Electronic Science and Technology of China, Chengdu 610054, China and also with Department of Communication Science and Engineering, School of Information Science and Technologies, Fudan University, Shanghai 200438, China. Qianli Zhou (e-mail: zhouqianliuestc@hotmail.com) and Lipeng Pan are with the Institute of Fundamental and Frontier Science, University of Electronic Science and Technology of China, Chengdu 610054, China Zhen Li is with China Mobile Information Technology Center, Beijing 100029, China Yong Deng is with the Institute of Fundamental and Frontier Science, University of Electronic Science and Technology of China, Chengdu 610054, China, and also with the School of Medicine, Vanderbilt University, Nashville 37240, USA. (e-mail: dengentropy@uestc.edu.cn) extended to the complex plane [14], [15]. Since DST is defined on the power set with 2 n elements, the implementation of DST operations faces exponentially increasing computational complexity, which limits its real-time application and becomes a pressing problem of the moment. To solve the problem, some scholars have improved the classical algorithm [16]– [19]. However, their attempts do not provide a unified model for reducing computational complexity, as these algorithms require the pre-processing stage or are limited by assumptions on the input. The above attempts fail as they are unable to break through the limitations of classical computers, where quantum computing might be an available option to bypass them. The natural parallel computing capability of quantum computers [20] makes it an alternative to speed up classical algorithms which have been proven to exist in some specific application scenarios, such as Shor algorithm [21] for prime factorization and Grover search algorithm [22] for unstructured search problem. In the last decade, quantum computing has widely received attention [23]–[26]. In 2009, Harrow et al. proposed HHL algorithm [27] theoretically achieving exponential speedups in solving linear systems of equations on quantum circuits, which gives rise to many algorithms for Quantum Machine Learning (QML) [28]–[31]. In addition, as the Noisy Intermediatescale Quantum (NISQ) era [32], [33] will last for a long time, the study of Variational Quantum Algorithms (VQAs) [34] currently becomes a hot direction. Using parameterized quantum circuits and classical parameter optimization, VQAs are applied to finding ground state [35], [36], Hamiltonian diagonalization [37], searching quantum error-correcting codes [38], mathematics [39], [40] under the current conditions of limited quantum resources. As to quantum attempts for DST, some scholars design quantum algorithms for implementation [41]–[45], based on the connection between DST and the quantum model [46], [47]. Depending on the different points of interest in the mathematical consistency involved in both DST and quantum computing, current attempts can be divided into two categories. In the first category, it has been found that DST operation, essentially doing a matrix multiplication, can be modeled as a linear system and solved by quantum algorithms. The representative work is implementing matrix calculus on quantum circuits by HHL algorithm [41]. Besides, to design an adapted option for the NISQ era, an idea is to solve the system of linear equations by VQAs [42], with the help of the same tensor structure shared by belief matrices and multiqubits quantum systems. However, the category of matrixbased quantum attempts cannot be applied in large-scale" 2401.01412v1,"P-TimeSync: A Precise Time Synchronization Simulation with Network Propagation Delays Wei Dai Department of Computer Science Purdue University Northwest Hammond, Indiana, USA weidai@pnw.edu Abstract—Time serves as the foundation of modern society and will continue to grow in value in the future world. Unlike previous research papers, authors delve into various time sources, ranging from atomic time and GPS time to quartz time. Specifically, we explore the time uncertainty associated with the four major Global Navigation Satellite Systems. Additionally, we provide a summary of eight metrics used to evaluate time accuracy. In existing time synchronization simulations provide partial usages. However, our research introduces a comprehensive and precise time synchronization simulation named P-TimeSync, leading to a better understanding of time synchronization in distributed environments. It is a state-of-theart simulation tool for time because (1) it can simulate atomic clocks and quartz clocks with user-defined software clock algorithms, (2) the simulation provides nanosecond-level precision time across different network propagation paths and distances, (3) the tool offers a visualization platform with classic algorithms for distributed time synchronization, such as Cristian’s algorithm and Berkeley algorithm, and (4) the simulation includes three time-sync attack functions, including distributed denial-of-service (DDoS) attack, IP spoofer, and router hijacker. The simulation easily allows for the redefinition of configurations and functions, supporting advanced research and development. The simulation tool could be downloaded via the website: https://github.com/rui5097/purdue_timesync Keywords—accuracy time, precision time, propagation time, time jitter I. I NTRODUCTION Precise time is essential for a variety of reasons in everyday life, industry, and scientist.The modern society runs on an accuracy time. However, incorrect time, especially in critical systems or processes, can lead to a range of issues and challenges that can have significant consequences. The use cases of time synchronization have been illustrated in Fig. 1. Precise time ensures the synchronization of activities, events, and processes in various domains, such as transportation, communication, and industrial production. Without precise timekeeping, it would be challenging to coordinate schedules and operations, resulting in obvious inefficiencies and disruptions. On the other hand, incorrect time can lead to data inconsistencies and errors, potentially compromising the accuracy and integrity of records. This can be particularly problematic in sectors such as finance, healthcare, and research, where precise time stamps are essential for tracking events and activities. Precise time is fundamental for the functioning of transportation systems, including air, sea, and land navigation. It is crucial for maintaining schedules, ensuring the safety of travelers, and coordinating the movement of vehicles and vessels across various time zones. In addition, many industries XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE Jinwei Liu Department of Computer and Information Sciences Florida A&M University Tallahassee, Florida, USA jinwei.liu@famu.edu Rui Zhang Department of Computer Science Purdue University Northwest Hammond, Indiana, USA zhan5097@pnw.edu are subject to strict regulatory requirements and compliance standards that mandate accurate timekeeping for recordkeeping, auditing, and reporting purposes. Incorrect time can lead to compliance violations, legal disputes, and regulatory non-compliance, resulting in financial penalties and reputational damage for organizations. Inaccuracy time could pose safety risks, potentially leading to accidents, errors in patient care, and disruptions in emergency response systems. Precise timing is critical for ensuring the safety and well-being of individuals, and any inaccuracies in timekeeping can compromise the effectiveness of safety measures and protocols. It is essential for coordinating activities, analyzing timelines, and ensuring the accuracy of security events captured by surveillance cameras, access control systems, and other monitoring devices. The major contributions of the research have been summarized as follows. This paper critically examines diverse time sources, atomic time, GPS time, and quartz time. Our focus is particularly on elucidating the time uncertainty inherent in the four major Global Navigation Satellite Systems. Additionally, we present a comprehensive summary of eight metrics employed for the assessment of time accuracy. After discussing two time-simulation functions that are broadly used in the research papers. Authors pointed out the major limit of soft clock function with mathematics proofs as shown in Eqs. 2-11. Surprisingly, the inaccurate timesimulation function proposed in 1987 with 1100 citations. The paper proposes a precise clock simulation with time synchronization function, and network propagation delay. To be best of our knowledge, this is the state-of-the-art simulation combining the time function, the propagation delay, and the time sync attacking together. The remainder of the paper is organized as follows. Section II is the related work. Section III discusses two software clock functions. Section IV introduces the clock simulation with three user scenarios. Section V provide discussion of P-TimeSync simulation. Section VI, and VIII are conclusion, and future work, respectively. II. R ELATED WORK A. Atomic time, GPS time, and Quartz Time In 1955, The utilization of atomic properties for time measurement originated with the commencement of regular operation of the first cesium beam frequency standard at the National Physical Laboratory in the United Kingdom [1]. Now the National Institute of Standards and Technology (NIST) in the United States utilize NIST-F2, a cesium atomic" 2401.01416v1,"Flexible Control Flow Graph Alignment for Delivering Data-Driven Feedback to Novice Programming Learners Md Towhidul Absar Chowdhury a , Maheen Riaz Contractor a , Carlos R. Rivero a a Rochester Institute of Technology, One Lomb Memorial Dr., Rochester, 14623, NY, USA Abstract Supporting learners in introductory programming assignments at scale is a necessity. This support includes automated feedback on what learners did incorrectly. Existing approaches cast the problem as automatically repairing learners’ incorrect programs extrapolating the data from an existing correct program from other learners. However, such approaches are limited because they only compare programs with similar control flow and order of statements. A potentially valuable set of repair feedback from flexible comparisons is thus missing. In this paper, we present several modifications to CLARA, a data-driven automated repair approach that is open source, to deal with real-world introductory programs. We extend CLARA’s abstract syntax tree processor to handle common introductory programming constructs. Additionally, we propose a flexible alignment algorithm over control flow graphs where we enrich nodes with semantic annotations extracted from programs using operations and calls. Using this alignment, we modify an incorrect program’s control flow graph to match correct programs to apply CLARA’s original repair process. We evaluate our approach against a baseline on the twenty most popular programming problems in Codeforces. Our results indicate that flexible alignment has a significantly higher percentage of successful repairs at 46% compared to 5% for baseline CLARA. Our implementation is available at https://github.com/towhidabsar/clara. Keywords: Automated Program Repair, Control Flow Graph, Email addresses: mac9908@rit.edu (Md Towhidul Absar Chowdhury), mc1927@rit.edu (Maheen Riaz Contractor), crr@cs.rit.edu (Carlos R. Rivero) Preprint submitted to Systems and Software January 4, 2024" 2401.01439v1,"Off-Road LiDAR Intensity Based Semantic Segmentation Kasi Viswanath 1 , Peng Jiang 2 , Sujit PB 1 , Srikanth Saripalli 2 1 Department of Electrical Engineering and Computer Science, IISER Bhopal, (kasi18,sujit)@iiserb.ac.in 2 Department of Mechanical Engineering, Texas A&M University, (maskjp,ssaripalli)@tamu.edu Abstract. LiDAR is used in autonomous driving to provide 3D spatial information and enable accurate perception in off-road environments, aiding in obstacle detection, mapping, and path planning. Learningbased LiDAR semantic segmentation utilizes machine learning techniques to automatically classify objects and regions in LiDAR point clouds. Learning-based models struggle in off-road environments due to the presence of diverse objects with varying colors, textures, and undefined boundaries, which can lead to difficulties in accurately classifying and segmenting objects using traditional geometric-based features. In this paper, we address this problem by harnessing the LiDAR intensity parameter to enhance object segmentation in off-road environments. Our approach was evaluated in the RELLIS-3D data set and yielded promising results as a preliminary analysis with improved mIoU for classes ”puddle” and ”grass” compared to more complex deep learning-based benchmarks 3 . The methodology was evaluated for compatibility across both Velodyne and Ouster LiDAR systems, assuring its cross-platform applicability. This analysis advocates for the incorporation of calibrated intensity as a supplementary input, aiming to enhance the prediction accuracy of learning based semantic segmentation frameworks. Keywords: LiDAR Semantic Segmentation, Off-road, LiDAR Intensity. 4 1 Introduction Off-road autonomous driving has recently received much attention with multimodal datasets, improved semantic segmentation frameworks and robust planners. Multiple sensors are employed to perceive and navigate unstructured terrain. The Light Detection and Ranging (LiDAR) sensor provides 3D information that helps to extract geometric data about a scene, while a camera captures 3 4 https://github.com/MOONLABIISERB/lidar-intensity-predictor/tree/main The work is supported by TIH iHUB Drishti-IIT Jodhpur under project number 23 and accepted for publication at International Symposium on Experimental Robotics 2023." 2401.01479v1,"Kernel-U-Net: Hierarchical and Symmetrical Framework for Multivariate Time Series Forecasting Jiang YOU 1,2,3 , René NATOWICZ 2 , Arben CELA 2 , Jacob OUANOUNOU 3 , Patrick SIARRY 1 1 Université Paris-Est Créteil 2 ESIEE Paris 3 HN-Services, Paris {jiang.you, rene.natowicz, arben.cela}@esiee.fr, jouanounou@hn-services.com, siarry@u-pec.fr Abstract Time series forecasting task predicts future trends based on historical information. Recent U-Netbased methods have demonstrated superior performance in predicting real-world datasets. However, the performance of these models is lower than patch-based models or linear models. In this work, we propose a symmetric and hierarchical framework, Kernel-U-Net, which cuts the input sequence into slices at each layer of the network and then computes them using kernels. Furthermore, it generalizes the concept of convolutional kernels in classic U-Net to accept custom kernels that follow the same design pattern. Compared to the existing linear or transformer-based solution, our model contains 3 advantages: 1) A small number of parameters: the parameters size is O(log(L) 2 ) where L is the look-back window size, 2) Flexibility: its kernels can be customized and fitted to the datasets, 3) Computation efficiency: the computation complexity of transformer modules is reduced to O(log(L) 2 ) if they are placed close to the latent vector. Kernel-U-Net accuracy was greater than or equal to the state-of-the-art model on six (out of seven) real-world datasets. 1 Introduction Time series forecasting predicts future trends based on recent historical information. It allows experts to track the incoming situation and react timely in critical cases. Its applications range from different domains such as predicting the road occupancy rates from different sensors in the city [Lai et al., 2018], monitoring influenza-like illness weekly patient cases [Wu et al., 2021], monitoring electricity transformer temperature in the electric power long-term deployment [Zhou et al., 2021] or forecasting temperature, pressure and humidity in weather station [Liu et al., 2022b] etc. Over the past few decades, time series forecasting solutions have evolved from traditional statistical methods (e.g., ARIMA [Khandelwal et al., 2015] and machine learning techniques (e.g., GBRT [Persson et al., 2017]) to deep learning-based solutions, such as RNN recurrent neural networks [Tokgöz and Ünal, 2018], LSTM [Kong et al., 2017], Temporal Convolutional Network (TCN) [Hewage et al., 2020] and Transformer-based model [Li et al., 2019]. Large-scale time series forecasting addresses the problem of predicting a longer future horizon with a larger look-back window. With the increasing size of data, the cost of learning deep models increases crucially. Moreover, models such as LSTM or RNN suffer gradient vanishing problems in learning long sequences. To balance the quality of prediction and efficiency of learning deep models, researchers proposed hierarchical structure in [Duan et al., 2022], pyramidal structure in Pyraformer [Liu et al., 2022a], AutoEncoders [Asres et al., 2022], U-Net-like model in Yformer [Madhusudhanan et al., 2023] or patches in PatchTST [Nie et al., 2023]. Meanwhile, there is an increasing trend in combining different components for learning particular time series. For example in time series classification, researchers studied hybrid models such as combing GRU [Elsayed et al., 2019], LSTM [Lin et al., 2020; Khan et al., 2021] or Transformer [Huang et al., 2020b] with linear or CNN layers [Hewage et al., 2020]. Among the Transformer models applying to time series data, Informer [Zhou et al., 2021], Autoformer [Wu et al., 2021], and FEDformer [Zhou et al., 2022] are the best variants that improve the quality of prediction. Meanwhile, a recent paper [Zeng et al., 2023] gives a simple linear model NLinear which outperforms pure transformer-based models on a variety of common benchmarks and challenges the Transformer models for time series forecasting. Later, the authors in PatchTST [Nie et al., 2023] argued that applying transformer modules on a point-wise sequence degrades the performance. By adding a linear patch layer, they successfully relieved the overfitting problem of transformer modules and they reached state-of-the-art result on several large datasets. We remark that models are particularly sensible to different types of datasets. For example, NLinear is more robust against overfitting in small-size datasets such as Etth and Ettm[Zeng et al., 2023] and PatchTST is more expressive in large-size datasets such as Weather and Traffic etc.[Nie et al., 2023]. At the same time, it is also important to notice the parameter size in Linear models such as NLinear is in O(L 2 ) and the computation complexity is O(L). Meanwhile, the parameter size in a transformer block is O(1) but the computational complexity is O(L 2 ) in general Transformer modules. It is reduced to O(Llog(L)) using Propsparse and to" 2401.01489v1,"The Neuron as a Direct Data-Driven Controller Jason Moore a , Alexander Genkin b , Magnus Tournoy b , Joshua Pughe-Sanford b , Rob R. de Ruyter van Steveninck c , and Dmitri B. Chklovskii a,b,1 This manuscript was compiled on January 4, 2024 In the quest to model neuronal function amidst gaps in physiological data, a promising strategy is to develop a normative theory that interprets neuronal physiology as optimizing a computational objective. This study extends the current normative models, which primarily optimize prediction, by conceptualizing neurons as optimal feedback controllers. We posit that neurons, especially those beyond early sensory areas, act as controllers, steering their environment towards a specific desired state through their output. This environment comprises both synaptically interlinked neurons and external motor sensory feedback loops, enabling neurons to evaluate the effectiveness of their control via synaptic feedback. Utilizing the novel Direct Data-Driven Control (DD-DC) framework, we model neurons as biologically feasible controllers which implicitly identify loop dynamics, infer latent states and optimize control. Our DD-DC neuron model explains various neurophysiological phenomena: the shift from potentiation to depression in Spike-Timing-Dependent Plasticity (STDP) with its asymmetry, the duration and adaptive nature of feedforward and feedback neuronal filters, the imprecision in spike generation under constant stimulation, and the characteristic operational variability and noise in the brain. Our model presents a significant departure from the traditional, feedforward, instant-response McCulloch-Pitts-Rosenblatt neuron, offering a novel and biologically-informed fundamental unit for constructing neural networks. Neuron | Control | Dynamics | ... Despite the wealth of mechanistic insights into neuronal physiology, constructing generalizable models of brain function remains a formidable challenge in neuroscience. This difficulty largely stems from the inherent variability of biological neurons, characterized by an array of challenging-to-quantify parameters like ion channel densities. A promising strategy to overcome this challenge involves developing a normative theory of neuronal function, conceptualizing neuronal physiology as an optimization of a computational objective. Such a normative theory can potentially mitigate the limitations posed by scarce physiological data through a focus on the functional integrity of computational models. Shining examples of such a normative approach are the efficient coding and predictive information theories. Efficient coding (1–7), by maximizing transmitted information under physical constraints, views spike-triggered averages (STAs) as optimal feedforward filters and rationalizes their adaptation with input statistics. Predictive information theories (8–12), by optimizing the encoding of futurerelevant information, have demonstrated quantitative congruence with experimental observations in early sensory areas. These theories apply beyond these areas, as evidenced by the adaptive nature of feedforward filters in other neuronal types (13, 14). However, this perspective does not fully account for certain physiological attributes of neurons. Our analysis reveals that neurons adapt not only their feedforward filters but also their spikehistory-dependent (feedback) filters, suggesting a functional role beyond basic housekeeping operations like sodium channel deinactivation during refractory periods. Furthermore, whereas current injections in neurons with identical high-variance waveforms produce consistent spike trains, constant current injections result in more variable outputs (14). Neither feedback filter adaptation, nor inconsistent response to constant current injections are predicted by efficient coding. While prediction remains a crucial aspect of neuronal computation beyond early sensory areas, it likely isn’t the sole computational objective. Neurons, particularly in motor and pre-motor areas, are tasked with not only forecasting but also influencing future states of the external environment through precise control signals. Additionally, the pervasive presence of feedback loops in the brain (15–18) underscores that neuronal outputs often modulate their own inputs physiologically. These observations have led us to expand the predictive neuron model, incorporating optimal feedback control into the normative framework. We posit that neurons, especially those beyond early sensory areas, act as feedback controllers, aiming to steer their environment toward a desired state, as depicted in Fig. 1A. The neuronal environment encompasses both the circuits of interconnected neurons and external motor sensory loops, allowing the neuron to assess control efficacy through synaptic feedback. At first glance, the task of being a feedback controller may seem daunting for a neuron. To begin with, the dynamics of its environment are not known to the neuron a priori, necessitating learning them from data. Traditional system identification methods tackle this by deducing dynamic parameters (e.g., parameters A, b, and C in linear state-space models, as illustrated in Fig. 1A) from historical observations and control signals (19). These parameters form the basis for deriving a control law that optimizes specific objectives, like optimal or robust control (20). When dealing with low-dimensional or noisy observations, the control law needs to be based not on immediate observations, y, only but on an estimated state, x̂ , (20) derived from past data—a process known as output a Neuroscience Institute, NYU Langone Medical School; b Center for Computational Neuroscience, Flatiron Institute; c Physics Department, Indiana University DC designed research; DC, JM, AG, MT, JPS, performed research, JM, AG analyzed data, RRRS contributed data; DC, JM wrote the paper 1 To whom correspondence should be addressed. E-mail: chklovskii@gmail.com Authors declare no competing interests. Moore et al. Journal | January 4, 2024 | vol. XXX | no. XX | 1–14" 2401.01529v1,"Glance and Focus: Memory Prompting for Multi-Event Video Question Answering 1 Ziyi Bai 1,2 , Ruiping Wang 1,2 , Xilin Chen 1,2 Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS), Institute of Computing Technology, CAS, Beijing, 100190, China 2 University of Chinese Academy of Sciences, Beijing, 100049, China ziyi.bai@vipl.ict.ac.cn, {wangruiping, xlchen}@ict.ac.cn Abstract Video Question Answering (VideoQA) has emerged as a vital tool to evaluate agents’ ability to understand human daily behaviors. Despite the recent success of large vision language models in many multi-modal tasks, complex situation reasoning over videos involving multiple human-object interaction events still remains challenging. In contrast, humans can easily tackle it by using a series of episode memories as anchors to quickly locate question-related key moments for reasoning. To mimic this effective reasoning strategy, we propose the Glance- Focus model. One simple way is to apply an action detection model to predict a set of actions as key memories. However, these actions within a closed set vocabulary are hard to generalize to various video domains. Instead of that, we train an Encoder-Decoder to generate a set of dynamic event memories at the glancing stage. Apart from using supervised bipartite matching to obtain the event memories, we further design an unsupervised memory generation method to get rid of dependence on event annotations. Next, at the focusing stage, these event memories act as a bridge to establish the correlation between the questions with high-level event concepts and low-level lengthy video content. Given the question, the model first focuses on the generated key event memory, then focuses on the most relevant moment for reasoning through our designed multi-level crossattention mechanism. We conduct extensive experiments on four Multi-Event VideoQA benchmarks including STAR, EgoTaskQA, AGQA, and NExT-QA. Our proposed model achieves state-of-the-art results, surpassing current large models in various challenging reasoning tasks. The code and models are available at https://github.com/ByZ0e/Glance-Focus. 1 Introduction For intelligent agent that can assist humans in completing daily-life tasks, complex event reasoning ability is particularly important. Multiple Event Video Question Answering (Multi-Event VideoQA) task [14, 42, 16, 43] has recently been proposed. These benchmarks require agents to reason about complex videos depicting multiple human-object interactions (i.e., events or situations). Furthermore, a wide scope of event-centric questions are involved[14], ranging from event semantic descriptions to event sequencing and dependencies to comprehensively evaluate an agent’s ability to understand human behavior. Recently, the emerged large vision-language models [1, 3, 8, 25, 47, 50] have demonstrated impressive generalization capabilities in VideoQA tasks. By leveraging pre-training on large-scale cross-modal pairs, these models can establish correlations between questions and videos to find answers effectively. Such approaches proves effective for short videos containing single or few events with one-step 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2401.01552v1,"CRA-PCN: Point Cloud Completion with Intra- and Inter-level Cross-Resolution Transformers Yi Rong, Haoran Zhou, Lixin Yuan, Cheng Mei, Jiahao Wang, Tong Lu * Introduction Driven by the rapid development of 3D acquisition technologies, 3D vision is in great demand for research. Among various types of 3D data, point cloud is the most popular description and commonly used in real-world applications (Cadena et al. 2016; Reddy, Vo, and Narasimhan 2018; Rusu et al. 2008). However, due to self-occlusion and limited sensor resolution, acquired point clouds are usually highly sparse and incomplete, which impedes further applications. Therefore, recovering complete point clouds is an indispensable task, whose major purposes are to preserve details of partial observations, infer missing parts, and densify sparse surfaces. * Corresponding author Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. E encoding block G generation block … E inputs generated point clouds G E encoding phase ×𝑟 G G decoding/generation phase inter-level (c) (d) inter-level E ×𝑟 G (b) G ×𝑟 E … Point cloud completion is an indispensable task for recovering complete point clouds due to incompleteness caused by occlusion, limited sensor resolution, etc. The family of coarse-to-fine generation architectures has recently exhibited great success in point cloud completion and gradually became mainstream. In this work, we unveil one of the key ingredients behind these methods: meticulously devised feature extraction operations with explicit cross-resolution aggregation. We present Cross-Resolution Transformer that efficiently performs cross-resolution aggregation with local attention mechanisms. With the help of our recursive designs, the proposed operation can capture more scales of features than common aggregation operations, which is beneficial for capturing fine geometric characteristics. While prior methodologies have ventured into various manifestations of interlevel cross-resolution aggregation, the effectiveness of intralevel one and their combination has not been analyzed. With unified designs, Cross-Resolution Transformer can perform intra- or inter-level cross-resolution aggregation by switching inputs. We integrate two forms of Cross-Resolution Transformers into one up-sampling block for point generation, and following the coarse-to-fine manner, we construct CRA-PCN to incrementally predict complete shapes with stacked upsampling blocks. Extensive experiments demonstrate that our method outperforms state-of-the-art methods by a large margin on several widely used benchmarks. Codes are available at https://github.com/EasyRy/CRA-PCN. (a) inter-level (e) ×𝑟 Abstract … State Key Laboratory for Novel Software Technology, Nanjing University {rongyi, dg1833031, meicheng, wangjh}@smail.nju.edu.cn, hrzhou98@gmail.com, lutong@nju.edu.cn G 1 2 FPS 1 cross-resolution aggregation intra-level 2 FPS ×𝑟 point expansion FPS farthest point sampling Figure 1: Illustration of our main idea. Here, we analyze several point generation methods from the perspective of cross-resolution aggregation (CRA). (a) Common pipeline of coarse-to-fine completion approaches. (b) The plain generation operation simply generates points without considering explicit CRA. (c) & (d) Several methods exploit skip connections to aggregate features of other generated point clouds or partial inputs for the current point cloud, which can efficiently capture multi-scale features. (e) Our method not only extracts more fruitful multi-scale features with noveldesigned enhanced inter-level CRA but also combines intraand inter-level CRA for better capturing geometric characteristics. In the realm of deep learning, various approaches have been proposed to tackle this problem (Yang et al. 2018; Choy et al. 2016; Girdhar et al. 2016; Xie et al. 2020). Especially with the success of PointNet (Qi et al. 2017a) and its successors (Qi et al. 2017b; Wang et al. 2019; Zhao et al. 2021), most approaches recover complete point clouds directly based on 3D coordinates (Yuan et al. 2018; Wen et al. 2020, 2021; Tchapmi et al. 2019; Yu et al. 2021; Wang, Ang Jr, and Lee 2020). Due to the unordered and unstructured nature of point cloud data, learning fine geometric characteristics and structural features is essential for predicting reasonable shapes. To accomplish this aim, mainstreams of the recent methods (Xiang et al. 2021; Zhou et al. 2022; Huang et al. 2020; Yan et al. 2022; Huang et al." 2401.01564v1,"1 Deep Learning Based Superposition Coded Modulation for Hierarchical Semantic Communications over Broadcast Channels Yufei Bo, Shuo Shao, Meixia Tao Abstract—We consider multi-user semantic communications over broadcast channels. While most existing works consider that each receiver requires either the same or independent semantic information, this paper explores the scenario where the semantic information desired by different receivers is different but correlated. In particular, we investigate semantic communications over Gaussian broadcast channels where the transmitter has a common observable source but the receivers wish to recover hierarchical semantic information in adaptation to their channel conditions. Inspired by the capacity achieving property of superposition codes, we propose a deep learning based superposition coded modulation (DeepSCM) scheme. Specifically, the hierarchical semantic information is first extracted and encoded into basic and enhanced feature vectors. A linear minimum mean square error (LMMSE) decorrelator is then developed to obtain a refinement from the enhanced features that is uncorrelated with the basic features. Finally, the basic features and their refinement are superposed for broadcasting after probabilistic modulation. Experiments are conducted for two-receiver image semantic broadcasting with coarse and fine classification as hierarchical semantic tasks. DeepSCM outperforms the benchmarking codedmodulation scheme without a superposition structure, especially with large channel disparity and high order modulation. It also approaches the performance upperbound as if there were only one receiver. Index Terms—Semantic communications, digital modulation, superposition coding, broadcast channel. I. I NTRODUCTION Semantic communication has recently emerged to deliver intelligent services. Departing from the traditional focus on source recovery, it revolutionizes data transmission by extracting and transmitting the “semantic information” crucial for the intelligent tasks at the receiver [2]–[5]. Therefore, semantic communications can significantly improve transmission efficiency and service quality over traditional Shannon-type communications. Leveraging the advantages of deep learning, semantic communication has mainly adopted neural networks (NNs) for semantic coding, which demonstrates superior performance in point-to-point communication scenarios. In particular, NN- based semantic coding has been used to substitute the conventional source coding and/or channel coding to transmit various Y. Bo, and M. Tao are with the Department of Electronic Engineering and Shanghai Key Laboratory of Digital Media Processing and Transmission, Shanghai Jiao Tong University, Shanghai, 200240, China. (emails: {boyufei01, mxtao}@sjtu.edu.cn) S. Shao is with the School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China. (email: shuoshao@sjtu.edu.cn) Part of this work was presented at IEEE GLOBECOM 2023 [1]. source data types including speeches [6], texts [7]–[9], images [10]–[13], videos [14], [15] as well as multi-modal data [16]. It also facilitates the execution of a wide range of intelligent semantic tasks, such as object detection [17], classification [10], and question-answering [16]. Different types of NNs have been employed for the semantic coding of different source data types. For example, the Resnet [18] is often used for image sources [10] while the Transformer [19] is often used for the text sources. Moreover, while earlier semantic communication systems often employ analog modulation to directly transmit through the channel the real-valued output of the NN-based semantic encoder [6], [7], [10], recent advancements have brought forth digital semantic communications by taking into account digital modulation explicitly in [20]–[24]. The works [20], [21] consider codebook-based quantization methods, and the work [22] designs a learned soft-to-hard quantizer. Moreover, the works [23], [24] introduce a novel joint coding-modulation framework for end-to-end design of digital semantic communication systems, which utilizes variational autoencoder (VAE) to output the transition probability from source data to discrete constellation symbols, and can approach the optimal probabilistic constellation shaping under Gaussian channels. While substantial research has been devoted to point-topoint semantic communications [6]–[12], [14], [15], [23], recently there is a growing interest in semantic communications over multi-user channels. Many-to-one semantic communication systems with multiple transmitters and a single receiver are considered in the works [16], [25]–[30]. Specifically, the work [25] introduces a distributed joint source-channel coding (JSCC) scheme for correlated image sources, where each source is transmitted through a dedicated and independent noisy channel to the common receiver. A distributed JSCC scheme for image transmission over Gaussian multiple access channel (MAC) is considered in [26]. The work [27] considers a multi-user fading channel and introduces a channeltransferable semantic communication for orthogonal frequency division multiplexing with non-orthogonal multiple access (OFDM-NOMA) system. Moreover, works [16], [28], [29] consider multi-user channels with a multi-antenna receiver, where [28] considers cooperative object identification, while [16] and [29] address the transmission of multimodal data. Additionally, a novel multiple access technology called model division multiple access (MDMA) is proposed in [30], where both uplink and downlink scenarios are considered. Research on semantic communications over one-to-many" 2401.01572v1,"Hallucinations in Neural Automatic Speech Recognition: Identifying Errors and Hallucinatory Models Rita Frieske HKUST rmfrieske@connect.ust.hk Abstract Hallucinations are a type of output error produced by deep neural networks. While this has been studied in natural language processing, they have not been researched previously in automatic speech recognition. Here, we define hallucinations in ASR as transcriptions generated by a model that are semantically unrelated to the source utterance, yet still fluent and coherent. The similarity of hallucinations to probable natural language outputs of the model creates a danger of deception and impacts the credibility of the system. We show that commonly used metrics, such as word error rates, cannot differentiate between hallucinatory and nonhallucinatory models. To address this, we propose a perturbation-based method for assessing the susceptibility of an automatic speech recognition (ASR) model to hallucination at test time, which does not require access to the training dataset. We demonstrate that this method helps to distinguish between hallucinatory and nonhallucinatory models that have similar baseline word error rates. We further explore the relationship between the types of ASR errors and the types of dataset noise to determine what types of noise are most likely to create hallucinatory outputs. We devise a framework for identifying hallucinations by analysing their semantic connection with the ground truth and their fluency. Finally, we discover how to induce hallucinations with a random noise injection to the utterance. 1 Introduction Recent development of neural architectures brought the improvement of performance among many natural language processing (NLP) tasks, including in automatic speech recognition (ASR). Deep learning architectures that require large amounts of data to achieve optimal performance come, however, with challenges specific to their kind that are not observed in parametric models (Koehn and Knowles, 2017). One such challenge is the appearance of hallucinations, that we Bertram E. Shi HKUST eebert@connect.ust.hk define as fluent and coherent outputs of neural models entirely disconnected from the input. The phenomenon of hallucinations can be observed among different NLP tasks such as machine translation, dialogue systems, question answering, summarization or captioning. Nowadays, with the public deployment of Large Language Models (LLMs) such as ChatGPT, the topic of hallucinations has gained vast attention beyond the scientific community (Alkaissi and McFarlane, 2023). The lack of control over the data that are used to train LLMs increases the probability of creation of hallucinatory outputs. Furthermore, the blurry definition of hallucinations and lack of quantitative theoretical frameworks that would help to distinguish them from other errors impacts the research on finding methods of their removal. Hallucinations are a dangerous model error because of their lack of connection with the model input, but fluent and coherent manner that makes them look like a probable model output. This may confuse and deceive users and creates lack of trust to the model and, in case of publicly deployed LLMs - to the industry. Majority of the scientific articles on hallucinations cover various NLP tasks. There is, however, to our knowledge no literature coverage on this problem for task such as ASR or spoken language understanding (SLU). We try to cover this research gap by addressing specific ways that hallucinations in ASR can be induced through addition of random noise to the utterance, and explore the ability to detect hallucinations through the implementation of an algorithm that produces hallucinations during the testing phase that helps to determine susceptibility of the model to hallucinations. Errors in ASR are an important measure of the system performance. The main difference between phonetic ASR errors and hallucinations lies in the severity of the latter. Phonetic ASR errors appear as badly transcribed words or phrases, especially when utterances are phonetically similar. They are" 2401.01636v2,"Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. Digital Object Identifier 10.1109/ACCESS.2023.0322000 Efficient UAVs Deployment and Resource Allocation in UAV-Relay Assisted Public Safety Networks for Video Transmission NAVEED KHAN 1 , AYAZ AHMAD 1 , ABDUL WAKEEL 2 , ZEESHAN KALEEM 1 , BUSHRA RASHID 3 , and WAQAS KHALID 4 1 Department of Electrical and Computer Engineering, COMSATS University, Islamabad, Wah Campus, Pakistan Electrical Engineering Department, Military College of Signals (MCS), National University of Sciences and Technology (NUST), Islamabad, Pakistan Department of Biomedical Engineering, College of Engineering, King Faisal University, Alahsa, Kingdom of Saudi Arabia 4 Institute of Industrial Technology, Korea University, Sejong 30019, South Korea 2 3 Corresponding authors: Waqas Khalid (waqas283@{korea.ac.kr, gmail.com}) and Ayaz Ahmad (ayaz.uet@gmail.com) This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education(MOE) (NRF-2022R1I1A1A01071807). ABSTRACT Wireless communication highly depends on the cellular ground base station (GBS). A failure of the cellular GBS, fully or partially, during natural or man-made disasters creates a communication gap in the disaster-affected areas. In such situations, public safety communication (PSC) can significantly save the national infrastructure, property, and lives. Throughout emergencies, the PSC can provide mission-critical communication and video transmission services in the affected area. Unmanned aerial vehicles (UAVs) as flying base stations (UAV-BSs) are particularly suitable for PSC services as they are flexible, mobile, and easily deployable. This manuscript considers a multi-UAV-assisted PSC network with an observational UAV receiving videos from the affected area’s ground users (AGUs) and transmitting them to the nearby GBS via a relay UAV. The objective of the proposed study is to maximize the average utility of the video streams generated by the AGUs upon reaching the GBS. This is achieved by optimizing the positions of the observational and relay UAVs, as well as the distribution of communication resources, such as bandwidth, and transmit power, while satisfying the system-designed constraints, such as transmission rate, rate outage probability, transmit power budget, and available bandwidth. To this end, a joint UAVs placement and resource allocation problem is mathematically formulated. The proposed problem poses a significant challenge for a solution. Considering the block coordinate descent and successive convex approximation techniques, an efficient iterative algorithm is proposed. Finally, simulation results are provided which show that our proposed approach outperforms the existing methods. INDEX TERMS Public safety communication networks (PSCNs), UAVs, video transmission, resource allocation. I. INTRODUCTION I N mobile communications, cellular base stations may fail due to natural or man-made disasters. Additionally, deploying advanced networks in some areas can be impractical or too risky for first responders. For example, the Sichuan (China) earthquake, in May 2008, caused significant damage to telecommunication infrastructure [1]. Similarly, the World Trade Center attack on 9/11 led to nearly 3 million users losing cell phone services [2]. In such situations, individuals require guidance, counsel, and real-time information about ongoing situations. Often, they must send requests for help or share their locations with rescue teams. In disaster settings, VOLUME 11, 2023 where cellular networks often fail, it is particularly beneficial for users to establish direct communication with each other [3]. To address these challenges, using an unmanned aerial vehicle (UAV) as a cellular base station (BS) is a key solution that allows fast, seamless, and reliable cellular communication, crucial for public safety [4]. UAVs do not need any restricted and costly calibrations, e.g., cables, and can effortlessly move and dynamically adjust their positions, to yield on-demand cellular communications to affected area ground users (AGUs) in undesirable circumstances [5]. Moreover, UAVs offer a compelling solution for enhancing the functionality of wireless networks in boasting various 1" 2401.01672v1,"Three-dimensional numerical simulation of water freezing and thawing in a container filled with glass beads Pavel Strachota a,∗ a Department of Mathematics, Faculty of Nuclear Sciences and Physical Engineering, Czech Technical University in Prague. Trojanova 13, 120 00 Praha 2, Czech Republic Abstract This work is concerned with numerical simulation of water freezing and thawing at pore scale, resolving the complex threedimensional geometry of the porous medium. The used model of a porous structure represents a container partially filled with spherical glass beads. It has been created artificially by simulation of spheres gradually falling into the container and organizing themselves due to gravity and mutual collisions. For this purpose, an original model has been developed, based on particle interaction forces exponentially decreasing with distance . This model allows for accurate simulation of collisions with the coefficient of restitution anywhere between zero and one. The implementation is notably simple as it employs readily available high order ODE solvers with time step adaptivity, resolving the moments of collision in a natural way. For the modeling of the freezing and thawing processes, two approaches have been utilized: The phase field approach has been compared to the more simple solution of the heat equation in a heterogeneous medium, with phase transitions focusing based on temperature. The phase field approach considers the effects of surface tension leading to premelting, whereas the simplified model assumes that surface tension is neglected. The formulation of both models contains novel components tailored for the given situation. Their numerical solution has been implemented using an efficient hybrid parallel algorithm based on the finite volume method and the Runge-Kutta-Merson solver with adaptive time stepping. Qualitative comparison of the results of both phase transition modeling approaches is performed and the influence of surface tension is analyzed. Numerical stability, accuracy, and computational costs are also discussed. Keywords: numerical simulation, particle collisions, phase field, porous media, water freezing and thawing 1. Introduction Scientific investigation of freezing and thawing of water in porous media has been of continuous interest. Understanding these phenomena and their implications on the mechanics of materials (such as frost heave or cracking) is particularly important in environmental and civil engineering applications in cold regions. It has been observed that the mechanical effects of freezing and thawing are influenced by premelting [1], i.e., the presence of unfrozen water even at subzero temperatures, which is related to phase transitions occurring in complex geometry of the pores. A number of empirical models for predicting unfrozen water content have been proposed [2]. Experimental methods for its measurement are also available [3, 4]. Recently, some approaches in premelting modeling [5] have incorporated several individual physical phenomena, one of which, unsurprisingly, is the surface tension at the liquid–ice interface. Surface tension primarily affects the ice surface in regions with high curvature. In order to obtain relevant information on the geometry of the phase interface, the phase transitions need to be studied at pore scale. As a powerful tool for this purpose, the phase field methods [6, 7] have been used. These methods ∗ Corresponding author. Phone: +420 778 546 112 Email address: pavel.strachota@fjfi.cvut.cz (Pavel Strachota) Preprint submitted to ArXiV originally developed for describing the evolution of solid material microstructure [8, 9] have seen successful developments over the past decades, as numerical implementations targeted simulations of solidification of pure materials [10, 11, 12, 13] and alloys [14, 15] in two and later three spatial dimensions [16]. Recently, high performance GPU-based solvers have been utilized [17, 18] for large scale 3D crystal growth simulations and applications in many other domains have been found [19, 20, 21, 22]. As for modeling freezing and thawing in porous media, phase field models coupled with poro-thermo-hydro-mechanics [23] have been proposed and recent works such as [24, 25] or [26, 27] present numerical simulations with resolved pore matrix in two spatial dimensions. To the author’s best knowledge, threedimensional simulations at pore scale such as [28] have been rare. In this work, we follow up on our previous results in phase field crystal growth modeling [29] and propose several variants of a model of water freezing and thawing in a three-dimensional domain containing a porous medium. An efficient parallel numerical solver has been developed for this model, based on algorithms already presented in [30], [31], and [32]. The grid resolution can be chosen high enough to fully resolve the pore matrix and investigate the geometry of liquid–solid interface within the pores. The presented results are initial steps of the research that January 4, 2024" 2401.01678v1,"Exotic magnetization curves in classical square-kagomé spin lattices Heinz-Jürgen Schmidt ∗ Fachbereich Mathematik/Informatik/Physik, Universität Osnabrück, 49069 Osnabrück, Germany. Johannes Richter Institut für Physik, Universität Magdeburg, P.O. Box 4120, D-39016 Magdeburg, Germany and Max-Planck-Institut für Physik Komplexer Systeme, Nöthnitzer Straße 38, D-01187 Dresden, Germany Classical spin systems with non-coplanar ground states typically exhibit nonlinear magnetization curves characterized by kinks and jumps. Our article briefly summarizes the most important related analytical results. In a comprehensive case study, we then address AF-square kagomé and AF/FM- square kagomé spin lattices equipped with additional cross-plaquette interactions. It is known that these systems have non-coplanar ground states that assume a cuboctahedral structure in the absence of a magnetic field. When a magnetic field H is switched on, a rich variety of different phases develops from the cuboctahedral ground state, which are studied in their dependence on H and a cross-plaquette coupling constant J 3 > 0. For the AF square-kagomé spin lattice, we carefully identify and describe seven phases that appear in a phase diagram with five triple points. The transitions between these phases are predominantly discontinuous, although two cases exhibit continuous transitions. In contrast, the phase diagram of the AF/FM square-kagomé model shows only four phases with a single triple point, but these also lead to exotic magnetization curves. Here, too, there are two types of phase boundaries belonging to continuous and discontinuous transitions. I. INTRODUCTION Classical Heisenberg spin models with exclusively non-coplanar ground states are attractive for various reasons. These non-coplanar ground states break a chiral Z 2 symmetry, leading to phase transitions at finite temperature, even in two space dimensions, while conventional magnetic order is, for the Heisenberg models of interest here, subject to the Mermin-Wagner theorem [1]. Another motif to study such systems is the possible route to arriving at quantum spin liquids via frustration-induced quantum melting of magnetic orders, see [2]. Examples of spin systems with non-coplanar ground states can be found in the recent literature. A non-coplanar ground state called cuboc2 was found in Ref. [3] for the classical AF kagomé with ferromagnetic next-neighbor exchange J 1 and antiferromagnetic 2nd-neighbor exchange J 2 . The analogous cuboc1 phase was first reported in Refs. [4, 5] for the classical AF kagomé with antiferromagnetic next-neighbor exchange J 1 and 3rd-neighbor exchange J d along the diagonals of the hexagons. Later, these phases were systematically analyzed in Ref. [6], and the notations cuboc1 and cuboc2 were introduced to be explained in more detail in the next paragraph. A similar spin system on a lattice with corner-sharing triangles is the square-kagomé Heisenberg antiferromagnet (SKHAF), that was introduced about 20 years ago [7–17]. Over the past five years, this system has attracted increasing attention in theoretical [18–27] as well as experimental [28–32] investigations. A recent study [26] focuses on the SKHAF with longer-range Heisenberg couplings J × and J + across the octagonal plaquettes, see Fig. 1. The spin sites of the square-kagomé lattice can be divided into two non-equivalent classes, class A sites, which form the squares, and class B sites, which are in the middle of the bow ties connecting the squares, see Fig. 1. The couplings between the A spins in the squares are denoted by J 1 and the couplings between the A spins and the B spins by J 2 . For fully antiferromagnetic (AF) bonds, the spin vectors of the classical ground state form a cuboctahedron, one of the 13 Archimedean solids. This ground state shows angles of 120 ◦ between neighboring spin and is called a cuboc1 state. By inverting the sign of J 2 one obtains a variant of the square-kagomé lattice called AF/FM square-kagomé. Its ground state will be the so-called cuboc3 state obtained by flipping the B spins of the cuboc1 state. In this work, we will continue the investigations of [26] by considering the ground states of the AF and AF/FM square-kagomé lattice in the presence of a magnetic field (0, 0, H) giving rise to an additional Zeeman term in the Hamiltonian. Important characteristics to be studied are the magnetization curves M (H) for different values of the coupling constants, S i z −plots of the z components of the ground state spins as a function of H, and the phase diagrams ∗ Electronic address: hschmidt@uos.de" 2401.01688v1,"COMPLETE GEODESIC METRICS IN BIG CLASSES PRAKHAR GUPTA Abstract. Let (X, ω) be a compact Kähler manifold and θ be a smooth closed real (1, 1)-form that represents a big cohomology class. In this paper, we show that for p ≥ 1, the high energy space E p (X, θ) can be endowed with a metric d p that makes (E p (X, θ), d p ) a complete geodesic metric space. The weak geodesics in E p (X, θ) are the metric geodesic for (E p (X, θ), d p ). Moreover, for p > 1, the geodesic metric space (E p (X, θ), d p ) is uniformly convex. Contents 1. Introduction 2. Preliminaries 3. From the Big and Nef to the Prescribed Analytic Singularity 4. Metric on E p (X, θ) 5. Properties of the metric 6. Uniform Convexity for the big and nef classes 7. Contraction Property and a Consequence 8. Uniform Convexity in the big case References 1 3 11 16 22 25 27 29 31 1. Introduction On a compact Kähler manifold (X, ω), the problem of finding the canonical metric in the same cohomology class as ω has a long history. Calabi defined the space H ω = {u ∈ C ∞ (X) : ω + dd c u > 0} of functions that, up to normalization, is equivalent to the space of all Kähler metrics cohomologous to ω. In [Mab87],[Sem92], and [Don99], the authors discovered a Riemannian structure on H ω whose geodesic equation is a homogeneous complex Monge-Ampère equation in one higher dimension. In [Che00], Chen proved that this Riemannian structure gives rise to an honest metric d 2 on H ω by showing that the C 1,1 geodesics joining endpoints are length minimizing. In [Dar17], Darvas showed that the completion of (H ω , d 2 ) is given by (E 2 (X, ω), d 2 ) where E 2 (X, ω) is the space of potentials with finite L 2 -energy, confirming a conjecture of Guedj, [Gue14]. See Section 2 to see the definition of finite energy spaces. He further showed that the potentials u 0 , u 1 ∈ E 2 (X, ω) can be joined by a weak geodesic that lies in E 2 (X, ω) and the path is a metric geodesic for (E 2 (X, ω), d 2 ). By a metric geodesic on a metric space (M, d), we mean a path [0, 1] ∋ t 7→ u t ∈ M such that for any t 0 , t 1 ∈ [0, 1], d(u t 0 , u t 1 ) = |t 0 − t 1 |d(u 0 , u 1 ). In [Dar15], Darvas extended the result to Finsler metric structures on H ω . In particular, for the L p -Finsler structure on H, for p ≥ 1, he obtained a metric d p on H ω whose completion is (E p (X, ω), d p ). The case of p = 1 has found several applications in finding the canonical metrics (see [DR17], [CC21a], [CC21b]). In [DL20a], the authors proved geodesic stability of the K-energy with respect to d 1 metric by approximation from (E p (X, ω), d p ) for p > 1 which they showed are uniformly convex. By finding a formula for the distance in terms of pluripotential theoretic functions, in [DDL18a], Darvas-Di Nezza-Lu showed that the space E 1 (X, θ), for θ representing a big cohomology class, has a complete geodesic metric d 1 . In [DL20b], by approximating from the Kähler case, Di Nezza-Lu found a complete geodesic metric d p on E p (X, β), where β represents a big and nef cohomology class. In both Department of Mathematics, University of Maryland, College Park, Maryland, USA E-mail address: pgupta8@umd.edu. 2000 Mathematics Subject Classification. Primary: 32U05; Secondary: 32Q15, 53C55. Key words and phrases. Kähler Manifolds, Pluripotential Theory, Monge-Ampère Measures, Finite Energy Classes. 1" 2401.01692v1,"Accepted to Appear in the Proceedings of International Conference on Learning Analytics & Knowledge (LAK) 2024 Predicting challenge moments from students’ discourse: A comparison of GPT-4 to two traditional natural language processing approaches Wannapon Suraworachet, Jennifer Seon, Mutlu Cukurova University College London, United Kingdom wannapon.suraworachet.20@ucl.ac.uk ABSTRACT E�ective collaboration requires groups to strategically regulate themselves to overcome challenges. Research has shown that groups may fail to regulate due to di�erences in members’ perceptions of challenges which may bene�t from external support. In this study, we investigated the potential of leveraging three distinct natural language processing models: an expert knowledge rule-based model, a supervised machine learning (ML) model and a Large Language model (LLM), in challenge detection and challenge dimension identi�cation (cognitive, metacognitive, emotional and technical/other challenges) from student discourse, was investigated. The results show that the supervised ML and the LLM approaches performed considerably well in both tasks, in contrast to the rule-based approach, whose e�cacy heavily relies on the engineered features by experts. The paper provides an extensive discussion of the three approaches’ performance for automated detection and support of students’ challenge moments in collaborative learning activities. It argues that, although LLMs provide many advantages, they are unlikely to be the panacea to issues of the detection and feedback provision of socially shared regulation of learning due to their lack of reliability, as well as issues of validity evaluation, privacy and confabulation. We conclude the paper with a discussion on additional considerations, including model transparency to explore feasible and meaningful analytical feedback for students and educators using LLMs. CCS CONCEPTS • Computing methodologies; • Arti�cial intelligence; • Natural language processing; • Discourse, dialogue and pragmatics; • Applied computing; • Education; • Collaborative learning; KEYWORDS Collaborative learning, Discourse analysis, Natural language processing, Challenge moments ACM Reference Format: Wannapon Suraworachet, Jennifer Seon, Mutlu Cukurova. 2024. Predicting challenge moments from students’ discourse: A comparison of GPT-4 to two traditional natural language processing approaches. In The 14th Learning This work is licensed under a Creative Commons Attribution International 4.0 License. LAK ’24, March 18–22, 2024, Kyoto, Japan © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-1618-8/24/03. https://doi.org/10.1145/3636555.3636905 Analytics and Knowledge Conference (LAK ’24), March 18–22, 2024, Kyoto, Japan. ACM, New York, NY, USA, 13 pages. https://doi.org/10.1145/3636555. 3636905 1 INTRODUCTION Collaboration has been highlighted as a key twenty-�rst-century skill, and the increased need to think and work together across disciplines and sectors has only accelerated interdependence [2, 37, 54]. Broadly speaking, collaborative learning (CL) involves learners interacting in smaller groups to construct a shared understanding in an attempt to solve problems or achieve shared goals that would otherwise be di�cult to accomplish alone [10, 28, 44, 47]. It requires mutual e�ort by each group member to negotiate a shared understanding in order to achieve a common goal [13, 28]. CL provides a community of status equals – peers – in which students learn the “skill and partnership” [5, p.642] to co-construct knowledge in a state of continual negotiation, not only for academic purposes but also for their professional and daily lives. Successful collaboration requires more than collegiality or collective sameness; it requires group members to “approach one another as equals and work out concepts through the cogeneration and consensual validation of intellectual strategies. They learn from one another not by copying or adopting the other’s competence . . . but by mutually devising plans together in a collaborative e�ort” [1, p.334]. In essence, collaboration requires learners to engage in regulation of learning (ROL) processes, which involves the collective planning, monitoring, evaluating, and taking control of their own learning to achieve set goals [21]. As the group navigates through the collaborative task, members can individually regulate themselves (self-regulated learning, SRL), co-regulate others (coregulation, Co-RL), and/or collectively regulate as a group (socially shared regulation, SSRL) to overcome the wide range of challenges that may arise [23, 31]. For regulation, group members must �rst acknowledge the challenge moments that might hinder e�ective collaboration and develop suitable strategies to overcome these challenges together [29, 35]. The use of ROL strategies has been linked to higher academic outcomes [6, 45], with research showing groups highly engaged in SSRL processes negotiated shared task perceptions, goals, plans, and strategies [23, 35] while maintaining positive socioemotional interactions, or establishing “mutual trust” to overcome challenges collectively [18]. Without awareness of one’s own SRL and where the group stands as a whole, various perceptions of the challenges can lead to inappropriate or misaligned regulatory processes by group members [20, 28]. However, due to di�erences in personal socio-historical experiences situated in various contexts" 2401.01701v2,"De-Hallucinator: Iterative Grounding for LLM-Based Code Completion ARYAZ EGHBALI, University of Stuttgart, Germany MICHAEL PRADEL, University of Stuttgart, Germany Large languages models (LLMs) trained on datasets of publicly available source code have established a new state-of-the-art in code completion. However, these models are mostly unaware of the code that already exists within a specific project, preventing the models from making good use of existing APIs. Instead, LLMs often invent, or “hallucinate”, non-existent APIs or produce variants of already existing code. Although the API information is available to IDEs, the input size limit of LLMs prevents code completion techniques from including all relevant context into the prompt. This paper presents De-Hallucinator, an LLM-based code completion technique that grounds the predictions of a model through a novel combination of retrieving suitable API references and iteratively querying the model with increasingly suitable context information in the prompt. The approach exploits the observation that LLMs often predict code that resembles the desired completion, but that fails to correctly refer to already existing APIs. De-Hallucinator automatically identifies project-specific API references related to the code prefix and to the model’s initial predictions and adds these references into the prompt. Our evaluation applies the approach to the task of predicting API usages in open-source Python projects. We show that De-Hallucinator consistently improves the predicted code across four state-of-the-art LLMs compared to querying the model only with the code before the cursor. In particular, the approach improves the edit distance of the predicted code by 23–51% and the recall of correctly predicted API usages by 24–61% relative to the baseline. 1 INTRODUCTION Large language models (LLMs) have proven effective in many natural language [Brown et al. 2020] and programming tasks [Bareiß et al. 2022; Chen et al. 2021; Jain et al. 2022; Poesia et al. 2022; Xia and Zhang 2022; Xu et al. 2022]. One of the most promising tasks is code completion, as evidenced by the rapid adoption of LLM-based code completion tools, such as Copilot 1 and Tabnine 2 . Since these models are trained on large corpora of code, they usually generate syntactically correct code, and sometimes even the exact code that the developer intends to write. A crucial factor for obtaining the desired completions is the prompt, i.e., the input given to the LLM. State-of-the-art LLMs build on transformers [Vaswani et al. 2017], which use self-attention to generate sequences of tokens in an auto-regressive process. That is, the model decides what token to predict next based on the tokens in the prompt and any already generated tokens. Hence, designing effective prompts, sometimes called prompt engineering, is a crucial part of developing a practical LLM-based technique [Liu et al. 2021; Nashid et al. 2023; Shrivastava et al. 2023]. For code completion, the prompt typically consists of the incomplete code, and optionally, some additional context. The incomplete code can be at any level of granularity, such as a partial line, an incomplete function, or an incomplete file. The context can be any textual information that may help the model to predict a suitable completion [Jain et al. 2022; Schäfer et al. 2023]. For example, a commonly used prompt is a fixed-size window of code just before the cursor [Chen et al. 2021; Xu et al. 2022], i.e., code that a developer has already written and that may contain hints about what variables, functions, etc. to use in the completion. 1 https://github.com/features/copilot 2 https://www.tabnine.com/ Authors’ addresses: Aryaz Eghbali, Software Lab, University of Stuttgart, Stuttgart, Germany, aryaz.eghbali@iste.unistuttgart.de; Michael Pradel, Software Lab, University of Stuttgart, Stuttgart, Germany, michael@binaervarianz.de. , Vol. 1, No. 1, Article . Publication date: January 2024." 2401.01703v1,"Proposal of detecting topological transition of quantum braiding in three-fold degenerate eigen subspace Zhi-Wei Han, 1 Jia-Hao Liang, 1 Zhao-Xin Fu, 1 Hong-Zhi Liu, 1 Zi-Yuan Chen, 1 Meng Wang, 1 Ze-Rui He, 1 Jia-Yi Huang, 1 Qing-Xian Lv, 1, 2, 3, ∗ Kai-Yu Liao, 1, 2, 3, † and Yan-Xiong Du 1, 2, 3, ‡ 1 Key Laboratory of Atomic and Subatomic Structure and Quantum Control (Ministry of Education), School of Physics, South China Normal University, Guangzhou 510006, China 2 Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials, South China Normal University, Guangzhou 510006, China 3 Guangdong-Hong Kong Joint Laboratory of Quantum Matter, Frontier Research Institute for Physics, South China Normal University, Guangzhou 510006, China The braiding operations of quantum states have attracted substantial attention due to their great potential for realizing topological quantum computations. In this paper, we show that a threefold degenerate eigen subspace can be obtained in a four-level Hamiltonian which is the minimal physical system. Braiding operations are proposed to apply to dressed states in the subspace. The topology of the braiding diagram can be characterized through physical methods once that the sequential braiding pulses are adopted. We establish an equivalent relationship function between the permutation group and the output states where different output states correspond to different values of the function. The topological transition of the braiding happens when two operations overlap, which is detectable through the measurement of the function. Combined with the phase variation method, we can analyze the wringing pattern of the braiding. Therefore, the experimentally-feasible system provides a platform to investigate braiding dynamics, the SU(3) physics and the qutrit gates. I. INTRODUCTION Topological quantum computation has been recognized as one of the most important approaches toward realizing the fault-tolerant quantum computer [1–3]. The scheme relies on the non-Abelian anyons which exist in the degenerate eigen subspace and obey non-Abelian braiding statistics. The unitary gate operations that used to realize quantum computation are carried out by braiding non-Abelian anyons and measuring the final states. The fault-tolerance of the topological quantum computer arises from the nonlocal encoding of the qubits, which makes them immune to errors caused by local perturbations. There have been numerous physical systems proposed to realize topological quantum computers, i.e., the fractional-Hall states [4, 5], cold atoms [6], topological superconductors [7], and the Majorana zero-modes [8]. However, substantial challenges still exist in the real experimental realizations. Recently, two research groups independently realized the simulation of the Ising-type non-Abelian aynons (also called Ising aynons) in superconducting quantum simulators with serial digital quantum gates [9, 10]. The non-Abelian feature and the fusion rules are experimentally simulated in such systems. The above works have demonstrated the topological quantum computation to be experimentally feasible. On the other hand, analog experiments of non-Abelian braiding operations which connect to the topological quantum gates are also investigated [11–21]. To re- ∗ Electronic address: LQX0801@163.com † Electronic address: liaokaiyu1989@163.com ‡ Electronic address: yanxiongdu@m.scnu.edu.cn veal the non-Abelian characteristic, three-fold degenerate eigen states are needed which can be constructed by single-photon interacting with seven waveguide modes in photonic chips [11]. Different light-diffraction patterns correspond to different braiding orders. It is intrinsical the geometric effects since the dynamical phases are trivial during the evolution process. Similar results are also performed in acoustic waveguide modes [13]. Furthermore, the three-fold degenerate states can be induced with two photons interacting with four waveguide modes in photonic chips, which is used to realize threedimensional quantum holonomy [16]. At the same time, it seems that the existed braiding results have no difference from mathematical results with classical braiding (that is, braiding classical objects with different orders will obtain different final states). It would be interesting to ask whether a ‘quantum’ braiding (braiding quantum systems with quantum controls) would be different from a ‘classical’ braiding. To answer the above question, one may resort to a quantum system with a fully controllable Hamiltonian. In this paper, we propose to perform non-Abelian braiding operations in a three-fold degenerate subspace in cold atomic system. The degenerate eigen subspace is constructed in a four-level system which costs the minimal physical resources. Braiding operations of the eigen states are introduced in such systems by imposing dressed pulses upon dressed states. Different braiding orders generate different final states which shows the non-Abelian character. The quantumness of the braiding operations is shown by overlapping two operations that will make topological transition happen. To quantify such transitions, mapping function that are experimentally measurable are introduced to label different final output states. Therefore, the proposal system with three-fold degener-" 2401.01706v1,"Transverse momentum balance of dijets in Xe+Xe collisions at the LHC Yao Li, 1 Shuwan Shen, 1 Sa Wang, 2, ∗ and Ben-Wei Zhang 1, † 1 Key Laboratory of Quark & Lepton Physics (MOE) and Institute of Particle Physics, Central China Normal University, Wuhan 430079, China 2 Key Laboratory of Atomic and Subatomic Structure and Quantum Control (MOE), Institute of Quantum Matter, South China Normal University, Guangzhou 510006, China (Dated: January 4, 2024) We present a theoretical study of the medium modifications on the p T balance (x J ) of dijets √ in Xe+Xe collisions at s NN = 5.44 TeV. The initial production of dijets is carried out by the POWHEG+PYTHIA8 prescription, which matches the next-to-leading order (NLO) QCD matrix elements with the parton shower (PS) effect. The in-medium evolution in nucleus-nucleus collisions is described by the SHELL model with a transport approach. The theoretical results of the dijet x J in Xe+Xe collisions exhibit more imbalanced distributions than that in p+p, consistent with the recently reported ATLAS data. By utilizing the Interleaved Flavor Neutralisation, an infrared-andcollinear-safe jet flavor algorithm, to identify the flavor of the reconstructed jets, we classify dijets processes into three categories: gluon-gluon (gg), quark-gluon (qg) and quark-quark (qq), and investigate the respective medium modification patterns and fraction changes of the gg, qg, and qq components of the dijet sample in Xe+Xe collisions. It is shown that the qg component plays a key role in the increased imbalance of the dijet x J , and especially the q 1 g 2 (quark-jet-leading) dijets experience more significant asymmetric energy loss than the g 1 q 2 (gluon-jet-leading) dijets as traversing the QGP. By comparing the ∆⟨x J ⟩ of inclusive, cc̄ and bb̄ dijets in Xe+Xe collisions, we observe ∆⟨x J ⟩ incl. > ∆⟨x J ⟩ cc̄ > ∆⟨x J ⟩ bb̄ . Moreover, ρ Xe,Pb , the ratios of nuclear modification factors of dijets in Xe+Xe to that in Pb+Pb, are calcualted, which indicates that the yield suppression of dijets in Pb+Pb is more pronounced than that in Xe+Xe due to the larger radius of the lead nucleus. I. INTRODUCTION The ultra-relativistic heavy-ion collisions at the Large Hadron Collider (LHC) and the Relativistic Heavy Ion Collider (RHIC) provide a unique arena to search for the new form of nuclear matter, the quark-gluon plasma (QGP), in which the degrees of freedom of the quarks and gluons in the protons and neutrons are released [1– 5]. The strong interactions between the hard-scattered partons with the medium, referred to as the “jet quenching” phenomenon, open up new avenues to understand the properties of such a fantastic strongly-coupled quark matter [6–9] and test the fundamental theory of quantum chromodynamics (QCD) at the extremely hot and dense conditions [10–16]. In the past two decades, a series of tools have been extensively investigated to reveal this partonic strong interaction, such as the suppression factor R AA of high-p T hadron/jet [17–22], the momentum asymmetry of dijets [23–34], correlations of the vector boson associated jets (γ/Z 0 +jets) [35–40], the global event geometry [41, 42] and the jet substructures [43–52]. Since the dijets are the dominant QCD processes in the hadron collisions in the experiment and have less influence from the underlying background, they show a unique glamour in jet physics. In vacuum, the parton shower effects and higher-order QCD processes may break the symmetry of the final-state dijets, which will lead to a deflection from the back-to-back azimuthal an- ∗ Electronic address: wangsa@ccnu.edu.cn † Electronic address: bwzhang@mail.ccnu.edu.cn gle and an unequal transverse momentum between the leading and subleading jets. In A+A collisions, because the two jets usually experience asymmetric energy loss as traversing the QGP medium, the transverse momentum balance of dijets x J ≡ p T,2 /p T,1 [53], defined as the ratio of the subleading to leading jet p T , can be further modified by the in-medium interactions and show a different sensitivity to the path-length dependence of jet quenching [25] and jet-by-jet fluctuations of jet-medium interactions [54]. And more imbalanced x J distributions of dijets have been observed in Pb+Pb collisions relative √ √ to p+p at s NN = 2.76 TeV and s NN = 5.02 TeV by the ATLAS [23, 53, 55] and CMS Collaborations [28, 56, 57], which are extensively investigated by the theoretical calculations [26, 27, 31–34]. Recently, the ATLAS Collaboration has measured the √ dijet x J in Xe+Xe collisions at s NN = 5.44 TeV for the first time [58], however the timely theoretical studies are still in lack. Because the xenon nucleus has a smaller radius than that of lead, studying the dijet productions in different collision systems will deepen our understanding of the system size dependence of jet quenching effect [53, 55, 59–63]. Furthermore, since the dijet events consist of gg, qg and qq components, while the jet energy loss is closely related to the flavor of hard partons (∆E g /∆E q ∼ C A /C F ) [2, 18], it is of significance to figure out their respective modification patterns and assess what roles they played in the overall medium modifications of the dijet x J . Furthermore, the massive heavy quarks are believed to lose less energy than the light quarks due to the “dead-cone” effect [64–67], which leads to a mass hierarchy of partonic energy loss ∆E q > ∆E c > ∆E b [49, 68–70]. It is of particular in-" 2401.01714v1,"SHARP WEIGHTED INEQUALITIES FOR ITERATED COMMUTATORS OF A CLASS OF MULTILINEAR OPERATORS JIAWEI TAN AND QINGYING XUE ∗ Abstract. In this paper, the sharp quantitative weighted bounds for the iterated commutators of a class of multilinear operators were systematically studied. This class of operators contains multilinear Calderón-Zygmund operators, multilinear Fourier integral operators, and multilinear Littlewood-Paley square operators as its typical examples. These were done only under two pretty much general assumptions of pointwise sparse domination estimates. We first established local decay estimates and quantitative weak A ∞ decay estimates for iterated commutators of this class of operators. Then, we considered the corresponding Coifman-Fefferman inequalities and the mixed weak type estimates associated with Sawyer’s conjecture. Beyond that, the Fefferman-Stein inequalities with respect to arbitrary weights and weighted modular inequalities were also given. As applications, it was shown that all the conclusions aforementioned can be applied to multilinear ω-Calderón-Zygmund operators, multilinear maximal singular integral operators, multilinear pseudo-differential operators, Stein’s square functions, and higher order Calderón commutators. 1. Introduction and main results 1.1. Motivation. The main purpose of this paper is to develop a systematic sharp quantitative weighted theory for iterated commutators of a class of multilinear operators, which includes the classical Calderón-Zygmund operators as well as numerous operators beyond the multilinear Calderón-Zygmund theory. Our motivation lies in three aspects: (1). During the past two decades, the theory of sparse domination has been developing rapidly. It was well known that, the sparse domination approach can significantly simplify the proof of the A 2 conjecture [30], which states that if T is a Calderón-Zygmund operator with a Hölder-Lipschitz kernel, then whether it holds that ∥T f ∥ L 2 (w) ≤ c n,T [w] A 2 ∥f ∥ L 2 (w) , where the definition of [w] A 2 is listed in Section 2.2. Let X be a Banach functions space and define X 1 ˆ A S f (x) = |f (x)|dxχ Q (x), |Q| Q Q∈S where each Q is a cube with its sides parallel to the axis and S is a sparse family of such cubes. In [35], Lerner proved that any standard Calderón-Zygmund operator can be controlled in norm by a family of sparse operators in the way that ∥T f ∥ X ≤ sup ∥A S f ∥ X . S Date: January 4, 2024. Key words and phrases. multilinear operators, iterated commutators, sparse operators, modular inequalities 2020 Mathematics Subject Classification. Primary 42B20, Secondary 42B25. The authors were partly supported by the National Key R&D Program of China (No. 2020YFA0712900) and NNSF of China (No. 12271041). ∗ Corresponding author, e-mail address: qyxue@bnu.edu.cn. 1" 2401.01721v1,"Limited Feedback on Measurements: Sharing a Codebook or a Generative Model? Nurettin Turan ∗ , Benedikt Fesl ∗ , Michael Joham ∗ , Zhengxiang Ma † , Anthony C. K. Soong † , Baoling Sheen † , Weimin Xiao † , and Wolfgang Utschick ∗ ∗ TUM School of Computation, Information and Technology, Technical University of Munich, Germany † Futurewei Technologies, Bridgewater, New Jersey, USA Email: nurettin.turan@tum.de well-established and are part of 3GPP specifications [3]–[5]. The second approach aims to circumvent channel estimation and instead encode feedback information directly from pilot observations, enabled through data-aided approaches, e.g., deep learning [6]–[8]. A promising approach from the latter category, albeit it does not employ deep learning, is a versatile limited feedback scheme based on GMMs [9]. This scheme offers flexibility with respect to various system parameters such as the number of served MTs, the number of pilots, various signal-to-noise ratio (SNR) levels, and the selection of the precoding algorithm. The scheme was further enhanced to support variable feedback bit lengths in [10]. GMMs are generative models with a discrete latent space. Conceptually, a GMM is utilized to learn the underlying channel distribution of the environment of a BS cell. The learned GMM is then transferred to all MTs within the coverage area of the BS, enabling the MTs to exploit the environment knowledge during the online phase to infer feedback information. The computational complexity associated with the inference of the feedback index does not depend on the number of transmit antennas, which is particularly beneficial for massive multiple-input multiple-output (MIMO) systems. Following the MT’s feedback report to the BS, the BS designs I. I NTRODUCTION precoders using either a directional information-based method or a generative modeling-based approach. In the upcoming generation of cellular communication Although the GMM-based limited feedback scheme is a systems (6G), the BS can adapt to dynamic channel conditions. promising candidate for supporting future generations of cellu- In FDD systems, this adaptation relies on channel state lar systems (6G), it is yet unclear how the performance gain information (CSI) feedback from the MTs due to the absence that was observed for synthetic data, e.g., through stochasticof channel reciprocity [1]. In particular, limited feedback geometric channel models, transfers to real-world systems. systems characterized by only a few bits representing the Thereby, a comparison to the well-established DFT codebookfeedback information are of significant interest [1]. In this based feedback scheme is of particular practical importance. regard, two primary approaches can be identified. The first In this work, we address the question of whether sharing the entails estimating the downlink (DL) channel at the MTs and knowledge of a generative model, i.e., the GMM, at the BS subsequently determining the feedback information using a and the MTs is advantageous as compared to shared DFT- codebook [1], [2]. In scenarios with spatial correlation due based codebook knowledge by evaluating and comparing the to specific antenna geometries, DFT-based codebooks are two feedback schemes on real-world data from a measurement ∗ The authors acknowledge the financial support by the Federal Ministry of campaign. Our analyses reveal that the GMM-based feedback Education and Research of Germany in the program of “Souverän. Digital. scheme, which is tailored to the BS cell environment, provides Vernetzt.”. Joint project 6G-life, project identification number: 16KISK002. a robust solution with huge performance gains as compared to ©This work has been submitted to the IEEE for possible publication. the DFT-based codebook solution, especially in systems with Copyright may be transferred without notice, after which this version may no longer be accessible. low pilot overhead that are of crucial importance in massive Abstract—Discrete Fourier transform (DFT) codebook-based solutions are well-established for limited feedback schemes in frequency division duplex (FDD) systems. In recent years, dataaided solutions have been shown to achieve higher performance, enabled by the adaptivity of the feedback scheme to the propagation environment of the base station (BS) cell. In particular, a versatile limited feedback scheme utilizing Gaussian mixture models (GMMs) was recently introduced. The scheme supports multi-user communications, exhibits low complexity, supports parallelization, and offers significant flexibility concerning various system parameters. Conceptually, a GMM captures environment knowledge and is subsequently transferred to the mobile terminals (MTs) for online inference of feedback information. Afterward, the BS designs precoders using either directional information or a generative modeling-based approach. A major shortcoming of recent works is that the assessed system performance is only evaluated through synthetic simulation data that is generally unable to fully characterize the features of real-world environments. It raises the question of how the GMM-based feedback scheme performs on real-world measurement data, especially compared to the well-established DFT-based solution. Our experiments reveal that the GMM-based feedback scheme tremendously improves the system performance measured in terms of sum-rate, allowing to deploy systems with fewer pilots or feedback bits. Index Terms—Gaussian mixture models, machine learning, limited feedback, precoding, measurement data." 2401.01724v1,"IEEE TRANSACTIONS ON MULTIMEDIA 1 Lightweight Adaptive Feature De-drifting for Compressed Image Classification Long Peng*, Yang Cao*, Member, IEEE, Yuejin Sun, Student Member, IEEE and Yang Wang† Abstract—JPEG is a widely used compression scheme to efficiently reduce the volume of the transmitted images at the expense of visual perception drop. The artifacts appear among blocks due to the information loss in the compression process, which not only affects the quality of images but also harms the subsequent high-level tasks in terms of feature drifting. Highlevel vision models trained on high-quality images will suffer performance degradation when dealing with compressed images, especially on mobile devices. In recent years, numerous learningbased JPEG artifacts removal methods have been proposed to handle visual artifacts. However, it is not an ideal choice to use these JPEG artifacts removal methods as a pre-processing for compressed image classification for the following reasons: 1) These methods are designed for human vision rather than highlevel vision models. 2) These methods are not efficient enough to serve as a pre-processing on resource-constrained devices. To address these issues, this paper proposes a novel lightweight adaptive feature de-drifting module (AFD-Module) to boost the performance of pre-trained image classification models when facing compressed images. First, a Feature Drifting Estimation Network (FDE-Net) is devised to generate the spatial-wise Feature Drifting Map (FDM) in the DCT domain. Next, the estimated FDM is transmitted to the Feature Enhancement Network (FE- Net) to generate the mapping relationship between degraded features and corresponding high-quality features. Specially, a simple but effective RepConv block equipped with structural reparameterization is utilized in FE-Net, which enriches feature representation in the training phase while keeping efficiency in the deployment phase. After training on limited compressed images, the AFD-Module can serve as a “plug-and-play” module for pre-trained classification models to improve their performance on compressed images. Experiments on images compressed once (i.e. ImageNet-C) and multiple times demonstrate that our proposed AFD-Module can comprehensively improve the accuracy of the pre-trained classification models and significantly outperform the existing methods. Index Terms—JPEG compression, Feature Drifting, Image Classification, Feature Enhancement I. I NTRODUCTION W ITH the development of imaging technology and the popularity of mobile multimedia, the spread of highresolution images/videos is growing explosively. In order to save image/video transmission bandwidth and improve data transmission efficiency, lossy compression technology, * Long Peng and Yang Cao contributed equally to this paper. † Yang Wang is the corresponding author of this paper. This work was supported by the Natural Science Foundation of China, No. 62206262. Yang Wang, Yuejun Sun, and Yang Cao are with the School of Information Science and Technology, University of Science and Technology of China, Hefei 230026, China. (e-mail: ywang120@ustc.edu.cn, yjsun97@mail.ustc.edu.cn, forrest@ustc.edu.cn). Long Peng is with the Institute of Advanced Technology, University of Science and Technology of China, Hefei 230026, China. (e-mail: longp2001@mail.ustc.edu.cn). √ ... ... ... JPEG Compress Pixel Feature Pre-trained Classfication model ... ... ... × Fig. 1. The degree of quality degradation varies greatly from region to region and has a strong correlation with the richness of details. The regions with more structure details suffer more high-frequency information loss, which leads to more heavy feature drifting problems for image recognition. such as JPEG, is widely embedded in mobile multimedia devices. However, the high-frequency signal of the image will be discarded in the lossy compression process, which will introduce artifacts into the image and reduce the image quality. As shown in Fig. 1, JPEG compression will result in multiple degrees of artifacts across the image. The regions with more tiny details will lose more high-frequency information compared to smoother regions. With the increase of image transmission times between mobile devices, the image will be continuously compressed multiple times, resulting in the artifact being gradually enlarged [2], as shown in Fig.3. These compression artifacts not only deteriorate the quality of visual perception but also destroy the image’s structural and statistical properties, leading to feature fidelity degradation and performance degradation for high-level computer vision tasks. In this article, we focus on improving the recognition performance of JPEG-compressed images, which is the most widely used lossy compression technique in mobile devices. The reason for feature drifting is that lossy compression changes the inherent properties of images. The JPEG compression scheme divides an image into 8×8 blocks and applies Discrete Cosine Transformation (DCT) and quantization to each block individually. However, due to the variations in structural and statistical properties across blocks, the lossy high-frequency components are also different for each block. And this leads to inconsistent feature drifting across blocks, resulting in a spatial-varied feature drifting for compressed images, as shown in Fig. 2 (a)." 2401.01734v1,"Learning Keypoints for Robotic Cloth Manipulation using Synthetic Data Thomas Lips 1 , Victor-Louis De Gusseme 1 and Francis wyffels 1 Abstract— Assistive robots should be able to wash, fold or iron clothes. However, due to the variety, deformability and selfocclusions of clothes, creating general-purpose robot systems for cloth manipulation is challenging. Synthetic data is a promising direction to improve generalization, though its usability is often limited by the sim-to-real gap. To advance the use of synthetic data for cloth manipulation and to enable tasks such as robotic folding, we present a synthetic data pipeline to train keypoint detectors for almost flattened cloth items. To test its performance, we have also collected a real-world dataset. We train detectors for both T-shirts, towels and shorts and obtain an average precision of 64.3%. Fine-tuning on realworld data improves performance to 74.2%. Additional insight is provided by discussing various failure modes of the keypoint detectors and by comparing different approaches to obtain cloth meshes and materials. We also quantify the remaining sim-toreal gap and argue that further improvements to the fidelity of cloth assets will be required to further reduce this gap. The code, dataset and trained models are available at https: //github.com/tlpss/synthetic-cloth-data. Index Terms— Deep Learning for Visual Perception, Simulation and Animation, Data Sets for Robotic Vision I. I NTRODUCTION Clothes are everywhere in our living environments. Therefore assistive robots should be able to interact with cloth items and perform tasks such as washing, folding or ironing. However, due to their variety in shape and appearance, complex deformations and self-occlusions, cloth manipulation and perception are challenging [1], [2]. Progress has been made in recent years thanks to the continued integration of data-driven techniques [3]–[5] and the development of new hardware [6], but we do not yet have robots that can reliably flatten, fold or iron arbitrary pieces of cloth. Part of the reason is that we lack the required amount of data to make these systems generalize. The use of synthetic data has proven an effective direction to overcome this data limit in various domains of robotics [7]–[9] and beyond [10]. Synthetic data can provide arbitrary amounts of perfectly annotated data, but the main concern is to bridge the gap between synthetic and real data, as perfectly covering the real data distribution is often infeasible. Various approaches have been explored to overcome this [7], [8], [10], [11], yet a great deal of engineering effort is usually involved in making sim-to-real work. In this paper, we want to enable generic robot folding. To this end, we generate synthetic data to learn keypoints on various cloth items. We focus on detecting non-occluded 1 AI and Robotics Lab, Ghent University - imec Technologiepark 126, 9052 Zwijnaarde, Belgium corresponding author: Thomas.Lips@UGent.be Fig. 1. In this work we learn to detect semantic keypoints on almostflattened clothes in everyday environments. To tackle the large diversity in cloth states, cloth materials and environments, we generate synthetic data to train these keypoint detectors. keypoints from an RGB image of almost flattened clothes for various cloth categories. Using these keypoints, tasks such as folding flattened clothes can be achieved with scripted motions [5], [12], [13]. Several prior works use synthetic data for cloth manipulation [5], [14], [15] but to the best of our knowledge, none have tackled this specific setting. Furthermore, we are also the first to compare the performance of different procedures to obtain cloth meshes and materials. We generate synthetic data for three different cloth categories: T-shirts, towels and shorts. This process has three stages: We first procedurally create cloth meshes. In the second stage, these meshes are dropped and deformed to mimic the output of current unfolding systems, for which we use Nvidia Flex [16]. Finally, we render images of the clothes and generate the corresponding annotations. To provide real-world training data and to thoroughly evaluate the performance of the keypoint detectors, we have also gathered a dataset of almost 2,000 images containing more than 100 cloth items. We find that keypoint detectors trained on our synthetic data have a mean average precision of 64.3 % on our test dataset, which is an improvement over the baseline trained only on real data. Fine-tuning using real data further improves performance to 74.2%. These results show that our synthetic data pipeline can be used to build state estimators for robotic cloth folding systems. Additionally, we compare several different procedures to generate cloth meshes and materials where we find that the best results are obtained by using random materials and single-layer cloth meshes, even though this decreases fidelity. Finally, we quantify the remaining sim-to-real gap and argue that this gap can only be closed by further advancements in cloth asset generation" 2401.01737v1,"MNRAS 000, 1–24 (2022) Preprint 4 January 2024 Compiled using MNRAS L A TEX style file v3.0 Necessary conditions for the formation of filaments and star clusters in the cold neutral medium Rachel Pillsworth 1 ★ , Ralph E. Pudritz 1,2,3,4 1 Department of Physics & Astronomy, McMaster University, 1280 Main St West, Hamilton, ON L8S 4L8, Canada 2 Origins Institute, McMaster University, Hamilton, ON L8S 4M1 3 Universität Heidelberg, Zentrum für Astronomie, Institut für Theoretische Astrophysik, Albert-Ueberle-Str. 2, 69120 Heidelberg, Germany 4 Max-Planck Institut für Astronomie, Königstuhl 17, D-69117 Heidelberg, Germany Accepted XXX. Received YYY; in original form ZZZ ABSTRACT Star formation takes place in filamentary molecular clouds which arise by physical processes that take place in the cold, neutral medium (CNM). We address the necessary conditions for this diffuse (𝑛 ≈ 30 cm −3 ), cold (T ≈ 60 K), magnetized gas undergoing shock waves and supersonic turbulence, to produce filamentary structures capable of fragmenting into cluster forming regions. Using RAMSES and a magnetized CNM environment as our initial conditions, we simulate a 0.5 kpc turbulent box to model a uniform gas with magnetic field strength of 7 𝜇𝐺, varying the 3D velocity dispersion via decaying turbulence. We use a surface density of 320𝑀 ⊙ 𝑝𝑐 −2 , representative of the inner 4.0 kpc CMZ of the Milky Way and typical luminous galaxies. Filamentary molecular clouds are formed dynamically via shocks within a narrow range of velocity dispersions in the CNM of 5 - 10 km/s with a preferred value at 8 km/s. Cluster sink particles appear in filaments which exceed their critical line mass, occurring optimally for velocity dispersions of 8 km/s. Tracking the evolution of magnetic fields, we find that they lead to double the dense star forming gas than in purely hydro runs. Perpendicular orientations between magnetic field and filaments can increase the accretion rates onto filaments and hence their line masses. Because magnetic fields help support gas, MHD runs result in average temperatures an order of magnitude higher than unmagnetized counterparts. Finally, we find magnetic fields delay the onset of cluster formation by ∝ 0.4 Myr. Key words: MHD – turbulence – methods:numerical – stars:formation – ISM:clouds – ISM:structure 1 INTRODUCTION Molecular clouds represent the intermediate galactic scales (100s of pc) at which large scale galactic structure and evolution gives way to more localized star formation in forming star clusters. The multiple scale nature of this process has been explored within molecular clouds by the Herschel space observatory, and larger galactic scale studies of molecular cloud populations by PHANGS-ALMA. Over a decade ago, Herschel made a major breakthrough by revealing the ubiquitous filamentary networks that comprise molecular clouds in which star-forming cores form on subpc scales (Alves de Oliveira et al. 2014; André et al. 2010; Henning et al. 2010; Men’shchikov et al. 2010). PHANGS is a recent addition to the research, and produced the largest catalogue (100,000) of individually resolved molecular clouds across multiple galaxies (Lee et al. 2022; Sun et al. 2022; Turner et al. 2022; Brunetti & Wilson 2022). It reveals the connection between molecular cloud properties and their galactic environments across a large array of galaxies (Thilker et al. 2021). Molecular clouds are believed to condense out of a phase of the interstellar gas known as the cold neutral medium (CNM) in which they are embedded (Klessen & Glover 2016; Chevance et al. 2022). ★ Contact e-mail: pillswor@mcmaster.ca © 2022 The Authors It is therefore essential to understand the dynamics and thermal evolution of the CNM - in particular under what conditions molecular clouds and their star clusters may form in it. For instance, Sun et al. (2022) use the PHANGS survey to show that molecular cloud properties depend on local environmental properties such as gas surface density and star formation density. On the galactic scale, they find it is primarily galactic shear that affects the final properties of molecular clouds. These recent surveys have given a much better picture of the properties of entire populations of GMCs both within and outside the Milky Way, although they are not yet sufficient to penetrate scales below the star cluster. Many of the galactic observations are well supported by theoretical and computational work. As one example, the results in Sun et al. (2022) compare well to the simulations of Jeffreson et al. (2020), in that both studies show that cloud properties depend on some local and some galactic environmental properties. Jeffreson et al. (2020) showed that rotation in the galactic disk influenced the geometry and rotation of the molecular clouds which formed within it. Conversely, their work finds that gravo-turbulent and star formation properties of the molecular clouds are somewhat disconnected from the overall galactic disk dynamics, supporting an agreement with Sun et al. (2022) that the gas and star formation densities are tied to local environment. Additionally, simulations from Grisdale (2021) showed" 2401.01739v2,"IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED JANUARY, 2024 1 A Soft Continuum Robot with Self-Controllable Variable Curvature Xinran Wang 1 , Qiujie Lu 1,2 , Dongmyoung Lee 1 , Zhongxue Gan 2 , and Nicolas Rojas 1 Abstract—This paper introduces a new type of soft continuum robot, called SCoReS, which is capable of self-controlling continuously its curvature at the segment level; in contrast to previous designs which either require external forces or machine elements, or whose variable curvature capabilities are discrete—depending on the number of locking mechanisms and segments. The ability to have a variable curvature, whose control is continuous and independent from external factors, makes a soft continuum robot more adaptive in constrained environments, similar to what is observed in nature in the elephant’s trunk or ostrich’s neck for instance which exhibit multiple curvatures. To this end, our soft continuum robot enables reconfigurable variable curvatures utilizing a variable stiffness growing spine based on microparticle granular jamming for the first time. We detail the design of the proposed robot, presenting its modeling through beam theory and FEA simulation—which is validated through experiments. The robot’s versatile bending profiles are then explored in experiments and an application to grasp fruits at different configurations is demonstrated. A narrated video detailing the work can be seen at https://youtu.be/H6SCK0NjGpE. soft continuum robot (i.e., the same stiffness across a section) include fiber jamming [7], scale jamming [8], shape memory alloy (SMA) [9], layer jamming [10], and pressurized fluidic compartments [11]. Index Terms—Continuous stiffness regulation, variable curvature, soft robot applications, soft robot materials and design. I. I NTRODUCTION OFT continuum robots are in general flexible and adaptive. This feature allows them to be more easily actuated with less actuators than degrees of freedom and achieve more complex motions in constrained environments. However, the common approach for soft continuum robots to have more bending profiles to increase dexterity is adding more sections or segments [1][2][3][4]. This strategy is effective but usually implies adding more actuators to control the continuum robot, while increasing design complexity. Exploring stiffness change inside soft robots has become a popular approach to achieve a more dexterous workspace and higher external loads. The stiff-flop manipulator, for instance, explored granular jamming using coffee powder to allow stiffness change on silicone rubber-based soft continuum robots [5]. Tendon-driven continuum robots can also utilize granular jamming to alter its curvature [6]. Other alternative options for achieving uniform stiffness changes for each section of a S Manuscript received: September, 25, 2023; Revised December, 7, 2023; Accepted January, 1, 2024. This paper was recommended for publication by Editor Yong-Lae Park upon evaluation of the Associate Editor and Reviewers’ comments. This work was supported in part by the Natural Science Foundation of China under Grant 52305013, and by the Shanghai Pujiang Program (22PJD006). 1 REDS Lab, Dyson School of Design Engineering, Imperial College London, 25 Exhibition Road, London, SW7 2DB, UK (xinran.wang20, q.lu17, d.lee20, and n.rojas)@imperial.ac.uk 2 Academy for Engineering and Technology, Fudan University, 200433, Shanghai, China. (qj_lu, ganzhongxue)@fudan.edu.cn Fig. 1. (A) Illustration of controllable curvatures when the robot is pressurized at 250kPa. (B) Inner structure: The soft continuum robot has a hollow channel that allows the growing spine to travel inside. The jammed spine then creates a high stiffness inside while the remaining length is flexible. With the same control inputs, it creates different bending profiles. (C) Realizing concept: The growing spine filled with granules changes length using positive pressure and length control. Using negative pressure, it increases stiffness by granular jamming. Recently, there has been a greater focus on a nonuniform stiffness change regardless of the number of actively actuated sections on the continuum robot, allowing an even more dexterous motion thanks to the resulting variable curvatures. Methods reported include using position locking with SMA, magnets, screws, or tendons along the robots [12][13][14][15][16][17]. Other approaches use preprogrammed springs or disks and add them to the continuum robot to alter its local stiffness [18] [19]. These methods for achieving variable curvatures have limitations due to the number of locking mechanisms or the need for manual configuration in advance. Soft robots with continuously changing stiffness are still an area of limited research, and current approaches often rely on rigid materials such as rods or steel tubes with patterns to alter stiffness [20][21]. Soft continuum robots that take inspiration from vine robots [22], known for their steering ability and growth capabilities, have recently been developed. These continuum robots feature an additional controllable parameter—length [23]. The benefit of such soft continuum robot comes from the material everting from inside, allowing it to travel under different" 2401.01756v3,"Fuzzy Logic Controller Design for Mobile Robot Outdoor Navigation Assefinew Wondosen* and Dereje Shiferaw** *Adama Sceince and Technology University, wondebly@gmail.com **Addis Ababa Institute of Technology, dnderejesh@gmail.com April 2017 Abstract Many researchers around the world are researching to get control solutions that enhance robots’ ability to navigate in dynamic environments autonomously. However, until these days robots have limited capability and many navigation tasks on Earth and other planets have been difficult so far. This paperwork presents the development of a control system for a differential drive-wheeled mobile robot that autonomously controls its position, heading, and speed based on destination information given and surrounding data gathered through mounted proximity and GPS sensors. The intelligence of this control system is implemented by using a fuzzy logic algorithm which is a very powerful tool to handle un-modeled systems like the dynamically changing environment dealt with in this research. The fuzzy controller is used to address the problems associated with navigation in an obstacle-strewn environment. Such issues include position estimation, path planning, and obstacle avoidance. In this study modeling, design, and simulation of the system have been done. The simulation result shows that the developed mobile robot travels successfully from any location to the destination location without colliding with obstacles. Keywords:- Mobile Robot; Fuzzy Logic; Navigation; Obstacle avoidance https://github.com/WondesenB/FuzzyMobileRobotGuidance.git 1 Introduction Currently, research in autonomous mobile robots gained an extensive interest. This is due to the wish to replace human with robots in dangerous tasks and to use them in everyday life tasks and industry. Different types of mobile robots are under research and used for different purposes. These are wheeled, legged, aerial, underwater, and humanoid robots [1]. In this paper wheeled mobile robot outdoor navigation challenge is chosen for study. Mobile robots are Electro-mechanical devices capable of moving in an environment with a certain degree of autonomy [15]. Autonomous navigation is assisted by different information-gathering sensors. The most common sensors are distance sensors (ultrasonic, laser, etc.) capable of detecting obstacles closer to the robot’s path [15]. The other is the Global Positioning System (GPS) sensor which identifies the robot’s location. Knowledge of self-location, and the location of other places of interest in the world, is the basic foundation on which all high-level navigation operations are built. Therefore, knowing the location enables strategic path planning for tasks such as goal searching, region coverage, 1" 2401.01778v1,"Anisotropic Ginzburg-Landau model for superconductivity with five-dimensional operators M. C. Araújo, 1, ∗ I. C. Jardim, 2 D. F. S. Veras, 3 and J. Furtado 3, 4 1 Universidade Federal do Ceará (UFC), Departamento de Física, Campus do Pici, Fortaleza - CE, C.P. 6030, 60455-760 - Brazil. 2 Departamento de Física, Universidade Regional do Cariri, 57072-270, Juazeiro do Norte, Ceará, Brazil 3 Centro de Ciências e Tecnologia, Universidade Federal do Cariri, 63048-080, Juazeiro do Norte, Ceará, Brazil 4 Department of Physics, Faculty of Science, Gazi University, 06500 Ankara, Turkey † (Dated: January 4, 2024) This paper presents the effects of non-minimal Lorentz-violation operators in superconductivity. By constructing a Lorentz-Violating Ginzburg-Landau theory of superconductivity with a five-dimensional operator, we discuss the influence of higher dimensional Lorentz-Violating operators in the London’s depth penetration, in the coherence length and critical magnetic field. I. INTRODUCTION In recent years, there has been a focus on exploring potential expansions of the Standard Model (SM). Within this framework, the discussion has shifted towards the breaking of Lorentz and CPT symmetries, considered as a significant subject [1–6]. Typically, Lorentz symmetry is disrupted by introducing specific directions in space-time, represented by additive terms that are proportionate to small constant vectors or tensors. The Standard Model Extension (SME) [5, 6] stands out as the most established model addressing the consequences of Lorentz and CPT symmetry violation. SME, being an effective field theory, incorporates all conceivable terms violating Lorentz and CPT symmetries in its Lagrangian. Kostelecky [7]. proposed an extension of the scalar sector incorporating Lorentz-violating effects. This model presents a comprehensive effective scalar field theory across any spacetime dimension, featuring explicit perturbative spinindependent Lorentz-violating operators of arbitrary mass dimension. The significance of this development lies in the predominance of spin in most fundamental particles of the SM, with the Higgs boson being the sole example of a fundamental spinless particle. Despite the relatively minor role of the scalar sector of QED (sQED) compared to strong interactions in describing meson coupling, it has been suggested [8] that a Lorentz-violating extension of sQED could effectively address slight CPT deviations in neutral-meson oscillations. The minimal extension of SME was extensively studied in the last years in several contexts, such as radiative corrections [9–11], neutrinos oscillations [12–14], Euler-Heisenberg effective action [11, 15], gravitational context [16, 17], finite temperature field theory [17–21] among others (for a more complete review, see f.e. [22]). The non-minimal extension, despite its posses only nonrenormalizable terms, have been receiving attention in the literature [23, 29–32]. A strong motivation lies in the fact that some relevant astrophysical processes impose severe restrictions on the coefficients associated with the operators with dimension d ≥ 5, being such contribu- ∗ Electronic address: michelangelo@fisica.ufc.br † Electronic address: job.furtado@ufca.edu.br tions comparable or even dominant when compared with the ones that arise from dimension d ≤ 4 operators. Within the nonminimal LV framework, an important role was played by the paper [32], in which the simplest cases of such operators were, for the very first time, introduced in the LV scenario. The first studies of their perturbative impact were investigated in [24–27, 30]. And finally, all possible LV extensions of SME with dimensions up to 6 for fermion-dependent operators were listed in [28]. The potential applications of models violating Lorentz and CPT symmetries span various fields, extending from quantum field theory to condensed matter physics. The intersection of Lorentz-violating models and condensed matter physics has garnered significant attention, particularly in the context of Weyl semimetals [33–36], superconductivity [37– 39], graphene with anisotropic scaling [40], dark matter and black holes analog models [41, 42], among others. The Ginzburg-Landau (GL) theory of superconductivity serves as a construct within effective quantum field theory, elucidating several crucial facets of superconductivity [43]. Despite its initial classification as a phenomenological theory, the GL theory can be construed as a specific case arising from the Bardeen-Cooper-Schrieffer (BCS) theory of superconductivity [44]. The exploration of superconductivity in diverse realms, such as Weyl semimetals [45–47] and carbonbased nanostructures like graphene and fullerene [48, 49] is frequently undertaken in literature due to their potential applications for technological advancements. However, recent years have seen an intensified discourse on the theoretical aspects of superconductivity, extending into domains such as astrophysics [50, 51], cosmology [52, 53] and in high energy physics [54, 55]. Recently, studies of anisotropic superconductors were carried out by considering Lorentz-violating terms inspired by the SME [38]. The authors have shown in [38] that the coherence length and critical magnetic field are not affected by Lorentz-violating modifications in the scalar sector, but the London’s depth penetration in modified by the Lorentz-violating contributions. In this study we consider a Lorentz-violating complex scalar sector coupled non-minimally with the gauge field, the usual Maxwell term as the gauge sector and λ|ϕ| 4 promoting the spontaneous symmetry breaking. We discuss the influence of a higher dimensional Lorentz-Violating operator in" 2401.01786v1,"An experimental sorting method for improving metagenomic data encoding Diogo Pratas 1,2,3 and Armando J. Pinho 1,2 1 IEETA/LASI - Institute of Electronics and Informatics Engineering of Aveiro 2 DETI - Department of Electronics, Telecommunications and Informatics University of Aveiro, 3810-193 Aveiro, Portugal, {pratas,ap}@ua.pt 3 DoV - Department of Virology, University of Helsinki, 00014 Helsinki, Finland Abstract Minimizing data storage poses a significant challenge in large-scale metagenomic projects. In this paper, we present a new method for improving the encoding of FASTQ files generated by metagenomic sequencing. This method incorporates metagenomic classification followed by a recursive filter for clustering reads by DNA sequence similarity to improve the overall reference-free compression. In the results, we show an overall improvement in the compression of several datasets. As hypothesized, we show a progressive compression gain for higher coverage depth and number of identified species. Additionally, we provide an implementation that is freely available at https://github.com/cobilab/mizar and can be customized to work with other FASTQ compression tools. Introduction Metagenomics is the study of genetic material collected from environmental samples, providing insights into the diversity, composition, and functional potential of microbial communities in various ecosystems. This includes permeates extreme ecosystems, such as uranium mines [1], intricate landscapes of both soft and hard tissues [2, 3], vital food crops [4], expansive marine habitats [5], or in enigmatic depths of subterranean ecosystems [6]. Metagenomics data is the digital material recovered from these samples by a method called sequencing, specifically using a format called FASTQ. The FASTQ format contains multiple reads, usually millions or billions. FASTQ reads are constituted by three channels of information: headers, DNA sequences, and quality-scores. In each read, DNA sequences and quality-scores must have the same number of characters, usually 150 or 250 characters. More recently, the technology of long reads is generating reads with several thousand or tens of thousand symbols, but at the expense of slightly less accuracy. The DNA sequence expresses the interpretation of the sequencing machine of a piece of the genetic material, while the quality-scores represent the quality in which the sequence has been sequenced (analogous to a confidence value). The headers (sometimes called identifiers) are specially used to know if the reads are paired (a correlation between pairs of reads that can extend in some way the size of the DNA sequences) or single reads and contain an identification to preserve the uniqueness of the reads. To speedup the sequencing process, the DNA is sequenced in parallel (cloning and reading) which generates a FASTQ file with reads in somewhat random order." 2401.01787v1,"Impact of RIS on Outage Probability and Ergodic Rate in Wireless Powered Communication Waqas Khalid * , Manish Nair § , Trinh Van Chien ‡ and Heejung Yu † * Institute of Industrial Technology, Korea University, Sejong, Korea; waqas283@{korea.ac.kr, gmail.com} § CSN Research Group, University of Bristol, Bristol, U.K; manish.nair@bristol.ac.uk ‡ Hanoi University of Science and Technology, Hanoi, Vietnam; chientv@soict.hust.edu.vn † Dept. of Elec. & Inform. Eng., Korea University, Sejong, Korea; heejungyu@korea.ac.kr Abstract—Wireless powered communication (WPC) combines information and energy transmission for energy-constrained nodes. Reconfigurable intelligent surfaces (RISs) are capable of controlling radio signals in a dynamic and goal-oriented manner. This paper investigates the combination of RIS and WPC to enhance the performance of an energy-constrained user. Using a RIS, a base station, and a wireless user transmit energy and information signals, respectively. We derive closed-form expressions for outage probability and secrecy rate to analyze the performance of the proposed framework. Based on the theoretical analysis and simulation results, valuable insights are revealed and parameter selection is demonstrated. Index Terms—WPC, RIS, Outage probability, Ergodic rate. I. I NTRODUCTION Future sixth-generation (6G) networks will utilize a reconfigurable intelligent surface (RIS) to achieve a smart wireless environment and address issues related to radio-frequency (RF) impairment and signal propagation. Wireless connectivity under harsh propagation conditions is enhanced via RIS through non-line-of-sight (nLoS) links and controlled scattering and multipath components. A RIS offers better coverage and reliability without sophisticated signal processing or RF operations. In particular, RIS systems are composed of a large number of passive reflective elements that allow phase shifts to be introduced into electromagnetic (EM) signals without deploying additional base stations (BSs) or relay nodes. A RIS can enable the signals to be constructively combined to enhance the received signal at the intended receiver to support ubiquitous communications and diverse user requirements. In terms of design and implementation, passive RIS has attractive characteristics, such as low power consumption, low hardware costs, and high flexibility [1], [2]. In other developments, simultaneous wireless information and power transfer (SWIPT) and wireless powered communication (WPC) enable the transmission of both information and energy [2]–[5]. In particular, a device in SWIPT simultaneously This work was supported by Basic Science Research Program through NRF funded by the MOE (NRF-2022R1I1A1A01071807, 2021R1I1A3041887), and Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (2022-0-00704, and Development of 3D-NET Core Technology for High-Mobility Vehicular Service). decodes information and harvests energy from received RF signals [2], [3], while WPC node performs downlink energy harvesting before uplink information transmission [4], [5]. WPC is a promising technological advancement that can significantly enhance the battery lifespan of energy-constrained wireless devices. Furthermore, RIS and WPC can be combined to further improve the performance and energy efficiency. A. Motivation and Contribution In prior research work, a RIS-WPC network has not been investigated where RIS is exploited to improve both energy transfer and information transmission. To this end, we aim to exploit the potential beamforming gain of RIS to enhance both energy transfer and information transmission. In particular, we propose a general framework for RIS-WPC network in which an energy-constrained wireless user (U ) harvests RF energy from the BS and then uses the harvested energy to transmit information to a BS. Since the deployment of RIS to simultaneously enhance the energy transfer of U and information reception of BS offers more adjustable parameters, previous results of WPC without RIS cannot be applied. We present a statistical characterization of the channels for tractable analysis and derive the close-form expressions of the ergodic rate and outage probability over Rayleigh fading channels. Using numerical results, we confirm the theoretical analysis and demonstrate the choice of parameters for the system. II. S YSTEM M ODEL Network Detail: Consider a typical WPC network consisting of a BS and an energy-constrained user (U ) as shown in Fig. 1. For simplicity, a single antenna scenario is considered for all nodes 1 . A RIS consisting of M elements is deployed between a BS and an U to provide amplitude and phase responses for enhancing energy transfer and information transmission 2 . Channel Modeling: All links are considered using the independent and identically distributed (i.i.d.) Rayleigh fading 1 Our future work will extend to multiple antennas, where beamforming can be used at nodes with multiple antennas to improve system performance. 2 We assume no direct link between BS and U due to an obstacle, which motivates the deployment of RIS to establish communication links." 2401.01792v1,"CoMoSVC: Consistency Model-based Singing Voice Conversion 1 Yiwen Lu 1 , Zhen Ye 1 , Wei Xue 1† , Xu Tan 2 , Qifeng Liu 1 , Yike Guo 1† Hong Kong University of Science and Technology 2 Microsoft Research Asia ∗ Abstract The diffusion-based Singing Voice Conversion (SVC) methods have achieved remarkable performances, producing natural audios with high similarity to the target timbre. However, the iterative sampling process results in slow inference speed, and acceleration thus becomes crucial. In this paper, we propose Co- MoSVC, a consistency model-based SVC method, which aims to achieve both high-quality generation and high-speed sampling. A diffusion-based teacher model is first specially designed for SVC, and a student model is further distilled under self-consistency properties to achieve one-step sampling. Experiments on a single NVIDIA GTX4090 GPU reveal that although CoMoSVC has a significantly faster inference speed than the state-of-the-art (SOTA) diffusion-based SVC system, it still achieves comparable or superior conversion performance based on both subjective and objective metrics. Audio samples and codes are available at https://comosvc.github.io/. Keywords: Singing Voice Conversion, Diffusion Model, Consistency Model 1 Introduction Singing Voice Conversion(SVC) aims to convert one singer’s voice to another one’s, while preserving the content and melody. It has wide applications in music entertainment, singing voice beautification, and art creation Zhang et al. [2023]. Statistical methods Kobayashi et al. [2014, 2015b,a] are applied to the SVC tasks with parallel training data from both the source and target singers, which is usually infeasible, and thus the non-parallel SVC methods have become the mainstream. Two-stage methods are generally used for SVC, the first stage disentangles and encodes singer-independent and singer-dependent features from the audio. Then the second decoding stage generates the converted audio by replacing the singer-dependent feature with the target one. Since the substantial impact of the second stage on the quality of the converted audios, it has become crucial to design and optimize this stage. Therefore, many generative models have been used for the SVC decoding, including the autoregressive (AR) models, generative adversarial network (GAN), Normalizing Flow, and diffusion models. AR models are firstly used to develop USVC Nachmani and Wolf [2019], and PitchNet Deng et al. [2020] further improves USVC by adding a pitch adversarial network to learn the joint phonetic and pitch representation. However, AR models are slow due to the recursive nature, then non-AR GAN-based UCD-SVC Polyak et al. [2020] and FastSVC Liu et al. [2021a] are later proposed. Since the unstable training of GAN, a flow-based end-to-end SVC system, named SoVITS-SVC SVC-Develop-Team [2023] received widespread attention for its excellent converted results in fast speed. Recently, it has been shown that the conversion performance can be substantially improved by the diffusion-based SVC methods such as DiffSVC Liu et al. [2021b] and the diffusion version of SoVITS-SVC. ∗† Corresponding authors: Wei Xue {weixue@ust.hk}, Yike Guo {yikeguo@ust.hk} Under Review." 2401.01795v1,"Under consideration for publication in J. Plasma Phys. 1 Simulations of Radiatively-Cooled Magnetic Reconnection Driven by Pulsed Power Rishabh Datta 1 , Aidan Crilly 3 , Jeremy P. Chittenden 3 , Simran Chowdhry 1 , Katherine Chandler 2 , Nikita Chaturvedi 3 , Clayton E. Myers 2 , William R. Fox 5 , Stephanie B. Hansen 2 , Chris A. Jennings 2 , Hantao Ji 5,6 , Carolyn C. Kuranz 7 , Sergey V. Lebedev 3 , Dmitri A. Uzdensky 4 , and Jack D. Hare 1 † 1 Plasma Science and Fusion Center, Massachusetts Institute of Technology, Cambridge MA, USA 2 Sandia National Laboratories, Albuquerque NM, USA 3 Blackett Laboratory, Imperial College London, London SW7 2BW, UK 4 Center for Integrated Plasma Studies, Physics Department, UCB-390, University of Colorado, Boulder, Colorado, USA 5 Princeton Plasma Physics Laboratory, Princeton, NJ, USA 6 Department of Astrophysical Sciences, Princeton University, Princeton, NJ, USA 7 University of Michigan – Ann Arbor, Michigan USA (Received xx; revised xx; accepted xx) Magnetic reconnection is an important process in astrophysical environments, as it re-configures magnetic field topology and converts magnetic energy into thermal and kinetic energy. In extreme astrophysical systems, such as black hole coronae and pulsar magnetospheres, radiative cooling modifies the energy partition by radiating away internal energy, which can lead to the radiative collapse of the reconnection layer. In this paper, we perform two- and threedimensional simulations to model the MARZ (Magnetic Reconnection on Z) experiments, which are designed to access cooling rates in the laboratory necessary to investigate reconnection in a previously unexplored radiatively-cooled regime. These simulations are performed in GOR- GON, an Eulerian two-temperature resistive magnetohydrodynamic code, which models the experimental geometry comprising two exploding wire arrays driven by 20 MA of current on the Z machine (Sandia National Laboratories). Radiative losses are implemented using non-local thermodynamic equilibrium tables computed using the atomic code Spk, and we probe the effects of radiation transport by implementing both a local radiation loss model and P 1/3 multi-group radiation transport. The load produces highly collisional, super-Alfvénic (M A ≈ 1.5), supersonic (M S ≈ 4 − 5) strongly driven plasma flows which generate an elongated reconnection layer (L/δ ≈ 100, S L ≈ 400). The reconnection layer undergoes radiative collapse when the radiative −1 losses exceed the rates of Ohmic and compressional heating (τ cool /τ H −1 ≈ 100); this generates a cold strongly compressed current sheet, leading to an accelerated reconnection rate, consistent with theoretical predictions. Finally, the current sheet is also unstable to the plasmoid instability, but the magnetic islands are extinguished by strong radiative cooling before ejection from the layer. 1. Introduction 1.1. Radiative reconnection in astrophysical environments Magnetic reconnection is a fundamental process in magnetized plasmas, responsible for the abrupt rearrangement of magnetic field topology, and the violent conversion of magnetic energy † Email address for correspondence: jdhare@mit.edu" 2401.01798v1,"Micro-macro Parareal, from ODEs to SDEs and back again Ignace Bossuyt ∗ Stefan Vandewalle † Giovanni Samaey ‡ December 22, 2023 Abstract In this paper, we are concerned with the micro-macro Parareal algorithm for the simulation of initial-value problems. In this algorithm, a coarse (fast) solver is applied sequentially over the time domain, and a fine (time-consuming) solver is applied as a corrector in parallel over smaller chunks of the time interval. Moreover, the coarse solver acts on a reduced state variable, which is coupled to the fine state variable through appropriate coupling operators. We first provide a contribution to the convergence analysis of the micro-macro Parareal method for multiscale linear ordinary differential equations (ODEs). Then, we extend a variant of the micro-macro Parareal algorithm for scalar stochastic differential equations (SDEs) to higher-dimensional SDEs. 2020 MSC codes: 65L11, 34E13, 65C30, 68Q10, 65C35, 60H35; Keywords: Parallel-in-time; Parareal; multiscale; McKean-Vlasov SDE; micro-macro; moment model; reduced model. ∗ Department of Computer Science Celestijnenlaan 200 A box 2402 3001 LEUVEN, Belgium. mailto:ignace.bossuyt1@kuleuven.be, https://orcid.org/ 0000-0003-2066-400X † Department of Computer Science Celestijnenlaan 200 A box 2402 3001 LEU- VEN, Belgium. mailto:stefan.vandewalle@kuleuven.be , https://orcid.org/ 0000-0002-8988-2374 ‡ Department of Computer Science Celestijnenlaan 200 A box 2402 3001 LEU- VEN, Belgium. mailto:giovanni.samaey@kuleuven.be , https://orcid.org/ 0000-0001-8433-4523 1" 2401.01806v1,"Received: Added at production Revised: Added at production Accepted: Added at production DOI: xxx/xxxx RESEARCH ARTICLE A complex meta-regression model to identify effective features of interventions from multi-arm, multi-follow-up trials Annabel L Davies* | Julian PT Higgins 1 Bristol Medical School, University of Bristol, Bristol, United Kingdom Network meta-analysis (NMA) combines evidence from multiple trials to compare Correspondence *Email: annabel.davies@bristol.ac.uk the effectiveness of a set of interventions. In public health research, interventions are often complex, made up of multiple components or features. This makes it difficult to Present Address Canynge Hall, Clifton, Bristol, BS8 2PN define a common set of interventions on which to perform the analysis. One approach to this problem is component network meta-analysis (CNMA) which uses a meta- regression framework to define each intervention as a subset of components whose individual effects combine additively. In this paper, we are motivated by a systematic review of complex interventions to prevent obesity in children. Due to considerable heterogeneity across the trials, these interventions cannot be expressed as a subset of components but instead are coded against a framework of characteristic features. To analyse these data, we develop a bespoke CNMA-inspired model that allows us to identify the most important features of interventions. We define a meta-regression model with covariates on three levels: intervention, study, and follow-up time, as well as flexible interaction terms. By specifying different regression structures for trials with and without a control arm, we relax the assumption from previous CNMA mod- els that a control arm is the absence of intervention components. Furthermore, we derive a correlation structure that accounts for trials with multiple intervention arms and multiple follow-up times. Although our model was developed for the specifics of the obesity data set, it has wider applicability to any set of complex interventions that can be coded according to a set of shared features. KEYWORDS: Component network meta-analysis, meta-regression, complex interventions, multi-arm trials, multiple follow-up times 1 INTRODUCTION Network meta-analysis (NMA) is a technique, most commonly used in medical statistics, to combine evidence from multiple trials that target the same clinical condition. 1 Compared with an individual trial, synthesizing evidence across multiple trials leads to more precise estimates of treatment performance and improves the generalizability of findings. 2 Conventional ‘pairwise’ meta-analysis focuses on trials that compare the same two interventions. This produces a single statistic that summarizes the relative effect of one intervention compared with the other. NMA, on the other hand, is a more recent development that aims to make inferences about multiple competing treatments. 3,4 In particular, NMA makes use of ‘indirect evidence’ to draw comparisons between interventions that have never been compared in a single trial. 5 Indirect evidence refers to the idea that we can" 2401.01822v2,"HawkRover: An Autonomous mmWave Vehicular Communication Testbed with Multi-sensor Fusion and Deep Learning Ethan Zhu ∗ , Haijian Sun † , Mingyue Ji ‡ ∗ Green Canyon High School, 2960 Wolf Pack Wy North, North Logan, UT USA. † School of Electrical and Computer Engineering, University of Georgia, Athens, GA USA. ‡ Department of Electrical and Computer Engineering, University of Utah, Salt Lake City, UT USA. Emails: ∗ ethanzhu987@gmail.com, † hsun@uga.edu, ‡ mingyue.ji@utah.edu Abstract—Connected and automated vehicles (CAVs) have become a transformative technology that can change our daily life. Currently, millimeter-wave (mmWave) bands are identified as the promising CAV connectivity solution. While it can provide high data rate, their realization faces many challenges such as high attenuation during mmWave signal propagation and mobility management. Existing solution has to initiate pilot signal to measure channel information, then apply signal processing to calculate the best narrow beam towards the receiver end to guarantee sufficient signal power. This process takes significant overhead and time, hence not suitable for CAVs. In this study, we propose an autonomous and low-cost testbed to collect extensive co-located mmWave signal and other sensor data such as LiDAR (Light Detection and Ranging), cameras, ultrasonic, etc, traditionally for “automated”, to facilitate mmWave vehicular communications. Intuitively, these sensors can build a 3D map around the vehicle and signal propagation path can be estimated, eliminating the iterative process via pilot signals. This multimodal data fusion, together with AI, is expected to bring significant advances in “connected” research. Index Terms—Vehicular communication, mmWave communication, sensor fusion, machine learning. I. I NTRODUCTION More than 40,000 people die each year on U.S. highways, 1.3 million worldwide [1]. Efforts from all aspects are needed to reduce such a high fatality rate. Among them, CAV is the only solution that can bring the number to nearly 0, hence it has attracted increasing attentions from industry, academia, and government. As the name suggests, CAV involves two interconnected concepts: “connected” and “automated”. Recent years have witnessed significant advances in “automated” vehicles, creating self-driving capability up to Level 5 (fully autonomous). Current autonomous control is implemented in a more isolated way, made possible by sensors, pre-trained AI algorithms and on-board computer processing within individual vehicle. With more testing and deployed CAVs in the near future, we expect there is a pressing need to provide capability to exchange, transmit, and collect real-time data via vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to-everything (V2X) communications, i.e., the need for “connected”. Dedicated short range communication (DSRC) is the first standard for vehicle communication that operates on 5.9 GHz and delivers data rate from 3 to 27 Mb/s [2]. But it soon encounters bottleneck as V2V and V2I desire higher data rate and lower latency for assisted driving. Moreover, DSRC requires the installation of many new devices at the roadside, which becomes a barrier for wide deployment. State-of-theart proposes to utilize 5G cellular millimeter-wave (mmWave) band (∼28 GHz and above), an evolution from current cellular V2X (C-V2X), to address these challenges [3]. As a core innovation for 5G, mmWave will be readily available with future base station (BS) infrastructures. However, applying it for vehicle scenario is still in the infancy and faces many unique challenges [4]. The main reason is that mmWave requires directional transmission to compensate for high signal attenuation, but it needs to send pilot signals to obtain precise propagation information, then calculates the best direction. This iterative process takes too long time and therefore is not suitable for high mobility scenario, where timely alerts, warning, and advice on driving decisions are critical. Alternatively, some works have proposed a sensor fusion approach to align mmWave transmissions in nearly real-time. Specifically, this approach is to utilize “out-of-band” information from LiDAR, camera, ultrasonic sensors that are already mounted on CAVs to establish, maintain, and steer mmWave transmissions. Moreover, fueled by cutting-edge AI algorithms, we expect this approach can bring real-time capabilities. Briefly, LiDAR provides 3-D point cloud for surrounding objects; cameras give high-definition vision view; ultrasonic depicts pedestrians and objects in close proximity. These data, when combined, give “eyes” to automated vehicles. On the other hand, signal propagation follows fundamental physics law that reflects, diffracts, or diffuses when encountering objects, hence its behavior is statistically predictable when precise perception is available. In fact, similar to video games, wireless simulators use “ray tracing” to model all possible signal paths. It is therefore a natural choice to combine sensor data and vehicle communications." 2401.01835v1,"1 Concurrent Brainstorming & Hypothesis Satisfying: An Iterative Framework for Enhanced Retrieval-Augmented Generation (R2CBR3H-SR) Arash Shahmansoori ∗ Abstract—Addressing the complexity of comprehensive information retrieval, this study introduces an innovative, iterative retrieval-augmented generation system. Our approach uniquely integrates a vector-space driven re-ranking mechanism with concurrent brainstorming to expedite the retrieval of highly relevant documents, thereby streamlining the generation of potential queries. This sets the stage for our novel hybrid process, which synergistically combines hypothesis formulation with satisfying decision-making strategy to determine content adequacy—leveraging a chain of thought-based prompting technique. This unified hypothesize-satisfied phase intelligently distills information to ascertain whether user queries have been satisfactorily addressed. Upon reaching this criterion, the system refines its output into a concise representation, maximizing conceptual density with minimal verbosity. The iterative nature of the workflow—Retrieve → Rerank → Concurrent Brainstorm → Retrieve → Rerank → Refine → Hypothesize-Satisfying → Refine—enhances process efficiency and accuracy. Crucially, the concurrency within the brainstorming phase significantly accelerates recursive operations, facilitating rapid convergence to solution satisfaction. Compared to conventional methods, our system demonstrates a marked improvement in computational time and cost-effectiveness. This research advances the state-ofthe-art in intelligent retrieval systems, setting a new benchmark for resource-efficient information extraction and abstraction in knowledge-intensive applications. Index Terms—Retrieval-augmented generation, concurrent brainstorming, hybrid hypothesize-satisfying, reranking, refinement. I. I NTRODUCTION T HE incessant growth of information on the web has placed unprecedented demands on artificial intelligence systems to not only understand complex queries but to also engage in meaningful information retrieval and generation tasks that satisfy users’ informational needs effectively. The paradigm of retrieval-augmented generation (RAG) has emerged as a critical approach to bridge the gap between vast repositories of knowledge and the succinct, relevant answers desired by users [1]. In this work, we introduce a novel system designed to navigate this landscape through an agile iterative process that encompasses retrieval, reranking, brainstorming, hypothesizing, satisfying, and refining—each step a cog in the machinery of an intelligent question-answering model. ∗ A. Shahmansoori is an Artificial General Intelligence researcher, e-mail: arash.mansoori65@gmail.com. Grounded in the RAG framework, our system initiates the process with a robust retrieval phase, employing a vector space model to extract documents with the highest semantic relevance to a user’s initial query. It then engages in an innovative concurrent brainstorming stage, where potential inquiries and lines of investigation are generated, setting the stage for a dynamic and contextually enriched reranking of information sources. One of the hallmark features of our system is its capacity to concurrently generate relevant questions during the brainstorming phase. This concurrency not merely accelerates the retrieval process, but embodies a recursive depth as the system iteratively refines its understanding and response to the user’s query. It enhances the efficiency of the retrieval loop by preemptively addressing possible follow-up queries and contextual angles that may otherwise necessitate additional search iterations. The subsequent stage marks a pivotal advancement in RAG systems: the hybridization of hypothesizing and satisficing through a chain of thought based prompting mechanism. Here, the system not only formulates comprehensive hypotheses to address the user’s need but simultaneously evaluates the satisfaction level of the response. By blending these two functions, our approach drastically shortens the feedback loop, propelling towards an expedited yet accurate provision of information. Following the innovative hypothesize-satisfying phase is the refine step, wherein the system produces a condensed, prime representation of content. This representation embodies a sparse collection of statements and conceptual associations crafted for maximal informational value with minimal verbosity—aiming at the essence of user query fulfillment. Lastly, another iteration occurs, providing a rigorous reassessment of the query’s satisfaction level, ensuring precision and comprehensiveness in the final output. This recursive nature ensures that the system adaptively hones its ability to satisfy user queries with a continually refined quality of response, underscoring the system’s learning capabilities. Main Contributions: • We propose an initial phase of retrieval and sophisticated reranking based on semantic alignment with the user’s initial query, leveraging advancements in vector space models for precise initial document retrieval." 2401.01881v1,"1 Robust Control Barrier Functions using Uncertainty Estimation with Application to Mobile Robots Ersin Daş 1 , Joel W. Burdick 1 Abstract— Model uncertainty poses a significant challenge to the implementation of safety-critical control systems. With this as motivation, this paper proposes a safe control design approach that guarantees the robustness of nonlinear feedback systems in the presence of matched or unmatched unmodelled system dynamics and external disturbances. Our approach couples control barrier functions (CBFs) with a new uncertainty/disturbance estimator to ensure robust safety against input and state-dependent model uncertainties. We prove upper bounds on the estimator’s error and estimated outputs. We use an uncertainty estimator-based composite feedback control law to adaptively improve robust control performance under hard safety constraints by compensating for the matched uncertainty. Then, we robustify existing CBF constraints with this uncertainty estimate and the estimation error bounds to ensure robust safety via a quadratic program (CBF- QP). We also extend our method to higher-order CBFs (HOCBFs) to achieve safety under unmatched uncertainty, which causes relative degree differences with respect to control input and disturbance. We assume the relative degree difference is at most one, resulting in a secondorder cone (SOC) condition. The proposed robust HOCBFs method is demonstrated in a simulation of an uncertain elastic actuator control problem. Finally, the efficacy of our method is experimentally demonstrated on a tracked robot with slope-induced matched and unmatched perturbations. I. I NTRODUCTION New applications of modern autonomous control systems in complex environments increase the importance of system safety. For example, mobile robots, autonomous vehicles, and robot manipulators operating in the presence of humans or guided by human operators, must be controlled safely. However, safety-critical controller synthesis is a challenging problem in the deployment of ubiquitous autonomous and cyber-physical systems in real-world environments [1]. This motivates the need for a control design that provides theoretical safety assurances. Control system safety is often based on set invariance, which ensures that system states stay within a pre-defined safe set at all times. Control Barrier Functions (CBFs) [2] guarantee safety by certifying forward invariance of the safe set. The CBF framework also leads to safety filters that minimally alter *This work was supported by DARPA under the LINC program. 1 E. Daş and J. W. Burdick are with the Department of Mechanical and Civil Engineering, California Institute of Technology, Pasadena, CA 91125, USA. {ersindas, jburdick}@caltech.edu control system outputs only when safety risks arise [3]–[6]. Thanks to the linearity of the CBF constraint for nonlinear control-affine systems, safety can be enforced with a quadratic program, CBF-QP, which optimizes the pointwise control inputs. CBF frameworks have been successfully applied in various applications, including automated vehicles [7], aerial vehicles [8], legged robotics [9], [10] and shared human-robot autonomy [11]. Dynamical systems models are needed to guarantee safety using conventional CBF formulations, which may be sensitive to inevitable model uncertainties or external disturbances [12]. This model-dependent structure of CBFs triggers the need for assessing the safety constraints under model uncertainties. Several works have proposed robustifying terms in the CBF condition to address the robustness against disturbances and model uncertainties [13]. Specifically, [14]–[16] use a constant bound to represent the unmodeled dynamics in CBF constraints. This constant bound may be difficult to tune in practice, and usually results in undesired conservativeness and a reduction in closed-loop control performance. Tunable inputto-state safe CBF (TISSf-CBF) [17] has been proposed to reduce the conservatism of these methods. The design of robust safety-critical control systems must balance safety and performance. Maintaining safety is crucial, but avoiding unnecessary conservativeness that negatively impacts performance is also essential. Several safe, robust adaptive control design methods using CBFs have been proposed [18]–[22] to increase robust controller performance by using online estimation under the assumption that system uncertainties are parametric. Later, machine learning methods have been combined with adaptive CBFs [23]. Recent works have connected disturbance observers, a robust control method [24], [25], with CBFs. Active estimation of an external disturbance can guarantee robust safety [26]– [30]. These prior studies that joined CBFs with disturbance observers have been limited to state-dependent external disturbances. However, in many applications, uncertainties may depend on both system states and control inputs. Nor have these studies used active disturbance/uncertainty compensators to purposefully design observers that improve control performance while guaranteeing safety. It may be difficult to define a CBF when its time derivative does not depend on the control input. High-order CBFs (HOCBFs) [31]–[34], wherein successive CBF time derivatives are taken until the control input appears, address this" 2401.01884v1,"1 A rewriting-logic-with-SMT-based formal analysis and parameter synthesis framework for parametric time Petri nets Jaime Arias LIPN, CNRS UMR 7030 Université Sorbonne Paris Nord, France jaime.arias@lipn.univ-paris13.fr Kyungmin Bae Pohang University of Science and Technology, South Korea kmbae@postech.ac.kr Carlos Olarte LIPN, CNRS UMR 7030 Université Sorbonne Paris Nord, France carlos.olarte@lipn.univ-paris13.fr Peter Csaba Ölveczky University of Oslo, Norway peterol@ifi.uio.no Laure Petrucci LIPN, CNRS UMR 7030 Université Sorbonne Paris Nord, France laure.petrucci@lipn.univ-paris13.fr Address for correspondence: carlos.olarte@lipn.univ-paris13.fr" 2401.01904v1,"Time Projection Chamber for GADGET II Ruchi Mahajan 1 , ∗ T. Wheeler 1,2,3 , E. Pollacco 4 , C. Wrede 2,1 , † A. Adams 1,2 , H. Alvarez-Pol 5 , A. Andalib 1 , A. Anthony 6 , Y. Ayyad 5 , D. Bazin 1,2 , T. Budner 1,2 , M. Cortesi 1 , J. Dopfer 1,2 , M. Friedman 7 , A. Jaros 1 , D. Perez-Loureiro 8 , B. Mehl 9 , R. De Oliveira 9 , L. J. Sun 1 , and J. Surbrook 1,2 1 2 Facility for Rare Isotope Beams, Michigan State University, East Lansing, Michigan 48824, USA Department of Physics and Astronomy, Michigan State University, East Lansing, Michigan 48824, USA 3 Department of Computational Mathematics, Science, and Engineering, Michigan State University, East Lansing, Michigan 48824, USA 4 IRFU / DEDIP, CEA Saclay, F91191 Gif-sur-Yvette, France 5 IGFAE, Universidade de Santiago de Compostela, E-15782, Santiago de Compostela, Spain. 6 Department of Physics and Astronomy, High Point University, High Point, NC, 27268, USA 7 The RACAH institute of Physics, Hebrew University of Jerusalem, Israel. 8 Canadian Nuclear Laboratories, Canada. and 9 CERN Esplanade des Particules 1 P.O. Box 1211 Geneva 23, Switzerland (Dated: January 5, 2024) Background: The established GAseous Detector with GErmanium Tagging (GADGET) detection system is used to measure weak, low-energy β-delayed proton decays. It consists of the gaseous Proton Detector equipped with a MICROMEGAS (MM) readout to detect protons and other charged particles calorimetrically, surrounded by the Segmented Germanium Array (SeGA) for high-resolution detection of prompt γ-rays. Purpose: To upgrade GADGET’s Proton Detector to operate as a compact Time Projection Chamber (TPC) for the detection, 3D imaging and identification of low-energy β-delayed singleand multi-particle emissions mainly of interest to astrophysical studies. Method: A new high granularity MM board with 1024 pads has been designed, fabricated, installed and tested. A high-density data acquisition system based on Generic Electronics for TPCs (GET) has been installed and optimized to record and process the gas avalanche signals collected on the readout pads. The TPC’s performance has been tested using a 220 Rn α-particle source and cosmic-ray muons. In addition, decay events in the TPC have been simulated by adapting the ATTPCROOT data analysis framework. Further, a novel application of 2D convolutional neural networks for GADGET II event classification is introduced. The optimization of data throughput is also addressed. Results: The GADGET II TPC is capable of detecting and identifying α-particles, as well as measuring their track direction, range, and energy. The extracted energy resolution of the GAD- GET II TPC using P10 gas is about 5.4% at 6.288 MeV ( 220 Rn α-events), computed using charge integration. Based on a systematic simulation study, we estimated the detection efficiency of the GADGET II TPC for protons and α-particles, respectively. It has also been demonstrated that the GADGET II TPC is capable of tracking minimum ionizing particles (i.e. cosmic-ray muons). From these measurements, the electron drift velocity was measured under typical operating conditions. In addition to being one of the first generation of micro pattern gaseous detectors (MPGDs) to utilize a resistive anode applied to low-energy nuclear physics, the GADGET II TPC will also be the first TPC surrounded by a high-efficiency array of high-purity germanium γ-ray detectors. Conclusions: The TPC of GADGET II has been designed, fabricated and tested, and is ready for operation at the Facility for Rare Isotope Beams (FRIB) for radioactive beam-line experiments. 1. INTRODUCTION:ASTROPHYSICAL MOTIVATION Type I X-ray bursts are short-lived bursts of X-rays detected by space-based X-ray telescopes that can last from a few seconds to a few minutes. The mechanism ∗ mahajan@frib.msu.edu † wrede@frib.msu.edu behind these bursts is not fully understood, but they are thought to be caused by thermonuclear runaways occurring on the surfaces of neutron stars accreting hydrogen and helium from close binary companions. The occurrence of these X-ray bursts is dependent on the mass, temperature, accretion rate, and magnetic field of the neutron star [1]. These factors along with nuclear reaction and decay rates play a crucial role in influencing the behavior and characteristics of X-ray bursts. The nuclear reactions in models of Type I X-ray bursts take place at" 2401.01913v1,"Article Development of the CMS Magnetic Field Map Nicola Amapane 1,2 and Vyacheslav Klyukhin 3,4, * INFN Sezione di Torino, I-10125 Torino, Italy; nicola.amapane@cern.ch Dipartimento di Fisica, Università di Torino, I-10125 Torino, Italy 3 Skobeltsyn Institute of Nuclear Physics, Lomonosov Moscow State University, RU-119992 Moscow, Russia 4 European Organization for Nuclear Research (CERN), CH-1211 Geneva, Switzerland * Correspondence: vyacheslav.klyukhin@cern.ch 1 2 Abstract: This article focuses on pioneering work on the performance of the three-dimensional (3D) magnetic field map in the entire volume of the Compact Muon Solenoid (CMS) detector at the Large Hadron Collider at CERN. In the CMS heterogeneous magnetic system, the magnetic flux is created by a superconducting solenoid coil enclosed in a steel flux-return yoke. To describe the CMS magnetic flux distribution, a system of the primitive 3D volumes containing the values of the magnetic flux density measured inside the superconducting coil inner volume and modelled outside the coil across a special mesh of reference nodes was developed. This system, called the CMS magnetic field map, follows the geometric features of the yoke and allows the interpolation of the magnetic flux density between the nodes to obtain the magnetic field values at any spatial point inside a cylinder of 18 m in diameter and 48 m in length, where all the CMS sub-detectors are located. The geometry of the volumes is described inside one 30° azimuthal sector of the CMS magnet. To obtain the values of the magnetic flux density components across the entire azimuth angle of the CMS detector, rotational symmetry is applied. Keywords: electromagnetic modelling; magnetic flux density; superconducting magnets; magnetic field map; magnetic flux; rotational symmetry; large-scale applications of superconductors 1. Introduction Citation: Amapane, N.; Klyukhin, V. Development of the CMS Magnetic Field Map. Symmetry 2023, 15, 1030. https://doi.org/10.3390/sym15051030 Academic Editor: Alexey V. Lukoyanov and Fabio Sattin Received: 20 March 2023 Revised: 2 May 2023 Accepted: 4 May 2023 Published: 6 May 2023 Copyright: © 2023 by the authors. Submitted for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/license s/by/4.0/). The multi-purpose Compact Muon Solenoid (CMS) detector [1] at the Large Hadron Collider (LHC) [2] is designed and constructed to search for new particles and phenomena at the colliding beam centre-of-mass energy of 13.6 TeV. In particular, the production of the Higgs boson [3–5] with a mass of 125 GeV/c 2 was discovered by two LHC experiments ten years ago [6–8]. For the Higgs boson invariant mass reconstruction, the four-momenta of particles are used. This requires not only measuring the three-dimensional (3D) momenta of particles, but also their reliable identification. In the CMS detector, precision silicon pixel and strip tracking sub-detectors [9,10], located in a strong magnetic field, measure momenta of the charged secondary particles generated in the collisions of the accelerated primary particle beams. In the magnetic field, the particle trajectories obtain a curvature [11], which depends on the magnetic flux density B. A higher magnetic flux density provides a larger curvature and, as a result, a more accurate measurement of the charged particle momentum. In the CMS detector, the magnetic field is provided by a wide-aperture superconducting solenoid coil [12–14] enclosed into a 10,000-ton steel flux-return yoke [14,15]. The coil has an inner bore of 6 m in diameter, a length of 12.5 m, a thickness of 0.313 m, and is operated with the direct current of 18.164 kA, creating the central magnetic flux density |𝑩 0 | of 3.81 T. The CMS magnetic system is of a heterogeneous type, i.e., the magnetic flux of 130 Wb created by the superconducting solenoid penetrates both non-magnetic and ferromagnetic materials of the experimental setup. The steel yoke of the magnet is used as a series of magnetized layers which are penetrated only by muons, making it possible to Symmetry 2023, 15, x. https://doi.org/10.3390/xxxxx www.mdpi.com/journal/symmetry" 2401.01943v2,"G ENERALIST EMBEDDING MODELS ARE BETTER AT SHORT - CONTEXT CLINICAL SEMANTIC SEARCH THAN SPECIALIZED EMBEDDING MODELS Jean-Baptiste Excoffier 1∗ , Tom Roehr 2 , Alexei Figueroa 2 , Jens-Michalis Papaioannou 2 , Keno Bressem 3 , Matthieu Ortala 1 1 Kaduceo, Toulouse, France Berliner Hochschule fur Technik, Berlin, Germany 3 Department of Radiology and Nuclear Medicine, German Heart Center Munich, Munich, Germany 2 A BSTRACT The increasing use of tools and solutions based on Large Language Models (LLMs) for various tasks in the medical domain has become a prominent trend. Their use in this highly critical and sensitive domain has thus raised important questions about their robustness, especially in response to variations in input, and the reliability of the generated outputs. This study addresses these questions by constructing a textual dataset based on the ICD-10-CM code descriptions, widely used in US hospitals and containing many clinical terms, and their easily reproducible rephrasing. We then benchmarked existing embedding models, either generalist or specialized in the clinical domain, in a semantic search task where the goal was to correctly match the rephrased text to the original description. Our results showed that generalist models performed better than clinical models, suggesting that existing clinical specialized models are more sensitive to small changes in input that confuse them. The highlighted problem of specialized models may be due to the fact that they have not been trained on sufficient data, and in particular on datasets that are not diverse enough to have a reliable global language understanding, which is still necessary for accurate handling of medical documents. Keywords Benchmark · Embedding models · Sensitivity analysis · Large Language Models · Healthcare ∗ Corresponding Author: jeanbaptiste.excoffier@kaduceo.com" 2401.01974v1,"Towards Truly Zero-shot Compositional Visual Reasoning with LLMs as Programmers Aleksandar Stanić ∗ aleksandar@idsia.ch The Swiss AI Lab, IDSIA, USI & SUPSI Sergi Caelles scaelles@google.com Google Research Michael Tschannen tschannen@google.com Google DeepMind Abstract Visual reasoning is dominated by end-to-end neural networks scaled to billions of model parameters and training examples. However, even the largest models struggle with compositional reasoning, generalization, fine-grained spatial and temporal reasoning, and counting. Visual reasoning with large language models (LLMs) as controllers can, in principle, address these limitations by decomposing the task and solving subtasks by orchestrating a set of (visual) tools. Recently, these models achieved great performance on tasks such as compositional visual question answering, visual grounding, and video temporal reasoning. Nevertheless, in their current form, these models heavily rely on human engineering of in-context examples in the prompt, which are often dataset- and task-specific and require significant labor by highly skilled programmers. In this work, we present a framework that mitigates these issues by introducing spatially and temporally abstract routines and by leveraging a small number of labeled examples to automatically generate in-context examples, thereby avoiding human-created in-context examples. On a number of visual reasoning tasks, we show that our framework leads to consistent gains in performance, makes LLMs as controllers setup more robust, and removes the need for human engineering of in-context examples. 1 Introduction Compositional visual question answering requires a model to answer questions about visual content in a compositional manner, involving multiple steps of reasoning or considering relationships between different objects or entities within an image. It is a complex task as it requires understanding both the visual information in an image and the structure of the question, and reasoning about how different visual elements relate to one another to generate the correct answer. Recently, large progress has been made on many such vision and language tasks by scaling end-to-end neural networks models in terms of size, training data, and compute (Alayrac et al., 2022; Chen et al., 2022b; Yu et al., 2022; Wang et al., 2022a; Gan et al., 2022; Lu et al., 2022; Li et al., 2023; Driess et al., 2023; Chen et al., 2023d;c). However, even the largest state-of-the-art (SotA) models struggle in tasks that require compositional reasoning, ability to generalize, fine-grained spatial reasoning capabilities, and counting (Bugliarello et al., 2023; Paiss et al., 2023; Hsieh et al., 2023; Yuksekgonul et al., 2022; Zhao et al., 2022; Hendricks & Nematzadeh, 2021). An example of such task is the following query: “Could the cookies on the table be equally distributed among children?” (Surís et al., 2023). To solve this, the model needs to detect the cookies in the image, filter out the ones that are not on the table, detect children, count cookies and children, and check if the cookies count is divisible by the children count. Questions like these are difficult for current end-to-end vision and language models (VLMs). Scaling VLMs further makes them even more data- and compute-hungry(Villalobos et al., 2022), so the scale alone seems unlikely to solve these tasks, especially due to the exponentially-large long tail of compositional tasks. ∗ Work completed during an internship at Google. 1" 2401.01986v2,"Generation of complete graph states in a spin-1/2 Heisenberg chain with a globally optimized magnetic field X. X. Li, 1 D. X. Li, 2 and X. Q. Shao 3, 4, ∗ 1 Sino-European Institute of Aviation Engineering, Civil Aviation University of China, Tianjin 300300, China 2 College of Physics Science and Technology, Shenyang Normal University, Shenyang 110034, China 3 Center for Quantum Sciences and School of Physics, Northeast Normal University, Changchun 130024, China 4 Center for Advanced Optoelectronic Functional Materials Research, and Key Laboratory for UV Light-Emitting Materials and Technology of Ministry of Education, Northeast Normal University, Changchun 130024, China Graph states possess significant practical value in measurement-based quantum computation, with complete graph states that exhibit exceptional performance in quantum metrology. In this work, we introduce a method for generating multiparticle complete graph states using a spin-1/2 Heisenberg XX chain subjected to a timevarying magnetic field, which applies to a wide range of systems. Our scheme relies exclusively on nearestneighbor interactions between atoms, with real-time magnetic field formation facilitated by quantum optimal control theory. We focus specifically on neutral-atom systems, finding that multiparticle complete graph states with N = 3 ∼ 6 can be achieved in less than 0.25 µs, utilizing a hopping amplitude of J/(2π) = −2.443 MHz. This assumes an initial state provided by an equal-weight superposition of all spin states that are encoded by the dipolar interacting Rydberg states. Additionally, we thoroughly address various experimental imperfections and showcase the robustness of our approach against atomic vibrations, fluctuations in pulse amplitude, and spontaneous emission of Rydberg states. Considering the common occurrence of disturbances in experimental setups of neutral-atom systems, our one-step strategy for achieving such graph states emerges as a more empirically viable alternative to techniques based on controlled-Z gates. I. INTRODUCTION Graph states, derived from mathematical graph theory [1, 2], play a pivotal role in quantum information theory. It describes a class of multiparticle-entangled states including Greenberger-Horne-Zeilinger (GHZ) states and cluster states [3]. Such states form a universal resource for measurementbased quantum computing (MBQC) without any controlled two-system quantum gates [4–8]. Some of which can also be widely applied in quantum teleportation [9–11] and quantum secret sharing [12, 13]. Multiparticle complete graph states represent that any two particles interact with each other, requiring more projective measurements to be disentangled. By performing a single σ y measurement at an arbitrary vertex (qubit), these states can be converted to star graph states (GHZ type) [1, 14]. Such states exhibit excellent performance in quantum metrology [15, 16], quantum error-correction encoding [17], and quantum cryptography [18]. However, although complete graph states have many advantages, less attention has been paid to preparing such graph states experimentally, focusing mainly on linear and 2D cluster states [8, 19–21]. The preparation of multiparticle complete graph states can be conceptually divided into two primary categories. The first approach is applicable to arbitrary graph states, employing the mathematically proven two-qubit controlled-Z gate (CZ) [22– 24]. However, these protocols are constrained by the operational time and fidelity of the logic gate. Conversely, multiparticle complete graph states can also be generated within the framework of cavity quantum electrodynamics [25–27]. In particular, certain theoretical schemes [28, 29] enable a one- ∗ shaoxq644@nenu.edu.cn step realization, but these one-step approaches require uniform interaction strengths between all particle pairs, which poses challenges for experimental implementation. Recently, the proposal of an equivalent Hamiltonian (Heisenberg XXX model with a staggered field) [30] has sparked interest in Floquet engineering for constructing such a Hamiltonian [31, 32]. Nevertheless, in practice, controlling the impact of noncommutation of the Hamiltonian under periodic driving becomes challenging as the particle number increases. As quantum control theory progresses, optimal quantum control furnishes a toolkit for crafting external field shapes to fulfill assigned tasks, such as state generation [33–36], quantum gate implementation [37, 38], and noisy intermediatescale quantum technology [39]. These tools aim to achieve the specified objectives with minimal energy and resource expenditure. The practical realization of calculated field shapes has been facilitated by the availability of commercially accessible arbitrary waveform generators. In this paper, leveraging the Gradient Ascent Pulse Engineering (GRAPE) optimization algorithm [40, 41], we propose an alternative Hamiltonian represented as a spin-1/2 Heisenberg XX chain with identical nearest-neighbor interactions under an optimized timedependent magnetic field. Governed by this Hamiltonian, we successfully generate complete graph states for a particle number ranging from N = 3 to N = 6. Our protocol boasts two key advantages: (i) It exclusively relies on the nearest-neighbor interactions, ensuring robust operability and scalability in experimental setups. (ii) The operational time is significantly reduced to less than 0.25 µs, a crucial factor in mitigating decoherence effects. The structure of this paper is organized as follows. In Sec. II, we initiate our exploration with the introduction of the complete graph state’s definition and an analysis of the corresponding scheme. Subsequently, in Sec. III, we employ" 2401.01988v2,"H IERARCHICAL C LUSTERING IN ΛCDM C OSMOLOGIES VIA P ERSISTENCE E NERGY Michael E. Van Huffel Department of Mathematics ETH Zurich Zurich, Switzerland michavan@student.ethz.ch Leonardo A. A. Barberi Department of Computer Science ETH Zurich Zurich, Switzerland lbarberi@student.ethz.ch Tobias Sagis Department of Computer Science TU Eindhoven Eindhoven, Netherlands t.g.m.sagis@student.tue.nl January 9, 2024 A BSTRACT In this research, we investigate the structural evolution of the cosmic web, employing advanced methodologies from Topological Data Analysis. Our approach involves leveraging LITE, an innovative method from recent literature that embeds persistence diagrams into elements of vector spaces. Utilizing this methodology, we analyze three quintessential cosmic structures: clusters, filaments, and voids. A central discovery is the correlation between Persistence Energy and redshift values, linking persistent homology with cosmic evolution and providing insights into the dynamics of cosmic structures. Keywords Topological Data Analysis · Persistent Homology · Cosmic Web · ΛCDM · DTFE 1 Introduction Topological Data Analysis (TDA) has emerged as a transformative approach to extract meaningful information from complex datasets, offering a lens through which to understand the data’s underlying structure. Unlike traditional data analysis methods that rely on geometric or statistical measures, TDA employs tools from both computational geometry and algebraic topology to study the topological features inherent in datasets. In the context of cosmology, where the distribution of matter exhibits complex and interconnected patterns, TDA becomes a valuable tool for uncovering the underlying cosmic topology. The cosmic web, encompassing galaxies, intergalactic gas, and dark matter, exhibits an organized tendency to form structures such as galaxy clusters, filaments (thread-like structures that connect galaxy clusters), and walls, surrounded by low-density void regions (Colberg et al. [2008], Van de Weygaert and Platen [2011], Cautun et al. [2014], Wilding et al. [2021]). Within this cosmic context, large galaxy clusters aggregate into more extensive formations referred to as filaments or superclusters of galaxies Kelesis et al. [2022]. At the heart of our study is the understanding that the cosmic web is not a static entity. Its formation and evolution follow a hierarchical pattern: initially, small fluctuations in the density of dark matter lead to the creation of larger structures, primarily galaxy clusters. These clusters become gravitational anchors, pulling in nearby smaller galaxies. Over time, this process leads to the formation of even larger structures, as clusters merge and grow, continually reshaping the cosmic landscape Cautun et al. [2014]. Simulations of the cosmic web are notoriously computationally expensive to perform analysis on. This is especially the case with standard TDA algorithms, such as the Vietoris-Rips filtration, that are not particularly well-designed for computational efficiency. In response to the computational challenges posed by the cosmic network, we present a specialized TDA pipeline crafted to address the unique demands of cosmic web analysis. Our study focuses on the dynamic nature of the cosmic web, which evolves hierarchically from small dark matter density fluctuations to larger structures like galaxy clusters. These clusters, acting as gravitational centers, attract smaller" 2401.02007v1,"Imperial-TP-KM-2024-01 Spinor-helicity representations of (A)dS 4 particles of any mass Thomas Basile a Euihun Joung b Karapet Mkrtchyan c Matin Mojaza 1d a Service de Physique de l’Univers, Champs et Gravitation, Université de Mons, 20 place du Parc, 7000 Mons, Belgium b Department of Physics, College of Science, Kyung Hee University, Seoul 02447, Republic of Korea c Theoretical Physics Group, Blackett Laboratory, Imperial College London, SW7 2AZ, UK d Albert-Einstein-Institut, Max-Planck-Institut für Gravitationsphysik, 14476 Potsdam, Germany E-mail: thomas.basile@umons.ac.be, euihun.joung@khu.ac.kr, k.mkrtchyan@imperial.ac.uk Abstract: The spinor-helicity representations of massive and (partially-)massless particles in four dimensional (Anti-) de Sitter spacetime are studied within the framework of the dual pair correspondence. We show that the dual groups (aka “little groups”) of the AdS and dS groups are respectively O(2N ) and O ∗ (2N ). For N = 1, the generator of the dual algebra so(2) ∼ = so ∗ (2) ∼ = u(1) corresponds to the helicity operator, and the spinorhelicity representation describes massless particles in (A)dS 4 . For N = 2, the dual algebra is composed of two ideals, s and m Λ . The former ideal s ∼ = so(3) fixes the spin of the particle, while the mass is determined by the latter ideal m Λ , which is isomorphic to so(2, 1), iso(2) or so(3) depending on the cosmological constant being positive, zero or negative. In the case of a positive cosmological constant, namely dS 4 , the spinor-helicity representation contains all massive particles corresponding to the principal series representations and the partially-massless particles corresponding to the discrete series representations leaving out only the light massive particles corresponding to the complementary series representations. The zero and negative cosmological constant cases, which had been addressed in earlier references, are also discussed briefly. Finally, we consider the multilinear form of helicity spinors invariant under (A)dS group, which can be served for the (A)dS counterpart of the scattering amplitude, and discuss technical differences and difficulties of the (A)dS cases compared to the flat spacetime case. 1 Matin Mojaza contributed to this work while working at AEI Potsdam until September 2022." 2401.02012v1,"Fast & Fair: Efficient Second-Order Robust Optimization for Fairness in Machine Learning ∗ Allen Joseph Minch † , Hung Anh Dinh Vu ‡ , and Anne Marie Warren § Project Advisor: Dr. Elizabeth Newman ¶ Abstract. This project explores adversarial training techniques to develop fairer Deep Neural Networks (DNNs) to mitigate the inherent bias they are known to exhibit. DNNs are susceptible to inheriting bias with respect to sensitive attributes such as race and gender, which can lead to life-altering outcomes (e.g., demographic bias in facial recognition software used to arrest a suspect). We propose a robust optimization problem, which we demonstrate can improve fairness in several datasets, both synthetic and real-world, using an affine linear model. Leveraging second order information, we are able to find a solution to our optimization problem more efficiently than a purely first order method. Key words. machine learning, fairness, robust optimization, adversarial training, optimization MSC codes. 65F10, 65F22, 65K05, 90C47 1. Introduction. Machine learning has become an integral part of data analysis with its powerful ability to reveal underlying patterns and structures in data. Deep Neural Networks (DNNs) in particular are the gold standard classifying complex data; however, there is a tendency for DNNs to inherit bias from the datasets on which they train. Bias in this sense is not statistical bias, but the ways in which individual advantages or disadvantages manifest in data. This can be especially problematic in areas where machine learning is used to make life-altering decisions such as criminal justice [4] and corporate hiring [7]. The ever-expanding use of machine learning poses a significant ethical question when models are known to perpetuate societal biases [7]. While an in-depth discussion of these ethical concerns is beyond the scope of this work, they motivate our efforts to improve fairness within the models themselves. The unfortunate truth is that the harmful biases we see in our models and in our data come from deep-rooted societal structures that are at present beyond the abilities of machine learning to correct. However, we feel that in the face of these larger issues it is our duty within our means to work towards fairer outcomes. One way to potentially achieve fairer outcomes is to use adversarial training to introduce robustness to a model. Robust optimization aims to make the model less susceptible to small variations in data, known as adversarial attacks, but in doing so decreases model accuracy. Recently, the Fair-Robust-Learning framework was proposed to reduce this unfairness problem in adversarial training [13]. The authors demonstrated that a combination of fairness and adversarial regularization yielded fairer models on benchmark image classification datasets. ∗ Submitted to the editors DATE. Funding: This work is supported in part by the US NSF award DMS-2051019. † Department of Mathematics, Brandeis University, Waltham, MA (allenminch@brandeis.edu) ‡ Department of Mathematics, University of Maryland, College Park, MD (hvu1@terpmail.umd.edu) § University of Minnesota, Minneapolis, MN (warre659@umn.edu, https://anniewarren.github.io) ¶ Department of Mathematics, Emory University, Atlanta, GA (elizabeth.newman@emory.edu). 1" 2401.02023v1,"Stability Analysis of Higher-order Ecological Networks through Tensor Decompositions Anqi Dong 1 and Can Chen 2 Abstract— Complex ecological networks are characterized by intricate interactions that extend beyond traditional pairwise relationships. Understanding the stability of higher-order ecological networks is salient for species coexistence, biodiversity, and community persistence. In this article, we present a novel approach for stability analysis of higher-order ecological networks through tensor decompositions. We are particularly interested in the higher-order generalized Lotka-Volterra model, which captures high-order interactions using tensors of varying orders. To efficiently compute Jacobian matrices and thus determine stability in large ecological networks, we exploit various tensor decompositions, including higher-order singular value decomposition, Canonical Polyadic decomposition, and tensor train decomposition, accompanied by in-depth computational and memory complexity analyses. We demonstrate the effectiveness of our framework with numerical examples. Index Terms— Linear stability, Jacobian matrices, ecological networks, higher-order interactions, tensor decompositions. I. I NTRODUCTION Modeling complex systems and predicting their longterm behavior have drawn significant attention across diverse fields, including mathematics, physics, biology, and social science [31], [18]. Network representations, which assign individual components to nodes and their connections to edges, are widely used to characterize complex systems. They place a specific emphasis on understanding the influence of interactions, quantified by the edge weights, as in weighted Laplacian or adjacency matrices. Networks have been proven to be powerful tools in system modeling, with numerous works on related system-theoretic properties such as stability, controllability, and observability. However, a comprehensive understanding of system characterizations with high-order interactions remains elusive. High-order interactions occur among a group of individual components, and thus can have a significant aggregated effect on the system, whereas standard networks only consider pairwise connections. To address this challenge, high-order networks (i.e., hypergraphs) and their tensorial representations are increasingly being used to model complex realworld systems, where adjacency coefficients can be defined on sets of nodes. Tensors, which are multidimensional arrays [23], [15], [28], have found applications across a wide array of fields, including dynamical systems [11], [13], [9], signal 1 Anqi Dong is with the Department of Mechanical and Aerospace Engineering, University of California, Irvine, Irvine, CA 92617, USA. anqid2@uci.edu 2 Can Chen is with the School of Data Science and Society and the Department of Mathematics, University of North Carolina at Chapel Hill, Chapel Hill, NC 27599, USA. canc@unc.edu processing [29], [14], network science [10], [12], [32], data analysis [33], [24], and more. Not only can the static status of higher-order networks be studied, but also their long-standing interests in stability and state evolution. The associated dynamical system is thus composed of pairwise interaction matrix and high-order interaction tensors. Specifically, we are dealing with complex ecological networks, where the most commonly used model is known as the generalized Lotka–Volterra (GLV) model [7], [8]. It is defined as h i ẋ = x ∗ r + Ax , (1) where x ∈ R n represents species abundance, r ∈ R n is the vector of intrinsic growth rate, and A ∈ R n×n is the interaction matrix whose off-diagonal element A ij represents the effect of species j upon species i. Throughout, we use ∗ to denote element-wise multiplication. Numerous linear stability results have been developed for the GLV model by characterizing its community matrix (Jacobian matrix) [26], [2], [19]. In reality, species interactions often emerge in higher-order combinations, where the relationship between two species is influenced by one or more additional species [5]. Although the importance of high-order interactions has been recognized, their impact on the stability of ecological systems has not been fully understood. Existing findings are preliminary, most of which focus on numerical simulations [21], [30], [20]. We are particularly interested in the higher-order generalized Lotka–Volterra (HOGLV) model, designed to represent higher-order interactions within intricate ecological networks. Computing the Jacobian matrices for such highorder systems is challenging due to the curse of dimensionality, i.e., the size of variables increases exponentially with the dimensionality. To address this challenge, we propose a framework, leveraging from various tensor decompositions, including higher-order singular value decomposition (HOSVD), Canonical Polyadic decomposition (CPD), and tensor train decomposition (TTD), to improve both memory and computational efficiency in the computation of Jacobian matrix for the HOGLV model. The article is organized as follows. In Section II, we begin with preliminaries on basic tensors. In Section III, we introduce the HOGLV model and represent it in the HOSVD, CPD, and TTD forms with memory complexity analyses. In Section IV, we derive the Jacobian matrix of the HOGLV model and offer a computational complexity analysis for each tensor decomposition-based representation. Finally, we" 2401.02025v1,"MNRAS 000, 1–15 (0000) Preprint 5 January 2024 Compiled using MNRAS L A TEX style file v3.0 Formation of collisional ring galaxies in Milgromian dynamics Li Ma, 1,2 Xufen Wu 1,2⋆ 1 CAS Key Laboratory for Research in Galaxies and Cosmology, Department of Astronomy, University of Science and Technology of China, Hefei, 230026, P.R. China 2 School of Astronomy and Space Science, University of Science and Technology of China, Hefei 230026, P.R. China 5 January 2024 ABSTRACT Ring galaxies are rare in the Universe. A head-on or off-centre collision between an intruder galaxy and a disc galaxy leads to a collisional ring galaxy (CRG) when the intruder-to-target mass ratio (ITMR) is over 0.1 in Newtonian dynamics. Within the framework of Milgromian dynamics, the strong equivalence principle is violated due to the presence of an external field. When two galaxies collide towards each other, the dynamical mass of the phantom dark halo in a galaxy is suppressed by the external field induced by the other galaxy. As a consequence of such suppression, the gravitational perturbation for the target galaxy introduced by a collision is weakened. In this case, a minor collision may not be capable of generating a CRG. In this work, we address this issue and perform a series of numerical simulations of collisions by tuning the values of ITMR. We find that the critical ITMR is 0.5 in MOND, which is much larger than that in Newtonian dynamics. The observed massive ring galaxies, such as Arp 147, can be effectively interpreted by CRGs in MOND. This interpretation does not necessitate the presence of dark matter halos for either the target or intruder galaxies. Moreover, for a larger inclination angle or a larger impact parameter, the off-centred ring structure is fainter. The larger critical ITMR indicates that it is harder to form a CRG in Milgrom’s Modified Newtonian Dynamics (MOND). To account for the observed ring structures of the NGC 922-like galaxies in MOND, it is necessary to invoke other scenarios than a dry minor collision. Key words: galaxies: interactions - galaxies: kinematics and dynamics - gravitation - methods: numerical 1 INTRODUCTION A ring galaxy was identified by Zwicky (1941), followed which more ring galaxies have been observed (Vorontsov- Velyaminov 1959; Arp 1966; De Vaucouleurs 1975; Theys & Spiegel 1977; Madore et al. 2009; Conn et al. 2011). The ring structures in galaxies could be generated by several possible mechanisms, including the Lindblad resonances induced by galactic bars (Buta & Combes 1996; Buta et al. 1999), acceration and merger of galaxies (Schweizer et al. 1983; Bekki 1998), and collisions between a disc target galaxy and an intruder galaxy (Lynds & Toomre 1976; Theys & Spiegel 1976). Most ring galaxies are products of galaxy collisions (Few & Madore 1986; Hernquist & Weil 1993; Appleton & Struck- Marcell 1996), thus the collisional ring galaxies (CRGs) are natural laboratories to examine the interactions of galaxies. Within the framework of Newtonian dynamics, there are numerous existing numerical simulations to investigate the formation of CRGs with different parameters of initial conditions, including the orbital parameters such as initial relative velocity (Fiacconi et al. 2012), impact parameter (Toomre 1978; Fiacconi et al. 2012), inclination angle (Lynds & Toomre 1976; Ghosh & Mapelli 2008), and mass ratio be- ⋆ Corresponding author: xufenwu@ustc.edu.cn © 0000 The Authors tween the target and the intruder galaxies (Hernquist & Weil 1993; Horellou & Combes 2001), and also including the gas fraction (Mapelli & Mayer 2012), the bulge-to-disc mass ratio (Chen et al. 2018) and the Toomre instability of the target galaxy (Guo et al. 2022). In these simulations, a ring forms in a disc galaxy after an off-centre or head-on collision with a dwarf galaxy, if the dynamical mass of the dwarf galaxy is larger than 10% of the target galaxy. In Newtonian simulations, both galaxies are embedded in cold dark matter (CDM) halos. Milgrom’s MOdified Newtonian dynamics (MOND, or Milgromian dynamics, Milgrom 1983), an alternative to dark matter halo models, proposed that a modification to gravitation may explain the apparent dark matter effect (Milgrom 1986), namely phantom dark matter. When the gravitational acceleration is below a critical value of 3.7 km 2 s −2 pc −1 , denoted as a 0 , the gravitational acceleration of a system decreases as r −1 by taking into account the above modification. The mass discrepancy on scales from star clusters of a few parsecs to local supervoid and the Hubble tension of a few Gpc can be well explained by MOND (e.g., see the reviews of Sanders & McGaugh 2002; Famaey & McGaugh 2012; Banik & Zhao 2022). Apart from the natural prediction of the baryonic Tully-Fisher relation (Tully & Fisher 1977), MOND accounts for various contexts from the small scale of a few thou-" 2401.02034v1,"Text2MDT: Extracting Medical Decision Trees from Medical Texts Wei Zhu 1a , Wenfeng Li a , Xing Tian c , Pengfei Wang a , Xiaoling Wang a , Jin Chen b , Yuanbin Wu a , Yuan Ni c , Guotong Xie c a Department of Computer Science and Technology, East China Normal University, Shanghai, China b University of Kentucky, Kentucky, United States c Pingan Health Tecnology, Shanghai, China Abstract Knowledge of the medical decision process, which can be modeled as medical decision trees (MDTs), is critical to build clinical decision support systems. However, the current MDT construction methods rely heavily on time-consuming and laborious manual annotation. In this work, we propose a novel task, Text2MDT, to explore the automatic extraction of MDTs from medical texts such as medical guidelines and textbooks. We normalize the form of the MDT and create an annotated Text-to-MDT dataset in Chinese with the participation of medical experts. We investigate two different methods for the Text2MDT tasks: (a) an end-to-end framework which only relies on a GPT style large language models (LLM) instruction tuning to generate all the node information and tree structures. (b) The pipeline framework which decomposes the Text2MDT task to three subtasks. Experiments on our Text2MDT dataset demonstrate that: (a) the end-toend method basd on LLMs (7B parameters or larger) show promising results, and successfully outperform the pipeline methods. (b) The chain-of-thought (COT) prompting method Wei et al. (2022) can improve the performance of the finetuned LLMs on the Text2MDT test set. (c) the lightweight pipelined method based on encoder-based pretrained models can perform comparably with LLMs with model complexity two magnititudes smaller. Our Text2MDT dataset is opensourced at https://tianchi.aliyun.com/dataset/95414, and the 1 Corresponding Author. Email: wzhu@stu.ecnu.edu.cn. Address: Department of Computer Science and Technology, East China Normal University, No. 3663, Zhongshan Road, Putuo District, Shanghai, China, 200050. Preprint submitted to AIIM January 5, 2024" 2401.02048v1,"Random Effect Restricted Mean Survival Time Model Keisuke Hanada 1 and Masahiro Kojima ∗1 1 Kyowa Kirin Co., Ltd January 5, 2024 Abstract The restricted mean survival time (RMST) model has been garnering attention as a way to provide a clinically intuitive measure: the mean survival time. RMST models, which use methods based on pseudo time-to-event values and inverse probability censoring weighting, can adjust covariates. However, no approach has yet been introduced that considers random effects for clusters. In this paper, we propose a new random-effect RMST. We present two methods of analysis that consider variable effects by i) using a generalized mixed model with pseudo-values and ii) integrating the estimated results from the inverse probability censoring weighting estimating equations for each cluster. We evaluate our proposed methods through computer simulations. In addition, we analyze the effect of a mother’s age at birth on under-five deaths in India using states as clusters. Keywords: restricted mean survival time, random effect, cluster effect, pseudo-value, inverse probability censoring weight. 1 Introduction A restricted mean survival time (RMST) is statistically robust and independent under the assumption of the proportional hazards property, and it gives clinically interpretable results in terms of mean survival time [1]. When comparing mean survival times between groups, covariates must be adjusted to account for bias in the baseline information. To analyze timeto-event data, how to handle right-censored data should be considered. Unlike Cox regression, RMST cannot handle a partial likelihood over uncensored data. Andersen et al. [2] proposed a covariate adjustment method that imputes the pseudo-value (PV) derived from the leave-oneout method for censored data and uses the generalized linear model to analyze completed data. A feature of the PV method is that it can also use censored data. Tian et al. [3] proposed a method using inverse probability censoring weighting (IPCW) to account for censored data. There is no approach that considers random effects for clusters. ∗ Address: Biometrics Department, R&D Division, Kyowa Kirin Co., Ltd. Otemachi Financial City Grand Cube, 1-9-2 Otemachi, Chiyoda-ku, Tokyo 100-004, Japan. Tel: +81-3-5205-7200 E-Mail: masahiro.kojima.tk@kyowakirin.com 1" 2401.02055v1,"1 Banner appropriate to article type will appear here in typeset article A quasi-dynamic one-equation model with joint constraints of kinetic energy and helicity fluxes for large eddy simulation of rotating turbulence Depei Song 1,2 , Changping Yu 1 †, Zheng Yan 3 and Xinliang Li 1,2 1 LHD, Institute of Mechanics, Chinese Academy of Sciences, Beijing 100190, PR China 2 School of Engineering Science, University of Chinese Academy of Sciences, Beijing 100049, PR China 3 Institute of Applied Physics and Computational Mathematics, Beijing 100094, PR China (Received xx; revised xx; accepted xx) For settling the problem with rotating turbulence modelling, a quasi-dynamic one-equation subgrid-scale (SGS) model is proposed in this paper. Considering the key role of the joint cascade of kinetic energy and helicity in rotating turbulence, the new SGS model is constrained by the fluxes of kinetic energy and helicity. Specifically, the new theory of dual channels of helicity flux is taken into account. The modelling of the unclosed quantities is achieved by adopting a quasi-dynamic process that eliminates the need for test filtering compared to the classic dynamic process, and the model coefficients are dynamically obtained through the SGS kinetic energy transport equation and considering the joint constraints of kinetic energy and helicity fluxes. As a result, the model demonstrates a high correlation with DNS data in a priori tests. We refer to this new model as the quasi-dynamic joint-constraint model (QCM), which is introduced for both incompressible and compressible flows. To assess the effectiveness of the QCM, numerical experiments are conducted for three typical cases: incompressible streamwise rotating channel flow, transonic streamwise rotating annular pipe flow, and hypersonic transition flow at Mach 6 over a rotating cone. The results suggest that the QCM has the potential to significantly improve the prediction of rotational flows that are strongly influenced by helicity. Additionally, the new model demonstrates excellent capability in handling the transition process. Key words: MSC Codes (Optional) Please enter your MSC Codes here 1. Introduction Rotating turbulence is of critical importance in wide fields of scientific, engineering, and product design applications (Childs 2010), including the design of pumps, gas turbines, and † Email address for correspondence: cpyu@imech.ac.cn" 2401.02068v1,"Packaged Cryogenic Photon Pair Source Using an Effective Packaging Methodology for Cryogenic Integrated Optics D ONALD W ITT * 1,2,4 , L UKAS C HROSTOWSKI 1,2 , AND J EFF Y OUNG 2,3 1 Department of Electrical and Computer Engineering, The University of British Columbia, V6T-1Z4, Vancouver, British Columbia, Canada 2 Stewart Blusson Quantum Matter Institute, V6T 1Z4, Vancouver, British Columbia, Canada 3 Department of Physics and Astronomy, The University of British Columbia, V6T 1Z1, Vancouver, British Columbia, Canada 4 John A. Paulson School of Engineering and Applied Sciences, Harvard University, Cambridge, MA 02138 * donaldwitt@g.harvard.edu January 2, 2024 A new cryogenic packaging methodology that is widely applicable to packaging any integrated photonics circuit for operation at both room temperature and cryogenic temperature is reported. The method requires only equipment and techniques available in any integrated optics lab and works on standard integrated photonic chips. Our methodology is then used to enable the measurement of a single photon pair sourced based on a silicon ring resonator at cryogenic temperatures. When operating at 5.9 K, this source is measured to have a peak pair generation rate 183 times greater then at room temperature in the CL-band. 1. INTRODUCTION single photon pair generation rate of a silicon photonic ring resonator pumped around 1560 nm while operating at both room temperature and 5.9K. We showed that this ring resonator at cryogenic temperature has a 183 times greater photon pair generation rate and an improved coincidence to accidental count ratio (CAR) due to a large reduction in undesirable non-linear thermo-optic mode shifting in contrast to the kerr non-linearity on which the source operates. Our method is highly scalable, as it is compatible with widely available 64 channel fiber arrays. In the field of quantum information science, many integrative photonic devices need to operate at cryogenic temperatures. For example, detectors such as superconducting single wire nanowire detectors[1, 2] transition edge detectors [3], color emitters such as color centers such as [4–8] and qunatum dots [9] all operate in the cryogenic temperature regime. It is desirable to have a method of packaging such devices at room temperature so that they can operate at both room temperature and cryogenic temperature without the need for any realignment or adjustment. However, it is difficult to develop such packaging techniques due to the extreme temperature difference and the thermally induced stresses caused by the variation in thermal expansion between various materials. Due to stresses induced by this extreme temperature difference, many existing methods experience increased loss or fail completely when operating at cryogenic temperature [10–12]. In addition, many existing techniques require specialized equipment for assembly [13, 14]. Several of these coupling methods are done one fiber at a time, limiting their scalability [10, 11, 14]. A new method is required that can address the challenges of temperature related stresses, the need for specialized equipment, and scalability. Here, we present a new methodology that packages photonic devices with low loss, and that simultaneously connects multiple fibers, while relying on equipment available in a standard optics lab. Using this new methodology, we are able to package chips with low loss across multiple fibres that can operate over temperatures ranging from room temperature to 5.9K. To demonstrate the applicability of our technique, we measured the 2. PACKAGING METHODOLOGY Grating couplers are commonly used to couple light to an integrate photonic circuits. They do this through a diffraction grating etched into the surface of the chip that is designed to diffract out of plane light from a fiber into an in-plane waveguide mode [15–18]. Grating couplers allow for the rapid characterization of many photonic components, as they can be placed anywhere on the surface of a chip, in contrast to techniques such as edge couplers, taper fiber coupling and photonic wirebonding, [19] which only allow light to be input on the edge of a chip. Moreover, grating couplers do not require specialized equipment to fabricate, in contrast to photonic wirebonding and taper fiber coupling [13, 14]. The primary disadvantage of grating couplers are their high insertion loss and low bandwidth. However, this disadvantage can be overcome through careful design of the grating couplers [18]. At cryogenic temperatures, the primary disadvantage of grating couplers is their need for precise alignment. The motorized stages used for this precise alignment do not operate well at cryo- 1" 2401.02086v2,"View-based Explanations for Graph Neural Networks TINGYANG CHEN ∗ , Zhejiang University, China DAZHUO QIU ∗ , Aalborg University, Denmark YINGHUI WU, Case Western Reserve University, USA ARIJIT KHAN, Aalborg University, Denmark XIANGYU KE, Zhejiang University, China YUNJUN GAO, Zhejiang University, China Generating explanations for graph neural networks (GNNs) has been studied to understand their behaviors in analytical tasks such as graph classification. Existing approaches aim to understand the overall results of GNNs rather than providing explanations for specific class labels of interest, and may return explanation structures that are hard to access, nor directly queryable. We propose GVEX, a novel paradigm that generates Graph Views for GNN EXplanation. (1) We design a two-tier explanation structure called explanation views. An explanation view consists of a set of graph patterns and a set of induced explanation subgraphs. Given a database G of multiple graphs and a specific class label 𝑙 assigned by a GNN-based classifier M, it concisely describes the fraction of G that best explains why 𝑙 is assigned by M. (2) We propose quality measures and formulate an optimization problem to compute optimal explanation views for GNN explanation. We show that the problem is Σ 𝑃 2 -hard. (3) We present two algorithms. The first one follows an explain-and-summarize strategy that first generates high-quality explanation subgraphs which best explain GNNs in terms of feature influence maximization, and then performs a summarization step to generate patterns. We show that this strategy provides an approximation ratio of 12 . Our second algorithm performs a single-pass to an input node stream in batches to incrementally maintain explanation views, having an anytime quality guarantee of 14 -approximation. Using real-world benchmark data, we experimentally demonstrate the effectiveness, efficiency, and scalability of GVEX. Through case studies, we showcase the practical applications of GVEX. CCS Concepts: • Computing methodologies → Neural networks; • Information systems → Graph-based database models. Additional Key Words and Phrases: deep learning, graph neural networks, explainable AI, graph views, data mining, approximation algorithm ACM Reference Format: Tingyang Chen, Dazhuo Qiu, Yinghui Wu, Arijit Khan, Xiangyu Ke, and Yunjun Gao. 2024. View-based Explanations for Graph Neural Networks. Proc. ACM Manag. Data 2, 1 (SIGMOD), Article 40 (February 2024), 31 pages. https://doi.org/10.1145/3639295 * Both authors contributed equally to this research. Authors’ addresses: Tingyang Chen, chenty@zju.edu.cn, Zhejiang University, Ningbo, China; Dazhuo Qiu, dazhuoq@cs.aau. dk, Aalborg University, Aalborg, Denmark; Yinghui Wu, yxw1650@case.edu, Case Western Reserve University, Cleveland, Ohio, USA; Arijit Khan, arijitk@cs.aau.dk, Aalborg University, Aalborg, Denmark; Xiangyu Ke, xiangyu.ke@zju.edu.cn, Zhejiang University, Hangzhou & Ningbo, China; Yunjun Gao, gaoyj@zju.edu.cn, Zhejiang University, Hangzhou, China. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM 2836-6573/2024/2-ART40 https://doi.org/10.1145/3639295 Proc. ACM Manag. Data, Vol. 2, No. 1 (SIGMOD), Article 40. Publication date: February 2024." 2401.02091v1,"Termination of Rewriting on Reversible Boolean Circuits as a Free 3-Category Problem Adriano Barile, Stefano Berardi and Luca Roversi University of Turin, Italy Abstract Reversible Boolean Circuits are an interesting computational model under many aspects and in different fields, ranging from Reversible Computing to Quantum Computing. Our contribute is to describe a specific class of Reversible Boolean Circuits - which is as expressive as classical circuits - as a bi-dimensional diagrammatic programming language. We uniformly represent the Reversible Boolean Circuits we focus on as a free 3-category Toff. This formalism allows us to incorporate the representation of circuits and of rewriting rules on them, and to prove termination of rewriting. Termination follows from defining a non-identities-preserving functor from our free 3-category Toff into a suitable 3-category Move that traces the “moves"" applied to wires inside circuits. Keywords Reversible Boolean Circuits, Reversible Computing, n-Categories, Polygraphs, Rewriting 1. Introduction The class of Reversible Boolean circuits (from now on, RBC) constitutes an interesting computational model, for many reasons. We name just some of them: once implemented, they may help to reduce electronic devices energy consumption [1], easing miniaturization, due to a limited heat dissipation; they are at the core of cryptographic block cyphers analysis [2], and of quantum circuits synthesis [3, 4]. Moreover, reversibility means that if we execute the circuits in the opposite direction, e.g. bottom-up instead of top-down, we are able to recover the input. RBC can nevertheless simulate all non-reversible classical circuits [5]. 𝑥 𝑥 𝑥 𝑦 𝑦 𝑥 𝑥 𝑥 𝑐 𝑥 𝑦 𝑐 N T 2 1−𝑥 𝑥 T 3 𝑥 𝑦 𝑐+𝑥𝑦 𝑐+𝑥 (a) Generators of RBC and their semantics T 3 T 3 ⇛ T 3 ⇛ T 3 (b) An example of reduction on a Reversible Boolean Circuit Figure 1: Generators of Reversible Boolean Circuits and a reduction on them Proceedings of the 24th Italian Conference on Theoretical Computer Science, Palermo, Italy, September 13-15, 2023 $ adriano.barile@unito.it (A. Barile); stefano.berardi@unito.it (S. Berardi); luca.roversi@unito.it (L. Roversi)  0000-0002-5122-0340 (A. Barile); 0000-0001-5427-0020 (S. Berardi); 0000-0002-1871-6109 (L. Roversi) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org)" 2401.02101v1,"ICI-Free Channel Estimation and Wireless Gesture Recognition Based on Cellular Signals Rui Peng, Student Member, IEEE, Yafei Tian, Member, IEEE, and Shengqian Han, Member, IEEE Abstract—Device-free wireless sensing attracts enormous attentions since it senses the environment without additional devices. While cellular signals are good opportunistic radio sources, the influence of inter-cell interference (ICI) on wireless sensing has not been adequately addressed. In this letter, we first investigate the cause of ICI and its impact on wireless sensing. Then we propose an ICI-free channel estimation method by reconstructing the broadcast signals of adjacent cells and solving simultaneous equations. Wireless gesture recognition can be greatly benefited by ICI mitigation. Finally, we build a prototype system to receive the commercial 4G-LTE signals, and demonstrate the accuracies of wireless gesture recognition under various conditions. Index terms— Device-free wireless sensing, cellular signals, ICI, broadcast signals, gesture recognition. I. I NTRODUCTION Integrated sensing and communication (ISAC) is a promising technology in the sixth generation (6G) mobile communication system. Device-free wireless sensing (DFWS) is one of the popular research areas in ISAC. Except for regular data transmission, the communication system can also help to identify human behaviors by capturing the variation of channel environment. The major benefit of DFWS is that it optimizes the utilization of time-frequency resources by integrating sensing tasks with communications, without any additional devices [1]. A majority of DFWS researches exploit WiFi as radio source, since it is convenient to extract the channel state information (CSI) by off-the-shelf network interface card. On the contrary, currently, there is no CSI extraction tool available for 4G/5G modem, so the acquisition of CSI relies on selfdeveloped software defined radio (SDR). From the opportunistic signal perspective, cellular signal has broad coverage and continuous samplings of the CSI [2], making it a better choice for DFWS. Due to the limitation of CSI accessibility, only a few works studied DFWS with 4G long term evolution (LTE) signal. In the literature, [3] proposed a crowd density estimation method through CSI, and proved that CSI can achieve better performance than reference signal received power (RSRP). The respiration detection was studied in [4]. By utilizing the coverage advantage of LTE and combining the results measured in different frequency bands, the detection error is decreased and the blind spot issue is solved. The gesture This work was supported by the National Natural Science Foundation of China under Grants 61971023. The authors are with the School of Electronics and Information Engineering, Beihang University, Beijing 100191, P. R. China (e-mail: pengrui@buaa.edu.cn; ytian@buaa.edu.cn; sqhan@buaa.edu.cn). recognition was explored in [5], where the direction of base station (BS) is first probed by a preamble gesture, and then the user stands in the opposite direction of the BS to improve the recognition performance. Despite these works achieved wireless sensing with LTE signals, none of them has investigated the influence of intercell interference (ICI). However, ICI is a practical problem in cellular networks and has critical impact on wireless sensing. Since the soft frequency reuse scheme is widely applied in current networks, most areas are covered by multiple cells operated in the same frequency band. Usually, CSI is estimated by cell-specific reference signal (CRS). While the CRSs from adjacent cells are inserted on different subcarriers to avoid collision, the CRS from one cell may still be contaminated by the data transmitted from another cell. For fine sensing tasks such as gesture recognition, the motion information is extracted from the subtle variation of propagation channels, and is more vulnerable to ICI. The recognition performance will be dramatically degraded whenever the strength of ICI exceeds the reflection power of human hand. In this letter, we propose an ICI-free channel estimation method for wireless gesture recognition based on the time division duplexing (TDD) LTE cellular signals, and validate its effectiveness by prototype experiments. The main contributions of this work are as follows: 1) We analyze the source of ICI and its characteristics, and clarify its impact on CRS-based channel estimation and subsequent gesture recognitions. 2) We propose to use the physical broadcast channel (PBCH) as reference signal, so that the local sequences of ICI are known, and the channel estimation is transformed from an interference-limited problem to a noiselimited problem. 3) We develop the multi-cell PBCH local sequences reconstruction and joint channel estimation methods, and the ICI-free CSI can thus be acquired. 4) We build a prototype system to receive commercial TDD- LTE signals and implement gesture recognition in realtime. Experiment results exhibit superior performance than existing methods. II. S YSTEM M ODEL A. LTE background In LTE downlink (DL) signal, a system frame with duration 10ms is divided into 10 subframes. Each subframe comprises of 14 orthogonal frequency division multiplexing (OFDM) symbols in normal cyclic prefix (CP) case. A resource block" 2401.02105v1,"Perceptions of Humanoid Robots in Caregiving: A Study of Skilled Nursing Home and Long Term Care Administrators Rana Imtiaz 1 , Arshia Khan 2 a 1 2 Kentucky College of Osteopathic Medicine, Pikeville, Kentucky, USA, University of Minnesota Duluth, Department of Computer Science, Duluth, MN, USA. ranaimtiaz@uped.edu, akhan@d.umn.edu Keywords: Humanoid robots in nursing homes, perspectives of nursing home administrators, dementia care, nursing home residents, humanoid robots caring for elders. Abstract: As the aging population increases and the shortage of healthcare workers increases, the need to examine other means for caring for the aging population increases. One such means is the use of humanoid robots to care for social, emotional, and physical wellbeing of the people above 65. Understanding skilled and long term care nursing home administrators' perspectives on humanoid robots in caregiving is crucial as their insights shape the implementation of robots and their potential impact on resident well-being and quality of life. This authors surveyed two hundred and sixty nine nursing homes executives to understand their perspectives on the use of humanoid robots in their nursing home facilities. The data was coded and results revealed that the executives were keen on exploring other avenues for care such as robotics that would enhance their nursing homes abilities to care for their residents. Qualitative analysis reveals diverse perspectives on integrating humanoid robots in nursing homes. While acknowledging benefits like improved engagement and staff support, concerns persist about costs, impacts on human interaction, and doubts about robot effectiveness. This highlights complex barriers—financial, technical, and human—and emphasizes the need for strategic implementation. It underscores the importance of thorough training, role clarity, and showcasing technology benefits to ensure efficiency and satisfaction among staff and residents. 1 INTRODUCTION The integration of technology, particularly humanoid robots, within caregiving settings has sparked considerable interest and debate in recent years. Among these environments, skilled and long term care nursing homes stand at the forefront of exploring innovative solutions to address the growing complexities of patient care, especially for individuals with neurodegenerative conditions like dementia and Alzheimer's disease. This paper delves into the perceptions of skilled and long term care nursing home administrators regarding the incorporation of humanoid robots in caregiving. Understanding their viewpoints and insights is crucial in assessing the feasibility, challenges, and potential benefits of integrating this technology within such critical care settings. This study aims to unravel the nuanced perspectives, concerns, and expectations of these administrators, shedding light on the a https://orcid.org/0000-0001-8779-9617 implications of humanoid robots in transforming and augmenting the landscape of caregiving in skilled and long term care nursing facilities. Understanding the perspectives of skilled and long term care nursing home administrators regarding humanoid robots in caregiving is paramount due to their pivotal role in shaping and implementing care strategies. Administrators hold comprehensive insights into the operational, logistical, and ethical considerations within these facilities. Their perspectives directly impact the adoption and utilization of technological innovations like humanoid robots, which have the potential to significantly impact resident care. By comprehending administrators' viewpoints, we gain crucial insights into the feasibility, challenges, and potential benefits of integrating this technology into caregiving practices, ultimately aiming to enhance the wellbeing and quality of life for the residents under their care." 2401.02129v1,"Gravitational Slip parameter and Gravitational Waves in Einstein-Cartan theory Maryam Ranjbar, ∗ Siamak Akhshabi, † and Mohsen Shadmehri ‡ Department of Physics, Faculty of Sciences, Golestan University, Gorgan, Iran (Dated: January 5, 2024) We study the evolution of scalar and tensor cosmological perturbations in the framework of the Einstein-Cartan theory of gravity. The value of the gravitational slip parameter which is defined as the ratio of the two scalar potentials in the Newtonian gauge, can be used to determine whether or not the gravity is modified. We calculate the value of slip parameter in the Einstein-Cartan cosmology and show that it falls within the observed range. We also discuss the evolution of the cosmic gravitational waves as another measure of the modification of gravity. I. INTRODUCTION General Relativity (GR) has successfully predicted numerous phenomena, as corroborated by various studies [1–7]. However, several mysteries persist in the realm of physics. The nature of the cosmological constant [8, 9], dark energy [8–12], and dark matter [13–16] are among the phenomena yet to be comprehensively understood. One potential reason for these uncertainties is that GR, in the context of quantum mechanics, is fundamentally a classical theory. It is primarily tailored for the analysis of macroscopic phenomena. To address this limitation and extend the scope of GR to microphysical processes, various modified gravity theories have been proposed. Notably among them are those that factor in the torsion of spacetime, which is described as the non-symmetric part of the affine connection. The simplest of such theories, Einstein-Cartan theory (ECT) [17–19] has the same Lagrangian as in GR but the geometry of space-time is no longer Riemannian, but is a more general Riemann-Cartan space-time [17–21]. In Einstein-Cartan theory, torsion is coupled to the spin angular momentum of the matter fields which acts as a source for gravitational interactions. Einstein-Cartan theory is well studied in the literature and has been used to study cosmological constant’s sign problem [22], Hubble tension problem [23], Big Bang singularity [24–28], the emergent universe scenario [29], and Dark matter [30]. The detection of gravitational waves by LIGO has provided a unique opportunity to gain valuable insights into both astrophysics and cosmology, particularly in relation to the early universe [6]. Within the framework of ECT, the presence of torsion can introduce notable changes in the generation and propagation of gravitational waves. Research presented in [31] has demonstrated that neglecting the consideration of torsion may lead to systematic errors when studying the propagation of gravitational waves. Furthermore, as highlighted in [32], ECT ∗ maryamrnjbr96@gmail.com † s.akhshabi@gu.ac.ir ‡ m.shadmehri@gu.ac.ir can yield significantly different descriptions of gravitational wave fluctuations compared to those derived from General Relativity (GR). Given that the effects of torsion and spin during the early stages of the universe are assumed to be significant [33], investigating the behavior of GW through the ECT not only allows us to test the validity of this model, but also has the potential to reveal novel understandings regarding the nature of gravity. Typically, modified gravity theories adjust the strength of gravity on large scales and modify the weak gravitational lensing effect. Such alterations permit us to construct a model-independent observational test to ascertain the validity of the proposed theories [34]. Modelindependent methods, specifically at the linear perturbation level, were formulated in [35–39]. These studies employ parameterization and principal component analysis to constrain the cosmic growth and expansion history. An alternative strategy involves utilizing the constraints and known characteristics of dark energy, along with its behavior, as a foundation for developing and evaluating theories. This approach has been elaborated upon in [40–42]. Each of the methods mentioned above requires the use of parameterizations to differentiate between various models based on data. However, it’s essential to acknowledge that these parameterizations introduce biases that are contingent on the specific parameterization chosen. These biases have the potential to influence the accuracy of the results [43]. On the other hand, considering the perturbations level, there is an approach that is fully model-independent. This measures properties like the anisotropic stress without making any assumptions about the nature of the dark energy. The existence of anisotropic stress results in the appearance of gravitational slip i.e. the slip parameter η defined as the ratio between two gravitational potentials in a perturbed Friedmann-Robertson-Walker (FRW) universe being different from unity. Given that the contribution of neutrinos’ free streaming to the anisotropic pressure in the late stages of the universe becomes negligible in the presence of perfect fluid matter, the only source of anisotropic stress could be a modification of gravity. In other words, the existence of anisotropic stress leads to a difference in values between the two scalar gravitational potentials that appear in the linear perturbation equations of motion and can be described as the gravitational" 2401.02132v1,"DCR-C ONSISTENCY : D IVIDE -C ONQUER -R EASONING FOR C ONSISTENCY E VALUATION AND I MPROVEMENT OF L ARGE L ANGUAGE M ODELS Wendi Cui 1 , Jiaxin Zhang 1,2∗ , Zhuohang Li 3 , Damien Lopez 1 , Kamalika Das 1,2 , Bradley Malin 3,4 , Sricharan Kumar 1,2 1 Intuit 2 Intuit AI Research 3 Vanderbilt University 4 Vanderbilt University Medical Center {wendi_cui, jiaxin_zhang}@intuit.com, zhuohang.li@vanderbilt.edu A BSTRACT Evaluating the quality and variability of text generated by Large Language Models (LLMs) poses a significant, yet unresolved research challenge. Traditional evaluation methods, such as ROUGE and BERTScore, which measure token similarity, often fail to capture the holistic semantic equivalence. This results in a low correlation with human judgments and intuition, which is especially problematic in high-stakes applications like healthcare and finance where reliability, safety, and robust decision-making are highly critical. This work proposes DCR, an automated framework for evaluating and improving the consistency of LLM-generated texts using a divide-conquer-reasoning approach. Unlike existing LLM-based evaluators that operate at the paragraph level, our method employs a divide-and-conquer evaluator (DCE) that breaks down the paragraph-to-paragraph comparison between two generated responses into individual sentence-to-paragraph comparisons, each evaluated based on predefined criteria. To facilitate this approach, we introduce an automatic metric converter (AMC) that translates the output from DCE into an interpretable numeric score. Beyond the consistency evaluation, we further present a reason-assisted improver (RAI) that leverages the analytical reasons with explanations identified by DCE to generate new responses aimed at reducing these inconsistencies. Through comprehensive and systematic empirical analysis, we show that our approach outperforms state-of-the-art methods by a large margin (e.g., +19.3% and +24.3% on the SummEval dataset) in evaluating the consistency of LLM generation across multiple benchmarks in semantic, factual, and summarization consistency tasks. Our approach also substantially reduces nearly 90% output inconsistencies, showing promise for effective hallucination mitigation. 1 I NTRODUCTION Large language models (LLMs) such as GPT-4 and PaLM 2 (Yang et al., 2023; Bubeck et al., 2023) have demonstrated impressive performance on a variety of natural language generation (NLG) tasks, including summarization (Tam et al., 2022), open-book question-answering (QA) (Kamalloo et al., 2023), and retrieval-augmented generation (RAG) (Lewis et al., 2020; Liu et al., 2023a). The evaluation of generated response quality often involves the assessment of the semantic equivalence between two pieces of text, e.g., between the generated response and the original text in summarization tasks or between two candidate responses in open-book QA tasks. However, conventional evaluation methods, such as BARTScore (Yuan et al., 2021) and BERTScore (Zhang et al., 2020), which rely on token-level comparison, are inadequate for accurately and reliably measuring the quality of generated content, particularly in complex scenarios with long paragraphs (Liu et al., 2023b; Hanna & Bojar, 2021). To address this issue, LLM-based evaluators such as G-Eval (Liu et al., 2023b) and GPTScore (Jinlan et al., 2023) have proposed a new framework that evaluates texts via paragraph-level comparison. While these evaluators show promise for certain tasks, their scores often fail to achieve high concordance with human judgments of semantic equivalence. Furthermore, ∗ Corresponding Author. Our code is available at https://github.com/intuit-ai-research/ DCR-consistency. 1" 2401.02135v1,"POSCUDA: POSITION BASED CONVOLUTION FOR UNLEARNABLE AUDIO DATASETS Vignesh Gokul Shlomo Dubnov University of California, San Diego Department of Computer Science vgokul@ucsd.edu University of California, San Diego Department of Music sdubnov@ucsd.edu ABSTRACT Deep learning models require large amounts of clean data to acheive good performance. To avoid the cost of expensive data acquisition, researchers use the abundant data available on the internet. This raises significant privacy concerns on the potential misuse of personal data for model training without authorisation. Recent works such as CUDA propose solutions to this problem by adding class-wise blurs to make datasets unlearnable, i.e a model can never use the acquired dataset for learning. However these methods often reduce the quality of the data making it useless for practical applications. We introduce PosCUDA, a position based convolution for creating unlearnable audio datasets. PosCUDA uses class-wise convolutions on small patches of audio. The location of the patches are based on a private key for each class, hence the model learns the relations between positional blurs and labels, while failing to generalize. We empirically show that PosCUDA can achieve unlearnability while maintaining the quality of the original audio datasets. Our proposed method is also robust to different audio feature representations such as MFCC, raw audio and different architectures such as transformers, convolutional networks etc. Index Terms— Unlearnable Datasets, Adversarial Learning, Audio Classification 1. INTRODUCTION With the advent of large deep learning models, there is a huge need for massive clean datasets. To offset the expensive cost of data collection, researchers use the widely abundant data available on the internet. This includes image, text and audio data that individual users have uploaded to the internet. This raises an important problem on unauthorized usage of private personal data for model training. For instance, recently image generation models have been trained on facial images, artistic content etc that are available on the internet without the consent of the owners [1]. Similarly, musical audio samples of different content creators have been used for training both classification and generative models [2,3]. All these incidents emphasize the need to create unlearnable datasets that can be uploaded by content creators while being protected from being consumed by learning models. One approach to solve this issue is by creating unlearnable datasets [4–6], i.e datasets that tamper any model’s capability to learn from them. If an attacker builds a model using unlearnable datasets, the performance of such a model should be similar to a random baseline. There are three important characterstics of unlearnable datasets: 1) creation of unlearnable datasets should be fast and 3) the quality of unlearnable datasets should be as close as possible to the original data for practical purposes. Recent works such as REM [7] and CUDA [8] try to learn unlearnable datasets that satisfy all the three criteria. However REM has been shown to be vulnerable in the presence of data augmentation and CUDA affects the quality of the data by a huge factor. Moreover, all the above methods focus on image datasets and are not applicable for audio data. Audio unlearnable datasets present a unique challenge as the quality of audio can be easily detoriarated with additive noises. Furthermore, machine learning models for audio use a variety of input representations such as MFCC, spectrograms, raw audio etc that can easily break any pre-programmed unlearnability in the dataset. It is important for audio unlearnable datasets to be robust to any feature representation derived from the original dataset and data augmentations, while preserving the quality of the original audio as much as possible. To address the above limitations, we propose PosCUDA, a method to create unlearnable datasets for audio. PosCUDA uses positional class-wise filters to help model learn relationships between labels and data, failing to generalize on new data. We apply class-wise blurs to a patch location of a sample based on a private key for each class. This means that instead of applying noise/blur over the entire data, only a small portion of the data is blurred, preserving the overall quality of the original sample. PosCUDA is fast, robust to any feature representation and minimally affects the quality of data making it applicable for practical use. 2. RELATED WORK Adversarial Poisoning: Poisoning attacks [9–12] introduce some form of noise in the training process to make the model" 2401.02138v1,"Received: Added at production Revised: Added at production Accepted: Added at production DOI: xxx/xxxx ORIGINAL RESEARCH Explore Human Parsing Modality for Action Recognition Jinfu Liu ∗1 Zhao †1 Runwei Ding ∗2 Nan Dai 4 Fanyang Meng 3 Shen Mengyuan Liu †2 1 School of Intelligent Systems Engineering, Sun Yat-sen University, Shenzhen, China 2 The Key Laboratory of Machine Perception, Shenzhen Graduate School, Peking University, Shenzhen, China 3 Peng Cheng Laboratory, Shenzhen, China 4 Changchun University of Science and Technology, Changchun, China Correspondence Shen Zhao Email: zhaosh35@mail.sysu.edu.cn Mengyuan Liu Email: nkliuyifang@gmail.com ∗ Yuhang Wen 1 means co-first authors. Abstract Multimodal-based action recognition methods have achieved high success using pose and RGB modality. However, skeletons sequences lack appearance depiction and RGB images suffer irrelevant noise due to modality limitations. To address this, we introduce human parsing feature map as a novel modality, since it can selectively retain effective semantic features of the body parts, while filtering out most irrelevant noise. We propose a new dual-branch framework called Ensemble Human Parsing and Pose Network (EPP-Net), which is the first to leverage both skeletons and human parsing modalities for action recognition. The first human pose branch feeds robust skeletons in graph convolutional network to model pose features, while the second human parsing branch also leverages depictive parsing feature maps to model parsing festures via convolutional backbones. The two high-level features will be effectively combined through a late fusion strategy for better action recognition. Extensive experiments on NTU RGB+D and NTU RGB+D 120 benchmarks consistently verify the effectiveness of our proposed EPP-Net, which outperforms the existing action recognition methods. Our code is available at: https://github.com/liujf69/EPP-Net-Action. KEYWORDS Action recognition, Human parsing, Human skeletons 1 INTRODUCTION Human action recognition is an important task in the field of computer vision, which also has great research value and broad application prospects in education[1], human-computer interaction[2] and content-based video retrieval[3]. It can also be integrated with fields such as motion prediction[4], pose estimation[5] and micro-expression generation[6] to accomplish more complex human-related tasks. Most related methods[7, 8, 9, 10] use unimodal data for action recognition, typically skeleton-based action recognition, which take human skeletons[11, 12, 13, 14] as the input. In recent years, methods[15, 16] of integrating multiple modalities have emerged to make effective use of multimodal features for better action recognition. Among them, the human skeleton and RGB modality are two widely-adopted input modalities. Actually the skeleton modality can be viewed as a natural topological graph, where the graph vertices and edges represent joints and bones of human body respectively. The graph-structured skeleton can well represent body movements and is highly robust to environmental changes[17], thereby CAAITrans.Intell.Technol xxxx;xx:1–12 adopted in many studies using graph convolutional networks (GCNs)[18, 8, 7, 19, 20, 4]. Besides, the RGB modality has rich appearance information, therefore some prior studies in action recognition employ convolutional neural networks (CNNs)[15, 21] to model spatiotemporal features from RGB images and achieve the desired effect. In multimodal-based action recognition, the features and complementarity between modalities are vital. However, most existing methods[15, 16] based on skeleton and RGB modality have some limitations in representation due to the input modality. For instance, the skeleton modality lacks the ability to depict the appearance of human body parts, while the RGB modality is prone to being influenced by various sources of noise, including background interference and changes in illumination. So it is meaningful to explore another modality that incorporates body-part appearance depiction while remaining noiseless and robust. Inspired by this motivation, we intend to introduce the human parsing into action recognition. Actually the human parsing facilitates the recognition of distinct semantic parts[22] and effectively eliminates irrelevant details while retaining crucial extrinsic features of the human body. Meanwhile, we propose an Ensemble Human Parsing and Pose Network (EPP-Net) for wileyonlinelibrary.com/journal/ © xxxx Copyright Holder Name 1" 2401.02158v1,"Shayona@SMM4H’23: COVID-19 Self diagnosis classification using BERT and LightGBM models Rushi Chavda 1 , Darshan Makwana 1 , Vraj Patel 2 , Anupam Shukla 2 1 Indian Institute of Technology, Bombay 2 National Institute of Technology, Surat Abstract This paper describes approaches and results for shared Task 1 and 4 of SMMH4-23 by Team Shayona. Shared Task-1 was binary classification of english tweets self-reporting a COVID-19 diagnosis, and Shared Task-4 was Binary classification of English Reddit posts self-reporting a social anxiety disorder diagnosis. Our team has achieved the highest f1-score 0.94 in Task-1 among all participants. We have leveraged the Transformer model (BERT) in combination with the LightGBM model for both tasks. Introduction In recent years, the surge in worldwide social media utilization has provided researchers with fresh prospects to extract health-related data[7], which can ultimately be harnessed to enhance public health. The Social Media Mining for Health Applications (SMM4H) Shared Tasks address natural language processing (NLP) challenges of using social media data for health informatics, including informal, colloquial expressions, misspellings, noise, data sparsity, ambiguity, and multilingual posts[9]. In its 2023 call, 5 shared tasks were given. We had participated in Task-1 and Task-4. In Task-1, In the context of monitoring COVID-19 experiences via Twitter, this research addresses the challenge of automated binary classification. The task involves discerning self-reported COVID- 19 diagnoses (”1”) from non-diagnostic mentions (”0”), enabling real-time, large-scale analysis. This problem focuses on distinguishing explicit diagnoses rather than mere user experiences. Task-4 was also a binary classification problem, Exploring patients’ perspectives and medical needs through social media analysis offers insights into disease journeys. Social media listening (SML) has the potential to advance disease understanding and therapy development[2]. For this task, we used a dataset extracted from the subreddit r/socialanxiety. The challenge is to build a classifier that correctly identifies patients that report having a positive or probable diagnosis of social anxiety disorder (positive cases labeled as ‘1’) from patients that report not having a diagnosis or the presence of a diagnosis is unlikely or unclear (negative cases labeled as ‘0’). We know Transformer models are outperforming in all Natural Language downstream tasks[4], we have leveraged BERT model (digitalepidemiologylab/covid-twitter-bert-v2[6]) from hugging face and further fine tuned it using given training data on binary classification task, and then used its embeddings to train LightGBM model. The selection of LightGBM is mostly a result of its enormous success since its launch in 2017. The benefits it has over other algorithms support this accomplishment[5]. In fact, LightGBM is well-known for its rapid training speed, high accuracy, and minimal memory usage, as well as for supporting parallel, distributed, and GPU Learning[5]. Going ahead in this paper we have shown comparison between our different approaches, and future work. Both tasks provide a binary classification 1" 2401.02166v1,"Measurement xxx (xxxx) 114090 Contents lists available at ScienceDirect Measurement F journal homepage: www.elsevier.com/locate/measurement OO Temperature compensation in high accuracy accelerometers using multisensor and machine learning methods Lorenzo Iafolla a , 1 , Francesco Santoli b , Roberto Carluccio a , Stefano Chiappini a , Emiliano Fiorenza b , Carlo Lefevre b , Pasqualino Loffredo b , Marco Lucente b , Alfredo Morbidini b , Alessandro Pignatelli a , Massimo Chiappini a a Istituto Nazionale di Geofisica e Vulcanologia, Via di Vigna Murata 605, 00143 Rome, Italy PR b Istituto di Astrofisica e Planetologia Spaziali (IAPS), Istituto Nazionale di Astrofisica (INAF), Via del Fosso del Cavaliere 100, 00133 Roma, Italy ABSTRACT Keywords: Accelerometer Temperature Multi-sensor Machine learning Deep learning Thermal gradient Gravimeter Temperature is a major source of inaccuracy in high-sensitivity accelerometers and gravimeters. Active thermal control systems require power and may not be ideal in some contexts such as airborne or spaceborne applications. We propose a solution that relies on multiple thermometers placed within the accelerometer to measure temperature and thermal gradient variations. Machine Learning algorithms are used to relate the temperatures to their effect on the accelerometer readings. However, obtaining labeled data for training these algorithms can be difficult. Therefore, we also developed a training platform capable of replicating temperature variations in a laboratory setting. Our experiments revealed that thermal gradients had a significant effect on accelerometer readings, emphasizing the importance of multiple thermometers. The proposed method was experimentally tested and revealed a great potential to be extended to other sources of inaccuracy as well as to other types of measuring systems, such as magnetometers or gyroscopes. EC TE D ARTICLE INFO 1. Introduction CO RR This work was done within the framework of GAIN (Gravimetro Aereo INtelligente, Airborne Intelligent Gravimeter) project, which aimed to create a new strapdown gravimeter for airborne gravity surveys. The scope of gravity measurement is broad and generally related to understanding the structure of the Earth [21]. For example, gravimetry is one of the oldest methods for geophysical exploration [22] and for measuring changes in Earth structure over time [28]. Airborne gravimetry is a demanding method for geophysical surveying, as high-accuracy measurements are required in a very noisy environment [26]. State-of-the-art airborne gravimeters can reach down to1mgal (10 −5 m/s 2 ) accuracy [1,9,13], and further improvements are needed to detect small sources of gravity anomalies. High sensitivity accelerometer and gravimeters can easily be more accurate than 1mgal, but within moving platforms, such as an aircraft, disturbances pose the major limitation. Examples of disturbances are temperature variations, unaccounted rotations of the reference frame, vibrations, etc. The conventional solution is using stabilizing platforms to actively (e.g., by means of motors and heaters) reduce them physically. However, space 1 and power are scarce resources on aircrafts and on other moving platforms (e.g., unmanned aerial vehicles, autonomous underwater vehicles, space satellites). This represents a big limitation to using active stabilizing platforms. In the GAIN project we avoided stabilizing platform in favor of a novel paradigm consisting of three pillars: multi-sensor system, Machine Learning (ML), and training platform. The multi-sensor system resembles a strapdown gravimeter, typically equipped with a tri-axial accelerometer, a tri-axial gyroscope, and a GNSS positioning system [17, 18]. The idea behind is that the multi-sensor system measures both the gravity and the disturbances. However, employing a multi-sensor system presents challenges, including the need to model it. Specifically, we need to retrieve the gravity from all the measured signals. Moving to the second pillar of our paradigm, the former challenges are addressed with ML algorithms that can learn from data (training data) how to model the system effectively. Still, a persistent challenge in ML is the requirement for labeled data (data with known desired output) for training. One potential solution involves obtaining them from a known environment, such as an area where the gravity field has been previously measured using alternative techniques. However, implementing this so- Corresponding author. E-mail addresses: lorenzo.iafolla@ingv.it, lorenzo.iafolla@outlook.it (L. Iafolla). https://doi.org/10.1016/j.measurement.2023.114090 Received 26 September 2023; Received in revised form 20 November 2023; Accepted 27 December 2023 0263-2241/© 20XX Note: Low-resolution images were used to create this PDF. The original images will be used in the final composition." 2401.02187v1,"Location Aware Modular Biencoder for Tourism Question Answering Haonan Li ♠,♣ Martin Tomko ♡ Timothy Baldwin ♠,♣ ♠ School of Computing and Information Systems, The University of Melbourne ♡ Department of Infrastructure Engineering, The University of Melbourne ♣ Department of Natural Language Processing, MBZUAI haonan.li@mbzuai.ac.ae, tomkom@unimelb.edu.au, tb@ldwin.net Abstract Answering real-world tourism questions that seek Point-of-Interest (POI) recommendations is challenging, as it requires both spatial and non-spatial reasoning, over a large candidate pool. The traditional method of encoding each pair of question and POI becomes inefficient when the number of candidates increases, making it infeasible for real-world applications. To overcome this, we propose treating the QA task as a dense vector retrieval problem, where we encode questions and POIs separately and retrieve the most relevant POIs for a question by utilizing embedding space similarity. We use pretrained language models (PLMs) to encode textual information, and train a location encoder to capture spatial information of POIs. Experiments on a real-world tourism QA dataset demonstrate that our approach is effective, efficient, and outperforms previous methods across all metrics. Enabled by the dense retrieval architecture, we further build a global evaluation baseline, expanding the search space by 20 times compared to previous work. We also explore several factors that impact on the model’s performance through follow-up experiments. Our code and model are publicly available at https://github. com/haonan-li/LAMB. 1 Introduction Question answering (QA) models and recommender systems have undergone rapid development in recent years (Seo et al., 2017; Rajpurkar et al., 2016; Kwiatkowski et al., 2019; Lee et al., 2019; Cui et al., 2020; Hamid et al., 2021). However, personalised question answering is still highly challenging and relatively unexplored in the literature. Consider the example question in Figure 1, in the form of a real-world point-of-interest (POI) recommendation question from a travel forum. Answering such questions requires understanding of the question text with possibly explicit (e.g., in Dublin) Question: Hi! My wife and I are in our late thirties and going to be in Dublin on September 28 and 29th. We are staying in the Grafton Street area. Does anybody have any suggestions for some fairly priced restaurants with great food within walking distance of Grafton Street? Also, What about some good pubs with live local music? (I realize it is a Sun and Mon night and may be slow) Any suggestion would be appreciated! Thanks! Answer ID: 11_R_4392 Answer Name: The Porterhouse Central, 45-47 Nassau Street, Dublin. Figure 1: An example of real-world POI recommendation question from the TourismQA dataset (Contractor et al., 2021b). Colored text represents constraints relevant to recommending POIs. or vague and ambiguous (e.g., within walking distance of Grafton Street) spatial constraints, as well as a fast indexing method that supports large-scale reasoning over both spatial and non-spatial (e.g., fairly priced restaurants) constraints. Recently, there has been increased interest in geospatial QA. Most approaches focus on querying structured knowledge bases, based on translating natural language questions into structured queries, e.g., using SPARQL (Punjani et al., 2018; Li et al., 2021; Hamzei et al., 2022). Separately, Contractor et al. (2021b) introduced the task of answering POI- seeking questions using geospatial metadata and reviews that describe POIs. In later work, they proposed a spatial–textual reasoning network that uses distance-aware question embeddings as input and encodes question–POI pairs using attention (Contractor et al., 2021a). However, as their model creates separate question embeddings for each POI, the inference cost increases linearly in the number of POIs, and the model is incompatible with large" 2401.02188v1,"A quantum chemistry approach to linear vibro-polaritonic IR spectra with perturbative electron-photon correlation Eric W. Fischer, 1, 2, ∗ Jan A. Syska, 2 and Peter Saalfrank 2, 3, † 1 Institut für Chemie, Humboldt-Universität zu Berlin, Brook-Taylor-Straße 2, D-12489 Berlin, Germany 2 Institut für Chemie, Universität Potsdam, Karl-Liebknecht-Straße 24-25, D-14476 Potsdam-Golm, Germany 3 Institut für Physik und Astronomie, Universität Potsdam, Karl-Liebknecht-Straße 24-25, D-14476 Potsdam-Golm, Germany (Dated: January 5, 2024) In the vibrational strong coupling (VSC) regime, molecular vibrations and resonant low-frequency cavity modes form light-matter hybrid states, named vibrational polaritons, with characteristic IR spectroscopic signatures. Here, we introduce a quantum chemistry based computational scheme for linear IR spectra of vibrational polaritons in polyatomic molecules, which perturbatively accounts for nonresonant electron-photon interactions under VSC. Specifically, we formulate a cavity Born- Oppenheimer perturbation theory (CBO-PT) linear response approach, which provides an approximate but systematic description of such electron-photon correlation effects in VSC scenarios, while relying on molecular ab initio quantum chemistry methods. We identify relevant electron-photon correlation effects at second-order of CBO-PT, which manifest as static polarizability-dependent Hessian corrections and an emerging polarizability-dependent cavity intensity component providing access to transmission spectra commonly measured in vibro-polaritonic chemistry. Illustratively, we address electron-photon correlation effects perturbatively in IR spectra of CO 2 and Fe(CO) 5 vibropolaritonic models qualitatively in sound agreement with non-perturbative CBO linear response theory. Introduction.— Vibrational polaritons are light-matter hybrid states formed when molecular vibrational modes strongly interact with quantized modes of optical lowfrequency cavities[1] lying at the heart of the emerging field of vibro-polaritonic chemistry[2, 3]. Experimentally, vibrational polaritons exhibit characteristic spectroscopic signatures, specifically transitions to upper and lower vibro-polaritonic states, which have been probed by both linear[4–9] and non-linear[10] infrared (IR) spectroscopic techniques. Computationally, vibro-polaritonic IR spectra are commonly obtained from linear response theory, where two distinct routes exist: First, linear response approaches based on effective ground state Pauli-Fierz Hamiltonians, which are fully characterized by purely molecular properties such as the molecular ground state potential energy surface (PES) and dipole moment, easily accessible by means of standard quantum chemistry methods.[11–14] Second, a linear response approach formulated in the cavity Born-Oppenheimer (CBO) approximation[15–18], which relies on an extended electronic structure problem taking into account nonresonant interactions between electrons and low-frequency cavity modes inducing electron-photon correlation.[18] The CBO formulation is more complete but also more involved, since both generalized cavity PES and dipole moments depend on both molecular and cavity coordinates. From a linear response perspective, both approaches are formulated in double-harmonic approximation, i.e., har- ∗ ericwfischer.sci@posteo.de † peter.saalfrank@uni-potsdam.de monic approximation for molecular and cavity modes in combination with a linear approximation for the ground state dipole moment. This is particularly beneficial for treating vibrations and spectra of large molecules or molecular ensembles quantum mechanically, since only Hessians and linearized dipole moments at equilibrium structures are required. FIG. 1. Sketch of CO 2 and Fe(CO) 5 vibro-polaritonic model systems studied with respect to their linear IR response in this work. Recently, we showed that effective ground state and CBO formulations differ in the way they account for electron-photon correlation.[19] Specifically, the effective ground state formulation can be understood as additional approximation to the CBO formulation, which we named crude CBO approximation, that fully neglects electronphoton correlation in the VSC regime.[19] The nonres-" 2401.02191v1,"Characterizing Fake News Targeting Corporations Ke Zhou 1,2 , Sanja Šćepanović 1 , Daniele Quercia 1,3 1 2 Nokia Bell Labs, UK University of Nottingham, UK 3 King’s College London, UK ke.zhou@nokia-bell-labs.com Abstract Misinformation proliferates in the online sphere, with evident impacts on the political and social realms, influencing democratic discourse and posing risks to public health and safety. The corporate world is also a prime target for fake news dissemination. While recent studies have attempted to characterize corporate misinformation and its effects on companies, their findings often suffer from limitations due to qualitative or narrative approaches and a narrow focus on specific industries. To address this gap, we conducted an analysis utilizing social media quantitative methods and crowd-sourcing studies to investigate corporate misinformation across a diverse array of industries within the S&P 500 companies. Our study reveals that corporate misinformation encompasses topics such as products, politics, and societal issues. We discovered companies affected by fake news also get reputable news coverage but less social media attention, leading to heightened negativity in social media comments, diminished stock growth, and increased stress mentions among employee reviews. Additionally, we observe that a company is not targeted by fake news all the time, but there are particular times when a critical mass of fake news emerges. These findings hold significant implications for regulators, business leaders, and investors, emphasizing the necessity to vigilantly monitor the escalating phenomenon of corporate misinformation. 1 Introduction Emerging research in economics and political science has raised concerns about the erosion of democracy by misinformation on social media (Allcott and Gentzkow 2017). Similarly, concerns about misinformation effects on public health are increasing (Naeem, Bhatti, and Khan 2021; Melchior and Oliveira 2022). Yet another sphere experiencing threat due to misinformation is corporations and capital markets (Adriani 2019; Fox 2020; Jahng 2021). There are various types of corporate fake news depending on whether the news content has the intention to deceive and harm (Park et al. 2020). When fake news has a low intention to harm and deceive, the news contents might just provide inaccurate information due to honest mistakes or negligence (e.g., inaccurate product release leakage). However, some fake news has the intention to harm the company but not to deceive, i.e., promoting factual but negative news used to inflict harm on the Copyright © 2023, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. competing organization (e.g., layoffs), while others focus on both deceiving and harming, i.e., manipulation of information (e.g., company executive scandal) that purposefully aims to mislead and misinform the audience/customers. All those types of corporate fake news may have an impact to different extents on a company’s reputation and its capital markets. Research on corporate fake news is limited due to a lack of data, incorporating narrative (Adriani 2019; Camacho and LOZANO 2020), qualitative (Serazio 2021), and survey-based approaches (Cheng and Chen 2020; Bronnenberg, Dubé, and Sanders 2020), along with a focus on small parts of the corporate world (Kogan, Moskowitz, and Niessner 2019; Chung, Zhang, and Pan 2022). This study aims to characterize and provide empirical evidence of the determinants of corporate fake news across S&P 500 companies, using a large-scale quantitative analysis on social media data and crowd-sourced validation. The study addresses three research questions (RQs): (RQ1) How should corporate fake news articles be categorized? (RQ2) Which companies are targeted by fake news? (RQ3) When are companies targeted by fake news? To answer those research questions, our study makes four main contributions: • By combining social media posts from Reddit, fake news links, company stock performance, and company reviews from Glassdoor, we created a unique dataset for investigating corporate misinformation. We developed ten metrics to capture the characteristics of companies and the misinformation they were subject to (§3). • We conducted a user study to fully categorize the news articles mentioning companies in the context of misinformation. We found that a two-level taxonomy best describes these misinformation articles and its first level includes products, politics, corporate affairs, societal issues, and brand. Fake news articles mentioning highgrowth companies tend to be about products and societal issues, while those mentioning limited-growth companies tend to be about politics (§4, RQ1). • We characterized the relationship between misinformation and companies. We found that companies heavily targeted by fake news often receive coverage from reputable news publishers but garner less attention on social" 2401.02237v1,"https://doi.org/10.15407/ufm.24.04.641 V.V. BEZGUBA 1, 2, * and O.A. KORDYUK 1, 2, ** 1 Kyiv Academic University, 36 Academician Vernadsky Blvd., UA-03142 Kyiv, Ukraine 2 G.V. Kurdyumov Institute for Metal Physics of the N.A.S. of Ukraine, 36 Academician Vernadsky Blvd., UA-03142 Kyiv, Ukraine * werevv@gmail.com, ** kordyuk@kau.edu.ua, kordyuk@imp.kiev.ua MULTIBAND QUANTUM MATERIALS Quantum materials are defined by the emergence of new properties resulting from collective quantum effects and by holding promise for their quantum applications. Novel superconductors, from high-T c cuprates and iron-based superconductors to twisted monolayers, exhibit a higher level of emergent complexity, with a multiband electronic structure playing a pivotal role in their comprehension and potential applications. Here, we provide a brief overview of key multiband effects in these superconductors and topological semimetals, offering guidelines for the theory-assisted development of new quantum materials and devices. Keywords: superconductors, topological materials, electronic phase diagram, electronic band structure, quantum technology. 1. Introduction Although the foundation for understanding the properties of all materials over the past hundred years has been the quantum theory of condensed matter, the term ‘quantum materials’ has only recently come into use [1]. This is a collective term that encompasses superconductors, strongly correlated electronic systems, materials with electronic orde­ ring, topological insulators (all of which can be referred to as ‘electro­nic quantum materials’), as well as other systems like ultracold atoms. What unites these materials is the concept of ‘emergence’ [2] — the emergence of new properties resulting from collective quantum effects. Ci t a t i on: V.V. Bezguba and O.A. Kordyuk, Multiband Quantum Materials, Progress in Physics of Metals, 24, No. 4: 641–653 (2023) © Publisher PH “Akademperiodyka” of the NAS of Ukraine, 2023. This is an open access article under the CC BY-ND license (https://creativecommons.org/licenses/ by-nd/4.0/) ISSN 1608-1021. Usp. Fiz. Met., 2023, Vol. 24, No. 4 641" 2401.02266v1,"Article From sub-solar to super-solar chemical abundances along the quasar main sequence Paola Marziani 1, ∗ , Alberto Floris 2 , Alice Deconto-Machado 3 , Swayamtrupta Panda 4 * , Marzena Sniegowska 5 , Karla Garnica 6 , Deborah Dultzin 6 , Mauro D’Onofrio 2,1 , Ascensión Del Olmo 3 , Edi Bon 7 , and Nataša Bon 7 1 National Institute for Astrophysics (INAF), Astronomical Observatory of Padova, IT-35122 Padova, Italy 2 Dipartimento di Fisica e Astronomia, Università di Padova, Vicolo dell’ Osservatorio 3, IT-35122 Padova, Italy Citation: Metallicity along the quasar main sequence. Physics 2023, 1, 1–20. https://doi.org/ Received: Revised: Accepted: Published: Copyright: © 2024 by the authors. Submitted to Physics for possible open access publication under the terms and conditions of the Creative Commons 3 Instituto de Astrofísica de Andalucía (IAA-CSIC), Glorieta de Astronomía s/n, 38038 Granada, Spain 4 Laboratório Nacional de Astrofísica, MCTI, R. dos Estados Unidos 154, Nações, CEP 37504-364, Itajubá, Brazil 5 School of Physics and Astronomy, Tel Aviv University, Tel Aviv, 69978, Israel 6 Instituto de Astronomía, UNAM, Mexico D.F. 04510, Mexico 7 Belgrade Astronomical Observatory, Volgina 7, Belgrade, Serbia * Correspondence: paola.marziani@inaf.it Abstract: The 4D Eigenvector 1 sequence has proven to be a highly effective tool for organizing observational and physical properties of type 1 active galactic nuclei (AGN). In this paper, we present multiple measurements of metallicity for the broad line region gas, from new or previously published data. We demonstrate a consistent trend along the optical plane of the E1 (also known as the quasar main sequence), defined by the line width of Hβ and by a parameter measuring the prominence of singly-ionized iron emission. The trend involves an increase from sub-solar metallicity in correspondence with extreme Population B (weak Fe II emission, large Hβ FWHM) to metallicity several tens the solar value in correspondence with extreme Population A (very strong Fe II optical emission, narrower Hβ profiles). The data establish the metallicity as a correlate of the 4D E1/main sequence. If the very high metallicity (Z ≳ 10Z ⊙ ) gas is expelled from the sphere of influence of the central black hole, as indicated by the widespread evidence of nuclear outflows and disk wind in the case of sources radiating at high Eddington ratio, then it is possible that the outflows from quasars played a role in chemically enriching the host galaxy. Keywords: active galactic nuclei; optical spectroscopy; ionized gas; broad line region; interstellar medium; chemical composition; quasar main sequence; photo-ionization 1. Introduction: A Main Sequence and the Eigenvector 1 for Quasars The main sequence (MS) concept in quasar research draws parallels with stellar evolutionary sequences, but in this case, it is applied to quasar properties. A study on a sample of Palomar-Green quasars detected an interesting anti-correlation between the strength of the Fe II λ4570 emission line and the Full Width at Half Maximum (FWHM) of the broad Hβ emission line of type-1 quasars with low redshifts (z < 1, [1]). This anti-correlation suggests that, as the Fe II λ4570 feature becomes stronger, the FWHM tends to decrease, and is one of the main correlations known as the Eigenvector 1 of quasars. This finding has been established through the analysis of samples of increasing size over the years [2–5], and has proved to be fundamental to organize type-1 AGN properties in a systematic way with predictive ability. Quasars are categorized into different spectral types along the MS [e.g., 5], and two primary populations, referred to as Population A and Population B, have been identified [3]. These categories are based on specific properties such as the Eddington ratio (a Attri- bution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). * CNPq Fellow Version January 5, 2024 submitted to Physics https://www.mdpi.com/journal/physics" 2401.02271v1,"Towards Seamless Serverless Computing Across an Edge-Cloud Continuum Emilian Simion Yuandou Wang Hsiang-ling Tai Institute of Informatics, University of Amsterdam Faculty of Science, Vrije Universiteit Amsterdam Amsterdam, The Netherlands emilian.simion@student.uva.nl Multiscale Networked Systems, University of Amsterdam Amsterdam, The Netherlands y.wang8@uva.nl Informatics Institute, University of Amsterdam Faculty of Science, Vrije Universiteit Amsterdam Amsterdam, The Netherlands hsiang-ling.tai@student.uva.nl Uraz Odyurt Zhiming Zhao High-Energy Physics, Radboud University Nijmegen, The Netherlands Nikhef Amsterdam, The Netherlands uodyurt@nikhef.nl Multiscale Networked Systems, University of Amsterdam LifeWatch ERIC Virtual Lab and Innovation Center (VLIC), Amsterdam, The Netherlands Amsterdam, The Netherlands z.zhao@uva.nl ABSTRACT and deployment in a cloud environment. Serverless enables developers to run their code without having to manage any underlying infrastructure [4, 5]. One typical offering is Functions-asa-Services (FaaS), exemplified by public Cloud services such as AWS Lambda [24], Azure Functions [13], and Google Cloud Functions [16]. FaaS offers event-driven execution of functions for cloud customers to run their code for virtually any type of application or backend service without provisioning or managing any servers. Apart from serverless computing, the emerging applications in various areas such as manufacturing [6, 21], healthcare [1, 20], smart cities [12, 15], agriculture and farming [10, 19] and transportation [14, 27], have been both nurturing and demanding edge computing in recent years. Edge computing brings processing, data storage, and applications closer to the edge of the network, where end devices such as Internet-of-Things (IoT) devices and smartphones generate and consume data, which benefits from low latency, improved reliability, better data privacy, cost savings, and energy efficiency [2, 7, 23]. At the same time, it is more common to have applications composed of different modules distributed over different tiers (e.g., edge, fog, cloud) and interoperate between themselves [17]. Such computational model has emerged under the term Edge-Cloud continuum, in which infrastructure’s geo-distributed and heterogeneous nature presents unique challenges and opportunities [3, 22]. However, interoperating control across an Edge-Cloud continuum is still a challenge. Several existing works have made much progress in tackling this challenge. Nevertheless, resource management, scheduling, fault tolerance, deployment complexity, and cold-start mitigation [8, 9, 18, 25, 26] still need to be addressed. In this paper, we address the interoperability problem between edge and cloud environments through serverless computing, making the deployment process more efficient across the Edge-Cloud continuum and improving the performance of processing applications. Our vision for interoperable serverless computing, which enables an Edge-Cloud continuum, involves a platform that abstracts not just the infrastructure, but also the location where functions Serverless computing has emerged as an attractive paradigm due to the efficiency of development and the ease of deployment without managing any underlying infrastructure. Nevertheless, serverless computing approaches face numerous challenges to unlock their full potential in hybrid environments. To gain a deeper understanding and firsthand knowledge of serverless computing in edge-cloud deployments, we review the current state of open-source serverless platforms and compare them based on predefined requirements. We then design and implement a serverless computing platform with a novel edge orchestration technique that seamlessly deploys serverless functions across the edge and cloud environments on top of the Knative serverless platform. Moreover, we propose an offloading strategy for edge environments and four different functions for experimentation and showcase the performance benefits of our solution. Our results demonstrate that such an approach can efficiently utilize both cloud and edge resources by dynamically offloading functions from the edge to the cloud during high activity, while reducing the overall application latency and increasing request throughput compared to an edge-only deployment. CCS CONCEPTS • Hardware → Communication hardware, interfaces and storage; • Computer systems organization → Cloud computing. KEYWORDS Serverless Computing, Edge-Cloud Continuum, Knative, Offloading 1 INTRODUCTION Serverless computing, as a new and greatly popular paradigm with the cloud computing community, simplifies software development 1" 2401.02287v1,"Distillation-based fabric anomaly detection Thomine Simon 1,2* and Snoussi Hichem 1 1* LIST3N, University of technology of Troyes, 2 Aquilae, Troyes, 10000, France. Troyes, 10000, France. *Corresponding author(s). E-mail(s): simon.thomine@utt.fr; Contributing authors: hichem.snoussi@utt.fr; Abstract Unsupervised texture anomaly detection has been a concerning topic in a vast amount of industrial processes. Patterned textures inspection, particularly in the context of fabric defect detection, is indeed a widely encountered use case. This task involves handling a diverse spectrum of colors and textile types, encompassing a wide range of fabrics. Given the extensive variability in colors, textures, and defect types, fabric defect detection poses a complex and challenging problem in the field of patterned textures inspection. In this article, we propose a knowledge distillation-based approach tailored specifically for addressing the challenge of unsupervised anomaly detection in textures resembling fabrics. Our method aims to redefine the recently introduced reverse distillation approach, which advocates for an encoder-decoder design to mitigate classifier bias and to prevent the student from reconstructing anomalies. In this study, we present a new reverse distillation technique for the specific task of fabric defect detection. Our approach involves a meticulous design selection that strategically highlights high-level features. To demonstrate the capabilities of our approach both in terms of performance and inference speed, we conducted a series of experiments on multiple texture datasets, including MVTEC AD, AITEX, and TILDA, alongside conducting experiments on a dataset acquired from a textile manufacturing facility. The main contributions of this paper are the following: a robust texture anomaly detector utilizing a reverse knowledge-distillation technique suitable for both anomaly detection and domain generalization and a novel dataset encompassing a diverse range of fabrics and defects. Keywords: unsupervised, anomaly, texture, pattern, domain-generalized, fabric, knowledge distillation 1" 2401.02291v1,"INTRODUCTION AND STATUS OF FERMILAB’S ACORN PROJECT* D. Finstrom † , E. Gottschalk, Fermilab, Batavia, USA Abstract Modernizing the Fermilab accelerator control system is essential to future operations of the laboratory's accelerator complex. The existing control system has evolved over four decades and uses hardware that is no longer available and software that uses obsolete frameworks. The Accelerator Controls Operations Research Network (ACORN) Project will modernize the control system and replace end-of-life power supplies to enable future accelerator complex operations with megawatt particle beams. An overview of the ACORN Project and a summary of recent research and development activities will be presented. INTRODUCTION The Fermilab Accelerator Complex is the largest accelerator complex in the United States and the second largest in the world. It currently operates with a single control system, ACNET [1], that contains hardware and software for controlling ten miles of accelerator components and beam transfer lines. The control system was originally developed for the start of colliding-beam operations in 1983. The control system initiates particle beam production, controls beam energy and intensity, transports particle beams to research facilities, measures beam parameters, and monitors beam transport through the accelerator complex to ensure safe, reliable, and effective operations. There are approximately 200,000 devices with 350,000 attributes and several million lines of software code in the existing system. Despite operating at peak performance, in 2018, an advisory committee formed to evaluate facility operational risks identified the need to invest in the accelerator control system and called out major issues, including a large amount of old hardware and software and an aging and declining in strength workforce with no software development related hires for 18 years. The Accelerator Controls Operations Research Network (ACORN) Project addresses these concerns and will replace control system hardware that is no longer available and software that is no longer maintainable. ACORN is a U.S. Department of Energy (DOE) Project for Acquisition of Capital Assets (O413.3B) to modernize the accelerator control system and replace end-of-life power supplies to enable future operations of the accelerator complex with megawatt particle beams. The total project cost range is $100 - $142 million dollars USD. The modernized control system will integrate with two projects, the Long Baseline Neutrino Facility/Deep Underground Neutrino Experiment (LBNF/DUNE) and the Proton Improvement Plan II ___________________________________________ * This manuscript has been authored by Fermi Research Alliance, LLC under Contract No. DE-AC02-07CH11359 with the U.S. Department of Energy, Office of Science, Office of High Energy Physics. † finstrom@fnal gov (PIP-II). ACORN received Critical Decision 0 (CD-0) milestone from DOE, which signifies approval of the project’s mission need, on August 28, 2020. ACORN is working towards Critical Decision 1 (CD-1) milestone, which signifies approval of the alternative selection and cost range and is targeted to occur in Q3 FY24. As required by CD-1, the project is evaluating design alternatives and, consequently, has not settled on a technical design. Efforts are focused on building the project team, interviewing stakeholders, gathering requirements, and research and development efforts aimed at determining project cost and schedule estimates. Critical Decision 4 (CD-4) milestone, which signifies project completion, is projected to occur in the 2028 – 2030 time frame. The project Work Breakdown Structure consists of five main sections: Project Management, Accelerator Power Systems, Data Acquisition and Control, Control System Infrastructure, and Control System Applications. ACCELERATOR POWER SYSTEMS The scope of work for the Accelerator Power Systems (APS) section includes the design, prototype, procurement, installation, and testing of power supplies and regulation systems for the Fermilab Accelerator Complex. Two types of power supplies are being considered: switch-mode power supplies and thyristor power supplies. The existing power supplies are almost all original and date back to the 1970s and 1980s. The power supplies were originally bid and built to specification and have a straightforward design and rugged construction. Fermilab has continued to buy power supplies using a combination of procurement strategies consisting of build-tospecification procurements for power components and build-to-print procurements for control components. Following the guidance of subject matter experts and our experience at Fermilab, we plan to separate the procurement of power conversion components from components needed for power regulation and control. The power conversion components are available from commercial vendors, and competition among vendors keeps costs reasonable. Power regulation components are highly specialized and can be applied to different vendors. This helps establish commonality among power supply systems and allows the replacement of power converters when requirements change. Hiring expertise in accelerator power systems has been challenging, and consequently, progress in this section has been constrained. ACORN is working with Fermilab’s Electrical Engineering Support department to understand the hazards associated with the installation, testing, and maintenance of power supplies and working with the ACORN Environment, Safety, and Health liaison to begin writing the preliminary hazard analysis report for CD-1. The project team is compiling an inventory of power" 2401.02293v1,"Shear viscosity of nucleonic matter Xian-Gai Deng a,b , De-Qing Fang a,b , Yu-Gang Ma a,b,∗ a Key Laboratory of Nuclear Physics and Ion-beam Application (MOE), Institute of Modern Physics, Fudan University, Shanghai 200433, China b Shanghai Research Center for Theoretical Nuclear Physics, NSFC and Fudan University, Shanghai 200438, China Abstract The research status of the shear viscosity of nucleonic matter is reviewed. Some methods to calculate the shear viscosity of nucleonic matter are introduced, including mean free path, Green-Kubo, shear strain rate, Chapman-Enskog and relaxation time approximation. Based on these methods, results for infinite and finite nucleonic matter are discussed, which are attempts to investigate the universality of the ratio of shear viscosity over entropy density and transport characteristics like the liquid-gas phase transition in nucleonic matter. In addition, shear viscosity is also briefly discussed for the quantum chrodynamical matter produced in relativistic heavy-ion collisions. Keywords: shear viscosity, ratio of shear viscosity to entropy density, nucleonic matter, KSS bound, Green-Kubo, Chapman-Enskog, relaxation time approximation ∗ Corresponding author Email address: mayugang@fudan.edu.cn (Yu-Gang Ma) Preprint submitted to Progress in Particle and Nuclear Physics January 5, 2024" 2401.02308v1,"Interspecies Förster resonances of Rb-Cs Rydberg d-states for enhanced multi-qubit gate fidelities P. M. Ireland, D. M. Walker, and J. D. Pritchard ∗ Department of Physics, SUPA, Strathclyde University, Glasgow, G4 0NG, UK We present an analysis of interspecies interactions between Rydberg d-states of rubidium and cesium. We identify the Förster resonance channels offering the strongest interspecies couplings, demonstrating the viability for performing high-fidelity two- and multi-qubit C k Z gates up to k = 4, including accounting for blockade errors evaluated via numerical diagonalization of the pair-potentials. Our results show d-state orbitals offer enhanced suppression of intraspecies couplings compared to s-states, making them well suited for use in largescale neutral atom quantum processors. I. INTRODUCTION Neutral atom arrays provide a versatile platform for performing both programmable quantum simulation and quantum computation [1–4]. Arrays of optical tweezers offer a scalable route to creating deterministically loaded, defectfree qubit registers in up to three dimensions [5–8]. Interactions between qubits can be engineered using highly-excited Rydberg states to perform high-fidelity two- and multi-qubit gate operations [9–16] for implementing digital quantum algorithms [17, 18], or for encoding solutions to classical optimization problems using coherent quantum annealing [19– 21]. Using this architecture for quantum simulation [22, 23] has enabled novel topological phases [24] and quantum spin liquids [25] to be observed. Combining these approaches with dynamically reconfigurable tweezers [18] provides a route to observation of fast-scrambling dynamics [26] or efficient implementation of low-density parity check codes for quantum error correction [27], with recent demonstrations of transversal gates between logical qubits making a first step towards fault-tolerant operation [28]. Whilst there has been significant progress to advance twoqubit gate fidelities F > 99.5% [29, 30] along with recent demonstrations of scalable non-destructive readout [31] and mid-circuit measurement [32–34], most experiments have used only a single atomic species. This introduces limitations in localized qubit readout due to cross-talk between atoms, and in multi-qubit gate operations where fidelities are limited by parasitic interactions between Rydberg states[13, 16, 20]. One approach to overcome this limitation is to use dualspecies arrays, which naturally provides a separation in readout wavelengths to suppress cross-talk, whilst allowing engineering of different inter and intra-species couplings. Additionally, this offers a route to universal quantum computation using globally driven pulses [35]. Early work demonstrated two-qubit gates and arrays between different isotopes of rubidium (Rb) [11, 36], with recent developments showing continuous loading and measurement-feedback onto a cesium (Cs)-Rb array [37, 38]. This same approach of using heterogeneous tweezers has enabled assembly of polar molecules [39– 43], leading to first demonstrations of hybrid systems [44, 45] based on coupling a Rydberg atom to a polar molecule [46]. ∗ jonathan.pritchard@strath.ac.uk Rb Cs FIG. 1. Dual-species interactions. (a) Schematic of a dual species array of Cs and Rb atoms using state-selective optical tweezers. For performing interspecies CZ or C 4 Z gates (indicated by dashed outlines), the orientation of the internuclear axis relative to the quantization axis (ẑ) is important, with quantization along the tweezer axis in (b) leading to interactions at a range of angles, whilst quantization perpendicular to the array plane (c) ensures all interactions occur for θ = 90 ◦ . (d) Interaction angle θ relative to the quantization axis, with an example Förster-resonant state occuring when the initial pair state |a⟩ A |b⟩ B is dipole-coupled to |α⟩ A |β⟩ B with a small energy defect ∆. Previous theoretical work exploring dual-species Rydberg interactions has focused on studying Rydberg interactions in s-state orbitals for Rb-Cs [47] and s and d states for Rb-K atoms [48, 49], where suitable Förster resonances have been identified to obtain strong intraspecies couplings with dispersion coefficients calculated in the asymptotic limit. This forms the basis of proposals for quantum non-demolition readout [47], quantum error correction using dual-species surface codes [50], and high-fidelity heteronuclear C 2 NOT 2 gates [51] which suppress the unwanted interspecies target-target and control-control interactions. In this paper we extend the dual-species analysis to study interspecies interactions between Cs and Rb Rydberg atoms in the d-state orbitals, utilising open source libraries [52, 53] for calculating Rydberg-atom interaction potentials via direct diagonalization of the dipole-dipole Hamiltonian to go beyond evaluating the asymptotic dispersion coefficients. We identify suitable Förster resonances for maximising interspecies coupling strengths, carefully considering the angular dependence to address applications of performing two- and multi-qubit gates in neutral atom arrays for different quantization axis choices as illustrated in Fig. 1. We quantify blockade leak-" 2401.02331v1,"A finite difference scheme for two-dimensional singularly perturbed convection-diffusion problem with discontinuous source term Ram Shiromani a,b , Niall Madden c,∗ , V. Shanthi a a Department of Mathematics, National Institute of Technology Tiruchirappalli, Tamil Nadu, India b School of Sciences, Woxsen University, Sadasivpet, Sangareddy District, Hyderabad, India c School of Mathematical and Statistical Sciences, University of Galway, Ireland Abstract We propose a finite difference scheme for the numerical solution of a two-dimensional singularly perturbed convection-diffusion partial differential equation whose solution features interacting boundary and interior layers, the latter due to discontinuities in source term. The problem is posed on the unit square. The second derivative is multiplied by a singular perturbation parameter, ϵ, while the nature of the first derivative term is such that flow is aligned with a boundary. These two facts mean that solutions tend to exhibit layers of both exponential and characteristic type. We solve the problem using a finite difference method, specially adapted to the discontinuities, and applied on a piecewise-uniform (Shishkin). We prove that that the computed solution converges to the true one at a rate that is independent of the perturbation parameter, and is nearly first-order. We present numerical results that verify that these results are sharp. Keywords: Shishkin mesh, singular perturbed, partial differential equation, finite difference scheme, discontinuous source term, elliptic problem. 2000 MSC: 35J25, 35J40, 35B25, 65N06, 65N12, 65N15 1. Introduction We are interested in the approximation of solutions to singularly perturbed differential equations (SPDEs) by finite differences methods (FDMs). The partial differential equation in question is singularly perturbed in the sense that it features a small parameter scaling the highest derivative; the perturbation is “singular” in the sense that if it is formally set to zero, the problem becomes ill-posed. One consequence of this is that it is difficult to obtain a uniformly correct asymptotic expansion. Moreover, solutions to such problems usually exhibit boundary layers: regions near the boundary of the domain where the solution’s gradient is extremely large. The equations we study are of convection-diffusion type, which are both the most commonly studied singular perturbation problems in the literature, and the most challenging. If one formally sets ϵ = 0, then the characteristics of the reduced equation are parallel to the boundary, and the associated layers are of characteristic (or parabolic) type; otherwise they are of exponential (or regular) type. The problem we study is further complicated by the presence of discontinuities in the source terms, and so layers may feature in the interior of the domain. ∗ Corresponding author Email addresses: ram.panday.786@gmail.com (Ram Shiromani), Niall.Madden@UniversityOfGalway.ie (Niall Madden), vshanthi@nitt.edu (V. Shanthi) Preprint submitted to (Under review) January 5, 2024" 2401.02359v1,"Effect of Ca doping on Li ion conductivity of Ge and Ta doped garnet LLZO Muktai Aote a , A. V. Deshpande a,* a Department of Physics, Visvesvaraya National Institute of Technology, South Ambazari Road, Nagpur, Maharashtra - 440010, India * Corresponding Author: Dr. (Mrs.) A. V. Deshpande Professor and Head, Department of Physics, Visvesvaraya National Institute of Technology, South Ambazari Road, Nagpur, Maharashtra, 440010 (India) E-mail Address: avdeshpande@phy.vnit.ac.in Ph.No.: +91-712-280-1251 Abstract The series Li 6.55+x Ge 0.05 La 3-x Ca x Zr 1.75 Ta 0.25 O 12 ( x= 0, 0.05, 0.10, 0.15, 0.20 ) was prepared by conventional solid state reaction method with the sintering temperature of 1050 0 C for 7.30 hr by substituting Ca at the La site to increase the Li ion conductivity. The synergistic effects of Ca incorporation on Li 6.55 Ge 0.05 La 3 Zr 1.75 Ta 0.25 O 12 were studied using various structural and electrochemical analyses. X-ray diffraction, scanning electron microscopy, and Impedance analysis were used to determine the crystal structure, morphology, and AC conductivity of the prepared ceramic samples, respectively. The highest conductivity of 9.95 x 10 -4 S/cm was obtained for a 0.05 Ca ceramic sample with minimum activation energy of 0.23 eV. The DC 1" 2401.02386v1,"1 Direction of arrival estimation using microphone array processing for moving humanoid robots V. Tourbabin*, Student Member, IEEE and B. Rafaely, Senior Member, IEEE Abstract—The auditory system of humanoid robots has gained increased attention in recent years. This system typically acquires the surrounding sound field by means of a microphone array. Signals acquired by the array are then processed using various methods. One of the widely applied methods is direction of arrival estimation. The conventional direction of arrival estimation methods assume that the array is fixed at a given position during the estimation. However, this is not necessarily true for an array installed on a moving humanoid robot. The array motion, if not accounted for appropriately, can introduce a significant error in the estimated direction of arrival. The current paper presents a signal model that takes the motion into account. Based on this model, two processing methods are proposed. The first one compensates for the motion of the robot. The second method is applicable to periodic signals and utilizes the motion in order to enhance the performance to a level beyond that of a stationary array. Numerical simulations and an experimental study are provided, demonstrating that the motion compensation method almost eliminates the motionrelated error. It is also demonstrated that by using the motionbased enhancement method it is possible to improve the direction of arrival estimation performance, as compared to that obtained when using a stationary array. I. I NTRODUCTION UDITION is an essential part of humanoid robots; it facilitates the robot’s communication with the environment by exploiting the surrounding sound field. The auditory system of a humanoid robot is typically comprised of a microphone array and a set of signal processing methods. One of the widely applied array processing methods is Direction of Arrival (DoA) estimation. This method is used for sound source localization [1], spatial filtering and dereverberation [2], as well as for preprocessing in Automatic Speech Recognition (ASR) systems [3]. Several different approaches for DoA estimation are used in the literature, including time-delaybased algorithms [4], beamforming [5], maximum likelihood estimators [6] and subspace-based algorithms [7], [8]. These algorithms usually assume that the microphone array is fixed at a given position. However, a microphone array installed on a robot is not necessarily fixed; it can move in accordance with the robot’s activity. Motion of the robot poses several challenges for DoA estimation algorithms. One of the problems, associated with motion and addressed in the literature, is the ego-motion noise originating from robot motors and joint movements [9]. Another problem, addressed in the current paper, is related to the motion of the array relative to the sound field. For a moving array, the DoAs to be estimated A The authors are with the Department of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Be’er-Sheva 84105, Israel (email: {tourbabv,br}@ee.bgu.ac.il) are continuously changing during the data acquisition. Thus, direct application of existing DoA estimation methods, based on stationary array models, may lead to severe degradation in performance. One possible approach that can overcome this problem is the “stop-perceive-act” principle [10], which suggests stopping the robot while acquiring data for the estimation. This approach can also reduce the ego-motion noise. However, it may prevent the robot from receiving new commands while moving as a response to a previous command, thereby imposing behavioral constraints that may limit natural robot interaction with the environment. An alternative approach is to take the motion into account by utilizing the information about the array position, speed and acceleration, as a function of time. This information can be obtained from the operating system of the robot. Incorporating this information into the processing model can reduce the DoA estimation errors originating from array motion. Moreover, the motion can be utilized to improve the performance beyond that of a stationary array. For example, it is possible to reduce spatial aliasing in beamforming by using a linear array moving with constant acceleration [11] or by using a planar array rotating with constant angular velocity [12]. It is also possible to improve the DoA estimation resolution by using the synthetic aperture technique, which has been applied to underwater linear arrays towed at a constant speed (see, for example, [13]). In addition, when the sampling of a field is considered, the motion of the sensors can be utilized to reduce the reconstruction error [14]. The above mentioned techniques provide an insight into a possible approach for the processing of moving microphone arrays for robot audition. However, as mentioned above, these techniques are usually limited to linear arrays moving along a straight line or planar arrays rotating with constant velocity. Therefore, these techniques cannot be directly applied to DoA estimation using arbitrarily moving arrays of general geometry, which is usually the case in the context of humanoid robot audition. This problem is addressed in the current paper. The approach adopted here exploits the sphere-like shape of the humanoid robot head, which facilitates processing in the Spherical Harmonic (SH) domain. It is shown that processing in the SH domain, in contrast to the more traditional spacedomain processing, enables a convenient representation of robot’s motion by a sequence of relatively simple linear transformations. This linear representation is utilized here to reduce the motion-induced error in DoA estimation. In addition, an approach is presented for periodic signals that improves the DoA estimation beyond that of a stationary array. The improvement is achieved by combining the measurements 1 / 14" 2401.02427v1,"5G Positioning Advancements with AI/ML Mohammad Alawieh, Georgios Kontes Fraunhofer Institute for Integrated Circuits IIS, Nuremberg, Germany {mohammad.alawieh, georgios.kontes}@iis.fraunhofer.de Abstract—This paper provides a comprehensive review of AI/ML-based direct positioning within 5G systems, focusing on its potential in challenging scenarios and conditions where conventional methods often fall short. Building upon the insights from the technical report TR38.843, we examine the Life Cycle Management (LCM) with a focus on to the aspects associated direct positioning process. We highlight significant simulation results and key observations from the report on the direct positioning under the various challenging conditions. Additionally, we discuss selected solutions that address measurement reporting, data collection, and model management, emphasizing their importance for advancing direct positioning. Index Terms—5G, direct positioning, ML, AI. several techniques within the broader definition of direct positioning. • AI/ML Assisted Positioning: Rather than directly determining the UE’s location, here the AI/ML model aids conventional approaches by outputting measurements or by refining existing measurements. For instance, the model identifies y LOS versus NLOS conditions, or provides insights into the timing or angle of measurements and even the likelihood of such measurements. In some of these challenging environments, AI/ML complements traditional methods by providing intermediate AI/ML measurements to assist the classical positioning techniques. I. I NTRODUCTION The 3rd Generation Partnership Project (3GPP) has played a AI/ML Direct Positioning pivotal role in advancing 5G positioning technologies through its previous releases. 3GPP Release 16 [1] laid the foundational groundwork by defining both uplink (UL) and downlink (DL) Measurements procedures and incorporating signal designs to support the AI/ML Model Position Channel identified positioning use cases. Building on this foundation, Release 17 [2] brought significant enhancements, introducing signalling to counteract timing errors and enhance directional AI/ML Assisted Positioning estimation methods. Additionally, this release enabled positioning when a device is in an inactive state and reduced Conventional Measurements latency positioning. This release further introduced techniques Positioning module Position to improve positioning accuracy in non-line of sight (NLOS) Channel AI/ML Model scenarios. Release 18 introduced sidelink positioning, carrier phase and carrier aggregation to further enhance the position- Fig. 1. Example realizations on AI/ML direct and assisted positioning. ing accuracy. These advancements have paved the way for numerous applications and use cases, but they also highlight Direct positioning emerges as a crucial solution in this the inherent challenges, particularly in in NLOS and complex context. Serving either as a complementary tool or even an in line of sight (LOS) environments where traditional methods alternative to the classical methods of Release 16 by utilizing might not always yield the desired accuracy. the capabilities of AI/ML in NLOS conditions. In scenarios In response to the evolving requirements and complexities where classical approaches down-perform with uncertainties, in 5G positioning technologies and the persistent challenges direct positioning stands out by potentially bridging the in NLOS and complex LOS scenarios, Release 18 initiated performance gap. an AI/ML study item to explore the potential of AI and machine learning in the context of positioning. This study, Direct Positioning, likely for future 5G releases, as provided in technical report TR38.843 [3] , identified two promises effective performance in challenging primary modalities through which AI/ML could be beneficial: environments without extensive network ad- • Direct AI/ML Positioning: This is where the AI/ML model justments. directly outputs the location of the user equippment (UE). A typical example is the use of fingerprinting, which employs channel observations as the AI/ML model’s input In the upcoming sections, we’ll take a closer look at 5G to ascertain the UE’s location. positioning and focus on direct positioning with AI/ML. Section It’s worth to clarify a prevalent misunderstanding: while II examines specific scenarios where direct positioning is fingerprinting falls under the umbrella of direct position- vital, along with the challenges and requirements it entails. ing, they aren’t synonymous. Fingerprinting is one of Section III discusses Life Cycle Management (LCM) to support" 2401.02437v1,"Randomly Weighted Neuromodulation in Neural Networks Facilitates Learning of Manifolds Common Across Tasks 1 Jinyung Hong 1 Theodore P. Pavlic 1,2 School of Computing and Augmented Intelligence 2 School of Life Sciences Arizona State University Tempe, AZ 85281 { jhong53, tpavlic }@asu.edu Editors: Marco Fumero, Emanuele Rodolà, Clementine Domine, Francesco Locatello, Gintare Karolina Dziugaite, Mathilde Caron Abstract Geometric Sensitive Hashing functions, a family of Local Sensitive Hashing functions, are neural network models that learn class-specific manifold geometry in supervised learning. However, given a set of supervised learning tasks, understanding the manifold geometries that can represent each task and the kinds of relationships between the tasks based on them has received little attention. We explore a formalization of this question by considering a generative process where each task is associated with a high-dimensional manifold, which can be done in brain-like models with neuromodulatory systems. Following this formulation, we define Task-specific Geometric Sensitive Hashing (T-GSH) and show that a randomly weighted neural network with a neuromodulation system can realize this function. 1 1 Introduction Deep Neural Networks (DNNs) have shown outstanding performance in various fields due to their ability to learn to transform complex objects into useful representations that can be easily separated in the embedding space. However, due to their “black box” behavior, there is still little known about exactly which information-rich features are captured by a DNN representation and what informationpoor variations are eliminated. To address the question, Dikkala et al. [10] considered the manifold geometry of a generative process where each class is associated with a manifold and parameter that shifts class examples along that manifold. Using this perspective, they could show that neural representations in supervised learning could be viewed as a kind of Locality Sensitive Hash functions that they coined Geometric Sensitive Hashing (GSH) [10]. In this work, we extend this geometric interpretation from one classification task to a series of potentially related classification tasks. For example, in a video clip of digits rotating counterclockwise, each possible digit within a single frame is a class associated with its own manifold, as in GSH, and we focus on the relationship between the manfolds induced by the classification problem in 1 All source codes and figures are available at https://github.com/PavlicLab/ NeurIPS2023-UniReps-Hong-TGSH-Randomly_Weighted_Neuromodulation_in_Neural_Networks. git. Proceedings of the I edition of the Workshop on Unifying Representations in Neural Models (UniReps 2023)." 2401.02451v1,"Automation of Smart Homes with Multiple Rule Sources Hoffner Yigal, Kaufman Eran Department of Software Engineering, Shenkar College, Ramat Gan, Israel 2 Department of Software Engineering, Shenkar College, Israel {f author, s author}@ips.xyz.edu, t author@dc.mu.edu Keywords: Smart home automation, Internet of Things (IoT), Rule-based smart home management, Learning system Abstract: Using rules for home automation presents several challenges, especially when considering multiple stakeholders in addition to residents, such as homeowners, local authorities, energy suppliers, and system providers, who will wish to contribute rules to safeguard their interests. Managing rules from various sources requires a structured procedure, a relevant policy, and a designated authority to ensure authorized and correct contributions and address potential conflicts. In addition, the smart home rule language needs to express conditions and decisions at a high level of abstraction without specifying implementation details such as interfaces, access protocols, and room layout. Decoupling high-level decisions from these details supports the transferability and adaptability of rules to similar homes. This separation also has important implications for structuring the smart home system and the security architecture. Our proposed approach and system implementation introduce a rule management process, a rule administrator, and a domain-specific rule language to address these challenges. In addition, the system provides a learning process that observes residents, detects behavior patterns, and derives rules which are then presented as recommendations to the system. 1 INTRODUCTION Using rules to automate the control of the home and its processes poses various challenges. Besides residents’ rules, most homes are likely to have multiple stakeholders as additional sources of rules. A stakeholder is an individual, group, or entity with an interest, involvement, or concern in the smart home, capable of affecting home-related decisions or being affected by their outcomes. Stakeholders, such as the homeowner, local council, the energy supplier, and the system provider, may also wish to contribute rules to protect and further their interests. For example, local authorities’ rules may reflect home regulations concerning such issues as pollution and permitted noise levels. An energy supplier may have requirements concerning the optimal time to use certain facilities. The homeowner may wish to keep the temperature in the house above 5 degrees, no matter what, to prevent pipes from freezing in the winter. The stakeholders must provide such rules, as they cannot be learned from observing the residents’ behavior. The presence of multiple stakeholders as rule providers raises a management problem. Integrat- ing rules from various sources requires a structured rule introduction procedure, a relevant policy and a designated authority, such as a Rule Administrator, to supervise it. This manager must ensure that the suggested rules originate from authorized entities and that any potential conflicts with other rules are addressed. This aspect of smart home management has yet to be discussed in the literature. Another smart home problem concerns the rule language, which combines two central elements: conditions and decisions. In this approach, conditions refer to the home’s state, its residents’ activities, and contextual environmental factors. The corresponding actions are typically instructions to activate or deactivate specific home devices. A smart home rule language should be able to express automation preferences at a relatively high level of abstraction, enabling users to ignore the low-level technical implementation details and opening up the possibility of the same rules applying to similar houses. Decoupling the high-level decisions from the home layout details, the specific room allocation and the specific device used from the rules has considerable advantages. For example, if a rule sets the temperature at a certain level, this specifies a requirement but does not spec-" 2401.02461v1,"Boundary Controllability of Riemann–Liouville Fractional Semilinear Equations Asmae Tajani 1,2 https://orcid.org/0000-0002-3631-5376 tajaniasmae@ua.pt Fatima-Zahrae El Alaoui 2 https://orcid.org/0000-0001-8912-4031 f.elalaoui@umi.ac.ma Delfim F. M. Torres 1,∗ https://orcid.org/0000-0001-8641-2505 delfim@ua.pt 1 Center for Research and Development in Mathematics and Applications (CIDMA), Department of Mathematics, University of Aveiro, 3810-193 Aveiro, Portugal 2 TSI Team, Department of Mathematics, Faculty of Sciences, Moulay Ismail University, 11201 Meknes, Morocco Abstract We study the boundary regional controllability of a class of Riemann–Liouville fractional semilinear sub-diffusion systems with boundary Neumann conditions. The result is obtained by using semi-group theory, the fractional Hilbert uniqueness method, and Schauder’s fixed point theorem. Conditions on the order of the derivative, internal region, and on the nonlinear part are obtained. Furthermore, we present appropriate sufficient conditions for the considered fractional system to be regionally controllable and, therefore, boundary regionally controllable. An example of a population density system with diffusion is given to illustrate the obtained theoretical results. Numerical simulations show that the proposed method provides satisfying results regarding two cases of the control operator. Keywords: Time-fractional systems; Semilinear systems; Boundary regional controllability; Fractional diffusion logistic growth law model. 1 Introduction Mathematical control theory may be seen as an interdisciplinary branch of engineering and mathematics that deals with the behavior of dynamic systems through many perceptions, one of them being controllability. In short, controllability means that one can govern the system to any desired state of the dynamical system, in finite time, using a suitable control function into the system. The need to control a system has been visualized in many phenomena, such as the design of electric circuits, manufacturing processes, communication systems, and biological networks [1–4]. ∗ This is a preprint version of the paper published open access in ’Commun. Nonlinear Sci. Numer. Simul.’ [https://doi.org/10.1016/j.cnsns.2023.107814]. Submitted 26/Jul/2022; Revised 08/Dec/2022 and 16/Oct/2023; Accepted for publication 30/Dec/2023; Available online 03/Jan/2024. ∗ Corresponding author: telephone: +351 234 370 668; fax: +351 234 370 066; e-mail: delfim@ua.pt 1" 2401.02468v1,"Cambridge Large Two (????), 1–6 RESEARCH PAPER 4XMM J182531.5 – 144036: A new persistent Be/X-ray binary found within the XMM-Newton serendipitous survey A.B. Mason, 1,2 A.J. Norton, 1 J.S. Clark † , 1 S.A. Farrell, 3 and A.J. Gosling 4 1 School of Physical Sciences, The Open University, Walton Hall, Milton Keynes MK7 6AA, UK 2 Finnish Centre for Astronomy with ESO (FINCA), University of Turku, Väisäläntie 20, FI-21500 Piikkiö, Finland 3 Department of Physics & Astronomy, University of Leicester, Leicester LE1 7RH, UK 4 Astrophysics, Department of Physics, University of Oxford, Denys Wilkinson Building, Keble Road, Oxford OX1 3RH, UK Author for correspondence: A.J. Norton, Email: andrew.norton@open.ac.uk † In memoriam: This paper is dedicated to the memory of our late colleague Simon Clark who inspired us all to try to understand the stars.. Abstract We aim to investigate the nature of time-variable X-ray sources detected in the XMM-Newton serendipitous survey. The X-ray light curves of objects in the XMM-Newton serendipitous survey were searched for variability and coincident serendipitous sources observed by Chandra were also investigated. Subsequent infrared spectroscopy of the counterparts to the X-ray objects that were identified using UKIDSS was carried out using ISAAC on the VLT. We found that the object 4XMM J182531.5–144036 detected in the XMM-Newton serendipitous survey in April 2008 was also detected by Chandra as CXOU J182531.4–144036 in July 2004. Both observations reveal a hard X-ray source displaying a coherent X-ray pulsation at a period of 781 s. The source position is coincident with a K = 14 mag infrared object whose spectrum exhibits strong HeI and Br γ emission lines and an infrared excess above that of early B-type dwarf or giant stars. We conclude that 4XMM J182531.5–144036 is a Be/X-ray binary pulsar exhibiting persistent X-ray emission and is likely in a long period, low eccentricity orbit, similar to X Per. Keywords: stars: emission-line, Be; stars: neutron; stars: binaries: general 1. Introduction Be/X-ray binaries (BeXRBs) comprise the largest subset of the High Mass X-ray Binaries (Fortin et al. 2023). They consist of an X-ray emitting neutron star pulsar in an (often eccentric) orbit around a Be star, i.e. a non-supergiant B-type star that has shown hydrogen lines in emission. Be stars also show an excess of infrared emission, compared to a star of the same spectral type. The emission lines and infrared excess are attributed to an equatorial circumstellar disc, due to material expelled from the rapidly rotating Be star. Some BeXRBs exhibit persistent X-ray emission whilst others only show such emission close to periastron, when the neutron star passes through the Be star circumstellar disc (Reig 2011). Here we present the discovery of a new BeXRB, 4XMM J182531.5–144036, identified from an investigation of hard X-ray sources in the XMM-Newton serendipitous survey. The source was also detected by Chandra so we investigate those archival observations too. In Section we introduce the X- ray observations and discuss the reduction of both data sets. The timing and spectral analysis of the X-ray source is then described within Sections 3 and 4 respectively. Section 5 examines near infrared observations and the identification of the counterpart to this system and Section 6 presents a discussion of our results. 2. X-ray observations 2.1 XMM-Newton The field of 4XMM J182531.5–144036 was observed on the 10th April, 2008 by XMM-Newton (Jansen et al. 2001) for 33.5 ks starting at MJD 54566.76197. The target was the Wolf- Rayet star WR 115 and the source 4XMM J182531.5–144036 is located close to the edge of the field of view (see Figure 1, left). The observation was performed using all three EPIC cameras in imaging mode; the MOS1, MOS2 and PN cameras were employed in full frame mode using a medium filter. Additionally the Optical Monitor (OM) instrument performed optical/UV observations with the UVM2 filter. 4XMM J182531.5–144036 was initially detected by the XMM-Newton pipeline (Watson et al. 2009) at RA: 18 h 25 m 31.5 s and Dec: –14 ◦ 40 ′ 36.6 ′′ (J2000) with a positional uncertainty of 1.1 ′′ (3 σ ). For this observation the 2MASS catalogue was used to correct the source position, providing a reduced pointing error of 0.35 ′′ . No source was detected in the OM mosaiced image within the EPIC error circle. Observation Data Files (ODFs) were processed using the XMM-Newton Science Analysis System (SAS) v21.0 (http: //xmm.esa.int/sas/). Event lists for each PN and MOS camera were generated using the epproc or emproc script respectively, each employing the most recent calibration files, and using default parameters. Bad events caused by cosmic rays, edge effects and bad rows were identified and discarded. Single event light curves were constructed for all three EPIC cameras using energies greater than 10 keV to detect any episodes of soft proton flaring that may have occurred during the observation. For each camera a Good Time Interval (GTI) file was created to filter out these flaring episodes, with a background threshold of 1 count s –1 for the PN and 0.3 count s –1 for the MOS" 2401.02494v1,"Advancing GUI for Generative AI: Charting the Design Space of Human-AI Interactions through Task Creativity and Complexity Zijian Ding ding@umd.edu University of Maryland, College Park USA Figure 1: Spectrum of human-AI co-creation tasks and corresponding human intervention complexity [11]. The upper half describes the spectrum of co-creation tasks from low to high creativity and complexity; the bottom half proposes a mapping of the points on these spectrum to human-AI interaction patterns from the taxonomy proposed by Cheng et al. [6]. ABSTRACT 1 Technological progress has persistently shaped the dynamics of human-machine interactions in task execution. In response to the advancements in Generative AI, this paper outlines a detailed study plan that investigates various human-AI interaction modalities across a range of tasks, characterized by differing levels of creativity and complexity. This exploration aims to inform and contribute to the development of Graphical User Interfaces (GUIs) that effectively integrate with and enhance the capabilities of Generative AI systems. The study comprises three parts: exploring fixed-scope tasks through news headline generation, delving into atomic creative tasks with analogy generation, and investigating complex tasks via data visualization. Future work aims to extend this exploration to linearize complex data analysis results into narratives understandable to a broader audience, thereby enhancing the interpretability of AI-generated content. Over time, advancements in technology have consistently changed how humans interact with machines. The trajectory of User Interface (UI) development has experienced several pivotal shifts, starting with the inception of the Command Line Interface (CLI) in 1964, and the subsequent introduction of the Graphical User Interface (GUI) in 1979. By 2022, elements reminiscent of the CLI had resurfaced in UI design, a trend epitomized by conversational agents such as ChatGPT. The current imperative is to devise an advanced GUI iteration that seamlessly integrates with Generative AI applications. In pursuit of this, our study delves into various human- AI interaction modalities across a spectrum of task creativity and complexity to guide future GUI enhancements. Our research categorizes tasks into three escalating levels of creativity and complexity: fixed-scope content curation tasks like summarization, atomic creative tasks like analogy generation, and complex and interdependent tasks like data analysis visualization. Correspondingly, we explore a range of human-AI interaction methods, from straightforward selection and rating to more involved guiding, post-editing, and interactive editing. This leads us to our research question: How do different facets of human-AI interaction correlate with the creative and complex nature of tasks? ACM Reference Format: Zijian Ding. 2023. Advancing GUI for Generative AI: Charting the Design Space of Human-AI Interactions through Task Creativity and Complexity. In 28th International Conference on Intelligent User Interfaces (IUI ’24 Companion), March 18–21, 2024, Greenville, South Carolina, United States. ACM, New York, NY, USA, 4 pages. https://doi.org/10.1145/3581754.3584111 Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). IUI ’24 Companion, March 18–21, 2024, Greenville, South Carolina, United States © 2023 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0107-8/23/03. https://doi.org/10.1145/3581754.3584111 2 INTRODUCTION RELATED WORK Our examination of human-AI collaboration patterns is informed by Cheng et al.’s taxonomy, which delineates five prevalent interactions in text summarization: guiding model output, selecting or rating model output, post-editing, interactive editing initiated by AI, and writing with model assistance initiated by humans [6]. My doctoral" 2401.02505v1,"Adapt/Exchange decisions depend on structural and surface features: Effects of solution costs and presentation format Romy Müller Faculty of Psychology, Chair of Engineering Psychology and Applied Cognitive Research, TUD Dresden University of Technology, Dresden, Germany Corresponding author: Romy Müller Chair of Engineering Psychology and Applied Cognitive Research TUD Dresden University of Technology Helmholtzstraße 10, 01069 Dresden, Germany Email: romy.mueller@tu-dresden.de Phone: +49 351 46335330 Fax: +49 351 46337741 ORCID: 0000-0003-4750-7952 1" 2401.02506v1,"Student gender modulates the intersection of calculus proficiency and calculus self-efficacy in an introductory electricity and magnetism course Christopher J. Fischer * , Jennifer Delgado, Sarah LeGresley, Jessy Changstrom Department of Physics and Astronomy, University of Kansas, 1251 Wescoe Hall Drive, Lawrence, KS, 66049 * shark@ku.edu Abstract We assessed changes in calculus proficiency and calculus self-efficacy in a second semester course of introductory physics focused on electricity and magnetism. While all students demonstrated an increase in calculus proficiency, including a possible improvement in calculus transfer to physics, women displayed larger gains than men. Conversely, men showed larger gains in calculus self-efficacy. When combined, these data suggest that student identity modulates the correlation between a student’s calculus abilities and their perception or self-evaluation of those abilities. These data highlight a potential contributing factor to gender-related differences in physics self-efficacy as well as the complexity of addressing those differences. 1 Introduction The ability to use mathematics is an essential skill common to all science and engineering disciplines. Because of this and due to economic and logistic constraints, courses in introductory mathematics at most colleges and universities are shared by many degree programs and centrally taught in a department of mathematics. Unfortunately, this structure can result in the mathematics being decontextualized, thereby placing on students the burden of transferring their skills in solving mathematical problems to other STEM areas. However, while students are generally expected to be capable of this transference, evidence suggests that it actually poses a large barrier to student learning in physics [4, 6, 25, 29]. Indeed, the emphasis on applied mathematics in introductory physics courses is believed to be responsible for the observed positive correlation between mathematics ability and student performance in these courses [3, 5, 16, 17]. Although we and others have suggested how calculus proficiency in introductory physics and possibly mathematics transfer to physics may be improved [18, 19, 36, 39], a quantitative analysis of how curriculum changes and/or interventions in introductory physics affect student ability to solve calculus problems in the context of physics has not yet been completed. As part of an ongoing effort to address this need, we report here our analysis of proficiency with integral calculus in the context of introductory physics, covering electricity and magnetism, combined with an independent assessment of calculus self-efficacy. We show that while a positive correlation between student self-assessment of calculus ability and student proficiency with calculus exists for men, a negative correlation between these traits is present for women, even though women perform equal to or better than men on assessments of calculus proficiency. These results thus build off our previous work indicating an identity-modulated correlation between physics self-efficacy and calculus proficiency [9]. 1/16" 2401.02513v1,"LAPTH-002/24, IPPP/23/85 GeV-scale dark matter with p-wave Breit-Wigner enhanced annihilation Genevieve Belanger, 1, ∗ Sreemanti Chakraborti, 2, † Yoann Génolini, 1, ‡ and Pierre Salati 1, § 1 LAPTh, Université Savoie Mont Blanc & CNRS, Chemin de Bellevue, 74941 Annecy Cedex — France 2 Institute for Particle Physics Phenomenology, Department of Physics, Durham University, Durham, DH1 3LE, United Kingdom We consider a light scalar dark matter candidate with mass in the GeV range whose p-wave annihilation is enhanced through a Breit-Wigner resonance. The annihilation actually proceeds in the s-channel via a dark photon mediator whose mass is nearly equal to the masses of the incoming particles. We compute the temperature at which kinetic decoupling between dark matter and the primordial plasma occurs and show that including the effect of kinetic decoupling can reduce the dark matter relic density by orders of magnitude. For typical scalar masses ranging from 200 MeV to 5 GeV, we determine the range of values allowed for the dark photon couplings to the scalar and to the standard model particles after requiring the relic density to be in agreement with the value extracted from cosmological observations. We then show that µ and y-distortions of the CMB spectrum and X-ray data from XMM-Newton strongly constrain the model and rule out the region where the dark matter annihilation cross-section is strongly enhanced at small dispersion velocities. Constraints from direct detection searches and from accelerator searches for dark photons offer complementary probes of the model. I. INTRODUCTION Searches for dark matter (DM) have for the last decades concentrated on a new weakly interacting particle at the electroweak scale. This was partly motivated by theoretical preferences for new physics at the TeV scale and by the fact that the freeze-out mechanism for a new weakly interacting massive particle (WIMP) at the electroweak scale naturally leads to the value for the DM relic density extracted from observations [1, 2]. The lack of signals in (in-)direct detection or at colliders for new particles [3–5] aroused interest for a wider range of DM candidates of different scales and/or interaction strengths. In particular, on the theoretical side a plethora of DM models have emerged that feature the possibility of lighter DM, around the GeV scale or below [6–10]. These candidates largely escape the strongest constraints from direct detection since the minimum recoil energy they can impart to the nucleus falls below the detector threshold [11–13]. Efforts to improve the sensitivity for direct detection of light DM are being pursued by taking advantage of scattering on electrons or single phonon excitations in crystals [14]. Indirect searches for DM annihilation in the galactic halo or in dwarf spheroidal galaxies (dSPhs) are also mostly sensitive to DM masses above a few GeVs [15–17]. However, WIMPs in the MeV-GeV scale can be constrained from cosmic-ray electrons and positrons using Vogager 1 and AMS-02 data [18, 19]. Moreover, light DM annihilating into e + e − pairs will leave a signature in X-ray when the electron-positrons scatter on the low-energy photons in the Galaxy. It was shown recently that X-ray data from XMM-Newton can be used to constrain light DM [20, 21]. Strong constraints on light DM come from cosmology. DM annihilation deposits electromagnetic energy in the primordial plasma and impacts the anisotropies of the cosmic microwave background (CMB) [22]. The precise measurements of the CMB by the PLANCK satellite thus put robust constraints on DM annihilation cross-sections into photons or charged particles. These constraints typically exclude the cross-section required to achieve the measured relic density when the DM mass lies below approximately 10 GeV under the assumption of s-wave DM annihilation [23]. However, such constraints are escaped easily if DM annihilation is p-wave, indeed the typical DM velocity during recombination (v ≈ 10 −8 c) is much smaller than the typical velocity at freeze-out, leading to a strong suppression of the cross-section at recombination. The energy injected in the primordial plasma from DM annihilations can also induce deviations from the pure black-body spectrum of the CMB. Depending on the value of the redshift at which the energy injection occurs, the dominant effect is either µ-distortion or, at lower redshifts, y-distortion [24]. FIRAS [25] has set limits on both types of distortions resulting in important constraints for p-wave annihilating DM ∗ Electronic address: genevieve.belanger@lapth.cnrs.fr † Electronic address: sreemanti.chakraborti@durham.ac.uk ‡ Electronic address: yoann.genolini@lapth.cnrs.fr § Electronic address: pierre.salati@lapth.cnrs.fr" 2401.02524v1,"C OMPREHENSIVE E XPLORATION OF S YNTHETIC D ATA G ENERATION : A S URVEY André Bauer University of Chicago Chicago, United States of America andrebauer@uchicago.edu Simon Trapp, Michael Stenger, Robert Leppich, Samuel Kounev University of Würzburg Würzburg, Germany {firstname}.{lastname}@uni-wuerzburg.de Mark Leznik University of Ulm Ulm, Germany mark.leznik@uni-ulm.de Kyle Chard, Ian Foster Argonne National Laboratory Lemont, United States of America {lastname}@anl.gov A BSTRACT Recent years have witnessed a surge in the popularity of Machine Learning (ML), applied across diverse domains. However, progress is impeded by the scarcity of training data due to expensive acquisition and privacy legislation. Synthetic data emerges as a solution, but the abundance of released models and limited overview literature pose challenges for decision-making. This work surveys 417 Synthetic Data Generation (SDG) models over the last decade, providing a comprehensive overview of model types, functionality, and improvements. Common attributes are identified, leading to a classification and trend analysis. The findings reveal increased model performance and complexity, with neural network-based approaches prevailing, except for privacy-preserving data generation. Computer vision dominates, with GANs as primary generative models, while diffusion models, transformers, and RNNs compete. Implications from our performance evaluation highlight the scarcity of common metrics and datasets, making comparisons challenging. Additionally, the neglect of training and computational costs in literature necessitates attention in future research. This work serves as a guide for SDG model selection and identifies crucial areas for future exploration. Keywords Survey · Synthesis · Synthetic Data Generation 1 Introduction In recent years, Artificial Intelligence (AI), particularly in subfields like Machine Learning (ML) and Deep Learning (DL), has experienced significant growth and popularity [1, 2]. As ML and DL models have evolved in complexity and efficiency, a persistent challenge has been the limited size of training datasets. This limitation stems from high labeling costs and privacy concerns, hindering the model’s ability to generalize effectively. To address this issue, Synthetic Data Generation (SDG) emerges as a viable solution, providing substantial amounts of artificial data for model training. This artificial data includes novel, diverse, and realistic samples, alleviating the constraints imposed by traditional datasets [2]. Broadly speaking, SDG involves generating artificial data and labels, aiming to emulate authentic samples closely. This process is automated by utilizing generative models that estimate the probability distribution of their training data. This sets it apart from data augmentation, which manipulates existing data, as SDG generates new data by sampling from learned distributions. The advantages of synthetic data go beyond mere cost reduction, with its on-the-fly generation contributing to reduced computational time and addressing bias in data distribution. Synthetic data proves highly valuable when real data is insufficient, costly to label, or exhibits biased distributions. The concept of synthetic data dates back to the 1960s and has evolved alongside the broader AI landscape. However, the dynamic nature of SDG, with new approaches emerging annually, poses a challenge for researchers, especially those" 2401.02526v1,"Branched Variational Autoencoder Classifiers Ahmed Salah * , David Yevick Department of Physics and Astronomy, University of Waterloo, ON N2L 3G1, Canada *Corresponding author email address: asalah@uwaterloo.ca Abstract– This paper introduces a modified variational autoencoder (VAEs) that contains an additional neural network branch. The resulting “branched VAE” (BVAE) contributes a classification component based on the class labels to the total loss and therefore imparts categorical information to the latent representation. As a result, the latent space distributions of the input classes are separated and ordered, thereby enhancing the classification accuracy. The degree of improvement is quantified by numerical calculations employing the benchmark MNIST dataset for both unrotated and rotated digits. The proposed technique is then compared to and then incorporated into a VAE with fixed output distributions. This procedure is found to yield improved performance for a wide range of output distributions. Keywords: variational autoencoder, neural networks, classification, clustering. 1. Introduction Clustering algorithms, which sort similar data samples into segregated groups, are employed in numerous practical applications involving complex and often noisy data, such as false news detection [1] and document analysis [2]. In such cases, meaningful features for sample assignment are often identified by either of two clustering procedures: similarity-based clustering such as spectral clustering, which involves computing a distance matrix [3], and feature-based clustering represented by K-means and Gaussian mixture models, which instead minimizes the sum of the squared errors between the feature values of the data points and the centroid of the cluster to which they belong. While at first sight unrelated to clustering algorithms, deep generative models such as variational autoencoders (VAE) employ neural networks to organize input data in a manner that enables the subsequent creation of synthetic samples that exhibit or interpolate the features of the 1" 2401.02566v1,"Siamese Residual Neural Network for Musical Shape Evaluation in Piano Performance Assessment Xiaoquan Li 1 , Stephan Weiss 1 , Yijun Yan 2 , Yinhe Li 2 , Jinchang Ren 2 , John Soraghan 1 , Ming Gong 1 Centre for Signal and Image Processing, Dept. Electronic & Electrical Engineering, University of Strathclyde, Glasgow, UK 2 National Subsea Centre, School of Computing, Robert Gordon University, Aberdeen, UK Email: {xiaoquan.li, stephan.weiss, j.soraghan, ming.gong}@strath.ac.uk; {y.yan2, y.li24, j.ren}@rgu.ac.uk; 1 Abstract — Understanding and identifying musical shape plays an important role in music education and performance assessment. To simplify the otherwise time- and cost-intensive musical shape evaluation, in this paper we explore how artificial intelligence (AI) driven models can be applied. Considering musical shape evaluation as a classification problem, a light-weight Siamese residual neural network (S-ResNN) is proposed to automatically identify musical shapes. To assess the proposed approach in the context of piano musical shape evaluation, we have generated a new dataset, containing 4116 music pieces derived by 147 piano preparatory exercises and performed in 28 categories of musical shapes. The experimental results show that the S-ResNN significantly outperforms a number of benchmark methods in terms of the precision, recall and F1 score. Keywords—Piano Performance Assessment; Audio Classification; Musical Shape Evaluation; Siamese Network. I. INTRODUCTION As a sub-task of music information retrieval (MIR), music performance assessment (MPA) has drawn considerable attention [1, 2] . In practical music education, MPA helps to improve a candidate's ability to perform. However, it needs comprehensive music perception and cognition which are mostly built up via long-term practice and understanding. Currently, MPA for piano students is mostly guided by music trainers, resulting in extensive time and resources needed. An AI-driven MPA would be particularly useful for raising the efficacy of music education whilst reducing the cost (Fig. 1). The marking criteria of music scores in some music educational exams, such as the Associated Board of the Royal Schools of Music (ABRSM) in the UK, are determined by five elements, i.e., pitch, time, tone, shape and overall performance [3] . Many machine learning and deep learning models have been explored to evaluate the pitch, time, rhythm and tone in MPA [2] . Typical works include convolutional neural network (CNN) for local tempo and tempo stability assessment [4] , support vector regressor for assessing rhythmic accuracy and tone quality [5] , fusion of CNN and recurrent network for pitch extraction [6] , and the integration of 2DCNN and 3DCNN for evaluation of piano skills [7] , etc. However, musical shape evaluation for MPA remains unaddressed to date. Musical shape, as a unit to build a coherent narrative music environment, is one of the most evident Fig. 1. Concept of current MPA in music education. characteristics, which offers a more ecologically valid way of understanding the feeling responses to the music than seeing music as expressive of particular emotional states [8] . Due to its abstraction and multisensory perception, the musicology study has progressed slowly. In 1963, Langer [9] proposed a famous theory of ‘sound the way moods feel’ where musical shape is considered as a fundamental unit in music’s intrinsic properties. In 2006, Eitan and Granot [10] discussed the associations of dynamics, pitch, time, and articulation to musical shape by comparing the music perception with musicians and nonmusicians. The result found that time patterns are highly related to the musical shapes. Pitch and dynamics patterns are potentially linked with musical shape, which required further investigation. To tackle this issue, Küssner and Leech-Wikinson [11] carried out an extensive study in 2014 and discovered that pitch does not closely associate with musical shape. In 2017, Daniel [8] defined that musical shape refers to the small dynamics changes in music that can represent feeling and movement states, or any tiny changes varying with time, giving life-like qualities to music. Therefore, the core in musical shape evaluation is to discriminate the time and dynamics patterns in music pieces. Lerch presented a critical review of MPA [12] and pointed out that most MIR researchers neglect the difference between score-like and performance information. Although many scholars have studied time and dynamics patterns with the corresponding datasets reported [12] , they do not intend to evaluate the music’s intrinsic properties. Thus, it brings a large barrier for using existing MIR technique to interpret the music’s intrinsic properties. To break through this bottleneck, it is crucial to add a new dimension to MPA, conducting the study of musical shape evaluation to align the human perception with music’s intrinsic properties. For this purpose, a specific dataset is also needed. Thus, we report on a new musical shape evaluation dataset (see details in Section 2) where all music pieces are performed by 3 music trainers and 10 young students. Inspired by the concept shown in Fig. 1, we define the music pieces performed by music trainers based on their music This is a peer reviewed, accepted author manuscript of the following conference contribution: Li, X., Weiss, S., Yan, Y., Li, Y., Ren, J., Soraghan, J., & Gong, M. (2023). Siamese residual neural network for musical shape evaluation in piano performance assessment. 1-5. Paper presented at 31st European Signal 1 Processing Conference, Helsinki, Finland." 2401.02569v1,"Stochastic Dissipativity for Systems with Probabilistic Input Delays Ethan J. LoCicero, Amy K. Strong, Leila J. Bridgeman Thomas Lord Department of Mechanical Engineering and Materials Science, Duke University, North Carolina, United States of America Abstract This work considers stochastic operators in general inner-product spaces, and in particular, systems with stochastic input delays of a known probability distribution. Stochastic dissipativity and stability are defined from an operator-theoretic perspective, and the well-known open-loop dissipativity conditions for closed-loop/network stability are extended to the stochastic case. Criteria are derived to identify dissipative nonlinear systems with stochastic input delays, and this result is used to find delaydistribution-dependent linear matrix inequality conditions for stochastic dissipativity of a linear system with input delays of a known probability distribution. A numerical experiment demonstrates the utility of the resulting criteria for robust plant analysis and controller design, highlighting significantly reduced conservatism compared to deterministic methods. Key words: time-delays, stochastic control, robust control of nonlinear systems, linear matrix inequalities, passivity 1 Introduction Signal delays are pervasive in a wide variety of fields, including chemical systems, lasers, aircraft, the internet, robotic tele-operation, traffic control, biology, and medicine [1,15,20,30]. Delays are particularly notable in large-scale, distributed systems where control and measurement signals are communicated over vast distances and unreliable networks. Such delays can adversely affect performance and stability, and they greatly complicate the mathematical analysis of otherwise simple problems [9,27,30]. Stability analysis of delayed systems is a challenging problem. For instance, the necessary and sufficient form of a Lyapunov-Krasovskii (L-K) functional for proving stability of a linear time invariant (LTI) system with constant state delays results in infinite-dimensional linear matrix inequality (LMI) conditions [27,30]. Moreover, no L-K functional form is yet known to be necessary and sufficient for proving the stability of an LTI system with time-varying delays. As a result, there is a ⋆ This work is supported by NSF GRFP Grant No. 1644868, the Alfred P. Sloan Foundation, and ONR Grant No. N00014- 23-1-2043. Corresponding author Ethan J. LoCicero. Email addresses: ethan.locicero@duke.edu (Ethan J. LoCicero, ), amy.k.strong@duke.edu (Amy K. Strong, ), leila.bridgeman@duke.edu (Leila J. Bridgeman). vast literature on deriving variations of L-K functionals [11,12,13,22,27,30]. An alternative approach to stability analysis has been to use input-output methods. Input-output stability notions, including passivity, gain, and conic sectors [33] have been used to analyze the stability of delayed systems [4,8,10,23,25,26,34]. However, existing results for time-varying delays are often limited and overlyconservative. Moreover, these results often don’t account for the inherent stochasticity in many delay processes. However, input-output methods are often thought of as special cases of QSR-dissipativity as introduced in Reference [32], so the recent (and long foreshadowed [29]) development of stochastic dissipativity [14] provides an opportunity for less conservative analysis of delay systems. Consequently, this paper develops dissipativity theory for systems with stochastic input delays. In the framework of Reference [14], a stochastic system need only satisfy a dissipativity property in expectation, which is then used to show Lyapunov stability in probability. This has the potential to significantly reduce the conservatism of stability results for stochastic systems. While the stochastic dissipativity definition and stability theorem from Reference [14] are broad, their criteria to identify dissipativity, which comes in the form of a KYP-style lemma, is restricted to nonlinear systems with affine dependence on the random process. This re- Preprint" 2401.02576v1,"t-DGR: A Trajectory-Based Deep Generative Replay Method for Continual Learning in Decision Making William Yue The University of Texas at Austin william.yue@utexas.edu Bo Liu The University of Texas at Austin bliu@cs.utexas.edu Peter Stone The University of Texas at Austin, Sony AI pstone@cs.utexas.edu Abstract Deep generative replay has emerged as a promising approach for continual learning in decision-making tasks. This approach addresses the problem of catastrophic forgetting by leveraging the generation of trajectories from previously encountered tasks to augment the current dataset. However, existing deep generative replay methods for continual learning rely on autoregressive models, which suffer from compounding errors in the generated trajectories. In this paper, we propose a simple, scalable, and non-autoregressive method for continual learning in decisionmaking tasks using a generative model that generates task samples conditioned on the trajectory timestep. We evaluate our method on Continual World benchmarks and find that our approach achieves state-of-the-art performance on the average success rate metric among continual learning methods. Code is available at https://github.com/WilliamYue37/t-DGR. 1 Introduction Continual learning, also known as lifelong learning, is a critical challenge in the advancement of general artificial intelligence, as it enables models to learn from a continuous stream of data encompassing various tasks, rather than having access to all data at once [1]. However, a major challenge in continual learning is the phenomenon of catastrophic forgetting, where previously learned skills are lost when attempting to learn new tasks [2]. To mitigate catastrophic forgetting, replay methods have been proposed, which involve saving data from previous tasks and replaying it to the learner during the learning of future tasks. This approach mimics how humans actively prevent forgetting by reviewing material for tests and replaying memories in dreams. However, storing data from previous tasks requires significant storage space and becomes computationally infeasible as the number of tasks increases. In the field of cognitive neuroscience, the Complementary Learning Systems theory offers insights into how the human brain manages memory. This theory suggests that the brain employs two complementary learning systems: a fast-learning episodic system and a slow-learning semantic system [3, 4, 5]. The hippocampus serves as the episodic system, responsible for storing specific memories of unique events, while the neocortex functions as the semantic system, extracting general knowledge from episodic memories and organizing it into abstract representations [6]. 2nd Workshop on Agent Learning in Open-Endedness (ALOE) at NeurIPS 2023." 2401.02614v1,"Scaling and Masking: A New Paradigm of Data Sampling for Image and Video Quality Assessment Yongxu Liu 1,2 * , Yinghui Quan 2,1 , Guoyao Xiao 2,1 , Aobo Li 3 , Jinjian Wu 3 1 Hangzhou Institute of Technology, Xidian University, Hangzhou 311200, China 2 School of Electronic Engineering, Xidian University, Xi’an 710071, China 3 School of Artificial Intelligence, Xidian University, Xi’an 710071, China {yongxu.liu, gyxiao}@xidian.edu.cn, {yhquan, jinjian.wu}@mail.xidian.edu.cn, abli@stu.xidian.edu.cn Abstract Quality assessment of images and videos emphasizes both local details and global semantics, whereas general data sampling methods (e.g., resizing, cropping or grid-based fragment) fail to catch them simultaneously. To address the deficiency, current approaches have to adopt multi-branch models and take as input the multi-resolution data, which burdens the model complexity. In this work, instead of stacking up models, a more elegant data sampling method (named as SAMA, scaling and masking) is explored, which compacts both the local and global content in a regular input size. The basic idea is to scale the data into a pyramid first, and reduce the pyramid into a regular data dimension with a masking strategy. Benefiting from the spatial and temporal redundancy in images and videos, the processed data maintains the multi-scale characteristics with a regular input size, thus can be processed by a single-branch model. We verify the sampling method in image and video quality assessment. Experiments show that our sampling method can improve the performance of current single-branch models significantly, and achieves competitive performance to the multi-branch models without extra model complexity. The source code will be available at https://github.com/Sissuire/SAMA. … (a) Scaling/cropping (b) Grid-based fragment (c) The proposed sampling method Introduction Image/video quality assessment (I/VQA) is to quantify the perceptual quality/feeling of the given image/video data from the perspective of users (Wu et al. 2019a; Liu et al. 2022b; Wu et al. 2023c,d,b). The best choice of measuring perceptual quality is to conduct a subjective experiment and collect the mean opinion scores (MOS) from a group of subjects (Fang et al. 2022; Jiang et al. 2022). However, the huge cost and inefficiency of the subjective quality assessment cannot satisfy most demands in reality, thus pushing the development of I/VQA methods. As user-generated content (e.g., selfies, short videos) is dramatically overflowing in everyone’s mobile phone, every platform (such as TikTok and Facebook), and the whole internet, I/VQA serves as the criterion for quality monitoring, data screening or preference recommendation, and is becoming more active in the society of multimedia and computer vision (Zhu et al. 2020; Wang, Chan, and Loy 2023; Zhang et al. 2023b). * Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: An illustration of data sampling methods in quality assessment. Scaling would cause detail loss, while cropping might harm global perception. The proposed method scales the data into a pyramid and masks the pyramid based on data redundancy. The resulting data holds the multi-scale nature with a regular input size. The intrinsic nature of quality assessment implies that the sampled data prepared for the quality assessment model should well preserve both local details and global appearance, which is not trivial for the fixed input size in deep learning-based models. Before inputting the data into the quality assessment model, a natural process is to interpolate the data into a fixed size (e.g., 224 × 224). However, the scaling method would introduce the loss of local details, which is inappropriate for I/VQA. Previous work has suggested that preserving the higher resolution of the input data is critical (Hosu et al. 2020). As a consequence, croppingbased sampling is widely used in both IQA and VQA (Ying et al. 2020, 2021). The concern is when facing an image" 2401.02621v1,"Tracking Surface Charge Dynamics on Single Nanoparticles Ritika Dagar, 1,2∗† Wenbin Zhang, 1,2,3∗† Philipp Rosenberger, 1,2 Thomas M. Linker, 4 Ana Sousa-Castillo, 5 Marcel Neuhaus, 1,2 Sambit Mitra, 1,2 Shubhadeep Biswas, 1,2,4 Alexandra Feinberg, 4 Adam M. Summers, 4 Aiichiro Nakano, 6 Priya Vashishta 6 Fuyuki Shimojo, 7 , Jian Wu, 3 Cesar Costa Vera, 1,8 Stefan A. Maier 9,10, Emiliano Cortés 5 Boris Bergues 1,2, Matthias F. Kling 1,2,4,11∗ 1 Department of Physics, Ludwig-Maximilians-Universität Munich, D-85748 Garching, Germany 2 Max Planck Institute of Quantum Optics, D-85748 Garching, Germany 3 State Key Laboratory of Precision Spectroscopy, East China Normal University Shanghai, 200241, China 4 Stanford PULSE Institute, SLAC National Accelerator Laboratory, Menlo Park, CA, 94025, USA 5 Nanoinstitute Munich, Department of Physics, Ludwig-Maximilians-Universität Munich, D-80539 Munich, Germany 6 Collobratory for Advanced Computing and Simulations, University of Southern California, Los Angeles, CA 90089, USA 7 Department of Physics, Kumamoto University, Kumamoto 860-0862, Japan 8 Department of Physics, Escuela Politecnica Nacional, Quito 170525, Ecuador 9 Department of Physics, Imperial College London, London SW7 2AZ, UK 10 School of Physics and Astronomy, Monash University, Clayton Victoria 3800, Australia 11 Applied Physics Department, Stanford University, Stanford, CA, 94305, USA ∗ To whom correspondence should be addressed; E-mail: ritika.dagar@physik.uni-muenchen.de, wbzhang@lps.ecnu.edu.cn, mfkling@slac.stanford.edu † These authors contributed equally to this work. 1" 2401.02634v1,"IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023 1 AG-ReID.v2: Bridging Aerial and Ground Views for Person Re-identification Huy Nguyen, Kien Nguyen, Sridha Sridharan, Clinton Fookes School of Electrical Engineering and Robotics Queensland University of Technology, Brisbane, Australia 4000 thanhnhathuy.nguyen@hdr.qut.edu.au, { k.nguyenthanh, s.sridharan, c.fookes } @qut.edu.au Abstract—Aerial-ground person re-identification (Re-ID) presents unique challenges in computer vision, stemming from the distinct differences in viewpoints, poses, and resolutions between high-altitude aerial and ground-based cameras. Existing research predominantly focuses on ground-to-ground matching, with aerial matching less explored due to a dearth of comprehensive datasets. To address this, we introduce AG-ReID.v2, a dataset specifically designed for person Re-ID in mixed aerial and ground scenarios. This dataset comprises 100,502 images of 1,615 unique individuals, each annotated with matching IDs and 15 soft attribute labels. Data were collected from diverse perspectives using a UAV, stationary CCTV, and smart glasses-integrated camera, providing a rich variety of intra-identity variations. Additionally, we have developed an explainable attention network tailored for this dataset. This network features a three-stream architecture that efficiently processes pairwise image distances, emphasizes key top-down features, and adapts to variations in appearance due to altitude differences. Comparative evaluations demonstrate the superiority of our approach over existing baselines. We plan to release the dataset and algorithm source code publicly, aiming to advance research in this specialized field of computer vision. For access, please visit https://github.com/huynguyen792/AG- ReID.v2. Index Terms—Person re-identification, aerial-ground imagery, UAV, CCTV, smart glasses, video surveillance, attribute-guided, three-stream network I. I NTRODUCTION Person Re-identification (ReID) is a technique in computer vision that identifies and matches individuals across images or videos captured by multiple, non-overlapping cameras [1]– [5]. This method is advantageous in surveillance systems as it does not depend on high-resolution biometric data, such as facial features, which are often required for more precise identification methods. Person ReID has diverse applications including video surveillance, retail management, search and rescue operations, healthcare services, and public safety initiatives. These applications demonstrate the utility of person ReID in enhancing safety measures and optimizing resource distribution in various environments. The development of advanced airborne platforms and imaging sensors has significantly advanced the field of aerial person ReID [6]. These platforms, in comparison with traditional ground-based systems, offer notable advantages, such as increased scale and mobility, and the ability to perform both covert and overt observations [7], [8]. High-altitude aerial cameras are particularly effective, capable of capturing extensive areas with reduced occlusion and demonstrating versatility (a) Aerial camera. (b) CCTV camera. (c) Wearable camera. Fig. 1. Aerial (a), CCTV (b), and wearable camera (c) perspectives vary in resolution, occlusion, and lighting in the AG-ReID.v2 dataset. in various operational conditions [9]–[11]. The integration of multi-modal sensors, including visual, thermal, and LiDAR technologies, further enhances the effectiveness of aerial ReID, improving target visibility and robustness [11], [12]. Traditionally, research in aerial person ReID has primarily focused on matching within aerial imagery [7], [13], [14]. However, the integration of aerial and ground images for person ReID poses distinct challenges, largely due to differences in viewpoints, poses, and resolutions. This area, while crucial, lacks comprehensive and publicly available datasets suitable for such cross-domain studies. Existing datasets, such as the one by Schumann et al. [15], face limitations in terms of accessibility, scale, and diversity of collection environments. Addressing these challenges, this paper introduces the AG- ReID.v2 dataset, an extension of our previous AG-ReID.v1 dataset [16]. AG-ReID.v2 encompasses a broader range of aerial and ground imagery, providing a diverse, publicly accessible resource for ReID research. This dataset, meticulously compiled, reflects a variety of real-world scenarios, particularly suited for surveillance and monitoring applications. Furthermore, we propose a novel three-stream architecture for aerial-ground person ReID, designed to address the specific challenges in this domain. Each stream within our model" 2401.02637v1,"Stability of Hydrides in Sub-Neptune Exoplanets with Thick Hydrogen-Rich Atmospheres Taehyun Kim 1,* , Xuehui Wei 1 , Stella Chariton 2 , Vitali B. Prakapenka 2 , Young-Jay Ryu 2 , Shize Yang 3 , and Sang-Heon Shim 1,* 1 School of Earth and Space Exploration, Arizona State University, Tempe, AZ 85287, USA.; 2 Center for Advanced Radiation Sources, University of Chicago, Argonne, IL 60439, USA.; 3 Eyring Materials Center, Arizona State University, Tempe, AZ 85287, USA.; * Corresponding authors This manuscript was compiled on January 8, 2024 Many sub-Neptune exoplanets have been believed to be composed of a thick hydrogen-dominated atmosphere and a high-temperature heavier-element-dominant core. From an assumption that there is no chemical reaction between hydrogen and silicates/metals at the atmosphere-interior boundary, the cores of sub-Neptunes have been modeled with molten silicates and metals (magma) in previous studies. In large sub-Neptunes, pressure at the atmosphere-magma boundary can reach tens of gigapascals where hydrogen is a dense liquid. A recent experiment showed that hydrogen can induce the reduction of Fe 2+ in (Mg,Fe)O to Fe 0 metal at the pressure-temperature conditions relevant to the atmosphere-interior boundary. However, it is unclear if Mg, one of the abundant heavy elements in the planetary interiors, remains oxidized or can be reduced by H. Our experiments in the laser-heated diamond-anvil cell found that heating of MgO + Fe to 3500–4900 K (close to or above their melting temperatures) in a H medium leads to the formation of Mg 2 FeH 6 and H 2 O at 8–13 GPa. At 26–29 GPa, the behavior of the system changes, and Mg–H in an H fluid and H 2 O were detected with separate FeH x . The observations indicate the dissociation of the Mg–O bond by H and subsequent production of hydride and water. Therefore, the atmosphere-magma interaction can lead to a fundamentally different mineralogy for sub-Neptune exoplanets compared with rocky planets. The change in the chemical reaction at the higher pressures can also affect the size demographics (i.e., ""radius cliff"") and the atmosphere chemistry of sub-Neptune exoplanets. Hydride | Sub-Neptune exoplanets | Hydrogen | Magma hick hydrogen-rich atmosphere is likely common in early rocky planets and among large low- T density planets. In the early stage of planet formation, the accretion of planetesimals forms a core comprised of Mg-rich silicates/oxides and Fe-rich metal alloys (1). As the core becomes sufficiently large (>0.5–0.75 M (E), Earth mass unit), it can accrete the nebular gas (mostly hydrogen), and therefore, planets can develop hydrogen-rich primary atmospheres (2, 3). Earth and Venus in our solar system and the larger versions of them, such as super-Earth exoplanets (≤1.7–1.8 R(E), Earth radius unit), have sufficient core masses to retain a hydrogen-rich atmosphere at least early in their Significance Statement Many sub-Neptune exoplanets are believed to have thick atmospheres dominated by hydrogen, surrounding the interiors with mainly silicates and oxides, assuming no reaction between them. From high-pressure experiments on molten magnesium oxide in a dense hydrogen liquid, we found that the reaction between hydrogen and the oxide melt results in the formation of hydride and water under the pressure-temperature conditions expected for the atmosphere-interior boundary of sub-Neptunes. At higher pressures, we found enhanced chemical mixing between magnesium and hydrogen. The experiments suggest that sub-Neptune exoplanets likely have a mineralogy different from that of rocky planets, and the chemical reaction between the atmosphere and interior can impact the size of sub-Neptunes and the compositions of their atmospheres. T.K. performed the experiments, analyzed data, and wrote the manuscript. S.-H.S conceptualised and supervised the project, acquired funding, designed and performed experiments, analyzed data, and wrote the manuscript. S.C., Y.-J.R., S.Y., and V.B.P. provided resources for the sample analysis and supervised the experiments. All authors reviewed the manuscript. The authors declare no competing interests. * To whom correspondence should be addressed. E-mail: tkim95@asu.edu and sshim5@asu.edu www.pnas.org/cgi/doi/10.1073/pnas.2309786120 PNAS | January 8, 2024 | vol. XXX | no. XX | 1–13" 2401.02638v1,"PROBABILISTIC DEGENERATE FUBINI POLYNOMIALS ASSOCIATED WITH RANDOM VARIABLES RONGRONG XU 1 ,TAEKYUN KIM 1,2,∗ , DAE SAN KIM 3,∗ ,AND YUANKUI MA 1,∗ 1 2 School of Science, Xi’an Technological University, Xi’an 710021, Shaanxi, China Department of Mathematics, Kwangwoon University, Seoul 01897, Republic of Korea 3 Department of Mathematics, Sogang University, Seoul 121-742, Republic of Korea Abstract. Let Y be a random variable such that the moment generating function of Y exists in a neighborhood of the origin. The aim of this paper is to study probabilistic versions of the degenerate Fubini polynomials and the degenerate Fubini polynomials of order r, namely the probabilisitc degenerate Fubini polynomials associated with Y and the probabilistic degenerate Fubini polynomials of order r associated with Y . We derive some properties, explicit expressions, certain identities and recurrence relations for those polynomials. As special cases of Y , we treat the gamma random variable with parameters α, β > 0, the Poisson random variable with parameter α > 0, and the Bernoulli random variable with probability of success p. 1. Introduction In recent years, degenerate versions, λ-analogues and probabilistic versions of many special polynomials and numbers have been investigated by employing various methods such as generating functions, combinatorial methods, umbral calculus, p-adic analysis, differential equations, probability, special functions, analytic number theory and operator theory (see [11-16, 18-21] and the references therein). Let Y be a random variable satisfying the moment condition (see (17)). The aim of this paper is to study probabilistic versions of the degenerate Fubini polynomials and the degenerate Fubini polynomials of order r, namely the probabilisitc degenerate Fubini polynomials associated with Y and the probabilistic degenerate Fubini polynomials of order r associated with Y . We derive some properties, explicit expressions, certain identities and recurrence relations for those polynomials and numbers. In addition, we consider the special cases that Y is the gamma random variable with parameters α, β > 0, the Poisson random variable with parameter α(> 0), and the Bernoulli random variable with probability of success p. E-mail address: xurongrong0716@163.com; tkkim@kw.ac.kr; dskim@sogang.ac.kr; mayuankui@xatu.edu.cn . 2010 Mathematics Subject Classification. 11B73; 11B83. Key words and phrases. probabilistic degenerate Fubini polynomials; probabilistic degenerate Fubini polynomials of order r. ∗ Corresponding authors. 1" 2401.02642v1,"Signatures of room-temperature superconductivity emerging in two-dimensional domains within the new Bi/Pb-based ceramic cuprate superconductors at ambient pressure S. Dzhumanov 1∗ , D.D. Gulamova 2 , Sh.S. Djumanov 3 1 Institute of Nuclear Physics, Uzbek Academy of Sciences, 100214, Ulugbek, Tashkent, Uzbekistan 2 Institute of Material Science, Uzbekistan Physics-Sun Scientific Production Association, Uzbek Academy of Sciences, Tashkent, 100084, Uzbekistan 3 Tashkent State Technical University, Tashkent 100095, Uzbekistan Abstract We predict the possibility of realizing room-temperature superconductivity in different two-dimensional (2D) domains within the ceramic high-T c cuprate superconductors at ambient pressure and experimentally confirm this prediction of 2D room-temperature superconductivity in the newly derived Bi/Pb-based ceramic cuprate superconductors containing many grain boundaries, interfaces and multiplate blocks. We argue that, in these high-T c materials, besides bulk superconductivity in three-dimensional (3D) domains there is also strongly enhanced 2D superconductivity emerging in the 3D-2D crossover region well above the superconducting transition temperature T c . We study the possibility of the existence of distinct 3D and 2D superconducting phases in high-T c ceramic cuprates, in which the unconventional (tightly-bound polaronic) Cooper pairs behave like bosons and condense below certain critical temperatures into 3D and 2D Bose superfluids in 3D and 2D domains. We show that the superconducting transition temperature in 2D domains is much higher than in 3D domains and can reach up to room temperature. We report signatures of room-temperature superconductivity occurring at different grain boundaries and 3D/2D interfaces and in multiplate blocks within the ceramic superconductors Bi 1.7 Pb 0.3 Sr 2 Ca n−1 Cu n O y (where n = 2 − 30), synthesized by using the new melt technology in a large solar furnace (in Parkent). The samples of these materials synthesized under the influence of concentrated solar energy have the bulk T c values ranging from 100 K to about 140 K and the more higher superconducting transition temperatures, possibly even as high as room temperature in the 3D-2D crossover region. The remnant 2D superconductivity in newly derived Bi/Pb-based ceramic cuprate superconductors is observed at temperatures T ≳ 200 − 300 K well above the bulk T c and the onset of room-temperature superconductivity is evidenced by the observations of a sharp step-like drop in the resistance and a well-detectable partial Meissner effect at around 300 K and ambient pressure. Keywords: High-T c cuprate superconductors, New Bi/Pb based ceramic cuprate superconductors, Grain boundaries and interfaces, Multiplate blocks, Bose-liquid superconductivity, Three- and two-dimensional superconducting phases, Room-temperature superconductivity 1. Introduction Remarkable progress in condensed matter physics is often driven by discoveries of new superconducting materials and superfluid (Fermi or Bose) liquids. In particular, the discovery of La-based high-T c cuprate superconductors [1–3] and then the dramatic increase of the critical temperature T c of the superconducting transition in other discovered Y-, Bi- and Hg-based cuprate superconductors to above 90 K [4], 110 K [5] and 130 [6] ushered in a new era of physics and technology. These important discoveries stimulated efforts to find new materials with even higher superconducting transition temperatures, possibly even close to room temperature. Various experiments showed [3, 7, 8] that the superconductivity is occurred in the bulk three-dimensional (3D) cuprate material rather than in the ∗ Corresponding author. Fax:(8-10-99871) 289 36 65 Email address: dzhumanov@inp.uz (S. Dzhumanov 1 ) Preprint submitted to arXiv CuO 2 plane. Therefore, the above values of T c observed in different high-T c cuprates correspond to the bulk superconducting transition temperatures. Starting from 1993, there has been considerable interest in the increase of T c in some families of cuprate superconductors to a maximum value at different applied pressures [9–11] and the record values of T c ≃ 153 − 164 K reported for Hgbased cuprate superconductors are remained still unchanged. For a long time, despite intense research effors (see Refs.[12– 16]), the increasing of T c up to room temperature in various high-T c cuprates was remained a difficult problem. So far, room-temperature superconductivity was not reported for high- T c cuprate materials even under pressure. Recently, there has been growing interest in the discovery of room-temperature superconductivity in other classes of materials and the new so-called high-T c hydrides have been synthesized at very high pressures [17–19]. However, roomtemperature superconductors discovered under high pressures January 8, 2024" 2401.02645v1,"ISBN 0000000000 © pp. 1-?? Chapter I NFORMATION ENTROPY IN EXCITED STATES IN CONFINED QUANTUM SYSTEMS Sangita Majumdar, Neetik Mukherjee, Amlan K. Roy * Department of Chemical Sciences, Indian Institute of Science Education and Research (IISER) Kolkata, Mohanpur-741246, Nadia, India PACS: 03.65-w, 03.65Ca, 03.65Ta, 03.65.Ge, 03.67-a. Keywords: Rényi entropy, Shannon entropy, Fisher information, Onicescu energy, Complexities, Confined harmonic oscillator, Confined H atom, Confined many-electron atom, Excited state * E-mail address: akroy@iiserkol.ac.in, akroy6k@gmail.com" 2401.02677v1,"P ROGRESSIVE K NOWLEDGE D ISTILLATION OF Stable Diffusion XL USING L AYER L EVEL L OSS T ECHNICAL R EPORT Yatharth Gupta ∗ Segmind yatharthg@segmind.com Harish Prabhala Segmind harish@segmind.com Vishnu V. Jaddipal* Segmind vishnuj@segmind.com Sayak Paul Hugging Face sayak@huggingface.co Patrick Von Platen Hugging Face patrick@huggingface.co A BSTRACT Stable Diffusion XL (SDXL) has become the best open source text-to-image model (T2I) for its versatility and top-notch image quality. Efficiently addressing the computational demands of SDXL models is crucial for wider reach and applicability. In this work, we introduce two scaled-down variants, Segmind Stable Diffusion (SSD-1B) and Segmind-Vega, with 1.3B and 0.74B parameter UNets, respectively, achieved through progressive removal using layer-level losses focusing on reducing the model size while preserving generative quality. We release these models weights at https://hf.co/Segmind. Our methodology involves the elimination of residual networks and transformer blocks from the U-Net structure of SDXL, resulting in significant reductions in parameters, and latency. Our compact models effectively emulate the original SDXL by capitalizing on transferred knowledge, achieving competitive results against larger multi-billion parameter SDXL. Our work underscores the efficacy of knowledge distillation coupled with layer-level losses in reducing model size while preserving the high-quality generative capabilities of SDXL, thus facilitating more accessible deployment in resource-constrained environments. 1 Introduction Stable Diffusion (Rombach et al., 2022) has emerged as highly influential in the realm of text-to-image (T2I) synthesis, playing a pivotal role as an open-source framework. Its remarkable capabilities has spurred its integration as a backbone in various text-guided vision applications. Stable Diffusion, characterized as T2I-specialized latent diffusion models (LDMs), leverages diffusion operations within a semantically compressed space, enhancing computational efficiency. Central to the architecture of Stable Diffusion is a U-Net that employs iterative sampling to progressively denoise a random latent code. This process is further supported by a text encoder and an image decoder, orchestrating the generation of text-aligned images. SDXL (Podell et al., 2023) is the largest variant with a 2.6B Parameter UNet and two text encoders, providing the best quality among open source models. Notably, distillation techniques have been applied to pretrained diffusion models to curtail the number of denoising steps, resulting in identically structured models with reduced sampling requirements. Additionally, methods such as post-training quantization and implementation optimizations have been explored. The exploration of removing architectural elements in large diffusion models has also been investigated for the base U-Net models (Kim et al., 2023). In this context, our work endeavors to apply knowledge distillation methods to the SDXL model (Podell et al., 2023), resulting in the creation of two streamlined variants, namely Segmind Stable Diffusion (SSD-1B) and Segmind-Vega. We use the base model as well as finetuned versions in the distillation process. These models, with 1.3B and 0.74B ∗ Equal Contribution" 2401.02691v1,"Scaffolding fundamentals and recent advances in sustainable scaffolding techniques for cultured meat development AMM Nurul Alam 1 , Chan-Jin Kim 1 , So-Hee Kim 1 , Swati Kumari 1 , Eun-Yeong Lee 1 , Young- Hwa Hwang 2 , Seon-Tea Joo 1,2* 1 Division of Applied Life Science (BK21 Four), Gyeongsang National University, Jinju 52852, Korea 2 Institute of Agriculture & Life Science, Gyeongsang National University, Jinju 52852, Korea Contact information for the Corresponding author Mailing Address: Institute of Agriculture & Life Science, Gyeongsang National University, Jinju 52852, Korea. E-mail stjoo@gnu.ac.kr Short version of title (running head): Scaffolding for Cultured meat Abstract In cultured meat (CM) products the paramount significance lies in the fundamental attributes like texture and sensory of the processed end product. To cater to the tactile and gustatory preferences of real meat, the product needs to be designed to incorporate its texture and sensory attributes. Presently CM products are mainly grounded products like sausage, nugget, frankfurter, burger patty, surimi, and steak with less sophistication and need to mimic real meat to grapple with the traditional meat market. The existence of fibrous microstructure in connective and muscle tissues has attracted considerable interest in the realm of tissue engineering. Scaffolding plays an important role in CM production by aiding cell adhesion, growth, differentiation, and alignment. A wide array of scaffolding technologies has been" 2401.02697v1,"Prepared for submission to JHEP IITH-PH-0002/23, KIAS-P23063 Probing Inert Triplet Model at a multi-TeV muon collider via vector boson fusion with forward muon tagging Priyotosh Bandyopadhyay, a,b Snehashis Parashar, a Chandrima Sen a and Jeonghyeon Song c a Indian Institute of Technology Hyderabad, Kandi, Sangareddy-502284, Telengana, India Korea Institute for Advanced Study, Seoul, 02455, Republic of Korea c Department of Physics, Konkuk University, Seoul 05029, Republic of Korea b E-mail: bpriyo@phy.iith.ac.in, ph20resch11006@iith.ac.in, ph19resch11014@iith.ac.in, jhsong@konkuk.ac.kr Abstract: This study investigates the potential of a multi-TeV Muon Collider (MuC) for probing the Inert Triplet Model (ITM), which introduces a triplet scalar field with hypercharge Y = 0 to the Standard Model. The ITM stands out as a compelling Beyond the Standard Model scenario, featuring a neutral triplet T 0 and charged triplets T ± . Notably, T 0 is posited as a dark matter (DM) candidate, being odd under a Z 2 symmetry. Rigorous evaluations against theoretical, collider, and DM experimental constraints corner the triplet scalar mass to a narrow TeV-scale region, within which three benchmark points are identified, with T ± masses of 1.2 TeV, 1.85 TeV, and 2.3 TeV, for the collider study. The ITM’s unique T T V V four-point vertex, differing from fermionic DM models, facilitates efficient pair production through Vector Boson Fusion (VBF). This characteristic positions the MuC as an ideal platform for exploring the ITM, particularly due to the enhanced VBF cross-sections at high collision energies. To address the challenge of the soft decay products of T ± resulting from the narrow mass gap between T ± and T 0 , we propose using Disappearing Charged Tracks (DCTs) from T ± and Forward muons as key signatures. We provide event counts for these signatures at MuC energies of 6 TeV and 10 TeV, with respective luminosities of 4 ab −1 and 10 ab −1 . Despite the challenge of beam-induced backgrounds contaminating the signal, we demonstrate that our proposed final states enable the MuC to achieve a 5σ discovery for the identified benchmark points, particularly highlighting the effectiveness of the final state with one DCT and one Forward muon." 2401.02705v2,"XUAT-Copilot: Multi-Agent Collaborative System for Automated User Acceptance Testing with Large Language Model Zhitao Wang ∗ , Wei Wang ∗ , Zirao Li, Long Wang, Can Yi, Xinjie Xu, Luyang Cao, Hanjing Su, Shouzhi Chen, Jun Zhou {zhitaowang,dylanwwang,ziraoli,oliverlwang}@tencent.com WeChat Pay, Tencent Shenzhen, China ABSTRACT 1 In past years, we have been dedicated to automating user acceptance testing (UAT) process of WeChat Pay, one of the most influential mobile payment applications in China. A system titled XUAT has been developed for this purpose. However, there is still a humanlabor-intensive stage, i.e., test scripts generation, in the current system. Therefore, in this paper, we concentrate on methods of boosting the automation level of the current system, particularly the stage of test scripts generation. With recent notable successes, large language models (LLMs) demonstrate significant potential in attaining human-like intelligence and there has been a growing research area that employs LLMs as autonomous agents to obtain human-like decision-making capabilities. Inspired by these works, we propose an LLM-powered multi-agent collaborative system, named XUAT-Copilot, for automated UAT. The proposed system mainly consists of three LLM-based agents responsible for action planning, state checking and parameter selecting, respectively, and two additional modules for state sensing and case rewriting. The agents interact with testing device, make human-like decision and generate action command in a collaborative way. The proposed multi-agent system achieves a close effectiveness to human testers in our experimental studies and gains a significant improvement of 𝑃𝑎𝑠𝑠@1 accuracy compared with single-agent architecture. More importantly, the proposed system has launched in the formal testing environment of WeChat Pay mobile app, which saves a considerable amount of manpower in the daily development work. User Acceptance Testing (UAT) is a critical phase in the software development life cycle that involves assessing the functionality, usability, and performance of a software application or system. The main goal of UAT is to evaluate whether the developed software meets the predefined requirements from the end-user’s perspective. It validates that the software is fit for purpose and ready for deployment in a real-world environment. However, traditional UAT methodologies, which rely heavily on manual testing, are timeconsuming, resource-intensive, and susceptible to human errors. It is thus non-trivial to explore the way of automating UAT to improve efficiency, accuracy, and overall software quality. WeChat Pay 1 , as one of the most influential mobile payment applications in China, has become an integral part of daily life for billions of users. Ensuring the seamless functionality, usability, and compatibility of the application is of paramount importance for maintaining customer satisfaction and trust. Therefore, in past years, we have been dedicated to the development of an effective, comprehensive and low-cost UAT system, named XUAT. The workflow of the XUAT system is illustrated in Fig.1. At the initial stage, business requirements are represented as use case flow charts, which are intended to ensure the completeness, accuracy and conformity of the requirements. Given the flow charts, the system enumerates all possible flows and transfers each flow as one specific test case in semi-structured natural language. At the following stage, these test cases are distributed to a number of human testers, who are responsible for implementing test scripts consisting of a series of Android Debug Bridge (ADB) commands to simulate end-users’ actions expected in the test cases on the App (in this paper, we only focus on testing on Android system). In this process, human testers often make trial and errors on test devices to guarantee the script can be executed in expectation of the test case accurately. The final scripts submitted by testers (also called ""persistent test scripts"") will be automatically ran in routine by the system in the future and reports are recorded in the system. Based on the test reports, a group of acceptance engineers are asked to validate the results of test cases against the expectations of the requirements, and document any defects, issues or improvements. Apparently, current version of XUAT is still a semi-automated system, which is particularly labor-intensive at the stage of test script implementation. Understanding contents of test cases and making trial and error are inevitable in this human-engaged process. This motivates us to seek for more automated and efficiency approaches of implementing test scripts. KEYWORDS Automated UAT, AI Agents, Large Language Model ACM Reference Format: Zhitao Wang ∗ , Wei Wang ∗ , Zirao Li, Long Wang, Can Yi, Xinjie Xu, Luyang Cao, Hanjing Su, Shouzhi Chen, Jun Zhou. 2023. XUAT-Copilot: Multi-Agent Collaborative System for Automated User Acceptance Testing with Large Language Model. In Proceedings of 2023 (Conference acronym ’XX). ACM, New York, NY, USA, 10 pages. https://doi.org/XXXXXXX.XXXXXXX Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference acronym ’XX, 978-1-4503-XXXX-X/18/06 © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX INTRODUCTION * These authors contributed equally to this work 1 https://pay.weixin.qq.com/index.php/public/wechatpay_en" 2401.02709v1,"German Text Embedding Clustering Benchmark Silvan Wehrli 1 1 Bert Arnrich 2 Christopher Irrgang 1 Centre for Artificial Intelligence in Public Health Research (ZKI-PH) Robert Koch Institute, Berlin, Germany {WehrliS,IrrgangC}@rki.de 2 Digital Health - Connected Healthcare Hasso Plattner Institute, University of Potsdam, Germany Bert.Arnrich@hpi.de Abstract This work introduces a benchmark assessing the performance of clustering German text embeddings in different domains. This benchmark is driven by the increasing use of clustering neural text embeddings in tasks that require the grouping of texts (such as topic modeling) and the need for German resources in existing benchmarks. We provide an initial analysis for a range of pre-trained mono- and multilingual models evaluated on the outcome of different clustering algorithms. Results include strong performing mono- and multilingual models. Reducing the dimensions of embeddings can further improve clustering. Additionally, we conduct experiments with continued pretraining for German BERT models to estimate the benefits of this additional training. Our experiments suggest that significant performance improvements are possible for short text. All code and datasets are publicly available. 1 Introduction Clustering is increasingly used in tasks requiring to group semantically similar text pieces. This includes, for instance, data selection (Aharoni and Goldberg, 2020), data exploration (Voigt et al., 2022), and neural topic modeling (Zhao et al., 2021). One approach for this kind of topic modeling is BERTopic (Grootendorst, 2022), which, in principle, uses generic clustering algorithms for text embeddings to find latent topics in text corpora. This is in stark contrast to more traditional topic modeling techniques using Latent Dirichlet Allocation (Blei et al., 2003) or Non-Negative Matrix Factorization (Févotte and Idier, 2011) and representing text as simple bag-of-words. The shift to embedding-based approaches is driven by the continuous development of neural language models, successfully used in natural language understanding (NLU) tasks such as semantic textual similarity (Reimers and Gurevych, 2019; Gao et al., 2021) or retrieval and reranking (Huang et al., 2020; Yates et al., 2021). The availability of plug-and-play frameworks for the computation of vector representation only fosters this trend. One such framework is Sentence Transformers (Reimers and Gurevych, 2019), which is used by BERTopic. It provides an extensive collection of pre-trained transformer models and techniques to fine-tune models for similarity-focused language tasks. Benchmarks help to understand the usefulness of these easily available language models, allowing to compare existing and newly developed models for language tasks of interest. The Massive Text Embedding Benchmark (MTEB, Muennighoff et al., 2023) provides such a benchmark for a wide range of embedding-based tasks (e.g., classification, clustering, or reranking) and datasets from different domains (e.g., online reviews, scientific publications, or social media). MTEB includes a wider range of tasks and focuses on more recent language models than other benchmarks (such as SentEval (Conneau and Kiela, 2018)). MTEB, offering an easy-to-use API, invites the evaluation of models and submissions to a publicly accessible leaderboard. 1 However, MTEB only considers the English language for the evaluation of clustering. The inclusion of non-English data is important, as the performance of multilingual models may not equal their monolingual counterparts (Rust et al., 2021), and as a means to evaluate the potentially strong crosslingual transfer capability of multilingual models 1 rd https://huggingface.co./spaces/mteb/leaderboa" 2401.02729v1,"Contrib. Astron. Obs. Skalnaté Pleso 53/4, 175 – 190 (2023) https://doi.org/10.31577/caosp.2023.53.4.175 Timing of accreting neutron stars with future X-ray instruments: towards new constraints on dense matter equation of state V. Karas 1 , K. Klimovičová 2 , D. Lančová 2 , M. Štolc 1 , J. Svoboda 1 , G. Török 2 , M. Matuszková 2 , E. Šrámková 2 , R. Šprňa 2 and M. Urbanec 2 1 Astronomical Institute of the Czech Academy of Sciences Bočnı́ II 1401, CZ-14100, Prague, Czech Republic (E-mail: vladimir.karas@asu.cas.cz) 2 Research Centre for Computational Physics and Data Processing, Institute of Physics, Silesian University in Opava, Bezručovo nám. 13, CZ-746-01 Opava, Czech Republic Received: July 20, 2023; Accepted: September 14, 2023 Abstract. The Enhanced X-ray Timing and Polarimetry (eXTP) mission is a space mission to be launched in the late 2020s that is currently in development led by China in international collaboration with European partners. Here we provide a progress report on the Czech contribution to the eXTP science. We report on our simulation results performed in Opava (Institute of Physics of the Silesian University in Opava) and Prague (Astronomical Institute of the Czech Academy of Sciences), where the advanced timing capabilities of the satellite have been assessed for bright X-ray binaries that contain an accreting neutron star (NS) and exhibit the quasi-periodic oscillations. Measurements of X-ray variability originating in oscillations of fluid in the innermost parts of the accretion region determined by general relativity, such as the radial or Lense-Thirring precession, can serve for sensitive tests enabling us to distinguish between the signatures of different viable dense matter equations of state. We have developed formulae describing non-geodesic oscillations of accreted fluid and their simplified practical forms that allow for an expeditious application of the universal relations determining the NS properties. These relations, along with our software tools for studying the propagation of light in strong gravity and neutron star models, can be used for precise modeling of the X-ray variability while focusing on properties of the intended Large Area Detector (LAD). We update the status of our program and set up an electronic repository that will provide simulation results and gradual updates as the mission specifications progress toward their final formulation. Key words: stars: black holes – stars: neutron – X-rays: binaries – polarimetry" 2401.02753v1,"Sound generation mechanisms in a collapsible tube Marco Laudato ∗1,2 , Elias Zea 2 , Elias Sundström 1 , Susann Boij 2 , and Mihai Mihaescu 1 1 FLOW Research Center, Department of Engineering Mechanics, KTH Royal Institute of Technology, Stockholm, SE-10044, Sweden. 2 The Marcus Wallenberg Laboratory for Sound and Vibration Research, Department of Engineering Mechanics, KTH Royal Institute of Technology, Stockholm, SE-10044, Sweden January 8, 2024 Abstract Collapsible tubes can be employed to study the sound generation mechanism in the human respiratory system. The goals of this work are (a) to determine the airflow characteristics connected to three different collapse states of a physiological tube and (b) to find a relation between the sound power radiated by the tube and its collapse state. The methodology is based on the implementation of computational fluid dynamics simulation on experimentally validated geometries. The flow is characterized by a radical change of behavior before and after the contact of the lumen. The maximum of the sound power radiated corresponds to the post-buckling configuration. The idea of an acoustic tube law is proposed. The presented results are relevant to the study of self-excited oscillations and wheezing sounds in the lungs. 1 Introduction In daily medical practice, auscultation is among the most cost-effective and timely diagnostic tools for diseases of the respiratory and cardiovascular system [29]. Different pathologies are characterized by specific sounds (sometimes called adventitious sounds) that can guide the physicians toward identifying and ∗ laudato@kth.se. The following article has been submitted to The Journal of Acoustical Society of America. After it is published, it will be found at https://pubs.aip.org/asa/jasa. 1" 2401.02755v1,"“My GitHub Sponsors profile is live!” Investigating the Impact of Twitter/X Mentions on GitHub Sponsors Youmei Fan Tao Xiao Hideaki Hata Nara Institute of Science and Technology, Japan fan.youmei.fs2@is.naist.jp Nara Institute of Science and Technology, Japan tao.xiao.ts2@is.naist.jp Shinshu University Japan hata@shinshu-u.ac.jp Christoph Treude Kenichi Matsumoto University of Melbourne Australia christoph.treude@unimelb.edu.au Nara Institute of Science and Technology, Japan matumoto@is.naist.jp ABSTRACT GitHub Sponsors was launched in 2019, enabling donations to opensource software developers to provide financial support, as per GitHub’s slogan: “Invest in the projects you depend on”. However, a 2022 study on GitHub Sponsors found that only two-fifths of developers who were seeking sponsorship received a donation. The study found that, other than internal actions (such as offering perks to sponsors), developers had advertised their GitHub Sponsors profiles on social media, such as Twitter (also known as X). Therefore, in this work, we investigate the impact of tweets that contain links to GitHub Sponsors profiles on sponsorship, as well as their reception on Twitter/X. We further characterize these tweets to understand their context and find that (1) such tweets have the impact of increasing the number of sponsors acquired, (2) compared to other donation platforms such as Open Collective and Patreon, GitHub Sponsors has significantly fewer interactions but is more visible on Twitter/X, and (3) developers tend to contribute more to open-source software during the week of posting such tweets. Our findings are the first step toward investigating the impact of social media on obtaining funding to sustain open-source software. CCS CONCEPTS • Social and professional topics → Sustainability; • Software and its engineering → Open source model. KEYWORDS Open-source Software, Sponsorship, Social Media ACM Reference Format: Youmei Fan, Tao Xiao, Hideaki Hata, Christoph Treude, and Kenichi Matsumoto. 2024. “My GitHub Sponsors profile is live!” Investigating the Impact of Twitter/X Mentions on GitHub Sponsors. In 2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE ’24), April 14–20, 2024, Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE ’24, April 14–20, 2024, Lisbon, Portugal © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0217-4/24/04. . . $15.00 https://doi.org/10.1145/3597503.3639127 Lisbon, Portugal. ACM, New York, NY, USA, 12 pages. https://doi.org/10. 1145/3597503.3639127 1 INTRODUCTION Open-source software (OSS) is ubiquitous, but sustaining it is a challenge [28]. Maintaining an OSS project requires not only intrinsic motivation (e.g., joy of participation) but also extrinsic motivation (e.g., financial incentives) [49]. The last few years have seen the emergence of many platforms that allow open-source developers to receive donations for their work, such as PayPal [30], Open Collective [11], Patreon [29], and GitHub Sponsors [37]. Several platforms support sponsoring OSS projects in cryptocurrencies, with the rise in popularity of cryptocurrencies today, e.g., Gitcoin Grants [16] and Giveth [20]. However, as Overney et al.’s paper title “How to not get rich: an empirical study of donations in open source” [28] suggests, simply having a platform for donations is not enough. In a 2022 study on GitHub Sponsors, Shimada et al. [35] found that out of approximately 9,000 developers who had activated their GitHub Sponsors profile, less than 40% had received a donation. If simply creating a sponsorship profile is not enough, what else can open-source software developers do to attract donations? Following the long line of work on studying the intersection between social media and software development [15, 38, 39], in this paper, we investigate the impact of tweeting about a GitHub Sponsors profile on sponsorship. To make it easy for its users to reach a large audience, GitHub provides tweet templates that users can use to advertise a new GitHub Sponsors profile (“My GitHub Sponsors profile is live! You can sponsor me to support my open source work ”) or to broadcast that they made a donation (“ I’m sponsoring [username] because...”). The impact of tweets on open-source software development has been investigated before. Fang et al. [15] found that tweets have a significant effect on obtaining new stars and new contributors for an open-source project and that the formation of an active Twitter/X community plays an important role in attracting new contributors. The role of tweets has also been studied in the context of bug fixing [24] and trend awareness [36]. To the best of our knowledge, the role of Twitter/X in obtaining funding for open-source development has not yet been studied. We first characterize the state of the practice by quantitatively and qualitatively analyzing more than 10,000 tweets linking to GitHub Sponsors profiles to understand the context of such tweets." 2401.02766v1,"Physics analysis for the HL-LHC: concepts and pipelines in practice with the Analysis Grand Challenge Alexander Held 1,∗ , Elliott Kauffman 2 , Oksana Shadura 3 , and Andrew Wightman 3 1 University of Wisconsin–Madison, United States Princeton University, United States 3 University of Nebraska–Lincoln, United States 2 Abstract. Realistic environments for prototyping, studying and improving analysis workflows are a crucial element on the way towards user-friendly physics analysis at HL-LHC scale. The IRIS-HEP Analysis Grand Challenge (AGC) provides such an environment. It defines a scalable and modular analysis task that captures relevant workflow aspects, ranging from large-scale data processing and handling of systematic uncertainties to statistical inference and analysis preservation. By being based on publicly available Open Data, the AGC provides a point of contact for the broader community. Multiple different implementations of the analysis task that make use of various pipelines and software stacks already exist. This contribution presents an updated AGC analysis task. It features a machine learning component and expanded analysis complexity, including the handling of an extended and more realistic set of systematic uncertainties. These changes both align the AGC further with analysis needs at the HL-LHC and allow for probing an increased set of functionality. Another focus is the showcase of a reference AGC implementation, which is heavily based on the HEP Python ecosystem and uses modern analysis facilities. The integration of various data delivery strategies is described, resulting in multiple analysis pipelines that are compared to each other. 1 Introduction IRIS-HEP [1] is the Institute for Research and Innovation in Software for High Energy Physics. It is comprised of physicists, computer scientists, and engineers from institutes across the United States who perform research and development to address HL-LHC computing challenges by developing suitable software cyberinfrastructure. Work in the institute proceeds in various topical areas, including data reconstruction and triggering in the innovative algorithms area, the analysis systems area aiming to reduce time-to-insight and maximize physics potential, as well as the data organization, management, and access systems area. A variety of new ideas for implementing physics analyses in the future are being pursued in IRIS-HEP and the broader community, alongside new tools and techniques which are being developed. The IRIS-HEP Analysis Grand Challenge (AGC) project [2] started in this context as an integration exercise: combine the ongoing developments to demonstrate an ∗ e-mail: alexander.held@cern.ch" 2401.02783v1,"Astronomy & Astrophysics manuscript no. aa48001-23_arxiv January 8, 2024 ©ESO 2024 Absence of radio-bright dominance in a near-infrared selected sample of red quasars ⋆ S. Vejlgaard 1, 2 , J. P. U. Fynbo 1, 2 , K. E. Heintz 1, 2 , J. K. Krogager 3 , P. Møller 4, 2 , S. J. Geier 5, 6 , L. Christensen 1, 2 , and G. Ma 1, 2 1 Cosmic Dawn Center (DAWN), e-mail: simone.vejlgaard@nbi.ku.dk 2 Niels Bohr Institute, University of Copenhagen, Jagtvej 155, 2200 Copenhagen N, Denmark 3 Centre de Recherche Astrophysique de Lyon, Univ. Claude Bernard Lyon 1, 9 Av. Charles Andre, 69230 St Genis Laval, France 4 European Southern Observatory, Karl-Schwarzschild-Straße 2, D-85748 Garching bei München, Germany and Instituto de Astrofísica de Canarias, Vía Láctea, s/n, 38205, La Laguna, Tenerife, Spain 5 Gran Telescopio Canarias (GRANTECAN), Cuesta de San José s/n, E-38712, Breña Baja, La Palma, Spain Received –; accepted – ABSTRACT Context. The dichotomy between red and blue quasars is still an open question. It is debated whether red quasars are simply blue quasars that are observed at certain inclination angles or if they provide insight into a transitional phase in the evolution of quasars. Aims. We investigate the relation between quasar colors and radio-detected fraction because radio observations of quasars provide a powerful tool in distinguishing between quasar models. Methods. We present the eHAQ+GAIA23 sample, which contains quasars from the High A(V) Quasar (HAQ) Survey, the Extended High A(V) Quasar (eHAQ) Survey, and the Gaia quasar survey. All quasars in this sample have been found using a near-infrared color selection of target candidates that have otherwise been missed by the Sloan Digital Sky Survey (SDSS). We implemented a redshift-dependent color cut in g ∗ − i ∗ to select red quasars in the sample and divided them into redshift bins, while using a nearestneighbors algorithm to control for luminosity and redshift differences between our red quasar sample and a selected blue sample from the SDSS. Within each bin, we cross-matched the quasars to the Faint Images of the Radio Sky at Twenty centimeters (FIRST) survey and determined the radio-detection fraction. +0.037 Results. For redshifts 0.8 < z ≤ 1.5, the red and blue quasars have a radio-detection fraction of 0.153 −0.032 and 0.132 +0.034 −0.030 , respectively. +0.019 +0.019 The red and blue quasars with redshifts 1.5 < z ≤ 2.4 have radio-detection fractions of 0.059 −0.016 and 0.060 −0.016 , respectively, and +0.024 the red and blue quasars with redshifts z > 2.4 have radio-detection fractions of 0.029 +0.017 and 0.058 , respectively. For the WISE −0.012 −0.019 +0.020 color-selected red quasars, we find a radio-detection fraction of 0.160 +0.038 −0.034 for redshifts 0.8 < z ≤1.5, 0.063 −0.017 for redshifts 1.5 < z ≤ 2.4, and 0.051 +0.030 −0.022 for redshifts z > 2.4. In other words, we find similar radio-detection fractions for red and blue quasars within < 1σ uncertainty, independent of redshift. This disagrees with what has been found in the literature for red quasars in SDSS. It should be noted that the fraction of broad absorption line (BAL) quasars in red SDSS quasars is about five times lower. BAL quasars have been observed to be more frequently radio quiet than other quasars, therefore the difference in BAL fractions could explain the difference in radio-detection fraction. Conclusions. The dusty torus of a quasar is transparent to radio emission. When we do not observe a difference between red and blue quasars, it leads us to argue that orientation is the main cause of quasar redness. Moreover, the observed higher proportion of BAL quasars in our dataset relative to the SDSS sample, along with the higher rate of radio detections, indicates an association of the redness of quasars and the inherent BAL fraction within the overall quasar population. This correlation suggests that the redness of quasars is intertwined with the inherent occurrence of BAL quasars within the entire population of quasars. In other words, the question why some quasars appear red or exhibit BAL characteristics might not be isolated; it could be directly related to the overall prevalence of BAL quasars in the quasar population. This finding highlights the need to explore the underlying factors contributing to both the redness and the frequency of BAL quasars, as they appear to be interconnected phenomena. Key words. quasars: general – quasars: supermassive black holes – galaxies: active – radio-continuum: galaxies 1. Introduction Even though the study of quasi-stellar objects (QSOs, or quasars) began more than half a century ago (Schmidt 1963; Greenstein & Schmidt 1964; Sandage 1965), it remains a field in development. With extremely high bolometric luminosities (up to ∼ 10 47 erg s −1 ; see, e.g., Onken et al. 2022), quasars are not ⋆ Table A1 is only available in electronic form at the CDS via anonymous ftp to cdsarc.u-strasbg.fr (130.79.128.5) or via http://cdsweb.ustrasbg.fr/cgi-bin/qcat?J/A+A/ only the most powerful class of active galactic nuclei (AGN), but also some of the most luminous and distant objects known in the observable Universe (Wu et al. 2015; Wang et al. 2021). Quasars are powered by the rapid accretion of matter onto a supermassive black hole (SMBH) with a possible mass ranging up to 10 10 M ⊙ (see also Rees 1984). According to the unified model for AGN and quasars presented, for instance, by Antonucci (1993) and Urry & Padovani (1995), a dust torus absorbs and reemits photons from the accretion disk with a dependence on the observed viewing angle. In addition to the broad- and narrow-line regions Article number, page 1 of 10" 2401.02811v1,"An Analysis of Avalanche Consensus ∗ Ignacio Amores-Sesar 1,2 , Christian Cachin 1,3 , and Philipp Schneider 1,4 1 University of Bern 2 ignacio.amores@unibe.ch 3 christian.cachin@unibe.ch 4 philipp.schneider2@unibe.ch Abstract A family of leaderless, decentralized consensus protocols, called Snow consensus was introduced in a recent whitepaper by Yin et al. These protocols address limitations of existing consensus methods, such as those using proof-of-work or quorums, by utilizing randomization and maintaining some level of resilience against Byzantine participants. Crucially, Snow consensus underpins the Avalanche blockchain, which provides a popular cryptocurrency and a platform for running smart contracts. Snow consensus algorithms are built on a natural, randomized routine, whereby participants continuously sample subsets of others and adopt an observed majority value until consensus is achieved. Additionally, Snow consensus defines conditions based on participants’ local views and security parameters. These conditions indicate when a party can confidently finalize its local value, knowing it will be adopted by honest participants. Although Snow consensus algorithms can be formulated concisely, there is a complex interaction between randomization, adversarial influence, and security parameters, which requires a formal analysis of their security and liveness. Snow protocols form the foundation for Avalanche-type blockchains, and this work aims to increase our understanding of such protocols by providing insights into their liveness and safety characteristics. First, we analyze these Snow protocols in terms of latency and security. Second, we expose a design issue where the trade-off between these two is unfavorable. Third, we propose a modification of the original protocol where this trade-off is much more favorable. 1 Introduction Establishing consensus is one of the most fundamental tasks in distributed computing, for instance to implement atomic broadcast, to synchronize processes, or to elect leaders. Distributed blockchains and in particular cryptocurrencies rely on consensus to ensure proper operation, and therefore trust in these systems, which has put increased focus on new kinds of consensus algorithms. In the consensus problem we consider 𝑛 parties of which some are potentially faulty. Every party has some input value, which we often refer to as opinion in this article. We say that a protocol that coordinates communication and local computations of all parties solves consensus when everyone agrees on a single opinion, which was also the input of at least one party. The consensus problem becomes challenging in the presence of Byzantine faults, i.e., parties that can deviate from the protocol. In particular, reaching consensus is impossible deterministically in the asynchronous setting with even one fault [12] and in the synchronous setting with one third or more Byzantine faults [11], ∗ Ignacio Amores-Sesar has been supported by the Swiss National Science Foundation (SNSF) under grant agreement Nr. 200021_188443 (Advanced Consensus Protocols). Philipp Schneider has been supported by a grant from Avalanche, Inc. to the University of Bern. 1" 2401.02823v1,"DocGraphLM: Documental Graph Language Model for Information Extraction Dongsheng Wang Zhiqiang Ma Armineh Nourbakhsh JPMorgan AI Research London, UK dongsheng.wang@jpmchase.com JPMorgan AI Research New York, New York, USA zhiqiang.ma@jpmchase.com JPMorgan AI Research New York, New York, USA armineh.nourbakhsh@jpmchase.com Kang Gu Sameena Shah Dartmouth College Hanover, New Hampshire, USA Kang.Gu.GR@dartmouth.edu JPMorgan AI Research New York, New York, USA sameena.shah@jpmchase.com ABSTRACT 1 Advances in Visually Rich Document Understanding (VrDU) have enabled information extraction and question answering over documents with complex layouts. Two tropes of architectures have emerged—transformer-based models inspired by LLMs, and Graph Neural Networks. In this paper, we introduce DocGraphLM, a novel framework that combines pre-trained language models with graph semantics. To achieve this, we propose 1) a joint encoder architecture to represent documents, and 2) a novel link prediction approach to reconstruct document graphs. DocGraphLM predicts both directions and distances between nodes using a convergent joint loss function that prioritizes neighborhood restoration and downweighs distant node detection. Our experiments on three SotA datasets show consistent improvement on IE and QA tasks with the adoption of graph features. Moreover, we report that adopting the graph features accelerates convergence in the learning process druing training, despite being solely constructed through link prediction. Information extraction from visually-rich documents (VrDs), such as business forms, receipts, and invoices in the format of PDF or image has gained recent traction. Tasks such as field identification and extraction and entity linkage are crucial to digitizing VrDs and building information retrieval systems on the data. Tasks that require complex reasoning such as Visual Question Answering over documents require modeling the spatial, visual, and semantic signals in VrDs. Therefore, VrD Understanding is concerned with modeling the multi-modal content in image documents. Previous research has explored the use of encoding text, layout, and image features in a layout language model or multi-modal setting to improve downstream tasks. For example, LayoutLM and its variants [7, 23, 24] use image and layout information to enhance the representation of text, thereby improving performance on various tasks. However, models using Transformer mechanisms pose a challenge to representing spatially distant semantics, such as table cells far from their headers or contents across line breaks. In light of these limitations, a few studies [25, 27] have proposed using graph neural networks (GNNs) to model relationships and structures between text tokens or segments in documents. Although these models alone still underperform layout language models, they demonstrate the potential of incorporating additional structured information to improve document representation. Motivated by this, we introduce a novel framework called Doc- GraphLM that integrates document graph semantics and the semantics derived from pre-trained language models to improve document representation. As depicted in Figure 1, the input to our model is embeddings of tokens, positions, and bounding boxes, which form the foundation of the document representation. To reconstruct the document graph, we propose a novel link prediction approach that predicts directions and distances between nodes by using a joint loss function, which balances the classification and regression loss. Additionally, the loss encourages close neighborhood restoration while downgrading detections on farther nodes. This is achieved by normalizing the distance through logarithmic transformation, treating nodes separated by a specific order-of-magnitude distance as semantically equidistant. Our experiments on multiple datasets including FUNSD, CORD, and DocVQA, show the superiority of the model in a consistent manner. Furthermore, the incorporation of graph features is found CCS CONCEPTS • Information systems → Document structure; Language models; Information extraction. KEYWORDS language model, graph neural network, information extraction, visual document understanding ACM Reference Format: Dongsheng Wang, Zhiqiang Ma, Armineh Nourbakhsh, Kang Gu, and Sameena Shah. 2023. DocGraphLM: Documental Graph Language Model for Information Extraction. In Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR ’23), July 23–27, 2023, Taipei, Taiwan. ACM, New York, NY, USA, 5 pages. https://doi.org/10.1145/3539618.3591975 Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. SIGIR ’23, July 23–27, 2023, Taipei, Taiwan © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-1-4503-9408-6/23/07. . . $15.00 https://doi.org/10.1145/3539618.3591975 INTRODUCTION" 2401.02833v1,"Integrating Flow Theory and Adaptive Robot Roles: A Conceptual Model of Dynamic Robot Role Adaptation for the Enhanced Flow Experience in Long-term Multi-person Human-Robot Interactions Huili Chen* Sharifa Alghowinem Cynthia Breazeal Hae Won Park MIT Media Lab hchen25@media.mit.edu MIT Media Lab sharifah@media.mit.edu MIT Media Lab cynthiab@media.mit.edu ABSTRACT In this paper, we introduce a novel conceptual model for a robot’s behavioral adaptation in its long-term interaction with humans, integrating dynamic robot role adaptation with principles of �ow experience from psychology. This conceptualization introduces a hierarchical interaction objective grounded in the �ow experience, serving as the overarching adaptation goal for the robot. This objective intertwines both cognitive and a�ective sub-objectives and incorporates individual and group-level human factors. The dynamic role adaptation approach is a cornerstone of our model, highlighting the robot’s ability to �uidly adapt its support roles—from leader to follower—with the aim of maintaining equilibrium between activity challenge and user skill, thereby fostering the user’s optimal �ow experiences. Moreover, this work delves into a comprehensive exploration of the limitations and potential applications of our proposed conceptualization. Our model places a particular emphasis on the multi-person HRI paradigm, a dimension of HRI that is both under-explored and challenging. In doing so, we aspire to extend the applicability and relevance of our conceptualization within the HRI �eld, contributing to the future development of adaptive social robots capable of sustaining long-term interactions with humans. CCS CONCEPTS • Human-centered computing ! Collaborative interaction; Interaction paradigms; Human computer interaction (HCI); HCI theory, concepts and models; KEYWORDS theory in human-robot interaction; �ow theory; robot adaptation; social robot; small group ACM Reference Format: Huili Chen*, Sharifa Alghowinem, Cynthia Breazeal, and Hae Won Park. 2024. Integrating Flow Theory and Adaptive Robot Roles: A Conceptual Model of Dynamic Robot Role Adaptation for the Enhanced Flow Experience in Long-term Multi-person Human-Robot Interactions. In Proceedings of the *Corresponding Author. Acknowledgement: This work was supported by the Inclusive AI Literacy and Learning Gift Grant from DP World and the IITP Grant funded by the Korean government (MSIT).. This work is licensed under a Creative Commons Attribution International 4.0 License. HRI ’24, March 11–14, 2024, Boulder, CO, USA © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0322-5/24/03. https://doi.org/10.1145/3610977.3634945 MIT Media Lab haewon@media.mit.edu 2024 ACM/IEEE International Conference on Human-Robot Interaction (HRI ’24), March 11–14, 2024, Boulder, CO, USA. ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/3610977.3634945 1 INTRODUCTION Adaptivity is critical for social robots to interact successfully with humans, a notion underscored in previous Human-Robot Interaction (HRI) literature [47, 82]. It is well-established that adaptivity is integral for a robot or agent to be perceived as a team partner when collaborating with humans [42, 44]. Adaptive social robots typically exhibit capabilities such as understanding and expressing emotions, engaging in high-level dialogue, adjusting according to user responses, establishing social relationships, responding to varied social situations, and embodying di�erent social characteristics and roles [26]. However, developing adaptive social robots for real-world settings continues to be a formidable challenge in HRI, as identi�ed by Tapus et al. [82]. As argued by [11], achieving the right balance of autonomy, proactiveness, and user-driven interaction is essential for appropriate human-centered robot adaptation. Excessive autonomy and pro-activeness might lead to robots behaving ""sel�shly,"" seeming uncaring and detached from their human users. This equilibrium is particularly challenging due to its variability across di�erent parameters such as individuals, HRI patterns, and cultural contexts. This challenge, compounded by the growing urgency to develop robot adaptivity, becomes even more pronounced as the context shifts from single-person HRIs (SHRIs) to multi-person HRIs (MHRIs). In MHRIs, presetting a �xed optimal robot behavior policy becomes exponentially more di�cult, considering that both groupand individual-related factors continuously shape group dynamics. Successful MHRIs, therefore, place a greater reliance on a robot’s adaptability. With the rising prevalence of social robots in everyday life, robots are not just interacting with individuals but also engaging with multiple people, further emphasizing the need for research on robot adaptability in long-term interactions with human groups. This includes exploring how to design, develop, and evaluate long-term adaptive interactions between robots and humans in the wild. In this work, a novel and context-independent conceptualization for designing long-term adaptive multimodal interactions between a social robot and a small human group is introduced. Drawing insights from foundational work within the HRI �eld and in psychology, this conceptualization introduces a hierarchical interaction objective grounded in the �ow experience in psychology [18, 19], serving as the overarching adaptation goal for the robot. This objective intertwines both cognitive and a�ective sub-objectives and incorporates individual- and human-group-level factors." 2401.02835v1,"Article Comparison of Two Detector Magnetic Systems for the Future Circular Hadron-Hadron Collider Vyacheslav Klyukhin 1,2, *, Austin Ball 2 , Christophe Paul Berriaud 3 , Benoit Curé 2 , Alexey Dudarev 2 , Andrea Gaddi 2 , Hubert Gerwig 2 , Alain Hervé 4 , Matthias Mentink 2 , Werner Riegler 2 , Udo Wagner 2 and Herman Ten Kate 2 Skobeltsyn Institute of Nuclear Physics, Lomonosov Moscow State University, RU-119992 Moscow, Russia European Organization for Nuclear Research (CERN), CH-1211 Geneva 23, Switzerland; austin.ball@cern.ch (A.B.); benoit.cure@cern.ch (B.C.); alexey.dudarev@cern.ch (A.D.); andrea.gaddi@cern.ch (A.G.); hubert.gerwig@cern.ch (H.G.); matthias.mentink@cern.ch (M.M.); werner.riegler@cern.ch (W.R.); udo.wagner@cern.ch (U.W.); herman.tenkate@cern.ch (H.T.K.) 3 CEA Irfu, 91191 Saclay, France; christophe.berriaud@cea.fr 4 Department of Physics, University of Wisconsin, Madison, WI 53706, USA; alain.herve@cern.ch * Correspondence: vyacheslav.klyukhin@cern.ch 1 2 Featured Application: This work describes a detailed study of two possible options for the magnetic system of a Future Circular hadron-hadron Collider detector. Citation: Klyukhin, V.; Ball, A.; Berriaud, C.P.; Curé, B.; Dudarev, A.; Gaddi, A.; Gerwig, H.; Hervé, A.; Mentink, M.; Riegler, W.; et al. Comparison of Two Detector Magnetic Systems for the Future Abstract: The conceptual design study of a Future Circular hadron-hadron Collider (FCC-hh) to be constructed at CERN with a center-of-mass energy of the order of 100 TeV requires superconducting magnetic systems with a central magnetic flux density of an order of 4 T for the experimental detectors. The developed concept of the FCC-hh detector involves the use of an iron-free magnetic system consisting of three superconducting solenoids. A superconducting magnet with a minimal steel yoke is proposed as an alternative to the baseline iron-free design. In this study, both magnetic system options for the FCC-hh detector are modeled with the same electrical parameters using Cobham’s program TOSCA. All the main characteristics of both designs are compared and discussed. Keywords: superconducting solenoid; future circular collider; electromagnetic modelling; magnetic flux density; magnetic field double integrals Circular Hadron-Hadron Collider. Appl. Sci. 2023, 13, 10387. https:// doi.org/10.3390/app131810387 Academic Editor(s): Mario Lucido Received: 4 August 2023 Revised: 8 September 2023 Accepted: 15 September 2023 Published: 17 September 2023 Copyright: © 2023 by the authors. Submitted for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/license s/by/4.0/). 1. Introduction The conceptual design report for the Future Circular Collider (FCC) [1] with a centerof-mass energy of the order of 100 TeV, assumed to be constructed at CERN in a new tunnel of 80–100 km circumference, was presented in 2019 [2]. As part of this study, the concept of an FCC-hh detector for hadron-hadron physics was developed [3]. Apart from the particle sub-detectors, the FCC-hh detector will comprise an iron-free magnetic system consisting of three superconducting solenoids: the main coil with a central magnetic flux density of 4 T and two auxiliary forward solenoid coils with a central magnetic flux density of 3.2 T each [4]. Following the alternative study of the magnetic system for the FCC-hh detector based on the superconducting solenoid with a minimal steel yoke [5], the possibility of using the steel yoke in the same baseline layout of the coils and the particle sub-detectors is considered, and the main parameters of both magnetic systems are compared here. For these comparisons, both the baseline FCC-hh detector magnetic system [4], and the magnetic system with the minimal steel yoke, are calculated with the program TOSCA from Cobham CTS Limited [6]. Appl. Sci. 2023, 13, x. https://doi.org/10.3390/xxxxx www.mdpi.com/journal/applsci" 2401.02861v1,"Reversing the Irreversible: A Survey on Inverse Biometrics Marta Gomez-Barrero a,∗ , Javier Galbally b a da/sec - Biometrics and Internet Security Research Group, Hochschule Darmstadt, Germany b European Commission - DG-Joint Research Centre, E.3, Italy Abstract With the widespread use of biometric recognition, several issues related to the privacy and security provided by this technology have been recently raised and analysed. As a result, the early common belief among the biometrics community of templates irreversibility has been proven wrong. It is now an accepted fact that it is possible to reconstruct from an unprotected template a synthetic sample that matches the bona fide one. This reverse engineering process, commonly referred to as inverse biometrics, constitutes a severe threat for biometric systems from two different angles: on the one hand, sensitive personal data (i.e., biometric data) can be derived from compromised unprotected templates; on the other hand, other powerful attacks can be launched building upon these reconstructed samples. Given its important implications, biometric stakeholders have produced over the last fifteen years numerous works analysing the different aspects related to inverse biometrics: development of reconstruction algorithms for different characteristics; proposal of methodologies to assess the vulnerabilities of biometric systems to the aforementioned algorithms; development of countermeasures to reduce the possible effects of attacks. The present article is an effort to condense all this information in one comprehensive review of: the problem itself, the evaluation of the problem, and the mitigation of the problem. The present article is an effort to condense all this information in one comprehensive review of: the problem itself, the evaluation of the problem, and the mitigation of the problem. Keywords: Biometrics, Inverse Biometrics, Privacy, Security, Survey 1. Introduction “Nothing in this world can be said to be irreversible, except death and taxes.” - Benjamin Franklin 1 . Since the first works on biometric verification, increasingly accurate and time efficient biometric recognition systems have been proposed over the years. These works have allowed a wider deployment of biometric authentication techniques, including border control [1], smartphone authentication [2], mobile payments [3], or law enforcement and forensics [4]. With this generalised use of biometric systems, new concerns have arisen regarding their potential weaknesses. Among these vulnerabilities, one stands out due to the serious risks that it poses: the possibility to use a compromised biometric template to recover the raw bona fide sample from which it was generated. A classical biometric system acquires a probe sample of the biometric characteristic of an individual, extracts salient features from the sample (i.e., biometric template), and compares the extracted features against the previously enrolled reference ∗ Corresponding author Email addresses: marta.gomez-barrero@h-da.de (Marta Gomez-Barrero), javier.galbally@ec.europa.eu (Javier Galbally) 1 Paraphrase of a quote usually attributed to Benjamin Franklin who, in 1789, wrote a letter stating: “Our new Constitution is now established, and has an appearance that promises permanency; but in this world nothing can be said to be certain, except death and taxes” Preprint submitted to Computers & Security template in order to verify a claimed identity or to identify an individual. For security and privacy reasons, biometric systems typically do not store the raw biometric data, which may disclose sensitive information about the subjects (e.g., race, gender, diseases, etc.) Rather, they store the extracted template containing the most discriminative information about the individual, relevant for recognition purposes. Such a protection approach involves one major assumption: biometric templates do not contain enough information in order to be reversed engineered and to recover from them the bona fide sample. The key question is: Are biometric templates really irreversible? Until not long ago, the answer to that question was: yes, biometric templates are irreversible. It was a common belief that the features extracted from biometric samples did not reveal enough information about the underlying biometric characteristic and its owner in order to be exploited with malicious purposes [5]. However, in 2001, Hill put forward the problem of storing biometric templates without the right protection measures [6]. This was also the first work to consider the possibility of reconstructing the bona fide samples given only the information stored in the template. Shortly afterwards, in 2003, Bromba formally studied the issue of template reversibility [7]. In particular, he explored whether “biometric raw data can be or not reconstructed from template data”. In other words, he challenged the established knowledge by analysing whether it was possible to reverse the irreversible. In that article, he reached three main conclusions: January 8, 2024" 2401.02879v1,"Efficient Parameter Optimisation for Quantum Kernel Alignment: A Sub-sampling Approach in Variational Training M. Emre Sahin, 1 Benjamin C. B. Symons, 1 Pushpak Pati, 2 Fayyaz Minhas, 3 Declan Millar, 4 Maria Gabrani, 2 Jan Lukas Robertus, 5, 6 and Stefano Mensa 1, ∗ 1 The Hartree Centre, STFC, Sci-Tech Daresbury, Warrington, WA4 4AD, United Kingdom 2 IBM Research – Zurich, Säumerstrasse 4, Rüschlikon, CH–8803, Switzerland 3 Tissue Image Analytics Centre, Warwick Cancer Research Centre, Department of Computer Science, University of Warwick, Coventry, CV4 7AL, United Kingdom 4 IBM Research Europe - UK, Hursley, Winchester, SO21 2JN, United Kingdom 5 Royal Brompton and Harefield Hosptials, Department of Histopathology, Guy’s and St Thomas’ NHS Foundation Trust, Sydney Street, London SW3 6NP United Kingdom 6 National Heart and Lung Institute, Imperial College London, Guy Scadding Building, Dovehouse St, London SW3 6LY United Kingdom (Dated: January 8, 2024) Quantum machine learning with quantum kernels for classification problems is a growing area of research. Recently, quantum kernel alignment techniques that parameterise the kernel have been developed, allowing the kernel to be trained and therefore aligned with a specific dataset. While quantum kernel alignment is a promising technique, it has been hampered by considerable training costs because the full kernel matrix must be constructed at every training iteration. Addressing this challenge, we introduce a novel method that seeks to balance efficiency and performance. We present a sub-sampling training approach that uses a subset of the kernel matrix at each training step, thereby reducing the overall computational cost of the training. In this work, we apply the sub-sampling method to synthetic datasets and a real-world breast cancer dataset and demonstrate considerable reductions in the number of circuits required to train the quantum kernel while maintaining classification accuracy. I. INTRODUCTION Kernel methods are a fundamental concept in Machine Learning (ML), with a rich history that spans several decades, revolutionising the field by enabling the effective handling of complex, nonlinear relationships in data [1]. The introduction of the “kernel trick"" in the 1960s laid the foundation [2], leading to the development of Support Vector Machines (SVMs) in the 1990s [3], which popularized the concept. Over time, a diverse range of kernel functions have emerged, broadening their utility across many domains. Another milestone was the introduction of the concept of kernel alignment [4]. This method adjusts a kernel function in relation to specific data, thereby limiting the generalisation error [5, 6]. While facing challenges related to scalability [7], kernel methods continue to be relevant, coexisting with deep learning in solving complex problems. The field of ML stands to benefit from quantum algorithms, offering the potential for improved scalability and accuracy in solving complex computational tasks [8–11]. A particularly promising approach in this ∗ stefano.mensa@stfc.ac.uk; JLR and SM share joint last author- ship and contributed equally to this work. field is the utilization of quantum fidelity kernels, a quantum-enhanced version of kernel methods [8, 12–15]. These kernels quantify the overlap between quantum states and leverage the high dimensionality of quantum systems to learn and capture complex patterns in data. A few relevant practical applications of quantum machine learning with kernel methods can be seen in Refs. [16–21]. Despite the promise of quantum kernel methods, there is scepticism about their practical application due to challenges associated with scalability. These challenges stem from the convergence of quantum kernel values which depends on factors such as data embedding expressibility, the number of qubits, global measurements, entanglement, and noise, which often demand increased measurements for effective training [22, 23]. In response to these challenges, several techniques have been introduced [15, 24, 25], which, along with bandwidth adjustments [26, 27], aim to enhance generalization in quantum kernels, particularly at higher qubit counts. Quantum kernel alignment (QKA) adapts classical kernel alignment to utilize quantum kernels, enhancing the model’s precision by aligning more effectively with core data patterns, as outlined in studies by [20, 28, 29]. Despite this advancement, the scaling in terms of the number of circuits required to align quantum kernels with QKA presents a considerable challenge. In the" 2401.02884v1,"Article pending publication in IET Signal Processing, 2024. MsDC-DEQ-Net: Deep Equilibrium Model (DEQ) with Multi-scale Dilated Convolution for Image Compressive Sensing (CS) Youhao Yu, Richard M. Dansereau 1 Department of Systems and Computer Engineering, Carleton University, Ottawa, Canada youhaoyu@cmail.carleton.ca rdanse@sce.carleton.ca Abstract - Compressive sensing (CS) is a technique that enables the recovery of sparse signals using fewer measurements than traditional sampling methods. To address the computational challenges of CS reconstruction, our objective is to develop an interpretable and concise neural network model for reconstructing natural images using CS. We achieve this by mapping one step of the iterative shrinkage thresholding algorithm (ISTA) to a deep network block, representing one iteration of ISTA. To enhance learning ability and incorporate structural diversity, we integrate aggregated residual transformations (ResNeXt) and squeeze-and-excitation (SE) mechanisms into the ISTA block. This block serves as a deep equilibrium layer, connected to a semi-tensor product network (STP-Net) for convenient sampling and providing an initial reconstruction. The resulting model, called MsDC-DEQ-Net, exhibits competitive performance compared to state-of-the-art network-based methods. It significantly reduces storage requirements compared to deep unrolling methods, using only one iteration block instead of multiple iterations. Unlike deep unrolling models, MsDC-DEQ-Net can be iteratively used, gradually improving reconstruction accuracy while considering computation trade-offs. Additionally, the model benefits from multi-scale dilated convolutions, further enhancing performance. Index Terms—Compressive sensing, ISTA, deep equilibrium model, image reconstruction, dilated convolution 1. Introduction Compressive sensing is a signal processing technique used to efficiently acquire signals that exhibit sparsity or compressibility in a sparse domain and this information can then be reconstructed back to the original domain with high probability [1], [2]. In compressive sensing, a signal is measured through a small number of linear projections obtained by multiplying the signal with a sensing matrix, typically a random matrix. For images, compressive sensing allows fewer measurements to be acquired than the number of pixels in an image, making it particularly advantageous as it can significantly reduce storage requirements. Reconstruction of the image is usually obtained using algorithms that leverage the sparsity of the signal, such as sparse optimization or convex optimization techniques, but these techniques are often computationally expensive and slow to converge. Compressive sensing finds applications in various fields, including magnetic resonance imaging (MRI) [3], radar signal sampling [4], cryptosystems [5], snapshot imaging [6] and video sensing [7], [8]. It proves especially useful when dealing with large amounts of data, as it can lead to significant reductions in storage and processing requirements. A multitude of optimization-based CS reconstruction methods have been developed. One such method is Basis Pursuit (BP), an algorithm that tackles the underdetermined linear system by finding the sparsest solution [9]. It assumes signal sparsity in a specific basis and solves a convex optimization problem to determine the sparsest representation. Another iterative algorithm, Iterative Hard Thresholding (IHT), updates the signal estimate by applying thresholding at each iteration [10]. The algorithm computes a gradient descent step and enforces sparsity through thresholding, where only the k largest coefficients (k being the desired sparsity level) are retained, while the rest are set to zero. Compressive Sampling Matching Pursuit (CoSaMP), another iterative algorithm, iteratively refines the signal estimate by selecting the support that best aligns 1 Corresponding author: Richard M. Dansereau 1" 2401.02891v1,"Polarisation of radio-frequency magnetic fields in magnetic induction measurements with an atomic magnetometer L. M. Rushton, 1 L. M. Ellis, 1 J. D. Zipfel, 1 P. Bevington, 1, ∗ and W. Chalupczak 1 1 National Physical Laboratory, Hampton Road, Teddington, TW11 0LW, United Kingdom We explore properties of the radio-frequency atomic magnetometer, specifically its sensitivity to the polarisation of an oscillating magnetic field. This aspect can be particularly relevant to configurations where the sensor monitors fields created by more than one source. The discussion, illustrated by theoretical and experimental studies, is done in the context of the signals produced by electrically conductive and magnetically permeable plates in magnetic induction tomography measurements. We show that different components of the secondary magnetic fields create the object response depending on the properties of the material, with the polarisation of the rf field varying across the object’s surface. We argue that the ability of the sensor to simultaneously detect different field components enables the optimisation of measurement strategies for different object compositions. I. INTRODUCTION Since their first realization, tunable radio-frequency (rf) atomic magnetometers attracted significant attention due to their wide range of potential applications [1– 7]. A list of proof-of-principle demonstrations include nuclear quadrupole resonance [8], nuclear magnetic resonance [9], magnetic induction tomography (MIT) [10– 14] and, more recently, low rf communications [15, 16]. Most of these are active measurements, where the initial excitation - referred to as the “primary rf field” in the context of MIT - produces an object response, called the “secondary rf field”, that is measured by the rf sensor. Historically, pick-up coils have been the preferred sensor for rf field detection. One of the advantages of coil-based systems is their simplicity, however, their sensitivity is proportional to operating frequency and area (Faraday’s law), which limits the performance at low frequencies. The advent of chip-scale atomic devices paved the way for atomic magnetometers to become an instrument for commercial applications [17]. The detection of an rf magnetic field with alkali-metal atomic vapour begins with the optical preparation of the atomic ensemble, which is done via the polarisation of the atomic spins along the direction of a static bias magnetic field B 0 , Fig. 1(c). This is followed by an interaction with the rf field that is to be measured. Radiofrequency magnetic fields create atomic coherences in the polarised atoms, resulting in the precession of the collective atomic spin components around the bias field. The measurement of the rf field is concluded by an optical readout, i.e., the spin precession is detected through the polarisation rotation of a linearly polarised probe beam via the paramagnetic Faraday effect. All three processes - the preparation, interaction, and readout - are usually performed simultaneously. It is important to point out that the sensor measures rf fields within the plane that is ∗ patrick.bevington@npl.co.uk orthogonal to the bias field axis, which is the insensitive axis of the sensor. In terms of performance, apart from sensitivities at the fT/Hz 1/2 level [1, 18], atomic magnetometers offer a range of properties that could prove advantageous in various measurement scenarios. By monitoring the amplitude and phase of the rf-driven atomic coherence, the magnetometer provides a 2D vector rf field measurement [13, 19]. Adjustments to the strength of the bias field tunes the coherence precession frequency and hence facilitates tunabilty of the operational frequency [1]. The relatively narrow bandwidth of the sensor, defined by the atomic coherence lifetime, enables filtering out of environmental noise. However, this lifetime typically limits the response rate of the sensor. Feeding back the signal produced by spontaneous fluctuations of the atomic coherences results in a self-oscillating system, often referred to as a spin maser [20–25]. The operation of a magnetometer in the spin maser mode addresses the issue of the sensor’s narrow bandwidth. Additionally, the ability to run the measurement as a two-photon process enables operation at low frequencies while maintaining a large static magnetic field, which is therefore less susceptible to perturbations from ambient magnetic field noise [26, 27]. Here, we explore the detection of rf field components with various polarisations by the rf atomic magnetometer. The studies are performed in the context of MIT measurements. The detection of the polarisation of an rf magnetic field relies on the projection of the measured field onto the polarisation state relevant to that particular sensor. We begin with considerations regarding the generation and detection of different polarisation states of rf fields. The importance of this discussion is illustrated by numerical modelling via COMSOL simulations and experimental measurements involving different polarisations of the detected rf field. These studies describe the signals measured in scenarios where there are several different inseparable field sources, i.e., the primary field and the secondary field that is generated through eddy currents and magnetisation, as observed in materials such" 2401.02899v1,"1 Model predictive altitude and velocity control in ergodic potential field directed multi-UAV search Luka Lanča, Karlo Jakac and Stefan Ivić* Abstract—This research addresses the challenge of executing multi-UAV survey missions over diverse terrains characterized by varying elevations. The approach integrates advanced twodimensional ergodic search technique with model predictive control of UAV altitude and velocity. Optimization of altitude and velocity is performed along anticipated UAV ground routes, considering multiple objectives and constraints. This yields a flight regimen tailored to the terrain, as well as the motion and sensing characteristics of the UAVs. The proposed UAV motion control strategy is assessed through simulations of realistic search missions and actual terrain models. Results demonstrate the successful integration of model predictive altitude and velocity control with a two-dimensional potential field-guided ergodic search. Adjusting UAV altitudes to near-ideal levels facilitates the utilization of sensing ranges, thereby enhancing the effectiveness of the search. Furthermore, the control algorithm is capable of real-time computation, encouraging its practical application in real-world scenarios. Index Terms—Multi-UAV, ergodic search, velocity and altitude control, terrain following I. I NTRODUCTION The main objective of Search and Rescue (SAR) operations is to locate lost, missing, or injured individuals as quickly as possible, to minimize their suffering and reduce the risk of environmental effects, injuries, and other hazards. These operations often occur in remote or inaccessible areas, such as wilderness, urban ruins, or the ocean, which makes them particularly challenging. Autonomous UAVs can offer numerous benefits in SAR operations, as they can efficiently and quickly survey a large area at a relatively low cost, which is particularly important in situations where time is of the essence. While conducting area surveys, keeping the UAV within a designated altitude range is crucial to achieve good ratio between area coverage and image detail. This becomes especially challenging over uneven terrain. The primary objective during the search is speed, often implying the use of the highest possible velocity. Maximizing velocity while ensuring a collision free path, adhering to desired altitude goals and respecting the UAV’s technical constraints and capabilities poses a significant challenge. Employing multiple UAVs can further expedite the search process. However, real-time control of multiple UAVs requires high computational efficiency, which adds additional complexity to the problem considering the need for altitude and velocity control while simultaneously avoiding collisions and restricted zones. To tackle the outlined challenges, we employed the Heat Equation Driven Area Coverage (HEDAC) algorithm, designed L. Lanča, K. Jakac and S. Ivić are with Faculty of Engineering, University of Rijeka, Rijeka, Croatia. *Corresponding author, e-mail: stefan.ivic@riteh.hr for two-dimensional area search supporting the use of multiple UAVs. It was coupled with Model Predictive Control (MPC) optimization, performing velocity and altitude control, which enabled flight within a three-dimensional domain. UAV collision avoidance in regard to the boundary and other UAVs is managed within a two-dimensional domain, automatically preventing flyovers. Area coverage is applied utilizing a sensor with pyramidal-shaped Field Of View (FOV) that simulates an orthophoto camera. This sensor is integrated with a sensing function that mirrors the accuracy of the employed detection model. Terrain is modeled using open access Digital Elevation Models (DEM) which have a resolution of 30 meters throughout most areas. A minimum UAV altitude requirement of 30 meters is assigned, accounting for potential terrain model inaccuracies, added height from trees and vegetation, human-made structures like sheds or electricity transmission lines, along with an additional safety clearance. The proposed method is validated using three test cases of varying terrain complexity, showcasing different search scenarios, on which we performed survey simulations and evaluated UAVs’ performance and overall search success. II. L ITERATURE OVERVIEW Several research papers have contributed to the advancement of UAVs and their use in numerous applications. In the context of SAR, they can work in independently or conjunction with a team of ground searches as described in [12]. In this case, camera-equipped UAVs are used to find clues and guide the search team towards the missing persons. UAVs with pre-programmed custom missions in [29] are utilized for a mountain avalanche SAR scenario. They incorporate sensors that continuously update the current mission based on environmental readings. The authors in [23] describe 2D path planning methods that utilize straight paths and 90-degree turns to effectively cover the probability distribution which is employed in Wilderness Search And Rescue (WiSAR) application. Swarm-based or multi-agent approaches are frequently employed to address coverage problems, exemplified by the work in [4], which introduces a swarm-based coverage method utilizing groups of cooperating agents guided by a leader. Another example is provided by [3] which simulates the usage of UAV swarms in aiding SAR missions during natural disasters such as earthquakes or tsunamis. It also incorporates considerations such as battery threshold which, when reached, forces the UAV to break from search formation and continue navigating towards the charging station. In a related study, the authors in [30] explore multi-agent solutions for coverage of" 2401.02909v1,"Introducing Bode: A Fine-Tuned Large Language Model for Portuguese Prompt-Based Task Gabriel Lino Garcia 1 , Pedro Henrique Paiola 1 , Luis Henrique Morelli 1 , Giovani Candido 1 , Arnaldo Cândido Júnior 2 , Danilo Samuel Jodas 1 , Luis C. S. Afonso 1 , Ivan Rizzo Guilherme 3 , Bruno Elias Penteado 3 , João Paulo Papa 1 1 School of Sciences, São Paulo State University, Bauru, Brazil 2 Institute of Natural Sciences and Technology, São Paulo State University, Rio Claro, Brazil 3 Institute of Biosciences, Humanities and Exact Sciences, São Paulo State University, São José do Rio Preto, Brazil {gabriel.lino, pedro.paiola, luis.morelli, giovani.candido, arnaldo.candido, ivan.guilherme, bruno.penteado, joao.papa}@unesp.br, danilo.jodas@gmail.com Abstract Large Language Models (LLMs) are increasingly bringing advances to Natural Language Processing. However, low-resource languages, those lacking extensive prominence in datasets for various NLP tasks, or where existing datasets are not as substantial, such as Portuguese, already obtain several benefits from LLMs, but not to the same extent. LLMs trained on multilingual datasets normally struggle to respond to prompts in Portuguese satisfactorily, presenting, for example, code switching in their responses. This work proposes a fine-tuned LLaMA 2-based model for Portuguese prompts named Bode in two versions: 7B and 13B. We evaluate the performance of this model in classification tasks using the zeroshot approach with in-context learning, and compare it with other LLMs. Our main contribution is to bring an LLM with satisfactory results in the Portuguese language, as well as to provide a model that is free for research or commercial purposes. 1 Introduction Large Language Models (LLMs) have reshaped the landscape of how computers comprehend and generate text. These robust networks, trained on massive volumes of textual data, have become central partakers in Natural Language Processing (NLP) applications. Models such as GPT-3, developed by OpenAI (Brown et al., 2020), BERT, developed by Google (Devlin et al., 2019), and LLaMA, developed by Meta (Touvron et al., 2023a), have demonstrated remarkable achievements in NLP tasks ranging from machine translation to text generation. Language models have evolved to enhance the NLP capacities and cope with challenging aspects focused on high performance with fewer parameters and task-switching to particular applications based on better fine-tuning procedures. Recent architectures such as LLaMA 2 (Touvron et al., 2023b), Mistral 7B (Jiang et al., 2023), and Falcon 7B (Almazrouei et al., 2023) have supported increasing efficiency and accuracy while reducing the model’s complexity and memory requirements for the training process. In addition, openly available LLMs have been highly demanded to drive research toward better generative architectures. As the world has witnessed unprecedented progress in the capabilities of NLP models, particularly in English, the considerable computational costs associated with their development and training remain a significant challenge. Recent research, exemplified by the work of Brown et al. (2020) on GPT-3 and the comprehensive analysis conducted by Devlin et al. (2019) on BERT, has shed insights on the massive scale of datasets and computing power required to design such models. This challenge has posed a significant obstacle to developing a more comprehensive range of high-quality models for less-spoken languages, such as Portuguese. While multilingual models such as mBERT, proposed by Devlin et al. (2019), have expanded the scope of NLP applications, addressing the need for specific models for individual languages, such as Portuguese, is essential and required for particular applications. Despite their versatility, multilingual models may not capture the complex nuances and idiosyncrasies of a certain language. Portuguese is spoken by over 260 million people worldwide, making it a significant part of our global community. In this context, we adopt a feasible and efficient approach to develop a model for NLP tasks in Portuguese, known as Bode, a promis-" 2401.02919v1,"Optimal strategy for trail running with nutrition and fatigue factors Łukasz Płociniczak ∗ , Bogna Jaszczak ∗,† , Abstract This paper presents an extension of Keller’s classical model to address the dynamics of longdistance trail running, a sport characterized by varying terrains, changing elevations, and the critical influence of in-race nutrition uptake. The optimization of the generalized Keller’s model is achieved through rigorous application of optimal control theory, specifically the Pontryagin Maximum Principle. This theoretical framework allows us to derive optimal control strategies that enhance the runner’s performance, taking into account the constraints imposed by the changing terrain, nutritional dynamics, and the evolving fatigue factor. To validate the practical applicability of the model, simulations are performed using realworld data obtained from various mountain races. The scenarios cover various trail conditions and elevation profiles. The performance of the model is systematically evaluated against these scenarios, demonstrating its ability to capture the complexities inherent in long-distance trail running and providing valuable insight into optimal race strategies. The error in the total racetime prediction is of the order of several percent, which may give the runner a reliable tool for choosing an optimal strategy before the actual race. Keywords: Keller’s model, optimal control, trail running, data analysis AMS Classification: 49N05, 37N35 1 Introduction Competitive running, as a dynamic and complex sport, has attracted significant attention from both athletes and researchers seeking to understand and optimize performance. Keller’s model [17], originally developed to describe the dynamics of competitive running, provides a valuable foundation for studying optimal strategies in race scenarios. In this paper, we extend Keller’s classical model to encompass the challenges posed by long-distance races conducted on off-road terrain, further incorporating the crucial element of nutritional consumption during the race and the fatigue factor. Long-distance races, which often take place on uneven and challenging off-road terrains, introduce additional complexities to the dynamics of competitive running. Athletes must adapt their strategies to navigate varied surfaces, inclines, and environmental conditions, prompting the need for a comprehensive modeling approach that captures these intricacies. Furthermore, nutritional considerations play a crucial role in athlete performance during extended races [9]. Strategic intake of nutrition can affect energy levels, endurance, and overall race outcome. Incorporating nutritional aspects into the model allows for a more realistic representation of the dynamic interaction between the runner, the terrain, and the external environment [12]. ∗ † Faculty of Pure and Applied Mathematics, Wrocław University of Science and Technology, Poland Corresponding author: bogna.jaszczak@pwr.edu.pl 1" 2401.02924v2,"Prepared for submission to JHEP Mixing “Magnetic” and “Electric” Ehlers–Harrison transformations: The Electromagnetic Swirling Spacetime and Novel Type I Backgrounds José Barrientos, a Adolfo Cisterna, a,b Ivan Kolář, b Keanu Müller, c Marcelo Oyarzo, c and Konstantinos Pallikaris d a Sede Esmeralda, Universidad de Tarapacá, Avenida Luis Emilio Recabarren 2477, Iquique, Chile Institute of Theoretical Physics, Faculty of Mathematics and Physics, Charles University, V Holešovičkách 2, 180 00 Prague 8, Czech Republic c Departamento de Fı́sica, Universidad de Concepción, Casilla, 160-C, Concepción, Chile d Laboratory of Theoretical Physics, Institute of Physics, University of Tartu, W. Ostwaldi 1, 50411 Tartu, Estonia b E-mail: jbarrientos@academicos.uta.cl, adolfo.cisterna@mff.cuni.cz, ivan.kolar@matfyz.cuni.cz, keanumuller2016@udec.cl, moyarzo2016@udec.cl, konstantinos.pallikaris@ut.ee Abstract: In this paper, we obtain a complete list of stationary and axisymmetric spacetimes, generated from a Minkowski spacetime using the Ernst technique. We do so by operating on the associated seed potentials with a composition of Ehlers and Harrison transformations. In particular, assigning an additional “electric” or “magnetic” tag to the transformations, we investigate the new spacetimes obtained either via a composition of magnetic Ehlers and Harrison transformations (first part) or via a magnetic-electric combination (second part). In the first part, the resulting type D spacetime, dubbed electromagnetic swirling universe, features key properties, separately found in swirling and (Bonnor–)Melvin spacetimes, the latter recovered in appropriate limits. A detailed analysis of the geometry is included, and subtle issues are addressed. A detailed proof that the spacetime belongs to the Kundt family, is included, and a notable relation to the planar-Reissner-Nordström-NUT black hole is also meticulously worked out. This relation is further exploited to reverse-engineer the form of the solution in the presence of a nontrivial cosmological constant. A Schwarzschild black hole embedded into the new background is also discussed. In the second part, we present four novel stationary and axisymmetric asymptotically nonflat type I spacetimes, which are naively expected to be extensions of the Melvin or swirling solution including a NUT parameter or electromagnetic charges. We actually find that they are, under conditions, free of curvature and topological singularities, with the physical meaning of the electric transformation parameters in these backgrounds requiring further investigation." 2401.02938v1,"Fast and Optimal Weight Update for Pruned Large Language Models Vladimı́r Boža 1 Abstract 2023). Reducing the size of weights can potentially speed up LLM inference not by reducing computation but by reducing needed memory transfer. However, this approach is currently not very popular with LLMs. The main issue is that after pruning, the network needs to be fine-tuned (Blalock et al., 2020; Liu et al., 2018), which is not feasible with LLMs due to extensive compute and memory footprint. Pruning large language models (LLMs) is a challenging task due to their enormous size. The primary difficulty is fine-tuning the model after pruning, which is needed to recover the lost performance caused by dropping weights. Recent approaches have either ignored fine-tuning entirely, focusing on efficient pruning criteria, or attempted layer-wise weight updates, preserving the behavior of each layer. However, even layerwise weight updates can be costly for LLMs, and previous works have resorted to various approximations. A promising option is to do layer-wise pruning, where one splits the pruning problem into layer-wise subproblems. In each layer, one aims to select a pruning mask and update weights in such a way that reconstruction error is minimized (given the original weight and calibration input). Adaprune (Hubara et al., 2021) updates weights directly via gradient descent (using Adam optimizer). However, it needs many iterations to achieve convergence. Optimal brain compression (OBC) (Frantar & Alistarh, 2022) removes weights one by one. In each step, it calculates the optimal weight to remove and also the optimal update. OBC applies many rank-1 updates to the matrix inverse to avoid calculating costly matrix inversions. However, this approach is very time-consuming for pruning LLMs. In our paper, we propose a fast and optimal weight update algorithm for pruned layers based on the Alternating Direction Method of Multipliers (ADMM). Coupled with a simple iterative pruning mask selection, our algorithm achieves state-of-the-art pruning performance across a wide range of LLMs. Code is available at https://github.com/ fmfi-compbio/admm-pruning. SparseGPT (Frantar & Alistarh, 2023) used various approximations on top OBC approach to make this problem feasible at the cost of reconstruction quality. 1. Introduction Wanda (Sun et al., 2023) showed that instead of selecting weights with the smallest magnitude, one should prune weight with the smallest product of weight magnitude and corresponding input activation norm. This selection approach without the weight update is competitive with SparseGPT on lower sparsities (up to 60%). Large language models (LLMs) (Brown et al., 2020; Zhang et al., 2022; Touvron et al., 2023a;b) have shown strong performance on various tasks. However, they are still quite difficult to deploy due to their large size and, thus, extensive memory requirements. There has been a successful effort in LLM quantization (Dettmers et al., 2022; Dettmers & Zettlemoyer, 2023; Ahmadian et al., 2023; Xiao et al., 2023), which compresses LLMs by storing weights using a very small number of bits. In this paper, we introduce an efficient layer-wise update algorithm based on Alternating Direction Method of Multipliers (ADMM) (Boyd et al., 2011). Our algorithm sidesteps all of the problems of previous solutions. We only need one matrix inversion and very few simple iterations to achieve optimal weight update for a given pruning mask. One can also compress models by pruning the network and dropping irrelevant weights (LeCun et al., 1989; Han et al., 2015; Zhu & Gupta, 2018). Pruning can be really helpful for LLMs since during inference the main bottleneck is memory bandwidth for loading weights to processing unit (Xia et al., Furthermore, we extend our algorithm with iterative pruning (Zhu & Gupta, 2018), where in each step, we prune more and more weights. This simple extension allows us to obtain state-of-the-art pruning results at a very low additional cost. 1 Faculty of Mathematics, Physics and Informatics, Comenius University in Bratislava, Mlynská dolina, Bratislava, Slovakia. Correspondence to: Vladimı́r Boža . 1" 2401.02941v2,"Published in Transactions on Machine Learning Research (September/2023) Unsupervised Federated Domain Adaptation for Segmentation of MRI Images Navapat Nananukul nananuku@usc.edu Department of Computer Science University of Southern California, Los Angeles, 90089, CA, USA Hamid Soltanian-Zadeh hsoltan1@hfhs.org Medical Image Analysis Laboratory, Departments of Radiology and Research Administration, Henry Ford Health System, Detroit, MI, 48202, USA Mohammad Rostami rostamim@usc.edu Department of Computer Science University of Southern California, Los Angeles, 90089, CA, USA Reviewed on OpenReview: https: // openreview. net/ forum? id= Abstract Automatic semantic segmentation of magnetic resonance imaging (MRI) images using deep neural networks greatly assists in evaluating and planning treatments for various clinical applications. However, training these models is conditioned on the availability of abundant annotated data to implement the end-to-end supervised learning procedure. Even if we annotate enough data, MRI images display considerable variability due to factors such as differences in patients, MRI scanners, and imaging protocols. This variability necessitates retraining neural networks for each specific application domain, which, in turn, requires manual annotation by expert radiologists for all new domains. To relax the need for persistent data annotation, we develop a method for unsupervised federated domain adaptation using multiple annotated source domains. Our approach enables the transfer of knowledge from several annotated source domains to adapt a model for effective use in an unannotated target domain. Initially, we ensure that the target domain data shares similar representations with each source domain in a latent embedding space, modeled as the output of a deep encoder, by minimizing the pair-wise distances of the distributions for the target domain and the source domains. We then employ an ensemble approach to leverage the knowledge obtained from all domains. We provide theoretical analysis and perform experiments on the MICCAI 2016 multi-site dataset to demonstrate our method is effective. 1 Introduction Semantic segmentation of MRI images can help to detect anatomical structures or regions of interest in these images to simplify the interpretation of these images. High-quality segmented images are extremely useful in applications such as disease detection and monitoring Hatamizadeh et al. (2021); Karayegen & Aksahin (2021), surgical Guidance Jolesz et al. (2001); Wei et al. (2022), treatment response assessment Kickingereder et al. (2019), and AI-aided diagnosis Arsalan et al. (2019). UNet-based convolutional neural networks (CNNs) have shown to be effective for automatic semantic segmentation of MRI images Pravitasari et al. (2020); Maji et al. (2022), but their adoption in clinical settings has been quite limited. A major reason for this limitation is that training deep neural networks requires large annotated datasets. Annotating MRI data reliably requires the expertise of trained radiologists and physicians which makes it a challenging process. Moreover, using crowdsourcing annotation platforms would be inapplicable because medical data is normally 1" 2401.02952v1,"Optimizing Dataflow Systems for Scalable Interactive Visualization JUNRAN YANG, University of Washington, USA HYEKANG KEVIN JOO, Carnegie Mellon University, USA SAI YERRAMREDDY, University of Maryland, USA DOMINIK MORITZ, Carnegie Mellon University, USA LEILANI BATTLE, University of Washington, USA Supporting the interactive exploration of large datasets is a popular and challenging use case for data management systems. Traditionally, the interface and the back-end system are built and optimized separately, and interface design and system optimization require different skill sets that are difficult for one person to master. To enable analysts to focus on visualization design, we contribute VegaPlus, a system that automatically optimizes interactive dashboards to support large datasets. To achieve this, VegaPlus leverages two core ideas. First, we introduce an optimizer that can reason about execution plans in Vega, a back-end DBMS, or a mix of both environments. The optimizer also considers how user interactions may alter execution plan performance, and can partially or fully rewrite the plans when needed. Through a series of benchmark experiments on seven different dashboard designs, our results show that VegaPlus provides superior performance and versatility compared to standard dashboard optimization techniques. CCS Concepts: • Information systems → Data management systems; • Human-centered computing → Visualization systems and tools; Interactive systems and tools. Additional Key Words and Phrases: data analytics, scalable visualization ACM Reference Format: Junran Yang, Hyekang Kevin Joo, Sai Yerramreddy, Dominik Moritz, and Leilani Battle. 2024. Optimizing Dataflow Systems for Scalable Interactive Visualization. Proc. ACM Manag. Data 2, 1 (SIGMOD), Article 21 (February 2024), 25 pages. https://doi.org/10.1145/3639276 1 INTRODUCTION Interactive data visualization is essential for understanding, manipulating and presenting complex datasets [9, 60]. Specification languages such as D3 [7], Plotly [23] and Vega [49] make the process of designing interactive visualizations more systematic, precise and accessible to both novices and analysts. Meanwhile, they are also the building blocks of all visualization systems. For example, Forcache [1] and Kyrix [57] are implemented using D3 [7] while Falcon [37] and Voyager [63] are built on top of Vega/Vega-Lite [48, 49]. Hence, enhancing visualization languages can not only extend their usability but also improve all of the systems they support, leading to a cumulative impact on the data visualization ecosystem. However, these languages are not designed to optimize data queries, and, as a consequence, they fail to match the data processing performance of even the most basic database systems [36]. Authors’ addresses: Junran Yang, junran@cs.washington.edu, University of Washington, Seattle, USA; Hyekang Kevin Joo, Carnegie Mellon University, Pittsburgh, USA, kevinjoo@andrew.cmu.edu; Sai Yerramreddy, University of Maryland, Collkge Park, USA, saiyr@umd.edu; Dominik Moritz, Carnegie Mellon University, Pittsburgh, USA, domoritz@cmu.edu; Leilani Battle, leibatt@cs.washington.edu, University of Washington, Seattle, USA. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). © 2024 Copyright held by the owner/author(s). ACM 2836-6573/2024/2-ART21 https://doi.org/10.1145/3639276 Proc. ACM Manag. Data, Vol. 2, No. 1 (SIGMOD), Article 21. Publication date: February 2024." 2401.02976v1,"Trace and Edit Relation Associations in GPT Jiahang Li jiahang@bu.edu Taoyu Chen mirack@bu.edu Abstract This study introduces a novel approach for analyzing and modifying entity relationships in GPT models, diverging from ROME(Meng et al., 2022)’s entity-focused methods. We develop a relation tracing technique to understand the influence of language model computations on relationship judgments. Using the FewRel dataset, we identify key roles of MLP modules and attention mechanisms in processing relationship information. Our method, tested against ROME on a new dataset, shows improved balance in specificity and generalization, underscoring the potential of manipulating early-layer modules for enhanced model understanding and accuracy. 1 Introduction Where is the knowledge of entity relations stored in a large language model? Our research suggests that such relations are represented through localized computations in GPT, which can be directly manipulated. Large language models are capable of predicting factual statements about the world, as noted in a paper by Petroni et al.(Petroni et al., 2019). However, while auto-regressive neural networks like GPT are widely used, much remains to be understood about how they store knowledge. Prior studies have mainly focused on how entities convey information, but relations between entities are also significant sources of knowledge. For example, the sentence ""The Space Needle is located in the city of Seattle"" contains the relation ""located in"" between the two entities. However, existing methods are inadequate for modifying such relations. Therefore, it is still necessary to investigate how to locate and manipulate relation knowledge within these models. GPT’s unidirectional attention and generation capabilities offer further opportunities for novel insights. To address these challenges, we investigate Yuanli Wang yuanliw@bu.edu how entity relations are stored in GPT-like autoregressive transformer models. Our project milestone involves tracing the effects of hidden state activation within GPT to identify how these models represent relations. Our analysis reveals that MLP modules play a crucial role at the beginning and end, while attention is more important for localizing relations to the final token of the prompt within the facts. We evaluate our findings by comparing our approach to existing methods in relation extraction (RE) tasks. To evaluate ROME’s impact on more difficult cases, we introduce a dataset of counterfactual assertions that would not have been observed in pretraining. Our evaluations confirm that the fifth layer of MLP can store relation associations that generalize beyond specific surface forms, while remaining specific to the subject. Compared to original ROME, modified ROME achieves good generalization and specificity simultaneously on the task of editing relation in language models. 2 Related work Numerous approaches have been employed to gain a deeper understanding of the inner workings of language models (LMs). One such method involves training a probing classifier to identify properties within the model’s internal representations, though this approach may not capture the network’s behavior completely. Another technique focuses on causal effects to extract essential information from the network while avoiding spurious correlations. Some research evaluates LMs’ knowledge acquisition by examining their predictive abilities, while other studies attempt to locate and modify knowledge computation within transformers (Dai et al., 2022). The Transformer’s multi-head attention mechanism is a crucial component that allows it to attend to various parts of the input sequence simultaneously (Vaswani et al., 2017). This concept was in-" 2401.02978v1,"Learning from a Generative AI Predecessor The Many Motivations for Interacting with Conversational Agents Donald Brinkman Mojang Studios Microsoft Corporation Redmond, WA, USA donaldbr@microsoft.com Jonathan Grudin Information School University of Washington Seattle, WA, USA grudin@uw.edu ABSTRACT For generative AI to succeed, how engaging a conversationalist must it be? For almost sixty years, some conversational agents have responded to any question or comment to keep a conversation going. In recent years, several utilized machine learning or sophisticated language processing, such as Tay, Xiaoice, Zo, Hugging Face, Kuki, and Replika. Unlike generative AI, they focused on engagement, not expertise. Millions of people were motivated to engage with them. What were the attractions? Will generative AI do better if it is equally engaging, or should it be less engaging? Prior to the emergence of generative AI, we conducted a large-scale quantitative and qualitative analysis to learn what motivated millions of people to engage with one such ‘virtual companion,’ Microsoft’s Zo. We examined the complete chat logs of 2000 anonymized people. We identified over a dozen motivations that people had for interacting with this software. Designers learned different ways to increase engagement. Generative conversational AI does not yet have a clear revenue model to address its high cost. It might benefit from being more engaging, even as it supports productivity and creativity. Our study and analysis point to opportunities and challenges. KEYWORDS Generative AI, conversational agents, intelligent agents, personal assistants, chatbots, virtual companions, engagement, design 1 Introduction Fiction writers have long portrayed artificial companions. Mary Shelley’s Frankenstein was inspired by the harnessing of electricity. The concept moved from science fiction to science in 1949 when Alan Turing wrote, “I do not see why [the computer] should not enter any one of the fields normally covered by the human intellect, and eventually compete on equal terms.” [39] The “Turing test” was proposed: programs would converse, by typing, with qualified judges who tried to determine which contestants were people. This inspired engineers, whose work inspired fiction writers to imagine future conversational agents that may be approaching. In the summer of 1956, mathematicians and engineers gathered and created the field of Artificial Intelligence. They saw intelligence in terms of orderly problem-solving. They underestimated the complexity of human intelligence, concluding that by 1980 or 1985, a computer would achieve human-level intelligence, now called artificial general intelligence. In the words of MIT’s Marvin Minsky, it would “be able to read Shakespeare, grease a car, play office politics, tell a joke, have a fight.” [6, 12] This lofty goal attracted government funding of the extraordinarily expensive computers of the 1950s and 1960s. Some people consider generative AI based on large language models (LLMs) to be a significant step toward artificial general intelligence. This article presents a detailed study of a generative AI predecessor, Zo, with which over a million people engaged in extended conversations. Zo relied on machine learning (ML) and sophisticated natural language processing (NLP), but not a large language model. We briefly reviewing decades of efforts to “pass the Turing test.” We outline successes, attracting millions of users, and challenges—few conversational agents lasted long. Our study explores why people engaged with Zo and how the development team responded to user behaviors." 2401.02979v1,"Are we describing the same sound? An analysis of word embedding spaces of expressive piano performance Silvan David Peter Shreyan Chowdhury silvan.peter@jku.at Johannes Kepler University Linz, Austria shreyan.chowdhury@jku.at Johannes Kepler University Linz, Austria Carlos Eduardo Cancino-Chacón Gerhard Widmer carlos_eduardo.cancino_chacon@jku.at Johannes Kepler University Linz, Austria gerhard.widmer@jku.at Johannes Kepler University Linz, Austria ABSTRACT 1 Semantic embeddings play a crucial role in natural language-based information retrieval. Embedding models represent words and contexts as vectors whose spatial configuration is derived from the distribution of words in large text corpora. While such representations are generally very powerful, they might fail to account for fine-grained domain-specific nuances. In this article, we investigate this uncertainty for the domain of characterizations of expressive piano performance. Using a music research dataset of free text performance characterizations and a follow-up study sorting the annotations into clusters, we derive a ground truth for a domain-specific semantic similarity structure. We test five embedding models and their similarity structure for correspondence with the ground truth. We further assess the effects of contextualizing prompts, hubness reduction, cross-modal similarity, and k-means clustering. The quality of embedding models shows great variability with respect to this task; more general models perform better than domain-adapted ones and the best model configurations reach human-level agreement. Semantic embeddings are a foundational concept in Natural Language Processing (NLP). NLP embedding models map words and their contexts to high-dimensional vector spaces while encoding as much of the semantic information as possible. Computers process such numerical data more readily than text, and vector spaces enable simple yet powerful similarity representations. Semantic embeddings enable a wide a variety of downstream tasks, from retrieval to classification to context-enhanced few shot learning. State-ofthe-art (SOTA) embedding models are trained on vast datasets of natural language covering many domains and disciplines, underpinned by a general distributional hypothesis — that words with similar meanings occur in similar contexts. This hypothesis and its corresponding inductive bias lead to one of the major open challenges related to semantic embeddings: whether context dependence, polysemy, and fine-grained domainspecific idiosyncrasies are adequately represented by general purpose semantic embeddings. Specialized domains of language use such as talk of specific arts might exhibit incommensurable associations and similarites, e.g., a bright piano sound evokes different meanings than a bright student. While specific domains and their possibly nuanced differentiations do occur in large datasets, they only occur in their specific context, where the distributional hypothesis runs counter to different encoding. In other words, if certain emotionally dissimilar adjectives (happy, sad) only occur in similar contexts, they end up close in the embedding space despite opposing meanings. In this article, we address the question whether general semantic embeddings can recover similarity relations in a specific domain of language use. In particular, we are interested in adjectival spaces used in the characterization of expressive performance of Western classical solo piano music. The underlying motivation is the possibility of expressivity- or emotion-based music retrieval using intuitive verbal queries, which would be a valuable and sought-after service in the digital music world. Characterizations of expressive performance get at the finest details of performance technique, expression, timbre, emotions, metaphors, and associations. Note that it’s crucially not the piece that is being described by such characterizations, but its expressive interpretation and rendition. CCS CONCEPTS • Information systems → Test collections; Similarity measures; Top-k retrieval in databases; • Applied computing → Performing arts. KEYWORDS Semantic Similarity, Embeddings, Evaluation, Music Performance ACM Reference Format: Silvan David Peter, Shreyan Chowdhury, Carlos Eduardo Cancino-Chacón, and Gerhard Widmer. 2023. Are we describing the same sound? An analysis of word embedding spaces of expressive piano performance. In Forum for Information Retrieval Evaluation (FIRE 2023), December 15–18, 2023, Panjim, India. ACM, New York, NY, USA, 9 pages. https://doi.org/10.1145/3632754. 3632759 Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). FIRE 2023, December 15–18, 2023, Panjim, India © 2023 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-1632-4/23/12. https://doi.org/10.1145/3632754.3632759 INTRODUCTION" 2401.02988v1,"Asian Journal of Economics, Business and Accounting Volume 24, Issue 1, Page 1-10, 2024; Article no.AJEBA.110050 ISSN: 2456-639X A Latent Dirichlet Allocation (LDA) Semantic Text Analytics Approach to Explore Topical Features in Charity Crowdfunding Campaigns Prathamesh Muzumdar a* , George Kurian b and Ganga Prasad Basyal c a The University of Texas at Arlington, USA. b Eastern New Mexico University, USA. c Black Hills State University, USA. Authors’ contributions This work was carried out in collaboration among all authors. All authors read and approved the final manuscript. Article Information DOI: 10.9734/AJEBA/2024/v24i11207 Open Peer Review History: This journal follows the Advanced Open Peer Review policy. Identity of the Reviewers, Editor(s) and additional Reviewers, peer review comments, different versions of the manuscript, comments of the editors, etc are available here: https://www.sdiarticle5.com/review-history/110050 Original Research Article Received: 24/10/2023 Accepted: 29/12/2023 Published: 03/01/2024 ABSTRACT Crowdfunding in the realm of the Social Web has received substantial attention, with prior research examining various aspects of campaigns, including project objectives, durations, and influential project categories for successful fundraising. These factors are crucial for entrepreneurs seeking donor support. However, the terrain of charity crowdfunding within the Social Web remains relatively unexplored, lacking comprehension of the motivations driving donations that often lack concrete reciprocation. Distinct from conventional crowdfunding that offers tangible returns, charity crowdfunding relies on intangible rewards like tax advantages, recognition posts, or advisory roles. Such details are often embedded within campaign narratives, yet, the analysis of textual content in _____________________________________________________________________________________________________ *Corresponding author: E-mail: prathameshmuzumdar85@gmail.com; Asian J. Econ. Busin. Acc., vol. 24, no. 1, pp. 1-10, 2024" 2401.02989v1,"On the selection and effectiveness of pseudo-absences for species distribution modeling with deep learning Robin Zbinden a,∗ , Nina van Tiel a , Benjamin Kellenberger b , Lloyd Hughes a , Devis Tuia a a Ecole Polytechnique Fédérale de Lausanne (EPFL), Environmental Computational Science and Earth Observation (ECEO) Laboratory, Switzerland b Yale University, Jetz Lab, USA Abstract Species distribution modeling is a highly versatile tool for understanding the intricate relationship between environmental conditions and species occurrences. However, the available data often lacks information on confirmed species absence and is limited to opportunistically sampled, presence-only observations. To overcome this limitation, a common approach is to employ pseudo-absences, which are specific geographic locations designated as negative samples. While pseudo-absences are well-established for single-species distribution models, their application in the context of multi-species neural networks remains underexplored. Notably, the significant class imbalance between species presences and pseudo-absences is often left unaddressed. Moreover, the existence of different types of pseudo-absences (e.g., random and target-group background points) adds complexity to the selection process. Determining the optimal combination of pseudo-absences types is difficult and depends on the characteristics of the data, particularly considering that certain types of pseudo-absences can be used to mitigate geographic biases. In this paper, we demonstrate that these challenges can be effectively tackled by integrating pseudo-absences in the training of multi-species neural networks through modifications to the loss function. This adjustment involves assigning different weights to the distinct terms of the loss function, thereby addressing both the class imbalance and the choice of pseudo-absence types. Additionally, we propose a strategy to set these loss weights using spatial block cross-validation with presence-only data. We evaluate our approach using a benchmark dataset containing independent presence-absence data from six different regions and report improved results when compared to competing approaches. Keywords: species distribution modeling, neural networks, presence-only data, pseudo-absence, deep learning ∗ Corresponding author. Email address: robin.zbinden@epfl.ch (Robin Zbinden) Preprint submitted to Elsevier January 9, 2024" 2401.02992v1,"Advanced Unstructured Data Processing for ESG Reports: A Methodology for Structured Transformation and Enhanced Analysis Jiahui Peng 1 , Jing Gao 1 , Xin Tong 1,* , Jing Guo 2 , Hang Yang 2 , Jianchuan Qi 2 , Ruiqiao Li 2 , Nan Li 2, ✝ , Ming Xu 2 1 Peking University, 2 Tsinghua University * tongxin@urban.pku.edu.cn, ✝ li-nan@tsinghua.edu.cn Abstract: In the evolving field of corporate sustainability, analyzing unstructured Environmental, Social, and Governance (ESG) reports is a complex challenge due to their varied formats and intricate content. This study introduces an innovative methodology utilizing the ""Unstructured Core Library"", specifically tailored to address these challenges by transforming ESG reports into structured, analyzable formats. Our approach significantly advances the existing research by offering high-precision text cleaning, adept identification and extraction of text from images, and standardization of tables within these reports. Emphasizing its capability to handle diverse data types, including text, images, and tables, the method adeptly manages the nuances of differing page layouts and report styles across industries. This research marks a substantial contribution to the fields of industrial ecology and corporate sustainability assessment, paving the way for the application of advanced NLP technologies and large language models in the analysis of corporate governance and sustainability. Our code is available at https://github.com/linancn/TianGong-AI- Unstructure.git. Keywords: Unstructured Data; ESG Report; Industrial Ecology; Partition; Chunking 1 Introduction In the field of data management, the dichotomy between ""Structured Data"" and ""Unstructured Data"" is critical. Structured data, typified by its presence in databases and spreadsheets, is readily processed via ETL (Extract, Transform, Load) procedures. Unstructured data, however, which includes documents, PDF files, emails, and social media posts, presents complexities due to its nonstandardized formats, making context comprehension and key information extraction challenging. By 2025, it's estimated that unstructured data will constitute about 80% of the 179.6ZB of global data generation(IDC, 2023). This data is not only massive in volume but also varied in origin, posing significant challenges in extracting valuable insights due to its rapid generation and complex structure. 1" 2401.02997v1,"Blar-SQL: Faster, Stronger, Smaller NL2SQL JOSÉ MANUEL DOMÍNGUEZ, Blar Spa, Chile BENJAMÍN ERRAZURIZ, Blar Spa, Chile PATRICIO DAHER, Blar Spa, Chile Large Language Models (LLMs) have gained considerable notoriety in the field of natural language to SQL tasks (NL2SQL). In this study, we show how task decomposition can greatly benefit LLMs in database understanding and query generation in order to answer human questions with an SQL query. We fined-tuned open source models, specifically Llama-2 and Code Llama, by combining 2 different models each designated to focus on one of two tasks in order to leverage each model’s core competency to further increase the accuracy of the final SQL query. We propose a new framework to divide the schema into chunks in order to fit more information into a limited context. Our results are comparable with those obtained by GPT-4 at the same time being ~135 times smaller, 90 times faster and more than 100 times cheaper than GPT-4. Another challenge frequently encountered in the text-to-SQL domain is managing context. Large data schemas often exceed the 32K token context limit of the GPT-4 model. To address this, we have introduced a novel method for selecting the necessary schema link to answer a given query. We partition the schema into several prompts, each tailored to fit within the maximum context length. This approach enables models with a context limit of 4K tokens or less to efficiently process databases with extensive schemas and descriptions. The contributions of this study are summarized: (1) We divide the task of generating SQL queries into 2 steps, the first is choosing the appropriate columns based on the database schema, column descriptions and other external knowledge that may be required. (2) A new framework of sub-dividing very large schemas and descriptions into chunks in order to better manage prompt context and include the greatest amount of information possible. (3) A new idea of using 2 different models trained with different purposes in order to leverage their knowledge and create better results. Additional Key Words and Phrases: NL2SQL, LLM, AI, Prompt Decomposition ACM Reference Format: José Manuel Domínguez, Benjamín Errazuriz, and Patricio Daher. 2023. Blar- SQL: Faster, Stronger, Smaller NL2SQL. 1, 1 (January 2023), 6 pages. 1 INTRODUCTION With recent advances in LLMs such as the Open AI’s GPT-4 and Meta’s Llama-2, the field of translating human language questions into SQL queries, commonly referred to as NL2SQL, has witnessed significant advancements. These state-of-the-art language models have opened up exciting opportunities for improving the accuracy and efficiency of NL2SQL systems, enabling the end user to interact with databases without having a deep understanding of SQL language or the database’s schema. Currently, most of the SOTA approaches use LLMs to achieve this goal, particularly GPT-4, which has gained most of the attention as being the largest and most capable model as of this paper’s writing. In this paper, we explore how open-source models such as Llama-2 and CodeLlama when fine-tuned can achieve similar or even better results than the ones achieved by GPT-4. Moreover, we explore how dividing complex tasks into smaller steps can significantly benefit these models. We build on DIN-SQL’s approach [Pourreza and Rafiei 2023] and fine-tune two custom models, each specialized in completing one sub-task achieving results comparable with GPT-4 on the BIRD-SQL data set. Authors’ addresses: José Manuel Domínguez, jose@getblar.com, Blar Spa, , Santiago, , Chile, ; Benjamín Errazuriz, benjamin@getblar.com, Blar Spa, , Santiago, , Chile, ; Patricio Daher, patricio@getblar.com, Blar Spa, , Santiago, , Chile, Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. XXXX-XXXX/2023/1-ART $15.00 https://doi.org/ 2 RELATED WORK Decomposing complex text-to-SQL tasks has shown great potential, improving the performance of few shots LLMs on the Spider dataset by over 10% [Pourreza and Rafiei 2023]. The main idea behind this is that LLMs respond better when only one task is asked, to achieve this you break the problem into simple pieces and solve each part using prompting, trained models, or symbolic functions [Khot et al. 2022]. SDSQL model introduces the notion of capturing the interactions between the question and the data schema. It uses a series of dependency labels that link question tokens with schema tokens (W-Col, S-Agg, W-Op). There are several datasets designed for text-to-SQL research, such as Spider [Yu et al. 2018] and WikiSQL [Zhong et al. 2017]. These datasets not only provide a benchmark for comparing various approaches, but they also supply the data necessary for fine-tuning models and achieving significant improvements. In this realm, the BIRD dataset stands out. It encompasses a 33.4GB database emphasizing real-world applications. This benchmark offers a detailed insight into how our frameworks would perform with actual databases, making it the most rigorous benchmark available [Li et al. 2023]. 3 METHODOLOGY 3.1 Error analysis In order to further understand the current capabilities of opensource LLMs we first evaluated the vanilla version of code-llama , Vol. 1, No. 1, Article . Publication date: January 2023." 2401.03008v1,"fluids Article A GPU-Accelerated Modern Fortran Version of the ECHO Code for Relativistic Magnetohydrodynamics Luca Del Zanna 1,2,3 , Simone Landi 1 2 3 4 5 6 7 8 1,2 , Lorenzo Serafini 4,1 , Matteo Bugli 5,6,7 , and Emanuele Papini 8 Dipartimento di Fisica e Astronomia, Università degli Studi di Firenze, 50019 Sesto Fiorentino, Italy; luca.delzanna@unifi.it (L.D.Z.); simone.landi@unifi.it (S.L.) INAF, Osservatorio Astrofisico di Arcetri, 50125 Firenze, Italy INFN, Sezione di Firenze, 50019 Sesto Fiorentino, Italy CINECA, 40033 Casalecchio di Reno, Italy; l.serafini@cineca.it Dipartimento di Fisica, Università degli Studi di Torino, 10125 Torino, Italy; matteo.bugli@unito.it INFN, Sezione di Torino, 10125 Torino, Italy Université Paris-Saclay, Université Paris Cité, CEA, CNRS, AIM, 91191, Gif-sur-Yvette, France INAF, Istituto di Astrofisica e Planetologia Spaziali, 00133 Roma, Italy; emanuele.papini@inaf.it 0, 0. https://doi.org/ Abstract: The numerical study of relativistic magnetohydrodynamics (MHD) plays a crucial role in high-energy astrophysics, but unfortunately is computationally demanding, given the complex physics involved (high Lorentz factor flows, extreme magnetization, curved spacetimes near compact objects) and the large variety of spatial scales needed to resolve turbulent motions. A great benefit comes from the porting of existing codes running on standard processors to GPU-based platforms. However, this usually requires a drastic rewriting of the original code, the use of specific languages like CUDA, and a complex analysis of data management and optimization of parallel processes. Here we describe the porting of the ECHO code for special and general relativistic MHD to accelerated devices, simply based on native Fortran language built-in constructs, especially do concurrent loops, few OpenACC directives, and the straightforward data management provided by the Unified Memory option of NVIDIA compilers.Thanks to these very minor modifications to the original code, the new version of ECHO runs at least 16 times faster on GPU platforms compared to CPU-based ones. The chosen benchmark is the 3D propagation of a relativistic MHD Alfvén wave, for which strong and weak scaling tests performed on the LEONARDO pre-exascale supercomputer at CINECA are provided (using up to 256 nodes corresponding to 1024 GPUs, and over 14 billion cells). Finally, an example of high-resolution relativistic MHD Alfvénic turbulence simulation is shown, demonstrating the potential for astrophysical plasmas of the new GPU-based version of ECHO. Received: Keywords: magnetohydrodynamics (MHD); relativistic processes; turbulence; numerical methods    Citation: A GPU-Accelerated Modern Fortran Version of the ECHO Code for Relativistic Magnetohydrodynamics. Fluids 2024, Accepted: Published: Publisher’s Note: MDPI stays neutral 1. Introduction with regard to jurisdictional claims in The numerical investigation of high-energy astrophysical sources often requires the simultaneous evolution of a conducting fluid and of the electric currents and magnetic fields embedded in it, typically modeled in the regime of magnetohydrodynamics, MHD, or (general) relativistic magnetohydrodynamics, (G)RMHD. In particular, GRMHD simulations have recently allowed a significant advance in our understanding of the problem of black hole accretion [1], supporting the physical interpretation of the Event Horizon Telescope images [2,3]. Given the extremely high Reynolds numbers typical of astrophysical plasmas, the regime of the fluid is invariably turbulent, with a strongly nonlinear evolution of continuously interacting vortices and current sheets. This scenario is for example crucial for accretion disks, where turbulence is expected to provide both an effective viscosity/resistivity [4–6] and dynamo-like terms which may lead to an exponential growth of the magnetic field [7,8]. This may be also important in other contexts, like neutron star merger events [9,10]. published maps and institutional affili- ations. Copyright: © 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). Fluids 2024, 0, 0. https://doi.org/10.3390/fluids0000000 https://www.mdpi.com/journal/fluids" 2401.03032v1,"ARTICLE INFORMATION Article title Dataset of turbulent flow over interacting barchan dunes Authors Jimmy G. Alvarez Danilo S. Borges Erick M. Franklin* Affiliations Faculdade de Engenharia Mecânica, Universidade Estadual de Campinas (UNICAMP), Rua Mendeleyev, 200, 13083-860, Campinas-SP, Brazil Corresponding author’s email address and Twitter handle erick.franklin@unicamp.br Keywords Water flow, Boundary Layer, Disturbance, Bedforms, Barchan dunes, Interactions Abstract Barchans are dunes commonly found in dune fields on Earth, Mars and other celestial bodies, where they can interact with each other. This article concerns experimental data for the flow over subaqueous barchans that are either isolated or interacting with each other. The experiments were carried out in a transparent channel of rectangular cross section in which turbulent water flows were imposed over either one single or a pair of barchans. The instantaneous flow fields were measured by using a low-frequency PIV (particle image velocimetry) and high-frequency PTV (particle tracking velocimetry). From the PIV and PTV data, the mean flow, trajectories, and second-order moments were computed, which are included in the datasets described in this paper, together with raw data (images), instantaneous fields, and scripts to process them. The datasets can be reused for benchmarking or for processing new images generated by other research groups. SPECIFICATIONS TABLE Subject Earth and Planetary Sciences / Earth-Surface Processes Specific subject area Disturbed flow over dunes interacting with each other." 2401.03033v1,"JOURNAL OF L A TEX CLASS FILES, VOL. X, NO. X, XXXX 2024 1 Analytical Quantum Full-Wave Solutions for a 3D Circuit Quantum Electrodynamics System Soomin Moon, Graduate Student Member, IEEE, Dong-Yeop Na, Member, IEEE, and Thomas E. Roth, Member, IEEE Abstract—High-fidelity general-purpose numerical methods are increasingly needed to improve superconducting circuit quantum information processor performance. One challenge in developing such numerical methods is the lack of reference data to validate them. To address this, we have designed a 3D system where all electromagnetic properties needed in a quantum analysis can be evaluated using analytical techniques from classical electromagnetic theory. Here, we review the basics of our field-based quantization method and then use these techniques to create the first-ever analytical quantum full-wave solution for a superconducting circuit quantum device. Specifically, we analyze a coaxial-fed 3D waveguide cavity with and without transmon quantum bits inside the cavity. We validate our analytical solutions by comparing them to numerical methods in evaluating single photon interference and computing key system parameters related to controlling quantum bits. In the future, our analytical solutions can be used to validate numerical methods, as well as build intuition about important quantum effects in realistic 3D devices. Index Terms—Circuit quantum electrodynamics, transmon qubit, quantum theory, microwave resonators, cavity perturbation theory, and antenna theory. I. I NTRODUCTION T HE superconducting circuit platform is a leading approach for developing quantum computers [1], [2] and other quantum information processing technologies [3]–[5] that are expected to revolutionize many areas of science and technology. Typically referred to as circuit quantum electrodynamics (cQED) devices, these systems utilize the interactions between microwave electromagnetic (EM) fields and superconducting circuits to generate and process quantum information. Despite significant experimental progress, substantial improvements are still needed for these technologies to be useful in practice. For instance, quantum computers have achieved a quantum advantage over classical supercomputers [1], [2], but for such an advantage to be realized on realistic problems Manuscript received XXXX XX, 2024. This work is based upon work supported by the National Science Foundation under Grant No. 2202389 and Purdue ECE Elmore Emerging Frontiers Center “The Crossroads of Quantum and AI.”. (Corresponding author: Thomas E. Roth.) S. Moon and T. E. Roth are with the Elmore Family School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN 47907 USA and the Purdue Quantum Science and Engineering Institute, West Lafayette, IN 47907 USA (e-mail: rothte@purdue.edu). D.-Y. Na is with the Department of Electrical and Computer Engineering, Pohang University of Science and Technology (POSTECH), Pohang 37673, South Korea (e-mail: dyna22@postech.ac.kr). This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. requires improving the performance of most components while massively scaling the number of quantum bits (qubits) in the system [6], [7]. To overcome these engineering challenges, general-purpose and high-fidelity numerical analysis tools are becoming increasingly important [8]–[11]. Unfortunately, there are currently only a few generalpurpose numerical methods available for modeling cQED devices and they suffer from significant inefficiencies. Some of the first general-purpose numerical approaches were blackbox circuit quantization methods [8], [9], which use full-wave EM simulations of all linear components to compute the impedance matrix that is then used to build an equivalent Foster circuit network. This equivalent circuit is then quantized in conjunction with the remaining nonlinear aspects of the qubits to characterize the full system. In practice, these methods often require an inconvenient trade-off between accuracy and userintensive curve-fitting procedures that can require performing refined simulations around any resonant peaks in the multiport impedance matrix. More recently, the energy participation ratio (EPR) quantization method [10] was introduced as an alternative to blackbox circuit quantization. This approach recasts the theoretical description of the system so that instead of performing impedance matrix simulations the results of fullwave EM eigenmode decompositions of the linear part of a cQED device are used to quantize the system. As a result, this method avoids user-intensive curve-fitting procedures. Regardless of whether blackbox circuit or EPR quantization is used, the manner in which the linear and nonlinear parts of the qubits in the cQED system are subdivided requires the use of many quantum states per resonant mode to reach numerical convergence, as will be shown later. This severely limits the size of cQED system that can be analyzed because the dimension of the matrix needed to characterize the quantum aspects of the system grows exponentially with respect to the number of quantum states per resonant mode. An alternative method to these quantization approaches is our macroscopic cQED formalism proposed in [11] that utilizes a field theory description of a system. In this approach, key parameters in the quantum description of a system can also be evaluated in terms of the results of a linear EM eigenmode analysis. However, due to how the nonlinearity of qubits are incorporated into this formalism, a much smaller number of quantum states per mode can be used to reach numerical convergence for an accurate solution. However, for both EPR and our field-based quantization methods, EM eigenmodes must be found numerically which becomes computationally prohibitive for large devices. As" 2401.03046v1,"universe Article Multi-Epoch Optical Spectroscopy Variability of the Changing-Look AGN Mrk 883 Erika Benítez 1, * , Castalia Alenka Negrete 2 , Héctor Ibarra-Medel 1 , Irene Cruz-González 1 José Miguel Rodríguez-Espinosa 3,4 1 2 Citation: Benítez, E.; Negrete, C.A.; 3 4 * and Universidad Nacional Autónoma de México, Instituto de Astronomía, AP 70-264, Cd. Universitaria, Mexico City 04510, Mexico; hibarram@astro.unam.mx (H.I.-M.); irene@astro.unam.mx (I.C.-G.) CONAHCyT Research Fellow at Universidad Nacional Autónoma de México, Instituto de Astronomía, AP 70-264, Mexico City 04510, Mexico; alenka@astro.unam.mx Instituto de Astrofísica de Canarias, Vía Láctea, s/n, 38205 La Laguna, Spain; jmr.espinosa@iac.es Departamento de Astrofísica, Universidad de La Laguna, (ULL), 38205 La Laguna, Spain Correspondence: erika@astro.unam.mx; Tel.: +52-5556223986 Abstract: In this work, we present multi-epoch optical spectra of the Seyfert 1.9 galaxy Mrk 883. Data were obtained with the Gran Telescopio Canarias and the MEGARA Integral Field Unit mode, archival data from the SDSS-IV MaNGA Survey and the SDSS-I Legacy Survey, and new spectroscopic observations obtained at San Pedro Mártir Observatory. We report the appearance of the broad component of Hβ emission line, showing a maximum FWHM ∼ 5927 ± 481 km s − 1 in the MaNGA spectra, finding evidence for a change from Seyfert 1.9 (23 June 2003) to Seyfert 1.8 (18 May 2018). The observed changing-look variation from Sy1.9 to Sy1.8 has a timescale ∆t ∼ 15 y. In addition, we observe profile and flux broad emission line variability from 2018 to 2023, and a wind component in [OIII]5007 Å, with a maximum FWHM = 1758 ± 178 km s − 1 , detected on 15 April 2023. In all epochs, variability of the broad lines was found to be disconnected from the optical continuum emission, which shows little or no variations. These results suggest that an ionized-driven wind in the polar direction could be a possible scenario to explain the observed changing-look variations. Keywords: active galactic nuclei; Seyfert galaxies: variability; optical spectroscopy; AGN winds Ibarra-Medel, H.; Cruz-González, I.; Rodríguez-Espinosa, J.M. Multi-Epoch Optical Spectroscopy Variability of the Changing-Look AGN Mrk 883. Universe 2024, 1, 0. https://doi.org/ Academic Editor: Firstname Lastname Received: 8 December 2023 Revised: 26 December 2023 Accepted: Published: Copyright: © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). 1. Introduction The so-called unified model for AGNs [1] has been for a long time the paradigm used to explain the observed phenomenology of the different classes of the jetted and non-jetted AGN family [2]. The model is mainly based on the assumption that a ubiquitous clumpy parsec-scale dusty torus presenting different viewing angles can explain the division into Type 1 (unobscured) and Type 2 (obscured) AGNs (for a review, see [3]). AGNs are also known for showing multi-wavelength variability with time scales from hours to years (e.g., [4]). Some AGNs display more dramatic variations that can include spectral-type variations, e.g., changing from Type 1 to Type 2 classes in time-scales ∼ years. AGNs that display this kind of variation are identified as ’Changing-look’ (CL). They have been observed in the optical and the X-ray bands, and ∼ 100 CL AGNs have been identified by multi-epoch spectroscopy [5]. CL AGNs are known to present a temporary appearance/disappearance of the broad emission line (BLR) components with timescales from years to decades, and these kinds of coherent changes are found to be difficult to explain—see, e.g., [6,7]. The spectral change variations can be from Type 1 to Type 2, progressing also through the intermediate types, e.g., from Type 1 to Type 1.9 or Type 2. The Seyfert galaxy Mrk 883 is a nearby AGN at z = 0.038. Classified as Sy1.9 by [8], it was identified by [9] as an object that shows spectral-type variations. In particular, broad emission line variations were detected in October 1993, producing a change from Sy1.9 to Sy1.8 (or even Sy1.5), with little change in the optical continuum emission. The author Universe 2024, 1, 0. https://doi.org/10.3390/universe1010000 https://www.mdpi.com/journal/universe" 2401.03047v1,"Draft version January 9, 2024 Typeset using L A TEX twocolumn style in AASTeX631 Setting the stage for the search for life with the Habitable Worlds Observatory: Properties of 164 promising planet survey targets Caleb K. Harada , 1, ∗ Courtney D. Dressing , 1 Stephen R. Kane , 2 and Bahareh Adami Ardestani 3, 1 1 Department of Astronomy, 501 Campbell Hall #3411, University of California, Berkeley, CA 94720, USA 2 Department of Earth and Planetary Sciences, University of California, Riverside, CA 92521, USA 3 Sonoma State University, Rohnert Park, CA 94928, USA (Received January 5, 2024; Revised XX; Accepted XX) Submitted to AAS Journals ABSTRACT The Decadal Survey on Astronomy and Astrophysics 2020 (Astro2020) has recommended that NASA realize a large IR/O/UV space telescope optimized for high-contrast imaging and spectroscopy of ∼25 exo-Earths and transformative general astrophysics. The NASA Exoplanet Exploration Program (ExEP) has subsequently released a list of 164 nearby (d < 25 pc) targets deemed the most accessible to survey for potentially habitable exoplanets with the Habitable Worlds Observatory (HWO). We present a catalog of system properties for the 164 ExEP targets, including 1744 abundance measurements for 14 elements from the Hypatia Catalog and 924 photometry measurements spanning from 151.6 nm to 22 µm in the GALEX, Strömgren, Tycho, Gaia, 2MASS, and WISE bandpasses. We independently derive stellar properties for these systems by modeling their spectral energy distributions with Bayesian model averaging. Furthermore, we identify TESS flare rates for 44 stars, optical variability for 78 stars, and X-ray emission for 41 stars in our sample from the literature. We discuss our catalog in the context of planet habitability and draw attention to key gaps in our knowledge where precursor science can help to inform HWO mission design trade studies in the near future. Notably, only 33 of the 164 stars in our sample have reliable space-based UV measurements, and only 40 have a mid-IR measurement. We also find that phosphorus, a bio-essential element, has only been measured in 11 of these stars, motivating future abundance surveys. Our catalog is publicly available and we advocate for its use in forthcoming studies of promising HWO targets. Keywords: Exoplanet catalogs (488), Exoplanet astronomy (486), Planet hosting stars (1242), Astrobiology (74), Space telescopes (1547) 1. INTRODUCTION The Astro2020 Decadal Survey has recommended that NASA devise a large (∼6 m inscribed diameter), stable, space-based infrared/optical/ultraviolet (IR/O/UV) telescope capable of high-contrast (10 −10 ) imaging and spectroscopy (National Academies of Sciences, Engineering, and Medicine 2021). Currently named the Habitable Worlds Observatory (HWO), the Corresponding author: Caleb K. Harada charada@berkeley.edu ∗ NSF Graduate Research Fellow mission’s primary science goals will be to search for biosignatures roughly 25 habitable zone (HZ) exoplanets, while simultaneously enabling transformative general astrophysics (National Academies of Sciences, Engineering, and Medicine 2021). Targeted to launch in the 2040s, HWO will seek to address the fundamental question: Does life exist beyond the Solar System? The Astro2020 report recognized that the unprecedented nature of HWO’s science objectives and technology requirements will require sophisticated planning and review leading up to the mission design stage. Astro2020 therefore recommended a Great Observatory Mission and Technology Maturation Program (GOMAP) whose" 2401.03057v1,"Double-domed temperature-pressure phase diagram found for CePd 3 S 4 S. Huyan 1,2 , T. J. Slade 1,2 , H. Wang 3 , R. Flint 1,2 , R. A. Ribeiro 1,2 , W. Xie 3 , S. L. Bud’ko 1,2 , P. C. Canfield 1,2 1 Ames National Laboratory, US DOE, Iowa State University, Ames, Iowa 50011, USA Department of Physics and Astronomy, Iowa State University, Ames, Iowa 50011, USA 3 Department of Chemistry, Michigan State University, East Lansing, MI 48824, USA 2 e-mail address: shuyan@iastate.edu canfield@ameslab.gov CePd 3 S 4 exhibits interplay between ferromagnetism (FM), quadrupolar order, and the Kondo effect at low temperatures with a FM transition temperature that is much higher than the value expected from the de Gennes scaling of the heavier RPd 3 S 4 compounds. In this work, we investigated the electrical transport and magnetic properties of CePd 3 S 4 under pressure up through 12 GPa so as to better understand the interplay between electronic and magnetic phases in this material. Our findings show that the low pressure FM state is suddenly replaced by a new magnetically ordered phase that is most likely antiferromagnetic that spans from ~ 7 GPa to ~ 11 GPa. Whereas this could be described as an example of avoided quantum criticality, given that clear changes in resistance and Hall data are detected near 6.3 GPa for all temperatures below 300 K, it is also possible that the change in ground state is a response to a pressure induced change in structure. The lack of any discernible change in the pressure dependence of the room temperature unit cell parameter/volume across this whole pressure range suggests that this change in structure is either more subtle than could be detected by our measurements (i.e. development of weak, new wave vector) or the transition is electronic (such as a Lifshitz transition). by the Kondo breakdown picture [36]. On the other hand, studies on heavily disordered FMs indicate that the transition can remain second order to the lowest temperatures accessible [37,38]. The diversity of possible scenarios in itinerant FMs, along with the unusual physical properties often found in the vicinity of the low temperature transitions, motivate the search for new metallic FMs with which to study the evolution of the magnetic state under the influence of applied pressure or magnetic field. I. INTRODUCTION Exotic states of matter and unusual physical properties are often found in the vicinity of quantum critical points (QCPs), or quantum phase transitions (QPTs). Whereas antiferromagnetic (AFM) transitions can often be suppressed to 0 K by a non-thermal control parameter such as pressure or magnetic field, thus reaching a QCP, current theoretical models suggest that, in the absence of disorder, ferromagnetic (FM) quantum criticality is generally avoided in favor of the transition becoming first order through a tricritical point, or the emergence of a new, spatially ordered phase such as AFM [1-9]. To date, experimental work on clean metallic FMs is largely consistent with this picture. Examples include MnSi [10-12], ZrZn 2 [13,14], CoS 2 [15,16], NiAl 3 [17], UGe 2 [18-20], and UTMX (TM= Co, Rh; X= Al, Ge) [21-24], among others, in which the FM transition changes from second- to first-order upon application of an external control parameter. Likewise, in other materials including LaCrGe 3 [25-27], La 5 Co 2 Ge 3 [28], Nb 1−y Fe 2+y [29], and CeAgSb 2 [30], an AFM or spin density wave state emerges prior to quantum criticality. In the specific case of a non-centrosymmetric material with strong enough spin-orbit splitting energy of the conduction band near Fermi energy, recent theoretical work predicts a FM QCP may be accessible [31]. The recently discovered FM QCP in quasi-one-dimensional UIr [32,33], and CeRh 6 Ge 4 , [34,35] both of which have an easy axis anisotropy, could be an experimental example of this, albeit they were also understood as a quasi-one-dimensional FMQCP governed CePd 3 S 4 is an underexplored and promising material. CePd 3 S 4 crystallizes in the cubic NaPt 3 O 4 structure with the space group Pm3n (space group #223) [39]. Here, the Ce 3+ has a quartet crystal field ground state (Γ 8 quartet) [40,41] that has both spin and orbital degrees of freedom and is well separated from the excited Kramer doublet (Γ 7 ) [42]. Consequentially, CePd 3 S 4 exhibits both magnetic and orbital orders, undergoing a simultaneous FM and antiferroquadrupolar (AFQ) transition at T C = 6.3 K at ambient pressure [40,41,43]. Furthermore, the presence of hybridizing Ce 3+ ions make CePd 3 S 4 a Kondo lattice compound, whose Kondo temperature, T K is comparable to ferromagnetic transition temperature, T C [43]. Interestingly, CePd 3 S 4 shows a T C value of 6.3 K, which is significantly higher than the value of 0.07 K predicted from de Gennes scaling, and the T C of CePd 3 S 4 is nearly the same as the T N = 5.8 K of GdPd 3 S 4 [41]. Resonant X-ray results have suggested that whereas the quadrupole moments play a role of a primary order parameter in CePd 3 S 4 , the octupole moments play an 1" 2401.03078v1,"STREAMVC: REAL-TIME LOW-LATENCY VOICE CONVERSION Yang Yang, Yury Kartynnik, Yunpeng Li, Jiuqiang Tang, Xing Li, George Sung, Matthias Grundmann Google LLC, U.S.A. {yanghm,kartynnik,yunpeng,jqtang,simplyxing,gsung,grundman}@google.com ABSTRACT We present StreamVC, a streaming voice conversion solution that preserves the content and prosody of any source speech while matching the voice timbre from any target speech. Unlike previous approaches, StreamVC produces the resulting waveform at low latency from the input signal even on a mobile platform, making it applicable to real-time communication scenarios like calls and video conferencing, and addressing use cases such as voice anonymization in these scenarios. Our design leverages the architecture and training strategy of the SoundStream neural audio codec for lightweight high-quality speech synthesis. We demonstrate the feasibility of learning soft speech units causally, as well as the effectiveness of supplying whitened fundamental frequency information to improve pitch stability without leaking the source timbre information. Index Terms— Voice conversion, On-device neural audio processing, Real-time voice changer 1. INTRODUCTION Voice conversion refers to altering the style of a speech signal while preserving its linguistic content. While style encompasses many aspects of speech, such as emotion, prosody, accent, and whispering, in this work we focus on the conversion of speaker timbre only while keeping the linguistic and paralinguistic information unchanged. Early attempts at voice conversion rely on the idea of CycleGAN- or StarGAN-based [1] direct conversion, or autoencoding with learned feature disentanglement. Both, however, fail to deliver high-quality results. The former empirically suffers from noticeable artifacts, and the latter mostly relies on creating information bottlenecks, either at the latent [2, 3] or architecture level [4], which are difficult to tune: having such a bottleneck too wide leads to leakage of source speaker information, while making it too narrow degrades content fidelity. Recent solutions [5, 6, 7, 8, 9, 10] converge to a design where the content information is obtained by leveraging pretrained feature extraction networks either from speech recognition systems, referred to as phoneme-posteriorgram (PPG) approach [5, 6, 10], or from self-supervised representation learning. Specifically, [7, 9] leverage HuBERT [11], and [8] utilizes WavLM [12]. The combination of content information and a learned global speaker embedding serves as input and conditioning to some vocoder models, such as that used in [13, 14, 15], which are trained to reconstruct the audio waveform. Our proposal follows the same design pattern as [7, 9] and uses the pseudo-labels derived from HuBERT [11] to learn a content encoder that outputs soft speech units. The contributions and new design elements of our solution are as follows: (1) We demonstrate the feasibility of using a lightweight causal convolutional network to capture the soft speech unit information instead of the existing approach [7, 9] of using a computationally demanding non-causal multi-layer transformer network. (2) By leveraging the architecture and training strategy of the SoundStream neural audio codec [16], we achieve high quality speech synthesis while explicitly addressing the problem of on-device low-latency streaming inference, which was not addressed in previous work in this area. 1 (3) We introduce the injection of whitened f 0 (fundamental frequency) information, which improves pitch consistency without leaking the source speaker timbre. As a result, we achieve a low inference latency of 70.8 ms relative to the input signal on the Pixel 7 smartphone while obtaining conversion quality on par with or better than the existing state of the art 2 . 2. METHOD 2.1. Motivation Our design is inspired by Soft-VC[7] and SoundStream[16]. We follow Soft-VC [7] in deriving soft speech units by using discrete speech units extracted from HuBERT [11] as the prediction target for a content encoder network. Specifically, we use a pretrained HuBERT model to derive target per-frame pseudo-labels (in the same manner as [7]) for the 1 Note that [5] also tackles the streaming VC problem, but it is a solution trained for a single target timbre with an inference latency of 270 ms on a desktop CPU, whereas we achieve 70.8 ms latency on a mobile device. 2 Audio samples available at google-research.github.io/seanet/stream vc/" 2401.03088v1,"The RoSiD Tool: Empowering Users to Design Multimodal Signals for Human-Robot Collaboration Nathaniel Dennler 1 , David Delgado 1 , Daniel Zeng 1 , Stefanos Nikolaidis 1 , and Maja Matarić 1 University of Southern California, Los Angeles CA {dennler,nikolaid,mataric}@usc.edu http://www.springer.com/gp/computer-science/lncs Abstract. Robots that cooperate with humans must be effective at communicating with them. However, people have varied preferences for communication based on many contextual factors, such as culture, environment, and past experience. To communicate effectively, robots must take those factors into consideration. In this work, we present the Robot Signal Design (RoSiD) tool to empower people to easily self-specify communicative preferences for collaborative robots. We show through a participatory design study that the RoSiD tool enables users to create signals that align with their communicative preferences, and we illuminate how this tool can be further improved. Keywords: Human-robot Interaction · Personalization · Signalling. 1 Introduction For robots to be effective collaborative partners, they must communicate information about their current state, task completion, and knowledge. People are usually effective at using different signals during collaboration [8]; however, designing signals that allow robots to be effective remains challenging. People excel at adapting the way they communicate to their environment and collaborators [8]. For robots to be effective, they must similarly adapt to a variety of contextual factors, however, robots have the additional challenge of understanding how their own embodiment affects how people expect to interact with them [6]. To address this problem, we aim to develop a way for people to encode the important contextual factors by allowing them to rapidly design signals themselves. This work introduces the Robotic Signal Designer (RoSiD) tool we developed based on insights from exploratory research in human-computer interaction (HCI) and preference learning research in human-robot interaction (HRI). RoSiD facilitates the design embodied signals with three kinds of signal components used in robotic systems: visual, auditory, and kinetic. Importantly, RoSiD is an HRI tool that involves communication channels beyond HCI due to the robot’s embodiment and ability to interact with the user and objects in the physical world, resulting in well-documented improvements in user engagement and task performance [5]." 2401.03092v1,"Finite Expression Method for Learning Dynamics on Complex Networks Zezheng Song ∗1 , Chunmei Wang †2 , and Haizhao Yang ‡ 1,3 1 Department of Mathematics, University of Maryland, College Park, MD 20742, USA 2 Department of Mathematics, University of Florida, Gainesville, FL 32611, USA 3 Department of Computer Science, University of Maryland, College Park, MD 20742, USA Abstract Complex network data pervades various real-world domains, including physical, technological, and biological systems. Despite the prevalence of such data, predicting trends and understanding behavioral patterns in complex systems remains challenging due to poorly understood underlying mechanisms. While data-driven methods have made strides in uncovering governing equations from time series data, efforts to extract physical laws from network data are limited and often struggle with incomplete or noisy data. To address these challenges, we introduce a novel approach called the Finite Expression Method (FEX) and its fast algorithm for this learning problem on complex networks. FEX represents dynamics on complex networks using binary trees composed of finite mathematical operators. The nodes within these trees are trained through a combinatorial optimization process guided by reinforcement learning techniques. This unique configuration allows FEX to capture complex dynamics with minimal prior knowledge of the system and a small dictionary of mathematical operators. Our extensive numerical experiments demonstrate that FEX excels in accurately identifying dynamics across diverse network topologies and dynamic behaviors. Keywords Complex Networks, Network Dynamics, Finite Expression Method, High Dimensions, Symbolic Learning 1 Introduction Complex network data is prevalent in various real-world domains, spanning from transportation [44, 62, 72, 74] to biology [13, 10, 43] and epidemiology [49, 15, 55]. For instance, proteins frequently interact with one another to execute a wide range of functions. As with many complex systems, comprehending the underlying dynamics within these networks is crucial for analyzing and predicting their behaviors. In practice, time-series data for individual nodes within a network ∗ Email: zsong001@umd.edu. Email: chunmei.wang@ufl.edu. ‡ Email: hzyang@umd.edu. † 1" 2401.03104v1,"When To Grow? A Fitting Risk-Aware Policy for Layer Growing in Deep Neural Networks Haihang Wu * , Wei Wang, Tamasha Malepathirana, Damith Senanayake, Denny Oetomo, Saman Halgamuge Department of Mechanical Engineering The University of Melbourne haihangw@student.unimelb.edu.au Abstract Neural growth is the process of growing a small neural network to a large network and has been utilized to accelerate the training of deep neural networks. One crucial aspect of neural growth is determining the optimal growth timing. However, few studies investigate this systematically. Our study reveals that neural growth inherently exhibits a regularization effect, whose intensity is influenced by the chosen policy for growth timing. While this regularization effect may mitigate the overfitting risk of the model, it may lead to a notable accuracy drop when the model underfits. Yet, current approaches have not addressed this issue due to their lack of consideration of the regularization effect from neural growth. Motivated by these findings, we propose an under/over fitting risk-aware growth timing policy, which automatically adjusts the growth timing informed by the level of potential under/overfitting risks to address both risks. Comprehensive experiments conducted using CIFAR-10/100 and ImageNet datasets show that the proposed policy achieves accuracy improvements of up to 1.3% in models prone to underfitting while achieving similar accuracies in models suffering from overfitting compared to the existing methods. Introduction Deep neural networks (DNNs) have significantly advanced the state of the art in various computer vision tasks, including image classification (He et al. 2016; Dosovitskiy et al. 2021), object detection (Fang et al. 2021), and image segmentation (Kirillov et al. 2023). For instance, with a model size 10 times larger than ResNet-50 (He et al. 2016), the pioneering convolutional neural network ConvNext (Liu et al. 2022) achieves a substantial improvement in classification accuracy on the ImageNet dataset (Deng et al. 2009) compared to ResNet. However, this improvement comes at the expense of approximately 50 times more computational burden (Liu et al. 2022). Consequently, the development of efficient training methods for DNN becomes imperative. Existing works demonstrate that neural growth can significantly reduce training time with minimal impact on accuracy (Li et al. 2022; Chang et al. 2018). For instance, studies (Chang et al. 2018; Dong et al. 2020) show neural growth * Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Model Size Underfitted Model S e Existing policy Overfitted Model S 0 t 0 t e t e t e Train Epochs Figure 1: When to grow policy. To expedite the training process of the target large model with size S e , neural growth grows the initial small model from size S 0 at time t 0 into S e at time t e . For the prevailing conventional strategies (illustrated by the green curve), t e is not influenced by overfitting or underfitting risks directly, and these strategies may fail to address under/over fitting risks effectively. By contrast, our fitting risk-aware policy accelerates growth (black curve) by reducing t e to mitigate underfitting risks when the target model exhibits underfitting tendencies. Conversely, it decelerates growth (red curve) by extending the t e for models displaying signs of overfitting, addressing the overfitting risk. can save around 40% training time for deep ResNet on CI- FAR datasets with minor accuracy loss (Krizhevsky 2009), and a similar finding has also been observed in vision transformer growth (Li et al. 2022). Although the study of neural growth encompasses various dimensions (Maile et al. 2022; Maile, Luga, and Wilson 2022), such as initialization of new neurons/layers, when to grow (growth timing), and where to grow, these works predominantly focus on the initialization of new neurons or layers. Few studies (Wen et al. 2020; Dong et al. 2020) investigate the “when to grow” policy for neural growth. Two major policies are periodic growth which adds layers or neurons at regular intervals, and convergent growth which adds layers only when the current model has converged. In this study, we investigate the impact of neural growth on the model accuracy and then develop a “when to grow” policy that considers this impact. Our investigation reveals that neural growth inherently provides a regularization effect on the final model, whose strength is controlled by the growth timing policy. Figure" 2401.03109v1,"Investigation for D + → π + ν ν̄ decay process within QCDSR approach Yu Chen, Hai-Bing Fu, ∗ Tao Zhong, † and Sheng-Bo Wu Department of Physics, Guizhou Minzu University, Guiyang 550025, P.R.China Dong Huang Center of Experimental Training, Guiyang Institute of Information Science and Technology, Guiyang 550025, P.R.China (Dated: January 9, 2024) In the paper, we investigate the charmed meson rare decay process D + → π + ν ν̄ by using QCD n sum rules approach. Firstly, the pion twist-2 and twist-3 distribution amplitude ξ-moments hξ 2;π i| µ (p,σ),n i| µ up to fourth-order are calculated by using QCD sum rule under up to 10th-order and hξ 3;π background field theory. After constructing the light-cone harmonic oscillator model for pion twist- 2, 3 DAs, we get their behaviors by matching the calculated ξ-moments. Then, the D → π transition form factors are calculated by using QCD light-cone sum rules approach. The vector form factor 2 D→π at large recoil region is f + (0) = 0.627 +0.120 −0.080 . By taking the rapidly z(q , t) converging simplified series expansion, we present the TFFs and the corresponding angular coefficients in the whole squared momentum transfer physical region. Furthermore, we display the semileptonic decay process D̄ 0 → π + eν̄ e differential decay widths and branching fraction with B( D̄ 0 → π + eν̄ e ) = 0.308 +0.155 −0.066 × 10 2 . The D̄ 0 → π + eν̄ e differential/total predictions for forward-backward asymmetry, q 2 -differential flat terms and lepton polarization asymmetry are also given. After considering the non-standard neutrino interactions, the predictions for the D + → π + ν ν̄ branching fraction is B(D + → π + ν ν̄) = −8 . 1.85 +0.93 −0.46 × 10 PACS numbers: 13.25.Hw, 11.55.Hx, 12.38.Aw, 14.40.Be I. INTRODUCTION The remarkable success of Standard Model (SM) in describing all current experimental information suggests that the search for deviations from it should focus on either higher energy scales or small effects in low energy observables.[1]. Normally, the flavour changing neutral current (FCNC) transitions in the SM are highly suppressed by the Glashow-Iliopoulos-Maiani (GIM) mechanism [2]. This GIM suppression has more strongly effective in charm sector compared to the down-type quarks in the bottom and strange sectors. Meanwhile, the suppression is responsible for the relatively small size of charm mixing and CP violation in the charm system [3– 5]. So the FCNC processes of D-meson decays into charged lepton pairs are always totally overshadowed by long-distance contributions [6, 7]. However, for D-meson FCNC decays into final states involving dineutrinos, such as D + → π + ν ν̄, long-distance contributions become insignificant and the short-distance contributions from Z- penguin and box diagrams are dominant, which results in the branching fraction at the level of 10 −16 in SM [8]. That makes D-meson FCNC decay involving dineutrinos a unique and clean probe to study the CP violation in the charm sector [9] and search for new physics beyond SM [10]. On the experimental side, LHCb Collaboration reported an evidence for the breaking of lepton univer- ∗ Electronic address: fuhb@gzmu.edu.cn † Electronic address: zhongtao1219@sina.com sality in bottom-quark FCNC decays to charged dielectrons and dimuons with a significance of 3.1σ [11], which suggests the possible presence of new physics contributions in the lepton sector [12]. The neutral charmed meson FCNC decay into dineutrinos pair have been observed by the BESIII Collaboration, which provide the upper limits at 10% confidence level for the D 0 → π 0 ν ν̄ branching fraction, i.e. 2.1 × 10 −4 in 2021 [13]. This value is much larger than the SM prediction both from the long-distance and short distance. Non-standard neutrino interactions (NSIs) [14–24], which described by four fermion operators of the (ν̄ α γν β )( f ¯ γf ) can narrow the gap between the experimental and the SM’s predictions. It has been shown that the NSIs would be compatible with the oscillation effects along with some new features in various neutrino searches [25–31]. Meanwhile, NSIs are thought to be well matched with the oscillation effects, along with new features in neutrino searches [32– 38]. The branching ratio of D + → π + ν ν̄ could be at the level 10 −8 . This approach can establish D + → π + ν ν̄ direct connection with D̄ 0 → π + eν̄ e , which lead to the motivation in this paper. The D → π transition form factors (TFFs) are the key component of semileptonic decays D̄ 0 → π + eν̄ e . There are some researches dealing with the D → π TFFs both from experimental and theoretical side. Experimentally, the Belle [39], BESIII [40], Babar [41], CLEO [42] Collaborations have measured the vector TFFs value at large D→π recoil region f + (0). Meanwhile, the Lattice QCD also give this value [43]. Theoretically, the D → π TFFs can be calculated by using the QCD light-cone sum rule (LCSR) [44], light-front quark model (LFQM) [45], combined heavy meson and chiral Lagrangian theory" 2401.03114v1,"GLISP: A Scalable GNN Learning System by Exploiting Inherent Structural Properties of Graphs 1 st Zhongshu Zhu 2 nd Bin Jing 3 rd Xiaopei Wan 4 th Zhizhen Liu Ant Group Hangzhou, China zhongshu.zzs@antgroup.com Ant Group Hangzhou, China jingbin.jb@antgroup.com Ant Group Hangzhou, China ranghou.wxp@antgroup.com Ant Group Hangzhou, China zhizhen.lzz@antgroup.com 5 th Lei Liang 6 th Jun zhou Ant Group Hangzhou, China leywar.liang@antgroup.com Ant Group Hangzhou, China jun.zhoujun@antfin.com Abstract—As a powerful tool for modeling graph data, Graph Neural Networks (GNNs) have received increasing attention in both academia and industry. Nevertheless, it is notoriously difficult to deploy GNNs on industrial scale graphs, due to their huge data size and complex topological structures. In this paper, we propose GLISP, a sampling based GNN learning system for industrial scale graphs. By exploiting the inherent structural properties of graphs, such as power law distribution and data locality, GLISP addresses the scalability and performance issues that arise at different stages of the graph learning process. GLISP consists of three core components: graph partitioner, graph sampling service and graph inference engine. The graph partitioner adopts the proposed vertex-cut graph partitioning algorithm AdaDNE to produce balanced partitioning for power law graphs, which is essential for sampling based GNN systems. The graph sampling service employs a load balancing design that allows the one hop sampling request of high degree vertices to be handled by multiple servers. In conjunction with the memory efficient data structure, the efficiency and scalability are effectively improved. The graph inference engine splits the K-layer GNN into K slices and caches the vertex embeddings produced by each slice in the data locality aware hybrid caching system for reuse, thus completely eliminating redundant computation caused by the data dependency of graph. Extensive experiments show that GLISP achieves up to 6.53× and 70.77× speedups over existing GNN systems for training and inference tasks, respectively, and can scale to the graph with over 10 billion vertices and 40 billion edges with limited resources. Index Terms—Machine Learning Techniques, Graph Graph Neural Network, Load Balancing edges [10], while the User-to-Item graph of Pinterest comprises billions of vertices and edges [3]. For these huge graphs, full-graph training of GNN is intractable due to the limitation of CPU/GPU memory. An alternative is sampling based minibatch training [11]–[13] where batches of small subgraphs are sampled from the original graph as model inputs. A variety of GNN frameworks have introduced such mini-batch training methods, including DGL [14], PyTorch Geometric [15], etc. However, subject to the hardware resources of a single machine, it is still challenging for these frameworks to handle very large scale graph data. Distributed frameworks such as DistDGL [14], [16], [17], GraphLearn [18], Euler [19], BGL [20] and ByteGNN [21] have been developed to tackle the challenge. Fig. 1 is the workflow of the distributed frameworks. The graph is first partitioned into multiple parts and a distributed graph sampling server is launched in conjunction with the trainer/predictor to generate subgraphs. After training, one can run inference on the whole graph to obtain the vertex embeddings for downstream tasks. Although the scale of graph data in the real world is growing rapidly, the size of the GNN model has not increased correspondingly due to the ubiquitous over smoothing problem [9], [22]–[24]. Extensive studies have revealed that deeply stacking GNN layers can lead to a substantial decrease in model performance [23], [25], [26]. Due to the huge gap between data size and model size, the bottleneck of graph learning tasks is mainly on the data side, such as graph partitioning and subgraph sampling. Therefore, we give an analysis of the limitations of the existing frameworks from the perspective of graph data: Graph partitioning is not optimized for sampling based graph learning task on power law graphs. As shown in Fig. 1, the big graph is first partitioned to multiple parts, each can be fitted into a single machine. There are two mainstream graph partition algorithms, i.e., edge-cut [27]–[29] and vertexcut [30], [31] partitioning. The edge-cut partitioning divides the vertices into disjoint parts while the vertex-cut partitioning I. I NTRODUCTION As a non-Euclidean data structure, graphs can capture complex relationships between entities and are widely used in modeling real world data, such as knowledge graphs [1], web graphs [2], and social networks [3]. In recent years, Graph Neural Networks (GNNs) [4]–[9] have achieved great success in various graph learning tasks, such as vertex classification and link prediction. However, the scale of real world graphs is typically large and growing rapidly, which poses a serious challenge to the application of GNNs. For example, the Taobao dataset contains millions of vertices and tens of millions of" 2401.03144v2,"Integrating Personalized Parsons Problems with Multi-Level Textual Explanations to Scaffold Code Writing Xinying Hou University of Michigan Ann Arbor, Michigan, USA xyhou@umich.edu Barbara J. Ericson University of Michigan Ann Arbor, Michigan, USA barbarer@umich.edu ABSTRACT Novice programmers need to write basic code as part of the learning process, but they often face difficulties. To assist struggling students, we recently implemented personalized Parsons problems, which are code puzzles where students arrange blocks of code to solve them, as pop-up scaffolding. Students found them to be more engaging and preferred them for learning, instead of simply receiving the correct answer, such as the response they might get from generative AI tools like ChatGPT. However, a drawback of using Parsons problems as scaffolding is that students may be able to put the code blocks in the correct order without fully understanding the rationale of the correct solution. As a result, the learning benefits of scaffolding are compromised. Can we improve the understanding of personalized Parsons scaffolding by providing textual code explanations? In this poster, we propose a design that incorporates multiple levels of textual explanations for the Parsons problems. This design will be used for future technical evaluations and classroom experiments. These experiments will explore the effectiveness of adding textual explanations to Parsons problems to improve instructional benefits. CCS CONCEPTS • Human-centered computing; • Applied computing → Interactive learning environments; Xu Wang University of Michigan Ann Arbor, Michigan, USA xwanghci@umich.edu fundamental programming concepts. In recent work, we explored providing Parsons problems as scaffolding for students who are struggling while writing code independently in Python [2–4]. By leveraging the power of LLMs, we designed and implemented a system called CodeTailor to provide multi-stage personalization through a Parsons problem to assist students with code writing (Figure 1). An initial study with 18 novice programming students showed that CodeTailor is engaging and benefits learning. However, some students reported challenges as they could not fully understand the meaning of some code blocks. Textual explanations could help users understand the program’s components, objectives, and structure [5]. They can assist beginners in learning more from the Parsons problem, providing an additional opportunity to read code blocks, understand the problem, and comprehend the solution. Hence, we propose a design to incorporate multiple levels of natural language explanations into CodeTailor. While explanations have been given with various programming learning materials or activities, there is limited research on integrating them with Parsons problems. Given the increasing interest and demonstrated effects of using Parsons problems to scaffold novice programmers’ learning, more research is required to explore the integration of explanations into Parsons problems. KEYWORDS Introductory Programming, Code Explanations, Parsons Problems, Code Writing, Scaffolding, Hint, Large Language Models ACM Reference Format: Xinying Hou, Barbara J. Ericson, and Xu Wang. 2024. Integrating Personalized Parsons Problems with Multi-Level Textual Explanations to Scaffold Code Writing. In Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 2 (SIGCSE 2024), March 20–23, 2024, Portland, OR, USA. ACM, New York, NY, USA, 2 pages. https://doi.org/10.1145/3626253. 3635606 1 INTRODUCTION One main goal of introductory programming courses is to develop basic coding skills. Although AI generation tools are now widely used in professional code development, it is still crucial for beginners to participate in code-writing activities to fully acquire Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). SIGCSE 2024, March 20–23, 2024, Portland, OR, USA © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0424-6/24/03. https://doi.org/10.1145/3626253.3635606 Figure 1: A write-code box (left) with a pop-up personalized Parsons problem as scaffolding (right). 2 SYSTEM DESIGN CodeTailor is a large language model (LLM)-powered system that provides real-time, on-demand, and multi-staged personalized Parsons problems to support students while writing code. It differs from existing hint systems for programming in that CodeTailor provides an active learning opportunity through the help. Specifically, students need to engage in problem-solving with the support" 2401.03201v2,"3DMIT: 3D MULTI-MODAL INSTRUCTION TUNING FOR SCENE UNDERSTANDING Zeju Li 1,2 , Chao Zhang 2 *, Xiaoyan Wang 2 , Ruilong Ren 3 , Yifan Xu 4 , Ruifei Ma 5 , Xiangde Liu 2 1 Beijing University of Posts and Telecommunications, 2 Beijing Digital Native Digital City Research Center, 3 Peking University, 4 Beihang University, 5 Beijing University of Science and Technology 1 lizeju0727@gmail.com, 2 zhangchao@bdnrc.org.cn ABSTRACT The remarkable potential of multi-modal large language models (MLLMs) in comprehending both vision and language information has been widely acknowledged. However, the scarcity of 3D scenes-language pairs in comparison to their 2D counterparts, coupled with the inadequacy of existing approaches in understanding of 3D scenes by LLMs, poses a significant challenge. In response, we collect and construct an extensive dataset comprising 75K instruction-response pairs tailored for 3D scenes. This dataset addresses tasks related to 3D VQA, 3D grounding, and 3D conversation. To further enhance the integration of 3D spatial information into LLMs, we introduce a novel and efficient prompt tuning paradigm, 3DMIT. This paradigm eliminates the alignment stage between 3D scenes and language and extends the instruction prompt with the 3D modality information including the entire scene and segmented objects. We evaluate the effectiveness of our method across diverse tasks in the 3D scene domain and find that our approach serves as a strategic means to enrich LLMs’ comprehension of the 3D world. Our code is available at https://github.com/staymylove/3DMIT. Index Terms— Multi-modal, 3D-LLMs, 3D Scene Understanding 1 Introduction In recent years, Large Language Models (LLMs) such as LLaMA [1], Vicuna [2] and MiniGPT [3] have emerged as powerful tools in natural language processing, demonstrating exceptional capabilities in tasks such as language understanding, generation, and translation. LLMs operate on the principle of pre-training followed by fine-tuning on specific tasks. This pre-training phase involves exposure to vast amounts of diverse text data, allowing the model to learn the intricacies of language. Fine-tuning can tailors the model’s knowledge to specific domains or tasks, enhancing its performance in targeted applications. In response to the remarkable capabilities demonstrated by LLMs, researchers have extended their scope to develop * Corresponding author. Multi-modal Language Models (MLLMs). These MLLMs capitalize on the prowess of existing LLMs to address multimodal applications, which involve the fusion of information from diverse sources, such as images and 3D point clouds. This integration of vision and language not only expands the utility of LLMs but also elevates them into potent tools for a range of tasks, covering visual captioning, visual question answering (VQA), and visual grounding. In recent studies [4–6], LLMs have been employed to comprehend the real 3D world. By leveraging 3D scene features and language prompts, researchers have successfully trained 3D multi-modal Language Models (3D-LLMs) for scene understanding. Traditional methods which excel in specific tasks, but these models often lack adaptability to other tasks. In contrast, 3D-LLMs utilize an unified architecture to perform diverse tasks, such as 3D VQA and 3D grounding, owing to the reasoning and understanding capabilities inherent in LLMs. The development of 3D-LLMs thus holds great promise. However, despite the optimistic outlook for 3D- LLMs, there are three challenges: 1) there exists a scarcity of high-quality 3D scene-language data when compared to the abundance of textual data associated with image and 3D object pairs. 2) the stage of alignment language with the features of 3D objects and scenes is a time-consuming and laborious process. It is inefficient to train 3D-LLMs in multiple stages. 3) if training with object-centric 3D instruction and only objects or only the global scene, the 3D-LLMs may not simultaneously grasp global scene information and fine-grained object information. In this paper, we construct a comprehensive 3D scenelanguage instruction dataset designed for multi-task applications and we propose 3DMIT, an efficient 3D multi-modal instructions tuning method to train LLMs [2] and MLLMs [7] for multi-task scene understanding by leveraging our presented dataset. Our instruction dataset builds upon existing datasets, including Scannet [8] and ScanRefer [9]. We utilize the original data and employ the GPT-API to generate highquality instructions and responses for both object-centric and global scene-related tasks. Our 3D instruction dataset encompasses 75K 3D scene-language pairs derived from 3D scene dataset: Scannet. Tasks addressed in the dataset include 3D VQA, 3D Captioning, 3D Grounding, and 3D Conversations." 2401.03223v2,"https://arxiv.org/abs/2401.03223 An intelligent sociotechnical systems (iSTS) framework: Toward a sociotechnically-based hierarchical human-centered AI approach Wei Xu, Senior Member IEEE; Zaifeng Gao Zhejiang University, China Insights • The human-centered AI (HCAI) approach and the sociotechnical systems (STS) theory share the same goal: ensuring that new technologies such as AI best serve humans in a sociotechnical environment. • HCAI practice needs to fully embrace sociotechnical systems thinking, while traditional STS needs to evolve to address the emerging characteristics of AI technology. • We propose a conceptual framework for intelligent sociotechnical systems (iSTS) to enhance traditional STS theory in the AI era. • Based on iSTS, we further propose a sociotechnicallybased hierarchical HCAI approach as a paradigmatic extension to existing HCAI practice, further advancing HCAI practice. Introduction Sociotechnical systems (STS) theory has enjoyed seven decades of development and application [1]. Its over-arching philosophy embraces the joint design and optimization between social subsystems (including organizational systems) and technical subsystems. It addresses the concerns that technical communities merely focus on technical and engineering solutions for real problems. We are in an era of artificial intelligence (AI); AI-based intelligent systems have brought benefits to humans but also have potential negative impacts. Accordingly, a humancentered AI (HCAI) has been proposed to address the ignorance of humans (e.g., needs, value) as a priority in the current technology-driven approach to intelligent systems [2][3]. Although HCAI also emphasizes social issues, such as ethical AI, current HCAI practice has not been systematically practiced from a broad sociotechnical perspective. On the other hand, traditional STS theory has primarily been used for dealing with mechanical and non-AI computing systems for many years, and it also needs evolution and enhancement to address the emerging challenges of AI technology. We argue that applying enhanced sociotechnical thinking to AI technology will help further enable HCAI in practice and address significant challenges in the AI era. Thus, the critical questions to be answered by this paper are: How should traditional STS theory be enhanced to fit the needs of the AI era? How can HCAI practice broaden its scope and impact from a perspective of sociotechnical thinking? The goal is to further promote HCAI by extending its thinking to a sociotechnical perspective and enhancing traditional STS theory to meet the needs of the AI * Corresponsing authors: Wei Xu, weixu6@yahoo.com; Zaifeng Gao, zaifengg@zju.edu.cn era; thus, we can maximize the benefits of AI technologies in society and organizations and achieve a win-win effect, eventually delivering truly human-centered AI systems. To this end, we first review the HCAI approach and STS theory and identify the challenges of implementing HCAI from an STS perspective. Then, we propose an intelligent sociotechnical systems (iSTS) framework based on the emerging characteristics of the sociotechnical environment in the AI era and discuss its implications for HCAI practice. Based on iSTS, we also propose a sociotechnically-based hierarchical HCAI approach and discuss its implications for future HCAI practice. Finally, we offer recommendations for future work on practicing the hierarchical HCAI approach. Human-centered AI and Sociotechnical Systems Approaches Human-centered AI (HCAI) HCAI is a design philosophy and approach that prioritizes humans in designing, developing, and deploying AI-based intelligent systems. HCAI emphasizes AI being designed and developed to amplify, augment, empower, and enhance human performance rather than harm and replace them [2] [3]. HCAI advocates the creation of AI systems that are deeply aligned with human values, needs, and ethical principles while building advanced AI technologies. The ultimate goal of HCAI is to develop human-centered AI technology (including AI-based intelligent systems, tools, and applications) to ensure that AI technology serves humans and enhances human capabilities rather than harming human beings and society. While we are enjoying the benefits brought by AI, incidents related to the technology have been reported. Research has shown that AI has limitations, such as vulnerability, potential bias, unexplainability, lack of causal models, autonomy-related human factors issues, and ethical issues [3][4]. The AI Accident Database has collected over a thousand AI-related accidents [5]. Furthermore, the AIAAIC database tracking AI abuse incidents shows that the number of incidents has increased 26-fold since 2012 [6]. Over the last several years, researchers have begun to take a human-centered perspective in developing AI technology, such as human-centered explainable AI [7] and human-centered machine learning [8]. Specifically, Shneiderman (2020) and Xu (2019) proposed their systematic HCAI frameworks[2][3]. In recent years, there has been more and more research on the concept of HCAI; several other scholars have also presented their HCAI frameworks or concepts during the early exploration phase for HCAI. HCAI represents a holistic approach to AI design, development, and deployment. For 1" 2401.03228v1,"R EFLECTED S CHR ÖDINGER B RIDGE FOR C ONSTRAINED G ENERATIVE M ODELING A P REPRINT Wei Deng ∗ , Yu Chen ∗ Machine Learning Research Morgan Stanley Nicole Tianjiao Yang ∗ , Hengrong Du ∗ , Qi Feng Department of Mathematics {Emory, Vanderbilt, Florida State} University Ricky T. Q. Chen Meta AI (FAIR) January 9, 2024 A BSTRACT Diffusion models have become the go-to method for large-scale generative models in real-world applications. These applications often involve data distributions confined within bounded domains, typically requiring ad-hoc thresholding techniques for boundary enforcement. Reflected diffusion models [Lou and Ermon, 2023] aim to enhance generalizability by generating the data distribution through a backward process governed by reflected Brownian motion. However, reflected diffusion models may not easily adapt to diverse domains without the derivation of proper diffeomorphic mappings and do not guarantee optimal transport properties. To overcome these limitations, we introduce the Reflected Schrödinger Bridge algorithm—an entropy-regularized optimal transport approach tailored for generating data within diverse bounded domains. We derive elegant reflected forward-backward stochastic differential equations with Neumann and Robin boundary conditions, extend divergence-based likelihood training to bounded domains, and explore natural connections to entropic optimal transport for the study of approximate linear convergence—a valuable insight for practical training. Our algorithm yields robust generative modeling in diverse domains, and its scalability is demonstrated in real-world constrained generative modeling through standard image benchmarks. 1 Introduction Iterative refinement is key to the unprecedented success of diffusion models. They exhibit statistical efficiency [Koehler et al., 2023] and reduced dimensionality dependence [Vono et al., 2022], driving innovation in image, audio, video, and molecule synthesis [Dhariwal and Nichol, 2022, Ho et al., 2022, Hoogeboom et al., 2022, Bunne et al., 2023]. However, diffusion models do not inherently guarantee optimal transport properties [Lavenant and Santambrogio, 2022] and often result in slow inference [Ho et al., 2020, Salimans and Ho, 2022, Lu et al., 2022]. Furthermore, the consistent reliance on Gaussian priors imposes limitations on the application potential and sacrifices the efficiency when the data distribution significantly deviates from the Gaussian prior. The predominant method for fast inference originates from the field of optimal transport (OT). Notably, the (static) iterative proportional fitting (IPF) algorithm [Kullback, 1968, Ruschendorf, 1995] addresses this challenge by employing alternating projections onto each marginal distribution. This algorithm has showcased impressive performance in low-dimensional contexts [Chen and Georgiou, 2016, Pavon et al., 2021, Caluya and Halder, 2022]. In contrast, the Schrödinger bridge (SB) problem [Léonard, 2014] introduces a principled framework for the dynamic treatment of entropy-regularized optimal transport (EOT) [Villani, 2003, Peyré and Cuturi, 2019]. Recent advances [De Bortoli et al., 2021, Chen et al., 2022b] have pushed the frontier of IPFs to (ultra-)high-dimensional generative models using deep neural networks (DNNs) and have generated straighter trajectories; Additionally, SBs based on Gaussian process [Vargas et al., 2021] demonstrates great promise in robustness and scalability; Bridge matching methods [Shi et al., 2023, Peluchetti, 2023] also offers promising alternatives for solving complex dynamic SB problems. ∗ Deng, Chen, Yang, and Du contributed equally to this work. Correspondence: weideng056@gmail.com" 2401.03233v2,"Convergence Rate Maximization for Split Learning-based Control of EMG Prosthetic Devices 1 st Matea Marinova 2 nd Daniel Denkovski 3 rd Hristijan Gjoreski Faculty of Electrical Engineering and Information Technologies Ss. Cyril and Methodius University Skopje, R. North Macedonia matea.marinova2000@gmail.com Faculty of Electrical Engineering and Information Technologies Ss. Cyril and Methodius University Skopje, R. North Macedonia danield@feit.ukim.edu.mk Faculty of Electrical Engineering and Information Technologies Ss. Cyril and Methodius University Skopje, R. North Macedonia hristijang@feit.ukim.edu.mk 4 th Zoran Hadzi-Velkov 5 th Valentin Rakovic Faculty of Electrical Engineering and Information Technologies Ss. Cyril and Methodius University Skopje, R. North Macedonia zoranhv@feit.ukim.edu.mk Faculty of Electrical Engineering and Information Technologies Ss. Cyril and Methodius University Skopje, R. North Macedonia valentin@feit.ukim.edu.mk Abstract—Split Learning (SL) is a promising Distributed Learning approach in electromyography (EMG) based prosthetic control, due to its applicability within resource-constrained environments. Other learning approaches, such as Deep Learning and Federated Learning (FL), provide suboptimal solutions, since prosthetic devices are extremely limited in terms of processing power and battery life. The viability of implementing SL in such scenarios is caused by its inherent model partitioning, with clients executing the smaller model segment. However, selecting an inadequate cut layer hinders the training process in SL systems. This paper presents an algorithm for optimal cut layer selection in terms of maximizing the convergence rate of the model. The performance evaluation demonstrates that the proposed algorithm substantially accelerates the convergence in an EMG pattern recognition task for improving prosthetic device control. Index Terms—Convergence rate maximization, Optimal cut layer, Split learning, Prosthetic control, Electromyography, Deep learning I. I NTRODUCTION Centralized machine learning involves transmitting a vast amount of raw data, which may cause both increased latency and potential network congestion. Distributed learning techniques, such as Federated Learning and Split Learning, actively address these issues by conducting distributed training without transmission of raw data between the clients and the server [1]. Therefore, these distributed learning approaches are adequate for scenarios involving resource-constrained and time-varying systems. FL is a distributed learning paradigm in which clients perform collaborative training of a global model. Each of the participating clients maintains a copy of the complete model and trains it using the local dataset. Subsequently, the central entity receives these local models in order to generate a global one. This implies that in FL, the server performs low-demanding tasks in terms of computation, which leads to suboptimal resource utilization, assuming that it has higher computational capabilities compared to the clients [2]. SL is another distributed learning strategy that has emerged as an alternative, which successfully resolves the considered challenges faced by FL. In SL, the model is partitioned into separate client-side and server-side segments at a layer known as cut layer or split layer. By having the server process a larger fraction of the model, its resources are employed more efficiently [3]. Furthermore, the training involves transmission of the cut layer’ activations and gradients only rather than the entire model parameters. This fundamental property provides further privacy preservation compared to FL by restricting the entities’ access only to their designated sub-networks. As such, SL is a promising approach within domains where the involved clients require a higher degree of privacy, for example, in healthcare [4]. Employing SL is also suitable in scenarios featuring clients with limited computational resources. The wearable devices utilized in both EMG-based prosthetic control and Human Activity Recognition (HAR) belong to this category. Specifically, a significant issue caused by the low processing power of EMG controlled prostheses is their inability to incorporate large models. This property makes the application of deep learning and FL impractical in such systems. Moreover, implementing small models does not satisfy the strict requirements regarding the recognition accuracy. Deployment of SL can potentially solve the specified problem by assigning only a small model segment to the prosthetic device. One of the primary challenges in SL is choosing the cut layer, as this decision can have a profound impact on the effectiveness of the deployed ML model. In real-world deployments, system resources are limited and exhibit fre-" 2401.03236v1,"Challenges of Data-Driven Simulation of Diverse and Consistent Human Driving Behaviors Kalle Kujanpää ∗‡ Daulet Baimukashev † Shibei Zhu ∗‡ Shoaib Azam †‡ Farzeen Munir †‡ Gokhan Alcan † Ville Kyrki †‡ (kalle.kujanpaa, daulet.baimukashev, shibei.zhu, shoaib.azam, farzeen.munir, gokhan.alcan, ville.kyrki)@aalto.fi ∗ Department of Computer Science † Department of Electrical Engineering and Automation ‡ Finnish Center for Artificial Intelligence FCAI Aalto University Abstract Building simulation environments for developing and testing autonomous vehicles necessitates that the simulators accurately model the statistical realism of the real-world environment, including the interaction with other vehicles driven by human drivers. To address this requirement, an accurate human behavior model is essential to incorporate the diversity and consistency of human driving behavior. We propose a mathematical framework for designing a data-driven simulation model that simulates human driving behavior more realistically than the currently used physics-based simulation models. Experiments conducted using the NGSIM dataset validate our hypothesis regarding the necessity of considering the complexity, diversity, and consistency of human driving behavior when aiming to develop realistic simulators. Introduction Modeling human behavior is pivotal in building intelligent learning systems, offering profound insights into how humans interact, behave, and respond within complex environments. This understanding is particularly crucial in the context of autonomous vehicle (AV) simulation (Feng et al. 2021). Modeling and simulating human behaviors for building a data-driven simulation environment for autonomous vehicles is challenging due to human behaviors’ high variability and diversity (Fuchs, Passarella, and Conti 2022; Chen et al. 2023). As the simulation provides a cost-effective way to evaluate the performance of autonomous vehicles, achieving statistical realism in such a simulation environment remains a persistent challenge in the field, necessitating sophisticated modeling techniques to incorporate human behaviors. A key component of creating a high-fidelity driving environment is precisely modeling human behaviors. There have been notable efforts in the literature to develop autonomous driving simulators, propelled by rapid advancements in artificial intelligence, computer graphics and vision, and high-performance computing devices. Simulators like CARLA (Dosovitskiy et al. 2017), Airsim (Shah et al. 2018), DriveSim 1 , Wayve Infinity Simulator 2 , and Simula- Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 1 https://developer.nvidia.com/drive/simulation 2 https://wayve.ai/thinking/introducing-wayve-infinity- tionCity 3 provide models for accurate vehicle dynamics and photo-realistic scenarios. However, these simulators mainly focus on vehicle dynamics and often overlook the driving environment, particularly the behavior of non-player characters, such as background road users. The behavior of these background vehicles is typically either replayed from logs or simulated using heuristic rules, creating a disparity between the simulation and the real-world driving environment. Furthermore, the microscopic simulation environments mimic the interaction between agents using physics-driving models, and hand-crafted rules such as car-following (Treiber, Hennecke, and Helbing 2000), gap-acceptance (Mahmassani and Sheffi 1981), and lane-changing models (Kesting, Treiber, and Helbing 2007; Erdmann 2015) often lack the diversity to model the human behavior for simulated agents. Therefore, these physics and theory-based driving models can hardly be generalized and scaled to capture the underlying diversity of human behavior for driving. To this end, in this work, we focus our studies on building a high-fidelity simulation environment statistically representative of the real-world driving environment by modeling human driving behaviors. We aim to develop a data-driven simulation model that captures the subtle complexities and the wide range of variability inherent in human driving behavior in various scenarios and conditions. In this work, we raise the following research questions open to discussion: 1. How can we accurately model the inherently unpredictable and stochastic nature of real human driving behavior? 2. Considering the diverse nature of human driving behavior, how can this diversity and variability, especially in different human driving styles, be effectively incorporated into the simulation environment? 3. How to incorporate the temporal consistency of human driving behavior in simulations? Related Work Human driving behavior is extensively studied, encompassing a broad range of problem definitions, assumptions in modeling, and diverse methodologies related to modeling human driving behavior (Brown, Driggs-Campbell, and simulator/ 3 https://waymo.com/blog/2021/06/SimulationCity.html" 2401.03238v1,"Proceedings of Machine Learning Research 1:1–13, 2024 AAAI 2024 Workshop AI4ED Using Large Language Models to Assess Tutors’ Performance in Reacting to Students Making Math Errors Sanjit Kakarla Danielle R. Thomas Jionghao Lin Shivang Gupta Kenneth R. Koedinger Sanjit.Kakarla@gmail.com drthomas@cmu.edu jionghao@cmu.edu Shivang@cmu.edu koedinger@cmu.edu Human-Computer Interaction Institute Carnegie Mellon University 5000 Forbes Ave. Pittsburgh, PA 15213, USA Abstract Research suggests that tutors should adopt a strategic approach when addressing math errors made by low-efficacy students. Rather than drawing direct attention to the error, tutors should guide the students to identify and correct their mistakes on their own. While tutor lessons have introduced this pedagogical skill, human evaluation of tutors applying this strategy is arduous and time-consuming. Large language models (LLMs) show promise in providing real-time assessment to tutors during their actual tutoring sessions, yet little is known regarding their accuracy in this context. In this study, we investigate the capacity of generative AI to evaluate real-life tutors’ performance in responding to students making math errors. By analyzing 50 real-life tutoring dialogues, we find both GPT-3.5-Turbo and GPT-4 demonstrate proficiency in assessing the criteria related to reacting to students making errors. However, both models exhibit limitations in recognizing instances where the student made an error. Notably, GPT-4 tends to overidentify instances of students making errors, often attributing student uncertainty or inferring potential errors where human evaluators did not. Future work will focus on enhancing generalizability by assessing a larger dataset of dialogues and evaluating learning transfer. Specifically, we will analyze the performance of tutors in real-life scenarios when responding to students’ math errors before and after lesson completion on this crucial tutoring skill. Keywords: tutoring; tutor evaluation; real-time feedback; math learning; LLMs; GPT-4 1. Introduction Personalized tutoring remains a consistently effective academic intervention, significantly benefiting student learning (Kraft and Falken, 2021; Reynolds and McDonell, 2021). However, the scarcity of human tutors and lack of essential skills among those available pose a challenge (Thomas et al., 2023). Recent advancements in pre-trained large language models (LLMs) offer promise in real-time assessment of tutor performance (Chen et al., 2022). This present work investigates generative AI’s capacity to evaluate tutors’ effectiveness in addressing students’ making math errors. Traditionally, intelligent tutoring systems employing model tracing methods have a reputation for swiftly and directly intervening when students make mistakes (Merrill et al., 1992, 1995; Mathan and Koedinger, 2018). In contrast, expert human tutors have demonstrated success through subtler, indirect guidance, © 2024 S. Kakarla, D.R. Thomas, J. Lin, S. Gupta & K.R. Koedinger." 2401.03251v1,"IEEE/ACM TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. .., NO. .., .... .. 1 TeLeS: Temporal Lexeme Similarity Score to Estimate Confidence in End-to-End ASR Nagarathna Ravi*, Thishyan Raj T*, Vipul Arora Abstract—Confidence estimation of predictions from an Endto-End (E2E) Automatic Speech Recognition (ASR) model benefits ASR’s downstream and upstream tasks. Class-probability-based confidence scores do not accurately represent the quality of overconfident ASR predictions. An ancillary Confidence Estimation Model (CEM) calibrates the predictions. State-of-the-art (SOTA) solutions use binary target scores for CEM training. However, the binary labels do not reveal the granular information of predicted words, such as temporal alignment between reference and hypothesis and whether the predicted word is entirely incorrect or contains spelling errors. Addressing this issue, we propose a novel Temporal-Lexeme Similarity (TeLeS) confidence score to train CEM. To address the data imbalance of target scores while training CEM, we use shrinkage loss to focus on hard-to-learn data points and minimise the impact of easily learned data points. We conduct experiments with ASR models trained in three languages, namely Hindi, Tamil, and Kannada, with varying training data sizes. Experiments show that TeLeS generalises well across domains. To demonstrate the applicability of the proposed method, we formulate a TeLeS-based Acquisition (TeLeS-A) function for sampling uncertainty in active learning. We observe a significant reduction in the Word Error Rate (WER) as compared to SOTA methods. Index Terms—Confidence Estimation, Automatic Speech Recognition, Human-in-the-Loop Annotation, Active Learning, Pseudo-labeling I. I NTRODUCTION ALIBRATING an End-to-End (E2E) Automatic Speech Recognition (ASR) model’s predictions using confidence scores can aid downstream and upstream tasks [1] [2] [3] such as domain adaptation, active learning, keyword spotting, dialogue systems, system combination, machine translation, information retrieval, semi-supervised learning, smart speakers, automatic error correction, dis-fluency detection, speaker adaptation, and enhancing the ASR dataset with diverse set of audio-transcript pairs. The Confidence Estimation Model (CEM) can be an algorithm based on statistics [4] or an auxiliary Machine Learning (ML) model [5]. Statistical confidence measures include classprobability [6] [7] of the output label and entropy [4] of the class-probabilities. These measures assume that a welllearned model can accurately project the distance between the estimate and the label boundaries. However, as shown in Figure 1 (Class-probability-based confidence scores of ASR model trained using IISc-Mile-Tamil train dataset and tested on IISc-Mile-Tamil test-set [8] [9] [10]), there is a substantial C This paper was produced by the MADHAV Lab ASR research group in IIT Kanpur (e-mail: {rathna, thishyan20, vipular}@iitk.ac.in). *-Equal Contribution Manuscript received .... .., ....; revised .... .., ..... Fig. 1: Class-prob. based Scores of Correct and Wrong Words overlap between the SoftMax scores of accurate and incorrect predictions due to the general overconfidence nature of neural models. Several State-Of-The-Art (SOTA) [5] [11] methods train an auxiliary CEM model using binary labels: score ’1’ is assigned to the correct label, and score ’0’ is set to the incorrect label as target values. Levenshtein alignment between the actual and hypothesis transcripts aids in identifying if the label is correct or wrong. However, using binary labels does not expose the predictions’ granular information, such as the temporal alignment between the reference and the hypothesis. It also does not reveal whether the predicted word is entirely incorrect or contains spelling errors. Consider the example in which character alignments determine the target confidence scores of characters. When the input does not share the domain as the training data, alignments are ambiguous, as seen in the example (/ denotes the token boundary), Ref.: सोना भी है (/s/o/n/a/ /bh/ee/ /h/ai/) Hyp.: बसा आना सच भी है (/ba/s/a/ /aa/n/a/ /sa/ch/ /bh/ee/ /h/ai/) Target Scores: [0, 1, 0, 0, 0, 1, 1, 0, 0, 0, 1, 1, 1, 1, 1, 1] In the preceding example, the reference’s first character (s) is aligned with the second character (s) in the hypothesis. Similarly, the third character (n) is aligned with the sixth character (n). However, the aligned characters are different, which shows that the method does not utilize temporal information. Consider yet another example which assigns binary labels to words, Ref.: हमारे लिए प्रकाशित खुशी है (/hamaare/ /lie/ /prakaashit/ /khushee/ /hai/) Hyp.: हमारे लि अप्रताशित खुशी हैये (/hamaare/ /li/ /aprataashit/ /khushee/ /haiye/) Target Scores: [1, 0, 0, 1, 0] The second word suffers one deletion. However, since the desired score is zero, the ancillary CEM attempts to penalize" 2401.03254v1,"This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics 1 Preferential orientation of floaters drifting in water waves Wietze Herreman 1 †, Basile Dhote 1 , Lucile Danion 1 , and Frédéric Moisy 1 1 Université Paris-Saclay, CNRS, FAST, 91405, Orsay, France. (Received xx; revised xx; accepted xx) Elongated floaters drifting in propagating water waves slowly rotate towards a preferential state of orientation. Short and heavy floaters tend to align longitudinally, along the direction of wave propagation, whereas long and light floaters align transversely, parallel to the wave crests and troughs. We investigate this phenomenon for homogeneous parallelepiped floaters by combining laboratory experiments with numerical simulations and asymptotic theory. For floaters small with respect to wavelength and for low amplitude waves, we show that the floater orientation is controlled by the non-dimensional number F = kL 2 x /βL z , with k is the wavenumber, β the floater-to-water density ratio, and L x and L z the floater length and thickness. Theory places the longitudinal-transverse transition at the critical value F c = 60, in fair agreement with the experiments. Using a simplified physical model, we elucidate the physical origin of the preferential orientation. Through its motion, the floater probes the velocity gradients along its surface. Next to a small mean displacement (Stokes drift), this results in a net torque which, for short floaters, always favors the longitudinal orientation. This net torque arises from a phase correlation between the instantaneous buoyancy torque and the instantaneous yaw angle of the floater, a mechanism analogous to the Kapitza pendulum. The transverse equilibrium of longer floaters has a different origin and arises from the variation of the submersion depth along their long axis. This varying submersion significantly increases the torque in the trough positions, when the tips are more submersed, and always pushes towards the transverse orientation. Key words: 1. Introduction The motion of a floating body in gravity waves is a classical problem in fluid mechanics with evident applications in the domain of naval engineering (Faltinsen 1993; Newman 2018; Falnes & Kurniawan 2020). At first order in wave magnitude, waves cause harmonic oscillations of the floating body in all six degrees of freedom, both linear (heave, surge, sway) and angular (pitch, roll, yaw). At second order, waves also cause a mean drift force and yaw moment on the body that affect surge, sway and yaw angle on long time-scales. For small isotropic floaters, this mean motion reduces to the classical Stokes drift in the direction of the wave propagation (Stokes 1847; van den Bremer & Breivik 2018; Calvert et al. 2021), a problem that received considerable interest for the modeling of pollutant transport in the oceans (Suaria et al. 2021; Yang et al. 2023; Sutherland et al. 2023). † Email address for correspondence: wietze.herreman@universite-paris-saclay.fr" 2401.03284v1,"1 A General and Scalable Method for Optimizing Real-Time Systems Sen Wang, Graduate Student Member, IEEE, Dong Li, Shao-Yu Huang, Xuanliang Deng, Ashrarul H. Sifat, Changhee Jung, Senior Member, IEEE, Ryan Williams, Member, IEEE, Haibo Zeng Abstract—In real-time systems optimization, designers often face a challenging problem posed by the non-convex and noncontinuous schedulability conditions, which may even lack an analytical form to understand their properties. To tackle this challenging problem, we treat the schedulability analysis as a black box that only returns true/false results. We propose a general and scalable framework to optimize real-time systems, named Numerical Optimizer with Real-Time Highlight (NORTH). NORTH is built upon the gradient-based activeset methods from the numerical optimization literature but with new methods to manage active constraints for the nondifferentiable schedulability constraints. In addition, we also generalize NORTH to NORTH+, to collaboratively optimize certain types of discrete variables (e.g., priority assignments, categorical variables) with continuous variables based on numerical optimization algorithms. We demonstrate the algorithm performance with two example applications: energy minimization based on dynamic voltage and frequency scaling (DVFS), and optimization of control system performance. In these experiments, NORTH achieved 10 2 to 10 5 times speed improvements over state-ofthe-art methods while maintaining similar or better solution quality. NORTH+ outperforms NORTH by 30% with similar algorithm scalability. Both NORTH and NORTH+ support blackbox schedulability analysis, ensuring broad applicability. Index Terms—Real-Time System, System Design, Optimization, Numerical Optimization, Blacksbox Schedulability Analysis. I. I NTRODUCTION M Any impressive scheduling algorithms and schedulability analysis techniques have been developed by the realtime systems community in recent years. However, performing optimization with these schedulability constraints is challenging because these constraints often have non-differentiable and/or non-convex forms, such as the ceiling function for calculating response time calculation [1]. Some other schedulability analyses are even more challenging because they do not have an analytical form, such as those based on demand bound functions [2], real-time calculus [3], abstract event model interfaces [4], and timed automata [5], [6]. Optimizing real-time systems faces the additional challenge of their ever-increasing complexity. The functionality of modern real-time systems is rapidly expanding [7], and there may be hundreds of software tasks [8] and even more runnable in automotive systems. What is also becoming more complex This work is partially supported by NSF Grants No. 1812963 and 1932074. Sen Wang, Dong Li, Xuanliang Deng, Ryan Williams, and Haibo Zeng are with Virginia Tech, Blacksburg, USA; Shao-Yu Huang and Changhee Jung are with Purdue University, West Lafayette, USA. contact emails: swang666@vt.edu, hbzeng@vt.edu. is the underlying hardware and software systems, such as heterogeneous computation platforms, specialized hardware accelerators, and domain-specific operating systems. The existing real-time system optimization algorithms cannot adequately address the above two challenges as they lack scalability and/or applicability. For example, it is usually challenging to model complicated schedulability constraints in standard mathematical optimization frameworks. Although some customized optimization frameworks [9]–[11] have been designed for real-time systems, these frameworks usually rely on special assumptions, such as sustainable schedulability analysis 1 with respect to the design variables (e.g., periods [9] and worst-case execution times (WCETs) [10], [11]). Such special assumptions may not hold in certain schedulability analysis [6] or could be challenging to verify in general schedulability analysis. This paper proposes a new optimization framework for realtime systems with black box schedulability analysis that only returns true/false results. The framework, called Numerical Optimizer with Real-Time Highlight (NORTH), utilizes numerical optimization methods for real-time systems optimization. Compared to alternative optimization frameworks such as Integer Linear Programming (ILP), numerical optimization methods are more general (they work with objective functions or constraints of many forms) and have good scalability for large-scale optimization problems. Unfortunately, existing numerical methods cannot be directly applied to optimize real-time systems. For example, gradient-based methods often rely on well-defined gradient information, but many schedulability constraints are not differentiable. Although numerical gradients [14] can be utilized to obtain gradient information, these methods may still suffer from poor solution quality when applied to non-differentiable problems. Additionally, gradient-free methods usually have worse run-time efficiency and performance than gradientbased methods [14]. Targeted at the issues above, we modify the gradient-based method to avoid evaluating the gradient of schedulability constraints and then propose a novel technique, variable elimination (VE), to enable searching for better solutions along the boundary of schedulable solution space. Unlike the classical gradient-projection algorithms, which have high computation costs for general nonlinear constraints [14], VE uses simple heuristics (fixing the values of some variables) to achieve 1 A schedulable task set should remain schedulable when its parameters become “better”, e.g., shorter WCET or longer period [12], [13]." 2401.03299v1,"Discrete delayed perturbation of Mittag-Leffler function and its application to linear fractional delayed difference system Mustafa AYDIN a,∗ , Nazim I. MAHMUDOV b,c a Department of Medical Services and Techniques, Muradiye Vocational School, Van Yuzuncu Yil University, Van , Turkey b Department of Mathematics, Eastern Mediterranean University, Famagusta 99628 T.R. North Cyprus, Turkey c Research Center of Econophysics, Azerbaijan State University of Economics(UNEC), Istiqlaliyyat Str. 6., Baku 1001, Azerbaijan Abstract The linear nonhomogeneous fractional difference system with constant coeffi- cients is introduced. An explicit solution to the system is acquired by proposing a newly discrete retarded perturbation of the nabla Mittag-Leffer-type function containing such matrix equations that provide non-permutability. A couple of special cases obtained from our results are discussed. Keywords: discrete delayed perturbation, fractional difference, nabla Mittag-Leffler, linear system, time-delay 1. Introduction In the last two decades, fractional differential equations have been proved to be a powerful tool for lots of phenomena in the scientific world together with the usage of the areas such as mathematical physics[1][2], biology, computed tomography, diffusion, biophysics, signal process, engineering, electrochemistry, control theory[3]-[8], etc. Retardation is mostly related to chemical processes, economics, heredity in population, hydraulic and electrical networks. Generally a hallmark of the cor- ∗ Corresponding author Email address: m.aydin@yyu.edu.tr (Mustafa AYDIN) Preprint submitted to Journal January 9, 2024" 2401.03302v2,"1 Realism in Action: Anomaly-Aware Diagnosis of Brain Tumors from Medical Images Using YOLOv8 and DeiT Seyed Mohammad Hossein Hashemi, Leila Safari*, Amirhossein Dadashzade Taromi Abstract—In the field of medical sciences, reliable detection and classification of brain tumors from images remains a formidable challenge due to the rarity of tumors within the population of patients. Therefore, the ability to detect tumors in anomaly scenarios is paramount for ensuring timely interventions and improved patient outcomes. This study addresses the issue by leveraging deep learning (DL) techniques to detect and classify brain tumors in challenging situations. The curated data set from the National Brain Mapping Lab (NBML) comprises 81 patients, including 30 Tumor cases and 51 Normal cases. The detection and classification pipelines are separated into two consecutive tasks. The detection phase involved comprehensive data analysis and pre-processing to modify the number of image samples and the number of patients of each class to anomaly distribution (9 Normal per 1 Tumor) to comply with real world scenarios. Next, in addition to common evaluation metrics for the testing, we employed a novel performance evaluation method called Patient to Patient (PTP), focusing on the realistic evaluation of the model. In the detection phase, we fine-tuned a YOLOv8n detection model to detect the tumor region. Subsequent testing and evaluation yielded competitive performance both in common evaluation metrics and PTP metrics. Furthermore, using the Data Efficient Image Transformer (DeiT) module, we distilled a Vision Transformer (ViT) model from a fine-tuned ResNet152 as a teacher in the classification phase. This approach demonstrates promising strides in reliable tumor detection and classification, offering potential advancements in tumor diagnosis for real-world medical imaging scenarios. Index Terms—Anomaly distribution, Brain tumors, Tumor diagnosis, Medical imaging, ResNet152, Vision Transformer, YOLOv8n I. I NTRODUCTION R eliability and precision are pivotal factors in the context of brain tumor diagnosis. The brain, a vital organ situated within the human body that oversees the entire nervous system [1]. Consequently, any deviations within the brain can significantly impact human health. Among these anomalies, brain tumors stand out as particularly severe. Brain tumors involve the uncontrolled and aberrant growth of cells within the brain. These tumors can be categorized into two groups: primary tumors and secondary tumors. Primary tumors emerge within S.M.H. H. is a B.Sc. graduate in Computer Engineering from University of Zanjan. He is currently a prospective graduate student. (e-mail: 1mohammad0hossein1@gmail.com. *Correspondence: L. S. is a faculty of Computer Engineering Department at University of Zanjan, Zanjan, Iran. (e-mail: lsafari@znu.ac.ir). A. D.T. is a B.Sc. graduate in Computer Engineering from University of Zanjan. He is currently a M.Sc. student in Artificial Intelligence at Institute for Advanced Studies in Basic Sciences, Zanjan, Iran. (e-mail: dadashzadeh@iasbs.ac.ir). the brain tissue itself, whereas secondary tumors stem from other areas of the body, migrating to the brain tissue through the bloodstream [2]. Glioma and Meningioma are two severe types of brain tumors among primary tumors. If not identified in their early stages, these tumors can lead to fatal outcomes for patients [3]. As the World Health Organization (WHO) outlined, brain tumors are categorized into four grades. Grade 1 and grade 2 tumors correspond to less aggressive forms (such as Meningioma), whereas grade 3 and grade 4 tumors encompass more aggressive varieties (like Glioma) [1]. In the context of the detection and monitoring of brain tumors, nowadays, with huge advancements in the medical imaging field, there are various imaging technologies used by radiologists and doctors to observe internal human body organs, such as computed tomography (CT), positron emission tomography (PET), and magnetic resonance imaging (MRI). Among the array of modalities available, MRI emerges as the foremost selection for non-invasive brain tumor detection and evaluation. This preference is owed to its remarkable resolution and superior ability to provide contrasting details of soft tissues [4]. Manually scrutinizing these images is a laborious and demanding endeavor. Moreover, it is susceptible to errors, particularly given the surge in patient volumes and the relatively low incidence rate of brain tumors [5], [6]. This combination makes detecting and categorizing these tumors a formidable challenge. In response, our objective is to formulate a resilient, anomaly-conscious, computer-aided, automated solution. This approach aims to enhance the accuracy of clinical brain tumor diagnosis. The initial challenge in the study of tumor diagnosis lies in the significant variability of tumors in terms of their shapes, textures, and contrasts, both within and between cases [7]. Within the realm of tumor diagnosis, scientists have harnessed a diverse array of machine learning (ML) techniques. These include Support Vector Machines (SVMs), K-Nearest Neighbor (KNN), Decision Trees, and Naive Bayes. Furthermore, in the context of deep learning algorithms, they employed a diverse array of methods, including Convolutional Neural Networks (CNNs), VGGNets [8], GoogleNet [9], and ResNets [10]. These advanced algorithms have been instrumental in assisting with tumor diagnosis. Nevertheless, in the context of brain tumor diagnosis, a significant challenge persists, stemming from the inherent rarity of brain tumor occurrences within a larger population. Based on the most recent statistical data released by Johns Hopkins Medicine, the incidence rate of brain and nervous" 2401.03306v1,"MOTO: Offline Pre-training to Online Fine-tuning for Model-based Robot Learning Rafael Rafailov ˚: John D. Martin ; Kyle Hatch ˚: Victor Kolev : Mariano Phielipp ; Chelsea Finn : Stanford University ; Intel AI Labs {rafailov,khatch}@cs.stanford.edu : Abstract: We study the problem of offline pre-training and online fine-tuning for reinforcement learning from high-dimensional observations in the context of realistic robot tasks. Recent offline model-free approaches successfully use online fine-tuning to either improve the performance of the agent over the data collection policy or adapt to novel tasks. At the same time, model-based RL algorithms have achieved significant progress in sample efficiency and the complexity of the tasks they can solve, yet remain under-utilized in the fine-tuning setting. In this work, we argue that existing model-based offline RL methods are not suitable for offlineto-online fine-tuning in high-dimensional domains due to issues with distribution shifts, off-dynamics data, and non-stationary rewards. We propose an on-policy model-based method that can efficiently reuse prior data through model-based value expansion and policy regularization, while preventing model exploitation by controlling epistemic uncertainty. We find that our approach successfully solves tasks from the MetaWorld benchmark, as well as the Franka Kitchen robot manipulation environment completely from images. To the best of our knowledge, MOTO is the first method to solve this environment from pixels. 2 Keywords: Model-based reinforcement learning, offline-to-online fine-tuning, high-dimensional observations 1 Introduction Pre-training and fine-tuning as a paradigm has been instrumental to recent advances in machine learning. In the context of reinforcement learning, this takes the form of pre-training a policy with offline learning [1, 2], i.e. when only a static dataset of environment interactions is available, and then subsequently fine-tuning that policy with a limited amount of online fine-tuning. We study the offline-to-online fine-tuning problem with a focus on high-dimensional pixel observations, as found in real-world applications, such as robotics. Prior works for offline-to-online fine-tuning often train a policy with model-free offline RL objectives throughout both the offline and online phases [3, 4, 5, 6, 7, 8]. While this approach addresses the challenge of distribution shift in the offline phase, it leads to excessive conservatism in the online phase, since the policy cannot balance offline conservatism with online exploration. Moreover, model-free works are lacking in generalization abilities, and can even under-perform when trained on non task-specific data [9, 10]. ˚ 2 Equal contribution Additional details are available on our project website: https://sites.google.com/view/mo2o/ 7th Conference on Robot Learning (CoRL 2023), Atlanta, USA." 2401.03319v1,"Comparison of Microservice Call Rate Predictions for Replication in the Cloud Narges Mehran ★ , Arman Haghighi † , Pedram Aminharati ★ , Nikolay Nikolov ‡ Ahmet Soylu § , Dumitru Roman ‡§ , Radu Prodan ★ ★ Alpen-Adria-Universität Klagenfurt, Austria † Azad University, Science and Research Branch, Tehran, Iran ‡ SINTEF AS, Oslo, Norway § OsloMet - Oslo Metropolitan University, Oslo, Norway {narges.mehran,radu.prodan}@aau.at armanhku@gmail.com {nikolay.nikolov,dumitru.roman}@sintef.no ahmet.soylu@oslomet.no ABSTRACT 1 Today, many users deploy their microservice-based applications with various interconnections on a cluster of Cloud machines, subject to stochastic changes due to dynamic user requirements. To address this problem, we compare three machine learning (ML) models for predicting the microservice call rates based on the microservice times and aiming at estimating the scalability requirements. We apply the linear regression (LR), multilayer perceptron (MLP), and gradient boosting regression (GBR) models on the Alibaba microservice traces. The prediction results reveal that the LR model reaches a lower training time than the GBR and MLP models. However, the GBR reduces the mean absolute error and the mean absolute percentage error compared to LR and MLP models. Moreover, the prediction results show that the required number of replicas for each microservice by the gradient boosting model is close to the actual test data without any prediction. The recent shift towards the increasing number of microservicebased applications in the Cloud-native infrastructure brings new scheduling, deployment, and orchestration challenges [1], such as scaling out overloaded microservices in response to increasing load. KEYWORDS Cloud computing, microservice, replication, linear regression, multilayer perceptron, gradient boosting. ACM Reference Format: Narges Mehran ★ , Arman Haghighi † , Pedram Aminharati ★ , Nikolay Nikolov ‡ , Ahmet Soylu § , Dumitru Roman ‡§ , Radu Prodan ★ . 2024. Comparison of Microservice Call Rate Predictions for Replication in the Cloud. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 7 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 2023 ACM/IEEE. Personal use of this material is permitted. Permission from ACM/IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn INTRODUCTION Research problem. inspected in this work, extends our previous work [2], where we explored microservice scheduling on provisioned resources. In [2], we did not inspect the scalability requirements of the containerized microservices by prediction models considering different request arrival rates from end-users acting as producers [3]. Traditional microservice scaling methods [4, 5] focus on the resource or application processing metrics without predicting the stochastic changes in user requirements, such as dynamic request rates. Example. tabulated in Table 1 presents an example involving three producers calling three microservices deployed on three resources. In this scenario, the microservices experience varying call rates initiated by the producers. Every producer request leads to interactions with its corresponding microservice on the specific resource within a specific time. Typically, microservices with higher execution times necessitate horizontal scalability to accommodate the call rate. In other words, a direct correlation exists between the microservice time and call rate, motivating the need to explore prediction models addressing their horizontal scaling [6]. Table 1 shows that during a 2 s execution, the microservices 𝑚 0 , 𝑚 1 , and 𝑚 2 receive the following number of calls: 𝑚 0 : 𝑚 1 : 𝑚 2 : 2 s · 2 calls/s = 4 calls; 2 s · 2 calls/s = 4 calls; 2 s · 3 calls/s = 6 calls. However, at the end of the 2 s interval, the microservices 𝑚 0 , 𝑚 1 , and 𝑚 2 still respond to their third, second, and first calls. To reduce the bottleneck on the Cloud infrastructure [7], we need to scale the microservices based on the multiplication function between the correlated microservice time and call rate up to the following number of replicas: 𝑚 0 on 𝑟 0 : 𝑚 1 on 𝑟 1 : 𝑚 2 on 𝑟 2 : 2 calls/s · 0.7 s/call = 1.4 ≈ 2; 2 calls/s · 1.5 s/call = 3; 3 calls/s · 2 s/call = 6." 2401.03333v1,"This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. 3GPP Release 18 Wake-up Receiver: Feature Overview and Evaluations Andreas Höglund 1 , Mohammad Mozaffari 2 , Yanpeng Yang 1 , Giuseppe Moschetti 1 , Kittipong Kittichokechai 1 , and Ravikiran Nory 2 1 Ericsson Research, Sweden. Emails: {andreas.hoglund, yanpeng.yang, giuseppe.a.moschetti, kittipong.kittichokechai}@ericsson.com 2 Ericsson Research, USA. Emails: {mohammad.mozaffari, ravikiran.nory}@ericsson.com Abstract—Enhancing the energy efficiency of devices stands as one of the key requirements in the fifth-generation (5G) cellular network and its evolutions toward the next generation wireless technology. Specifically, for battery-limited Internet-of-Things (IoT) devices where downlink monitoring significantly contributes to energy consumption, efficient solutions are required for power saving while addressing performance tradeoffs. In this regard, the use of a low-power wake-up receiver (WUR) and wake-up signal (WUS) is an attractive solution for reducing the energy consumption of devices without compromising the downlink latency. This paper provides an overview of the standardization study on the design of low-power WUR and WUS within Release 18 of the third-generation partnership project (3GPP). We describe design principles, receiver architectures, waveform characteristics, and device procedures upon detection of WUS. In addition, we provide representative results to show the performance of the WUR in terms of power saving, coverage, and network overhead along with highlighting design tradeoffs. I. I NTRODUCTION The fifth generation (5G) of cellular communications technology and new radio (NR) developed in the third-generation partnership project (3GPP) offers increased performance and a wide range of services (e.g., ultra-reliable low-latency communications, URLLC) [1], [2]. Compared to previous generations, 5G NR has a leaner signaling design, which limits the control overhead signaling in an unloaded network thus reducing the network energy consumption. Further, 5G can operate in a wider range of frequency bands, especially with adaption to work in higher frequency bands, e.g., mm-wave bands, with a significantly reduced latency. For the device, or user equipment (UE), operation in a wider bandwidth will give a higher achievable throughput. However, this is also more energy-consuming for the UE and can lead to shorter device battery life. Several features have been introduced in 3GPP to reduce the device energy consumption and prolong battery life, e.g., bandwidth part (BWP) switching, monitoring of physical downlink control channel (PDCCH) in a narrower so-called control resource set (CORESET), and disabling secondary cells when not used [3]. In general, monitoring PDCCH is the main contributor to the UE energy consumption, and reducing the PDCCH monitoring for the UE, in the time or frequency domain, is the key factor to achieving longer device battery life. To reduce the PDCCH monitoring time, a sequence-based wake-up signal (WUS) was introduced in LTE Release 15 for low-power wide-area (LPWA) solutions narrow-band Internet of Things (NB-IoT) and long-term evolution machine type communication (LTE-M) [4]. With this solution, the UE in the radio resource control (RRC) Idle state only monitors the paging occasion (PO) if a WUS is first detected within a configured time offset before the PO. For these LPWA solutions, 20 dB coverage enhancement was introduced, mainly achieved by time repetition. The main motivation for the introduction of WUS was to reduce the monitoring time of the large number of PDCCH repetitions in the PO required for UEs in poor coverage in the case when there is no paging for the UE (which is most often the case). In Release 16, the feature was enhanced to include UE subgroups using multiple WUS sequences to reduce the false paging, i.e., that the UE is unintentionally woken up by paging for another UE sharing the same PO. In Release 16 group WUS (GWUS), up to 8 UE subgroups per PO are supported. For NR, a downlink control information (DCI)- based WUS, referred to as DCP, was introduced in Release 16 for RRC Connected state [5]. DCP is an add-on to existing RRC Connected state discontinuous reception (DRX) where the UE will only monitor PDCCH in the configured DRX onduration window if first a PDCCH-based WUS (DCI format 2-6) is received within a fixed time offset before the DRX onduration. If it is not, the UE can skip the entire on-duration and will thereby reduce the energy consumption. In NR Release 17 paging early indication (PEI) was introduced. PEI is a WUS feature for RRC Idle and Inactive where, like the Release 15 WUS for LTE-M and NB-IoT, the UE only wakes up to monitor PDCCH in the PO if the PDCCH-based WUS (DCI format 2-7) associated to the PO and monitored a time offset before the PO is received first [6]. For PEI, UE subgrouping of up to 8 subgroups per PO was introduced and indicated by bits in the DCI. For NR, the Release 16 DCP for RRC Connected and Release 17 PEI for RRC Idle/Inactive were mainly intended for mobile broadband (MBB) use cases and human-originated traffic. For WUS in general, the biggest gain can be achieved when relatively low downlink latency needs to be achieved while there is rarely anything to transmit to the UE. That is, if battery life is the only relevant performance metric, the UE can" 2401.03337v1,"MTAC: Hierarchical Reinforcement Learning-based Multi-gait Terrain-adaptive Quadruped Controller Nishaant Shah, Kshitij Tiwari, and Aniket Bera Abstract—Urban search and rescue missions require rapid first response to minimize loss of life and damage. Often, such efforts are assisted by humanitarian robots which need to handle dynamic operational conditions such as uneven and rough terrains, especially during mass casualty incidents like an earthquake. Quadruped robots, owing to their versatile design, have the potential to assist in such scenarios. However, control of quadruped robots in dynamic and rough terrain environments is a challenging problem due to the many degrees of freedom of these robots. Current locomotion controllers for quadrupeds are limited in their ability to produce multiple adaptive gaits, solve tasks in a time and resource-efficient manner, and require tedious training and manual tuning procedures. To address these challenges, we propose MTAC: a multi-gait terrain-adaptive controller, which utilizes a Hierarchical reinforcement learning (HRL) approach while being time and memory-efficient. We show that our proposed method scales well to a diverse range of environments with similar compute times as state-of-the-art methods. Our method showed greater than 75% on most tasks, outperforming previous work on the majority of test cases. I. I NTRODUCTION The past few decades have witnessed a high number of natural and man-made disasters. In the wake of these natural disasters and mass casualty incidents such as earthquakes or building collapses, hazardous conditions make these environments extremely difficult to access for first responders. Moreover, the potential presence of asbestos, dust, extreme temperatures, and unstable structures endanger the lives of first responders. In the search for advanced technologies to alleviate these problems, mobile robots have been increasingly discussed as potential solutions. Robots have been used to assist first responders in recent devastation such as the collapse of the World Trade Center, the 2004 Mid-Niigata earthquake in Japan, the 2005 Hurricanes Katrina, Rita, and Wilma in the United States, as well as the 2011 Tohoku earthquake and tsunami in Japan [1]. Nevertheless, the challenge of robotassisted urban search and rescue is far from being solved. In order to fully explore post-MCI environments, robots must be able to navigate dynamic obstacles, as well as cluttered and unstructured terrains. In recent years, tracked robots have been used to drive across uneven terrain. For, in response to the Great Eastern Japan Earthquake, tracked robots such as the KOHGA3 were used for inspection of disaster sites [2]. Although this teleoperated robot was able to drive over uneven ground and use its sensors to provide the operators with information about the site, it was limited in its ability to climb stairs or steep slopes. Quadruped robots, thanks to the high degree of versatility that comes with their legged design, have great potential to navigate complex environments that their counterparts, such as wheeled or tracked robots, cannot [3]–[5]. Because quadrupeds use legs to move around, The authors are with the Department of Computer Science, Purdue University, USA, {shah971,tiwarik,ab}@purdue.edu Fig. 1. The proposed controller solves rough terrain navigation using hierarchical learning. A high-level policy is trained to act over a family of pre-trained low-level experts trained to execute unique gaits. Together, these policies are able to execute adaptive locomotion on unstructured terrains they have the freedom to choose the points at which they make contact with their surroundings and quickly change their footholds based on their environment. These features give quadruped robots the potential to perform agile locomotion that previously only animals were capable of [6]. Despite their highly versatile design, however, the control of these legged systems has proven to be a challenging task. Although their physical design is bio-inspired, existing control algorithms for quadrupeds struggle to replicate animals’ natural ability for dynamic locomotion over diverse terrains. Locomotion control for quadrupeds in rough terrain is a challenging problem, because it requires the robot to adapt its gait to diverse conditions, and the resources on these mobile robots are constrained [7], [8]. Currently, both conventional model-based controllers, as well as learning-based model-free controllers, have shown some success in the field of quadrupedal locomotion for rough terrain. Nevertheless, they have limitations when it comes to addressing a diverse set of environmental conditions and resource efficiency. Furthermore, existing controllers typically converge to a standard trotting gait, which is not always optimal for certain velocity ranges or all terrains [6], [9]. In fact, specific gaits are more optimal for certain velocity ranges" 2401.03341v1,"1 Weakly Augmented Variational Autoencoder in Time Series Anomaly Detection Zhangkai Wu, Longbing Cao, Senior Member, IEEE, Qi Zhang, Junxian Zhou, Hui Chen Abstract—Due to their unsupervised training and uncertainty estimation, deep Variational Autoencoders (VAEs) have become powerful tools for reconstruction-based Time Series Anomaly Detection (TSAD). Existing VAE-based TSAD methods, either statistical or deep, tune meta-priors to estimate the likelihood probability for effectively capturing spatiotemporal dependencies in the data. However, these methods confront the challenge of inherent data scarcity, which is often the case in anomaly detection tasks. Such scarcity easily leads to latent holes, discontinuous regions in latent space, resulting in non-robust reconstructions on these discontinuous spaces. We propose a novel generative framework that combines VAEs with self-supervised learning (SSL) to address this issue. Our framework augments latent representation to mitigate the disruptions caused by anomalies in the low-dimensional space, aiming to lead to corresponding more robust reconstructions for detection. This framework marks a significant advancement in VAE design by integrating SSL to refine likelihood enhancement. Our proposed VAE model, specifically tailored for TSAD, augments latent representations via enhanced training, increasing robustness to normal data likelihoods and improving sensitivity to anomalies. Additionally, we present a practical implementation of this conceptual framework called the Weakly Augmented Variational Autoencoder (WAVAE), which directly augments input data to enrich the latent representation. This approach synchronizes the training of both augmented and raw models and aligns their convergence in data likelihood optimization space. To achieve this, we maximize mutual information within the Evidence Lower Bound (ELBO), utilizing contrastive learning for shallow learning and a discriminator-based adversarial strategy for deep learning. Extensive empirical experiments on five public synthetic and real datasets validate the efficacy of our framework. These experiments provide compelling evidence of the superior performance of our approach in TSAD, as demonstrated by achieving higher ROC-AUC and PR-AUC scores compared to state-of-the-art models. Furthermore, we delve into the nuances of VAE model design and time series preprocessing, offering comprehensive ablation studies to examine the sensitivity of various modules and hyperparameters in deep optimization. Index Terms—Variational Autoencoder, Time Series Anomaly Detection, Self Supervised Learning, Data Augmentation, Contrast Learning, Adversarial Learning. I. I NTRODUCTION The work is partially sponsored by Australian Research Council Discovery and Future Fellowship grants (DP190101079 and FT190100734). Zhangkai Wu, Junxian Zhou with the School of Computer Science, the University of Technology Sydney, 15 Broadway, Ultimo 2007, NSW, Australia. (E-mail: berenwu1938@gmail.com, junxian.zhou@student.uts.edu.au) Hui Chen and Longbing Cao are with the DataX Research Centre and School of Computing, Macquarie University, NSW 2109, Australia. (email: hui.chen2@students.mq.edu.au, longbing.cao@mq.edu.au) Qi Zhang is with the Department of Computer Science, Tongji University, Shanghai 201804, China. (E-mail: zhangqi cs@tongji.edu.cn) D EEP probabilistic generative models have revolutionized unsupervised data generation by leveraging the neural network’s universal approximation theorem. This innovation manifests in various forms, such as encoding-decoding mechanisms [1], diffusion-denoise processes [2], and sender-receiver in compression [3]. Notably, VAEs have emerged as a central focus in this domain. Deep VAEs empowered by large-scale neural networks [4] and the organization of semantic representations [5], [6] have demonstrated exceptional capabilities in reconstructing and generating multimodal data, including images [7], [8], tabular [9], [10], and time series [11], [12]. Owing to their ability to learn generative factors in continuous and smooth low-dimensional space while fitting data likelihoods, VAEs exhibit robust representation learning capabilities in disentanglement [13], [14], classification [15], and clustering [16]. In particular, VAEs are designed to estimate likelihood distribution learned from most normal samples as a detector, providing an unsupervised and interpretable paradigm for anomaly detection. The underlying assumption is that unknown anomaly patterns typically exhibit statistical characteristics that deviate significantly from the normal distribution. Recent research has shown a growing preference for VAEs in Time Series Anomaly Detection (TSAD), particularly those that integrate meta-priors [17] into their design. These methods have been validated to be effective and crucial in capturing the spatiotemporal dependencies within data, thereby enhancing data likelihood modeling. Specifically, these models often assume certain meta-priors, e.g., latent structures, which are crafted using deep learning or probabilistic tools. The goal is to accurately represent the likelihood of most data points, enabling the models to detect anomalies effectively. For instance, time-varying priors that adapt to dynamic assumptions [18]– [21] have demonstrated effectiveness and powerful capabilities in capturing sequence data likelihoods. Additionally, other studies [22], [23] have proposed the creation of task-specific priors based on a factorized assumption explicitly designed to model contextual dependence structure in latent space. Various strategies have been employed to achieve this, such as using prototype distribution-based representations optimized through meta-learning and decomposing contextual representations. Whether meta-priors are integrated implicitly or explicitly, these methods are fundamentally rooted in model-based designs. However, they often cater to specific scenarios and face training challenges stemming from the data scarcity issue in deep learning or statistical estimation techniques. Additionally, these methods overlook the effective utilization of data, which becomes particularly problematic when modeling small sequence datasets in real-world time-series TSAD scenarios." 2401.03389v1,"Annals of Emerging Technologies in Computing (AETiC) Vol. 8, No. 1, 2024 Research Article Optimisation and Performance Computation of a Phase Frequency Detector Module for IoT Devices Md. Shahriar Khan Hemel 1 , Mamun Bin Ibne Reaz 2 , Sawal Hamid Bin Md Ali 1 , Mohammad Arif Sobhan Bhuiyan 3,* and Mahdi H. Miraz 4,5,6,* Department of Electrical, Electronic and Systems Engineering, Universiti Kebangsaan Malaysia, Malaysia 1 P114543@siswa.ukm.edu.my, sawal@ukm.edu.my Department of Electrical and Electronic Engineering, Independent University, Bangladesh 2 mamun.reaz@iub.edu.bd School of Electrical Engineering and Artificial Intelligence, Xiamen University Malaysia, Malaysia 3 arifsobhan.bhuiyan@xmu.edu.my School of Computing and Data Science, Xiamen University Malaysia, Malaysia 4 m.miraz@ieee.org Faculty of Arts, Science and Technology, Wrexham University, UK 5 m.miraz@ieee.org Faculty of Computing, Engineering and Science, University of South Wales, UK 6 m.miraz@ieee.org *Correspondence: m.miraz@ieee.org; arifsobhan.bhuiyan@xmu.edu.my Received: 13 th October 2023; Accepted: 12 th December 2023; Published: 1 st January 2024 Abstract: The Internet of Things (IoT) is pivotal in transforming the way we live and interact with our surroundings. To cope with the advancement in technologies, it is vital to acquire accuracy with the speed. A phase frequency detector (PFD) is a critical device to regulate and provide accurate frequency in IoT devices. Designing a PFD poses challenges in achieving precise phase detection, minimising dead zones, optimising power consumption, and ensuring robust performance across various operational frequencies, necessitating complex engineering and innovative solutions. This study delves into optimising a PFD circuit, designed using 90 nm standard CMOS technology, aiming to achieve superior operational frequencies. An efficient and high-frequency PFD design is crafted and analysed using cadence virtuoso. The study focused on investigating the impact of optimising PFD design. With the optimised PFD, an operational frequency of 5 GHz has been achieved, along with a power consumption of only 29 µW. The dead zone of the PFD was only 25 ps. Keywords: Cadence virtuoso; Digital circuit; Optimisation; Phase-locked loop (PLL); Phase frequency detector (PFD); 90 nm CMOS 1. Introduction The Internet of Things (IoT) is crucial for enabling smart, connected ecosystems that enhance efficiency and convenience in various aspects of our lives. It empowers businesses, healthcare, transportation and homes by facilitating real-time data exchange as well as automation [1-2]. To cope with the technological advancement, devices with better speed, accuracy and low power consumption have become integral constituents of the IoT ecosystems. IoT transceiver refers to a specialised communication device designed for IoT applications, allowing these devices to exchange data with other devices or networks. IoT transceivers are characterised by their Md. Shahriar Khan Hemel, Mamun Bin Ibne Reaz, Sawal Hamid Bin Md Ali, Mohammad Arif Sobhan Bhuiyan and Mahdi H. Miraz, “Optimisation and Performance Computation of a Phase Frequency Detector Module for IoT Devices”, Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 13-21, Vol. 8, No. 1, 1 st January 2024, Published by International Association for Educators and Researchers (IAER), DOI: 10.33166/AETiC.2024.01.001, Available: http://aetic.theiaer.org/archive/v8/v8n1/p1.html." 2401.03405v1,"The Astrophysical Journal, 960:95 (11pp), 2024 January 10 https://doi.org/10.3847/1538-4357/ad063e © 2024. The Author(s). Published by the American Astronomical Society. The Decay of Two Adjacent Sunspots Associated with Moving Magnetic Features Yang Peng 1,2 1 , Zhike Xue 1,3 , Zhongquan Qu 1,2 , Jincheng Wang 1,3 , Zhe Xu 1,3 , Liheng Yang 1,3 , and Yian Zhou 1 Yunnan Observatories, Chinese Academy of Sciences, Kunming 650216, Peopleʼs Republic of China; zkxue@ynao.ac.cn 2 University of Chinese Academy of Sciences, Beijing 100049, Peopleʼs Republic of China 3 Yunnan Key Laboratory of Solar Physics and Space Science, Kunming 650216, Peopleʼs Republic of China Received 2023 July 20; revised 2023 October 18; accepted 2023 October 20; published 2024 January 2 Abstract The relationship between the decay of sunspots and moving magnetic features (MMFs) plays an important role in understanding the evolution of active regions. We present observations of two adjacent sunspots, the gap between them, and a lot of MMFs propagating from the gap and the sunspots' outer edges in NOAA Active Region 13023. The MMFs are divided into two types based on their magnetic field inclination angle: vertical (0° < γ < 45°) and horizontal (45° „ γ < 90°) MMFs (V-MMFs and H-MMFs, respectively). The main results are as follows: (1) the mean magnetic flux decay rates of the two sunspots are −1.7 × 10 20 and −1.4 × 10 20 Mx day −1 ; (2) the magnetic flux generation rate of all MMFs is calculated to be −1.9 × 10 21 Mx day −1 , which is on average 5.6 times higher than the total magnetic flux loss rate of the sunspots; (3) the magnetic flux of V-MMFs (including a pore separated from the sunspots) is 1.4 times larger than the total lost magnetic flux of the two sunspots, and in a later stage when the pore has passed through the reference ellipse, the magnetic flux generation rate of the V-MMFs is almost the same as the magnetic flux loss rate of the sunspots; and (4) within the gap, the magnetic flux of V-MMFs is onethird of the total magnetic flux. Few V-MMFs stream out from the sunspots at the nongap region. All observations suggest that MMFs with vertical magnetic fields are closely related to the disintegration of the sunspot, and most of the MMFs from the gap may originate directly from the sunspot umbra. Unified Astronomy Thesaurus concepts: Sunspots (1653); Solar magnetic fields (1503); Solar photosphere (1518) Supporting material: animation Boice 1982; Solanki 2003) and quadratic (Moreno-Insertis & Vazquez 1988; Martinez Pillet et al. 1993) decays are two main patterns of sunspot decay, described by the turbulent diffusion and turbulent erosion models, respectively. The magnetic decay of sunspots plays a prominent role in the flux transportation of the solar surface. Numerous studies have suggested that the magnetic flux loss rates of sunspots are around 10 20 Mx day −1 (Verma et al. 2012; Sheeley et al. 2017; Li et al. 2021; Peng et al. 2023). The fragmentation and disintegration of the sunspot magnetic flux are associated with light bridges (Vazquez 1973; Louis et al. 2012; Murabito et al. 2021) and moving magnetic features (MMFs) (Kubo et al. 2008a). Li et al. (2023) observed that the formation of a light bridge may accelerate the decay of the penumbra within a decaying sunspot. A number of researches have indicated that the magnetic field of the penumbra becomes more vertical during sunspot decay (Li et al. 2021; Peng et al. 2023). Wang et al. (2004) observed a rapid penumbral decay after three solar flares. They suggested that a part of the penumbral magnetic field converts into an umbral field, and the penumbral field becomes more vertical. Watanabe et al. (2014) investigated the formation and decay of a penumbra around a pore and found that the penumbral magnetic field also becomes more vertical during the decay of the penumbra. They proposed that the recovery of a dark umbral area may be responsible for the change of the penumbral magnetic field inclination angle. MMFs are small-scale magnetic structures streaming out radially from sunspots. MMFs exhibit an average size of less than 2″ and their horizontal velocity ranges from 0.1 to 2 km s −1 (Hagenaar & Shine 2005; Kaithakkal et al. 2017; Li et al. 2019). There are three types of MMFs (Shine & Title 2000). Type I MMFs are bipolar, and unipolar MMFs with the same or opposite polarity to their parent sunspots are 1. Introduction Sunspot decay makes a significant contribution to the evolution of the solar large-scale magnetic field (Wallenhorst & Howard 1982; Sheeley et al. 2017). Photometric and magnetic decay are two different patterns of the decay (Martínez Pillet 2002), and their onsets are not synchronous (Li et al. 2021). Two decay models are proposed to explain sunspot decay: turbulent diffusion and turbulent erosion models. The turbulent diffusion model implies that sunspot decay is independent of the size and perimeter of the sunspot, and magnetic flux loss occurs everywhere in the sunspot (Meyer et al. 1974; Martínez Pillet 2002). By contrast, the turbulent erosion model indicates that sunspot decay is correlated with the perimeter and erodes from the boundary (Simon & Leighton 1964; Petrovay & Moreno-Insertis 1997; Litvinenko & Wheatland 2015). The area decay of a sunspot, as an important magnetic activity indicator, has been extensively studied. Bumba (1963) obtained a linear area decay rate of −4.2 millionths of a solar hemisphere (MSH, 1 MSH = 3.32 Mm 2 ) day −1 for recurrent sunspots. Subsequently, Martinez Pillet et al. (1993) determined a mean decay rate of −12.1 MSH day −1 for sunspot groups. Comparing with their results, Li et al. (2021) found that the decay rates of α- configuration sunspots range from −7.75 to −23.81 MSH day −1 . Some research has suggested that the decay rates depend on the area and polarity of the sunspot (Gómez et al. 2014; Norton et al. 2017; Muraközy 2020), and that they satisfy the lognormal distribution (Martinez Pillet et al. 1993). Linear (Robinson & Original content from this work may be used under the terms of the Creative Commons Attribution 4.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. 1" 2401.03413v1,"Simultaneous measurements on cosmic curvature and opacity using latest HII regions and H(z) observations Ying Yang, 1 Tong-hua Liu, 2, ∗ Jiayuan Huang, 2 Xiaolan Cheng, 2 Marek Biesiada, 3 and Shu-min Wu 4, † 1 Hunan Provincial Key Laboratory of Intelligent Sensors and Advanced Sensor Materials, School of Physics and Electronics, Hunan University of Science and Technology, Xiangtan 411201, China 2 School of Physics and Optoelectronic, Yangtze University, Jingzhou 434023, China 3 National Centre for Nuclear Research, Pasteura 7, PL-02-093 Warsaw, Poland 4 Department of Physics, Liaoning Normal University, Dalian 116029, China The different spatial curvatures of the universe affect the measurement of cosmological distances, which may also contribute to explaining the observed dimming of type Ia supernovae. This phenomenon may be caused by the opacity of the universe. Similarly, the opacity of the universe can lead to a bias in our measurements of curvature. Thus, it is necessary to measure cosmic curvature and opacity simultaneously. In this paper, we propose a new model-independent method to simultaneously measure the cosmic curvature and opacity by using the latest observations of HII galaxies acting as standard candles and the latest Hubble parameter observations. The machine learning method-Artificial Neural Network is adopted to reconstruct observed Hubble parameter H(z) observations. Our results support a slightly opaque and flat universe at 1σ confidence level by using previous 156 HII regions sample. However, the negative curvature is obtained by using the latest 181 HII regions sample in the redshift range z ∼ 2.5. More importantly, we obtain the simultaneous measurements with precision on the cosmic opacity ∆τ ∼ 10 −2 and curvature ∆Ω K ∼ 10 −1 . A strong degeneracy between the cosmic opacity and curvature parameters is also revealed in this analysis. I. INTRODUCTION Modern cosmology accepts that our universe is undergoing accelerated expansion in its current phase, a conclusion supported by the most direct evidence yet that Type Ia supernovae (SN Ia) have been unexpectedly observed fainter than expected in a slowing universe [1– 3]. Several other different theories or mechanisms have been proposed to explain the observed type Ia supernova dimming [4, 5], in addition to a new cosmological component that applies negative pressure (the cosmological constant is the simplest candidate) [6–12]. Shortly after the discovery of cosmic acceleration, it was proposed that the observation of SN Ia might be affected by the non-conservation of the number of photons in the emitted beam. Such so-called cosmic opacity may be due to many possible mechanisms. The standard mechanism is usually explained as the photons moving through the Milky Way, intervening galaxies, and the host galaxy being absorbed or scattered by dust particles [13]. Some other exotic mechanisms for cosmic opacity discuss the conversion of photons into gravitons [14], light axions in the presence of extragalactic magnetic fields [15–17], or Kaluza-Klein modes associated with extra-dimensions [18]. Various astrophysical mechanisms, such as gravitational lensing and dust extinction, may cause the non-conservation of the number of photons from the view of observation and thus be interpreted as the opacity of the universe. Although recent works on the opacity of the universe ∗ Electronic address: liutongh@yangtzeu.edu.cn † Electronic address: smwu@lnnu.edu.cn has shown that the universe appears to be transparent [19, 20], some of the growing crises in cosmology, such as Hubble tension [21–23] and the cosmic curvature [24–26], have emerged. This suggests us to reanalyze and treat the mechanism of cosmic opacity. For instance, if the universe is opaque, the photon from a distant light source reaches the ground and is observed, and its flux received by the observer will be reduced by a factor of e τ /2 (τ is optical depth, and τ < 0 means an opaque universe). According to the relationship between flux and luminosity distance, when the flux decreases, the luminosity distance increases, which means that the Hubble constant decreases. This provides a new way to solve the growing Hubble tension problem 1 (more works on Hubble tension please see the references [27–30] and references therein). More importantly, some recent works suggested that the H 0 tension could possibly be caused by the inconsistency of spatial curvature between the early-universe and lateuniverse [24–26]. Similarly, the opacity of the universe can lead to a bias in our measurements of curvature. Thus, to better understand the growing crises in cosmology, it is necessary to explore the relation between the curvature and the opacity of our universe, and seek the cosmological model-independent method that constrains cosmic curvature and opacity simultaneously. Furthermore, cosmic opacity might be an important source of 1 There is 4.4σ tension between the Hubble constant (H ) mea- 0 surements inferred within lambda cold dark matter (ΛCDM) from cosmic microwave background (CMB) anisotropy (temperature and polarization) data [21] and the local measurement of Hubble constant by the Supernova H 0 for the Equation of State collaboration (SH0ES) [22]." 2401.03431v1,"IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 31, 2022 1857 See360: Novel Panoramic View Interpolation Zhi-Song Liu , Member, IEEE, Marie-Paule Cani, and Wan-Chi Siu , Life Fellow, IEEE Abstract— We present See360, which is a versatile and efficient framework for 360 ◦ panoramic view interpolation using latent space viewpoint estimation. Most of the existing view rendering approaches only focus on indoor or synthetic 3D environments and render new views of small objects. In contrast, we suggest to tackle camera-centered view synthesis as a 2D affine transformation without using point clouds or depth maps, which enables an effective 360 ◦ panoramic scene exploration. Given a pair of reference images, the See360 model learns to render novel views by a proposed novel Multi-Scale Affine Transformer (MSAT), enabling the coarse-to-fine feature rendering. We also propose a Conditional Latent space AutoEncoder (C-LAE) to achieve view interpolation at any arbitrary angle. To show the versatility of our method, we introduce four training datasets, namely UrbanCity360, Archinterior360, HungHom360 and Lab360, which are collected from indoor and outdoor environments for both real and synthetic rendering. Experimental results show that the proposed method is generic enough to achieve real-time rendering of arbitrary views for all four datasets. In addition, our See360 model can be applied to view synthesis in the wild: with only a short extra training time (approximately 10 mins), and is able to render unknown realworld scenes. The superior performance of See360 opens up a promising direction for camera-centered view rendering and 360 ◦ panoramic view interpolation. Index Terms— View rendering, 3D scene, adversarial network. I. I NTRODUCTION 360 ◦ video/image, including panoramic, spherical or OmniDirectional Video (ODV), is a new type of multimedia that provides users with an immersive experience. For example, people can wear a Virtual Reality (VR) headset and move their heads to look around in a virtual world. The use of 360 ◦ video is then mandatory to achieve a real-time, realistic rendering of the scene. These techniques are useful in real-world applications, e.g., for displaying panoramic images/videos for vehicle driving, shopping, sightseeing and Manuscript received August 23, 2021; revised December 3, 2021; accepted January 18, 2022. Date of publication February 9, 2022; date of current version February 15, 2022. This work was supported in part by the Google Chair at École Polytechnique, The Hong Kong Polytechnic University, and the Caritas Institute of Higer Education, Hong Kong, SAR, under University Grants Committee (UGC), under Grant UGC/IDS(C)11/E01/20 (manpower) and Grant IDS(R)11/19 (high-performance computing facility). The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Lu Fang. (Corresponding author: Zhi-Song Liu.) Zhi-Song Liu was with CNRS (LIX), IP Paris, École Polytechnique, 91120 Palaiseau, France. He is now with the Caritas Institute of Higher Education, Hong Kong (e-mail: zhisong.liu@connect.polyu.hk). Marie-Paule Cani is with CNRS (LIX), IP Paris, École Polytechnique, 91120 Palaiseau, France (e-mail: marie-paule.cani@polytechnique.edu). Wan-Chi Siu is with the Caritas Institute of Higher Education, Hong Kong, and also with the Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong (e-mail: enwcsiu@ polyu.edu.hk). This article has supplementary downloadable material available at https://doi.org/10.1109/TIP.2022.3148819, provided by the authors. Digital Object Identifier 10.1109/TIP.2022.3148819 so on. In order to collect the training data, specific equipment such as Yi Halo and GoPro Odyssey, is generally required. We can also use RGB-D cameras to capture depth for 3-DoF or 6-DoF rendering, enabling depth estimation [1], [2], semantic segmentation [3]–[5] and salience prediction [6]–[8]. Another related topic is neural view rendering. The idea is to use deep learning approaches to explicitly [18]–[22] or implicitly [24]–[28] discover the 3D structure of objects for novel view synthesis [18], [22], [24] or neural rerendering [29]–[31]. In contrast with 360 ◦ video processing, novel view rendering usually takes an object as the view center. By pointing the camera toward it, different viewpoints of the same object are captured, possibly using a depth camera to get more geometric information. These views are then interpolated using a trained neural network. Many public synthetic datasets [32]–[34] are used for this task. In contrast with both 360 ◦ video and novel view rendering, but bridging the gap between them, our goal is to achieve camera centered, 360 ◦ panoramic novel view interpolation. More precisely, our method allows using a single, ordinary camera to capture a few reference views of the real world and predict the intermediate views in between, achieving horizontal 360 ◦ view synthesis from this sparse input. Hence we refer to our proposed approach as See360. Note that as opposed to 360 ◦ video, we do not need any complex device to capture omnidirectional views for scene understanding. Our method also differs from novel view rendering since our goal is to capture the 3D structure of the surroundings rather than the structure of a single object. The problem we are tackling is thus more challenging. Since it is not possible to predict an unseen view without any prior, we use two references (left and right) views, to “interpolate” the intermediate views. The angle distance between references can be 60 ◦ or even up to 120 ◦ (note that the most common setting of field of view (FOV) for cameras is 55 ◦ , which ensures that the input views will overlap). All occluded and missing scene parts in between are estimated by our method, while achieving smooth view transition. In addition, we can achieve view interpolation for 360 ◦ panoramic videos/animations. Note that our proposed method is purely image-based view synthesis without requiring any knowledge of depth or 3D information, hence it is low cost on data requirement that common cameras can be used for view synthesis, but there might be spatial misalignment caused by the large moving objects, low scene overlapping or sudden scene changes. Figure 1 illustrates our method: we attach a single camera to a electronic tripod head (Figure 1(a)) which is able to automatically rotate the camera over the full 360 ◦ range, to capture T sparse reference views and a dense set of S (S>T ) intermediate views. For training, we place the camera at the This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/" 2401.03438v1,"Asymptotic expansions of finite Hankel transforms and the surjectivity of convolution operators ∗ Yasunori Okada † and Hideshi Yamane The first author: Graduate School of Science, Chiba University, Yayoicho 1-33, Inage-ku, Chiba, 263-8522, Japan E-mail address: okada@math.s.chiba-u.ac.jp The second author: Department of Mathematical Sciences, Kwansei Gakuin University, Uegahara, Gakuen, Sanda, Hyogo, 669-1330, Japan E-mail address: yamane@kwansei.ac.jp Abstract A compactly supported distribution is called invertible in the sense of Ehrenpreis-Hörmander if the convolution with it induces a surjection from C ∞ (R n ) to itself. We give sufficient conditions for radial functions to be invertible. Our analysis is based on the asymptotic expansions of finite Hankel transforms. The dominant term may be the contribution from the origin or from the boundary of the support of the function. For the proof, we propose a new method to calculate the asymptotic expansions of finite Hankel transforms of functions with singularities at a point other than the origin. 1 Introduction It is known that P (D) : C ∞ (R n ) → C ∞ (R n ) and P (D) : D ′ (R n ) → D ′ (R n ) are both surjective, where P (D) 6 = 0 is an arbitrary linear partial differential operator with constant coefficients ([5, 6, 13]). Since these mappings coincide with the convolution operator P (D)δ∗ on respective spaces, a natural question is to characterize compactly supported distributions that induce surjective convolution operators. Such a distribution is called invertible. Notice that δ(x − a) ∗ 2010 Mathematics Subject Classification: primary 45E10; secondary 33C10, 44A15 † The first author is supported by JSPS KAKENHI Grant Number 21K03265. 1" 2401.03446v1,"Perturbation Spectra of Warm Inflation in f (Q, T ) Gravity Maryam Shiravand ∗ and Mehrdad Farhoudi † Department of Physics, Shahid Beheshti University, Evin, Tehran 19839, Iran (Dated: January 7, 2024) We investigate the warm inflationary scenario within the context of the linear version of f (Q, T ) gravity, coupled with both the inflaton scalar field and the radiation field, under the conditions of the strong dissipation regime. First, we calculate the modified Friedmann equations and the modified slow-roll parameters. Subsequently, we apply the slow-roll approximations to derive the scalar power spectrum and the tensor power spectrum. Also, we develop formulations of the scalar and tensor perturbations for the f (Q, T ) gravity with warm inflation scenario. Furthermore, we scrutinize two different forms of the dissipation coefficient, a constant and a function of the inflaton field to determine the scalar spectral index, the tensor-to-scalar ratio and the temperature for the power-law potential case. By imposing some constraints on the free parameters of the model, we attain results in good agreement with both the Planck 2018 data and the joint Planck, BK15 and BAO data for the tensor-to-scalar ratio, and consistent results aligned with the Planck 2018 data for the scalar spectral index. Consequently, we are able to revive the power-law potential that was previously ruled out by observational data. Moreover, for the variable dissipation coefficient, the model leads to the scalar spectral index with the blue and red tilts in agreement with the WMAP three years data. PACS numbers: 98.80.Cq; 04.50.Kd; 98.80.Es; 04.25.Nx; 11.25.Db Keywords: Warm Inflation; Modified Gravity; Scalar Power Spectrum; Tensor Power Spectrum; Cosmological Inflation; Strong Dissipation Regime I. INTRODUCTION In recent years, numerous scientific investigations, both theoretical and observational, have been carried out to comprehend the dynamics of the Universe. The outcomes of these studies align closely with the widely accepted cosmological model known as ΛCDM, which is based on general relativity (GR). Concurrently, surveys examining the cosmic microwave background (CMB) radiation have provided crucial insights into the formation and development of the Universe [1, 2]. Despite the overall agreement, certain perplexing concepts like the flatness and horizon problems persist within the standard cosmological model. The concept of inflation has proven to be a highly successful framework for addressing the issues in the standard cosmology. It also serves as a foundation for explaining the generation and evolution of the primordial seeds that give rise to the large-scale structure of the Universe [3–7]. The conventional inflation model consists of two distinct evolutionary phases. The first phase is characterized by an accelerated expansion driven by an inflaton field, which has negligible kinetic energy and potential energy, a condition known as slow-roll. Notably, the quantum fluctuations of the inflaton can lead to a period of inflation and provide an explanation for the origin of large-scale structures [8, 9]. In simpler terms, cosmic inflation produces density perturbations, which can be observed through the measurement of temperature variations in the CMB [10, 11]. On the other ∗ ma shiravand@sbu.ac.ir † m-farhoudi@sbu.ac.ir hand, a broad range of potential functions capable of describing an inflationary period have been thoroughly investigated and constrained using measurements of CMB anisotropies [12]. In the subsequent stage, known as reheating, the inflaton undergoes decay, and giving rise to matter and radiation fields similar to a hot big bang scenario [13]. The major challenge lies in successfully bridging the evolution of the Universe towards the end of this era. One intriguing approach to address this issue involves investigating inflation in the context of the warm inflation scenario. Warm inflation takes into account thermal effects and interactions between the inflaton field and other particles in the Universe [14–17]. These interactions facilitate the continuous transfer of energy from the inflaton to the surrounding particles and create a significant thermal environment. The inclusion of thermal effects introduces dissipation processes and has the potential to produce noticeable deviations from the expected outcomes of cold inflation [18]. This is achieved by introducing a dissipation coefficient [17, 19–21]. The dissipation term can be derived using quantum field theory methods within a two-stage mechanism for the field interaction [22, 23]. Consequently, warm inflation offers an alternative explanation for the emergence of cosmic structure. Thus, the advantages of warm inflation encompass the automatic reheating process at the end of inflation, where the thermal bath begins to surpass the vacuum energy, as well as the suppression of contributions to the scalar-tensor ratio [24]. This feature can revive many inflationary models from the perspective of observational data. A consequence of the friction term, which characterizes the decay of the inflaton field into the radiation field during inflation, is that the density perturbations" 2401.03448v1,"Single-Microphone Speaker Separation and Voice Activity Detection in Noisy and Reverberant Environments Renana Opochinsky 1 , Mordehay Moradi 1 , and Sharon Gannot 1 , Fellow IEEE 1 Bar-Ilan University, Ramat-Gan, 5290002 ISRAEL Corresponding author: Sharon Gannot (email: sharon.gannot@ biu.ac.il). The project has received funding from the European Union’s Horizon 2020 Research and Innovation Programme, Grant Agreement No. 871245; and was also supported by the Israeli Ministry of Science & Technology. Renana Opochinsky and Mordehay Moradi have equally contributed to the paper. ABSTRACT Speech separation involves extracting an individual speaker’s voice from a multi-speaker audio signal. The increasing complexity of real-world environments, where multiple speakers might converse simultaneously, underscores the importance of effective speech separation techniques. This work presents a single-microphone speaker separation network with TF attention aiming at noisy and reverberant environments. We dub this new architecture as Separation TF Attention Network (Sep-TFAnet). In addition, we present a variant of the separation network, dubbed Sep-TFAnet VAD , which incorporates a voice activity detector (VAD) into the separation network. The separation module is based on a temporal convolutional network (TCN) backbone inspired by the Conv-Tasnet architecture with multiple modifications. Rather than a learned encoder and decoder, we use short-time Fourier transform (STFT) and inverse short-time Fourier transform (iSTFT) for the analysis and synthesis, respectively. Our system is specially developed for human-robotic interactions and should support online mode. The separation capabilities of Sep-TFAnet VAD and Sep-TFAnet were evaluated and extensively analyzed under several acoustic conditions, demonstrating their advantages over competing methods. Since separation networks trained on simulated data tend to perform poorly on real recordings, we also demonstrate the ability of the proposed scheme to better generalize to realistic examples recorded in our acoustic lab by a humanoid robot. Project page: https://Sep-TFAnet.github.io INDEX TERMS speaker separation, voice activity detection, temporal convolutional networks. I. Introduction B LIND speaker separation is a rapidly growing research field aiming to separate a mixture of speech signals into their components. This technology has important applications in robot audition, speech recognition, hearing aids, and telecommunications. The introduction of deep clustering (DC) [1] and permutation invariant training (PIT) [2] has sparked increasing interest in single-microphone speaker separation algorithms that rely on deep neural networks (DNNs). Many recent separation schemes are directly applied in the time domain using learnable encoder-decoder structure, e.g., Conv-Tasnet [3], dual-path recurrent neural network (DPRNN) [4] and many more [5]–[8]. The Conv-Tasnet algorithm, as introduced in [3], employs one-dimensional convolutional layers to infer selflearned representations of the input signal. These embeddeddomain representations are utilized to compute masks for each individual speaker, which are subsequently applied to separate the speakers. This approach employs the scaleinvariant signal-to-distortion ratio (SI-SDR) [9] loss function, specifically designed to capitalize on temporal information. The algorithm achieves improved performance compared with state-of-the-art (SOTA) methods, probably because its features are learned rather than manually designed. A transformer-based neural network architecture, dubbed SepFormer, was presented [10] and [11]. The successive downsampling and resampling of multi-resolution features (SuDoRmRf), presented in [12], is based on simple one- This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME , i" 2401.03461v1,"Amplification of Addictive New Media Features in the Metaverse Ljubisa Bojic 1 , Ph. D. Senior Research Fellow The Institute for Artificial Intelligence Research and Development of Serbia University of Belgrade, Institute for Philosophy and Social Theory 0F Jörg Matthes 2 , Ph. D. Full Professor University of Vienna, Faculty of Social Sciences, Department of Communication 1F Milan Cabarkapa 3 , Ph. D. Assistant professor University of Kragujevac, Faculty of Engineering 2F Abstract The emergence of the metaverse, envisioned as a hyperreal virtual universe facilitating boundless human interaction, stands to revolutionize our conception of media, with significant impacts on addiction, creativity, relationships, and social polarization. This paper aims to dissect the addictive potential of the metaverse due to its immersive and interactive features, scrutinize the effects of its recommender systems on creativity and social polarization, and explore potential consequences stemming from the metaverse development. We employed a literature review methodology, drawing parallels from the research on new media platforms and examining the progression of reality-mimicking features in media from historical perspectives to understand this transformative digital frontier. The findings suggest that these immersive and interactive features could potentially exacerbate media addiction. The designed recommender systems, while aiding personalization and user engagement, might contribute to social polarization and affect the diversity of creative output. However, our conclusions are based primarily on theoretical propositions from studies conducted on existing media platforms and lack empirical support specific to the metaverse. Therefore, this paper identifies a critical gap requiring further research, through empirical studies focused on metaverse use and addiction and exploration of privacy, security, and ethical implications associated with this burgeoning digital universe. As the development of the metaverse accelerates, it is incumbent on scholars, technologists, and policymakers to navigate its multilayered impacts thoughtfully to balance innovation with societal well-being. Keywords: metaverse, new media platforms, addictive features, social polarization, underlying technologies Corresponding author; Email address: ljubisa.bojic@ivi.ac.rs Address of correspondence: 1 Fruskogorska, Novi Sad, Serbia https://orcid.org/0000-0002-5371-7975 1 Email address: joerg.matthes@univie.ac.at Address of correspondence: 29 Währinger Straße 29, 1090 Vienna, Austria https://orcid.org/0000-0001-9408-955X 2 Email address: mcabarkapa@kg.ac.rs Address of correspondence: 6 Sestre Janjic, Kragujevac, Serbia https://orcid.org/0000-0002-2094-9649 3" 2401.03462v1,"Soaring from 4K to 400K: Extending LLM’s Context with Activation Beacon Abstract The utilization of long contexts poses a big challenge for large language models due to their limited context window length. Although the context window can be extended through fine-tuning, it will result in a considerable cost at both training and inference time, and exert an unfavorable impact to the LLM’s original capabilities. In this work, we propose Activation Beacon, which condenses LLM’s raw activations into more compact forms such that it can perceive a much longer context with a limited context window. Activation Beacon is introduced as a plugand-play module for the LLM. It fully preserves the LLM’s original capability on short contexts while extending the new capability on processing longer contexts. Besides, it works with short sliding windows to process the long context, which achieves a competitive memory and time efficiency in both training and inference. Activation Beacon is learned by the auto-regression task conditioned on a mixture of beacons with diversified condensing ratios. Thanks to such a treatment, it can be efficiently trained purely with short-sequence data in just 10K steps, which consumes less than 9 hours on a single 8×A800 GPU machine. The experimental studies show that Activation Beacon is able to extend Llama-2-7B’s context length by ×100 times (from 4K to 400K), meanwhile achieving a superior result on both long-context language modeling and understanding tasks. Our model and code will be available at the BGE repository 3 . Position Interpolation GPU Memory (GB) 80 60 40 20 0 4K 8K 16K 32K Context Length 100K 400K NTK Aware 80 70 60 50 40 30 20 10 0 LongLlama OOM OOM Activation Beacon OOM OOM 8 Inference Time (s) 100 Perplexity Peitian Zhang 1,2∗ Zheng Liu 1† Shitao Xiao 1 Ninglu Shao 1,2 Qiwei Ye 1 Zhicheng Dou 2 1: Beijing Academy of Artificial Intelligence, 2: Gaoling School of Artificial Intelligence, Renmin University of China {namespace.pt, zhengliu1026}@gmail.com 4K 8K 16K 32K Context Length 100K 400K 6 4 2 0 4K 8K 16K 32K Context Length 100K 400K Figure 1: Comparison between Activation Beacon and other context extension methods, including 1) Position Interpolation [5], 2) NTK-Aware Scaled RoPE [1], 3) LongLlama [32]. Activation Beacon leads to a better long-context generation quality with a higher running efficiency (memory, time). The perplexity is measured by sliding windows on PG19 testset [6; 20]. ∗ Peitian Zhang and Zheng Liu are the co-first authors Zheng Liu is the corresponding author 3 https://github.com/FlagOpen/FlagEmbedding † Preprint. Under review." 2401.03489v1,"Decentralized Federated Policy Gradient with Byzantine Fault-Tolerance and Provably Fast Convergence Philip Jordan Florian Grötschla ETH Zürich Switzerland jordanph@ethz.ch ETH Zürich Switzerland fgroetschla@ethz.ch Flint Xiaofeng Fan Roger Wattenhofer National University of Singapore Singapore fxf@u.nus.edu ETH Zürich Switzerland wattenhofer@ethz.ch ABSTRACT In Federated Reinforcement Learning (FRL), agents aim to collaboratively learn a common task, while each agent is acting in its local environment without exchanging raw trajectories. Existing approaches for FRL either (a) do not provide any fault-tolerance guarantees (against misbehaving agents), or (b) rely on a trusted central agent (a single point of failure) for aggregating updates. We provide the first decentralized Byzantine fault-tolerant FRL method. Towards this end, we first propose a new centralized Byzantine fault-tolerant policy gradient (PG) algorithm that improves over existing methods by relying only on assumptions standard for nonfault-tolerant PG. Then, as our main contribution, we show how a combination of robust aggregation and Byzantine-resilient agreement methods can be leveraged in order to eliminate the need for a trusted central entity. Since our results represent the first sample complexity analysis for Byzantine fault-tolerant decentralized federated non-convex optimization, our technical contributions may be of independent interest. Finally, we corroborate our theoretical results experimentally 1 for common RL environments, demonstrating the speed-up of decentralized federations w.r.t. the number of participating agents and resilience against various Byzantine attacks. KEYWORDS Federated Reinforcement Learning; Policy Gradient; Byzantine Fault-Tolerance; Decentralization; Robust Optimization 1 INTRODUCTION Many real-world reinforcement learning (RL) systems consist of a group of agents (e.g. a fleet of autonomous vehicles), in which all agents aim to learn the same task, each in its local environment. Since RL models often suffer from poor sample complexity, collaboration is highly desirable. However, as in the autonomous driving example, trajectories of environment interactions may be made up of large amounts of video and sensor data (too large to transfer between agents), and possibly also with privacy restrictions. This motivates the need for distributed algorithms that can leverage the power of collaboration without sharing raw trajectories. In the broader machine learning context, this setting has been widely studied under the name Federated Learning (FL) [1, 2], and 1 Our code is available at https://github.com/philip-jordan/decentralized-byzantine-RL. has inspired Federated Reinforcement Learning (FRL) [3–6] as an analogous concept in RL. Policy gradient methods are among the most popular algorithms in model-free RL. Existing work studies how to generalize such approaches to FRL in a fully trusted setting [7]. In many practical situations, however, there may not be any guarantee on the trustworthiness of information provided by the participating agents, be it due to e.g. communication failure, or malicious attempts at trying to prevent the system from learning. Methods that tolerate the presence of some fraction of Byzantine agents have previously been proposed and demonstrated to defend against some attacks in practice [5]. As we are going to discuss in related work, so far, FRL algorithms need additional non-standard assumptions regarding gradient estimation noise. Moreover, a crucial limitation of previous methods for achieving Byzantine fault-tolerance is the need for one trusted party responsible for aggregating updates, filtering out potentially malicious inputs, and broadcasting results back to all participants. Introducing such a single point of failure seems like a high price to pay for achieving Byzantine resilience—and is going against the very idea of a trustless and robust design. Hence we are aiming for a decentralized system, i.e., a system in which Byzantine behavior of any participant can be tolerated, as long as only a reasonable number of such bad actors occur simultaneously. Algorithms achieving both Byzantine fault-tolerance and decentralization have previously been proposed for general non-convex optimization [8] but analyzed only w.r.t. infinite-time asymptotic behavior. We propose a novel method and give finite-time sample complexity guarantees for decentralized federated PG with Byzantine fault-tolerance. More concretely, our contributions can be summarized as follows: • As a starting point, we provide a new centralized Byzantine fault-tolerant federated PG algorithm ByzPG, and prove competitive sample complexity guarantees under assumptions that are standard in non-fault-tolerant PG literature. In particular, unlike previous approaches, we do not rely on deterministic bounds on gradient estimation noise. • For our main contribution, we extend the above (centralized) approach to the significantly more challenging decentralized setting: With DecByzPG, we propose a decentralized Byzantine fault-tolerant PG method. To the best of our knowledge," 2401.03491v1,"Ensemble Defense System: A Hybrid IDS Approach for Effective Cyber Threat Detection Sarah Alharbi Arshiya Khan Department of Electrical and Computer Engineering University of Delaware Newark, DE sarahalh@udel.edu Department of Electrical and Computer Engineering University of Delaware Newark, DE arshiyak@udel.edu Abstract—Sophisticated cyber attacks present significant challenges for organizations in detecting and preventing such threats. To address this critical need for advanced defense mechanisms, we propose an Ensemble Defense System (EDS). An EDS is a cybersecurity framework aggregating multiple security tools designed to monitor and alert an organization during cyber attacks. The proposed EDS leverages a comprehensive range of Intrusion Detection System (IDS) capabilities by introducing a hybrid of signature-based IDS and anomaly-based IDS tools. It also incorporates Elasticsearch, an open-source Security Information and Event Management (SIEM) tool, to facilitate data analysis and interactive visualization of alerts generated from IDSs. The effectiveness of the EDS is evaluated through a payload from a bash script that executes various attacks, including port scanning, privilege escalation, and Denial-of-Service (DoS). The evaluation demonstrates the EDS’s ability to detect diverse cyber attacks. Index Terms—Ensemble Defense Systems, network security, hybrid IDS, Security Information and Event Management (SIEM) I. I NTRODUCTION Organizations today are encountered with threats from cybercriminals who continuously develop sophisticated attack techniques, targeting vulnerabilities within network systems and compromising sensitive data. Consequently, robust and thorough defense mechanisms have become imperative to ensure organizations’ security in the face of these threats. The Ensemble Defense System (EDS) is at the forefront of cybersecurity strategies. EDS is a security implementation strategy that uses multiple layers of defense mechanisms and security tools to protect a network of machines from multifarious threats and attacks [1]. An integral component of this EDS is the Intrusion Detection System (IDS). IDS analyzes network traffic to detect potential security breaches and produces logs corresponding to those activities [2]. An analyst can examine these logs and determine the next course of action. The analyst performs a variety of analytical and statistical operations to examine these logs. These may include charts and graphs. To enable these analyses, EDS provides the ability to compile and visualize these logs with the help of a Security Information and Event Management (SIEM) tool. This makes SIEM another very crucial component of the EDS. IDS can be categorized into two primary types: signaturebased and anomaly-based. Signature-based IDS relies on identifying known attack patterns and malicious signatures to generate alerts or take preventive actions [3]. However, this approach often struggles to keep up with the rapid evolution of threats as it relies on predefined signatures. Another approach employed by organizations to bolster their security is anomaly-based IDS. This approach analyzes network traffic to establish a baseline of normal behavior and then detects any deviations from the baseline as an indication of potential security risk [4]. Anomaly-based IDS offers the capability to detect previously unknown threats. Nevertheless, the anomaly-based detection approach is highly susceptible to generating many false positives and can lead to computational burden [5]. Due to the aforementioned limitations of these approaches, a hybrid-based IDS approach has gained prominence. This approach combines the strengths of both signature-based and anomaly-based IDS techniques [6]. The combination of both these approaches provides a more comprehensive and robust defensive framework. Multiple research studies [6]–[8] have suggested that a hybrid-based IDS can achieve high detection rates while keeping false positives at a low level. Therefore, our research focuses on implementing a hybrid IDS framework within the EDS. II. R ELATED W ORK In recent years, several studies have explored the integration of IDS and SIEM. Negoita and Carabas [9] focused on enhancing security by integrating IDS with Machine Learning (ML) techniques using Elasticsearch. They used Snort [10] as IDS and leveraged Elasticsearch’s built-in machine-learning framework for attack detection [11]. Their study highlighted limitations in Elasticsearch’s built-in ML jobs, such as manual configuration and difficulty detecting sophisticated attacks. Priambodo et al. [12] introduced an integration approach to enhance work-from-home network security. This approach combines Wireguard [13], Suricata [14] (an open-source ID- S/IPS), and ELK (Elasticsearch [15], Logstash [16], and Kibana [17]). To evaluate the system’s effectiveness, they generated port scanning attacks using Nmap [18]. The detection of port scans and exploits was achieved through Suricata. The" 2401.03504v1,"ClusterComm: Discrete Communication in Decentralized MARL using Internal Representation Clustering Robert Müller 1 , Hasan Turalic 1 , Thomy Phan 1 , Michael Kölle 1 , Jonas Nüßlein 1 and Claudia Linnhoff-Popien 1 Institute of Informatics, LMU Munich, Munich, Germany robert.mueller@ifi.lmu.de Keywords: Multi-Agent Reinforcement Learning, Communication, Clustering Abstract: In the realm of Multi-Agent Reinforcement Learning (MARL), prevailing approaches exhibit shortcomings in aligning with human learning, robustness, and scalability. Addressing this, we introduce ClusterComm, a fully decentralized MARL framework where agents communicate discretely without a central control unit. ClusterComm utilizes Mini-Batch-K-Means clustering on the last hidden layer’s activations of an agent’s policy network, translating them into discrete messages. This approach outperforms no communication and competes favorably with unbounded, continuous communication and hence poses a simple yet effective strategy for enhancing collaborative task-solving in MARL. 1 INTRODUCTION Problems such as autonomous driving (Shalev- Shwartz et al., 2016) or the safe coordination of robots in warehouses (Salzman and Stern, 2020) require cooperation between agents. In order to solve tasks collaboratively, agents must learn to coordinate by sharing resources and information. Similar to humans, cooperation can be facilitated through communication. The ability to communicate allows autonomous agents to exchange information about their current perceptions, their planned actions or their internal state. This enables them to cooperate on tasks that are more difficult or impossible to solve in isolation and without communication. In Multi-Agent Reinforcement Learning (MARL), multiple agents interact within a shared environment. In the simplest case, each agent is modeled as an independently learning entity that merely observes the other agents (Independent Learning). In this scenario, however, at best implicit communication can take place, as for example with bees that inform their peers about the position of a found food source by certain movements (Von Frisch, 1992). In the context of MARL, it has already been established that cooperation can be improved through the exchange of information, experience and the knowledge of the individual agents (Tan, 1993). The predominant approach to this is to provide the agents with additional information during training, such as the global state of the environment at the current timestep. It is usually desirable to be able to execute the agents in a decentralized manner after training, i.e. each agent should only be able to decide how to act on the basis of information that is available to it locally. Consequently, the additional information at training time only serves to speed up training and to develop more sophisticated implicit coordination and communication strategies. This paradigm is referred to as Centralized Learning and Decentralized Execution. An even more radical approach is to view all agents as a single RL agent that receives all the local observations of the individual agents and model the joint action space as a Cartesian product of the individual action spaces. Since the joint action space grows exponentially with the number of agents and agents cannot be deployed in a decentralized fashion, this approach is rarely used in practice. To enable agents to communicate with each other explicitly, recent approaches (Foerster et al., 2016; Sukhbaatar et al., 2016; Lowe et al., 2017; Das et al., 2019; Lin et al., 2021; Wang and Sartoretti, 2022) introduce a communication channel between agents. This approach poses a considerable exploration problem, as the probability of finding a consistent communication protocol is extremely low (Foerster et al., 2016). Furthermore, the initially random messages add to the already high variance of MARL and further complicate training (Lowe et al., 2017; Eccles" 2401.03516v1,"1 Integrated Sensing, Communication, and Powering (ISCAP): Towards Multi-functional 6G Wireless Networks Yilong Chen, Zixiang Ren, Jie Xu, Yong Zeng, Derrick Wing Kwan Ng, and Shuguang Cui Abstract—This article presents a novel multi-functional system for sixth-generation (6G) wireless network with integrated sensing, communication, and powering (ISCAP), which unifies integrated sensing and communication (ISAC) and wireless information and power transfer (WIPT) techniques. The multifunctional ISCAP network promises to enhance resource utilization efficiency, reduce network costs, and improve overall performance through versatile operational modes. Specifically, a multi-functional base station (BS) can enable multi-functional transmissions, by exploiting the same radio signals to perform target/environment sensing, wireless communication, and wireless power transfer (WPT), simultaneously. Besides, the three functions can be intelligently coordinated to pursue mutual benefits, i.e., wireless sensing can be leveraged to enable light-training or even training-free WIPT by providing side-channel information, and the BS can utilize WPT to wirelessly charge low-power devices for ensuring sustainable ISAC. Furthermore, multiple multi-functional BSs can cooperate in both transmission and reception phases for efficient interference management, multistatic sensing, and distributed energy beamforming. For these operational modes, we discuss the technical challenges and potential solutions, particularly focusing on the fundamental performance tradeoff limits, transmission protocol design, as well as waveform and beamforming optimization. Finally, interesting research directions are identified. I. I NTRODUCTION Sixth-generation (6G) mobile networks are envisioned to support various intelligent applications such as smart cities, smart homes, and smart manufacturing, by providing a peak data rate of 1 Tbps, a user-experienced data rate of 10-100 Gbps, a localization accuracy of 1 cm indoors and 50 cm outdoors, and a battery lifetime of up to 20 years for lowpower Internet-of-Things (IoT) devices [1]. Towards this end, Y. Chen is with the Future Network of Intelligence Institute (FNii) and the School of Science and Engineering (SSE), The Chinese University of Hong Kong (Shenzhen), Shenzhen, China (e-mail: yilongchen@link.cuhk.edu.cn). J. Xu and S. Cui are with the SSE and the FNii, The Chinese University of Hong Kong (Shenzhen), Shenzhen, China (e-mail: xujie@cuhk.edu.cn; shuguangcui@cuhk.edu.cn). Z. Ren is with the Key Laboratory of Wireless-Optical Communications, Chinese Academy of Sciences, School of Information Science and Technology, University of Science and Technology of China, Hefei 230027, China, and also with the FNii, The Chinese University of Hong Kong (Shenzhen), Shenzhen 518172, China (e-mail: rzx66@mail.ustc.edu.cn). Y. Zeng is with the National Mobile Communications Research Laboratory, Southeast University, Nanjing, China. He is also with the Purple Mountain Laboratories, Nanjing, China (e-mail: yong zeng@seu.edu.cn). D. W. K. Ng is with School of Electrical Engineering and Telecommunications, the University of New South Wales, Sydney, Australia (e-mail: w.k.ng@unsw.edu.au). J. Xu is the corresponding author. Y. Chen and Z. Ren are the co-first authors. 6G networks need to incorporate a massive number of wireless devices, such as smartphones, sensors, IoT devices, and network-connected robots for achieving integrated sensing and communications (ISAC), which has been identified by IMT- 2030 1 as one of the core usage scenarios for 6G. On the other hand, to support the sustainable operation of massive devices (especially low-power IoT devices), wireless power transfer (WPT) can be integrated into 6G networks to enable wireless information and power transfer (WIPT) [2]. By unifying ISAC and WIPT, 6G is envisioned to become a multi-functional wireless network with integrated sensing, communication, and powering (ISCAP) at the air interface. The multi-functional ISCAP network is expected to offer a plethora of applications. In such a network, inter-connected base stations (BSs) and wireless devices may act as giant networked sensors to monitor the environment. The distributed sensing data are then wirelessly transmitted among separate edge servers at BSs, which can process such data via advanced signal processing or artificial intelligence (AI) algorithms and take inference or control actions accordingly. BSs in this network can also reuse wireless sensing and communication signals for a triple role of WPT, which wirelessly charges lowpower devices to support their ISAC functionalities sustainably. For ISCAP operations, recent advancements in millimeter wave (mmWave)/terahertz (THz) and extremely large-scale antenna arrays [3] are particularly beneficial. By exploiting the wide bandwidth at mmWave/THz bands and high beam directivity of large antenna arrays, ISCAP systems can significantly enhance the sensing resolution and accuracy, substantially increase the communication data rate, lower transmission latency, and improve the energy transfer efficiency by combating the severe signal path loss. Different from conventional sole-functional wireless networks, multi-functional ISCAP networks offer several advantages. First, the triple use of spectrum/energy resources and hardware platforms significantly enhances resource utilization efficiency and concurrently reduces both capital and operational costs. Next, the joint sensing-communication-powering optimization in ISCAP systems can significantly improve the system performance by effectively harnessing interference. Furthermore, the sensing-communication-powering integration allows mutual benefits between different functions. For instance, wireless sensing can provide real-time environment 1 For more details, please refer to https://www.itu.int/en/ITU-R/studygroups/rsg5/rwp5d/imt-2030." 2401.03527v1,"0.08 fF, 0.72 nA dark current, 91% Quantum Efficiency, 38 Gb/s Nano-photodetector on a 45 nm CMOS Silicon-Photonic Platform Mingye Fu, 1, * and S. J. Ben Yoo 1, * 1 Department of Electrical and Computer Engineering, University of California, Davis, CA 95616, USA * myfu@ucdavis.edu, * sbyoo@ucdavis.edu Abstract: We demonstrated a Germanium-on-Silicon photodetector utilizing an asymmetric-Fabry-Perot resonator with 0.08 fF capacitance. The measurements at 1315.5 nm show 0.72 nA (3.40 nA) dark current, 0.93 A/W (0.96 A/W) responsivity, 36 Gb/s (38 Gb/s) operation at -1V (-2V) bias. © 2024 The Author(s) 1. Introduction Integrated silicon photonics has become a promising technology addressing the ever-increasing demand for highbandwidth and power-efficient data transmission in high-performance computing [1] and data center applications [2]. Recent advances in integrated photonics showed electronic-photonic integrated circuit (EPIC) optical transceivers being deployed at both ends of optical data links achieved <1 pJ/b link energy efficiency [3, 4]. The EPIC optical transceiver demands co-designed, energy-efficient, high-bandwidth photonic components and electronic circuitry integrated with very small parasitics. For instance, one of the most critical photonic components is the Ge photodetector (PD) which is integrated with a transimpedance amplifier (TIA). As the receiver sensitivity is strongly related to the capacitance of the PD through quantum impedance transformation [5], detectors with extremely small capacitance (<0.1 fF) integrated with zero parasitics can achieve very high sensitivity and link efficiency (<0.1 fJ/b at the receiver). A small PD capacitance will also reduce the input capacitance of the TIA which, in turn, can achieve higher bandwidth and lower input noise. In another aspect, a low-capacitance detector is likely to have a small footprint, which leads to a higher integration density of the EPIC transceiver. The small footprint is also helpful in reducing the dark current and consequently improves the optical modulation amplitude (OMA) sensitivity of the receiver. While zero-parasitic integration is available from monolithic CMOS-Silicon Photonic (SiPh) process [6, 7], today’s commercial SiPh Ge detectors have typically 15 µm 2 footprint with 10 fF capacitance including parasitics and 15 nA dark current. It would be desirable to have a nano-photodetector with extremely small capacitance (<0.1 fF), low dark current (<1 nA), and a small footprint for the next-generation energy-efficient DWDM photonic transceivers. In this paper, we report a Ge-on-Si asymmetric Fabry-Perot (AFP) photodetector with a small Ge footprint of 0.6µm×2.2µm. With an estimated capacitance being extremely low at 0.08 fF, the measured dark current is 0.72 nA under -1 V bias voltage. The quantum efficiency is enhanced by the optimized asymmetric Fabry-Perot resonator achieves a high responsivity of 0.93 A/W at -1 V despite a short cavity length of 2.2µm. The proposed Fig. 1. (a) 3D perspective view shows the proposed AFP PD closely integrated with TIA for smallest possible parasitics. (b) AFP PD Cross-section view. (c) Side view showing the resonant cavity." 2401.03535v1,"ON NONLINEAR ITERATED FUNCTION SYSTEMS WITH OVERLAPS BORIS SOLOMYAK Abstract. We construct an example of an iterated function system on the line, consisting of linear fractional transformations, such that two of the maps share a fixed points, but the dimension of the attractor equals the conformal dimension, so that there is no “dimension drop”. 1. Introduction Let Φ = {φ i } i∈I be a collection of C 1+θ -smooth maps of a compact interval I ⊂ R into itself. Here I is a finite alphabet, with #I ≥ 2. We call Φ an iterated function system (IFS). The IFS is assumed to be hyperbolic, that is, there exist 0 < γ 1 < γ 2 < 1, such that 0 < γ 1 ≤ |φ ′ i (x)| ≤ γ 2 < 1 for all i ∈ I and x ∈ I. By [10], there exists a unique non-empty compact set Λ = Λ Φ , called the attractor of the IFS, such S that Λ = i∈I φ(Λ). Such an IFS is called self-conformal, and the attractor is sometimes called a self-conformal set. It was shown by Falconer [5] (see also [6, Chapter 3]) that the Hausdorff dimension of a self-conformal set is always equal to its box-counting (Minkowski) dimension, so we will simply write dim(Λ) below. We are interested in computing this dimension. For a finite word u ∈ I n let φ u := φ u 1 ◦ · · · ◦ φ u n , I u := φ u (I). The pressure function is given by (1.1) X 1 log kφ ′ u k t , n→∞ n n P Φ (t) = lim u∈I where k · k is the supremum norm on I. Using the Bounded Distortion Property, it is easy to see that the limit in (1.1) exists, and there is a unique zero of Bowen’s equation P Φ (s) = 0, whose solution s = s(Φ) is called the conformal dimension of Φ. We always have the upper bound, obtained using the natural covers by cylinder intervals I u , with |u| = n: dim(Λ Φ ) ≤ min{1, s(Φ)}. Boris Solomyak, Department of Mathematics, Bar-Ilan University, Ramat-Gan, Israel E-mail address: bsolom3@gmail.com. Date: January 9, 2024. Supported by the Israel Science Foundation grant #1647/23." 2401.03542v1,"The repulsive Euler-Poisson equations with variable doping profile Olga S. Rozanova a Department of Mechanics and Mathematrics, Moscow State University, Moscow 119991 Russia Abstract We prove that arbitrary small smooth perturbations of the zero equilibrium state of the repulsive pressureless Euler-Poisson equations, which describe the behavior of cold plasma, blow up for any non-constant doping profile already in one-dimensional space. We also propose a numerical procedure that allows one to find the blow-up time for any initial data and present examples of such calculations for various doping profiles for standard initial data, corresponding to the laser pulse. Keywords: Euler-Poisson system, equations of cold plasma, singularity formation, variable doping profile 2000 MSC: 35F55, 35Q60, 35B44, 35B20, 35L80 1. Introduction The system of Euler-Poisson equations describing the behavior of cold plasma in R d in the repulsive case has the following form: ∂V + (V · ∇)V = −∇Ψ, ∂t ∂n + div (nV ) = 0, ∂t ∆Ψ = c(x) − n. (1) The components of the solution V , n > 0, Ψ are the velocity, electron density and electric field potential, respectively, they depend on the time t ⩾ 0 and the point x ∈ R d . A fixed C 1 - smooth function c(x) > 0 is the density background or the so-called doping profile. Email address: rozanova@mech.math.msu.su (Olga S. Rozanova) Preprint submitted to Elsevier January 9, 2024" 2401.03551v1,"CAPTAIN at COLIEE 2023: Efficient Methods for Legal Information Retrieval and Entailment Tasks Chau Nguyen ∗ Phuong Nguyen ∗ Thanh Tran ∗ Dat Nguyen ∗ An Trieu ∗ Tin Pham Anh Dang Le-Minh Nguyen † {chau.nguyen,phuongnm,thanhtc,nguyendt,antrieu,tinpham,hoanganhdang,nguyenml}@jaist.ac.jp Japan Advanced Institute of Science and Technology Ishikawa, Japan ABSTRACT 1 The Competition on Legal Information Extraction/Entailment (COL- IEE) is held annually to encourage advancements in the automatic processing of legal texts. Processing legal documents is challenging due to the intricate structure and meaning of legal language. In this paper, we outline our strategies for tackling Task 2, Task 3, and Task 4 in the COLIEE 2023 competition. Our approach involved utilizing appropriate state-of-the-art deep learning methods, designing methods based on domain characteristics observation, and applying meticulous engineering practices and methodologies to the competition. As a result, our performance in these tasks has been outstanding, with first places in Task 2 and Task 3, and promising results in Task 4. Our source code is available at https://github. com/Nguyen2015/CAPTAIN-COLIEE2023/tree/coliee2023. The COLIEE competition [11] (Competition on Legal Information Extraction/Entailment) is an annual event that focuses on the automated processing of legal texts. The competition involves two types of data: case law and statute law. For each type of data, there are two tasks: legal information retrieval and legal information entailment. Task 1 involves retrieving cases that support a given case law, which is a crucial aspect of legal practice, used by attorneys and courts in decision-making. Task 2 also uses case law data, but requires models to find paragraphs that entail the decision of a given case. Tasks 3 and 4 involve using statute law data and tackling challenges such as retrieval and entailment. It is worth noting that Task 1 can be considered as an initial step towards Task 2, and Task 3 can serve as a preliminary stage for Task 4. Nonetheless, it is not obligatory to perform Task 1 before Task 2 or to undertake Task 3 prior to Task 4. This year, we participated in Task 2, Task 3, and Task 4. The CAPTAIN team has succeeded in achieving competitive results in the COLIEE 2023 competition by utilizing appropriate deep learning techniques, suitable methods based on domain characteristics, and robust engineering practices and methodologies. In Task 2, to tackle the challenging task of legal case entailment in COLIEE 2023, we propose an approach based on the pre-trained MonoT5 sequence-to-sequence model, which is fine-tuned with hard negative mining and ensembling techniques. The approach utilizes a straightforward input template to represent the point-wise classification aspect of the model and captures the relevance score of candidate paragraphs using the probability of the ""true"" token (versus the ""false"" token). The ensembling stage involves hyperparameter searching to find the optimal weight for each checkpoint. The approach achieves state-of-the-art performance in Task 2 this year, demonstrating the effectiveness of the proposed techniques. Our solution for Task 3 addresses the issue of data diversity across many legal categories (e.g., rights of retention, ownership, juridical persons). We observed that the queries and articles in the Civil Code include multiple categories, and the limited annotated data and lengthy pairs of questions and articles make it challenging CCS CONCEPTS • Computing methodologies → Neural networks; • Applied computing → Law. KEYWORDS COLIEE competition, Legal Text Processing, CAPTAIN Team ACM Reference Format: Chau Nguyen, Phuong Nguyen, Thanh Tran, Dat Nguyen, An Trieu, Tin Pham, Anh Dang, and Le-Minh Nguyen. 2023. CAPTAIN at COLIEE 2023: Efficient Methods for Legal Information Retrieval and Entailment Tasks. In Proceedings of COLIEE 2023 workshop, June 19, 2023, Braga, Portugal. 10 pages. ∗ Authors contributed equally to the paper † The corresponding author Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). COLIEE 2023, June 19, 2023, Braga, Portugal © 2023 Copyright held by the owner/author(s). INTRODUCTION" 2401.03554v1,"False Discovery Rate and Localizing Power Anderson M. Winkler a,∗ , Paul A. Taylor b , Thomas E. Nichols c , Chris Rorden d Division of Human Genetics, School of Medicine, University of Texas Rio Grande Valley, Brownsville, Texas, usa b Scientific and Statistical Computing Core, National Institute of Mental Health, National Institutes of Health, Bethesda, Maryland, usa. c Big Data Institute, University of Oxford, Oxford, uk d Department of Psychology, University of South Carolina, Columbia, South Carolina, usa. a Abstract False discovery rate (FDR) is commonly used for correction for multiple testing in neuroimaging studies. However, when using two-tailed tests, making directional inferences about the results can lead to vastly inflated error rate, even approaching 100% in some cases. This happens because FDR only provides weak control over the error rate, meaning that the proportion of error is guaranteed only globally over all tests, not within subsets, such as among those in only one or another direction. Here we consider and evaluate different strategies for FDR control with two-tailed tests, using both synthetic and real imaging data. Approaches that separate the tests by direction of the hypothesis test, or by the direction of the resulting test statistic, more properly control the directional error rate and preserve FDR benefits, albeit with a doubled risk of errors under complete absence of signal. Strategies that combine tests in both directions, or that use simple two-tailed p-values, can lead to invalid directional conclusions, even if these tests remain globally valid. To enable valid thresholding for directional inference, we suggest that imaging software should allow the possibility that the user sets asymmetrical thresholds for the two sides of the statistical map. While FDR continues to be a valid, powerful procedure for multiple testing correction, care is needed when making directional inferences for two-tailed tests, or more broadly, when making any localized inference. Keywords: False discovery rate, two-tailed tests, localizing power, weak control, visualization software. ∗ Corresponding author. Email addresses: anderson.winkler@utrgv.edu (Anderson M. Winkler), paul.taylor@nih.gov (Paul A. Taylor), thomas.nichols@bdi.ox.ac.uk ( Thomas E. Nichols), rorden@mailbox.sc.edu (Chris Rorden) Preprint submitted to arχiv January 9, 2024" 2401.03556v1,"An Incentive Regulation Approach for Balancing Stakeholder Interests in Transmission Investment Yuxin Xia Thomas Morstyn School of Engineering The University of Edinburgh Edinburgh, U.K. yuxin.xia@ed.ac.uk, thomas.morstyn@ed.ac.uk Iacopo Savelli The Centre for Research on Geography, Resources, Environment, Energy & Networks Bocconi University 20100 Milano, MI, Italy iacopo.savelli@unibocconi.it Abstract—The merchant-regulatory mechanism represents a promising tool that combines the benefits of merchant investment and regulated investment, thereby providing efficient incentives for merchant Transmission Companies (Transcos) subject to regulatory compliance. However, one of the drawbacks of the H-R-G-V merchant-regulated mechanism is that it allows the Transco to capture the entire surplus increase resulting from investment, without any economic benefits for consumers and generators. To address this issue, we propose an incentive tuning parameter, which is incorporated into the calculation of the incentive fee for the Transco. Accordingly, the regulatory framework can effectively manage the Transco’s profit and allow market participants to access economic benefits, thus ensuring a fair distribution of economic advantages among the stakeholders, while the impact on overall social welfare remains relatively modest. Index Terms—Economic benefits, fairness, incentive tuning parameter, merchant-regulatory mechanism. I. I NTRODUCTION Transmission investment is essential to the success of energy transition, providing consumers with non-discriminatory access to affordable generation and ensuring competitiveness and sustainability [1]. According to the report in [2], the investment in transmission and distribution grids is expected to increase to e40-62 billion per year in the EU to meet climate and energy goals. In the US, the total capital investment in transmission network is expected to reach 3.7 trillion dollars by 2050 [3]. Therefore, it is important to deliver efficient investments and relieve congestion problems, while ensuring fairness between stakeholders [4]. Historically, electric transmission has been regarded as a natural monopoly due to its inherent characteristics [5]. However, the emergence of merchant transmission has disrupted this perception. Unlike regulated monopoly transmission investment, merchant investment fosters a market-driven environment and encourages unrestricted competition in the investment process [6]. Merchant investors seek remuneration through the the sale of financial or physical transmission Submitted to the 22nd Power Systems Computation Conference (PSCC 2024). rights, or the congestion rent [7], [8], [9]. Nevertheless, despite the numerous advantages associated with merchant transmission investment (as discussed in [10]), significant concerns arise regarding its potential to lead to sub-optimal expansion and questions remain related to both theoretical design and real-world implementation [11]. Despite the extensive reform in the electricity industry, the transmission sector of electric power systems has largely remained under regulation [12]. In many countries, such as in England and Wales [6], transmission companies continue to function as natural monopolies, necessitating regulatory incentives to promote investment [12]. In order to address the information asymmetry between regulators and the transmission company (Transco), market incentives are more effective than direct central control [13], [14]. The regulatory framework entails various design approaches, including cost-of-service mechanisms [12], price-cap regulation mechanisms [15], [16], incentive regulation approaches [17] and merchant-regulated mechanisms [13], [14], [18], [19]. According to the argument in [20], merchant investment is considered to be a supplementary approach rather than a substitute for regulatory investment. In fact, Australia utilizes this combination of merchant and regulated investment strategies [6]. This merchant-regulated mechanism combines the benefits of both merchant and regulated investment, with the H-R-G-V mechanism serving as an example [13], [14], [19]. This mechanism builds upon the price-cap theory [15] and the Incremental Surplus Subsidy (ISS) scheme [21]. By determining a regulated incentive fee that depends on the total contribution to economic benefits from their investment, the H-R-G-V incentive mechanism aims to provide incentives to the profit-maximizing Transco for performing social-welfare maximizing investments. The primary objective of the Transco typically revolves around profit maximization, while the regulator is entrusted with the responsibility of promoting social welfare [13]. Moreover, a ‘benevolent’ regulator can also establish an objective function that assigns weights to either consumer benefits or the net profit of the Transco (the regulated firm) [17]. Concerns have been raised about the H-R-G-V mechanism, which allows Transcos to capture all the welfare improvements. This puts 22nd Power Systems Computation Conference Porto, Portugal — June 27 – July 1, 2024 PSCC 2024" 2401.03558v1,"The cosmic string in Horndeski-like gravity Fabiano F. Santos ∗ Departamento de Física, Universidade Federal do Maranhão, Campus Universitario do Bacanga, São Luís (MA), 65080-805, Brazil. Jackson Levi Said † Institute of Space Sciences and Astronomy, University of Malta, Msida, MSD 2080, Malta and Department of Physics, University of Malta, Msida, MSD 2080, Malta. Scalar-tensor theories have shown promise in many sectors of cosmology. However, recent constraints from the speed of gravitational waves have put severe limits on the breadth of models such classes of theories can realize. In this work, we explore the possibility of a string-like Horndeski Lagrangian that is equipped with two dilaton fields. This is an interesting low-energy effective string theory that has a healthy general relativity limit. The evolution of a two-dilation coupled cosmology is not well-known in the literature. We explore the tensor perturbations in order to assess the behavior of the model again the speed of gravitational wave constraint. Our main result is that this model exhibits of a class of cosmological theories that is consistent with this observational constraint. I. INTRODUCTION More than one century ago, Einstein’s theory groundbreaking General Theory of Relativity, and since then most remarkable results have emerged from your theory [1–3], as for example the standard cosmology model, which was developed in the second half of the last century and inspired in two fundamental observations: the recession of the galaxies, discovery by Hubble [4], and Cosmic Microwaves Background (CMB) [5]. Beyond this scenario, another that has been calling attention in recent years is the string cosmology performed by Ref. [6] that discusses scenarios in the presence of inflationary kinematics models. In such classes, the string cosmology backgrounds must be different from the ""standard"" kinematic properties typical of field theory models of inflation. In this framework, there arises some interesting questions about whether such kinematic differences may correspond (at the least principle) to observable phenomenological differences, to give a clear signature of the various primordial scenarios. The results concerning CMB observations and gravity waves (GW) detection addressed some around the possibility of generating the spectrum of tensor metric perturbations in string cosmology in agreement with Planck data using the stochastic background of primordial gravitational radiation whatever is compatible with the design sensitivity of LIGO/Virgo and/or LISA [7]. This scenario is possible only for a wide region of the parameter space which encompasses pre-big bang models [8]. Indeed, cosmic strings offer the prospect for the detection of cosmological gravitational waves (GWs). In this case, we have the incoherent GW emission, and this combined with a large number of string loops, leads us ∗ fabiano.ffs23-at-gmail.com † jackson.said@um.edu.mt to a stochastic GW background (SGWB), which is encoded with the properties of the string network [7, 9, 10]. Some proposed models predict that the Laser Interferometric Space Antenna (LISA) can measure this background, considering leading models of string networks. The model presented by Ref. [7] predicts that LISA will be able to probe cosmic strings with ten G µ ≈ O(10 −17 ) ions, this prediction improves by about six orders of magnitude the constraints of the current pulsar. Beyond Einstein’s theory, other models known such as Lovelock gravity, Horndeski gravty, and Gauss-Bonnet gravity find applications in cosmology and string theory [11–17]. These proposed models are observational viable and attractive candidates for inflation and string theory, in which the scalar field is naturally provided by the gravitational sector. In this work, we propose a cosmic background in Horndeski-like gravity, which is devoted to studying the direct inflationary production of gravitational radiation. In our setup, the start point is the amplification of the tensor part of the metric fluctuation and subsequent formation of a cosmic background of relic gravitons in Horndeski gravity. Recently applications of the Horndeski gravity in string theory and cosmology [13–17] has been achieved through the following Lagrangian 1 L H = (R − 2Λ) − (αg µν − γ G µν )∇ µ φ∇ ν φ , 2 (1) where R, G µν and Λ are the scalar curvature, the Einstein tensor, and the cosmological constant respectively, and where φ = φ(r) is a scalar field. Also, α and γ are coupling constants. Using the Lagrangian in Ref. (1) equipped with two dilatons, we proposed the scenario of the propagation of tensor perturbations considering the action Z p 1 1 S = − 3 d 4 x |g|e −φ (L H − ∇ µ χ∇ µ χ + V (φ, χ)) .(2) 2λ s 2" 2401.03561v1,"ANALYSIS OF THE TAYLOR-HOOD SURFACE FINITE ELEMENT METHOD FOR THE SURFACE STOKES EQUATION ARNOLD REUSKEN ∗ Abstract. We consider the surface Stokes equation on a smooth closed hypersurface in R 3 . For discretization of this problem a generalization of the surface finite element method (SFEM) of Dziuk- Elliott combined with a Hood-Taylor pair of finite element spaces has been used in the literature. We call this method Hood-Taylor-SFEM. This method uses a penalty technique to weakly satisfy the tangentiality constraint. In this paper we present a discretization error analysis of this method resulting in optimal discretization error bounds in an energy norm. We also address linear algebra aspects related to (pre)conditioning of the system matrix. Key words. analysis surface Stokes equation, Taylor-Hood finite element pair, finite element error 1. Introduction. There is a substantial recent literature on numerical approximation of the surface Stokes equations, e.g., [15, 21, 22, 18, 24, 4, 2, 16, 3, 6]. In these papers different finite element techniques are treated, e.g., H 1 -conforming methods in which the tangentiality constraint is treated by a penalty method [15, 21, 22, 16], H(div Γ )-conforming methods combined with a Piola transformation approach [18, 2], discretization based on a stream function formulation [24, 4], or an H(div Γ )- conforming method that avoids penalization and uses a specific construction of nodal degrees of freedom for the velocity field [6]. In some of these papers rigorous discretization error analyses are presented. There are also recent papers in which techniques used for the Stokes equations are extended to Navier-Stokes equations on stationary or evolving surfaces, e.g., [19, 10, 26, 23]. The conceptually maybe simplest method for discretization of surface Stokes (or Navier-Stokes) equations is based on a natural generalization of the surface finite element method (SFEM), introduced by Dziuk-Elliott for scalar surface PDEs [7], to vector-valued equations. The basic idea of this method, which has been used in the literature in e.g., [10, 26, 25, 3], is as follows. Using a suitable consistent penalty term the Stokes problem on a two-dimensional surface Γ ⊂ R 3 can be written in a variational form with a velocity test and trial space, denoted by V ∗ , that contains arbitrary, i.e, not necessarily tangential, three-dimensional velocity vectors. The tangential components of these vectors have H 1 (Γ) smoothness. The surface Γ is approximation by a shape regular triangulation Γ h (for higher order approximation one can use the technique from [5], cf. below). On the triangular elements of Γ h we use a “simple” H 1 -conforming pair (for velocity and pressure). A very natural choice is the Taylor-Hood P m -P m−1 (m ≥ 2) pair of finite element spaces. With this pair one can construct a Galerkin discretization of the surface Stokes variational problem in the product space V ∗ × L 20 (Γ), with a “variational crime” due to the geometry approximation. One can interpret this as a generalization of the SFEM to vectorvalued problems in the sense that one essentially discretizes the pressure and each of ∗ Institut für Geometrie und Praktische Mathematik, RWTH-Aachen University, D-52056 Aachen, Germany (reusken@igpm.rwth-aachen.de). 1" 2401.03562v1,"GL OCAL F AIR : Jointly Improving Global and Local Group Fairness in Federated Learning Syed Irfan Ali Meerza 1 , Luyang Liu 2 , Jiaxin Zhang 3 , Jian Liu 1 1 University of Tennessee Knoxville 2 Google Research 3 Intuit AI Research smeerza@vols.utk.edu, luyangliu@google.com, jxzhangai@gmail.com, jliu@utk.edu Abstract Federated learning (FL) has emerged as a prospective solution for collaboratively learning a shared model across clients without sacrificing their data privacy. However, the federated learned model tends to be biased against certain demographic groups (e.g., racial and gender groups) due to the inherent FL properties, such as data heterogeneity and party selection. Unlike centralized learning, mitigating bias in FL is particularly challenging as private training datasets and their sensitive attributes are typically not directly accessible. Most prior research in this field only focuses on global fairness while overlooking the local fairness of individual clients. Moreover, existing methods often require sensitive information about the client’s local datasets to be shared, which is not desirable. To address these issues, we propose GL OCAL F AIR , a client-server co-design fairness framework that can jointly improve global and local group fairness in FL without the need for sensitive statistics about the client’s private datasets. Specifically, we utilize constrained optimization to enforce local fairness on the client side and adopt a fairness-aware clusteringbased aggregation on the server to further ensure the global model fairness across different sensitive groups while maintaining high utility. Experiments on two image datasets and one tabular dataset with various state-of-the-art fairness baselines show that GL OCAL F AIR can achieve enhanced fairness under both global and local data distributions while maintaining a good level of utility and client fairness. 1 Introduction Federated Learning (FL) [McMahan et al., 2017] allows multiple data holders (i.e., clients) to collaboratively train a global model under the coordination of a central server without directly sharing their private datasets. Its strong emphasis on client privacy has made it particularly attractive for many privacy-critical applications, such as speaker verification [Granqvist et al., 2020], predictive typing [Hard et al., 2018], image classification [Chen and Chao, 2021] and healthcare [Rieke et al., 2020; Xu et al., 2021]. Although providing great privacy benefits, the inherent characteristics Client 1 (local) Client 2 (local) Client 3 (local) Full dataset across all participating clients (global) Color Image= True Positive Gray Image = False Negative Figure 1: An illustrative example of bias in classification when considering two sensitive gender groups (i.e., male vs. female) in FL with three participating clients. At the global scale, the model is fair due to the equal true-positive rate (or false-negative rate). However, when considering the model’s fairness on each client, the classification result is biased. Note that the model performs differently between clients mainly due to the client non-IIDness in FL, such as different distributions in racial and age groups. of FL, such as data heterogeneity, party selection, and client dropping out, will inevitably make the resulting FL model biased against specific demographic groups (e.g., racial and gender groups), causing specific populations to receive undesirable treatments. Additionally, to protect clients’ privacy, in FL the server is prohibited from directly accessing the clients’ datasets, rendering most centralized bias mitigation strategies inapplicable [Grgić-Hlača et al., 2018; Zhang et al., 2018; Lohia et al., 2019]. Therefore, how to improve fairness has become an open problem in this field and has gained considerable research attention recently [Kairouz et al., 2021]. Existing Efforts in Improving Fairness in FL. Initial studies [Li et al., 2020; Mohri et al., 2019; Lyu et al., 2020; Li et al., 2021; Zhang et al., 2020b] in this field mainly focus on client fairness, which aims to promote equalized accuracies across all clients. This is typically achieved through reducing the client’s performance disparity [Li et al., 2020] or maximizing the performance of the worst client [Mohri et al., 2019]. However, under such frameworks, the FL model can show similar accuracies on all clients while still being biased against certain under-represented groups. To address this, a few recent studies [Abay et al., 2020; Zhang et al., 2020a; Rodríguez-Gálvez et al., 2021; Chu et al., 2021; Ezzeldin et al., 2023; Du et al., 2021] have proposed group fairness solutions for improving fairness across" 2401.03564v1,"Experimental Demonstration of Imperfection-Agnostic Local Learning Rules on Photonic Neural Networks with Mach-Zehnder Interferometric Meshes Luis El Srouji, Mehmet Berkay On, Yun-Jhu Lee, Mahmoud Abdelghany, S. J. Ben Yoo University of California, Davis Author e-mail address: lzelsrouji@ucdavis.edu, sbyoo@ucdavis.edu Abstract: Mach-Zehnder Interferometric meshes are attractive for low-loss photonic matrix multiplication but are challenging to program. Using least-squares optimization of directional derivatives, we experimentally demonstrate that desired matrix updates can be implemented agnostic to hardware imperfections. © 2024 The Author(s) 1. Introduction Integrated photonics are attractive for analog computation due to higher transmission speeds and larger bandwidths than traditional electronics [1]. Photonic accelerators have targeted matrix multiplication in particular because the quadratic computational complexity of the operation can slow computationally intensive applications like neural network inference [2]. Various photonic devices can be arranged into analog photonic matrix multipliers to take advantage of the higher throughput and operating speeds, including many architectures of Mach-Zehnder Interferometric (MZI) meshes [3–5]. Despite these advantages, programming MZI meshes is challenging because of the nonlinear relationship between the tunable parameters available (phase shifts) and the resultant matrix implemented. Multiple algorithms have been proposed to implement a target matrix [3, 4], along with gradient-descent-based methods for training neural networks [6, 7]. In the latter set of algorithms, the target matrix is unknown in advance, and the parameters are optimized according to gradient descent of some cost or loss function. These methods are only applicable when a loss function is well-defined and differentiable. In neuromorphic computing, however, brain-inspired neural networks contain many recurrent structures whose dynamics are not well-defined by a loss function and may not be easily differentiable. As such, brain-like learning rules have been proposed that can be used to train these neural networks with only the information local to a given synaptic connection [8–10]—in other words, using only the activity of the sending and receiving neurons. These local learning rules dictate the change to a single synaptic weight, but this is problematic for MZI meshes because of the aforementioned nonlinear mapping. We propose and experimentally demonstrate a scheme for implementing local learning rules on MZI meshes. The implementation is agnostic to fabrication variations, thermal crosstalk, and requires no calibration. 2. Local Learning by Central-Difference Approximation Each MZI implements an arbitrary 2x2 unitary operation that can be programmed to control the power coupling and phase difference of signals between each of its input and output ports. In the phasor domain, the coupling of ⃗⃗ denote electromagnetic waves between input and output ports can be written as the transfer matrix below. 𝐴⃗ and 𝐵 the phasor forms of the optical fields at the input and output ports, respectively, and 𝜙 and 𝜃 represent phase shifts within a single functional MZI unit (as shown in Fig. 1a): 𝑗𝜙 ⃗⃗ = [ 𝑒 sin⁡(𝜃/2) cos⁡(𝜃/2) ] 𝐴⃗ 𝐵 (1) 𝑒 𝑗𝜙 cos⁡(𝜃/2) −sin⁡(𝜃/2) Meshes of MZIs can be used to implement larger matrix operations, and because the operation implemented is unitary, this multiplier is nearly lossless, allowing for low-power accelerator designs. The MZI mesh can be operated coherently or incoherently depending on whether the inputs are generated by a single laser or multiple lasers. Because the MZI mesh is attractive in low-power applications, it is well-suited for use in neuromorphic accelerators. Within neuromorphic computing, spiking neurons are preferred for low-power signal encodings and as such an incoherent mode of operation is sufficient. In addition, the synaptic weighting in the human brain can be represented with positive magnitudes only, with the distinction between excitatory versus inhibitory synapses being a result of the neurotransmitter used; this means the synapse never changes sign and can be implemented by the interpretation of each output port on the incoherently excited MZI mesh. A given weight matrix implemented by an MZI mesh can be represented as a multivariable function 𝑊(Θ):⁡ℝ 𝑛 → ℝ 𝑚 where Θ represents the set of tunable parameters, and 𝑊 is the set of weights implemented. The mapping is" 2401.03604v1,"Amirkabir campus dataset: Real-world challenges and scenarios of Visual Inertial Odometry (VIO) for visually impaired people Ali Samadzadeh 1 , Mohammad Hassan Mojab 2 , Heydar Soudani 2 , Seyed Hesamoddin Mireshghollah 1 , Ahmad Nickabadi Abstract— Visual Inertial Odometry (VIO) algorithms estimate the accurate camera trajectory by using camera and Inertial Measurement Unit (IMU) sensors. The applications of VIO span a diverse range, including augmented reality and indoor navigation. VIO algorithms hold the potential to facilitate navigation for visually impaired individuals in both indoor and outdoor settings. Nevertheless, state-of-the-art VIO algorithms encounter substantial challenges in dynamic environments, particularly in densely populated corridors. Existing VIO datasets, e.g., ADVIO, typically fail to effectively exploit these challenges. In this paper, we introduce the Amirkabir campus dataset (AUT-VI) to address the mentioned problem and improve the navigation systems. AUT-VI is a novel and super-challenging dataset with 126 diverse sequences in 17 different locations. This dataset contains dynamic objects, challenging loop-closure/mapreuse, different lighting conditions, reflections, and sudden camera movements to cover all extreme navigation scenarios. Moreover, in support of ongoing development efforts, we have released the Android application for data capture to the public. This allows fellow researchers to easily capture their customized VIO dataset variations. In addition, we evaluate state-of-theart Visual Inertial Odometry (VIO) and Visual Odometry (VO) methods on our dataset, emphasizing the essential need for this challenging dataset. I. I NTRODUCTION Designing navigation systems for individuals with visual impairments is important for researchers and developers. A critical element of such systems is a robust localization algorithm capable of accurately determining the user’s position and direction. Typically, this localization relies on data collected from the device’s integrated sensors. Using GPS data has always been a solution in outdoor environments. However, there are limitations associated with relying solely on GPS, as extensively discussed in the literature. On the other hand, the sensors used in localization methods should be inexpensive, available, and easy to use for blind people. Nowadays, smartphones are equipped with various sensors including cameras, accelerometers, and gyroscopes. Consequently, the localization algorithms that rely on the data provided by the sensors within the smartphones are a suitable solution. Visual Inertial Odometry (VIO) algorithms determine the location and orientation of an entity in a global and metric 1 Department of Computer Engineering, Amirkabir University of Technology, Tehran, Iran {a samad, h.mireshgholah, nickabadi}@aut.ac.ir 2 Department of Computer Engineering, Sharif University of Technology, Tehran, Iran {mhmojab, heydars}@ce.sharif.edu The dataset and the application are open-source and free for the public at https://a3dv.github.io/autvi Fig. 1. Example scenes from the AUT-VI dataset. A) There are multiple locations (indoors and outdoors) over the campus where the dataset is recorded. B) More than half of the sequences in the dataset are completely dynamic and challenging. C) The videos are captured at various times of the day for each location with almost the same trajectory. coordination system using a visual sensor (camera) and inertial sensor data. VIO algorithms designed to run on smartphones can rely on visual feed and inertial data to estimate the motion. A visual sensor alone cannot ensure the system’s robustness and usually yields significant relative errors. Usually, Inertial Measurement Unit (IMU) data is used to reduce this error. Unlike the camera that captures environmental clues of a movement, IMU measures the internal state of the moving object that is not affected by the environment [16]. The VIO algorithms must deal with various challenges to achieve accurate localization. One of the most significant challenges is dynamic objects [2] such as humans, vehicles, and other moving objects [27]. The main issue of having dynamic objects inside the camera view is finding consistent visual features and using them to build a stable and accurate 3D point cloud and sequence of camera poses through time for further usage. Although there are VIO algorithms that claim to consider dynamic objects [17], [1], it is difficult to evaluate the performance of these algorithms in real-world dynamic situations as there is no suitable dataset for this purpose. The second" 2401.03617v1,"Fast and high-fidelity dispersive readout of a spin qubit with squeezing and resonator nonlinearity Chon-Fai Kam ∗ and Xuedong Hu † Department of Physics, University at Buffalo, SUNY, Buffalo, New York 14260, USA Fast and high-fidelity qubit measurement is crucial for achieving quantum error correction, a fundamental element in the development of universal quantum computing. For electron spin qubits, fast readout stands out as a major obstacle in the pursuit of error correction. In this work, we explore the dispersive measurement of an individual spin in a semiconductor double quantum dot coupled to a nonlinear microwave resonator. By utilizing displaced squeezed vacuum states, we achieve rapid and high-fidelity readout for semiconductor spin qubits. Our findings reveal that introducing modest squeezing and mild nonlinearity can significantly improve both the signal-to-noise ratio (SNR) and the fidelity of qubit-state readout. By properly marching the phases of squeezing, the nonlinear strength, and the local oscillator, the optimal readout time can be reduced to the submicrosecond range. With current technology parameters (κ ≈ 2χ s , χ s ≈ 2π × 0.15 MHz), utilizing a displaced squeezed vacuum state with 30 photons and a modest squeezing parameter r ≈ 0.6, along with a nonlinear microwave resonator charactered by a strength of λ ≈ −1.2χ s , a readout fidelity of 98% can be attained within a readout time of around 0.6 µs. Intriguing, by using a positive nonlinear strength of λ ≈ 1.2χ s , it is possible to achieve an SNR of approximately 6 and a readout fidelity of 99.99% at a slightly later time, around 0.9 µs, while maintaining all other parameters at the same settings. I. INTRODUCTION The pursuit of constructing a large-scale universal quantum computer, the prime goal in the field of quantum information science, presents an immensely challenging task that necessitates advancements in both quantum algorithms and hardware development. Currently, there are multiple approaches to quantum computing, including superconducting circuits [1, 2], trapped ions [3, 4], semiconductor spin qubits [5–9], and photonic systems [10–12]. Up to now, the largest superconducting quantum computers have up to a few hundreds of qubits [13], while the largest trapped ion quantum computers has scaled up to a few tens of qubits under coherent control [14]. Among these options, spin qubits in siliconbased semiconductor quantum dots, while lagging somewhat behind other approaches in early qubit demonstrations, offers tantalizing long-term potential to combine the high controllability of trapped ion systems as well as the scalability of superconducting systems. Spin qubits in semiconductor quantum dots hold great promise as a quantum computing platform owing to their scalability infrastructure rooted in a compact qubit footprint of roughly 0.01 µm 2 , along with their compatibility with the widely-established complementary metal-oxidesemiconductor (CMOS) integration techniques developed in the last half-century [15]. Nonetheless, in the pursuit of scalable quantum computing, a pivotal obstacle regardless of the qubit’s physical nature, lies in successfully incorporating active quantum error correction for logical qubits while preserving the encoded information [16]. This entails the need for stabilizer measurements of multiple qubits [17], along with the implementation of real-time feedback to the encoded qubits [18]. The effectiveness of realtime feedback control for active quantum error correction depends on the capability to attain high-fidelity readout within ∗ Email: dubussygauss@gmail.com † Email: xhu@buffalo.edu timescales considerably shorter than the qubits’ decoherence times. In silicon quantum dots, spin coherence times typically range from microseconds to milliseconds, depending on the specific design and control methods [19], making it imperative to achieve readout fidelity surpassing the 99% threshold required by the most prevalent surface error correction codes [20, 21] in times of a few microseconds. Although gate-based dispersive spin readout in silicon has shown an average readout fidelity ranging from 73.3% to 98% when utilizing offchip resonators, it necessitates integration times on the order of milliseconds (0.3 ms - 2.6 ms) to accomplish single-shot readout [24–26]. Spin measurement approaches commonly used, such as those relying on spin-dependent tunneling [22] or spin blockade [23], along with a DC charge sensor, are too slow for active quantum error correction. Employing on-chip resonators with a higher-frequency probe pulse, a gate-based dispersive spin readout in silicon has yielded an average readout fidelity of 98%, achieving single-shot readout in a measurement time of 6 µs [27]. Besides, by employing a single-electron transistor (SET) as a charge sensor has achieved a single-shot readout for electron spins in silicon with a fidelity of 97% within 1.5 µs [28], as well as a fidelity of 99.9% within 6 µs [29]. Moreover, by utilizing a radio-frequency single-electron transistor (rf-SET), researchers have achieved a signal-to-noise ratio (SNR) of 6 for a single-shot singlet-triplet readout within 0.8 µs [30], and 99% fidelity within 1.6 µs [31]. Nonetheless, integrating charge sensors would considerably increase the complexity of the device, while the larger dimensions of rf-SETs limit their positioning within densely connected qubit frameworks [32]. Consequently, in the context of quantum dot spin qubits, readout processes remain notably slower than gate operations when on-chip charge sensors are not employed. In this regard, achieving a fast readout with high fidelity and a compact footprint for quantum dot spin qubits remains a formidable challenge, acting as a bottleneck in the advancement of current quantum information technology based on spin qubits. In order to address the readout bottleneck associated with" 2401.03633v1,"ARTICLE TEMPLATE A Spatial-statistical model to analyse historical rutting data N. O. A. S Jourdain a , I. Steinsland a , M. Birkhez-Shami a , D. Gryteselv b , D. Siebert b and A. Klein-Paste a a b Norwegian University of Science and Technology (NTNU), Trondheim, Norway; Statens Vegvesen, Trondheim, Norway ARTICLE HISTORY Compiled January 9, 2024 ABSTRACT Pavement rutting poses a significant challenge in flexible pavements, necessitating costly asphalt resurfacing. To address this issue comprehensively, we propose an advanced Bayesian hierarchical framework of latent Gaussian models with spatial components. Our model provides a thorough diagnostic analysis, pinpointing areas exhibiting unexpectedly high rutting rates. Incorporating spatial and random components, and important explanatory variables like annual average daily traffic (traffic intensity), pavement type, rut depth and lane width, our proposed models account for and estimate the influence of these variables on rutting. This approach not only quantifies uncertainties and discerns locations at the highest risk of requiring maintenance, but also uncover spatial dependencies in rutting (millimetre/year). We apply our models to a data set spanning eleven years (2010-2020). Our findings emphasize the systematic unexpected spatial rutting effect, where more of the rutting variability is explained by including spatial components. Pavement type, in conjunction with traffic intensity, is also found to be the primary driver of rutting. Furthermore, the spatial dependencies uncovered reveal road sections experiencing more than 1 millimeter of rutting beyond annual expectations. This leads to a halving of the expected pavement lifespan in these areas. Our study offers valuable insights, presenting maps indicating expected rutting, and identifying locations with accelerated rutting rates, resulting in a reduction in pavement life expectancy of at least 10 years. KEYWORDS Flexible pavement; predictive maintenance; rutting; spatial-statistical model; uncertainty 1. Introduction Pavement maintenance is essential to ensure road safety and prevent excessive depreciation of roads. Rutting is a major problem in flexible pavement structures and it is one of the major causes why pavements need asphalt resurfacing. Rutting is a distress mechanism that causes longitudinal surface depressions within the wheel path of the asphalt concrete layer. It can substantially affect traffic safety (Hao et al. 2009) due to impaired steerability and friction reduction due to standing water in the ruts. Ruts occur under the combined actions of traffic loads (Zhang et al. 2017) and is affected by environmental conditions, e.g., climate, seepage, temperature, weather (Ranadive and CONTACT N. O. A. S. Jourdain. Email: natoya.jourdain@ntnu.no" 2401.03637v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 Inverse-like Antagonistic Scene Text Spotting via Reading-Order Estimation and Dynamic Sampling Shi-Xue Zhang, Chun Yang, Xiaobin Zhu, Hongyang Zhou, Hongfa Wang, Xu-Cheng Yin Abstract—Scene text spotting is a challenging task, especially for inverse-like scene text, which has complex layouts, e.g., mirrored, symmetrical, or retro-flexed. In this paper, we propose a unified end-to-end trainable inverse-like antagonistic text spotting framework dubbed IATS, which can effectively spot inverse-like scene texts without sacrificing general ones. Specifically, we propose an innovative reading-order estimation module (REM) that extracts reading-order information from the initial text boundary generated by an initial boundary module (IBM). To optimize and train REM, we propose a joint reading-order estimation loss (L RE ) consisting of a classification loss, an orthogonality loss, and a distribution loss. With the help of IBM, we can divide the initial text boundary into two symmetric control points and iteratively refine the new text boundary using a lightweight boundary refinement module (BRM) for adapting to various shapes and scales. To alleviate the incompatibility between text detection and recognition, we propose a dynamic sampling module (DSM) with a thin-plate spline that can dynamically sample appropriate features for recognition in the detected text region. Without extra supervision, the DSM can proactively learn to sample appropriate features for text recognition through the gradient returned by the recognition module. Extensive experiments on both challenging scene text and inverse-like scene text datasets demonstrate that our method achieves superior performance both on irregular and inverse-like text spotting. Index Terms—Scene text spotting, inverse-like scene text, reading-order estimation, dynamic sampling I. I NTRODUCTION T EXT spotting aims to localize and recognize text in images. It has received ever-increasing attention for its extensive real-world applications, such as vehicle intelligence and road sign recognition in autonomous driving. Although text spotting has made significant progress recently, existing methods still face challenges in recognizing text with complex layouts, such as arbitrary orientations or shapes [1], [2], [3], [4], [5]. To address these problems, existing text spotting frameworks propose the Masked RoI [1], [6], [7] and Thin Plate Spline (TPS) [8], [3], [9] strategies. Masked RoI based methods allow for the suppression of background information, as shown in Fig. 1 (a1-a2), but they still struggles with irregular texts. TPS based methods can transform irregular texts into horizontal texts by symmetrical boundary points, as seen in Fig. 1 (b1-b3), but they also suffers from the accuracy of detected boundaries. Corresponding authors: Xiaobin Zhu. Shi-Xue Zhang, Chun Yang, Xiaobin, Zhu, Hongyang Zhou and Xu-Cheng Yin are with the School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB) Hongfa Wang is with Tencent Technology (Shenzhen) Co. Ltd; (e-mail: hongfawang@tencent.com). Manuscript received *** **, 2023; revised *** **, 2023. Fig. 1. Illustrations of different text feature sampling methods: (a) Masked RoI: a shape mask is used to formulate text regions, while background noise can be suppressed; (b) TPS without reading-order: the text is transformed into a horizontal region using boundary control points to generate fixed sample grids; (c) TPS with reading-order; (d) DSM with reading-order. In text spotting, two critical problems still require further improvement. Firstly, the crucial reading-order information is not fully explored for the recognizer to decode text characters in the correct sequence. Although many existing datasets follow the text reading direction, most ignore this issue, except Text Perceptron [8] and PGNet [10]. However, these two approaches only use information pointing to the head and tail of text, which in some cases (as shown in Fig. 1(a1)) cannot fully reflect the reading-order. Inverse-like texts are universal and appear mirrored, symmetrical, or retroflexed. Simply clipping the detection result of such exceptional text makes recognition difficult, as shown in Fig. 1 (a1-a3). Suppose the network can fully excavate and learn the reading-order information hidden in the training samples labeled with the reading direction. In that case, the reading-order information will suitably align the text for better recognition. The second issue is that text recognition accuracy is heavily dependent on the precision of detection, resulting in potential error propagation from detection to recognition, as pointed out in previous studies [11], [12]. Current methods [1], [8] generally adopt inflexible sampling strategies that rely on fixed sampling grids manually determined by detection boundaries or segmented masks. As a result, when detection accuracy is compromised or sampling features are inadequate, the recognizer may fail in decoding the correct sequence, as shown in Fig. 1 (c1-c3). Therefore, exploring an adaptive dynamic feature sampling approach that can improve recognition performance is nontrivial, especially in challenging scenarios where detection accuracy is limited." 2401.03648v2,"Reproducibility Analysis and Enhancements for Multi-Aspect Dense Retriever with Aspect Learning Keping Bi 1,2[0000−0001−5123−4999] , Xiaojie Sun 1,2[0009−0006−4570−6359] , Jiafeng Guo 1,2⋆[0000−0002−9509−8674] , and Xueqi Cheng 1,2[0000−0002−5201−8195] 1 CAS Key Lab of Network Data Science and Technology, ICT, CAS 2 University of Chinese Academy of Sciences {bikeping, sunxiaojie21s, guojiafeng, cxq}@ict.ac.cn Abstract. Multi-aspect dense retrieval aims to incorporate aspect information (e.g., brand and category) into dual encoders to facilitate relevance matching. As an early and representative multi-aspect dense retriever, MADRAL learns several extra aspect embeddings and fuses the explicit aspects with an implicit aspect “OTHER” for final representation. MADRAL was evaluated on proprietary data and its code was not released, making it challenging to validate its effectiveness on other datasets. We failed to reproduce its effectiveness on the public MA-Amazon data, motivating us to probe the reasons and re-examine its components. We propose several component alternatives for comparisons, including replacing “OTHER” with “CLS” and representing aspects with the first several content tokens. Through extensive experiments, we confirm that learning “OTHER” from scratch in aspect fusion is harmful. In contrast, our proposed variants can greatly enhance the retrieval performance. Our research not only sheds light on the limitations of MADRAL but also provides valuable insights for future studies on more powerful multi-aspect dense retrieval models. Code will be released at: https://github.com/sunxiaojie99/Reproducibility-for-MADRAL. Keywords: Multi-aspect Retrieval · Dense Retrieval · Aspect Learning. 1 Introduction Standing on the shoulders of pre-trained language models (PLMs)[5,23], dense retrieval models have exhibited impressive performance in the first stage of information retrieval [6,7,15,11]. Most dense retrieval models concentrate on unstructured textual data, while much less attention has been paid to structured item retrieval such as product search and people search. These scenarios have a wide population of users and the aspect information like brand (e.g., “Apple"") and affiliation (e.g., “Microsoft”) can be pivotal to enhance relevance matching. Nonetheless, it remains largely unexplored how to effectively integrate these aspects within dense retrieval models. ⋆ Corresponding author" 2401.03649v1,"Bayes Factor of Zero Inflated Models under Jeffereys Prior Paramahansa Pramanik * † Arnab Kumar Maity ‡ § January 9, 2024 Abstract. Microbiome omics data including 16S rRNA reveal intriguing dynamic associations between the human microbiome and various disease states. Drastic changes in microbiota can be associated with factors like diet, hormonal cycles, diseases, and medical interventions. Along with the identification of specific bacteria taxa associated with diseases, recent advancements give evidence that metabolism, genetics, and environmental factors can model these microbial effects. However, the current analytic methods for integrating microbiome data are fully developed to address the main challenges of longitudinal metagenomics data, such as high-dimensionality, intra-sample dependence, and zero-inflation of observed counts. Hence, we propose the Bayes factor approach for model selection based on negative binomial, Poisson, zero-inflated negative binomial, and zero-inflated Poisson models with non-informative Jeffreys prior. We find that both in simulation studies and real data analysis, our Bayes factor remarkably outperform traditional Akaike information criterion and Vuong’s test. A new R package BFZINBZIP has been introduced to do simulation study and real data analysis to facilitate Bayesian model selection based on the Bayes factor. Key words: Negative binomial distribution; Zero inflated negative binomial distribution, Poisson distribution, zero inflated poisson distribution; Bayes factor; non-informative Jeffreys prior; Microbiome. 1 Introduction The human microbiome consistes of the collection of estimated 3.0 × 10 13 (Sender et al., 2016) bacteria and 3.3 × 10 6 genes (Qin et al., 2010; Jiang et al., 2021). The human microbiome analysis impose a drastic impact on human health and disease (Ursell et al., 2012). In recent years, microbiome studies have been successfully identified disease-associated bacteria taxa in type 2 diabetes (Karlsson et al., 2013), liver cirrhosis (Qin et al., 2014), inflammatory bowl disease (Halfvarson et al., 2017; Kakkat et al., 2023), and melanoma patients responsive to cancer immunotherapy (Frankel et al., 2017; Jiang et al., 2021; Dasgupta et al., 2023; Hertweck et al., 2023; Khan et al., 2023; Vikramdeo et al., 2023). Quantification of of the human microbiome usually being proceeded by 16s rRNA sequencing or metagenomic shotgun sequencing, where sequence read counts are often summarized into a taxa count table (Jiang et al., 2023). Bioinformatics tools like quantitative insights into microbial ecology (QIIME) and mothur are used for analyzing raw 16S rRNA sequencing data (Jovel et al., 2016; Zhang and Yi, 2020). In this literature the word taxa means operational taxonomic units or other taxonomic or functional groups of bacterial sequences (Jiang et al., 2023; Altaweel et al., 2022). Although innovations in sequencing technology continue to prosper in microbiome studies, the * e-mail: ppramanik@southalabama.edu † Department of Mathematics and Statistics, University of South Alabama, 411 North University Boulevard, Mobile, AL 36688, USA. ‡ email: arnab.maity@pfizer.com § Pfizer Inc., 10777 Science Center Drive, San Diego, CA 92121, USA. 1" 2401.03653v2,"An exploratory study on automatic identification of assumptions in the development of deep learning frameworks Chen Yang a,b , Peng Liang c,∗ , Zinan Ma d a School of Artificial Intelligence, Shenzhen Polytechnic University, 518055 Shenzhen, China b State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China c School of Computer Science, Wuhan University, 430072 Wuhan, China d Department of Computer Science and Engineering, Chalmers University of Technology, S-412 96 Gothenburg, Sweden Abstract Stakeholders constantly make assumptions in the development of deep learning (DL) frameworks. These assumptions are related to various types of software artifacts (e.g., requirements, design decisions, and technical debt) and can turn out to be invalid, leading to system failures. Existing approaches and tools for assumption management usually depend on manual identification of assumptions. However, assumptions are scattered in various sources (e.g., code comments, commits, pull requests, and issues) of DL framework development, and manually identifying assumptions has high costs (e.g., time and resources). To overcome the issues of manually identifying assumptions in DL framework development, we constructed a new and largest dataset (i.e., AssuEval) of assumptions collected from the TensorFlow and Keras repositories on GitHub; explored the performance of seven traditional machine learning models (e.g., Support Vector Machine, Classification and Regression Trees), a popular DL model (i.e., ALBERT), and a large language model (i.e., ChatGPT) of identifying assumptions on the AssuEval dataset. The experiment results show that: ALBERT achieves the best performance (f1-score: 0.9584) of identifying assumptions on the AssuEval dataset, which is much better than the other models (the 2nd best f1- score is 0.6211, achieved by ChatGPT). Though ChatGPT is the most popular large language model, we do not recommend using it to identify assumptions in DL framework development because of its low performance on the task. Fine-tuning ChatGPT specifically for assumption identification could improve the performance. This study provides researchers with the largest dataset of assumptions for further research (e.g., assumption classification, evaluation, and reasoning) and helps practitioners better understand assumptions and how to manage them in their projects. Keywords: Assumption, Automatic Identification, Deep Learning Framework, TensorFlow, Keras 1. Introduction Deep learning (DL) is a branch of machine learning (ML), which has been extensively used in various areas as a key component, such as image classification, question-and-answer, and speech recognition. To improve the efficiency of developing DL-based applications, many popular DL frameworks (e.g., Theano [1], Caffe [2], TensorFlow [3], and PyTorch [4]) have been designed, implemented, and used in DL systems. Due to lack of knowledge or information, time pressure, complex context, etc., various uncertainties emerge during the development of DL frameworks, leading to assumptions made in projects [5]. The assumptions in DL frameworks are different from those of traditional software systems. In addition to assumptions about system requirements, design, and components, many assumptions in DL frameworks are about data, DL models, and training [6]. For example, in the documents (e.g., multigpu.md) of Caffe, developers explicitly mention assumptions, such as assuming that GPUs for training are of the same type 1 . Erickson et al. pointed out that the assumptions of the input data ∗ Corresponding author at: School of Computer Science, Wuhan University, China. Tel.: +86 27 68776137; fax: +86 27 68776027. Email addresses: yangchen@szpu.edu.cn (Chen Yang), liangp@whu.edu.cn (Peng Liang), zinanm@chalmers.se (Zinan Ma) 1 https://github.com/BVLC/caffe/blob/master/docs/multigpu.md Preprint submitted to Elsevier January 11, 2024" 2401.03655v1,"The Hawking temperature of dynamical black holes via conformal transformations Pravin Kumar Dahal ∗ and Swayamsiddha Maharana † School of Mathematical and Physical Sciences, Macquarie University, NSW 2109, Australia In this second part of our two-series on extracting the Hawking temperature of dynamical black holes, we focus into spacetimes that are conformal transformations of static spacetimes. Our previous investigation builds upon the Unruh-Hawking analogy, which relates the spacetime of a uniformly accelerating observer to the near-horizon region of a black hole, to obtain the Hawking temperature. However, in this work, we explicitly compute the Bogoliubov coefficients associated with incoming and outgoing modes, which not only yields the temperature but also thermal spectrum of particles emitted by a black hole. For illustration, we take the simplest nontrivial example of the linear Vaidya spacetime, which is conformal to the static metric and using this property, we analytically solve the massless scalar field in its background. This allows the explicit computations of the Bogoliubov coefficients to study the particle production in this spacetime. We also derive an expression for the total mass of such dynamical spacetimes using the conformal Killing vector. We then perform differential variations of the mass formula to determine whether the laws of dynamical black hole mechanics correspond to the laws of thermodynamics. I. INTRODUCTION Black holes have long captivated human imagination and their enigmatic nature has propelled them to the forefront of theoretical physics. They contain a strong-gravity regime where curvature of spacetime becomes sufficiently strong, offering a unique laboratory to explore the frontiers of physics [1–3], particularly the elusive unification of gravity and quantum mechanics. Contrary to the initial understanding that black holes could be completely characterized solely by a few macroscopic parameters, the discovery of their thermodynamic nature [4–6] suggests they might possess an underlying microscopic structure [7–11]. This revelation caused a paradigm shift in perspective, opening research direction towards the hidden microscopic structure that underpins their thermodynamic properties, including the nature of Hawking radiation and other theoretical constructs. The discovery of Hawking radiation not only completed black hole thermodynamics but also offered a crucial initial step towards reconciling gravity with quantum mechanics [12–14]. Black hole can be viewed as an excited state of the gravitational field and thus should decay quantum mechanically. Quantum fluctuations of the metric allow energy to tunnel out of the black hole potential well, a process analogous to particle creation near deep potential wells in flat spacetime. The derivation of Hawking radiation is performed using the now well-established quantum field theory in curved spacetime [13, 14, 16]. In this framework, spacetime metric is treated classically but is coupled to matter fields which are treated quantum mechanically, and provides an excellent approximation beyond Planck scales. While quantum field theory in curved spacetime presents challenges in interpreting field operators in terms of creation and annihilation operators, this apparent drawback can be turned into an advantage. Vacuum state for an observer at early times, evolves into a thermal state populated with particles at late times [13–15]. ∗ pravin-kumar.dahal@hdr.mq.edu.au † swayamsiddha.maharana@hdr.mq.edu.au Despite significant advancements in black hole physics since the discovery of both the black hole thermodynamics and Hawking radiation, the quest for a unified theory of quantum gravity remains a formidable challenge. We even lack an exact derivation of Hawking effects in dynamical spacetimes. We also lack the generalization of the laws of thermodynamics to dynamical spacetimes, rooted in first principles. In search of generalizing black hole mechanics to dynamical cases, various definitions of horizon [17–19] and surface gravity [19– 22] have been proposed. There is still a debate on which horizon possesses thermodynamic characteristics and which surface gravity relates directly to Hawking temperature. Furthermore, each emitted Hawking particle contributes back to its source, inducing backreaction effects that continuously alter the spacetime dynamics. Some dynamical spacetimes are themselves solutions to the semiclassical backreaction problem, like the linear Vaidya metric at initial stages of macroscopic black hole evaporation [23, 24]. This inherent selfconsistency distinguishes the derivation of particle production in such dynamic backgrounds from the static ones. Therefore, these tasks are crucial for addressing conceptual issues and exploring new frontiers in black hole physics. This article is an attempt to tackle these tasks for a specific class of dynamical spacetimes, which are conformal to static ones. This represents the simplest, yet non-trivial, generalization, presenting an opportunity for uncovering novel aspects of particle production and thermodynamics that are not present in static backgrounds. This work is the continuation of our prior work [23], where we employed a specific coordinate transformation, valid near the horizon, that allowed us to exploit the relationship between field theories defined on conformally related geometries to determine the temperature of Hawking radiation in dynamical spacetimes. Notably, this approach is akin to past derivation of the Hawking temperature of the static Schwarzschild spacetime, where the nearhorizon expansion yields a simple Rindler geometry. For the Vaidya metric, the near-horizon expansion yields a conformal Rindler geometry, suggesting a formal relationship between the Hawking and Unruh effects despite their distinct origins. While our earlier study focused solely on temperature calculation, we now aim to formulate a comprehensive thermody-" 2401.03665v1,"TADOKORO, YAMADA, NAKASHIMA, NAKAMURA, KATAOKA: PRIMGEOSEG 1 Primitive Geometry Segment Pre-training for 3D Medical Image Segmentation Ryu Tadokoro ∗ 1,2 1 National Institute of Advanced Industrial Science and Technology, Japan Ryosuke Yamada ∗ 1,3 2 ryosuke.yamada@aist.go.jp Tohoku University, Japan 3 Kodai Nakashima 1,3 University of Tsukuba, Japan 4 Fukuoka University, Japan tadokororyuryu@gmail.com nakashima.kodai@aist.go.jp Ryo Nakamura 1,4 ryo.nakamura@aist.go.jp Hirokatsu Kataoka 1 hirokatsu.kataoka@aist.go.jp 1 Abstract The construction of 3D medical image datasets presents several issues, including requiring significant financial costs in data collection and specialized expertise for annotation, as well as strict privacy concerns for patient confidentiality compared to natural image datasets. Therefore, it has become a pressing issue in 3D medical image segmentation to enable data-efficient learning with limited 3D medical data and supervision. A promising approach is pre-training, but improving its performance in 3D medical image segmentation is difficult due to the small size of existing 3D medical image datasets. We thus present the Primitive Geometry Segment Pre-training (PrimGeoSeg) method to enable the learning of 3D semantic features by pre-training segmentation tasks using only primitive geometric objects for 3D medical image segmentation. PrimGeoSeg performs more accurate and efficient 3D medical image segmentation without manual data collection and annotation. Further, experimental results show that PrimGeoSeg on SwinUNETR improves performance over learning from scratch on BTCV, MSD (Task06), and BraTS datasets by 3.7%, 4.4%, and 0.3%, respectively. Remarkably, the performance was equal to or better than state-of-the-art self-supervised learning despite the equal number of pre-training data. From experimental results, we conclude that effective pre-training can be achieved by looking at primitive geometric objects only. Code and dataset are available at https://github.com/SUPER-TADORY/PrimGeoSeg. Introduction 3D medical image analysis using deep learning is expected to enhance diagnostics and improve patient outcomes through the more accurate detection and visualization of geometric structures inside the human body. For example, 3D medical image segmentation estimates © 2023. The copyright of this document resides with its authors. It may be distributed unchanged freely in print or electronic forms. ∗ These authors contributed equally to this work." 2401.03677v1,"Overview of the 2023 ICON Shared Task on Gendered Abuse Detection in Indic Languages Aatman Vaidya Tattle Civic Tech aatman@tattle.co.in Arnav Arora University of Copenhagen aar@di.ku.dk Aditya Joshi University of New South Wales aditya.joshi@unsw.edu.au Tarunima Prabhakar Tattle Civic Tech tarunima@tattle.co.in Abstract This paper reports the findings of the ICON 2023 on Gendered Abuse Detection in Indic Languages. The shared task deals with the detection of gendered abuse in online text. The shared task was conducted as a part of ICON 2023, based on a novel dataset in Hindi, Tamil and the Indian dialect of English. The participants were given three subtasks with the train dataset consisting of approximately 6500 posts sourced from Twitter. For the test set, approximately 1200 posts were provided. The shared task received a total of 9 registrations. The best F-1 scores are 0.616 for subtask 1, 0.572 for subtask 2 and, 0.616 and 0.582 for subtask 3. The paper contains examples of hateful content owing to its topic. 1 Introduction Online gender-based violence is a growing challenge that compounds existing social and economic vulnerabilities. It can cause people to recede from online spaces impacting their political and economic opportunity. At its worst, it can lead to loss of life. Hate speech and gender abuse online can lead to real-world violence (Mirchandani, 2018; Byman, 2021; Kumar et al., 2018b). While there is a need for automated approaches to detect gendered abuse, there is a lack of Indic language datasets that enable such approaches for Indian language content. At ICON 2023, we conducted a shared task 1 led by Tattle Civic Tech 2 , based on a novel dataset on gendered abuse in Hindi, Tamil and Indian English. The dataset (Arora et al., 2023) provided is created under the Uli 3 project. Uli is a browser plugin that de-normalizes the everyday violence that people of marginalised genders experience online in 1 https://sites.google.com/view/ icon2023-tattle-sharedtask 2 https://tattle.co.in/ 3 https://uli.tattle.co.in/ India. Uli also provides tools for relief and collective response. One of its features is to allow users to moderate instances of online gender-based violence in Indian languages. Through focused grouped with over 30+ activists and researchers who have been either at the receiving end of violence or have been involved in making social media more accessible, the pilot team of Uli learnt how online gender-based violence is experienced by different users online. Online harassment leads to people at the receiving end of abuse facing consistent fatigue, panic, and anxiety. Fatigue resulting from hate speech was the most prominent affective response that was noted. The dataset contains posts tagged with the following three labels: • Label 1: Is the post a gendered abuse when directed at a person of marginalized gender? • Label 2: Is the post a gendered abuse when it is not directed at a person of marginalized gender? • Label 3: Does this post contain explicit/ aggressive language? These are not mutually exclusive labels, but rather an attempt to capture different ways of understanding gendered abuse. The values for each label could be the following, “1"" indicates the annotator believes the post (tweet) matches the label. “0"" indicates the annotator does not believe the post (tweet) does not match the label. ""NL"" means the post was assigned to the annotator but not annotated. ""NaN"" indicates the post was not assigned to the annotator. Below are some examples of a post labelled as 1 or 0 for each label. Examples of posts annotated as 1 for all the labels • Label 1: #WomenAreTrash they must be arrested and throw away the key" 2401.03695v1,"A Large-scale Empirical Study on Improving the Fairness of Deep Learning Models Junjie Yang Jiajun Jiang ∗ College of Intelligence and Computing, Tianjin University Tianjin, China jjyang@tju.edu.cn College of Intelligence and Computing, Tianjin University Tianjin, China jiangjiajun@tju.edu.cn Zeyu Sun Junjie Chen Zhongguancun Laboratory Beijing, China szy_@pku.edu.cn College of Intelligence and Computing, Tianjin University Tianjin, China junjiechen@tju.edu.cn ABSTRACT Fairness has been a critical issue that affects the adoption of deep learning models in real practice. To improve model fairness, many existing methods have been proposed and evaluated to be effective in their own contexts. However, there is still no systematic evaluation among them for a comprehensive comparison under the same context, which makes it hard to understand the performance distinction among them, hindering the research progress and practical adoption of them. To fill this gap, this paper endeavours to conduct the first large-scale empirical study to comprehensively compare the performance of existing state-of-the-art fairness improving techniques. Specifically, we target the widely-used application scenario of image classification, and utilized three different datasets and five commonly-used performance metrics to assess in total 13 methods from diverse categories. Our findings reveal substantial variations in the performance of each method across different datasets and sensitive attributes, indicating over-fitting on specific datasets by many existing methods. Furthermore, different fairness evaluation metrics, due to their distinct focuses, yield significantly different assessment results. Overall, we observe that pre-processing methods and in-processing methods outperform post-processing methods, with pre-processing methods exhibiting the best performance. Our empirical study offers comprehensive recommendations for enhancing fairness in deep learning models. We approach the problem from multiple dimensions, aiming to provide a uniform evaluation platform and inspire researchers to explore more effective fairness solutions via a set of implications. 1 INTRODUCTION In recent years, Artificial Intelligence (AI) systems and Deep Learning (DL) models have attracted significant attention for their remarkable performance across diverse application domains, such as image processing [27, 68], machine translation [6, 20, 46, 47] and software engineering [38, 67]. However, the increasing adoption of DL models in real practice also poses new challenges to them. In particular, they have displayed troubling discriminatory tendencies ∗ Corresponding author. Conference 2024, January 2024, 2024. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX in certain applications, such as elevated error rates, when confronted with specific groups or populations defined by attributes deemed protected or sensitive [4, 15, 19, 24, 53, 93], including factors like race, gender, and age, etc., causing ethical or even safety issues that will largely affect the reliability and usability of them in real practice. For example, AI judge [29, 35, 75, 88] may exhibit biased decision-making, leading to unequal treatment of individuals based on their sensitive attributes, such as race. This bias can result in disparities in sentencing or legal outcomes, raising concerns about fairness and justice within the legal system. Similarly, AI-powered hiring [32, 56, 65] and loan systems [26, 81, 82] tend to favor applicants of a particular gender or race. In other words, the manifestation of unfair behaviors in AI systems and DL models has raised profound ethical concerns, transforming fairness into an essential ethical and often legally mandated prerequisite for the widespread adoption and utilization of DL models across various real-world contexts. To improve the fairness of DL models, many approaches have been proposed in the last decades, particularly in the application domain of image classification, which has been widely adopted in diverse real-world applications. Typically, existing approaches can be classified into three categories according to the stage where de-biasing is applied, i.e., pre-processing, in-processing, and postprocessing. Pre-processing techniques [8, 36, 61, 63, 70, 84, 89] endeavor to mitigate model biases by optimizing the training data, such as performing data transformation [89], augmentation [63], sampling [8, 36, 61, 70, 84] and so on. In contrast, in-processing techniques [34, 40, 44, 72, 78] dedicate to improve the model fairness by optimizing the model training process, such as updating the training loss [34, 72] or model structures [40, 44]. Different from the former two categories, post-processing techniques [45] aim to make the deployed models produce fairer outputs without changing the model structures and parameters, such as optimizing the given inputs [83, 91]. Since they do not change the original models, they can be flexibly applied to improve the fairness of deployed models in real practice. Although these existing approaches have been evaluated to be effective in their own contexts, as will be presented in Section 2.2, they were often evaluated over different datasets and utilized inconsistent metrics for measuring the performance of the proposed methods, making it hard to obtain a uniform conclusion about the performance distinction among them over different application" 2401.03706v1,"A First-Principle Approach to X-ray Active Optics: Design and Verification Dezhi Diao, 1, 2 Han Dong, 1, 2 Fugui Yang, 1, ∗ Ming Li, 1 Weifan Sheng, 1 and Xiaowei Zhang 1, † 1 Institute of High Energy Physics, Chinese Academy of Sciences, Beijing 100049, China 2 University of Chinese Academy of Sciences, Beijing 100049, China (Dated: January 9, 2024) This paper presents the first-principle design approach for X-ray active optics, using the simulation-modulation cycle in place of the measurement-modulation feedback loops used in traditional active optics. Hence, the new active optics have the potential to outperform the accuracy of surface-shape metrology instruments. We apply an X-ray mirror with localized thermal elastic deformation to validate the idea. Both the finite element simulations and surface shape measurements have demonstrated that the active optics modulation accuracy limit can be achieved at the atomic layer level. It is believed that the implementation of the first-principle design strategy has the capacity to revolutionize both the manufacturing processes of X-ray mirrors and the beamline engineering of synchrotron radiation. At the cutting edge of engineering and technology, obtaining large-size, ultra-high-accuracy mirrors has proven to be a recurring difficulty [1, 2]. This involves ultraprecision machining and measurement techniques. Nevertheless, these optics often need to operate under extreme conditions, where factors such as thermal deformations induced by the beam and deformations due to mirror clamping surpass the precision of mirror manufacturing. Simply striving for accuracy during production is no longer adequate to fulfill realistic usage demands. Therefore, the introduction of new technological elements like active optics becomes imperative to address these challenges. Successful practices on largescale ultra-precision optical instruments such as LIGO and Telescope [3], along with advances in traditional optics and optical engineering, demonstrate that active optics is a fundamental strategy in system construction. Synchrotron radiation facilities and their x-ray mirrors are categorized as large-scale precision equipment. The low grazing incident angle of synchrotron X-ray mirrors poses challenges in achieving precise surface shape during both fabrication and operation in the beamline. However, the elongated dimension of X-ray mirror in tangential direction provide ample space for mirror surface modulations, and the one-dimensional adjustment requirement makes the approach to X-ray mirror surface shape correction relatively straightforward. To make X-ray active optics work better, different methods have been developed since the 1990s. These include piezoelectric [4, 5], mechanically bent [6, 7], and heating technologies [8]. The primary constituents of active optics systems consist of deformable mirror mechanics and metrology. Due to the challenges in high-precision surface shape metrology and the non-linear response of deformable mirrors to the drive, the traditional operation mode requires iterative procedures which includes measuring surface shape, adjusting deformable mirrors based on feedback, and ul- ∗ yangfg@ihep.ac.cn † zhangxw@ihep.ac.cn timately achieving convergence. Hence, the level of accuracy achieved in active optics is dependent upon the precision of surface shape measurements and the intrinsic precision of the actuator. Compared to metrology in the manufacture of X-ray mirrors, this in-situ high-precision surface-shape metrology technique presents more significant challenges. The need for high-precision devices, including actuators and metrology equipment, unavoidably contributes to the total cost. Hence, it is pragmatically crucial to develop robust, efficient, and cost-effective methodologies and technologies for X-ray active optics. In this paper, we introduce and explore the application of a first-principles approach for designing X-ray active optics. The strategy involves simplifying technical elements within the system and ensuring deterministic control as a fundamental assurance for achieving the target precision with low risk. To achieve deterministic control, a design rooted in fundamental principles is crucial, encompassing the careful selection of controllable physical processes and the utilization of appropriate engineering implementation methods. In addition, significant progress in computer science has enhanced human capabilities and provided solutions for complex engineering challenges, enabling the implementation of firstprinciples design. In contrast to the normative ”copying principle,” which prioritizes precision in all technical elements and aspects, we believe that the computationalassisted first-principles design approach not only propels technological advancement but also significantly reduces costs and development cycles. To realize the concepts of first-principles design, we have developed a system for X-ray active optics that utilizes the thermo-elastic deformation of the x-ray mirror, namely the thermal-deformable mirror. The modulation system in concern employs an array of space-distributed thermal sources, such as laser heating, electrical heating, or cooling-heating, to stimulate localized thermal deformation on the mirror surface. This process effectively modulates the one-dimensional shape of the X-ray mirror surface. The system implementation is illustrated in Fig. 1. Fig. 1 (a) shows the configuration of heating devices on the mirror surface. These components are" 2401.03707v1,"Geunhyuk Youk KAIST Jihyong Oh † Chung-Ang University Munchurl Kim † KAIST rmsgurkjg@kaist.ac.kr jihyongoh@cau.ac.kr mkimee@kaist.ac.kr FMA-Net (Ours) · 28.5 Restormer * [73] Frame 004, Clip 011 BasicVSR++ * [9] GShiftNet * [43] 28.0 RVRT * [48] FMA-Net (Ours) 27.5 PSNR (dB) FMA-Net: Flow-Guided Dynamic Filtering and Iterative Feature Refinement with Multi-Attention for Joint Video Super-Resolution and Deblurring GT 27.0 26.5 · Restormer * [73] · Frame 064, Clip 020 BasicVSR++ * [9] GShiftNet * [43] RVRT * [48] FMA-Net (Ours) · RVRT * [48] HOFFR [18] · · · · 5M 10M 20M 30M 40M BasicVSR++ * [9] 26.0 · 25.5 GShiftNet * [43] · · BasicVSR++ [9] + RVRT [48] 24.5 (a) Visual comparison results of different methods on REDS4 [52] test set 0.2 0.5 HAT [10] + FFTformer [41] FFTformer [41] + HAT [10] RVRT [48] + · 24.0 BasicVSR++ [9] 0 GT · · 25.0 Restormer * [73] # Params 0.8 1.1 1.4 1.7 Runtime (s) · 2.0 2.3 2.6 (b) Performance Gain Figure 1. Our FMA-Net outperforms state-of-the-art methods in both quantitative and qualitative results for ×4 VSRDB. Abstract site. We present a joint learning scheme of video superresolution and deblurring, called VSRDB, to restore clean high-resolution (HR) videos from blurry low-resolution (LR) ones. This joint restoration problem has drawn much less attention compared to single restoration problems. In this paper, we propose a novel flow-guided dynamic filtering (FGDF) and iterative feature refinement with multi-attention (FRMA), which constitutes our VSRDB framework, denoted as FMA-Net. Specifically, our proposed FGDF enables precise estimation of both spatiotemporally-variant degradation and restoration kernels that are aware of motion trajectories through sophisticated motion representation learning. Compared to conventional dynamic filtering, the FGDF enables the FMA-Net to effectively handle large motions into the VSRDB. Additionally, the stacked FRMA blocks trained with our novel temporal anchor (TA) loss, which temporally anchors and sharpens features, refine features in a course-to-fine manner through iterative updates. Extensive experiments demonstrate the superiority of the proposed FMA-Net over stateof-the-art methods in terms of both quantitative and qualitative quality. Codes and pre-trained models are available at: https://kaist- viclab.github.io/fmanet- 1. Introduction Video super-resolution (VSR) aims to restore a highresolution (HR) video from a given low-resolution (LR) counterpart. VSR can be beneficial for diverse real-world applications of high-quality video, such as surveillance [1, 78], video streaming [14, 82], medical imaging [2, 21], etc. However, in practical situations, acquired videos are often blurred due to camera or object motions [4, 75, 77], leading to a deterioration in perceptual quality. Therefore, joint restoration (VSRDB) of VSR and deblurring is needed, which is challenging to achieve the desired level of high-quality videos because two types of degradation in blurry LR videos should be handled simultaneously. A straightforward approach to solving the joint problem of SR and deblurring is to perform the two tasks sequentially, i.e., by performing SR first and then deblurring, or vice versa. However, this approach has a drawback with the propagation of estimation errors from the preceding operation (SR or deblurring) to the following one (deblurring or SR) [55]. To overcome this, several works proposed joint learning methods of image SR and deblurring † Co-corresponding authors (equal advising). 1" 2401.03718v1,"Research in Astron. Astrophys. Vol.0 (20xx) No.0, 000–000 http://www.raa-journal.org http://www.iop.org/journals/raa (L A TEX: ms2023-0263.tex; printed on January 9, 2024; 2:39) R esearch in A stronomy and A strophysics Comparing the structural parameters of the Milky Way to other spiral galaxies Jacob A. Guerrette 1 , Aleksandr V. Mosenkov 1 , Dallin Spencer 1 and Zacory D. Shakespear 1 1 Department of Physics and Astronomy, N283 ESC, Brigham Young University, Provo, Utah 84602, USA; vinnieguerrette@gmail.com Abstract The structural parameters of a galaxy can be used to gain insight into its formation and evolution history. In this paper, we strive to compare the Milky Way’s structural parameters to other, primarily edge-on, spiral galaxies in order to determine how our Galaxy measures up to the Local Universe. For our comparison, we use the galaxy structural parameters gathered from a variety of literature sources in the optical and nearinfrared wavebands. We compare the scale length, scale height, and disk flatness for both the thin and thick disks, the thick-to-thin disk mass ratio, the bulge-to-total luminosity ratio, and the mean pitch angle of the Milky Way’s spiral arms to those in other galaxies. We conclude that many of the Milky Way’s structural parameters are largely ordinary and typical of spiral galaxies in the Local Universe, though the Galaxy’s thick disk appears to be appreciably thinner and less extended than expected from zoom-in cosmological simulations of Milky Way-mass galaxies with a significant contribution of galaxy mergers involving satellite galaxies. Key words: Galaxy: disc – galaxies: fundamental parameters – Galaxy: structure 1 INTRODUCTION Galaxies are complex conglomerations of stars, gas, dust, and dark matter that can have a variety of different shapes, sizes, and other general properties. Due to this complexity, galaxies can contain a number of different structural components, including active galactic nuclei, bulges, bars, rings, lenses, disks, and stellar halos that determine their morphology (Buta 2011). By studying the structural parameters of galaxies, we get valuable information on their formation history through galaxy scaling relations, as different groupings of galaxies on these scaling relations may point to different scenarios of their formation and evolution (see Hohl 1978; Combes & Sanders 1981; Michel-Dansac & Wozniak 2004; Knapen et al. 2004; Knapen & Comerón 2013). Furthermore, by studying galaxies that are relatively similar in morphology, we can begin to form an idea of the sequence of events required to create that variety of galaxies (Muñoz-Mateos et al. 2015). Due to our location within one of its spiral arms, the Milky Way, while being our own Galaxy, remains somewhat of a mystery to us. The dust in the interstellar medium (ISM) blocks our view of much of the Galactic plane in addition to scattering what light we do receive (see Draine 2003 and references therein). Because of this, the specific structural parameters describing our Galaxy are difficult to study. Luckily, due to infrared-submillimeter-radio observations where our Galaxy is largely transparent, we can explore its stellar, dusty, and gaseous content in great detail. In a review about our Galaxy’s parameters, Bland-Hawthorn & Gerhard (2016) state, however, that there is much uncertainty about the Galaxy’s structural parameters, especially parameters such as disk scale length (∼2−4 kpc; see e.g." 2401.03723v1,"Sibyl: Forecasting Time-Evolving Query Workloads Hanxian Huang Tarique Siddiqui Rana Alotaibi University of California San Diego USA hah008@ucsd.edu Microsoft Research USA Tarique.Siddiqui@microsoft.com Microsoft Gray Systems Lab USA ranaalotaibi@microsoft.com Carlo Curino Jyoti Leeka Alekh Jindal Microsoft Gray Systems Lab USA Carlo.Curino@microsoft.com Microsoft USA Jyoti.Leeka@microsoft.com SmartApps USA alekh@smart-apps.ai Jishen Zhao Jesús Camacho-Rodríguez Yuanyuan Tian University of California San Diego USA jzhao@ucsd.edu Microsoft Gray Systems Lab USA jesusca@microsoft.com Microsoft Gray Systems Lab USA yuanyuantian@microsoft.com ABSTRACT Database systems often rely on historical query traces to perform workload-based performance tuning. However, real production workloads are time-evolving, making historical queries ineffective for optimizing future workloads. To address this challenge, we propose Sibyl, an end-to-end machine learning-based framework that accurately forecasts a sequence of future queries, with the entire query statements, in various prediction windows. Drawing insights from real-workloads, we propose template-based featurization techniques and develop a stacked-LSTM with an encoder-decoder architecture for accurate forecasting of query workloads. We also develop techniques to improve forecasting accuracy over large prediction windows and achieve high scalability over large workloads with high variability in arrival rates of queries. Finally, we propose techniques to handle workload drifts. Our evaluation on four real workloads demonstrates that Sibyl can forecast workloads with an 87.3% median F1 score, and can result in 1.7× and 1.3× performance improvement when applied to materialized view selection and index selection applications, respectively. 1 INTRODUCTION Workload-based optimization is a critical aspect of database management, which tunes a database management system (DBMS) to maximize its performance for a specific workload. Consequently, a large number of performance tuning tools have been developed for workload-based optimization. While execution statistics may be sufficient for optimizing certain aspects of the system (e.g., buffer pool size), many optimizations require an understanding of semantics of the queries, necessitating a workload query trace as input. For instance, many commercial database products [2–5] support physical design tools such as Microsoft’s AutoAdminn [11] and IBM’s DB2 design advisor [56]. These tools automatically recommend physical design features, such as indexes, materialized views, partitioning schemes of tables, and multidimensional clustering (MDC) [41] of tables for a given workload of queries. In fact, many of these form the foundational pieces of the self-tuning [12], self-managing [40], and self-driving [16, 42] databases. For workload-based optimization, the input workload plays a crucial role and needs to be a good representation of the expected workload. Traditionally, historical query traces have been used as input workloads with the assumption that workloads are mostly static. However, as we discuss in §2, many real workloads exhibit highly recurring query structures with changing patterns in both their arrival intervals and data accesses. For instance, query templates are often shared across users, teams, and applications, but may be customized with different parameter values to access varying data at different points in time. Consider a log analysis query that reports errors for different devices and error types: ""SELECT * FROM T WHERE deviceType = ? AND errorType = ? AND eventDate BETWEEN ? AND ?"". Although the query template is recurring, the parameter values may be customized depending on the reporting needs, e.g., different types of devices may be analyzed on different days of the week, and the granularity of the time interval may switch from daily to weekly over weekends. Thus, optimization recommendations (e.g., recommended views) based solely on historical queries may not be effective for such time-evolving workload patterns. To adapt to evolving workloads, existing workload-based optimization tools can be modified and enhanced to accommodate workload changes, or alternatively, applied without modification by substituting the history workload with a workload that more accurately represents the anticipated query trace in the future. This motivates the need for forecasting future workload. As depicted in Table 1, prior research works [8, 33, 38] have made efforts to forecast different aspects of future workload, but none have addressed the challenge of predicting future query traces with precise query statements in a future time window for timeevolving workloads. The Q-Learning approach proposed by Meduri et al. [38] takes the current query as input and predicts the next one query by forecasting query fragments separately and then assembling them into a complete query statement. For predicting the literals (or parameters) used in the query statement, Q-Learning only forecasts a bin of possible values instead of the exact values. QueryBot 5000 [33] and Tiresias [8] focus on forecasting the arrival rate of future query workload by training on patterns from historical query arrival rates. Hence, these techniques can only predict the" 2401.03729v2,"The Butterfly Effect of Altering Prompts: How Small Changes and Jailbreaks Affect Large Language Model Performance Abel Salinas University of Southern California Information Sciences Institute asalinas@isi.edu Abstract Large Language Models (LLMs) are regularly being used to label data across many domains and for myriad tasks. By simply asking the LLM for an answer, or “prompting,” practitioners are able to use LLMs to quickly get a response for an arbitrary task. This prompting is done through a series of decisions by the practitioner, from simple wording of the prompt, to requesting the output in a certain data format, to jailbreaking in the case of prompts that address more sensitive topics. In this work we ask: do variations in the way a prompt is constructed change the ultimate decision of the LLM? We answer this using a series of prompt variations across a variety of text classification tasks. We find that even the smallest of perturbations, such as adding a space at the end of a prompt, can cause the LLM to change its answer. Further, we find that requesting responses in XML and commonlyused jailbreaks can have cataclysmic effects on the data labeled by LLMs. Our code is available at https://github.com/Abel2Code/ The_Butterfly_Effect_of_Prompts. 1 Introduction Large Language Models (LLMs), trained on vast amounts of data and fine-tuned to provide answers to arbitrary inputs, offer a powerful new approach to processing, labeling, and understanding text data. Recent work has been focused on studying the accuracy of these models on labeling text data across a variety of tasks in computer science (Kocoń et al., 2023), and the social sciences (Zhu et al., 2023). These endeavors have found that, while not stateof-the-art, these models fare well when applied to a variety of tasks. Armed by these insights, researchers and practitioners have flocked to LLMs as a labeling mechanism for their data. In fact, the use of these models is so rampant that it is becoming codified as a way to obtain labels. The process is simple: 1) create a prompt; 2) to Fred Morstatter University of Southern California Information Sciences Institute fred@isi.edu ensure that the results are machine-readable, ask for it in a specific output format (e.g., CSV, JSON); and 3) when your data pertains to sensitive topics, add a jailbreak to prevent the prompt from being filtered. While straightforward, each step requires a series of decisions from the person designing the prompt. Little attention has been paid to how sensitive LLMs are to variations in these decisions. In this work, we ask the question: How reliable are LLMs’ responses to variations in the prompts? We explore three types of variations in isolation. The first variation is to ask the LLM to give its response in a certain “output format.” Following common practice (Li et al., 2023; Lee et al., 2023; Hada et al., 2023), 1 we ask the LLM to format its output in frequently-used data formats such as a Python list or JSON. These are enumerated in Section 3.2.1. Second, we extend one of these formats– the Python list–and explore minor variations to the prompt. Fully enumerated in Section 3.2.2, these are small changes to the prompt such as adding a space, ending with “Thank you,” or promising the LLM a tip. 2 The final type of variation we explore are “jailbreaks.” Practitioners wishing to label data concerning sensitive topics, like hate speech detection, often need to employ jailbreaks to bypass the LLM’s content filters. This practice has become so common that websites have emerged to catalog successf instances of this variation. 3 Listed in Section 3.2.3, we explore several commonly-used jailbreaks. We apply these variations to several benchmark text classification tasks including toxicity classification, grammar detection, and cause/effect, listed in Section 3.1. For each variation of the prompt, we measure how often the LLM will change its 1 Libraries exist to facilitate this, e.g., https://github. com/1rgs/jsonformer. 2 These are only promised in the text. LLMs do not yet accept tips. 3 E.g., https://www.jailbreakchat.com/" 2401.03736v2,"Generated using the official AMS L A TEX template v6.1 two-column layout. Lessons Learned Reproducibility, Replicability, and When to Stop Milton S. Gomez a, b , Tom Beucler a, b , a Faculty of Geosciences and Environment, University of Lausanne, Switzerland b Expertise Center for Climate Extremes, University of Lausanne, Switzerland ABSTRACT: While extensive guidance exists for ensuring the reproducibility of one’s own study, there is little discussion regarding the reproduction and replication of external studies within one’s own research. To initiate this discussion, drawing lessons from our experience reproducing an operational product for predicting tropical cyclogenesis, we present a two-dimensional framework to offer guidance on reproduction and replication. Our framework, representing model fitting on one axis and its use in inference on the other, builds upon three key aspects: the dataset, the metrics, and the model itself. By assessing the trajectories of our studies on this 2D plane, we can better inform the claims made using our research. Additionally, we use this framework to contextualize the utility of benchmark datasets in the atmospheric sciences. Our two-dimensional framework provides a tool for researchers, especially early career researchers, to incorporate prior work in their own research and to inform the claims they can make in this context. 1. Introduction proof of a given claim (Baker 2016; Goodman et al. 2016), but each plays an important role in science, and efforts towards them are laudable. This begets the question of how to address reproducibility and replication in scientific works. While we can point to sources in the literature providing guidance in making researchers’ findings more reproducible (e.g., NASEM, 2019; Mullendore et al., 2020; Carter et al., 2023; Stell et al., 2023), we found limited guidance regarding the reproduction and replication of others’ work in one’s own research studies—motivating our study. Should scientists focus their efforts on reproducing previous studies? The answer to this question seems straightforward—the reproduction of scientific studies has been a recurrent focus over concerns that published works may be irreproducible or irreplicable (Nichols et al. 2021; Hoffmann et al. 2021). Additionally, reproducibility of results is taken as evidence of scientific robustness across numerous domains (Gervais 2021; Ahadi et al. 2016; Baker 2016). In the atmospheric sciences, this is evidenced by data replication efforts (e.g., the ESGF Data Replication Project—(Cinquini et al. 2014)) and benchmark dataset requirements (e.g., “The availability of an existing solution [...] will also enable the easy reproduction of published results to verify that the workflow is consistent.”, (Dueben et al. 2022)). However, the terms reproducibility and replicability themselves can be a source of confusion—the (US) National Academies note that depending on the field, what is meant by each of these two terms can be “inconsistent, or even contradictory” (NASEM, 2019), a fact that is echoed by others in the literature (Devezer et al. 2021). In light of the substantial efforts by the academies in guiding scientists’ endeavors to improve the reproducibility and replicability of their own works, let us borrow their definitions— 1) Reproducibility entails obtaining consistent computational results using the same input data, computational steps, methods, code, and conditions of analysis; and 2) Replication entails obtaining consistent results across studies, aimed at answering the same scientific question, each of which has obtained its own data. Still, we note that reproduction and replication of work does not itself provide 2. Lessons Learned from Predicting Tropical Cyclogenesis Reproduction and replication are important, and I propose that we keep this in mind as we take a look at our case study, in which we aimed to apply modern machine learning techniques to a well-known problem in meteorology— the prediction of tropical cyclone formation, or “tropical cyclogenesis” (see S1:Scientific Motivation). We believed that interpreting such models could provide scientific insight into an aspect of tropical cyclones that has been described as both vexing and intractable (Emanuel 2018). We wanted to select a well-established method as a baseline— assessing new models against well-established methods is, after all, generally the main interest of a study (Jolliffe and Stephenson 2005)—and we thus selected the base study (Schumacher et al. 2009) for the 2014 Tropical Cyclone Formation Probability product (NOAA and CIRA, 2010). Taking inspiration from Devezer et al. (2021), we set up a number of definitions detailed in Section 4. Armed with these definitions, we begin by saying we want to develop a model 𝑀 through a study 𝜉 that depends in part on the Corresponding author: Milton S. Gomez, milton.gomez@unil.ch 1" 2401.03747v1,"The Importance of Corner Frequency in Site-Based Stochastic Ground Motion Models Maijia Su a,∗∗ , Mayssa Dabaghi b , Marco Broccardo a,∗ a b Department of Civil, Environmental and Mechanical Engineering, University of Trento, Trento, Italy Department of Civil and Environmental Engineering, American University of Beirut, Beirut, Lebanon Abstract Synthetic ground motions (GMs) play a fundamental role in both deterministic and probabilis- tic seismic engineering assessments. This paper shows that the family of filtered and modulated white noise stochastic GM models overlooks a key parameter—the high-pass filter’s corner fre- quency, f c . In the simulated motions, this causes significant distortions in the long-period range of the linear-response spectra and in the linear-response spectral correlations. To address this, we incorporate f c as an explicitly fitted parameter in a site-based stochastic model. We optimize f c by individually matching the long-period linear-response spectrum (i.e., Sa(T ) for T ≥ 1s) of synthetic GMs with that of each recorded GM. We show that by fitting f c the resulting stochastically simulated GMs can precisely capture the spectral amplitudes, variability (i.e., variances of log(Sa(T ))), and the correlation structure (i.e., correlation of log(Sa(T )) between distinct periods T 1 and T 2 ) of recorded GMs. To quantify the impact of f c , a sensitivity analysis is conducted through linear regression. This regression relates the logarithmic linear-response spectrum (log(Sa(T ))) to seven GM parameters, including the optimized f c . The results in- dicate that the variance of f c observed in natural GMs, along with its correlation with the other GM parameters, accounts for 26% of the spectral variability in long periods. Neglecting either the f c variance or f c correlation typically results in an important overestimation of the linear-response spectral correlation. Keywords: Synthetic Ground Motion, Stochastic Model, High-Pass Filter, Corner Frequency ∗ ∗∗ Correspondence: marco.broccardo@unitn.it Correspondence: maijia.su@unitn.it Preprint submitted to EESD January 9, 2024" 2401.03748v1,"Towards Efficient Communication Federated Recommendation System via Low-rank Training Ngoc-Hieu Nguyen Tuan-Anh Nguyen Tuan Nguyen ngochieutb13@gmail.com College of Engineering & Computer Science, VinUniversity Hanoi, Vietnam 21anh.nt@vinuni.edu.vn College of Engineering & Computer Science, VinUniversity Hanoi, Vietnam tuan.nm@vinuni.edu.vn College of Engineering & Computer Science, VinUniversity Hanoi, Vietnam Vu Tien Hoang Dung D. Le ∗ Kok-Seng Wong ∗ vu.ht@vinuni.edu.vn College of Engineering & Computer Science, VinUniversity Hanoi, Vietnam dung.ld@vinuni.edu.vn College of Engineering & Computer Science, VinUniversity Hanoi, Vietnam wong.ks@vinuni.edu.vn College of Engineering & Computer Science, VinUniversity Hanoi, Vietnam ABSTRACT In Federated Recommendation (FedRec) systems, communication costs are a critical bottleneck that arises from the need to transmit neural network models between user devices and a central server. Prior approaches to these challenges often lead to issues such as computational overheads, model specificity constraints, and compatibility issues with secure aggregation protocols. In response, we propose a novel framework, called Correlated Low-rank Structure (CoLR), which leverages the concept of adjusting lightweight trainable parameters while keeping most parameters frozen. Our approach substantially reduces communication overheads without introducing additional computational burdens. Critically, our framework remains fully compatible with secure aggregation protocols, including the robust use of Homomorphic Encryption. Our approach resulted in a reduction of up to 93.75% in payload size, with only an approximate 8% decrease in recommendation performance across datasets. Code for reproducing our experiments can be found at https://github.com/NNHieu/CoLR-FedRec. KEYWORDS Recommendation System, Federated Learning, Communication efficiency 1 INTRODUCTION In a centralized recommendation system, all user behavior data is collected on a central server for training. However, this method can potentially expose private information that users may be hesitant to share with others. As a result, various regulations such as the General Data Protection Regulation (GDPR)[23] and the California Consumer Privacy Act (CCPA)[20] have been implemented to limit the centralized collection of users’ personal data. In response to this challenge, and in light of the increasing prevalence of edge devices, federated recommendation (FedRec) systems have gained significant attention for their ability to uphold user privacy [1, 4, 15– 17, 21, 25–27]. The training of FedRec systems is often in a cross-device setting which involves transferring recommendation models between a central server and numerous edge devices, such as mobile phones, ∗ Co-last author laptops, and PCs. It is increasingly challenging to transfer these models due to the growing model complexity and parameters in modern recommendation systems [19]. In addition, clients participating in FedRec systems often exhibit differences in their computational processing speeds and communication bandwidth capabilities, primarily stemming from variations in their hardware and infrastructure [13]. These discrepancies can give rise to stragglers and decrease the number of participants involved in training, potentially leading to diminished system performance. Practical FedRec systems require the implementation of mechanisms that reduce the amount of communication costs. Three commonly used approaches to reduce communication costs include (i) reducing the frequency of communication by allowing local updates, (ii) minimizing the size of the message through message compression, and (iii) reducing the server-side communication traffic by restricting the number of participating clients per round [24]. Importantly, these three methods are independent and can be combined for enhanced efficiency. In this study, we address the challenge of communication efficiency in federated recommendations by introducing an alternative to compression methods. Many existing compression methods involve encoding and decoding steps that can introduce significant delays, potentially outweighing the gains achieved in per-bit communication time [22]. Another crucial consideration is the compatibility with aggregation protocols. For example, compression techniques that do not align with all-reduce aggregation may yield reduced communication efficiency in systems employing these aggregation techniques [22]. This is also necessary for many secure aggregation protocols such as Homomorphic Encryption (HE) [3]. Moreover, many algorithms assume that clients have the same computational power, but this may induce stragglers due to computational heterogeneity and can increase the runtime of algorithms. Based on our observation that the update transferred between clients and the central server in FedRec systems has a low-rank bias (Section 4.1), we propose Correlated Low-rank Structure update (CoLR). CoLR increases communication efficiency by adjusting lightweight trainable parameters while keeping most parameters frozen. Under this training scheme, only a small amount of trainable parameters will be shared between the server and clients. Compared with other compression techniques, our methods offer the" 2401.03771v1,"NeRFmentation: NeRF-based Augmentation for Monocular Depth Estimation Casimir Feldmann *,1 , Niall Siegenheim *,1 , Nikolas Hars 1 , Lovro Rabuzin 1 , Mert Ertugrul 1 , Luca Wolfart 1 , Marc Pollefeys 1,2 , Zuria Bauer 1,3 , Martin R. Oswald 1,4 1 ETH Zürich, 2 Microsoft, 3 University of Alicante, 4 University of Amsterdam {cfeldmann,sniall,nihars,mertugrul,lrabuzin,wolfartl,pomarc,zbauer,moswald}@ethz.ch Abstract The capabilities of monocular depth estimation (MDE) models are limited by the availability of sufficient and diverse datasets. In the case of MDE models for autonomous driving, this issue is exacerbated by the linearity of the captured data trajectories. We propose a NeRF-based data augmentation pipeline to introduce synthetic data with more diverse viewing directions into training datasets and demonstrate the benefits of our approach to model performance and robustness. Our data augmentation pipeline, which we call “NeRFmentation”, trains NeRFs on each scene in the dataset, filters out subpar NeRFs based on relevant metrics, and uses them to generate synthetic RGB-D images captured from new viewing directions. In this work, we apply our technique in conjunction with three state-ofthe-art MDE architectures on the popular autonomous driving dataset, KITTI, augmenting its training set of the Eigen split. We evaluate the resulting performance gain on the original test set, a separate popular driving set, and our own synthetic test set. Figure 1. NeRFmentation. We develop a novel dataset augmentation pipeline that utilizes NeRF-generated data rendered from poses unseen in the original dataset to improve the robustness of Monocular Depth Estimation networks. The method is intended to improve generalization capability in cases where the initial dataset provides limited spatial variability. The RGB image is taken from Waymo Open Dataset [35] This means that monocular depth estimation is an underdetermined problem that relies on extracting and interpreting visual cues in images correctly. To address this challenge, numerous approaches leverage large-scale datasets to train deep neural networks, allowing them to learn to interpret visual cues and transform them into complex mappings between image features and corresponding depth information. This mapping is implicitly learned from the data that is being fed into the system during training time and a common approach to making the model learn these mappings is to implement sophisticated modules to extend the underlying neural network architecture. While improving the model architecture is a promising approach to this problem, it also introduces the need for more training data due to an increased model complexity. This need for more training data can be dealt with by adding an existing dataset or by recording a new one. The former is 1. Introduction As the field of computer vision continues to advance at a rapid pace, the pursuit of safer and more reliable autonomous driving systems remains paramount. Within this context, monocular depth estimation (MDE) plays an important role, offering a key solution to the complex challenge of depth perception in dynamic road environments. Although it offers a solution to these particular situations, it comes with extra challenges compared to stereo or in general multi-camera depth estimation. Accurately estimating the depth from a single image remains a challenging problem due to the inherent scale ambiguity in 2D projections of 3D scenes, which leads to an infinite number of geometrically plausible 3D reprojections for every 2D image. * Authors contributed equally 1" 2401.03794v1,"“Oh, Sorry, I Think I Interrupted You”: Designing Repair Strategies for Robotic Longitudinal Well-being Coaching Minja Axelsson Micol Spitale ∗ Hatice Gunes minja.axelsson@cl.cam.ac.uk University of Cambridge United Kingdom micol.spitale@polimi.it Politecnico di Milano Italy hatice.gunes@cl.cam.ac.uk University of Cambridge United Kingdom ABSTRACT Robotic well-being coaches have been shown to successfully promote people’s mental well-being. To provide successful coaching, a robotic coach should have the capability to repair the mistakes it makes. Past investigations of robot mistakes are limited to game or task-based, one-off and in-lab studies. This paper presents a 4-phase design process to design repair strategies for robotic longitudinal well-being coaching with the involvement of real-world stakeholders: 1) designing repair strategies with a professional well-being coach; 2) a longitudinal study with the involvement of experienced users (i.e., who had already interacted with a robotic coach) to investigate the repair strategies defined in (1); 3) a design workshop with users from the study in (2) to gather their perspectives on the robotic coach’s repair strategies; 4) discussing the results obtained in (2) and (3) with the mental well-being professional to reflect on how to design repair strategies for robotic coaching. Our results show that users have different expectations for a robotic coach than a human coach, which influences how repair strategies should be designed. We show that different repair strategies (e.g., apologizing, explaining, or repairing empathically) are appropriate in different scenarios, and that preferences for repair strategies change during longitudinal interactions with the robotic coach. CCS CONCEPTS • Human-centered computing → User studies; HCI design and evaluation methods; • Computer systems organization → Robotics. KEYWORDS socially assistive robotics, well-being, coaching, interaction ruptures, robot mistakes, human-robot interaction, design research 1 INTRODUCTION Robot mistakes and failures are a very well-known problem in the human-robot interaction (HRI) research community [15]. For example, robots can hit objects, interrupt people speaking, misunderstand human speech, not respond to people, and experience Wi-Fi malfunctions [45, 50]. Therefore, designing repair strategies is extremely important for the success of the human-robot interaction. Very recently, the HRI interest in applying and using robots as mental well-being coaches has increased. Robotic coaches for well-being have been examined for use at the workplace [2, 48], in public environments [3, 35], in a lab context [1, 6, 10], and for at-home use [24–26]. In these contexts, addressing the problem of ∗ This work was undertaken and finalised while Micol Spitale was a postdoctoral researcher at the University of Cambridge. robot mistakes by designing repair strategies is even more relevant for the success of the coaching practice and for making a step forward towards the deployment of such robotic coaches in real-world scenarios. Past works have investigated the problem of repair strategies [11, 28, 44, 54] but they have several limitations. First, most of them are limited to game-based (e.g., [45]) or task-based scenarios (e.g., [28]), without exploring the extent to which those results may be applicable to other contexts, such as well-being coaching. Second, in most of these studies, the users interacted with the robot in a one-off interaction [45, 59]. This constrained the design of repair strategies to short-term interactions without considering longitudinal effects (i.e., how the users’ perceptions change over time). Third, most of the studies have been undertaken in the lab [28, 59], making it difficult to generalise these results to real-world settings. In this study, we sought to overcome those limitations by designing repair strategies for robotic longitudinal well-being coaching with the involvement of real-world stakeholders. To this end, we undertook a 4-phase design process in which we involved a professional mental well-being coach, and users who had already interacted with a robotic coach in their workplace. As a first step, we designed a set of repair strategies together with the professional human coach, utilizing their expertise and experience. In the second phase, we deployed a robotic coach at a workplace and compared the two sets of repair strategies over four weeks by involving 12 users who had already interacted with a robotic coach before. After the study, we informed the users of the study set-up, and asked for their feedback on the robot’s mistakes in a design workshop. Finally, we reflected on the user study results and user insights with the professional coach from the first phase, in order to further inform the design of repair strategies for robotic well-being coaches. This paper contributes to: 1) designing repair strategies appropriate for robotic well-being coaching; 2) investigating the longitudinal effect of repair strategies; and 3) collecting user perspectives on robot mistakes and repair strategies in a real-world context. 2 RELATED WORK Well-being Coaching and Mistakes. While there is no single definition of well-being [36], we focus on the definition of well-being as positive psychological functioning [42]. Mental well-being coaching aims to support coachees to thrive in their life [21] and improve positive psychological functioning [53]. Positive psychology coaching in particular aims to help coachees to focus on positive aspects of their life [46], through exercises where the coachee e.g. focuses on experiences where they felt grateful, in order to enhance positive memories and goal attainment [13, 58]. During coaching, difficulties with the coach, such as the coach being vague or not sensitive" 2401.03799v1,"1 Safe Chance-constrained Model Predictive Control under Gaussian Mixture Model Uncertainty Kai Ren, Colin Chen, Hyeontae Sung, Heejin Ahn, Ian Mitchell and Maryam Kamgarpour Abstract—We present a chance-constrained model predictive control (MPC) framework under Gaussian mixture model (GMM) uncertainty. Specifically, we consider the uncertainty that arises from predicting future behaviors of moving obstacles, which may exhibit multiple modes (for example, turning left or right). To address the multi-modal uncertainty distribution, we propose three MPC formulations: nominal chance-constrained planning, robust chance-constrained planning, and contingency planning. We prove that closed-loop trajectories generated by the three planners are safe. The approaches differ in conservativeness and performance guarantee. In particular, the robust chance-constrained planner is recursively feasible under certain assumptions on the propagation of prediction uncertainty. On the other hand, the contingency planner generates a less conservative closed-loop trajectory than the nominal planner. We validate our planners using state-of-the-art trajectory prediction algorithms in autonomous driving simulators. Index Terms—Autonomous vehicles; Stochastic optimal control; Trajectory planning. I. I NTRODUCTION UTONOMOUS systems, such as self-driving cars and robots, face significant challenges when operating in dynamic environments. For instance, an autonomous vehicle must plan its trajectory while avoiding collisions with other road agents, such as other vehicles and pedestrians, with uncertain future positions. The future movements of other road agents are often multi-modal, for example, a nearby vehicle may go straight or turn at intersections. Planning safe trajectories in scenarios involving multi-modal behavior of road agents (e.g., intersection, overtaking) is particularly challenging yet essential for real-world applications. Our work here focuses on developing a provably safe and computationally tractable trajectory planning approach in the presence of multi-modal uncertainty distributions. A Ren and Kamgarpour are with the SYCAMORE Lab, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland (e-mail: kai.ren@epfl.ch; maryam.kamgarpour@epfl.ch ). Chen and Mitchell are with the Department of Computer Science, The University of British Columbia, Vancouver, BC, Canada (e-mail: mitchell@cs.ubc.ca; colinc@fastmail.com ). Sung and Ahn are with the School of Electrical Engineering, KAIST, South Korea (e-mail: hyeontae.sung@kaist.ac.kr; heejin.ahn@kaist.ac.kr ). Ren and Kamgarpour’s research is supposed by Swiss National Foundation Grant #200020 207984/1. Mitchell, Chen, and Ahn were partially supported by National Science and Engineering Research Council of Canada (NSERC) Discovery Grant #RGPIN-2017-04543. Sung and Ahn were partially supported by the Ministry of Science and ICT, Korea, under the Information Technology Research Center support program (IITP-2023-RS-2023-00259991) supervised by the Institute for Information & Communications Technology Planning & Evaluation. A. Related Works Risk-constrained trajectory planning is a common formulation to ensure safety in uncertain environments. This formulation, rather than enforcing constraints for all uncertainty realizations, tolerates constraint violation up to a given threshold in terms of a chosen risk metric. The chance constraint is a common risk metric that restricts the probability of constraint violation. However, the chance constraint formulation is unaware of the potential severity of constraint violation. This has motivated the use of conditional value-at-risk (CVaR) [1]–[3], which accounts for the expected amount of constraint violation. Both chance-constrained and CVaR-constrained trajectory planning problems are tractable when constraints are linear, and the uncertainty follows a (uni-modal) Gaussian distribution [4]–[7]. In the context of autonomous driving, the trajectory prediction models [8], [9] show that in complex and interactive environments, the probability distributions over the future positions of the vehicles are multi-modal. These past works have used a Gaussian mixture model (GMM) to depict the multi-modal uncertainty. Motivated by the prevalence of GMM in trajectory predictions, our work focuses on developing a framework for safe trajectory planning under GMM uncertainty. When the moments of each mode of GMM uncertainty are known and constraints are linear, chance-constrained problems can be tractably solved [10], while CVaR-constrained problems can be addressed by an iterative cutting-plane [11] approach. However, the exact distribution may be unknown in practice, and only samples (e.g., sensor data) may be available. Without any prior knowledge of the uncertainty’s distribution, CVaR- constrained problems have been tractably addressed by a sample average approximation [2] without any theoretical approximation guarantees. On the other hand, a distributionally robust approach with Wasserstein distance ambiguity set [12] can be applied to trajectory planning [13]. Under certain assumptions on the risk constraints, a finite-sample safety guarantee has been derived for this approach. With partial knowledge of the uncertainty’s distribution, e.g., the uncertainty is multi-modal and the number of modes is known, [14] extends the scenario approach [15], [16] to address trajectory planning under multi-modal uncertainty. On the other hand, [17] estimates the GMM moments by clustering the samples and robustifies the risk constraints against estimation error using moment concentration bounds. However, in the context of trajectory planning, both our prior studies [14], [17] are based on an open-loop framework. In autonomous vehicle trajectory planning, overly cautious" 2401.03807v1,"QUANTUM OBLIVIOUS LWE SAMPLING AND INSECURITY OF STANDARD MODEL LATTICE-BASED SNARKS THOMAS DEBRIS–ALAZARD 1 , POURIA FALLAHPOUR 2 , AND DAMIEN STEHLÉ 2,3 Abstract. The Learning With Errors (LWE) problem asks to find s from an input of the form (A, b = As + e) ∈ (Z/qZ) m×n × (Z/qZ) m , for a vector e that has small-magnitude entries. In this work, we do not focus on solving LWE but on the task of sampling instances. As these are extremely sparse in their range, it may seem plausible that the only way to proceed is to first create s and e and then set b = As + e. In particular, such an instance sampler knows the solution. This raises the question whether it is possible to obliviously sample (A, As+e), namely, without knowing the underlying s. A variant of the assumption that oblivious LWE sampling is hard has been used in a series of works constructing Succinct Non-interactive Arguments of Knowledge (SNARKs) in the standard model. As the assumption is related to LWE, these SNARKs have been conjectured to be secure in the presence of quantum adversaries. Our main result is a quantum polynomial-time algorithm that samples well-distributed LWE instances while provably not knowing the solution, under the assumption that LWE is hard. Moreover, the approach works for a vast range of LWE parametrizations, including those used in the above-mentioned SNARKs. 1. Introduction The Learning With Errors (LWE) problem [Reg09] is well-known for its conjectured intractability for quantum algorithms, inherited from the conjectured worst-case hardness of specific problems over Euclidean lattices. It has led to abundant cryptographic constructions that are presumably quantum resistant. For three integers m ≥ n ≥ 1 and q ≥ 2 as well as a distribution χ over Z/qZ concentrated on values that are small modulo q, the search version of LWE with parameters m, n, q and χ consists in recovering the secret s from the LWE instance (A, As + e) ∈ (Z/qZ) m×n × (Z/qZ) m . In the latter, the matrix A and the vector s are typically uniformly distributed, and each coefficient of e is i.i.d. from χ. In this work, we do not focus on solving LWE, but on the task of generating LWE samples. Concretely, we consider algorithms S, which we call LWE samplers, that take as input a uniform matrix A and output a correctly distributed b = As + e: S m,n,q,χ : A ∈ (Z/qZ) m×n −→ b = As + e ∈ (Z/qZ) m . For parameters of cryptographic interest, a correctly distributed LWE pair (A, b) admits a unique pair (s, e) that is much more likely than any other pair to satisfy b = As + e. This is provided by m being sufficiently large as a function of n, q and χ. In most cases, the dimension m is polynomial in a security parameter λ and the modulus q ranges from polynomial to exponential in λ; χ is often set as an integer Gaussian of standard deviation parameter σ ∈ √ √ the distribution that is folded modulo  q, which will be subsequently denoted by ϑ σ,q . We [Ω( n), O(q/ n)] P exp −|e + qk| 2 /σ 2 for all e ∈ Z, up to a normalization factor. As the have ϑ σ,q (e) = k∈Z correctly formed b’s are extremely sparse in their range (e.g., exponentially so as a function of λ), the naive approach of sampling a uniform b and keeping it if it has the correct form is prohibitively expensive. Another major bottleneck with this naive approach is that the distinguishing version of LWE is no easier than its search version (see [Reg09] for small values of q and [Pei09, BLP + 13] for large values of q). Given this, it could seem that the only way to proceed for a sampler S is to first create s and e and then return As + e. This leads us to the following question: Does there exist an efficient algorithm that creates LWE samples without knowing the underlying secrets? 1 Inria and Laboratoire LIX, École Polytechnique, Palaiseau, France 3 ENS de Lyon and LIP, Lyon, France 4 Cryptolab Inc., Lyon, France E-mail addresses: thomas.debris@inria.fr, pouria.fallahpour@ens-lyon.fr , damien.stehle@cryptolab.co.kr. 1" 2401.03808v1,"High-temperature sensing using a hollow-core fiber with thick cladding tubes Gabriel Labes Rodrigues, Cristiano M. B. Cordeiro, Foued Amrani, Frédéric Gérôme, Fetah Benabid and Jonas H. Osório Abstract—We report on high-temperature sensing measurements using a tubular-lattice hollow-core photonic crystal fiber displaying a microstructure formed of eight 2.4 µm-thick cladding tubes. The larger thickness of our fiber’s cladding tubes compared to other hollow fibers operating in the visible and infrared ranges entails multiple narrow transmission bands in its transmission spectrum (6 bands in the spectral range between 400 nm and 950 nm) and benefits the realization of the temperature sensing measurements. The principle of operation of our device is based on the thermo-optic effect and thermal expansion-induced spectral shifts of the fiber transmission bands due to temperature variations. To study the sensor operation, we monitored the fiber transmission bands’ spectral positions from room temperature to 1085 ºC in both ramp-up and ramp-down scenarios. Additionally, we investigated the optimization opportunities by assessing an analytical model describing the fiber transmission characteristics and discussed the alternatives for enhancing the sensor performance. Moreover, our fiber characterization experiments revealed a consistent confinement loss trend aligned with the scaling laws in tubular-lattice hollow-core fibers. We thus understand that the results presented in this manuscript highlight a relevant path for the development of temperature sensors based on microstructured hollow-core optical fibers endowed with thick cladding tubes. Index Terms—Fiber optics, hollow-core fiber, fiber sensor, temperature sensing I. Introduction Optical fibers are undoubtedly excellent platforms for the development of sensing systems. By relying on different technologies, such as fiber gratings, post-processed or specialty fibers, to mention a few, a myriad of physical, chemical, and biological fiber-based sensors could be demonstrated up to date. Remarkably, these setups can be set in very compact configurations and work in harsh environments (e.g., corrosive, explosive, or subjected to high temperatures), hence figuring as very promising application alternatives to situations in which standard electrical sensors have limited performance or cannot be deployed. Thus, in the framework of harsh environment sensing, one can identify the development of fiber-based high-temperature sensors as an active field of research, especially due to their potential applications in areas such as aviation, metallurgy, and fossil fuel production [1]. High-temperature sensors based on fiber Bragg gratings [2], Fabry-Perot interferometers [3], fiber tapers [4], multicore, suspended-core, and capillary fibers [5-7] have, therefore, been investigated. Additionally, one notes significant effort by the optical fiber sensing community The authors thank FAPESP (grants 2022/08805-7 and 2021/13097-9), CNPq (grants 309989/2021-3 and 305024/2023-0), and FAPEMIG (grant RED-00046-23) for financial support. G. L. R. and C. M. B. C. are with the Institute of Physics Gleb Wataghin, University of Campinas, Campinas, Brazil (email: g251066@dac.unicamp.br and cordeiro@unicamp.br). F.A., F. G., and F. B. are with the XLIM Institute, University of Limoges, Limoges, France (email: fouedamrani@glophotonics.fr, frederic.gerome@xlim.fr, f.benabid@xlim.fr). J. H. O. was with the Institute of Physics Gleb Wataghin, University of Campinas, Campinas, Brazil. He is now with the Department of Physics, Federal University of Lavras, Lavras, Brazil (email: jonas.osorio@ufla.br). towards the development of sapphire fiber sensors, particularly regarding applications in which temperatures above 1000 ºC are required [8]. In a broader scenario, a particular family of optical fibers displaying an empty core and a microstructured cladding, namely hollow-core photonic crystal fibers (HCPCF) [9], emerges as an enabling technology for addressing sensing challenges. Thanks to their alveolar microstructures, these fibers can be gas- and liquid-filled, hence disclosing a wide set of opportunities regarding, for example, the detection of gas species [10] and the monitoring of chemical reactions [11]. Additionally, a judicious choice of the HCPCF microstructure parameters enables the application of these fibers as curvature and displacement sensors [12, 13]. Hence, given the interest in the development of hightemperature sensors and the current availability of highperformance HCPCFs [14], in this investigation, we explore the utilization of a single-ring tubular-lattice (SR-TL) HCPCF as a high-temperature sensing platform. The fiber we employ in our experiments is a SR-TL HCPCF with a microstructure formed of a set of eight 2.4 µm-thick cladding tubes that define the fiber's hollow core. The use of a SR-TL HCPCF endowed with such thick cladding tubes allowed us to attain, in the fiber transmission spectrum, several narrow transmission bands whose spectral positions could be readily followed while the external environment temperature was altered in the temperature sensing measurements. Our characterization experiments allowed us to demonstrate a temperature sensor working from room temperature to 1085 ºC. Additionally, benefiting from the existence of 6 transmission bands within the wavelength span from 400 nm to" 2401.03812v1,"ORANUS: Latency-tailored Orchestration via Stochastic Network Calculus in 6G O-RAN Oscar Adamuz-Hinojosa ∗ , Lanfranco Zanzi † , Vincenzo Sciancalepore † , Andres Garcia-Saavedra † , Xavier Costa-Pérez ‡†§ ∗ Department of Signal Theory, Telematics and Communications, University of Granada, Spain. Email: oadamuz@ugr.es, † NEC Laboratories Europe, Heidelberg, Germany. Email:{name.surname}@neclab.eu, ‡ i2CAT Foundation, Barcelona, Spain. Email:{name.surname}@i2cat.net, § ICREA, Barcelona, Spain. Abstract—The Open Radio Access Network (O-RAN)- compliant solutions lack crucial details to perform effective control loops at multiple time scales. In this vein, we propose ORANUS, an O-RAN-compliant mathematical framework to allocate radio resources to multiple ultra Reliable Low Latency Communication (uRLLC) services. In the near-RT control loop, ORANUS relies on a novel Stochastic Network Calculus (SNC)- based model to compute the amount of guaranteed radio resources for each uRLLC service. Unlike traditional approaches as queueing theory, the SNC-based model allows ORANUS to ensure the probability the packet transmission delay exceeds a budget, i.e., the violation probability, is below a target tolerance. ORANUS also utilizes a RT control loop to monitor service transmission queues, dynamically adjusting the guaranteed radio resources based on detected traffic anomalies. To the best of our knowledge, ORANUS is the first O-RAN-compliant solution which benefits from SNC to carry out near-RT and RT control loops. Simulation results show that ORANUS significantly improves over reference solutions, with an average violation probability 10× lower. Index Terms—Multi-scale-time, O-RAN, Real-Time RIC, Stochastic Network Calculus, uRLLC. I. I NTRODUCTION In the Sixth Generation (6G) networks, a pivotal scenario to address is the coexistence of multiple ultra-Reliable Low Latency Communication (uRLLC) services. They place stringent demands on latency and reliability, requiring deterministic guarantees to ensure their seamless operation [1]. Moreover, a key driving factor in 6G networks is the virtualization of the Radio Access Network (RAN) [2]. This entails the deployment of virtualized RANs (vRANs) instances, wherein each vRAN comprises a set of fully-configurable virtualized Base Stations (vBSs) designed to cater the requirements of individual services. In this context, the Open RAN (O-RAN) Alliance proposed a novel architecture [3] embracing and promoting the 3rd Generation Partnership Project (3GPP) functional split, where each vBS is divided across multiple network nodes: Centralized Unit (CU)-Control Plane (CP), CU-User Plane (UP), Distributed Unit (DU) and Radio Unit (RU). Furthermore, the O-RAN architecture considers two The research leading to these results has been supported in part by SNS JU Project 6G-GOALS (GA no. 101139232), in part by the EU FP Horizon 2020 project DAEMON (GA no. 101017109), in part by the Spanish Ministry of Economic Affairs and Digital Transformation under Projects 6G-CHRONOS and OPEN6G (grants TSI-063000-2021-28 and TSI-063000-2021-3) and in part by the Spanish Ministry of Science and Innovation / State Investigation Agency under Project 6G-INSPIRE (grant PID2022-137329OB-C43). RAN Intelligent Controllers (RICs), which provide a centralized abstraction of the network, allowing the Mobile Network Operator (MNO) to perform autonomous actions between vBS components and their controllers. Specifically, the non-Real Time (RT) RIC supports large timescale optimization tasks (i.e., in the order of seconds or minutes), including policy computation and Machine Learning (ML) model management. Such functionalities are carried out by third-party applications denominated rApps. Additionally, the near-RT RIC performs RAN optimization, control and data monitoring tasks in near- RT timescales (i.e., from 10ms to 1s). Such functionalities can also be performed by third-party applications denominated xApps. For more details about O-RAN, we recommend [4]. Despite the ongoing standardization efforts, there are still open challenges toward a successful implementation of the O- RAN architecture: limiting the execution of control tasks in both RICs prevents the use of solutions where decisions must be made in real-time, i.e., below 10 ms [5]. For example, uRLLC Medium Access Control (MAC) scheduling requires making decisions at sub-millisecond timescales [6]. Unfortunately, the near-RT-RIC might struggle to accomplish this procedure due to limited access to low-level information (e.g., transmission queues, channel quality, etc.). The potential high latency involved in obtaining this information further exacerbates the problem. This calls for a RT control loop to monitor and orchestrate the decision of MAC schedulers. Addressing the current mention of RT control loop standardization as a study item [5], in this paper we provide the basis for future research activities towards an RT orchestration framework. In this context, an important yet unaddressed challenge lies in coordinating different control loops, which operate at different time scales [4]. The need for seamless and reliable coexistence of diverse uRLLC services demands, effective coordination schemes between the near-RT and non-RT control loops, as well as requires mechanisms to align the decisions made by different control loops while optimizing the resource allocation and avoiding conflicts. In this paper, we advocate for the adoption of Stochastic Network Calculus (SNC) to model the complex dynamics of O-RAN systems and analyze the performance of communications in terms of violation probability, i.e., the probability of a packet being transmitted exceeding a delay bound, while considering the uncertainties and variability in traffic patterns and channel" 2401.03816v1,"Copyright 2024 IEEE. Accepted to ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), scheduled for 14-19 April 2024 in Seoul, Korea. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works, must be obtained from the IEEE. Contact: Manager, Copyrights and Permissions / IEEE Service Center / 445 Hoes Lane / P.O. Box 1331 / Piscataway, NJ 08855-1331, USA. Telephone: + Intl. 908-562-3966." 2401.03817v1,"Context-Aware Coupler Reconfiguration for Tunable Coupler-Based Superconducting Quantum Computers Leanghok Hour, Sovanmonynuth Heng, Sengthai Heng, Myeongseong Go, and Youngsun Han Pukyong National University, Department of AI Convergence, Busan, South Korea (79 qubits) [7], and IonQ’s Forte (32 qubits) [8]. Even though quantum error correction (QEC) codes are not yet available, quantum supremacy has recently been demonstrated in Google’s Sycamore [6]. We address interconnection challenges in limited-qubit superconducting quantum computers (SQC), which often face crosstalk errors due to expanded qubit interactions during operations. Existing mitigation methods carry trade-offs, like hardware couplers or software-based gate scheduling. Our innovation, the Context-Aware COupler REconfiguration (CA-CORE) compilation method, aligns with application-specific design principles. It optimizes the qubit connections for improved SQC performance, leveraging tunable couplers. Through contextual analysis of qubit correlations, we configure an efficient coupling map considering SQC constraints. Our method reduces depth and SWAP operations by up to 18.84% and 42.47%, respectively. It also enhances circuit fidelity by 40% compared to IBM and Google’s topologies. Notably, our method compiles a 33-qubit circuit in less than 1 second. 1 The performance of NISQ devices heavily relies on the input problem size, specifically the number of qubits in and depth of the quantum circuit. Noise factors, such as thermal relaxation, can hinder quantum computers (QCs) from executing a high quantum circuit depth [9], whereas crosstalk errors reduce parallel gate execution in QCs [10, 11, 12, 13, 14]. Researchers have attempted to mitigate these errors using both hardware and software solutions. At the software level, a compiler can apply problem-specific optimizations [15, 16, 17, 18, 19] tailored to the target hardware. At the hardware level, to address crosstalk errors, tunable connections between qubits, achieved using couplers, can be employed. When using tunable couplers, the connection between qubit is activated only when a two-qubit gate needs execution; otherwise, it remains inactive. This way, qubits can perform their respective operations without crosstalk errors. However, another type of error is introduced. Ideally, a SQC is assumed to operate as a closed system at absolute zero temperature, an unattainable condition in the real world. Practically, we can only cool the system down to a certain low temperature close to zero, and external interactions are required to control qubits, which introduce errors [20]. Additionally, the tuning of the coupler (on/off) introduces unwanted interactions and errors to the qubits [21]. Introduction A new computing paradigm of quantum computing leverages the features of quantum mechanics like superposition and entanglement with the potential to solve classically intractable problems much faster, such as unstructured search [1] and integer factorization [2]. Currently, we are in the era of noisy intermediate-scale quantum (NISQ) devices with various hardware technologies namely superconducting [3] and trappedion [4] systems. Quantum computing vendors have all announced their quantum devices, including IBM’s Osprey (433 qubits) [5], Google’s Sycamore (53 qubits) [6], Rigetti’s Aspen-M-3 The existing methods [22, 23] focus on optimizing the qubit placement layout for applicationspecific quantum circuits, aiming to optimize connectivity while considering physical constraints, such as frequency-collision effects, to improve Youngsun Han: youngsun@pknu.ac.kr 1" 2401.03822v1,"Applications of the kinetic theory for a model of a confined quasi-two dimensional granular mixture: Stability analysis and thermal diffusion segregation Vicente Garzó, 1, a) Ricardo Brito, 2 and Rodrigo Soto 3 1) Departamento de Fı́sica and Instituto de Computación Cientı́fica Avanzada (ICCAEx), Universidad de Extremadura, E-06071 Badajoz, Spain 2) Departamento de Estructura de la Materia, Fı́sica Térmica y Electrónica and GISC, Universidad Complutense de Madrid, E-28040 Madrid, Spain 3) Departamento de Fı́sica, Facultad de Ciencias Fı́sicas y Matemáticas, Universidad de Chile, 8370449 Santiago, Chile The Boltzmann kinetic theory for a model of a confined quasi-two dimensional granular mixture derived previously [Garzó, Brito and Soto, Phys. Fluids 33, 023310 (2021)] is considered further to analyze two different problems. First, a linear stability analysis of the hydrodynamic equations with respect to the homogeneous steady state (HSS) is carried out to identify the conditions for stability as functions of the wave vector, the coefficients of restitution, and the parameters of the mixture. The analysis, which is based on the results obtained by solving the Boltzmann equation by means of the Chapman–Enskog method to first order in spatial gradients, takes into account the (nonlinear) dependence of the transport coefficients and the cooling rate on the coefficients of restitution and applies in principle to arbitrary values of the concentration, and the mass and diameter ratios. In contrast to the results obtained in the conventional inelastic hard sphere (IHS) model, the results show that all the hydrodynamic modes are stable so that, the HSS is linearly stable with respect to long enough wavelength excitations. On the other hand, this conclusion agrees with previous stability analysis performed in earlier studies for monocomponent granular gases. As a second application, segregation induced by both a thermal gradient and gravity is studied. A segregation criterion based on the dependence of the thermal diffusion factor Λ on the parameter space of the mixture is derived. In the absence of gravity, the results indicate that Λ is always positive and hence, the larger particles tend to accumulate near the top (cold) plate. However, when gravity is present, our results show the transition between Λ > 0 (larger particles tend to move toward the top plate) to Λ < 0 (larger particles tend to move toward the bottom plate) by varying the parameters of the system (masses, sizes, composition and coefficients of restitution). Comparison with previous results derived from the IHS model is carried out. the Navier–Stokes hydrodynamic equations (which hold for small spatial gradients). Thus, to avoid the difficulties embodied in the theoretical description of far from When granular matter is externally excited, the motion equilibrium situations, it is quite usual to drive the granof grains is quite similar to the chaotic motion of atoms or ular gas by means of external forces or thermostats. 7–14 molecules of an ordinary fluid. In this situation (rapid- However, unfortunately it is not quite clear the relationflow conditions), they admit a hydrodynamic-like type ship between the results obtained with thermostats with of description which can be derived from a fundamental 1,2 those provided in the real experiments. point of view by using kinetic theory tools. However, kinetic theory must be adapted to dissipative dynamics A possible way of avoiding the use of external drivsince the dimension of grains is macroscopic (typically ing forces has been proposed in the granular literature in of micrometers or larger), and hence their collisions are the past few years. 15–21 The idea is to consider a particinelastic. As a consequence, to keep them in rapid-flow ular geometry (quasi-two dimensional geometry) where conditions, one needs to subject to the grains to a violent the granular gas is confined in the vertical direction of and sustained excitation to compensate for the energy the box; this direction is slightly larger than one partilost by collisions and achieve a non-equilibrium steady cle diameter. Thus, when the box is vertically vibrated, state. energy is supplied into the vertical degrees of freedom of In real experiments, there are several ways of injecting grains through the collisions of them with the top and energy into the system. For instance, it can be done by bottom plates. The energy lost by collisions is countervibrating the walls of the system, 3,4 or by bulk driving balanced by the energy gained by grains due to their (as in air-fluidized beds). 5,6 Nevertheless, it is well-known collisions with the walls. This energy is transferred to that this sort of heating produces in general strong spathe horizontal degrees of freedom of grains. Under these tial gradients whose theoretical description goes beyond conditions, when the system is observed from above, it is fluidized and can remain in a homogeneous state. Needless to say, the collisional dynamics of the above a) Electronic mail: vicenteg@unex.es; geometry is quite intricate due essentially to the drastic http:https://fisteor.cms.unex.es/investigadores/vicente-garzo-puertos/ restrictions imposed by the the confinement to the set I. INTRODUCTION" 2401.03831v1,"We Need to Talk About Classification Evaluation Metrics in NLP Peter Vickers University of Sheffield pgjvickers1@sheffield.ac.uk Loïc Barrault Meta AI France loicbarrault@meta.com Emilio Monti Amazon U.K. monti@amazon.co.uk Nikolaos Aletras University of Sheffield n.aletras@sheffield.ac.uk Abstract In Natural Language Processing (NLP) classification tasks such as topic categorisation and sentiment analysis, model generalizability is generally measured with standard metrics such as Accuracy, F-Measure, or AUC-ROC. The diversity of metrics, and the arbitrariness of their application suggest that there is no agreement within NLP on a single best metric to use. This lack suggests there has not been sufficient examination of the underlying heuristics which each metric encodes. To address this we compare several standard classification metrics with more ‘exotic’ metrics and demonstrate that a random-guess normalised Informedness metric is a parsimonious baseline for task performance. To show how important the choice of metric is, we perform extensive experiments on a wide range of NLP tasks including a synthetic scenario, natural language understanding, question answering and machine translation. Across these tasks we use a superset of metrics to rank models and find that Informedness best captures the ideal model characteristics. Finally, we release a Python implementation of Informedness following the SciKitLearn classifier format. 1 1 Introduction Some of the most widely used classification metrics for measuring classifier performance in NLP tasks are Accuracy, F1-Measure and the Area Under the Curve - Receiver Operating Characteristics (AUC-ROC). For example, seven out of nine tasks of popular NLP benchmark GLUE (Wang et al., 2018) use either Accuracy or F1. Such metrics reduce the full collection of true classes y and predicted classes ŷ to a single scalar value. For instance accuracy, the most common classification metric, is equal to the proportion of 1 Code and documentation is available https://github.com/petervickers/ aacl-informedness at predicted classes which match true classes. Whilst capturing all the qualities of a classifier in any single scalar value is rather impossible (Chicco et al., 2021), the quality of the heuristic rule (Valverde- Albacete et al., 2013) influences both the overall ranking of models and the intra-task understanding of model capability. It is difficult to evaluate true model ability with Accuracy due to the ‘Accuracy Paradox’ (Ben- David, 2007): simply guessing the most common class can reward a score equal to that class’s prevalence in the test set. We expand this paradox into two phenomena: (1) the reward given to models that predict more classes which appear more often (are more prevalent) (Lafferty et al., 2001); and (2) the probabilistic lower bound for accuracy being much greater than zero for random guessing models in most realistic scenarios, a phenomenon we term baseline credit (Youden, 1950). F1-Measure (Manning and Schütze, 1999) is the harmonic mean of precision and recall and so represents a balance of two desirable characteristics of classifiers. F1 is defined against a single class, and so within even a binary classification case its value changes if the classes are reversed. Additionally, the weighting of precision and recall is a function of the model itself (Hand and Christen, 2018), making it a poor metric for ranking models. In order to handle the multi-class case, macro- and micro- averaging strategies have been proposed. In the single-label case we consider, micro averaging is reduced to Accuracy, whilst macro-averaging is equivalent to averaging the F1 score across all classes. Therefore, F1-Macro retains both the biases of F1 in the single class case and introduces a further heuristic in weighting all classes equally regardless of class prevalence. An alternative to the F-Measure, the Receiver Operating Characteristic (ROC) curve visually presents the trade-off between Recall and Precision as a function of the decision threshold. The" 2401.03845v1,"Opto-RF transduction in Er 3+ :CaWO 4 Thierry Chanelière ∗ , Rémi Dardaillon, Pierre Lemonde, Jérémie J. Viennot Univ. Grenoble Alpes, CNRS, Grenoble INP, Institut Néel, 38000 Grenoble, France Emmanuel Flurin, Patrice Bertet Université Paris-Saclay, CEA, CNRS, SPEC, 91191 Gif-sur-Yvette Cedex, France Diana Serrano, Philippe Goldner Chimie ParisTech, PSL University, CNRS, Institut de Recherche de Chimie Paris, 75005 Paris, France Abstract We use an erbium doped CaWO 4 crystal as a resonant transducer between the RF and optical domains at 12 GHz and 1532 nm respectively. We employ a RF resonator to enhance the spin coupling but keep a single-pass (non-resonant) setup in optics. The overall efficiency is low but we carefully characterize the transduction process and show that the performance can be described by two different metrics that we define and distinguish: the electrooptics and the quantum efficiencies. We reach an electro-optics efficiency of -84 dB for 15.7 dBm RF power. The corresponding quantum efficiency is -142 dB for 0.4 dBm optical power. We develop the Schrödinger-Maxwell formalism, well-known to describe light-matter interactions in atomic systems, in order to model the conversion process. We explicitly make the connection with the cavity quantum electrodynamics (cavity QED) approach that are generally used to describe quantum transduction. ∗ Corresponding author Email address: thierry.chaneliere@neel.cnrs.fr (Thierry Chanelière) Preprint submitted to Elsevier January 9, 2024" 2401.03846v1,"UFO: Unidentified Foreground Object Detection in 3D Point Cloud * Hyunjun Choi 1 , 2 1 Jin Young Choi 1 2 ASRI, ECE., Seoul National University numb7315@snu.ac.kr RideFlux Inc. hawook@rideflux.com jychoi@snu.ac.kr Abstract (a) In this paper, we raise a new issue on Unidentified Foreground Object (UFO) detection in 3D point clouds, which is a crucial technology in autonomous driving in the wild. UFO detection is challenging in that existing 3D object detectors encounter extremely hard challenges in both 3D localization and Out-of-Distribution (OOD) detection. To tackle these challenges, we suggest a new UFO detection framework including three tasks: evaluation protocol, methodology, and benchmark. The evaluation includes a new approach to measure the performance on our goal, i.e. both localization and OOD detection of UFOs. The methodology includes practical techniques to enhance the performance of our goal. The benchmark is composed of the KITTI Misc benchmark and our additional synthetic benchmark for modeling a more diverse range of UFOs. The proposed framework consistently enhances performance by a large margin across all four baseline detectors: SECOND, PointPillars, PV-RCNN, and PartA2, giving insight for future work on UFO detection in the wild. (b) 65 Recall 500@0.25 (%) Hawook Jeong 2 1. Introduction 55 Ours PV-RCNN Ours Ours 50 PointPillars 45 PartA2 40 35 In autonomous driving scenarios, 3D object detection using point clouds is a crucial perception technology. While the recognition performance of 3D object detectors has advanced, confidence in their stability for real-world applications remains insufficient. Specifically, a notable issue is the tendency of 3D object detectors to assign high confidence scores to unidentified foreground or unknown objects. Recently, methods addressing Out-of-Distribution (OOD) detection [4, 5] or open-set object detection [3, 8, 13] in 2D object detection on images have tackled similar challenges. Similarly, in the realm of 3D object detection [12, 26] on point clouds, efforts are underway to address these issues. However, we have found that 3D object detectors [14, 21, 22, 27] not only face challenges in OOD detection for unidentified foreground objects but also encounter significant difficulties in localization. Unlike 2D images, Lidar Ours SECOND PointPillars PV-RCNN PartA2 Ours(SECOND) Ours(PointPillars) Ours(PV-RCNN) Ours(PartA2) 60 SECOND 70 75 80 AUROC 85 90 95 Figure 1. Base 3D object detector and our method comparison. (a): 3D object detection result of baseline SECOND [27] on KITTI [6] ’Misc’ class object; (b): Comparison of the base detector and our method in two aspects: OOD localization performance (Recall) and OOD detection performance (AUROC). point clouds are sparse, making it challenging to obtain accurate context and precisely localize unidentified foreground objects with various sizes. As depicted in Figure 1a, SECOND [27], which is trained on the classes of Car, Pedestrian, and Cyclist, fails to localize the ’Misc’ class object within the green box even at a close distance. Instead, SECOND recognizes the unknown object as a smaller pedestrian, posing a potential threat to safety. Furthermore, these localization challenges have a critical impact on OOD 1" 2401.03848v1,"Analysis of Blockchain Integration in the e-Healthcare Ecosystem Abdellah OUAGUID 1 , Mohamed HANINE 2 , Zouhair CHIBA 3 , Noreddine ABGHOUR 3 , and Hassan GHAZAL 4,5,6 1 2 ENSET, Hassan II University, Mohammedia, Morocco LTI Laboratory, National School of Applied Sciences, Chouaib Doukkali University, El Jadida, Morocco 3 L.I.S Labs, FSAC, Hassan II University, Casablanca, Morocco 4 Laboratory of Genomics, Bioinformatics and Digital Health, Mohammed VI University of Health Sciences, Casablanca, Morocco 5 Laboratory of Genomics, Bioinformatics and Digital Health, Mohammed VI Center for Research and Innovation, Rabat, Morocco 6 Royal Institute of Sports, Salé, Morocco Emails: ouaguid@gmail.com, hanine.m@ucd.ac.ma, zouhair.chiba@univh2c.ma, nabghour@gmail.com, hassan.ghazal@fulbrightmail.org Abstract—No one can dispute the disruptive impact of blockchain technology, which has long been considered one of the major revolutions of contemporary times. Its integration into the healthcare ecosystem has helped overcome numerous difficulties and constraints faced by healthcare systems. This has been notably demonstrated in the meticulous management of electronic health records (EHR) and their access rights, as well as in its capabilities in terms of security, scalability, flexibility, and interoperability with other systems. This article undertakes the study and analysis of the most commonly adopted approaches in healthcare data management systems using blockchain technology. An evaluation is then conducted based on a set of observed common characteristics, distinguishing one approach from the others. The results of this analysis highlight the advantages and limitations of each approach, thus facilitating the choice of the method best suited to the readers’ specific case study. Furthermore, for effective implementation in the context of ehealth, we emphasize the existence of crucial challenges, such as the incomplete representation of major stakeholders in the blockchain network, the lack of regulatory flexibility to ensure legal interoperability by country, and the insufficient integration of an official regulatory authority ensuring compliance with ethical and legal standards. To address these challenges, it is necessary to establish close collaboration between regulators, technology developers, and healthcare stakeholders. Index Terms—Blockchain, Electronic Health Record (EHR), Healthcare system, Security, Privacy I. I NTRODUCTION In the realm of e-health systems, particularly those managing sensitive data such as patients’ Electronic Health Records (EHR), play a crucial role in the security and evolution of the healthcare ecosystem [1]. Their continual adaptation to emerging technologies (AI, IoT, blockchain, etc.) enables them to leverage the benefits of these advancements while enhancing their level of maturity. However, the multitude of services comprising the healthcare ecosystem can render the complete digitization of such a 979-8-3503-2939-1/23/$31.00 ©2023 IEEE system complex, particularly in terms of managing its interoperability with existing or third-party systems. Figure 1 illustrates the organization of services within the healthcare ecosystem, which can be classified into two types: clinical and non-clinical services. Clinical services encompass all activities involving direct interaction with the patient (such as diagnosis, therapy, and observation). In contrast, non-clinical services refer to roles that do not directly involve patient treatment but actively interact within the clinical environment, such as medical research, information technology, and administrative assistance. These diverse services generate data flows, both coherent and incoherent, which fuel the operation of several systems, including EHR management systems, supply chains, and scientific research. The significant transformation experienced in the healthcare sector, particularly during the COVID-19 public health crisis, has attracted the attention of malicious actors, leading to an increase of over 69% in the volume of ransomware cyberattacks targeting healthcare systems [2]. This percentage represents the highest proportion compared to all other domains and sectors in 2021. During the first quarter of 2023, industryspecific attack ranking revealed a notable 22% increase in attacks on the healthcare sector compared to the previous year, with a weekly average of 1,684 attacks (Table I) [3]. This underscores the imperative to prioritize the security, integrity, and confidentiality of patient data while digitizing an electronic healthcare system to mitigate any form of attack (DDoS, data breaches, ransomware, malware, phishing, etc.) that may compromise its proper functioning. Presently, the deployment of systems or applications requiring substantial storage space and significant computing power has become accessible to all entities, regardless of their size, owing to the growing and continuous adoption of cloud service providers or SaaS partners vying to offer competitively priced services" 2401.03864v1,"Survey and Analysis of DNS Filtering Components Jonathan Magnusson Karlstad University Karlstad, Sweden jonathan.magnusson@kau.se Abstract. The Domain Name System (DNS) comprises name servers translating domain names into, commonly, IP addresses. Authoritative name servers hosts the resource records (RR) for certain zones, and resolver name servers are responsible for querying and answering DNS queries on behalf of their clients. Unfortunately, cybercriminals often use DNS for malicious purposes, such as phishing, malware distribution, and botnet communication. To combat these threats, filtering resolvers have become increasingly popular, employing various techniques to identify and block malicious requests. In this paper, we survey several techniques to implement and enhance the capabilities of filtering resolvers including response policy zones, threat intelligence feeds, and detection of algorithmically generated domains. We identify the current trends of each area and find missing intersections in the literature, which could be used to improve the effectiveness of filtering resolvers. In addition, we propose future work designing a framework for filtering resolvers using state-of-the-art approaches identified in this study. Keywords: literature study · domain name system · response policy zone · threat intelligence feed · domain generation algorithm · resolver · filtering resolver · DNS firewall 1 Introduction Domain Name System (DNS) has become a crucial infrastructure component in the modern Internet era. DNS is responsible for converting user-friendly domain names into their corresponding IP addresses. The DNS resolvers act as a mediator between the end-users and the authoritative name servers, and they play a critical role in ensuring the smooth functioning of the Internet. However, with the increasing prevalence of cyber threats, the need for secure and efficient DNS resolvers has become more critical. One way to enhance the security of DNS resolvers is through filtering. DNS filtering blocks or allows specific queries and responses based on predefined rules similar to a firewall. This technique prevents users from accessing malicious or inappropriate content, enforces organizational policies, and protects against cyber threats such as phishing, malware," 2401.03872v1,"A New Dataset and a Distractor-Aware Architecture for Transparent Object Tracking Alan Lukežič 1* , Žiga Trojer 1 , Jiřı́ Matas 2 and Matej Kristan 1 1 Faculty of computer and information science, University of Ljubljana, Večna pot 113, Ljubljana, 1000, Slovenia. 2 Center for Machine Perception, Czech Technical University in Prague, Karlovo namesti 13, Prague, 12135, Czech Republic. *Corresponding author(s). E-mail(s): alan.lukezic@fri.uni-lj.si; Contributing authors: ziga.trojer20@gmail.com; matas@fel.cvut.cz; matej.kristan@fri.uni-lj.si; Abstract Performance of modern trackers degrades substantially on transparent objects compared to opaque objects. This is largely due to two distinct reasons. Transparent objects are unique in that their appearance is directly affected by the background. Furthermore, transparent object scenes often contain many visually similar objects (distractors), which often lead to tracking failure. However, development of modern tracking architectures requires large training sets, which do not exist in transparent object tracking. We present two contributions addressing the aforementioned issues. We propose the first transparent object tracking training dataset Trans2k that consists of over 2k sequences with 104,343 images overall, annotated by bounding boxes and segmentation masks. Standard trackers trained on this dataset consistently improve by up to 16%. Our second contribution is a new distractor-aware transparent object tracker (DiTra) that treats localization accuracy and target identification as separate tasks and implements them by a novel architecture. DiTra sets a new state-of-the-art in transparent object tracking and generalizes well to opaque objects. Keywords: Visual object tracking, transparent object tracking, distractors 1 Introduction Visual object tracking is a fundamental computer vision problem with far-reaching applications in human-computer interaction, surveillance, autonomous robotics, and video editing, among others. The significant progress observed over the past decade can be attributed to the emergence of challenging evaluation datasets (Wu et al, 2015; Kristan et al, 2016; Huang et al, 2019; Fan et al, 2019) and diverse training sets (Muller et al, 2018; 1 Russakovsky et al, 2015; Huang et al, 2019), which have facilitated the end-to-end learning of modern deep tracking architectures. While numerous benchmarks have addressed opaque objects, tracking of transparent objects has received comparatively little attention. These objects are unique due to their reflective nature and dependence on background texture, which reduces the effectiveness of deep features trained for opaque objects, as shown in Figure 1." 2401.03874v1,"MIDY’S THEOREM IN NON-INTEGER BASES AND DIVISIBILITY OF FIBONACCI NUMBERS ZUZANA MASÁKOVÁ AND EDITA PELANTOVÁ Abstract. Fractions pq ∈ [0, 1) with prime denominator q written in decimal have a curious property described by Midy’s Theorem, namely that two halves of their period (if it is of even length 2n) sum up to 10 n − 1. A number of results generalise Midy’s theorem to expansions of pq in different integer bases, considering non-prime denominators, or dividing the period into more than two parts. We show that a similar phenomena can be studied even in the context of numeration systems with non-integer bases, as introduced by Rényi. First we define the Midy property for a general real base √ β > 1 and derive a necessary condition for validity of the Midy property. For β = 12 (1 + 5) we characterize prime denominators q, which satisfy the property. Keywords: Midy theorem, β-expansions, Fibonacci numbers 1. Introduction The number 37 in decimal system has a purely periodic expansion, namely 0.(428571) ω . Note that the first half of the period 428 and the second half 571 sum up to 999. Similar 18 = 0.(947368421052631578) ω . The sum of the two behaviour appears with the fraction 19 halves of the period is 947368421 + 052631578 = 999999999. Here we always consider the period of minimal length. According to Dickson [3], this phenomenon for fractions of the form 1 q with prime denominator was observed experimentally already by Goodwyn in 1802 [5]. The first proof of this fact was probably given in 1836 by a French college mathematics professor Étienne Midy in his privately published treatise on the properties of numbers and periodic decimal fractions [12]. Nowadays, under the name Midy’s theorem, one usually finds the following result, although in Midy’s text, one can actually find methods to show stronger properties of decimal fractions. Theorem 1. Let q > 5 be a prime number. If a rational number pq ∈ (0, 1) has the minimal period of even length then the sum of the first and the second half of the period is a number whose expansion in the decimal system uses only the digit 9. One can hardly cherish expectations of some theoretical consequences of this theorem, yet alone a down to earth application. Nevertheless, this result can serve for the general public as an illustration that mathematics can simply be fun. Proofs and generalisations of this theorem have been for decades a source of amusement of many, both mathematical amateurs and professionals. A historical survey can be found in [18] and later [15]. A nice presentation of Midy’s theorem using group-theoretical proofs is given by Leavitt [9], who calls the phenomenon the nines-property and gives a criterion to decide about E-mail address: zuzana.masakova@fjfi.cvut.cz and edita.pelantova@fjfi.cvut.cz . 1" 2401.03875v1,"A contribution to discern the true impact of covid-19 on human mortality Stefano Barone University of Palermo Department of Agricultural, Food and Forestry Sciences Address: Viale delle Scienze, building 4 - 90128 Palermo, Italy stefano.barone@unipa.it ABSTRACT The years 2020 and 2021 were characterized by the covid-19 pandemic. The true impact of the pandemic on populations’ health and life has still to be completely discerned. Objective difficulties to account deaths due to covid-19, determined the risk of underestimating such impact, hence official mortality data started to be examined. The main objective of this work is to discern the true impact of covid-19 in EU during the crucial years 2020 and 2021. The mortality trends, already increasing in EU in pre-pandemic years, are modelled. The excess mortality attributable to covid-19, on yearly basis, is estimated via a novel strategy combining datasets from different official sources. Considering demographic and geographic factors, new indexes are formulated, which allow rankings of EU countries, and socio-political and economic reflections. The new indexes here formulated provide a different perspective to see the relative impact of the pandemic in 1" 2401.03878v1,"Federated Analytics for 6G Networks: Applications, Challenges, and Opportunities Juan Marcelo Parra-Ullauri İD , Member, IEEE, Xunzheng Zhang İD ,Student Member, IEEE, Anderson Bravalheri İD , Shadi Moazzeni İD , Member, IEEE, Yulei Wu İD , Senior Member, IEEE, Reza Nejabati İD , Senior Member, IEEE, and Dimitra Simeonidou İD , Fellow, IEEE Abstract—Extensive research is underway to meet the hyperconnectivity demands of 6G networks, driven by applications like XR/VR and holographic communications, which generate substantial data requiring network-based processing, transmission, and analysis. However, adhering to diverse data privacy and security policies in the anticipated multi-domain, multi-tenancy scenarios of 6G presents a significant challenge. Federated Analytics (FA) emerges as a promising distributed computing paradigm, enabling collaborative data value generation while preserving privacy and reducing communication overhead. FA applies big data principles to manage and secure distributed heterogeneous networks, improving performance, reliability, visibility, and security without compromising data confidentiality. This paper provides a comprehensive overview of potential FA applications, domains, and types in 6G networks, elucidating analysis methods, techniques, and queries. It explores complementary approaches to enhance privacy and security in 6G networks alongside FA and discusses the challenges and prerequisites for successful FA implementation. Additionally, distinctions between FA and Federated Learning are drawn, highlighting their synergistic potential through a network orchestration scenario. Index Terms—Federated Analytics, 6G, Networking, Federated Learning I. I NTRODUCTION With 5G technology deployment and global standardisation, industry and academia efforts are dedicated to researching future 6G networks to meet projected demands [1]. Societal digitisation, hyper-connectivity, and global data-driven ecosystems drive standardisation and strategic considerations for 6G networks to address communication requirements [2]. Future 6G networks are expected to be more distributed, heterogeneous, intelligent, and closer to end-users [1]. Achieving the ambitious 6G vision, including global coverage, diverse applications, robust security, spectrum utilisation, sensory integration, and full digitisation, requires further exploration of unresolved issues and research directions [2]. A key challenge in 6G networks arises from data-related issues due to advances in sensing, communication, and edge computing, resulting in a surge of data generation, transmission, and analysis within edge-cloud environments [3]. Data is invaluable to Communication Service Providers (CSPs), The authors are with the High-Performance Networks Group, Smart Internet Lab, School of Computer Science, Electrical and Electronic Engineering, and Engineering Maths (SCEEM), Faculty of Engineering, University of Bristol, BS8 1QU, U.K. (e-mail: jm.parraullauri@bristol.ac.uk). with the top 50 carriers holding data from over five billion consumers [4]. Research indicates data analytics will play a pivotal role in advancing network infrastructure towards 6G, offering rapid feedback, aiding troubleshooting, and converting raw data into actionable knowledge for automation systems [5]. Distributed analytics provide predictive capabilities, guiding algorithmic decisions to enhance system efficiency and infrastructure management, and can be integrated into architectural elements of 6G Network Data Analytics Functions (NWDAF) [6]. The presence of heterogeneous data owners across diverse domains, multiple tenancies, and various technologies in 6G networks raises concerns about data privacy and confidentiality [7]. The conventional edge-cloud computing paradigm, involving central server analysis, is insufficient for evolving application requirements [3]. Federated Analytics (FA) emerges as a promising distributed computing paradigm, enabling collaborative value generation from data across multiple remote entities while preserving local data for privacy and reduced communication overhead [8]. FA uses big data principles and tools to manage and secure distributed and diverse data networks effectively, improving network performance, reliability, visibility, and security while preserving confidentiality [3]. In this paper, our main focus is to showcase the benefits and applications of FA to tackle privacy and confidentiality concerns that arise from the diverse ownership at administrative, operational, and user levels, as well as the presence of various cloud and edge devices in 6G networks. We offer a thorough overview of FA in 6G networks, including its potential applications, domains, and types, as well as an exploration of data analysis methods, techniques, and queries. We also explore complementary approaches that enhance privacy and security when combined with FA. Furthermore, we discuss the open challenges for successful FA implementation in 6G networks. Lastly, we differentiate FA from Federated Learning (FL), exemplifying their synergistic potential through a network orchestration scenario. The rest of this article is structured as follows. Section II explains 6G Networks, FA, and their distinctions from FL. We introduce a taxonomy for 6G FA and an implementation framework. We demonstrate the framework’s working principles through an example and outline research challenges and open issues. In conclusion, we sum up this article." 2401.03902v1,"IRMP-CP3-24-01 Noncommutativity in Configuration Space Induced by A Conjugate Magnetic Field in Phase Space Jan Govaerts a,b,c a Centre for Cosmology, Particle Physics and Phenomenology (CP3), Institut de Recherche en Mathématique et Physique (IRMP), Université catholique de Louvain (UCLouvain), 2, Chemin du Cyclotron, B-1348 Louvain-la-Neuve, Belgium E-mail: Jan.Govaerts@uclouvain.be ORCID: http://orcid.org/0000-0002-8430-5180 b International Chair in Mathematical Physics and Applications (ICMPA–UNESCO Chair) University of Abomey-Calavi, 072 B.P. 50, Cotonou, Republic of Benin c Fellow of the Stellenbosch Institute for Advanced Study (STIAS), Stellenbosch, Republic of South Africa Abstract As is well known, an external magnetic field in configuration space coupled to a quantum dynamics induces noncommutativity in its velocity momentum space. By phase space duality, an external vector potential in the conjugate momentum sector of the system induces noncommutativity in its configuration space. Such a rationale for noncommutativity is explored herein for an arbitrary configuration space of Euclidean geometry. Ordinary quantum mechanics with a commutative configuration space is revisited first. Through the introduction of an arbitrary positive definite ∗-product, a one-to-one correspondence between the Hilbert space of abstract quantum states and that of the enveloping algebra of the position quantum operators is identified. A parallel discussion is then presented when configuration space is noncommutative, and thoroughly analysed when the conjugate magnetic field is momentum independent and nondegenerate. Once again the space of quantum states may be identified with the enveloping algebra of the noncommutative position quantum operators. Furthermore when the positive definite ∗-product is chosen in accordance with the value of the conjugate magnetic field which determines the commutator algebra of the coordinate operators, these operators span a Fock algebra of which the canonical coherent states are the localised noncommutative quantum analogues of the sharp and structureless local points of the associated commutative configuration space geometry. These results generalise and justify a posteriori within the context of ordinary canonical quantisation the heuristic approach to quantum mechanics in the noncommutative Euclidean plane as constructed and developed by F. G. Scholtz and his collaborators." 2401.03908v1,"Available online at www.sciencedirect.com Advances in Space Research xx (2024) xxx-xxx www.elsevier.com/locate/asr Classification of circular polarization Stokes profiles in a sunspot using k-means clustering Rohan Eugene Louis a,∗ , Shibu K. Mathew a , A. Raja Bayanna a a Udaipur Solar Observatory, Physical Research Laboratory, Dewali Badi Road, Udaipur - 313001, Rajasthan, India Received 26 July 2023; Received in final form 20 Dec 2023; Accepted 20 Dec 2023; Available online – Abstract The magnetic and velocity fields in sunspots are highly structured on small spatial scales which are encoded in the Stokes profiles. The Stokes profiles are in turn, derived from a sequence of polarization modulations on the incoming light that are imaged using an analyser-detector combination. Our aim is to identify Stokes profiles in a sunspot which exhibit spectral characteristics that deviate from those associated with the Evershed flow and their corresponding spatial distribution. To that end, we employ the k-means clustering routine to classify Stokes V spectra in the penumbra of a regular, unipolar sunspot, that also comprises a granular and a filamentary light bridge. We find that 75% of the penumbral region, corresponding to about 93500 pixels, is dominated by profiles comprising two, nearly anti-symmetric lobes, while 21% of the area is occupied by three-lobed profiles that are associated with the Evershed flow returning to the solar photosphere. The remaining 4% of the penumbral area is dominated by four groups/families of profiles - Group 1: three-lobed profiles in which both the rest and strong downflowing (sometimes supersonic) component have the same polarity as the host sunspot and seen exclusively in the filamentary light bridge. Group 2: single, red-lobed profiles occupying an area of about 2% located at the outer penumbra in discrete patches that possibly signify the downflowing leg of an Ω-loop. Group 3: three-lobed or highly asymmetric profiles, in which the rest component and the strong downflowing component have an opposite polarity as the sunspot. These occupy about 1.4% of the penumbra’s area and are seen in conspicuous, elongated structures or isolated patches in the outer penumbra and at the penumbra-quiet Sun boundary. Group 4: three lobed-profiles, in which the rest component has the same polarity as the sunspot and a weaker, upflowing component with a polarity opposite that of the sunspot. These profiles are located close to the entrance of the filamentary light bridge and are found in only 0.12% of the penumbral area. These minority groups of profiles could be related to dynamic phenomena that could also affect the overlying chromosphere. The simplicity and speed of k-means can be utilized to identify such anomalous profiles in larger data sets to ascertain their temporal evolution and the physical processes responsible for these inhomogeneities. © 2024 COSPAR. Published by Elsevier Ltd All rights reserved. Keywords: Sun:sunspots; Sun:high resolution; Sun:photosphere ; Technique:polarimetric ∗ Corresponding author: Tel.: +91-294-2457-217; Email address: rlouis@prl.res.in (Rohan Eugene Louis) https://dx.doi.org/10.1016/j.jasr.xxxx.xx.xxx 0273-1177/ © 2024 COSPAR. Published by Elsevier Ltd All rights reserved." 2401.03917v1,"T OWARD A C OMPREHENSIVE S IMULATION F RAMEWORK FOR H YPERGRAPHS : A P YTHON -B ASED A PPROACH Quoc Chuong Nguyen Department of Mathematics University at Buffalo New York, NY 14260 quocchuo@buffalo.edu Trung Kien Le Department of Applied Physics Stanford University Stanford, CA 94305 letrkien@stanford.edu January 9, 2024 A BSTRACT Hypergraphs, or generalization of graphs such that edges can contain more than two nodes, have become increasingly prominent in understanding complex network analysis. Unlike graphs, hypergraphs have relatively few supporting platforms, and such dearth presents a barrier to more widespread adaptation of hypergraph computational toolboxes that could enable further research in several areas. Here, we introduce HyperRD, a Python package for hypergraph computation, simulation, and interoperability with other powerful Python packages in graph and hypergraph research. Then, we will introduce two models on hypergraph, the general Schelling’s model and the SIR model, and simulate them with HyperRD. 1 Introduction Hypergraphs, a natural extension of traditional graphs, have emerged as a powerful mathematical tool for modeling complex relationships and structures across various domains [1, 2, 3]. Unlike graphs, hypergraphs allow for edges to connect more than two vertices, providing a more expressive representation of intricate dependencies. Therefore, hypergraphs have a profound significance in diverse disciplines, including computer science [4], biology [5], and social networks [6]. The study of hypergraphs in computer science has far-reaching implications for algorithm design, especially in addressing optimization problems where traditional graph models may prove inadequate, as noted in [7]. Hypergraphs also capture complexity in complex interacting networks and provide a glimpse into qualitatively different emergent dynamics [8]. Shifting the focus to the biological realm, hypergraphs find valuable applications in modeling molecular interactions and regulatory networks. Their unique capability to represent interactions among multiple biological entities, such as genes or proteins, contributes to a more nuanced understanding of the intricate relationships governing biological processes, as highlighted in [9]. This dual application underscores the interdisciplinary significance of hypergraphs in both computational and biological domains. The generalization of hypergraph [10, 11] provides a more versatile framework for capturing complex interactions that extend beyond binary relationships [12]. Therefore, the pervasive integration of hypergraphs in modeling real-world systems underscores the need for sophisticated simulation tools to comprehensively examine and understand their dynamic behavior [13]. Simulation, a pivotal instrument in this context, facilitates an in-depth exploration of the evolution of intricate relationships over time. It proves essential for evaluating the influence of diverse factors on the dynamic nature of hypergraph-based systems. By providing a virtual environment conducive to experimentation, simulation tools play an indispensable role in unraveling the complexities inherent in these relationships, offering insights into emergent properties and behaviors that elude analytical approaches. For this reason, we introduce a novel Python-based platform designed to simulate and analyze hypergraphs, addressing a gap in current computational resources available to researchers and practitioners in mathematics and computer science. Our platform, distinguished by its near-comprehensive range of features, stands out in its ability to represent, manipulate, visualize, and analyze hypergraphs with a level of versatility and depth not commonly found in existing" 2401.03932v1,"Nordic Machine Intelligence, vol. 3, pp. 1–6, 2023 Received 12 Oct 2022 / published 14 Aug 2023 https://doi.org/10.5617/nmi-9897 Using reinforcement learning to improve drone-based inference of greenhouse gas fluxes Alouette van Hove 123 , Kristoffer Aalstad 1 and Norbert Pirk 1 1. Department of Geosciences, University of Oslo, Oslo, Norway 2. dScience - Centre for Computational and Data Science, University of Oslo, Oslo, Norway 3. E-mail any correspondence to: a.van.hove@geo.uio.no Abstract Accurate mapping of greenhouse gas fluxes at the Earth’s surface is essential for the validation and calibration of climate models. In this study, we present a framework for surface flux estimation with drones. Our approach uses data assimilation (DA) to infer fluxes from drone-based observations, and reinforcement learning (RL) to optimize the drone’s sampling strategy. Herein, we demonstrate that a RL- trained drone can quantify a CO 2 hotspot more accurately than a drone sampling along a predefined flight path that traverses the emission plume. We find that information-based reward functions can match the performance of an error-based reward function that quantifies the difference between the estimated surface flux and the true value. Reward functions based on information gain and information entropy can motivate actions that increase the drone’s confidence in its updated belief, without requiring knowledge of the true surface flux. These findings provide valuable insights for further development of the framework for the mapping of more complex surface flux fields. Keywords: reinforcement learning, data assimilation, drones, climate science Introduction To date, the inability of climate models to capture the large spatio-temporal variability of land-atmosphere interactions remains a significant source of uncertainty in climate change projections [1, 2]. Model validation and calibration is complicated by the scale mismatch between land-atmosphere processes captured by site observations (≤ 1 km), and the grid scales at which climate models are run (1 − 100 km). We develop a framework for the mapping of greenhouse gas fluxes at the grid-scale of climate models using drone observations. Our aim is to facilitate model calibration and validation, and ultimately contribute to reducing uncertainties in climate projections. In the past decade, there has been increased interest in using meteorological sensors on drones to estimate fluxes. For example, [3], [4] and [5] applied a mass balance approach to quantify the strength of a methane hotspot from drone observations of gas concentrations downwind and upwind of a source. Moreover, [6] used drone observations in combination with the inversion of a Gaussian plume model to approximate fluxes. Recently, [7] applied data assimilation (DA) techniques to fuse drone observations with an atmospheric model to estimate surface heat fluxes. We build upon the latter work by taking a similar approach for the source term estimation of greenhouse gas fluxes. Optimal sampling strategies for inferring surface fluxes from drone observations are not necessarily evident a priori. On the one hand, the sample duration should be long enough and the number of observations sufficiently large, to capture the time-averaged emission plume as well as possible. On the other hand, sampling for too long a period of time leads to potential errors caused by changes in atmospheric stability, source strength, or prevailing weather during the sampling period. This issue becomes more pressing when sampling larger areas, which is the intention of this framework. This study represents an initial step in the development of a comprehensive framework capable of mapping surface fluxes in diverse environments and under varying atmospheric conditions. We focus on estimating the magnitude of a greenhouse gas surface flux at a known location, assuming static weather conditions. The strength of reinforcement learning (RL) [8] is its ability to learn a sequence of actions to complete a © 2023 Author(s). This is an open access article licensed under the Creative Commons Attribution License 4.0. (http://creativecommons.org/licenses/by/4.0/)." 2401.03947v1,"Guiding drones by information gain Alouette van Hove ∗1 , Kristoffer Aalstad 1 , and Norbert Pirk 1 1 Department of Geosciences, University of Oslo, Norway a.van.hove@geo.uio.no Abstract fline manner, for example, by selecting a sweeping “lawnmower” pattern, or they can be adapted to the The accurate estimation of locations and emission environment in an online manner [4]. The latter is rates of gas sources is crucial across various domains, known as informative path planning (IPP). including environmental monitoring and greenhouse In this paper, we explore two approaches to IPP gas emission analysis. This study investigates two for addressing the STE problem. The first approach drone sampling strategies for inferring source term involves a modified version of infotaxis, an online parameters of gas plumes from atmospheric mea- search strategy initially introduced by Vergassola et surements. Both strategies are guided by the goal of al. [5] for source localisation. Our work extends this maximizing information gain attained from observa- algorithm to estimate multiple source term parametions at sequential locations. Our research compares ters. The second approach uses deep reinforcement the myopic approach of infotaxis to a far-sighted nav- learning (DRL) [6] to develop a sampling strategy. igation strategy trained through deep reinforcement We train a mobile drone-based sensor to obtain the learning. We demonstrate the superior performance most certain estimates of the source term parameters of deep reinforcement learning over infotaxis in en- within a finite number of observations, simulating vironments with non-isotropic gas plumes. the constraints of a drone’s limited battery life. This study aims to determine whether a DRL strategy with an information-based reward can outperform 1 Introduction the infotaxis strategy in the context of STE. Recent studies have explored the application of As a result of global warming, permafrost soils are DRL for guiding mobile sensors in source seeking thawing and will potentially release large amounts of tasks [7–11]. However, these studies focused solely greenhouse gases such as methane and carbon dioxon source localisation, neglecting source strength ide into the atmosphere [1]. Understanding the scale estimation. Moreover, task completion in [7, 9– and distribution of these greenhouse gas sources 11] was determined based on the proximity of the helps improve the reliability of climate projections. mobile sensor to the source. This is impractical Determining the location and flux (i.e. emisfor the real-world identification of unknown greension rate) of greenhouse gas sources remains chalhouse gas sources whose location is uncertain. This lenging as they cannot be observed directly. Instudy seeks to jointly address both the source lostead, these source term parameters must be incalisation and strength problem. While Park et ferred through the analysis of observational data, al. [12] did consider the STE problem, they aimed such as gas concentrations and other atmospheric to minimize the number of observations needed for variables. This inverse problem is known as source accurate STE, rather than minimizing uncertainty term estimation (STE) [2]. The Bayesian inverwithin a single sampling flight. In line with van Hove sion approach combines observational data with an et al. [13], we apply an information-based reward atmospheric plume model, accounting for uncertainfunction. Whereas this earlier study estimated the ties in both, to yield a probability distribution over source strength at a known location using tabular possible source term parameters. Sequentially ap- RL, we apply deep RL herein to account for the plying Bayes’ theorem to each observation updates larger parameter space. the parameters’ probability distribution [3] so as to The study’s primary contributions are as follows: constrain uncertainty in the source term estimates. (a) Application of DRL to address the STE prob- Observations can be acquired using static senlem under pertinent constraints for greenhouse gas sors (e.g. measurement towers), mobile sensors (e.g. mapping in the field - considering unknown source drones), or a combination of the two. Although locations, fixed flight time due to battery limitations, mobile sensors offer the advantage of flexibility and and noisy observations by the sensor. (b) Comparing adaptability, the challenges of devising the optithe performance of DRL with an information-based mal sampling strategy become even more apparent. reward to infotaxis. (c) Comparison between two Sample trajectories can be pre-planned in an ofneural network architectures: a feed forward struc- ∗ Corresponding Author. ture with fully connected layers (as utilized by [7– Proceedings of the 5th Northern Lights Deep Learning Conference (NLDL), PMLR 233, 2024. L M 2024 Alouette van Hove, Kristoffer Aalstad, & Norbert Pirk. This is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/)." 2401.03964v1,"Well-balanced convex limiting for finite element discretizations of steady convection-diffusion-reaction equations Petr Knobloch ∗ , Dmitri Kuzmin † , Abhinav Jha ‡ Abstract We address the numerical treatment of source terms in algebraic flux correction schemes for steady convection-diffusion-reaction (CDR) equations. The proposed algorithm constrains a continuous piecewiselinear finite element approximation using a monolithic convex limiting (MCL) strategy. Failure to discretize the convective derivatives and source terms in a compatible manner produces spurious ripples, e.g., in regions where the coefficients of the continuous problem are constant and the exact solution is linear. We cure this deficiency by incorporating source term components into the fluxes and intermediate states of the MCL procedure. The design of our new limiter is motivated by the desire to preserve simple steady-state equilibria exactly, as in well-balanced schemes for the shallow water equations. The results of our numerical experiments for two-dimensional CDR problems illustrate potential benefits of well-balanced flux limiting in the scalar case. Keywords: convection-diffusion-reaction equations; discrete maximum principles; positivity preservation; algebraic flux correction; monolithic convex limiting; well-balanced schemes 1 Introduction Many modern numerical schemes for conservation laws are equipped with flux or slope limiters that ensure the validity of discrete maximum principles. A comprehensive review of such algorithms and of the underlying theory can be found, e.g., in [13]. Matters become more complicated in the case of inhomogeneous balance laws, especially if strong consistency with some steady-state solutions is desired. Discretizations that provide such consistency are called well balanced in the literature [2, 6, 17]. For example, a well-balanced scheme for the system of shallow water equations (SWEs) should preserve at least lake-at-rest equilibria (zero velocity, constant free surface elevation). In general, sources/sinks should be discretized in a manner compatible with the numerical treatment of flux terms [14]. In the one-dimensional case, proper balancing can often be achieved by discretizing a ‘homogeneous form’ of the balance law [5, 7, 19]. The design of well-balanced schemes for multidimensional problems is usually more difficult, especially if the source term does not admit a natural representation as the gradient of a scalar potential or divergence of a vector field. A well-balanced and positivity-preserving finite element scheme for the inhomogeneous SWE system was developed by Hajduk [8] using the framework of algebraic flux correction. The monolithic convex limiting (MCL) algorithm presented in [8, 9] incorporates discretized bathymetry gradients into the numerical fluxes and intermediate states of the spatial semi-discretization. In the present paper, we show that the source term of a scalar convection-diffusion-reaction problem can be treated similarly. In particular, we define numerical fluxes that ensure consistency of the well-balanced MCL approximation with a linear steady state. Using a ∗ Department of Numerical Mathematics, Faculty of Mathematics and Physics, Charles University, Sokolovská 83, Praha 8, 18675, Czech Republic, knobloch@karlin.mff.cuni.cz † Institute of Applied Mathematics (LS III), TU Dortmund University, Vogelpothsweg 87, D-44227 Dortmund, Germany, kuzmin@math.uni-dortmund.de ‡ Institute of Applied Analysis and Numerical Simulation, University of Stuttgart, Pfaffenwaldring 57, 70569 Stuttgart, Germany, abhinav.jha@ians.uni-stuttgart.de 1" 2401.03965v1,"Differential Equations for Continuous-Time Deep Learning Lars Ruthotto ∗ January 9, 2024 Abstract nary differential equations (ODEs), can provide new insights into deep learning and a foundation for more efficient algorithms. Even though many deep learning approaches used in practice today do not rely on differential equations, I find many opportunities for mathematical research in this area. As we shall see, phrasing the problem continuously in time enables one to borrow numerical techniques and analysis to gain more insight into deep learning, design new approaches, and crack open the black box of deep learning. We shall also see how neural ODEs can approximate solutions to high-dimensional, nonlinear optimal control problems. This short, self-contained article seeks to introduce and survey continuous-time deep learning approaches that are based on neural ordinary differential equations (neural ODEs). It primarily targets readers familiar with ordinary and partial differential equations and their analysis who are curious to see their role in machine learning. Using three examples from machine learning and applied mathematics, we will see how neural ODEs can provide new insights into deep learning and a foundation for more efficient algorithms. This article targets readers familiar with ordinary and partial differential equations and their analysis and who are curious to see their role in machine learning. Therefore, rather than drawing a complete picture of state-of-the-art machine learning, which is shooting at moving targets, we seek to provide foundational insights and motivate further study. To this end, we will inevitably take shortcuts and sacrifice being up-to-date for clarity. Even though designing efficient numerical algorithms is critical to translating the theoretical advantages of the continuous-time viewpoint into practical learning approaches, we will keep this topic for another day and provide some references for the interested reader. Deep learning has been behind incredible breakthroughs, such as voice recognition, image classification, and text generation. While these successes are undeniable, our mathematical understanding of deep learning is still developing. More rigorous insight is needed to overcome fundamental challenges, including the interpretability, robustness, and bias of deep learning, and lower its environmental and computational costs. Let us define deep learning informally as machine learning methods that use feed-forward neural networks with many (i.e., more than a handful) layers. While most traditional approaches use a finite number of layers, we will focus on more recent approaches that conceptually use infinitely many layers. We will explain those approaches by defining differential equations whose dynamics are modeled by trainable neural network components and whose time roughly corresponds to the depth of the network. Using three examples from machine learning and applied mathematics, we will see how continuousdepth neural network architectures, defined by ordi- While giving a complete picture of the research activity at this interface between differential equations and deep learning is beyond the scope of this paper, we seek to capture the key ideas and provide a head start to those eager to learn more. This paper aims to illustrate the foundations and some of the benefits of continuous-time deep learning using a few handpicked examples related to the author’s activity in the area. This article is an unedited and extended ∗ Lars Ruthotto is a Winship Distinguished Research Associate Professor at Emory University. His email address is version of an article under review at AMS Notices lruthotto@emory.edu. and contains a few additional references. 1" 2401.03989v1,"MS-DETR: Efficient DETR Training with Mixed Supervision Chuyang Zhao 12 , Yifan Sun 1 , Wenhao Wang 3 , Qiang Chen 1 , Errui Ding 1 , Yi Yang 4 , Jingdong Wang 1† 1 Baidu VIS 2 Beihang University 3 University of Technology Sydney 4 Zhejiang University {zhaochuyang,sunyifan01,chenqiang13}@baidu.com wangwenhao0716@gmail.com, yangyics@zju.edu.cn {dingerrui,wangjingdong}@baidu.com Abstract DETR accomplishes end-to-end object detection through iteratively generating multiple object candidates based on image features and promoting one candidate for each ground-truth object. The traditional training procedure using one-to-one supervision in the original DETR lacks direct supervision for the object detection candidates. We aim at improving the DETR training efficiency by explicitly supervising the candidate generation procedure through mixing one-to-one supervision and one-to-many supervision. Our approach, namely MS-DETR, is simple, and places one-to-many supervision to the object queries of the primary decoder that is used for inference. In comparison to existing DETR variants with one-to-many supervision, such as Group DETR and Hybrid DETR, our approach does not need additional decoder branches or object queries; the object queries of the primary decoder in our approach directly benefit from one-to-many supervision and thus are superior in object candidate prediction. Experimental results show that our approach outperforms related DETR variants, such as DN-DETR, Hybrid DETR, and Group DETR, and the combination with related DETR variants further improves the performance. Code will be available at: https://github.com/Atten4Vis/MS-DETR. 1. Introduction Detection Transformer (DETR) [3], an end-to-end object detection approach, has been attracting a lot of research attention [17, 22, 23, 25, 40]. It is composed of a CNN backbone, a transformer encoder, and a transformer decoder. The decoder is a stack of decoder layers, and each layer consists of self-attention, cross-attention and FFNs, followed by class and box predictor. The DETR decoder generates multiple object candidates that are represented in the form of object queries, and pro- † Corresponding author. Figure 1. Mixed supervision leads to better detection candidates. Top: ground-truth box. Middle: candidate boxes from top-20 queries with the baseline. Bottom: candidate boxes from top-20 queries with our MS-DETR. One can see that MS-DETR generates better detection candidates than the baseline. motes one candidate and demotes other duplicate candidates for each ground-truth object in an end-to-end learning manner [3]. The duplicate candidates, which are close to the ground-truth object, are illustrated in Figure 1. The role of candidate generation is mainly taken by decoder crossattention. The role of candidate de-duplication is mainly taken by decoder self-attention together with one-to-one supervision, ensuring the selection of a single candidate for each ground-truth object. Unlike NMS-based methods (e.g., Faster R-CNN [32]) which usually introduce a supervision for candidate generation, the DETR training procedure lacks explicit supervision for generating multiple object detection candidates." 2401.03999v1,"Polynomial Precision Dependence Solutions to Alignment Research Center Matrix Completion Problems Rico Angell ∗ January 9, 2024 We present solutions to the matrix completion problems proposed by the Alignment Research Center 1 that have a polynomial dependence on the precision ε. The motivation for these problems is to enable efficient computation of heuristic estimators to formally evaluate and reason about different quantities of deep neural networks in the interest of AI alignment [3]. Our solutions involve reframing the matrix completion problems as a semidefinite program (SDP) and using recent advances in spectral bundle methods for fast, efficient, and scalable SDP solving. The two matrix completion problems are restated as follows: Question 1 (existence of positive semidefinite completions): Given m entries of a symmetric matrix M ∈ S n , including the diagonal, can we tell in time Õ(nm) whether it has any (real, symmetric) positive semidefinite completion? Proving that this task is at least as hard as dense matrix multiplication or positive semidefinite testing would count as a resolution. Question 2 (fast “approximate squaring”): Given A ∈ R n×n and a set of m = Ω(n) entries of AA T =: M ∈ S n , can I find some positive semidefinte matrix that agrees with M in those m entries in Õ(nm) time? Instead of achieving a logarithmic dependence in the precision ε (suppressed by Õ(·) in the original questions) 2 , we present a solution to Question 1 in Õ(min{nm/ε, m/ε 3/2 }) time and solutions √ to Question 2 in Õ(n 2 /ε 2 + min{nm/ε 2 , m/ε 5/2 }) and Õ(n m/ε 2 + min{nm/ε 2 , m/ε 5/2 }) time, depending on whether matrix sketching is used or not. The core idea is to formulate both questions as semidefinite programs (SDP) and use a spectral bundle method [1, 5, 9–11] to implicitly solve the SDP or obtain a certificate of infeasibility. In the case where the SDP is infeasible, our method computes an upper bound quantifying the degree to which the SDP is infeasible. Additionally, it is important to note that our solution to Question 2 will always yield a positive semidefinite matrix and the precision parameter controls the agreement between the approximate solution matrix and the provided entries of M . 1 Semidefinite programming formulation We begin with the notation necessary to define the semidefinite programming problem. Let S n + := {X ∈ S n : X  0} be the positive semidefinite cone. Let h·, ·i denote the standard inner product for vectors and the Frobenius inner product for matrices. Let E ij ∈ R n×n be the matrix with a 1 in the ij th position and zeros elsewhere. For any matrix M ∈ S n , let λ max (M ) denote the maximum Manning College of Information and Computer Sciences, University of Massachusetts Amherst, Amherst, MA, USA. Correspondence to Rico Angell (rangell@cs.umass.edu). 1 https://www.alignment.org/blog/prize-for-matrix-completion-problems/ 2 It was suggested in a later blog post (https://www.alignment.org/blog/matrix-completion-prize-results/) by the Alignment Research Center that it is unlikely to be able to solve these problems without either at least Ω(n 3 ) time or a polynomial dependence on ε. Our results somewhat support this statement as will be seen. ∗ 1" 2401.04003v2,"Simultaneous Task Allocation and Planning for Multi-Robots under Hierarchical Temporal Logic Specifications Xusheng Luo 1 and Changliu Liu 1 Abstract—Past research into robotic planning with temporal logic specifications, notably Linear Temporal Logic (LTL), was largely based on singular formulas for individual or groups of robots. But with increasing task complexity, LTL formulas unavoidably grow lengthy, complicating interpretation and specification generation, and straining the computational capacities of the planners. By leveraging the intrinsic structure of tasks, we introduced a hierarchical structure to LTL specifications with requirements on syntax and semantics, and proved that they are more expressive than their flat counterparts. Second, we employ a search-based approach to synthesize plans for a multi-robot system, accomplishing simultaneous task allocation and planning. The search space is approximated by loosely interconnected sub-spaces, with each sub-space corresponding to one LTL specification. The search is predominantly confined to a single sub-space, transitioning to another sub-space under certain conditions, determined by the decomposition of automatons. Moreover, multiple heuristics are formulated to expedite the search significantly. A theoretical analysis concerning completeness and optimality is conducted under mild assumptions. When compared with existing methods on service tasks, our method outperforms in terms of execution times with comparable solution quality. Finally, scalability is evaluated by testing a group of 30 robots and achieving reasonable runtimes. Index Terms—Formal Methods in Robotics and Automation; Planning, Scheduling and Coordination; Path Planning for Multiple Mobile Robots or Agents; Multi-Robot Systems I. I NTRODUCTION In the field of multi-robot systems, two primary challenges are consistently at the forefront of research interest: (1) task allocation [1], determining which robot should perform which task, and (2) planning [2], the strategy for executing these assigned tasks. Traditionally, these problems have been tackled separately by researchers from various fields. To simplify these complex issues, certain assumptions or simplifications are often employed, such as the assumption of effective lowlevel controllers for task allocation or the use of pre-defined tasks in motion planning. These approaches, however, address only portions of the whole problem. Over the past two decades, numerous methods have emerged that address these issues by combining task allocation and motion planning. Our work aligns with this integrative approach, but distinguishes itself by focusing on tasks defined by temporal logic specifications. Formal methods, characterized by their mathematical rigor, are essential for specifying, developing, analyzing, and verifying software and hardware systems [3]. The recent trend of utilizing formal specifications, such as Linear Temporal Logic (LTL) [4] and Signal Temporal Logic (STL) [5], as high-level task specifications for multi-robots has garnered significant attention. This is because temporal logic specifications can encapsulate not just conventional point-to-point Boolean goals but also complex temporal requirements. While offering an expressive framework for task descriptions, temporal logic specifications also introduce computational challenges for solvers due to their complexity. Take LTL for an example, which is also the formal language we focus on in this work. A typical method for tackling these specifications involves translating the formula into an automaton, a graphic representation. As demonstrated in [6], converting a specification into an automaton that involves the tasks of collecting 5 keys and subsequently opening of 5 doors took about half an hour. A similar problem was observed in our simulations, where an automaton could not be generated within an hour. This issue stems from the usage of the “flat” form of LTL, that is, putting all requirements on the behavior of robots into a single LTL formula. These flat formulas tend to become cumbersome and difficult to interpret for complex tasks. However, one key observation is that in robotics, tasks often have a loose connection and can be broken down into smaller components. Studies also suggest that humans prefer hierarchical task specification, which improves interpretability of planning and execution, making it easier to identify ongoing work and conveniently adjust unfeasible parts without affecting other components [7, 8]. Inspired by this, we propose a hierarchical form of LTL specifications for task specification, along with a planning algorithm. Consider a mobile manipulation task where multiple robots are tasked with picking and placing three items a, b and c in any order. The “flat” specifications is ϕ = ♢(a 1 ∧ ♢a 2 ) ∧ ♢(b 1 ∧ ♢b 2 ) ∧ ♢(c 1 ∧ ♢c 2 ), where sub-formula ♢(x 1 ∧ ♢x 2 ) denotes the event of first picking item x somewhere and then placing it somewhere else. Note that this formula does not explicitly state which robot should pick and place which item. Nevertheless, this formula is less interpretable by users by arranging all subformulas side by side. Furthermore, its corresponding automaton, specifically, Nondeterministic Büchi Automaton (NBA), has 27 states and 216 transitions, which is unexpectedly large for a task of this complexity. We propose to take advantage of the task’s inherent hierarchical structure, that is, manipulating each item in any order. A two-level hierarchical form is L 1 : ϕ = ♢ϕ 1 ∧ ♢ϕ 2 ∧ ♢ϕ 3 L 2 : ϕ 1 = ♢(a 1 ∧ ♢a 2 ) ϕ 2 = ♢(b 1 ∧ ♢b 2 ) 1 Xusheng Luo and Changliu Liu are with Robotics Institute, Carnegie ϕ 3 = ♢(c 1 ∧ ♢c 2 ), Mellon University, Pittsburgh, PA 15213, USA (e-mail: {xushengl, cliu6}@andrew.cmu.edu ) which has 4 specifications, one per row, and their automatons" 2401.04007v1,"Task-Oriented Active Learning of Model Preconditions for Inaccurate Dynamics Models Alex LaGrassa 1 , Moonyoung Lee 1 , Oliver Kroemer 1 Abstract— When planning with an inaccurate dynamics model, a practical strategy is to restrict planning to regions of state-action space where the model is accurate: also known as a model precondition. Empirical real-world trajectory data is valuable for defining data-driven model preconditions regardless of the model form (analytical, simulator, learned, etc...). However, real-world data is often expensive and dangerous to collect. In order to achieve data efficiency, this paper presents an algorithm for actively selecting trajectories to learn a model precondition for an inaccurate pre-specified dynamics model. Our proposed techniques address challenges arising from the sequential nature of trajectories, and potential benefit of prioritizing task-relevant data. The experimental analysis shows how algorithmic properties affect performance in three planning scenarios: icy gridworld, simulated plant watering, and realworld plant watering. Results demonstrate an improvement of approximately 80% after only four real-world trajectories when using our proposed techniques. More material can be found on our project website: https://sites.google.com/view/active-mde. I. I NTRODUCTION Many planning and control frameworks used in robotics rely on dynamics models, whether analytical or learned, to reason about how the robot’s actions affect the state of the environment [1], [2]. However, robots deployed in the real world frequently encounter unstructured environments and complex interactions, e.g., with deformable objects, where assumptions of simplified dynamics break, making the models deviate from reality. In such situations, previous works [3]–[6] show how predicting model deviation with a Model Deviation Estimator (MDE) can be a powerful tool to restrict model-based planners to planning in regions of stateaction space where the model is reliable, which we call model preconditions. Although using model preconditions defined by MDEs can improve the reliability of plans computed with inaccurate models, training MDEs requires real-world data, which can be expensive or dangerous, e.g., robot welding or pouring water, and drastically increase the cost of exploration during training. We illustrate the intuition of our problem setting and approach in Fig. 1. Given a dynamics model that is accurate in only some combinations of states and actions, the objective is to estimate model deviation in state-action space to define the model precondition. During each iteration, the robot collects data and updates its model precondition based on that data, which is a form of active learning. Although we can draw from existing active learning techniques in other robotics applications [7], collecting a useful MDE dataset A, LaGrassa, M. Lee, O. Kroemer are with Carnegie Mellon University Robotics Institute, Pittsburgh PA, USA {alagrass, moonyoul, okroemer,@andrew.cmu.edu Fig. 1: Illustrative example of using a planner and acquisition function to iteratively select informative trajectories to define where the model is accurate to compute plans to the goal. In this example, the known dynamics model on the upper left ( f ˆ (s, a, s ′ )) reasons only about the containers but not about the plant. The problem is to define where the model is accurate enough to compute plans to the goal. The resulting learned model precondition is then used at test time to only perform actions in the model precondition. is challenging because it needs to contain a diverse set of trajectories to both identify the limits of the model and reliably solve planning problems. Furthermore, model error in earlier states of a selected trajectory can lead the robot to be unable to gather data from the later states due to the sequential nature of the problem. To address these problems, we describe active learning techniques for efficiently selecting trajectories to train the MDE. We propose a task-oriented approach for generating trajectory candidates, as well as multi-step acquisition functions for selecting the trajectory and methods to compute a single utility value from the sequence of transitions in a trajectory. Our approach enables sample-efficient learning of an MDE for solving tasks from a given distribution. We analyze how variations on the active learning algorithm affect the dataset, and subsequently the quality of the model preconditions when executing plans at test time. This paper makes the following contributions: (1) a novel problem formulation and approach for active learning of" 2401.04025v1,"IDoFew: Intermediate Training Using Dual-Clustering in Language Models for Few Labels Text Classification Abdullah Alsuhaibani 1,5 , Hamad Zogan 1,2 , Imran Razzak 3 , Shoaib Jameel 4 , Guandong Xu 1 1 University of Technology Sydney, Australia 2 College of Computer Science and Information Technology, Saudi Arabia 3 University of New South Wales, Australia 4 University of Southampton, United Kingdom 5 Islamic University of Madinah, Saudi Arabia abdullah.alsuhaibani@student.uts.edu.au,hamad.a.zogan@student.uts.edu.au,imran.razzak@unsw.edu.au M.S.Jameel@southampton.ac.uk,guandong.xu@uts.edu.au ABSTRACT 1 Language models such as Bidirectional Encoder Representations from Transformers (BERT) have been very effective in various Natural Language Processing (NLP) and text mining tasks including text classification. However, some tasks still pose challenges for these models, that include text classification with limited labels. This can result in a cold-start problem. Although some approaches have attempted to address this problem through single-stage clustering as an intermediate training step coupled with a pre-trained language model, which generates pseudo-labels to improve classification, these methods are often error-prone due to the limitations of the clustering algorithms. To overcome this, we have developed a novel two-stage intermediate clustering with subsequent fine-tuning that models the pseudo-labels reliably, resulting in reduced prediction errors. The key novelty in our model, IDoFew, is that the two-stage clustering coupled with two different clustering algorithms helps exploit the advantages of the complementary algorithms that reduce the errors in generating reliable pseudo-labels for fine-tuning. Our approach has shown significant improvements compared to strong comparative models. Collecting a large amount of data with annotations is a challenging task. The motivation is that if we have more data we can reliably train the machine learning model parameters so that it could perform as expected in some downstream applications. The problem is even more critical in applications where the performance that the automated system must give should remain faithful, e.g., medical applications. While this is an ideal setting, it is often difficult and not very cheap to obtain annotated instances to train a machine learning model. Over the number of years, researchers have developed techniques to address the limitations, e.g., few-shot learning, unsupervised learning and others, and in recent years, there has been a surge in developing techniques based on the self-supervised learning paradigm. By exploiting the self-supervised approaches, researchers developed a number of pre-trained language models (PTMs) that are usually first trained in a domain-independent dataset and later finetuned in some domain-specific target tasks [10]. In the fine-tuning stage, we usually rely upon high-quality annotated data to reliably fine-tune the language model. However, the fine-tuned model still generalizes poorly to out-of-distribution input data created with few and harmless perturbations [30]. There is another line of research called few-shot text classification. Few labels and few-shot learning paradigms lie under the umbrella of machine learning, however, there are some key differences. In few-shot learning, the task of learning is to classify new data when we only have a few labelled samples per class. We might want to learn to classify a cat with only a few images of a cat. Few-label learning refers to the task of learning to classify new data when we have a few labels overall. For example, we might be able to learn to classify different types of diseases with only a few hundred labelled medical documents. The key difference thus is that few-shot learning is about learning from small datasets with many classes, while few-labels learning is about learning from small datasets with few classes. In problems where there are only a few labels in a limited number of classes, language models may not perform optimally. To address this issue, researchers have previously developed intermediate training using unsupervised learning methods. For example, in a recent study [36], a new type of intermediate task was developed that aligns naturally with text classification. This technique exploits text clustering for inter-training the language model and generates pseudo-labels, also known as weak labels. The clustering CCS CONCEPTS • Data mining → Few Labelling. KEYWORDS Text Classification, cluster, pre-trained model ACM Reference Format: Abdullah Alsuhaibani 1,5 , Hamad Zogan 1,2 , Imran Razzak 3 , Shoaib Jameel 4 , Guandong Xu 1 . 2024. IDoFew: Intermediate Training Using Dual-Clustering in Language Models for Few Labels Text Classification. In Proceedings of the 17th ACM International Conference on Web Search and Data Mining (WSDM ’24), March 4–8, 2024, Merida, Mexico. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/3616855.3635849 Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. WSDM ’24, March 4–8, 2024, Merida, Mexico. © 2024 Association for Computing Machinery. ACM ISBN 979-8-4007-0371-3/24/03. https://doi.org/10.1145/3616855.3635849 INTRODUCTION" 2401.04043v1,"Self-organization of active colloids mediated by chemical interactions Zhiwei Peng ∗ and Raymond Kapral † Chemical Physics Theory Group, Department of Chemistry, University of Toronto, Toronto, ON, M5S 3H6, Canada (Dated: January 9, 2024) Self-propelled colloidal particles exhibit rich non-equilibrium phenomena and have promising applications in fields such as drug delivery and self-assembled active materials. Previous experimental and theoretical studies have shown that chemically active colloids that consume or produce a chemical can self-organize into clusters with diverse characteristics depending on the effective phoretic interactions. In this paper, we investigate self-organization in systems with multiple chemical species that undergo a network of reactions and multiple colloidal species that participate in different reactions. Active colloids propelled by complex chemical reactions with potentially nonlinear kinetics can be realized using enzymatic reactions that occur on the surface of enzyme-coated particles. To demonstrate how the self-organizing behavior depends on the chemical reactions active colloids catalyze and their chemical environment, we consider first a single type of colloid undergoing a simple catalytic reaction, and compare this often-studied case with self-organization in binary mixtures of colloids with sequential reactions, and binary mixtures with nonlinear autocatalytic reactions. Our results show that in general active colloids at low particle densities can form localized clusters in the presence of bulk chemical reactions and phoretic attractions. The characteristics of the clusters, however, depend on the reaction kinetics in the bulk and on the particles and phoretic coefficients. With one or two chemical species that only undergo surface reactions, the space for possible selforganizations are limited. By considering the additional system parameters that enter the chemical reaction network involving reactions on the colloids and in the fluid, the design space of colloidal self-organization can be enlarged, leading to a variety of non-equilibrium structures. I. INTRODUCTION Self-organizing dynamics is often observed in active matter systems across a wide range of length scales. Examples of self-organization in active matter include aster formation of molecular motors and microtubules [1–4], swarming of bacteria [5–7], motility-induced phase separation of self-propelled colloids [8–15], and flocking behavior in birds and fish [16–19]. Through internal interactions, the constitutive agents or particles of these systems are able to produce emergent patterns, structures, or order. Among such interactions, chemical interaction is often employed by both biological and synthetic active particles. Motile microorganisms and cells can perform chemotaxis in response to chemical concentration gradients [20–22]. In addition to responding to a concentration gradient imposed in the environment, they may also produce or consume the same chemical species, thus modifying the chemical concentration in the environment. Synthetic diffusiophoretic colloids can move and reorient in response to chemical gradients, mimicking the chemotactic behavior of microorganisms. Due to their ability to self-organize into dynamic structures, active colloids are useful building blocks for selfassembled materials [23]. Previous experimental and theoretical studies have shown that phoretic active colloids can form clusters even at low particle densities [24–32]. ∗ Present Address: Department of Chemical and Materials Engineering, University of Alberta, Edmonton, AB, T6G 1H9, Canada. Email: zhiwei.peng@ualberta.ca † r.kapral@utoronto.ca Consider a self-diffusiophoretic particle that consumes a chemical in a reaction on its surface and, in the process, creates a nonuniform chemical concentration field. The chemical concentration gradients enable diffusiophoresis in which particles may effectively attract or repel each other depending on the details of the chemical interaction. If the particles experience a diffusiophoretic force towards regions of lower concentration, they tend to attract each other since they are consuming the chemical and act as chemical sinks. Examples of the complex nonequilibrium dynamics systems of this type exhibit, that include cluster and aster formation, as well as plasmalike oscillations in response to perturbations, are given in Saha et al. [33] who considered the chemotactic response self-diffusiophoretic colloids to two chemical species S and P in the reaction S → P . Chemotactic aggregation or collapse has been observed in biological active matter [34–37]. When the translational and rotational phoretic motion give competing attractive and repulsive interactions, dynamic clustering states can be observed. Other variants of this model focusing on rotational phoretic interaction also give rise to pattern formation and clustering [38, 39]; in this case, the active particles tend to align with or against the gradient of the chemical field in addition to their self-propulsion. Continuum theories have been developed that produce clustering and pattern formation dynamics similar to the particle-based models [27, 33, 38–40]. So far we have outlined the dynamics of a single type of colloid interacting via a single chemical species. That is, all colloids in the system respond to the chemical field and produce or consume the chemical in the same fashion. A natural extension of these previous studies is to" 2401.04052v1,"This article has been accepted for publication in IEEE Transactions on Visualization and Computer Graphics. This is the author's version which has not been fully edited and content may change prior to final publication. Citation information: DOI 10.1109/TVCG.2023.3338451 The Role of Text in Visualizations: How Annotations Shape Perceptions of Bias and Influence Predictions Chase Stokes, Cindy Xiong Bearfield, and Marti A. Hearst 70 40 60 30 20 10 20 0 70 40 30 Year 3 50 Blue Green Blue Year 1 Green Green Blue Year 2 Blue Green 40 20 Green 10 Year 4 0 Year 4 Blue Blue Year 2 Blue Blue Green Green Green Blue Green Blue Year 3 Year 4 Year 1 Election Voting Year Results 2 Student Government 40 30 Green Year 4 How likely is the outcome? 40 Year 4 20 10 Green party students increasingly involved in 0 Green clubs on campus Blue Green 50 Blue 40 Year 1 Blue Year 2 Green Blue Year 3 Green Predictions: Year 4 Blue Green Blue Year 2 Green Blue Year 3 Percentage Market Share Blue Green Blue Year 1 Green Green Blue Year 2 Green Blue Year 3 60 50 Blue steady at 50 % for 7 months Green Blue Holds a Higher Share Percent C ontinuously To what extent do you believe that the chart is designed in a way that is biased against one group or another? Event D ay Strongly biased against Blue 60 50 Green Greater on Sept 1st than F eb 11th 40 70 30 20 70 10 0 eb 11th Mar 15th F pr 14th May 14th Percentage Market Share 0 A Event D ay Neutral Strongly biased against Green 60 50 Market Share of Two Technology C ompanies 10 20 Mar 15th Green Likely Wins Year 4 Event D ay eb 11th Green Might Win Year 4 70 Market Share of Two Technology C ompanies F Tie 20 0 Green 70 30 Blue Might Win 10 Blue Year 1 40 Blue Likely Wins 30 20 0 un 13th J 60 ul 13th J ug 12th Sept 10th A pr 14th A May 14th un 13th ul 13th J J ct 11th O 40 30 ug 12th A 0 40 eb 11th F 60 50 30 Event D ay 20 10 Green C ompany is sure to win . ct 11th O To what extent do you believe that the chart is designed in a way that is biased toward one group or another? May 14th un 13th ul 13th ug 12th C ompanies Sept 10th ct 11th Market pr 14th Share of Two Technology Mar 15th A J J A O 70 0 eb 11th Mar 15th F pr 14th May 14th A un 13th ul 13th J ug 12th J A 20 Percentage Market Share 70 Event D ay Sept 10th 20 10 50 Market Share of Two Technology C ompanies 30 Blue It will be interesting to see results for Year 4 50 60 Green always falls short , but is slowly rising 50 10 40 Green Blue Green 30 Election Voting Results Student Government 70 Percentage Votes Percentage Votes Green Year 3 70 60 Percentage Market Share Percentage Votes Year 1 Green Blue Year 3 Student Government Election Voting Results 60 0 Blue Green 70 20 10 Green Blue Year 2 30 10 Blue Green Year 1 40 20 0 Green 30 Blue Year 3 Percentage Market Share Percentage Votes Year 2 Votes for Blue greater than Green in Years 1 , 2 , and 3 Percentage Votes Year 1 70 Percentage Market Share Blue 50 Student Government Election Voting Results 30 10 50 Percentage Votes Percentage Votes Percentage Votes 40 50 0 Student Government Results Blue Green Election 60 Blue Voting Green Blue Green 60 Year A fter Year , Votes for Green Have Increased 60 Blue will continue to win ! 50 Which [party/company] do you think will win? Year A fter Year , Blue Has Received More Votes Student Government Election Voting Results 70 70 60 Event D ay Strongly biased toward Blue 60 50 40 Market share of two technology companies 30 20 10th Sept Neutral Strongly biased toward Green ct 11th O 10 Market Share of Two Technology C ompanies 10 0 70 Market Share of Two Technology C ompanies eb 11th Mar 15th pr 14th A May 14th J un 13th ul 13th ug 12th J Percentage Market Share F A 70 Sept 10th ct 11th Percentage Market Share 0 O Event D ay 60 50 40 The gap between the two companies is growing small 30 eb 11th Mar 15th F pr 14th May 14th A un 13th J ul 13th J Event ay A ug D 12th Sept 10th ct 11th O 60 Appraisals: 50 40 Blue offers most advanced products and technology 30 20 10 20 0 10 eb 11th F Mar 15th A pr 14th May 14th un 13th J ul 13th J ug 12th A Sept 10th ct 11th O 0 eb 11th F Mar 15th pr 14th A May 14th un 13th J ul 13th J ug 12th A Sept 10th Where would you place the personal view of the individual who created this chart? Strongly biased toward Blue Neutral Strongly biased toward Green ct 11th O Fig. 1. (Left) Study stimuli consisted of line and bar charts that were derived from prior work and designed to have ambiguous prediction outcomes. The experiments varied the text position and text content for these charts; examples of these stimuli from both studies are shown behind the baseline charts. (Right) Two tasks were studied with crowdsourced participants: prediction of the outcome of the trend, and assessment of the bias of the visualization author using the assessment questions shown. Abstract— This paper investigates the role of text in visualizations, specifically the impact of text position, semantic content, and biased wording. Two empirical studies were conducted based on two tasks (predicting data trends and appraising bias) using two visualization types (bar and line charts). While the addition of text had a minimal effect on how people perceive data trends, there was a significant impact on how biased they perceive the authors to be. This finding revealed a relationship between the degree of bias in textual information and the perception of the authors’ bias. Exploratory analyses support an interaction between a person’s prediction and the degree of bias they perceived. This paper also develops a crowdsourced method for creating chart annotations that range from neutral to highly biased. This research highlights the need for designers to mitigate potential polarization of readers’ opinions based on how authors’ ideas are expressed. Index Terms—Visualization, text, annotation, perceived bias, judgment, prediction 1 I NTRODUCTION Visualizations leverage the power of our visual system to enhance data communication; however, designing a visualization involves more than selection the best visual representation. Textual information, such as titles, annotations, and captions, often accompanies visualizations. Past work has shown that design choices for textual information, such as its content and position, can interact with the visual elements to influence what readers take away from the visualization [8, 20, 24, 25, 39]. However, much remains under-explored about the role of text • Chase Stokes is with the University of California Berkeley. E-mail: cstokes@ischool.berkeley.edu. • Cindy Xiong Bearfield is with the Georgia Institute of Technology. • Marti A. Hearst is with the University of California Berkeley. Manuscript received xx xxx. 202x; accepted xx xxx. 202x. Date of Publication xx xxx. 202x; date of current version 08 Jan 2023. For information on obtaining reprints of this article, please send e-mail to: reprints@ieee.org. Digital Object Identifier: 10.1109/TVCG.2023.3338451 © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. in visualizations, leaving open a question for designers about how to convey information clearly and honestly via textual choices. Research comparing the effects of text annotations in varying contexts is needed to shed light on these choices. Prior work has investigated the impact of design choices by text position (such as title, caption, or data annotation) [39], semantic level (from describing the axes to including real-world context) [28], and biased or mis-aligned text [24, 25]. In this work, we conducted two pre-registered empirical studies that varied text along each of these dimensions to further investigate the role of text in reader interpretations and impressions. The studies examined the influence of text on reader interpretation of visualized data for two primary tasks: participants’ predictions about trends in the data and participants’ appraisals of the bias of the author of the visualization. Both tasks are associated with higher-level synthesis and evaluation of information [9], which are critical to data interpretation but often understudied. We use a visualization depicting a competition between two groups (Blue and Green) designed to be inherently ambiguous in terms of outcomes, as shown in Figure 1. For the prediction task, we were most interested in how participants’ predictions varied if the text referred to © 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information." 2401.04055v1,"Sparse Meets Dense: A Hybrid Approach to Enhance Scientific Document Retrieval Priyanka Mandikal, Raymond Mooney The University of Texas at Austin, USA Abstract Traditional information retrieval is based on sparse bag-of-words vector representations of documents and queries. More recent deep-learning approaches have used dense embeddings learned using a transformerbased large language model. We show that on a classic benchmark on scientific document retrieval in the medical domain of cystic fibrosis, that both of these models perform roughly equivalently. Notably, dense vectors from the state-of-the-art SPECTER2 model do not significantly enhance performance. However, a hybrid model that we propose combining these methods yields significantly better results, underscoring the merits of integrating classical and contemporary deep learning techniques in information retrieval in the domain of specialized scientific documents. Keywords scientific document retrieval, information retrieval, hybrid methods 1. Introduction The field of information retrieval (IR) has undergone significant transformations over the years, evolving from traditional methods based on sparse vector representations to more advanced techniques utilizing deep learning models. Historically, the vector-space model in IR, as described by Manning et al. [1], has been predominant. This model represents documents and queries using sparse, Term-Frequency/Inverse-Document-Frequency (TF/IDF) weighted bag-of-words (BOW) vectors, a method known for its simplicity and effectiveness in various text retrieval applications. With the advent of deep learning, there has been a paradigm shift towards utilizing dense embeddings, especially those derived from transformer-based large language models (LLMs). These methods, exemplified by Dense Passage Retrieval (DPR) [2], offer a more nuanced and context-aware approach to text representation, often resulting in improved retrieval performance compared to traditional sparse-vector methods. In the specialized field of scientific document retrieval, dense-vector approaches have gained prominence. One notable example is the SPECTER model [3], which uses a BERT-based framework for embedding scientific texts. It employs contrastive learning, leveraging citation information for supervision, to identify document similarities effectively. On a variety of tasks including document classification, citation prediction, and recommendation, SPECTER has been shown to The 4th Workshop on Scientific Document Understanding, February 26, 2024, Vancouver, BC, Canada $ mandikal@utexas.edu (P. Mandikal); mooney@utexas.edu (R. Mooney) € https://priyankamandikal.github.io/ (P. Mandikal); https://www.cs.utexas.edu/~mooney/ (R. Mooney) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org)" 2401.04086v1,"A Priori Determination of the Pretest Probability Jacques Balayla MD, MPH ∗ Abstract. In this manuscript, we present various proposed methods estimate the prevalence of disease, a critical factor in the interpretation of screening tests. To address the limitations of these approaches, which revolve primarily around their a posteriori nature, we introduce a novel method to estimate the pretest probability of disease, a priori, utilizing the Logit function from the logistic regression model. This approach is a modification of McGee’s heuristic, originally designed for estimating the posttest probability of disease. In a patient presenting with n θ signs or symptoms, the minimal bound of the pretest probability, φ, can be approximated by: φ ≈ 5 1 ln "" i Y θ=1 κ θ # where ln is the natural logarithm, and κ θ is the likelihood ratio associated with the sign or symptom in question. ∗ To whom correspondence should be addressed: Dr. Jacques Balayla MD, MPH, CIP, FRCSC. Obstetrician-Gynecologist. Quilligan Scholar. e-mail: jacques.balayla@mcgill.ca. Lady Davis Institute (LDI), Jewish General Hospital, McGill University, Montreal, Quebec, Canada 1" 2401.04109v1,"Recent developments of selective laser processes for wearable devices By Youngchan Kim†, Eunseung Hwang†, Chang Kai, Kaichen Xu, Heng Pan*, Sukjoon Hong* Y. Kim, E. Hwang, Prof. S. Hong Optical Nanoprocessing Lab., Department of Mechanical Engineering, BK21 FOUR ERICA-ACE Center, Hanyang University, 55 Hanyangdaehak-ro, Sangnok-gu, Ansan, 15588 Korea C. Kai, Prof. H. Pan Multiscale Manufacturing Lab., J. Mike Walker '66 Department of Mechanical Engineering Texas A&M University, College Station, TX 77843, USA Prof. K. Xu State Key Laboratory of Fluid Power and Mechatronic Systems, School of Mechanical Engineering Zhejiang University, Hangzhou 310027, China [*] To whom correspondence should be addressed. E-mail: sukjoonhong@hanyang.ac.kr, hpan@tamu.edu [†] Youngchan Kim and Eunseung Hwang contributed equally to this work. Keywords: Selective laser process, wearable device, transformative approach, laser-induced graphene, ablation, sintering, synthesis Abstract Recently, the growing interest in wearable technology for personal healthcare and smart VR/AR applications newly imposed a need for development of facile fabrication method. Regarding the issue, laser has long been proposing original answers to such challenging technological demands with its remote, sterile, rapid, and site- selective processing characteristics for arbitrary materials. In this review, recent developments in relevant laser processes are summarized in two separate categories. Firstly, transformative approaches represented by laser- induced graphene (LIG) are introduced. Apart from design optimization and alteration of native substrate, latest advancements in the transformative approach now enable not only more complex material compositions but also multilayer device configurations by simultaneous transformation of heterogeneous precursor or sequential addition of functional layers coupled with other electronic elements. Besides, more conventional laser techniques such as ablation, sintering and synthesis are still accessible for enhancing the functionality of the entire system through expansion of applicable materials and adoption of new mechanisms. Various wearable device components developed through the corresponding laser processes are then organized with emphasis on chemical/physical sensors and energy devices. At the same time, special attention is given to the applications utilizing multiple laser sources or multiple laser processes, which pave the way towards all-laser fabrication of wearable devices." 2401.04114v1,"Timeline-based Process Discovery Harleen Kaur, Jan Mendling, Christoffer Rubensson Timotheus Kampik Humboldt-Universität zu Berlin Berlin, Germany {kaurharl,jan.mendling,christoffer.rubensson}@hu-berlin.de SAP Signavio Berlin, Germany timotheus.kampik@sap.com Abstract—A key concern of automatic process discovery is to provide insights into performance aspects of business processes. Waiting times are of particular importance in this context. For that reason, it is surprising that current techniques for automatic process discovery generate directly-follows graphs and comparable process models, but often miss the opportunity to explicitly represent the time axis. In this paper, we present an approach for automatically constructing process models that explicitly align with a time axis. We exemplify our approach for directly-follows graphs. Our evaluation using two BPIC datasets and a proprietary dataset highlight the benefits of this representation in comparison to standard layout techniques. Index Terms—Process Mining, Automatic Process Discovery, Visual Analytics, Timelines, Directly-Follows Graphs I. I NTRODUCTION Process mining techniques serve the purpose of providing insights into process performance, which can help organizations to reduce bottlenecks, waiting times, and operational costs. To this end, process mining research has developed a plethora of algorithms for automatic process discovery [1]. Many of these algorithms have been designed with the ambition to improve the accuracy of the generated models in terms of metrics like precision and recall [2]. A recent survey identifies 344 papers that are directly concerned with the development of new discovery algorithms and their refinement [3]. These algorithms generate process models using various formalisms, including Petri nets, Declare rules, Process trees, BPMN, and Directly-follows graphs (DFGs) [3]. A key concern of process performance analysis is the understanding of why and to which extent waiting times occur during the execution of the process. Waiting represents a source of waste and is connected with operational bottlenecks, high inventory costs, and low customer satisfaction [4, p.222]. Against this backdrop, it is remarkable that process mining algorithms by and large focus on the temporal order of events, but almost entirely abstract from the actual time axis [5]. Some exceptions are techniques for color highlighting of long durations [4, p.222], performance spectra [6] inspired by Marey charts [7, p.260], or dotted charts [8] that plot event sequences aligned to a time axis. The latter belong to timeline-based analysis techniques such as Gantt charts [9] and early process charts [10] that have been used for process analysis already in the 1920s. Up until now, there are no The research by Jan Mendling was supported by the Einstein Foundation Berlin under grant EPP-2019-524 and by the German Federal Ministry of Education and Research under grant 16DII133. techniques that integrate the strengths of timeline-based charts with process models automatically constructed by process mining algorithms. This paper presents an approach for automatically constructing process models that explicitly align with a time axis. We address this research challenge at the level of graph layout and position activities according to their relative temporal distance to the start of the process. We exemplify this idea for directlyfollows graphs, though it can be equally adopted for process mining algorithms that construct other types of graphs like Petri nets or BPMN. We demonstrate the effectiveness of our approach based on a comparison of standard layout with our timeline-based layout. The remainder of the paper is structured as follows. Section II summarizes prior research on timelines in visual analytics. Section III presents the concepts of our approach to layout graphs using a timeline. Section IV evaluates the effectiveness of our approach and discusses its implications. Section V concludes with a summary and outlook on future research. II. B ACKGROUND In this section, we discuss prior research on the analysis of event sequence data that explicitly considers a time axis. First, we discuss broadly timeline-based techniques from visual analytics. Then, we highlight the few contributions from process mining research that integrate a time axis. A. Timelines in Visual Analytics Timeline-based visualizations are techniques developed in the area of visual analytics that order event sequence data along a time-axis [11]. Commonly, events represent visual elements on a canvas, such as glyphs in different colors, shapes, and sizes [11, p. 4]. The timeline represents but is not restricted to a horizontal axis with time indicated as discrete time points (e.g., specific dates) or reference time units (e.g., weeks, days, hours). Recent surveys developed a taxonomy for the classifications of event sequence data visualizations [5], [11]. Regarding timeline-based visualization techniques, the authors define five categories: fixed, duration, convergingdiverging, evolution, and combinations of these techniques. Fixed timeline-based visualization techniques [5] arrange events chronologically, with each event attached to a specific point in time on the timeline. Mostly, the events are depicted as glyphs in circular [12], [13], triangular [14], [15], or" 2401.04117v1,"Type of the Paper : Original Research A Holistic Approach on Smart Garment for Patients with Juvenile Idiopathic Arthritis Safal Choudhary 1 , Princy Randhawa 2 , Sampath Kumar J.P 3 *, Shiva Prasad H.C 4, * 1. 2. 3. 4. Department of Fashion Design, Manipal University Jaipur, Jaipur , Rajasthan 303007; India safal220651001@muj.manipal.edu Department of Mechatronics Engineering, Manipal University Jaipur, Jaipur, Rajasthan 303007; India princy.randhawa@jaipur.manipal.edu Department of Fashion Design, SoDA, FoD, Manipal University Jaipur, Jaipur , Rajasthan 303007; India sampath.kumar@jaipur.manipal.edu Department of Mechanical Engineering, SAMM, Faculty of engineering, Manipal University Jaipur, Jaipur, Rajasthan 303007; India shiva.prasad@jaipur.manipal.edu *Correspondence: shiva.prasad@jaipur.manipal.edu; sampath.kumar@jaipur.manipal.edu Abstract: Globally, arthritis is a prevalent chronic condition affecting numerous individual. The juvenile idiopathic arthritis (JIA) is characterized by joint inflammation leading to pain, swelling, stiffness, and limiting the movements and is the dominant type of arthritis found in children and adolescents. Individuals suffering from JIA requires an ongoing treatment for their lifetime. Beyond inflammation's, the JIA patients expressed their concerns about various factors and the lack of responsive services addressing their challenges. One of featured design is wearble garments that helps them to do daily activites. To address this issues, the research aims to design a smart garment with holistic approach. By providing smart wearble garment, and helps to improve well-being, coping abilities, independence, and overall quality of life for patients. The results shows with juvenile idiopathic arthritis. Keywords: Juvenile idiopathic arthritis, patients, smart garments, holistic 1. Introduction In the medical landscape, Juvenile Idiopathic Arthritis (JIA) stands as the prevalent chronic rheumatic disease in children and a significant contributor to both short-term and long-term disability (Ludovico Di et al. 2023) [1]. JIA is a chronic rheumatic disease of unknown origin, with a higher occurrence among young female patients (Barut K, Adrovic A, Şahin S, Kasapçopur Ö, 2017)[2]. The International League Against Rheumatism (ILAR) identifies seven distinct and mutually exclusive categories of JIA, determined by the disease manifestations observed within the first 6 months of its onset (Martini, A., Lovell, D.J., Albani, S. et al. 2022)[3], the subtypes are depicted in Fig 1. JIA encompasses all forms of chronic childhood arthritis, affecting not only joints but also extra-articular structures, which can lead to disability and, in severe cases, even associated fatality (Zaripova, L.N., Midgley, A., Christmas, S.E. et al. 2021) [4]. As active JIA persists into adulthood, the cumulative effect leads to a higher degree of functional limitation and joint destruction. Nevertheless, some patients may encounter detrimental effects such as joint deformities, destruction, growth 1" 2401.04118v1,"Towards Directive Explanations: Crafting Explainable AI Systems for Actionable Human-AI Interactions Aditya Bhattacharya aditya.bhattacharya@kuleuven.be KU Leuven Leuven, Belgium Figure 1: This research focuses on crafting Explainable AI systems for actionable human-AI interactions. Considering the current progress, the author conducted three research studies: (1) Combining diverse visual XAI methods in an explanation dashboard, (2) Explanatory model steering with domain experts through a healthcare-focused XAI system, and (3) Data-centric model steering through manual and automated configuration of training data. ABSTRACT CCS CONCEPTS With Artificial Intelligence (AI) becoming ubiquitous in every application domain, the need for explanations is paramount to enhance transparency and trust among non-technical users. Despite the potential shown by Explainable AI (XAI) for enhancing understanding of complex AI systems, most XAI methods are designed for technical AI experts rather than non-technical consumers. Consequently, such explanations are overwhelmingly complex and seldom guide users in achieving their desired predicted outcomes. This paper presents ongoing research for crafting XAI systems tailored to guide users in achieving desired outcomes through improved human-AI interactions. This paper highlights the research objectives and methods, key takeaways and implications learned from user studies. It outlines open questions and challenges for enhanced human-AI collaboration, which the author aims to address in future work. • Human-centered computing → Human computer interaction (HCI); Interaction design; • Computing methodologies → Artificial intelligence. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). CHI EA ’24, May 11–16, 2024, Honolulu, HI, USA © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0331-7/24/05. https://doi.org/10.1145/3613905.3638177 KEYWORDS Explainable AI, Interactive Machine Learning, Explanatory Interactive Learning, Domain-Expert-AI Collaboration ACM Reference Format: Aditya Bhattacharya. 2024. Towards Directive Explanations: Crafting Explainable AI Systems for Actionable Human-AI Interactions. In Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA ’24), May 11–16, 2024, Honolulu, HI, USA. ACM, New York, NY, USA, 6 pages. https://doi.org/10.1145/3613905.3638177 1 RESEARCH BACKGROUND AND MOTIVATION The utilisation of Artificial Intelligence (AI) systems has grown significantly in the past few years across diverse domains such as medical [12, 13, 36], finance [9, 11, 14], legal [43, 50, 53] and others [2, 6, 35]. Despite the success of AI systems across various applications, the “black-box” nature of AI models has raised several concerns related to lack of transparency [6, 28, 33] and appropriate trust [26, 46], particularly when predicted outcomes are biased, unfair, incorrect or misguiding [10, 21, 32]. Consequently, the field" 2401.04131v1,"Secure Synthesis of Distributed Cryptographic Applications (Technical Report) Coşku Acay Joshua Gancher Rolph Recto Andrew C. Myers Cornell University Ithaca, NY, USA cacay@cs.cornell.edu Carnegie Mellon University Pittsburgh, PA, USA jgancher@andrew.cmu.edu Cornell University Ithaca, NY, USA rr729@cornell.edu Cornell University Ithaca, NY, USA andru@cs.cornell.edu Abstract—Developing secure distributed systems is difficult, and even harder when advanced cryptography must be used to achieve security goals. Following prior work, we advocate using secure program partitioning to synthesize cryptographic applications: instead of implementing a system of communicating processes, the programmer implements a centralized, sequential program, which is automatically compiled into a secure distributed version that uses cryptography. While this approach is promising, formal results for the security of such compilers are limited in scope. In particular, no security proof yet simultaneously addresses subtleties essential for robust, efficient applications: multiple cryptographic mechanisms, malicious corruption, and asynchronous communication. In this work, we develop a compiler security proof that handles these subtleties. Our proof relies on a novel unification of simulation-based security, information-flow control, choreographic programming, and sequentialization techniques for concurrent programs. While our proof targets hybrid protocols, which abstract cryptographic mechanisms as idealized functionalities, our approach offers a clear path toward leveraging Universal Composability to obtain end-to-end, modular security results with fully instantiated cryptographic mechanisms. Finally, following prior observations about simulation-based security, we prove that our result guarantees robust hyperproperty preservation, an important criterion for compiler correctness that preserves all source-level security properties in target programs. I. I NTRODUCTION Ensuring security for modern distributed applications remains a difficult challenge, as such systems can cross administrative boundaries and involve parties that do not fully trust each other. To defend their security policies, some applications employ sophisticated mechanisms such as complex distributed protocols [1, 2], trusted hardware [3, 4, 5], and advanced uses of cryptography. These technologies add significant complexity to software development and require expertise to use successfully [6, 7, 8]. To ease the development of secure distributed applications, prior work leverages compilers that translate high-level programs into distributed protocols that employ advanced security mechanisms. Unfortunately, most compilers only target a single mechanism—such as multiparty computation [9, 10, 11, 12], zero-knowledge proofs [13, 14, 15, 16], or homomorphic encryption [17, 18, 19]—and thus do not support secure combinations of mechanisms. On the other hand, compilers that perform secure program partitioning [20, 21, 22, 23, 24, 25] do combine mechanisms, but come with limited or informal correctness guarantees. In this work, we give the first formal security result for program partitioning that targets multiple cryptographic mechanisms, arbitrary corruption, and adversarially controlled scheduling. Our work proves the correctness of a reasonably faithful model of the compilation process used in the Viaduct compiler [25]. We formalize our result in the simulation-based security framework, which establishes a modular foundation for cryptographic protocol security [26]. Our security proof is primarily concerned with program partitioning itself, and thus does not reason about the concrete instantiation of cryptographic mechanisms; however, we discuss how to extend our results to reason about concrete mechanisms. Our security proof incorporates multiple techniques for simulation-based security: information-flow type systems [27] to define the security policy and to guide partitioning, choreographies [28] to define global programs for distributed executions, and a novel information-flow guided technique for concurrent program sequentialization [29]. • We formalize a variant of Simplified Universal Composability (SUC) [30] enriched with information flow, allowing us to capture distributed protocols in the presence of adversarial scheduling and corruption. • We show how to model secure program partitioning using security-typed choreographies [28]. The input to program partitioning is a sequential program representing an idealized execution on a single, trusted security domain, while the output is a distributed protocol with message-passing concurrency between mutually distrusting agents. • We prove simulation-based security for our model of program partitioning. Informally, we show that any adversary interacting with the compiled distributed program is no more powerful than a corresponding adversary (a simulator) interacting with the source program. • We show that, in our setting, simulation implies robust hyperproperty preservation [31], a strong criterion for" 2401.04138v1,"Expanding Horizons in HCI Research Through LLM-Driven Qualitative Analysis MAYA GRACE TORII, R&D Center for Digital Nature, University of Tsukuba, Japan TAKAHITO MURAKAMI, R&D Center for Digital Nature, University of Tsukuba, Japan YOICHI OCHIAI, R&D Center for Digital Nature, University of Tsukuba, Japan How would research be like if we still needed to ""send"" papers typed with a typewriter? Our life and research environment have continually evolved, often accompanied by controversial opinions about new methodologies. In this paper, we embrace this change by introducing a new approach to qualitative analysis in HCI using Large Language Models (LLMs). We detail a method that uses LLMs for qualitative data analysis and present a quantitative framework using SBART cosine similarity for performance evaluation. Our findings indicate that LLMs not only match the efficacy of traditional analysis methods but also offer unique insights. Through a novel dataset and benchmark, we explore LLMs’ characteristics in HCI research, suggesting potential avenues for further exploration and application in the field. CCS Concepts: • Human-centered computing → Human computer interaction (HCI); HCI design and evaluation methods. Additional Key Words and Phrases: Large Language Models (LLMs), qualitative data analysis, LLM in HCI research, methodology 1 INTRODUCTION As HCI researchers, our expertise lies in exploring human-computer interactions, not in laborious qualitative data coding. Qualitative research in Human-Computer Interaction (HCI) has traditionally been constrained by the extensive time, effort, and financial resources required for coding, categorizing, and interpreting large volumes of data. Traditional methods, despite their rigor, often face challenges in scaling and maintaining consistency across diverse contexts. The advent of Natural Language Processing (NLP) technologies has been offering some relief by automating aspects of these processes assisted in creating codebooks or categorizing data [1]. A significant shift towards leveraging Large Language Models (LLMs) has been observed since the introduction of ChatGPT in 2022. The inherent strength of LLMs in processing and providing insights on substantial language data suggests a promising avenue for HCI research [11]. Studies have begun exploring the potential of LLMs in aiding qualitative analysis, particularly in tasks like codebook and categorizing [5, 23]. However, these approaches often see NLP and LLMs as mere supplements to human effort, focusing on data compilation rather than interpretation, indicating an opportunity for further automation. As an exception, Byun et al.(2023) have made initial forays into using LLMs for generating discussions from raw qualitative data, although their approach lacks quantitative evaluation [6]. In this paper, we propose a method for conducting qualitative analysis in HCI research using LLMs and evaluate the output by comparing it with the published paper. We aim to not only process and analyse datasets but also to enhance the reproducibility and scalability of qualitative research. This approach overcome the limitations of human- intensive methods, offering a pathway to handle vast amounts of information more efficiently. Specifically, we explored Authors’ addresses: Maya Grace Torii, R&D Center for Digital Nature, University of Tsukuba, 1-2 Kasuga, Tsukuba, Ibaraki, Japan, 305-0018, toriparu@digialnature.slis.tsukuba.ac.jp; Takahito Murakami, takahito@digialnature.slis.tsukuba.ac.jp, R&D Center for Digital Nature, University of Tsukuba, 1-2 Kasuga, Tsukuba, Ibaraki, Japan, 305-0821; Yoichi Ochiai, R&D Center for Digital Nature, University of Tsukuba, 1-2 Kasuga, Tsukuba, Ibaraki, Japan, 305-0821, wizard@slis.tsukuba.ac.jp. Manuscript submitted to ACM 1" 2401.04146v1,"Mie scattering theory: A review of physical features and limitations Yuriy A. Akimov ∗ Institute of High Performance Computing (IHPC), Agency for Science, Technology and Research (A*STAR), 1 Fusionopolis Way, #16-16 Connexis, Singapore 138632 (Dated: January 10, 2024) Mie theory is the classical problem for modeling of light scattering by spherical particles. In this paper, we perform a spherical harmonic analysis of its solution for the induced fields to reveal the physics underlying the resonant behavior predicted for scattering and absorption. We disclose the two distinct groups of current-sourced and current-free scattered fields, whose interference makes light-matter interaction resonant in Mie theory for every orbital index. Being a model, the currentfree scattered fields naturally limit applicability of the classical solution. We discuss those limitations and demonstrate the ways for further refinement of the theory for description of the excitation source, sphere interface and scatterer localization. I. INTRODUCTION Mie theory is the classical problem for light scattering on a spherical particle [1–3]. It is named after German physicist Gustav Mie, who first published his paper on scattering of an electromagnetic wave on a sphere in 1908 [4]. Since then, this theory played a key part in shaping of our knowledge about light-matter interaction. It bridged the theories of Rayleigh scattering for small particles and Rayleigh-Gans-Debye scattering for larger ones [5], enabling calculations for particles of arbitrary size. It explained frequency-selective scattering and size-dependent color change, which occur in solutions of colloid nanoparticles. Later, the theory was successfully extended to multilayer spheres [6] and non-plane incident fields emitted by dipoles [7] or swift electrons [8]. Now, Mie theory is extensively used for design of optical resonances in plasmonic and photonic structures at the nanoscale [9–12]. Despite the long history of success, Mie theory keeps a number of fundamental questions unanswered. For instance, why Mie scattering and absorption behave differently with change of particle size? Why does resonant scattering monotonically increase with particle size, while resonant absorption does not [13]? Mie theory explains these behaviors by resonant nature of the Mie scattering coefficients. But how do they become resonant? What is the physics underlying their resonances? If the resonances in Mie coefficients arise from interference of the dipole and higher-order currents induced in the sphere as was suggested in Refs. [14–16], then how do similar resonances appear in deeply subwavelength metal particles [17, 18] whose higher-order currents are negligible? How can a dipole current along make the Mie scattering coefficients resonant? Other questions arise from the way the light-matter interaction is treated in Mie theory. The theory successfully predicts static flows for the electromagnetic energy, but not for the momentum. This suggests that Mie theory provides a truncated description for light-matter interaction. Then, how limited is that description? All these questions highlight lack of our understanding of the Mie scattering. To address them, we perform a rigorous spherical harmonic analysis of Mie theory revealing the physics underlying its solution for scattering and absorption of light. II. Mie theory describes scattering and absorption of harmonic plane waves of angular frequency ω incident on a spherical particle. Following Maxwell’s equations, electromagnetic fields in domains with uniform dielectric permittivity ε in the absence of any external charges and currents can be completely described with the transverse magnetic (TM) and transverse electric (TE) fields as follows [9, 10]:   r i ε 0 H = H TM − ∇ × E TE e −iωt , (1) k 0 µ 0   r µ 0 i ∇ × H TM e −iωt , (2) E = E TE + k 0 ε ε 0 where H TM and E TE are the amplitudes of the governing √ fields for the TM and TE polarizations, k 0 = ω ε 0 µ 0 is the vacuum wavenumber, ε 0 and µ 0 are the electric and magnetic constants. In the spherical geometry, the governing TM and TE fields can be decomposed over the vector spherical harmonics of different orbital and azimuthal indices l, m to separate their radial and angular dependencies [9, 10]: H TM = ∞ X l X l=0 m=−l E TE = ∞ X l X l=0 m=−l ∗ akimov@ihpc.a-star.edu.sg MIE THEORY   ∂Y lm e θ ∂Y lm H lm e ϕ − , (3) ∂θ sin θ ∂ϕ   ∂Y lm e θ ∂Y lm E lm e ϕ − , (4) ∂θ sin θ ∂ϕ where (r, θ, ϕ) are the spherical coordinates, and e r , e θ , e ϕ are the respective unit vectors. In this separa-" 2401.04155v1,"Large language models in bioinformatics: applications and perspectives Jiajia Liu 1,† , Mengyuan Yang 2,† , Yankai Yu 3,† , Haixia Xu 4,5,† , Kang Li 5 , Xiaobo Zhou 1,6,7,* 1 Center for Computational Systems Medicine, McWilliams School of Biomedical Informatics, The University of Texas Health Science Center at Houston, Houston, Texas, 77030, USA 2 School of Life Sciences, Zhengzhou University, Zhengzhou, Henan 450001, China 3 School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, Sichuan 611756, China 4 The Center of Gerontology and Geriatrics, West China Hospital, Sichuan University, Chengdu, Sichuan 610041, China 5 West China Biomedical Big Data Center, West China Hospital, Sichuan University, Chengdu, Sichuan 610041, China 6 McGovern Medical School, The University of Texas Health Science Center at Houston, Houston, TX 77030, USA 7 School of Dentistry, The University of Texas Health Science Center at Houston, Houston, TX 77030, USA † These authors have contributed equally to this work. * Address correspondence to: Xiaobo Zhou, Ph.D. McWilliams School of Biomedical Informatics The University of Texas Health Science Center at Houston 7000 Fannin St., Houston, TX 77030 Phone: 713-500-3923 Email: Xiaobo.Zhou@uth.tmc.edu" 2401.04157v1,"Under review R E PL AN : R OBOTIC R EPLANNING WITH P ERCEPTION AND L ANGUAGE M ODELS Zihan Zhou ∗ University of Toronto footoredo@cs.toronto.edu Marta Skreta ∗ University of Toronto martaskreta@cs.toronto.edu Jia Lin Yuan ∗ University of Toronto jly@cs.toronto.edu Kourosh Darvish University of Toronto kdarvish@cs.toronto.edu Alan Aspuru-Guzik University of Toronto alan@aspuru.com Animesh Garg Georgia Tech animesh.garg@gatech.edu A BSTRACT Advancements in large language models (LLMs) have demonstrated their potential in facilitating high-level reasoning, logical reasoning and robotics planning. Recently, LLMs have also been able to generate reward functions for low-level robot actions, effectively bridging the interface between high-level planning and low-level robot control. However, the challenge remains that even with syntactically correct plans, robots can still fail to achieve their intended goals. This failure can be attributed to imperfect plans proposed by LLMs or to unforeseeable environmental circumstances that hinder the execution of planned subtasks due to erroneous assumptions about the state of objects. One way to prevent these challenges is to rely on human-provided step-by-step instructions, limiting the autonomy of robotic systems. Vision Language Models (VLMs) have shown remarkable success in tasks such as visual question answering and image captioning. Leveraging the capabilities of VLMs, we present a novel framework called Robotic Replanning with Perception and Language Models that enables real-time replanning capabilities for long-horizon tasks. This framework utilizes the physical grounding provided by a VLM’s understanding of the world’s state to adapt robot actions when the initial plan fails to achieve the desired goal. We test our approach within four environments containing seven long-horizion tasks. We find that R E PL AN enables a robot to successfully adapt to unforeseen obstacles while accomplishing open-ended, long-horizon goals, where baseline models cannot. Find more information at https://replan-lm.github.io/replan.github.io/ 1 I NTRODUCTION Designing embodied agents to execute multi-stage, long-horizon tasks is challenging. Firstly, agents need manipulation skills for physical engagement with their environment. They also need to be adept at perceiving their surrounding environment and reasoning on cause-and-effect relationships of their actions on the environment. Moreover, these agents should be able to plan and carry out a series of actions that are in line with the main goals they are tasked to accomplish (Wu et al., 2023), with minimal human intervention. Methods based on rule-driven frameworks like Task and Motion Planning (TAMP) (Garrett et al., 2021) and learning approaches, such as Hierarchical Reinforcement Learning (HRL) and Imitation Learning (IL), have advanced the field of long-horizon planning. Yet, these methods often require extensive domain knowledge, intricate reward engineering, and time-consuming dataset creation ∗ Equal contribution. 1" 2401.04187v1,"Asymptotics of the Minimal Feedback Arc Set in Erdős-Rényi Graphs Harvey Diamond 1* , Mark Kon 2† , and Louise Raphael 3 1 Department of Mathematics, West Virginia University, Morgantown, WV 26506 2 Department of Mathematics and Statistics, Boston University 3 Department of Mathematics, Howard University * Address correspondence to: diamond@math.wvu.edu † Research partially supported by National Science Foundation grant DMS-23-19011. Abstract Given a directed graph, the Minimal Feedback Arc Set (FAS) problem asks for a minimal set of arcs which, when removed, results in an acyclic graph. Equivalently, the FAS problem asks to find an ordering of the vertices that minimizes the number of feedback arcs. The FAS problem is considered an algorithmic problem of central importance in discrete mathematics. Our purpose in this paper is to consider the problem in the context of Erdős-Rényi random directed graphs, denoted D(n, p), in which each possible directed arc is included with a fixed probability p > 0. Our interest is the typical ratio of the number of feedforward arcs to the number of feedback arcs that are removed in the FAS problem. We show that as the number n of vertices goes to infinity the probability that this ratio is greater than 1 + ϵ for any fixed ϵ > 0 approaches zero. Similarly, letting p go to zero as n → ∞ this result remains true if p > C log n/n where C depends on ϵ. 1 Introduction The Minimal Feedback Arc Set (FAS) problem is longstanding in the field of graph theory and its applications. We note in this regard the recent survey by Kudelić [Ku] of prior results over the past 50 years. In a directed graph (digraph) D = (V, E) with V the set of vertices and E the set of directed arcs, the FAS problem is to find a minimal set of arcs E ′ such that removing these arcs produces a digraph D ′ = (V, E \ E ′ ) that is acyclic. As noted in the classic text of Harary [Ha], a digraph is acyclic if and only if it is possible to order the vertices of D so that the adjacency matrix A(D) of D is upper triangular. The matrix A(D) is a 0/1 matrix where a 1 in the (i, j) position corresponds to an arc from vertex i to vertex j. Hence a 1 where j > i above the diagonal indicates an arc from a vertex i to a higher-numbered vertex j. A 1 below the diagonal corresponds to an arc from a higher-numbered vertex to a lower numbered vertex. The latter are called feedback arcs. 1" 2401.04192v1,"Interactive Multi-Objective Evolutionary Optimization of Software Architectures Aurora Ramı́rez, José Raúl Romero ∗ , Sebastián Ventura Department of Computer Science and Numerical Analysis, University of Córdoba, 14071, Córdoba, Spain Abstract While working on a software specification, designers usually need to evaluate different architectural alternatives to be sure that quality criteria are met. Even when these quality aspects could be expressed in terms of multiple software metrics, other qualitative factors cannot be numerically measured, but they are extracted from the engineer’s know-how and prior experiences. In fact, detecting not only strong but also weak points in the different solutions seems to fit better with the way humans make their decisions. Putting the human in the loop brings new challenges to the search-based software engineering field, especially for those human-centered activities within the early analysis phase. This paper explores how the interactive evolutionary computation can serve as a basis for integrating the human’s judgment into the search process. An interactive approach is proposed to discover software architectures, in which both quantitative and qualitative criteria are applied to guide a multi-objective evolutionary algorithm. The obtained feedback is incorporated into the fitness function using architectural preferences allowing the algorithm to discern between promising and poor solutions. Experimentation with real users has revealed that the proposed interaction mechanism can effectively guide the search towards those regions of the search space that are of real interest to the expert. Keywords: Search-based software design, Interactive evolutionary computation, Multi-objective optimization, Software architecture discovery Corresponding author. Tel. +34 957 21 26 60 Email addresses: aramirez@uco.es (Aurora Ramı́rez), jrromero@uco.es (José Raúl Romero), sventura@uco.es (Sebastián Ventura) ∗ Preprint submitted to Information Sciences January 10, 2024" 2401.04206v2,"Learning Racing From an AI Coach: Effects of Multimodal Autonomous Driving Explanations on Driving Performance, Cognitive Load, Expertise, and Trust Robert Kaufman 1,* , Jean Costa 2 , and Everlyne Kimani 2 1 University of California - San Diego, La Jolla, CA 92093, USA 2 Toyota Research Institute, Los Altos, 94022, USA * rokaufma@ucsd.edu ABSTRACT In a pre-post experiment (n = 41), we test the impact of an AI Coach’s explanatory communications modeled after the instructions of human driving experts. Participants were divided into four (4) groups to assess two (2) dimensions of the AI coach’s explanations: information type (‘what’ and ‘why’-type explanations) and presentation modality (auditory and visual). We directly compare how AI Coaching sessions employing these techniques impact driving performance, cognitive load, confidence, expertise, and trust in an observation learning context. Through interviews, we delineate the learning process of our participants. Results show that an AI driving coach can be useful for teaching performance driving skills to novices. Comparing between groups, we find the type and modality of information influences performance outcomes. We attribute differences to how information directed attention, mitigated uncertainty, and influenced overload experienced by participants. These, in turn, affected how successfully participants were able to learn. Results suggest efficient, modality-appropriate explanations should be opted for when designing effective HMI communications that can instruct without overwhelming. Further, they support the need to align communications with human learning and cognitive processes. Results are synthesized into eight design implications for future autonomous vehicle HMI and AI coach design. Introduction Recent years have seen vast improvements in autonomous driving technology, with on-road vehicle testing currently being conducted in major cities around the world. The proposed benefits of autonomous vehicles (AVs) include increases in driving safety and efficiency while reducing driving infractions, traffic, and passenger stress 1 . Though AVs may have a bright future, real-world deployment is hindered by a number of technological, infrastructural, and human-interaction roadblocks that are likely to take decades to solve. Meanwhile, the National Highway Traffic Safety Administration (NHTSA) estimates that in the United States alone, there are over 6 million car crashes each year, resulting in over 2.5 million injuries, 40,000 deaths, and $340 billion in damages 2, 3 . Of these, it is estimated that 94% of vehicle crashes are due to human error 4 . Therefore, there is a large and pressing demand for technologies that may improve human driving ability. In this study, we seek to test a novel use of autonomous vehicle technology: can AVs teach humans to be better drivers? We propose that augmenting driver learning by observing an AI driving coach may help address the glaring need for human driving improvement. To test this concept, we conducted a mixed-methods driving simulator experiment in which participants observed one of four AI coaches providing different types of explanatory instructions. We evaluate how the AI coaching sessions impact learning outcomes such as participant-driving performance, cognitive load, confidence, expertise, and trust. We leverage the domain of performance or “race track” driving to test study objectives. Performance driving is more challenging but very related to everyday driving, and it allows driving skills and knowledge to be built and tested more objectively. The goal of performance driving is to drive as fast as possible on a given track, maximizing the vehicle’s limits while minimizing the distance needed to travel 5 . Many performance driving skills directly translate to real-world driving contexts – such as improvements to vehicle handling and situational awareness 6, 7 – and thus, it is an appropriate proxy to study driving skill learning. Testing the potential of an AI driving coach in the context of performance driving has several major benefits over everyday driving. First, performance driving has specifically defined parameters for success so we can objectively measure the effectiveness of our AI coach in a controlled environment. Next, it is a driving task many people are unfamiliar with, and thus we are able to test the potential of an AI driving coach on true novices. This helps maintain a CC BY: Creative Commons Attribution. 1" 2401.04237v1,"A LEARNING - BASED MATHEMATICAL PROGRAMMING FORMULATION FOR THE AUTOMATIC CONFIGURATION OF OPTIMIZATION SOLVERS ∗ A P REPRINT Gabriele Iommazzo † Claudia D’Ambrosio † dambrosio@lix.polytechnique.fr Antonio Frangioni ‡ frangio@di.unipi.it Leo Liberti † liberti@lix.polytechnique.fr January 10, 2024 Abstract We propose a methodology, based on machine learning and optimization, for selecting a solver configuration for a given instance. First, we employ a set of solved instances and configurations in order to learn a performance function of the solver. Secondly, we formulate a mixed-integer nonlinear program where the objective/constraints explicitly encode the learnt information, and which we solve, upon the arrival of an unknown instance, to find the best solver configuration for that instance, based on the performance function. The main novelty of our approach lies in the fact that the configuration set search problem is formulated as a mathematical program, which allows us to a) enforce hard dependence and compatibility constraints on the configurations, and b) solve it efficiently with off-theshelf optimization tools. Keywords automatic algorithm configuration, mathematical programming, machine learning, optimization solver configuration, hydro unit committment 1 Introduction We address the problem of finding instance-wise optimal configurations for general Mathematical Programming (MP) solvers. We are particularly motivated by state-of-the-art general-purpose solvers, which combine a large set of diverse algorithmic components (relaxations, heuristics, cutting planes, branching, . . . ) and therefore have a long list of user-configurable parameters; tweaking them can have a significant impact on the quality of the obtained solution and/or on the efficiency of the solution process (see, e.g., [16]). Good solvers have effective default parameter configurations, carefully selected to provide good performances in most cases. Furthermore, tuning tools may be available (e.g., [19, Ch. 10]) which run the solver, with different configurations, on one or more instances within a given time limit, and record the best parameter values encountered. Despite all this, the produced parameter configurations may still be highly suboptimal with specific instances. Hence, a manual search for the best parameter values may be required. This is a highly nontrivial and time-consuming task, due to the large amount of available parameters (see, e.g., [20]), which requires a profound knowledge of the application at hand and an extensive experience in solver usage. Therefore, it is of significant interest to develop general approaches, capable of performing it efficiently and effectively in an automatic way. ∗ This paper has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement n. 764759 “MINOA”. † LIX CNRS, École Polytechnique, Institut Polytechnique de Paris, Palaiseau, France. Gabriele Iommazzo is now at Zuse Institute Berlin, Berlin, Germany ( iommazzo@zib.de ) ‡ Dip. di Informatica, Università di Pisa, Pisa, Italy" 2401.04247v1,"Robust Image Watermarking using Stable Diffusion Lijun Zhang 1 Xiao Liu 1 Antoni Viros Martin 2 Cindy Xiong Bearfield 1 Yuriy Brun 1 Hui Guan 1 Abstract are invisible and robust to watermark removal attacks (Luo et al., 2020) in images. Conventional watermarking strategies have employed various methods, such as embedding information in texture-rich regions (Bender et al., 1996), manipulating the least significant bits (Wolfgang & Delp, 1996), or utilizing the frequency domain (Kundur & Hatzinakos, 1998). The emergence of deep learning has introduced neural network (NN)-based watermarking methods, including Convolutional Neural Network (CNN) (Zhu et al., 2018; Luo et al., 2020; Tancik et al., 2020) and Generative Adversarial Network(GAN)-based approaches (Zhang et al., 2019b;a; Huang et al., 2023). These NN-based methods have shown promise in achieving high invisibility and robustness against traditional watermarking attacks, such as adding Gaussian noise or applying JPEG compression. Watermarking images is critical for tracking image provenance and claiming ownership. With the advent of generative models, such as stable diffusion, able to create fake but realistic images, watermarking has become particularly important, e.g., to make generated images reliably identifiable. Unfortunately, the very same stable diffusion technology can remove watermarks injected using existing methods. To address this problem, we present a ZoDiac, which uses a pre-trained stable diffusion model to inject a watermark into the trainable latent space, resulting in watermarks that can be reliably detected in the latent vector, even when attacked. We evaluate ZoDiac on three benchmarks, MS-COCO, DiffusionDB, and WikiArt, and find that ZoDiac is robust against state-of-the-art watermark attacks, with a watermark detection rate over 98% and a false positive rate below 6.4%, outperforming state-of-theart watermarking methods. Our research demonstrates that stable diffusion is a promising approach to robust watermarking, able to withstand even stable-diffusion-based attacks. Unfortunately, the recent advent of powerful image generation techniques can circumvent existing watermarking methods. The most recent work (Zhao et al., 2023a) shows that stable diffusion can be used in a watermark removal attack, and none of the existing watermarking techniques are robust enough to the attack. Figure 1 reports the watermark detection rate of existing watermarking methods after the stable-diffusion–based watermark removal attack recently proposed in (Zhao et al., 2023a). It shows the watermark detection rate drops from 79% ∼ 100% before attack to only 0% ∼ 29% after attack using MS-COCO dataset (Lin et al., 2014). 1. Introduction To address the problem, we propose a novel stable-diffusionbased watermarking framework called ZoDiac. ZoDiac uses a pre-trained stable diffusion model to inject a watermark into the trainable latent space, resulting in watermarks that can be reliably detected in the latent vector, even when at- Digital image watermarking, a technique for subtly embedding information within digital images, has become increasingly crucial and beneficial in the context of content protection and authenticity verification (Tirkel et al., 1993; Craver et al., 1997; Boneh & Shaw, 1998; Bloom et al., 1999). The advance in generative AI technologies (Ramesh et al., 2022; Saharia et al., 2022; Rombach et al., 2022), such as stable diffusion, further underscores the need for watermarking solutions to distinguish between AI-generated and human-created images. Much effort has been spent on embedding watermarks that 1 Manning College of Information and Computer Sciences, University of Massachusetts, Amherst MA USA 2 IBM, Yorktown Heights NY USA. Correspondence to: Lijun Zhang . Figure 1: The watermark detection rate of existing methods and the proposed ZoDiac before and after the diffusionbased attack (Zhao et al., 2023a). 1" 2401.04259v1,"MARG: Multi-Agent Review Generation for Scientific Papers Mike D’Arcy 1 , Tom Hope 2,3 , Larry Birnbaum 1 , Doug Downey 1,3 1 Northwestern University, 2 The Hebrew University of Jerusalem, 3 Allen Institute for AI, m.m.darcy@u.northwestern.edu, tomh@allenai.org, l-birnbaum@northwestern.edu, dougd@allenai.org Abstract We study the ability of LLMs to generate feedback for scientific papers and develop MARG, 1 a feedback generation approach using multiple LLM instances that engage in internal discussion. By distributing paper text across agents, MARG can consume the full text of papers beyond the input length limitations of the base LLM, and by specializing agents and incorporating sub-tasks tailored to different comment types (experiments, clarity, impact) it improves the helpfulness and specificity of feedback. In a user study, baseline methods using GPT-4 were rated as producing generic or very generic comments more than half the time, and only 1.7 comments per paper were rated as good overall in the best baseline. Our system substantially improves the ability of GPT-4 to generate specific and helpful feedback, reducing the rate of generic comments from 60% to 29% and generating 3.7 good comments per paper (a 2.2x improvement). 1 Introduction In recent years, the capabilities of large language models (LLMs) have advanced dramatically, resulting in modern models such as GPT-4 that can perform comparably to humans in some tasks (OpenAI, 2023). These advancements provide hope that LLMs may be able to assist human researchers with their writing (Fok and Weld, 2023; Shen et al., 2023; Mahlow, 2023; Gmeiner and Yildirim, 2023); however, most modern LLMs can only consume limited amounts of text and are primarily trained on non-technical text such as news articles and websites. The ability of models to comprehend and produce long, highly technical text—such as that of scientific papers—remains under-explored. In this paper, we study the task of automatically generating actionable peer-review feedback for a scientific paper. This task comprises several reasoning challenges: a reviewer must understand the 1 https://github.com/allenai/marg-reviewer intent and significance of a work, the technical details of the methodology, and the nuances of how an experiment or proof can be claimed to support a particular conclusion. They must then identify the ways in a which a paper does or does not fall short and articulate suggestions for improvement. Modern large language models (LLMs) face a technical challenge in addition to the reasoning challenges involved in generating reviews: namely, they are limited in the total number of tokens they can effectively reason over at once. As scientific papers can be quite long (thousands or tens of thousands of tokens, in our case), there are many cases in which it is not even possible to provide the whole paper in the model’s input. Even for models that technically support large inputs, they often cannot use the full capacity effectively in practice (Qin et al., 2023; Liu et al., 2023). We propose multi-agent review generation (MARG), a method for generating peer-review feedback by prompting an LLM (GPT-4). We find that by using multiple instances of GPT (hereinafter referred to as ""agents""), giving each a portion of the paper, and allowing the agents to communicate with each other, it is possible to generate feedback across the whole paper. We additionally find that by including aspect-specific ""expert"" GPT agents to separately assist with generating comments on experiments, clarity, and impact, the method can perform significantly better than when having a lone agent attempt to generate all types of feedback at once; we refer to this specialized variant of our method as MARG-S. In a user study, MARG-S generated 3.7 ""good"" comments per paper (rated by users), whereas a simple baseline of having a single agent generate all comments generated only 1.7 good comments, and a recently proposed method (Liang et al., 2023) produced only 0.3. In addition, we found that while users perceived the majority of the comments generated by the baselines as being generic, the vast ma-" 2401.04283v1,"FADI-AEC: FAST SCORE BASED DIFFUSION MODEL GUIDED BY FAR-END SIGNAL FOR ACOUSTIC ECHO CANCELLATION Yang Liu, Li Wan, Yun Li, Yiteng Huang, Ming Sun, James Luan, Yangyang Shi, Xin Lei Meta Platforms, USA {yangliuai, wwanli, yunli1, yah, sunming425, jamesluan, yyshi, leixin}@meta.com ABSTRACT Despite the potential of diffusion models in speech enhancement, their deployment in Acoustic Echo Cancellation (AEC) has been restricted. In this paper, we propose DI- AEC, pioneering a diffusion-based stochastic regeneration approach dedicated to AEC. Further, we propose FADI-AEC, fast score-based diffusion AEC framework to save computational demands, making it favorable for edge devices. It stands out by running the score model once per frame, achieving a significant surge in processing efficiency. Apart from that, we introduce a novel noise generation technique where far-end signals are utilized, incorporating both far-end and near-end signals to refine the score model’s accuracy. We test our proposed method on the ICASSP2023 Microsoft deep echo cancellation challenge evaluation dataset, where our method outperforms some of the end-to-end methods and other diffusion based echo cancellation methods. Index Terms— echo cancellation, diffusion model, stochastic regeneration, predictive learning 1. INTRODUCTION The importance of acoustic echo cancellation in achieving high-quality speech in voice communication has led to the emergence of deep neural network (DNN) based methods, such as the deep complex convolution recurrent network (DC- CRN) [1]. The main challenges are artifacts, target speech distortion, and echo leakage during double-talk scenarios. To address these challenges, researchers have proposed techniques such as alignment modules [2], novel architecture [3, 4] and modified loss functions [5]. Currently, the majority of echo cancellation models adhere to predictive methodologies, which learn a deterministic mapping from corrupted speech to clean speech targets. However, generative models, such as variational auto-encoders (VAEs) [6], generative adversarial networks (GANs) [7], and diffusion approaches [8], offer a different perspective. These models learn the target distribution and have the capability to generate multiple valid estimates, providing a richer set of possibilities for AEC task. Among these, diffusion-based generative models have shown promising results in tasks such as noise suppression. For instance, Lu et al. [9] proposed a novel approach that incorporates the characteristics of the observed noisy speech signal into the diffusion and reverse processes, providing a more tailored enhancement. Similarly, Joan Serrà et al. [10] introduced a multi-resolution conditioning network that employs score-based diffusion. Their model generates clean speech from noisy inputs by progressively reducing the noise in a series of steps, effectively diffusing the noise out of the signal. Lemercier et al. [11] applied a stochastic regeneration approach, where an estimate provided by a predictive model is used as a guide for further diffusion, refining the enhancement process. While there have been significant advancements in the field, the potential of using diffusion models for echo cancellation has largely remained untapped. One of the primary challenges is the computational intensity of existing diffusion models, which makes their deployment in real-world production settings a daunting task. In this paper, we introduce two novel models: DI-AEC, which applies a diffusion-based stochastic regeneration method to echo cancellation, and FADI-AEC, an efficient version of DI-AEC that utilizes a fast score model. To the best of our understanding, these represent the first echo cancellation models that harness the power of diffusion. Notably, FADI-AEC addresses the computational hurdle by executing the score model only once per frame, leveraging the prior state to minimize processing time. Both models employ far-end signals to produce noise, thereby enhancing performance. By considering both far-end and near-end signals, these models enhance accuracy, generating high-quality samples. 2. PROPOSED METHOD 2.1. Problem formulation In a typical AEC system, the microphone signal is denoted as h(n). This signal comprises two components: the near-end speech s(n) and the acoustic echo z(n). Mathematically, this relationship is expressed as: h(n) = s(n) + z(n), (1)" 2401.04287v1,"Noname manuscript No. (will be inserted by the editor) What is an App Store? The Software Engineering Perspective Wenhan Zhu · Sebastian Proksch · Daniel M. German · Michael W. Godfrey · Li Li · Shane McIntosh Author pre-print copy. The final publication is available at Springer via: https://doi.org/ 10.1007/s10664-023-10362-3 Abstract “App stores” are online software stores where end users may browse, purchase, download, and install software applications. By far, the best known app stores are associated with mobile platforms, such as Google Play for Android and Apple’s App Store for iOS. The ubiquity of smartphones has led to mobile app stores becoming a touchstone experience of modern living. App stores have been the subject of many empirical studies. However, most of this research has concentrated on properties of the apps rather than the stores themselves. Today, there is a rich diversity of app stores and these stores have largely been overlooked by researchers: app stores exist on many distinctive platforms, are aimed at different classes of users, and have different end-goals beyond simply selling a standalone app to a smartphone user. The goal of this paper is to survey and characterize the broader dimensionality of app stores, and to explore how and why they influence software development practices, such as system design and release management. We begin by collecting a set of app store examples from web search queries. By analyzing and curating the results, we derive a set of features common to app stores. We then build a dimensional model of app stores based on these features, and we fit each app store from our web search result set into this model. Wenhan Zhu · Michael W. Godfrey · Shane McIntosh David R. Cheriton School of Computer Science, University of waterloo, Waterloo, Canada E-mail: {w65zhu, migod, shane.mcintosh}@uwaterloo.ca Sebastian Proksch Delft University of Technology, Delft, Netherlands E-mail: s.proksch@tudelft.nl Daniel M. German Department of Computer Science, University of Victoria, Victoria, Canada E-mail: dmg@uvic.ca Li Li School of Software, Beihang University, Beijing, China E-mail: lilicoding@ieee.org" 2401.04295v1,"Frequency-dependent squeezing for gravitational-wave detection through quantum teleportation Yohei Nishino 1,2* , Stefan Danilishin 3,4 , Yutaro Enomoto 5 , Teng Zhang 6 1* Department of Astronomy, University of Tokyo, Bunkyo, Tokyo, 113-0033, Japan. 2 Gravitational Wave Science Project, National Astronomical Observatory of Japan (NAOJ), Mitaka City, Tokyo, 181-8588, Japan. 3 Department of Gravitational Waves and Fundamental Physics, Maastricht University, 6200 MD, Maastricht, The Netherlands. 4 Nikhef – National Institute for Subatomic Physics, Science Park 105, 1098 XG Amsterdam, The Netherlands. 5 Department of Applied Physics, The University of Tokyo, Bunkyo, Tokyo, 113-0033, Japan. 6 The University of Birmingham, School of Physics and Astronomy, and Institute of Gravitational Wave Astronomy, University of Birmingham, Edgbaston, Birmingham, B15 2TT, United Kingdom. *Corresponding author(s). E-mail(s): yohei.nishino@grad.nao.ac.jp; Contributing authors: s.danilishin@nikhef.nl; yenomoto.ap.t@gmail.com; tzhang@star.sr.bham.ac.uk; Abstract Ground-based interferometric gravitational wave detectors are highly precise sensors for weak forces, limited in sensitivity across their detection band by quantum fluctuations of light. Current and future instruments address this limitation by injecting frequency-dependent squeezed vacuum into the detection port, utilizing narrow-band, low-loss optical cavities for optimal rotation of the squeezing ellipse at each signal frequency. This study introduces a novel scheme employing the principles of quantum teleportation and entangled states of light. It allows achieving broadband suppression of quantum noise in detuned signal 1" 2401.04297v1,"Staged trees for discrete longitudinal data Jack Storror Carter 1* , Manuele Leonelli 2 , Eva Riccomagno 1 , Alessandro Ugolini 3 1 Dipartimento di Matematica, Università degli Studi di Genova, Genova, Italy. 2 School of Science and Technology, IE University, Madrid, Spain. 3 Department of Surgical and Diagnostic Sciences, University of Genoa, Genoa, Italy. *Corresponding author(s). E-mail(s): jack.carter@dima.unige.it; Contributing authors: manuele.leonelli@ie.edu; riccomagno@dima.unige.it; alessandro.ugolini@unige.it; Abstract In this paper we investigate the use of staged tree models for discrete longitudinal data. Staged trees are a type of probabilistic graphical model for finite sample space processes. They are a natural fit for longitudinal data because a temporal ordering is often implicitly assumed and standard methods can be used for model selection and probability estimation. However, model selection methods perform poorly when the sample size is small relative to the size of the graph and model interpretation is tricky with larger graphs. This is exacerbated by longitudinal data which is characterised by repeated observations. To address these issues we propose two approaches: the longitudinal staged tree with Markov assumptions which makes some initial conditional independence assumptions represented by a directed acyclic graph and marginal longitudinal staged trees which model certain margins of the data. Keywords: Chain event graphs; Discrete data; Longitudinal studies; Staged trees 1 Introduction Longitudinal studies are characterised by the repeated observation of individuals over time. This differs to cross-sectional studies in which each individual is only 1" 2401.04302v1,"eSIM Technology in IoT Architecture Hang Yuan, Artiom Baloian, Jan Janak, and Henning Schulzrinne Department of Computer Science, Columbia University, USA Email: hang.yuan@columbia.edu, ab4659@columbia.edu, janakj@cs.columbia.edu, hgs@cs.columbia.edu Abstract—eSIM(embedded SIM) is an advanced alternative to traditional physical SIM cards initially developed by the GSM Association(GSMA) in 2013 [1] [2]. The eSIM technology has been deployed in many commercial products such as mobile devices. However, the application of the eSIM technology in IoT devices has yet to start being primarily deployed. Understanding the eSIM architecture and the basic ideas of the eSIM provisioning and operations is very important for engineers to promote eSIM technology deployment in more areas, both academics and industries. The report focuses on the eSIM technology in the IoT architecture and two major operations of Remote SIM Provisioning(RSP) procedure: the Common Mutual Authentication procedure, a process used to authenticate eSIM trusted communication parties over the public internet, and the Profile Downloading procedure, the way to download the Profile from the operator SM-DP+ server and eventually remotely provision the end-user devices. QR code received from the operator in turn of the contract to locate and download the new profile. The download and installation operations require the device to be connected to the public network, for example, through the Wi-Fi or a preinstalled Bootstrap Profile. With the Profiles properly installed, the end user can switch between the Profiles to connect their device to whichever operator’s network the end user selects. The general IoT solution for mobile devices is not applicable to directly apply to IoT devices for the following challenges: (1) compared to the mobile devices which have rich user interface (UI) functionalities for end users to control almost everything, IoT devices are generally lack of UI for end user to directly view or manage the settings; (2) IoT devices are typically deployed in large scale so that designing a reliable and efficient approach to organize a fleet of Iot devices is much more complicate; I. Introduction (3) unlike a mobile device can easily connect to the public The traditional SIM card was invented over 30 years ago networks through Wi-Fi, IoT devices may find difficulties to and has been ubiquitously used [3]. People are already familiar get internet connections to download profiles from the service with the existence of physical SIM cards, but there are also provider server. To overcome these challenges, in the eSIM IoT more challenges with the usage of physical SIM cards. The architecture, eSIM IoT Remote Manager (eIM), an additional traditional SIM card is owned and issued by a specific operator. component, is introduced to enable central management for IoT It will be given to the end user as subscription credentials to devices in scale and assist provisioning to IoT devices without connect to the operator’s network. To switch the subscription, public network access. In this project, guided by Artiom Baloian, I played a pivotal the end user must obtain a new SIM card issued by the operator and physically swap the SIMs. Considering the management of role in gathering and analyzing public technical specifications a large cluster of mobile devices or IoT devices, equipping or related to eSIM technology for IoT devices. This experience managing profiles for this situation could be a disaster where significantly sharpened my ability to decipher complex technical it would need uncountable labor effort to install or switch the documentation and offered valuable insights into the innovative physical SIM card. Furthermore, not all the devices support and precise solutions employed by industries. Studying industry multiple profiles simultaneously. Depending on different device standards and official documents not only deepened my architecture designs, some smartphones reserve only one slot understanding but also highlighted the nuanced approaches for the physical SIM card to save the device space. The users are used to address challenges. Jan Janak’s feedback during the limited to choosing specific model of devices with multiple SIM paper revision phase was instrumental in refining the report card slots to equip with more than one profile on their devices. for accuracy and coherence. This report contains many details of the general eSIM Moreover, the physical cards limited the users’ willingness to switch subscriptions between different service providers. To solution for customer devices because the eSIM solution for switch the subscription, the customer must order the service IoT architecture is developed chiefly based on the prior one. and wait for the physical card to arrive to start using the service. Knowing the architecture and standard procedure for customer To help resolve the problems of the physical SIM cards devices will help researchers and developers to more easily and enhance the users’ user experience, eSIM was introduced transplant eSIM technology from current widely deployed to achieve remote SIM provisioning. Instead of using the customer devices to IoT devices. This report introduces: (1) the physical SIM card, an embedded SIM (called an eUICC) architecture of the eSIM, which is simplified, focusing on the integrated into the device will accommodate multiple SIM major components and each component’s brief introduction; Profiles, which contain the operator and subscriber data to (2) the architecture of the eSIM for IoT environment; (3) The connect to the operator’s network. The end user can scan the detailed procedure flow of Common Mutual Authentication" 2401.04327v1,"Implementation of space-division multiplexed entanglement-based quantum cryptography over multicore fiber Evelyn A. Ortega, 1, 2, 3, ∗ Jorge Fuenzalida, 4, † Krishna Dovzhik, 1, 2, 5 Rodrigo F. Shiozaki, 6 Juan Carlos Alvarado-Zacarias, 7 Rodrigo Amezcua-Correa, 7 Martin Bohmann, 1, 2, 8 Sören Wengerowsky, 1, 2, 3 and Rupert Ursin 1, 2, 8 1 Institute for Quantum Optics and Quantum Information - IQOQI Vienna, Austrian Academy of Sciences, Boltzmanngasse 3, 1090 Vienna, Austria 2 Vienna Center for Quantum Science and Technology (VCQ), Vienna, Austria 3 Current address: ICFO-Institut de Ciencies Fotoniques, The Barcelona Institute of Science and Technology, 08860 Castelldefels (Barcelona), Spain 4 Technical University of Darmstadt, Department of Physics, Institute for Applied Physics, Schloßgartenstraße 7, 64289 Darmstadt, Germany 5 Current address: Department of Neuroscience and Biomedical Engineering, Aalto School of Science, Aalto University, Espoo, Finland 6 Departamento de Fı́sica, Universidade Federal de São Carlos, Rodovia Washington Luı́s, km 235—SP-310, 13565-905 São Carlos, SP, Brazil 7 CREOL, The University of Central Florida, Orlando, Florida 32816, USA 8 Current address: Quantum Technology Laboratories GmbH, Clemens-Holzmeister-Straße 6/6, 1100 Vienna, Austria (Dated: January 10, 2024) Quantum communication implementations require efficient and reliable quantum channels. Optical fibers have proven to be an ideal candidate for distributing quantum states. Thus, today’s efforts address overcoming issues towards high data transmission and long-distance implementations. Here, we experimentally demonstrate the secret key rate enhancement via space-division multiplexing using a multicore fiber. Our multiplexing technique exploits the momentum correlation of photon pairs generated by spontaneous parametric downconversion. We distributed polarization-entangled photon pairs into opposite cores within a 19-core multicore fiber. We estimated the secret key rates in a configuration with 6 and 12 cores from the entanglement visibility after transmission through 411 m long multicore fiber. I. INTRODUCTION Quantum key distribution (QKD) is an established quantum communication method that allows generation of identical secret keys between two remotely separated parties with unconditional security [1, 2]. The communication protocols to share the key can be based on entangled states [3, 4] or weak coherent states [5, 6]. This key needs to be shared by trusted channels such as free-space links on ground [7, 8], ground-to-space [9, 10] and optical fiber links [11–13]. Over the years, improvements in optical fiber fabrication have enabled access to new fibers, which offer flexibility, reliability, and high fidelity in data transmission [14]. This has allowed implementing quantum key distribution schemes based on single-photon sources over single-mode fibers (SMF) [15], few-mode fibers [16, 17], multimode fibers [18, 19], vortex fibers [20], and multicore fibers (MCF) [21, 22]. Recently, schemes based on entangled-photon states have been shown to generate a positive key rate over a long-distance fiber link [23, 24]. These schemes represent a challenge due to high propagation losses in fiber, polarization mode dispersion, and stabilization of the state in the propagation. In order to implement quantum communication schemes over long fiber links, it is crucial to develop techniques to increase channel transmission capacity. One of the most ∗ evelyn.ortega@icfo.eu † jorge.fuenzalida@tu-darmstadt.de widely used techniques for that is multiplexing, by transmitting more than one signal through the same communication channel. This has been implemented based on the wavelength (WDM) degree of freedom to increase the secure key rate [25, 26] and carry out novel entanglement-based quantum networks [27, 28]. But it is also crucial to explore new domains such as space-division multiplexing (SDM) to overcome WDM’s capacity [29–31]. In particular, SDM technology over multicore fiber (MCF) has captured attention due to the low crosstalk between cores. MCF has been employed as a quantum communication link to increase the secret key rate [32], implementation of QKD schemes included integrated into silicon photonic chips [22], simultaneous transmission of classical and quantum signals over a single MCF [21], and generation of high-dimensional states [33]. Furthermore, the multiple fibers available over the same fiber link show an excellent performance to distribute entangled states based on their spatial correlation [34, 35]. In this work, we experimentally demonstrate generation of parallel and independent quantum keys based on SDM over MCF using a single entangled photon source. The multiplexing is performed through the momentum correlation of the photon pairs, whereas the secure key rate is extracted from the polarization measurement outcomes by each correlated channel separately. In particular, we report the key rate associated with the 19-core configurations into the MCF, corresponding to a SDM scheme over six and twelve cores. We extrapolate the achievable key rate for the case of a fast-switching QKD setup as a function of MCF length to explore its applicabil-" 2401.04348v1,"LAMPAT: Low-Rank Adaption for Multilingual Paraphrasing Using Adversarial Training † Khoi M. Le 1, 2 * , Trinh Pham 2 * , Tho Quan 2 , Anh Tuan Luu 3 1 VinAI Research, Vietnam Ho Chi Minh City University of Technology (HCMUT), VNU-HCM, Ho Chi Minh City, Vietnam 3 Nanyang Technological University, Singapore v.khoilm1@vinai.io, phkhanhtrinh23@gmail.com, qttho@hcmut.edu.vn, anhtuan.luu@ntu.edu.sg 2 Abstract Paraphrases are texts that convey the same meaning while using different words or sentence structures. It can be used as an automatic data augmentation tool for many Natural Language Processing tasks, especially when dealing with lowresource languages, where data shortage is a significant problem. To generate a paraphrase in multilingual settings, previous studies have leveraged the knowledge from the machine translation field, i.e., forming a paraphrase through zero-shot machine translation in the same language. Despite good performance on human evaluation, those methods still require parallel translation datasets, thus making them inapplicable to languages that do not have parallel corpora. To mitigate that problem, we proposed the first unsupervised multilingual paraphrasing model, LAMPAT (Low-rank Adaptation for Multilingual Paraphrasing using Adversarial Training), by which monolingual dataset is sufficient enough to generate a human-like and diverse sentence. Throughout the experiments, we found out that our method not only works well for English but can generalize on unseen languages as well. Data and code are available at https://github.com/phkhanhtrinh23/ LAMPAT. Introduction Paraphrase generation involves the transformation of a given sentence or phrase into its equivalent form while preserving its semantic content. By leveraging the power of NLP techniques, paraphrase generation can enhance several applications, such as machine translation (Freitag et al. 2020), information retrieval (Lewis et al. 2020), question-answering systems (Gan and Ng 2019), and text summarization (Cao et al. 2017). However, most existing approaches in paraphrase generation focus on a single language such as English, limiting their effectiveness in multilingual scenarios where accurate and contextually appropriate paraphrases are crucial. Most of the current approaches for multilingual paraphrasing are built around the mechanism of machine translation. Thompson and Post (2020b) make use of the multilingual neural machine translation (MNMT) model from * These authors contributed equally. † Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: The training process of LAMPAT consists of multiple stages. Firstly, we create a synthetic parallel corpus using unsupervised monolingual data. Next, we utilize LoRA to effectively fine-tune our model. Finally, we obtain the self-supervised model LAMPAT through the utilization of Virtual Adversarial Training. Thompson and Post (2020a) to translate between the same source and target languages with a special decoding algorithm to reduce the lexical overlaps, creating a paraphrase of the input text. Meanwhile, round-trip translation (Federmann, Elachqar, and Quirk 2019), which creates a pivot language for source language to translate forth and back to create a different wording output, is another approach for paraphrase generation. While the machine translation approach is widely recognized for its effectiveness in multilingual paraphrasing, it encounters various limitations. One primary hurdle is the necessity of obtaining reliable parallel corpora of high quality for machine translation, which can be challenging to obtain in real-world scenarios. Another drawback lies in the lack of diversity in the generated output, often resulting in output sequences that closely resemble the input and fail to preserve crucial information present in the original input, as depicted in Table 1. Many MNMT models utilize heuristic blocking techniques during inference to avoid generating output sequences that are identical to the input. However, this approach limits the model’s ability to alter word order or employ diverse syntactic structures, such as inversion or active-to-passive transformations. Consequently, the generation lacks diversity. Furthermore, these blocking algorithms heavily rely on the distribution of the vocabulary. For instance, Thompson and Post (2020b) reduce the probability of selecting subsequent subwords in n-grams to encourage the model to choose different subwords. Neverthe-" 2401.04349v1,"WebGPU-SPY: Finding Fingerprints in the Sandbox through GPU Cache Attacks Ethan Ferguson ∗ Adam Wilson ∗ Hoda Naghibijouybari Binghamton University Binghamton, NY, USA efergus3@binghamton.edu Binghamton University Binghamton, NY, USA awilso16@binghamton.edu Binghamton University Binghamton, NY, USA hnaghibi@binghamton.edu ABSTRACT Microarchitectural attacks on CPU structures have been studied in native applications, as well as in web browsers. These attacks continue to be a substantial threat to computing systems at all scales. With the proliferation of heterogeneous systems and integration of hardware accelerators in every computing system, modern web browsers provide the support of GPU-based acceleration for the graphics and rendering processes. Emerging web standards also support the GPU acceleration of general-purpose computation within web browsers. In this paper, we present a new attack vector for microarchitectural attacks in web browsers. We use emerging GPU accelerating APIs in modern browsers (specifically WebGPU) to launch a GPU- based cache side channel attack on the compute stack of the GPU that spies on victim activities on the graphics (rendering) stack of the GPU. Unlike prior works that rely on JavaScript APIs or software interfaces to build timing primitives, we build the timer using GPU hardware resources and develop a cache side channel attack on Intel’s integrated GPUs. We leverage the GPU’s inherent parallelism at different levels to develop high-resolution parallel attacks. We demonstrate that GPU-based cache attacks can achieve a precision of 90% for website fingerprinting of 100 top websites. We also discuss potential countermeasures against the proposed attack to secure the systems at a critical time when these web standards are being developed and before they are widely deployed. CCS CONCEPTS • Security and privacy → Side-channel analysis and countermeasures. KEYWORDS side channel, GPU attack, website fingerprinting ACM Reference Format: Ethan Ferguson, Adam Wilson, and Hoda Naghibijouybari. 2024. WebGPU- SPY: Finding Fingerprints in the Sandbox through GPU Cache Attacks. In Proceedings of 2024 ACM ASIA Conference on Computer and Communications ∗ Both authors contributed equally to this research. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ASIACCS ’24, July 1–5, 2024, Singapore © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXXX Security (ASIACCS ’24). ACM, New York, NY, USA, 14 pages. https://doi.org/ XXXXXXX.XXXXXXXX 1 INTRODUCTION Microarchitectural side channel attacks leak sensitive data through unintended side-effects of program execution observed through shared microarchitectural resources. Attacks have been developed on a variety of microarchitectural structures including different levels of cache [28, 37, 38, 47, 56, 59–61], branch predictors [24], random number generators [23], and others [17, 34]. These attacks continue to be a substantial threat to computing systems at all scales where trusted software can be co-located with untrusted or compromised software on the same hardware resources. Caches (especially the cross-core shared Last-Level Cache (LLC)) have served as the most important microarchitectural structure to implement timing side channels. In a cache side channel, a spy application first brings the shared cache to a known state, waits for the victim application to execute, and then measures the access time to the shared cache to observe contention from the victim application’s activities, which are potentially correlated to its secret data due to some data-dependent software or hardware implementation details. To distinguish the cache hits from cache misses in a cache attack, a high-resolution timer is required. Although attacks from native applications can be very dangerous, side channels, specifically timing attacks have been recently studied in JavaScript, as well. Most of these attacks use JavaScript’s timer [8] to carry out timing measurement [16, 45, 54]. To protect against these timing attacks, all major browsers limited the resolution of the timer [1, 18, 62]. As a result, the timer is not precise enough to distinguish cache hits from misses. Several works propose some timing primitives in JavaScript to recover high-precision timers [26, 35, 36, 50]. Gras et al. [26] propose two mechanisms (shared memory counter and time to tick) to craft a high-resolution timer in JavaScript. They use a dedicated JavaScript web worker for counting through a shared memory area (SharedArrayBuffers [39] interface) between the main JavaScript thread and the counting web worker. To respond to these attacks, major browser vendors disabled the SharedArrayBuffers interface in JavaScript [4]. This interface has been recently re-enabled for secure contexts only (same-origin) [39]. Some recent works developed coarse-grained cache attacks using the limited low-precision timer in JavaScript. Shusterman et al. [52] use the low-precision timer to implement a cache occupancy channel on LLC; a coarsegrained Prime+Probe attack in which the whole LLC is being probed. Although no spatial information on the victim’s accesses can be extracted by cache occupancy channels, these coarse-grained attacks have been shown to be effective for the aggregate measurement of the victim’s activities (such as website fingerprinting)." 2401.04355v1,"The effect of charm quark on chiral phase transition in N f = 2 + 1 + 1 holographic QCD Hiwa A. Ahmed, 1, 2, ∗ Mamiya Kawaguchi, 1, † and Mei Huang 1, ‡ 1 School of Nuclear Science and Technology, University of Chinese Academy of Sciences, Beijing 100049, China 2 Department of Physics, College of Science, Charmo University, 46023, Chamchamal, Sulaymaniyah, Iraq (Dated: January 10, 2024) We investigate the effect of charm quark on the chiral phase transition of light quarks at finite temperature based on the four-flavor soft-wall holographic QCD model. In the massless limit, we find that the thermal chiral phase transition is of the second order in the four-quark flavor system. In the case with the massive charm quark and the massless light and strange quarks, the order of the phase transition changes to the first order. This is due to the quark flavor symmetry breaking which is associated with the violation of the U (1) axial symmetry. Once the light and strange quarks get massive, the explicit chiral symmetry breaking becomes eminent, then the crossover phase transition is realized at the physical quark masses. We also map the order of the phase transition on a phase diagram in the quark mass plane where the light- and strange-quark masses are degenerate but differ from the value of the charm quark mass. This phase diagram is an extension of the conventional Columbia plot to the four-quark flavor system. I. INTRODUCTION Investigating the thermal QCD phase transition is an important subject for understanding the hot environment relevant to the initial stage of heavy-ion collisions and the early universe. To clarify its phase structure, the order of the chiral phase transition, especially depending on the number of quark flavors (N f ) and the current quark masses (m f ), has been extensively investigated by the lattice QCD framework [1–7], the functional renormalization group (FRG) method [8–15], Dyson-Schwinger equations [16, 17] and chiral effective model approaches [18–20]. In a pioneer work, the existence of universality classes has been investigated by using the renormalization group analysis in the linear sigma model approach at the one-loop calculation with the ϵ-expansion. They have concluded that the chiral phase transition is of the first order for N f ≥ 3 with massless quarks [18]. Motivated by this first research, the order of the chiral phase transition in the three quark flavor system has been mapped onto the plane of the light- and strange-quark masses. This phase diagram is referred to as the Columbia plot [1]. Interestingly, the first order phase transition domain is anticipated to emerge around the small quark mass regions and it is closely associated with the contribution of the U (1) axial anomaly in the effective model analyses [18–20]. However, the definite evidence of the first order domain has not been observed in the lattice QCD simulation. The specifics of the Columbia plot is still unclear. Shifting our focus to the multi-flavor system (N f ≥ 4) could offer a fresh perspective on the thermal QCD phase transition. Recently, the lattice QCD study has endeavored to extend the Columbia plot to the multi-flavor system incorporating more than four quark flavors [21]. According to this lattice simulation, the chiral phase transition is estimated to be of the second order in the massless limit with N f ≤ 6. This lattice estimation differs from the first study based on searching the universality class in the linear sigma model approach [18]. The discrepancy between the lattice QCD observation and the effective model results becomes more apparent through the investigation in the multi-flavor system. Although the extension has been made by the lattice work [21], our understanding of the phase structure in the multi-flavor system is still limited even compared to the study of the conventional Columbia plot. In our study, we address the thermal chiral phase transition in such a multi-flavor system, specifically focusing on the four-quark flavor system, by using the holographic QCD approach. The anti-de Sitter/conformal field theory (AdS/CFT) correspondence and the conjecture of the gravity/gauge duality is a powerful tool for investigating the non-perturbative QCD property [22, 23]. There are two main approaches in holographic QCD: the top-down approach and the bottom-up approach. Unlike the top-down approach, the bottom-up holographic QCD aims to describe the QCD phenomena observed in the experimental physics and also it is attempted to build a realistic holographic QCD model. As a development, it has been pointed out that the dilaton configuration plays an important role in providing the realistic QCD phenomena. Taking into account the ∗ hiwa.a.ahmed@mails.ucas.ac.cn † mamiya@ucas.ac.cn ‡ huangmei@ucas.ac.cn" 2401.04406v1,"M AP AI: P RECISION IN B UILDING S EGMENTATION Sander Riisøen Jyhne The Norwegian Mapping Authority University of Agder Grimstad, Norway sander.jyhne@kartverket.no Per Arne Andersen Centre for Artificial Intelligence Research University of Agder Grimstad, Norway per.andersen@uia.no Karianne Ormseth AI:Hub Grimstad, Norway Morten Goodwin Centre for Artificial Intelligence Research University of Agder Grimstad, Norway morten.goodwin@uia.no Ivar Oveland The Norwegian Mapping Authority Kristiansand, Norway morten.goodwin@uia.no Mathilde Ørstavik Norkart Oslo, Norway Alexander Salveson Nossum Norkart Kristiansand, Norway Andrew C. Flatman SDFI Denmark A BSTRACT MapAI: Precision in Building Segmentation is a competition arranged with the Norwegian Artificial Intelligence Research Consortium (NORA) 1 in collaboration with Centre for Artificial Intelligence Research at the University of Agder (CAIR) 2 , the Norwegian Mapping Authority 3 , AI:Hub 4 , Norkart 5 , and the Danish Agency for Data Supply and Infrastructure 6 . The competition will be held in the fall of 2022. It will be concluded at the Northern Lights Deep Learning conference focusing on the segmentation of buildings using aerial images and laser data. We propose two different tasks to segment buildings, where the first task can only utilize aerial images, while the second must use laser data (LiDAR) with or without aerial images. Furthermore, we use IoU and Boundary IoU [1] to properly evaluate the precision of the models, with the latter being an IoU measure that evaluates the results’ boundaries. We provide the participants with a training dataset and keep a test dataset for evaluation. Keywords artificial intelligence; machine learning; deep learning; computer vision; remote sensing; semantic segmentation Keywords First keyword · Second keyword · More 1 Introduction Buildings are an essential component of information regarding population, policy-making, and city management [2]. Using computer vision technologies such as classification, object detection, and segmentation has proved helpful in several scenarios, such as urban planning and disaster recovery [2, 3]. Segmentation is the most precise method and can give detailed insights into the data as it highlights the area of interest. 1 https://nora.ai https://cair.uia.no 3 https://kartverket.no 4 https://aihub.no/ 5 https://www.norkart.no 6 https://eng.sdfi.dk/ 2" 2401.04418v1,"Rényi entropy, Rényi divergence, Jensen-Rényi information generating functions and properties Shital Saha ∗ and Suchandan Kayal † Department of Mathematics, National Institute of Technology Rourkela, Rourkela-769008, India January 10, 2024 Abstract In this paper, we propose Rényi information generating function (RIGF) and discuss its various properties. The relation between the RIGF and Shannon entropy of order q > 0 is established. Several bounds are obtained. The RIGF of escort distribution is derived. Furthermore, we introduce Rényi divergence information generating function (RDIGF) and show its effect under monotone transformations. Finally, we propose Jensen-Rényi information generating function (JRIGF) and introduce its several properties. Keywords: Rényi entropy, Rényi divergence, Jensen-Rényi divergence, Information generating function, Monotone transformation. MSCs: 94A17; 60E15; 62B10. 1 Introduction It is well-known that various entropies (Shannon, fractional Shannon, Rényi) and divergences (Kullback-Leibler, Jensen, Jensen-Shannon, Jensen-Rényi) play a pivotal role in science and technology; specifically in coding theory (see Csiszár (1995), Farhadi and Charalambous (2008)), statistical mechanics (see De Gregorio and Iacus (2009), Kirchanov (2008)), and statistics and related areas (see Nilsson and Kleijn (2007), Zografos (2008), Andai (2009)). Rényi entropy (see Rényi (1961)), also called α-entropy or the entropy of order α, is a generalization of the Shannon entropy. Consider two absolutely continuous non-negative random variables X and Y with respective probability density functions (PDFs) f (·) and g(·). The ∗ † Email address: shitalmath@gmail.com, 520MA2012@nitrkl.ac.in Email address (corresponding author): kayals@nitrkl.ac.in, suchandan.kayal@gmail.com 1" 2401.04462v1,"Constructing a weakly-interacting fixed point of the Fermionic Polchinski equation Rafael Leon Greenblatt ∗† Dipartimento di Matematica Università degli Studi di Roma “Tor Vergata” Rome, Italy. January 10, 2024 Abstract I rigorously prove the existence of a nontrivial fixed point of a family of continuous renormalization group flows corresponding to certain weakly interacting Fermionic quantum field theories with a parameter in the propagator allowing the scaling dimension to be tuned in a manner analogous to dimensional regularization. 1 Introduction Let G Λ (x, y) be the infinitesimal single-scale propagator, which has the selfsimilarity property G Λ (x, y) = Λ 2[ψ]−1 G(Λx, Λy) (1.1) here G may be a matrix with internal indices which are unaffected by rescaling, and [ψ] > 0 is the dimension of the field. Then the Polchinski equation is     1 δ 1 δ δ δ ∂ V Λ (ψ) − V Λ (ψ) = , G Λ V Λ (ψ), G Λ V Λ (ψ) (1.2) ∂Λ 2 δψ δψ 2 δψ δψ here V Λ (ψ) is a map from (0, ∞) to a Grassmann algebra (so the product is noncommutative), and the variational derivative is a Grassman derivative; ∗ E-mail address: greenblatt@mat.uniroma2.it Supported by the MIUR Excellence Department Project MatMod@TOV awarded to the Department of Mathematics, University of Rome Tor Vergata, CUP E83C23000330006. † 1" 2401.04522v1,"LUNA: A Framework for Language Understanding and Naturalness Assessment Marat Saidov ∗ , Aleksandra Bakalova ∗ , Ekaterina Taktasheva Vladislav Mikhailov, Ekaterina Artemova Work done at HSE University Correspondence: ekaterina.l.artemova@gmail.com Abstract The evaluation of Natural Language Generation (NLG) models has gained increased attention, urging the development of metrics that evaluate various aspects of generated text. LUNA addresses this challenge by introducing a unified interface for 20 NLG evaluation metrics. These metrics are categorized based on their reference-dependence and the type of text representation they employ, from string-based ngram overlap to the utilization of static embeddings and pre-trained language models. The straightforward design of LUNA allows for easy extension with novel metrics, requiring just a few lines of code. LUNA offers a userfriendly tool for evaluating generated texts. 1 Introduction In recent years, there has been a growing interest in finding better ways to evaluate how well natural language generation (NLG) models perform (Zhou et al., 2022; Sai et al., 2022). This involves creating new metrics that assess different aspects of the generated text, ranging from nuanced taskspecific phenomena (Zhao et al., 2023) to overall quality (Rei et al., 2020) and its correlation with human judgements (Chhun et al., 2022a). However, comparing NLG models directly is becoming more challenging due to the increasing diversity of evaluation metrics and datasets used to showcase novel evaluation approaches. Nonetheless, a consistent and reproducible way to run evaluation is crucial for the progress in the field. Prior efforts have yielded valuable unified evaluation tools, such as HuggingFace Evaluate 1 , which targets LLM performance, and TextAttack (Morris et al., 2020), focused on large language models’ (LLMs) robustness evaluation. Building on this progress, we introduce a specialized tool for evalu- ∗ 1 Equal contribution. hf.co/evaluate/ ating NLG models with respect to a wide range of metrics. In this paper, we present LUNA, a Python framework for language understanding and naturalness assessment. LUNA offers a unified interface encompassing 20 NLG evaluation metrics widely used in popular sequence-to-sequence and openended text generation tasks. These metrics are categorized based on two primary design choices: (i) reference-based and reference-free metrics (i.e., metrics that require and do not require any reference to compare the generated output with), and (ii) the text representation they utilize, which range from string-based n-gram overlap to employing word embedding models and contextualized representations from pre-trained LLMs. To streamline the evaluation, we provide two setups, in which either a single example or a batch of examples is evaluated. This ensures that LUNA can accommodate a wide range of evaluation scenarios, from fine-grained analysis to large-scale assessments. LUNA is agnostic to specific tasks and can be applied to assess the outputs of any generative LLMs. This includes task-specific models like machine translation, as well as more general open-ended generation models. LUNA leverages HuggingFace Transformers (Wolf et al., 2020), enabling integration with any Transformer-based LLM required for specific metrics. Additionally, the framework’s design allows for straightforward extensions with new metrics, requiring only a few lines of code. LUNA is distributed under the MIT license as a Python package installed via direct cloning from GitHub 2 . Use cases for LUNA include: (i) Comparative analysis and correlation of NLG evaluation metrics from existing literature; (ii) Ranking of generation hypotheses based on multiple metrics; (iii) Development and testing of novel NLG evaluation metrics. 2 https://github.com/Moonlight-Syntax/LUNA" 2401.04526v1,"Journal of Business Research 173 (2024) 114463 Contents lists available at ScienceDirect Journal of Business Research journal homepage: www.elsevier.com/locate/jbusres Ecosystem orchestration practices for industrial firms: A qualitative meta-analysis, framework development and research agenda Lei Shen a , Qingyue Shi a , Vinit Parida b, c, * , Marin Jovanovic d a Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China Entrepreneurship and Innovation, Luleå University of Technology, 97187, Luleå, Sweden c Department of Management, University of Vaasa, PO Box 700, FI-65101 Vaasa, Finland d Department of Operations Management, Copenhagen Business School, DK-2000 Frederiksberg, Denmark b A R T I C L E I N F O A B S T R A C T Keywords: Ecosystem orchestration Innovation ecosystem Orchestration practices Governance Coordination Qualitative meta-analysis This study ventures into the dynamic realm of ecosystem orchestration for industrial firms, emphasizing its significance in maintaining competitive advantage in the digital era. The fragmented research on this important subject poses challenges for firms aiming to navigate and capitalize on ecosystem orchestration. To bridge this knowledge gap, we conducted a comprehensive qualitative meta-analysis of 31 case studies and identified multifaceted orchestration practices employed by industrial firms. The core contribution of this research is the illumination of five interdependent but interrelated orchestration practices: strategic design, relational, resource integration, technological, and innovation. Together, these practices are synthesized into an integrative frame­ work termed the “Stirring Model,” which serves as a practical guide to the orchestration practices. Furthermore, the conceptual framework clarifies the synergy between the identified practices and highlights their collective impact. This study proposes theoretical and practical implications for ecosystem orchestration literature and suggests avenues for further research. 1. Introduction Over the past two decades, theoretical studies of ecosystems have become increasingly prevalent and valuable in strategic management research (Altman et al., 2022; Jacobides et al., 2018; Jacobides et al., 2024). Firms manage external environment dependencies through net­ works established by formal bi-lateral inter-organizational relation­ ships, which are strategically significant (Shipilov & Gawer, 2020). Ecosystems, on the other hand, comprise a set of actors with varying degrees of multi-lateral, non-generic complementarities that are not fully hierarchically controlled (Jacobides et al., 2018). Therefore, eco­ systems are characterized by greater openness, wider heterogeneity of partners, and ecosystem-level outputs that create value for the final consumer (Kapoor, 2018). Orchestration has emerged in both literature streams as a necessary management approach facilitating activities within such loosely coupled systems, networks (Dhanaraj & Parkhe, 2006; Giudici et al., 2018), and ecosystems (Autio, 2022; Sjödin et al., 2022). However, the hierarchically independent yet technologically and economically interdependent nature of multilateral ecosystem partners and the focal ecosystem value proposition make ecosystem orchestration a distinct strategic management concept (Autio, 2022; Thomas & Autio, 2020). Ecosystem orchestration involves deliberate, purposeful actions usually taken by a hub firm, a keystone player, or an orchestrator (Dhanaraj & Parkhe, 2006; Iansiti & Levien, 2004; Iyer et al., 2006). The literature argues that an ecosystem orchestrator “may play an indis­ pensable role in supporting the ongoing recombination of members’ knowledge to explore new opportunities” (Giudici et al., 2018). Although the role of ecosystem orchestrator is perceived as offering significant prospects for value capture within the ecosystem (Rietveld et al., 2020), the objective of orchestration is to create and appropriate value among all partners in the ecosystem (Altman et al., 2022; Dattée et al., 2018; Majchrzak et al., 2023). The ecosystem orchestrator requires non-contractual orchestration practices (Autio, 2022). These practices are imperative for fostering voluntary, proactive co-creation among ecosystem partners (Autio, 2022). For instance, Reypens et al. (2021) identified three fundamental orchestration practices - connecting, facilitating, and governing - used by orchestrators to mobilize diverse ecosystem partners. Nevertheless, given the multifaceted nature of ecosystem orchestration, the existing research body remains comparatively segmented. First, orchestration * Corresponding author at: Entrepreneurship and Innovation, Luleå University of Technology, 97187, Luleå, Sweden. E-mail addresses: slei@dhu.edu.cn (L. Shen), qingyue.shi@mail.dhu.edu.cn (Q. Shi), vinit.parida@ltu.se (V. Parida), mjo.om@cbs.dk (M. Jovanovic). https://doi.org/10.1016/j.jbusres.2023.114463 Received 17 March 2023; Received in revised form 10 December 2023; Accepted 14 December 2023 Available online 6 January 2024 0148-2963/© 2023 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)." 2401.04529v1,"Comment on Infrared dielectric function of GaAs 1-x P x semiconductor alloys near the reststrahlen bands [Appl. Phys. Lett. 123, 172102 (2023)] A. Elmahjoubi, T. Alhaddad, A.V. Postnikov and O. Pagès a) LCP-A2MC, UR 4632, Université de Lorraine, 57000 Metz, France a) Author to whom correspondence should be addressed: olivier.pages@univ-lorraine.fr Though extensively studied since the emergence of zincblende-cubic AB 1-x C x semiconductor alloys (zb-SCA) in the sixties, the phonon mode behavior of GaAs 1-x P x remains a subject of debate to this day. Recently Zollner et al. 1 reported on a thorough far-infrared (IR) ellipsometry study of the vibrational spectra of GaAs 1-x P x spanning the composition domain. They suggest that their experimental data are better described by the cluster model 2 (CM) than by our percolation model 3 (PM). On the basis of Zollner’s experimental data, kindly made available to us, we show that the PM description basically applies to GaAs 1-x P x , contrary to the authors’ original allusion. We start with a short overview of the subject, illustrating our point with a short discussion, and deploying all the details which might be interesting into the Supplementary material (the related figures are prefixed S below). A short chronology emphasizes two pioneering far-infrared (IR) reflectivity studies of GaAs 1-x P x revealing separate Ga-As and Ga-P phonon/resthrahlen bands with a fine structure in each case. 2,4 This was explained by the authors of Ref. 2 (initialed VB) by introducing their CM formalizing a sensitivity of bond vibrations to first neighbors, out of four possible Ga-centered cluster units per bond depending on the number of As/P at the vertices. This comes to divide each phonon band into four CM sub-bands (1-bond→4-mode). VB could achieve a fair modeling of their raw GaAs 1-x P x IR-reflectivity spectra within their CM, but only by assuming a pronounced trend towards local phase separation. 2 Two decades ago the same spectra could be reproduced by assuming an ideally random As↔P substitution within our PM that distinguishes between like bonds depending on whether they vibrate in “same” or “alien” environments defined up to first neighbors (1-bond→2-phonon). 3 The PM had only recently been worked out to explain the bimodal Be-related Raman signal of Zn 1-x Be x -chalcogenides 5 that exhibit an unusually large contrast in their bond physical properties (length, stiffness) 6 exalting the phonon properties. Cebulski et al. 7 later operated a variant of the CM also based on a random As↔P substitution that proved efficient to replicate the imaginary part of the GaAs 1-x P x relative dielectric function 𝐼𝑚{𝜀 𝑟 (𝜔,𝑥)} – that captures the transverse optic (TO) resonances (see supplementary material), as reconstructed from a Kramers-Kronig (KK) transformation of the raw/digitized IR- reflectivity spectra of VB. This summarizes the state of the art before the recent IR-ellipsometry study by Zollner et al. 1 of GaAs x P 1-x single crystals deposited on GaAs. In the cited work, the 𝐼𝑚 {𝜀 𝑟 (𝜔, 𝑥)} spectra were extracted (Fig. S1, symbols) by inversion of the measured raw ellipsometry angles through a fitting process that solves the Fresnel equations of the GaAs 1-x P x /GaAs heterostructure wavelength-per-wavelength. Based on their 𝐼𝑚{𝜀 𝑟 (𝜔, 𝑥)} data, in fact remarkably consistent with those of Cebulski et al., 7 Zollner et al. conclude towards a multi-phonon mode behavior of the CM-type for GaAs x P 1-x , rather than of the PM-type. 1 However, in our view, the CM is not realistic physically, as originally argued in Ref. 3 and further on in this comment (Fig. S2). Omitting spurious features specific to some samples (marked by asterisks in Fig. S1; eliminated by slightly changing the alloy composition, hence presumably not intrinsic to random GaAs 1-x P x -alloying but likely due to slight composition inhomogeneities 1,8 ), the 𝐼𝑚 {𝜀 𝑟 (𝜔, 𝑥)} GaAs x P 1-x spectra of Zollner et al. 1 can be grasped in three {1×(Ga-As),2×(Ga-P)} main modes. A dramatic intensity interplay occurs within the Ga-P doublet. The lower line dominates over the upper one at large 𝑥 values, yet the relation gets inverted towards small 𝑥. Intensity matching between the two Ga-P submodes is achieved at 𝑥~0.275, 1,7 and not at 𝑥~0.5 as predicted by our original first-neighbor version of the PM tested on the raw GaAs x P 1-x IR-reflectivity data of VB. 3 Focusing on 𝐼𝑚{𝜀 𝑟 (𝜔,𝑥)} , apparently more reliable/informative than the raw IR-reflectivity signal when searching to elucidate the nature of the 1" 2401.04531v2,"MERA: A Comprehensive LLM Evaluation in Russian Alena Fenogenova 1 , Artem Chervyakov 1,2 , Nikita Martynov 1 , Anastasia Kozlova 1 , Maria Tikhonova 1,2 , Albina Akhmetgareeva 1 , Anton Emelyanov 1 , Denis Shevelev 1 , Pavel Lebedev 1 , Leonid Sinev 1 , Ulyana Isaeva 1 , Katerina Kolomeytseva 1 , Daniil Moskovskiy 3 , Elizaveta Goncharova 2,4 , Nikita Savushkin 1 , Polina Mikhailova 1 , Denis Dimitrov 4,5 , Alexander Panchenko 3, 4 , Sergei Markov 1 1 SberDevices, 2 HSE University, 3 Skoltech, 4 AIRI, 5 SberAI Correspondence: alenush93@gmail.com Abstract Over the past few years, one of the most notable advancements in AI research has been in foundation models (FMs), headlined by the rise of language models (LMs). As the models’ size increases, LMs demonstrate enhancements in measurable aspects and the development of new qualitative features. However, despite researchers’ attention and the rapid growth in LM application, the capabilities, limitations, and associated risks still need to be better understood. To address these issues, we introduce an open Multimodal Evaluation of Russian-language Architectures (MERA), a new instruction benchmark for evaluating foundation models oriented towards the Russian language. The benchmark encompasses 21 evaluation tasks for generative models in 11 skill domains and is designed as a black-box test to ensure the exclusion of data leakage. The paper introduces a methodology to evaluate FMs and LMs in zero- and few-shot fixed instruction settings that can be extended to other modalities. We propose an evaluation methodology, an open-source code base for the MERA assessment, and a leaderboard with a submission system. We evaluate open LMs as baselines and find that they are still far behind the human level. We publicly release MERA to guide forthcoming research, anticipate groundbreaking model features, standardize the evaluation procedure, and address potential societal drawbacks. 1 Introduction Recent advancements in Natural Language Processing (NLP) have fostered the development of Large Language Models (LLMs) that exhibit a new level of task-solving performance. The rapid development of their abilities raises questions about their proper evaluation in various aspects, including natural language understanding, ethical judgments, expert knowledge, etc. Also, the latest research (Bommasani et al., 2023; Ye et al., 2023) has raised an essential question of standardized evaluation protocol which should cover a broad spectrum of metrics and possible usage scenarios to mitigate the risks associated with AI adoption. In recent years, AI research has arguably advanced the most in foundation models (FMs) (Bommasani et al., 2021), which are models trained on broad data at a scale and adaptable to various downstream tasks. Furthermore, they interact with humans via free-form text instructions, which makes them general-purpose text interfaces for a broad range of scenarios. These models transform how AI systems work and lead to significant societal consequences, which makes it necessary to carefully evaluate their abilities. The community has addressed the issue with several recently created benchmarks: BIG-bench (Srivastava et al., 2023), HELM (Bommasani et al., 2023), MT-Bench (Zheng et al., 2023) which test models’ expert knowledge, coding skills and advanced abilities lying beyond the scope of classic benchmarks. However, most of these “new generation” benchmarks are constructed for the English language, while Russian, at this point, lacks a fair instrument for transparent and independent LLM evaluation. Benchmarks like Russian SuperGLUE (Shavrina et al., 2020b) and TAPE (Taktasheva et al., 2022) are becoming obsolete, and there is a need to cover the evaluation of advanced abilities of new models. Current Russian benchmarks should be revised to satisfy recent trends and challenges and to foster an understanding of LLMs’ behavior." 2401.04534v1,"Testing Human-Robot Interaction in Virtual Reality: Experience from a Study on Speech Act Classification Sara Kaszuba Sandeep Reddy Sabbella Francesco Leotta kaszuba@diag.uniroma1.it Sapienza Università di Roma Rome, Italy sabbella@diag.uniroma1.it Sapienza Università di Roma Rome, Italy leotta@diag.uniroma1.it Sapienza Università di Roma Rome, Italy Pascal Serrarens Daniele Nardi pse@pale.blue PaleBlue Stavanger, Norway nardi@diag.uniroma1.it Sapienza Università di Roma Rome, Italy Figure 1: Virtual Reality environment used to conduct our experiments in both immersive and non-immersive experiences. ABSTRACT KEYWORDS In recent years, an increasing number of Human-Robot Interaction (HRI) approaches have been implemented and evaluated in Virtual Reality (VR), as it allows to speed-up design iterations and makes it safer for the final user to evaluate and master the HRI primitives. However, identifying the most suitable VR experience is not straightforward. In this work, we evaluate how, in a smart agriculture scenario, immersive and non-immersive VR are perceived by users with respect to a speech act understanding task. In particular, we collect opinions and suggestions from the 81 participants involved in both experiments to highlight the strengths and weaknesses of these different experiences. Virtual Reality, Human-Robot Interaction, Smart Agriculture, User Evaluation CCS CONCEPTS • Human-centered computing → User studies; Usability testing; Empirical studies in interaction design; Virtual reality; • Computing methodologies → Information extraction; • Applied computing → Agriculture. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. VAM-HRI ’23, March 13th, 2023, Stockholm, Sweden © 2023 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX ACM Reference Format: Sara Kaszuba, Sandeep Reddy Sabbella, Francesco Leotta, Pascal Serrarens, and Daniele Nardi. 2023. Testing Human-Robot Interaction in Virtual Reality: Experience from a Study on Speech Act Classification. In Proceedings of International Workshop on Virtual, Augmented, and Mixed-Reality for Human- Robot Interactions, Stockholm, Sweden (VAM-HRI ’23). ACM, New York, NY, USA, 8 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION The growing interest in novel technologies, such as Virtual Reality (VR), led researchers to change the way in which user studies are conducted in the field of Human-Robot Interaction (HRI). In fact, it has been shown that evaluating preliminary solutions or complete applications in VR could provide multiple benefits in terms of experimental settings, costs, and safety [11]. To this aim, a replica of the real scenario is a reasonable alternative in training people in specific tasks [13, 16, 22], validating potentially harmful actions [6, 14], testing the functionality of the developed approaches [7, 17] and conducting multiple experiments. Hence, the application of VR in all its forms of experience (either immersive or non-immersive) is highly employed in different fields of study, such as medicine, education, industry, aerospace, architecture and history. Essentially, immersive VR allows the user to ""be part of the environment"" by projecting him/her into an entirely digitally generated world. In" 2401.04543v2,"Healthcare Voice AI Assistants: Factors Influencing Trust and Intention to Use XIAO ZHAN, King’s College London, United Kingdom NOURA ABDI, Liverpool Hope University, United Kingdom WILLIAM SEYMOUR, King’s College London, United Kingdom JOSE SUCH, King’s College London, United Kingdom & VRAIN, Universitat Politecnica de Valencia, Spain AI assistants such as Alexa, Google Assistant, and Siri, are making their way into the healthcare sector, offering a convenient way for users to access different healthcare services. Trust is a vital factor in the uptake of healthcare services, but the factors affecting trust in voice assistants used for healthcare are under-explored and this specialist domain introduces additional requirements. This study explores the effects of different functional, personal, and risk factors on trust in and adoption of healthcare voice AI assistants (HVAs), generating a partial least squares structural model from a survey of 300 voice assistant users. Our results indicate that trust in HVAs can be significantly explained by functional factors (usefulness, content credibility, quality of service relative to a healthcare professional), together with security, and privacy risks and personal stance in technology. We also discuss differences in terms of trust between HVAs and general-purpose voice assistants as well as implications that are unique to HVAs. CCS Concepts: • Human-centered computing → Empirical studies in HCI ; • Security and privacy → Trust frameworks; • Applied computing → Health care information systems. Additional Key Words and Phrases: healthcare voice AI assistants, trust in voice assistants, amazon alexa, google assistant, apple siri, healthcare technologies ACM Reference Format: Xiao Zhan, Noura Abdi, William Seymour, and Jose Such. 2024. Healthcare Voice AI Assistants: Factors Influencing Trust and Intention to Use. Proc. ACM Hum.-Comput. Interact. 8, CSCW1, Article 62 (April 2024), 37 pages. https://doi.org/10.1145/3637339 1 INTRODUCTION AI assistants such as Alexa, Google Assistant and Siri are now found in millions of smart speakers, phones, and other devices. Popular because of the hands-free, convenient experience they offer, voice assistants are mainly used to play music, search for information, and control smart IoT devices in the home [10, 47, 160]. However, the capabilities of voice assistants are continuously expanding to cover other uses and enahnce user experience. Capabilities added by third parties (often called ‘skills’ or ‘actions’) continue to grow, with the number of Alexa skills surpassing 100,000 [179]. Beyond the main uses mentioned above, there are many other popular skill categories including ride hailing (e.g. Uber), checking and sending emails (e.g. Myemail), and online banking. Authors’ addresses: Xiao Zhan, King’s College London, United Kingdom, xiao.zhan@kcl.ac.uk; Noura Abdi, Liverpool Hope University, United Kingdom, abdin@hope.ac.uk; William Seymour, King’s College London, United Kingdom, william.1. seymour@kcl.ac.uk; Jose Such, King’s College London, United Kingdom and & VRAIN, Universitat Politecnica de Valencia, Spain, jose.such@kcl.ac.uk. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. 2573-0142/2024/4-ART62 $15.00 https://doi.org/10.1145/3637339 Proc. ACM Hum.-Comput. Interact., Vol. 8, No. CSCW1, Article 62. Publication date: April 2024. 62" 2401.04574v1,"Scalable Policies for the Dynamic Traveling Multi-Maintainer Problem with Alerts Peter Verleijsdonk a,c,∗ , Willem van Jaarsveld b,c , Stella Kapodistria a,c a Department of Mathematics and Computer Science Department of Industrial Engineering and Innovation Sciences c Eindhoven University of Technology, P.O. Box 513, Eindhoven 5600 MB, the Netherlands b Abstract Downtime of industrial assets such as wind turbines and medical imaging devices is costly. To avoid such downtime costs, companies seek to initiate maintenance just before failure, which is challenging because: (i) Asset failures are notoriously difficult to predict, even in the presence of real-time monitoring devices which signal degradation; and (ii) Limited resources are available to serve a network of geographically dispersed assets. In this work, we study the dynamic traveling multi- maintainer problem with alerts (K-DTMPA) under perfect condition information with the objective to devise scalable solution approaches to maintain large networks with K maintenance engineers. Since such large-scale K-DTMPA instances are computationally intractable, we propose an iterative deep reinforcement learning (DRL) algorithm optimizing long-term discounted maintenance costs. The efficiency of the DRL approach is vastly improved by a reformulation of the action space (which relies on the Markov structure of the underlying problem) and by choosing a smart, suitable initial solution. The initial solution is created by extending existing heuristics with a dispatching mechanism. These extensions further serve as compelling benchmarks for tailored instances. We demonstrate through extensive numerical experiments that DRL can solve single maintainer instances up to optimality, regardless of the chosen initial solution. Experiments with hospital networks containing up to 35 assets show that the proposed DRL algorithm is scalable. Lastly, the trained policies are shown to be robust against network modifications such as removing an asset or an engineer or yield a suitable initial solution for the DRL approach. Keywords: Maintenance, Dispatching, Decision process, Traveling maintainer problem, Deep reinforcement learning ∗ Corresponding author Email addresses: p.verleijsdonk@tue.nl (Peter Verleijsdonk), w.l.v.jaarsveld@tue.nl (Willem van Jaarsveld), s.kapodistria@tue.nl (Stella Kapodistria) Preprint submitted to European Journal of Operations Research January 10, 2024" 2401.04581v1,"The Metaplectic Representation is Faithful Christopher Chang ∗ , Simeon Hellsten † , Mario Marcos Losada ‡ and Sergiu Novac † January 2024 Abstract We develop methods to show that infinite-dimensional modules over the Iwasawa algebra KG of a uniform pro-p group are faithful and apply them to show that the metaplectic representation for the group G = exp(p sp 2n (Z p )) is faithful. 1 Introduction Let p be an odd prime and G be a uniform pro-p group. Let K be a finite extension of Q p with valuation ring R := {x ∈ K : |x| p ≤ 1}. We are interested in the prime ideals of the Iwasawa algebra KG := RG ⊗ R K where RG := lim R[G/N ] and the inverse limit is taken over all open normal ←− subgroups N ◁ o G. If G has a closed normal subgroup N ◁ c G such that G/N is uniform, then (N − 1)KG = ker(KG → K(G/N )) is a prime ideal of KG so we will restrict to almost simple groups G. We are motivated by the following conjecture. Conjecture 1.1 — Let G be an almost simple uniform pro-p group. Then every non-zero prime ideal of KG has finite codimension. In particular, if the conjecture is true, then every infinite-dimensional representation of KG must be faithful. When the Lie algebra of G is of Type A, Conjecture 1.1 was proven in [Man23], but the methods there do not generalise to other types. Similar results of this form can also be found for example in [AW14]. In this paper, we develop methods to approach these types of questions more generally and we apply them to the case of G := exp(pg), where g := sp 2n (Z p ). We start with the metaplectic representation from Proposition 2.1 and explain how to lift this to an algebra ’ ÷ ’ ÷ homomorphism ρ : U (g) K → A n (R) K , where U (g) K is the affinoid enveloping algebra and A n (R) K is the completed Weyl algebra, both defined after Proposition 2.1. We can finally embed KG into ’ U (g) K and in Theorem 4.8 we then prove the following. ÷ Theorem 1.2 — The metaplectic representation ρ| KG : KG → A n (R) K is injective. The main tool to do this is the following Gluing Lemma, a special case of the general version from Section 3. Here, U (n) K = U (n) ⊗ Z p K. Proposition 1.3 — Let n, h and g := n ⊕ h be finite rank Z p -Lie algebras with corresponding ’ uniform pro-p groups N, H and G and let V be a U (g) -module and a K−Banach space, such K that (N − 1) · B V ⊆ pB V , where B V := {v ∈ V : ∥v∥ ≤ 1}. Suppose there is a subset V of V and ’ for each v ∈ V a U (h) K -submodule W v of V contained in U (n) K · v such that P • RH acts locally finitely on W := v∈V W v , meaning that every cyclic RH-submodule of W is finitely generated over R. • KH acts faithfully on W . ∗ St Anne’s College, University of Oxford St John’s College, University of Oxford ‡ Brasenose College, University of Oxford Email addresses: christopher.chang@st-annes.ox.ac.uk (C. Chang), simeon.hellsten@sjc.ox.ac.uk (S. Hellsten), mario.marcoslosada@bnc.ox.ac.uk (M. Marcos Losada), sergiu-ionut.novac@sjc.ox.ac.uk (S. Novac) † 1" 2401.04586v1,"Quasi-exactly solvable potentials in Wigner-Dunkl quantum mechanics C. QUESNE ∗ Physique Nucléaire Théorique et Physique Mathématique, Université Libre de Bruxelles, Campus de la Plaine CP229, Boulevard du Triomphe, B-1050 Brussels, Belgium Abstract It is shown that the Dunkl harmonic oscillator on the line can be generalized to a quasi-exactly solvable one, which is an anharmonic oscillator with n + 1 known eigenstates for any n ∈ N. It is also proved that the Hamiltonian of the latter can also be rewritten in a simpler way in terms of an extended Dunkl derivative. Furthermore, the Dunkl isotropic oscillator and Dunkl Coulomb potentials in the plane are generalized to quasi-exactly solvable ones. In the former case, potentials with n + 1 known eigenstates are obtained, whereas, in the latter, sets of n + 1 potentials associated with a given energy are derived. Keywords: quantum mechanics, Dunkl derivative, quasi-exactly solvable potentials ∗ E-mail address: christiane.quesne@ulb.be 1" 2401.04611v1,"Astronomy & Astrophysics manuscript no. CeresVestaNHAO-part1-v06 January 10, 2024 ©ESO 2024 Quantitative grain size estimation on airless bodies from the negative polarization branch I. Insights from experiments and lunar observations ⋆ Yoonsoo P. Bach 1, 2, 3 , Masateru Ishiguro 2, 3 , Jun Takahashi 4 , Jooyeon Geem 2, 3 , Daisuke Kuroda 5 , Hiroyuki Naito 6 , and Jungmi Kwon 7 1 Korea Astronomy and Space Science Institute (KASI), 776 Daedeok-daero, Yuseong-gu, Daejeon 34055, Republic of Korea Department of Physics and Astronomy, Seoul National University, Gwanak-ro 1, Gwanak-gu, Seoul 08826, Republic of Korea 3 SNU Astronomy Research Center, Department of Physics and Astronomy, Seoul National University, Gwanak-ro 1, Gwanak-gu, Seoul 08826, Republic of Korea 4 Center for Astronomy, University of Hyogo, 407-2 Nishigaichi, Sayo, Hyogo 679-5313, Japan 5 Japan Spaceguard Association, Bisei Spaceguard Center 1716-3 Okura, Bisei, Ibara, Okayama 714-1411, Japan 6 Nayoro Observatory, 157-1 Nisshin, Nayoro, Hokkaido 096-0066, Japan 7 Department of Astronomy, Graduate School of Science, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-0033, Japan e-mail: ysbach93@gmail.com, ishiguro@snu.ac.kr 2 Received ; accepted ABSTRACT This work explores characteristics of the negative polarization branch (NPB), which occurs in scattered light from rough surfaces, with particular focus on the effects of fine particles. Factors such as albedo, compression, roughness, and the refractive index are considered to determine their influence on the NPB. This study compiles experimental data and lunar observations to derive insights from a wide array of literature. Employing our proposed methodology, we estimate the representative grain sizes on the lunar surface to be D ∼ 1–2 µm, with D ≲ 2–4 µm, consistent with observed grain size frequency distributions in laboratory settings for lunar fines. Considering Mars, we propose that the finest particles are likely lacking (D ≫ 10 µm), which matches previous estimations. This study highlights the potential of multiwavelength, particularly near-infrared, polarimetry for precisely gauging small particles on airless celestial bodies. The conclusions provided here extend to cross-validation with grain sizes derived from thermal modeling, asteroid taxonomic classification, and regolith evolution studies. Key words. Minor planets, asteroids: general – Minor planets 1. Introduction With current aspirations for space exploration, numerous airless objects have been thoroughly investigated and leverage advanced scientific approaches, such as orbiters, flybys, and landers. These explorations have facilitated the study of the geology, shape, dynamics, and consequences of impacts on these celestial remnants (e.g., the recent DART mission by Daly et al. 2023). Despite extensive exploration, direct visual observation of decamicron-scale dust particles has not been performed since few images have been able to resolve such fine scales on the surface. However, the presence of these fine particles can impact scattering or emission processes, thereby modulating the observed light. As a result, indirect methods, such as thermal modeling (Gundlach & Blum 2013; MacLennan & Emery 2022b) and polarimetric observations (Geake & Dollfus 1986; Ishiguro et al. 2017; Ito et al. 2018; Bach et al. 2019), have been employed to explore the existence of these fine particles. We focus on the latter approach and suggest a novel way to estimate grain sizes using multiwavelength polarimetry. ⋆ Part of the codes and data used for this publication are available via GitHub: https://github.com/ysBach/BachYP_etal_ CeresVesta_NHAO. In reality, any solid surface is composed of an irregular spatial distribution of dielectric coefficients, that is, has a degree of disorder, which is often practically impossible to describe mathematically. Thus, as a rough approximation, the disorder is described by using familiar terms, such as grain size, reflectance/albedo, composition, surface roughness, and macro/microporosity. Typically, in Fresnel reflection or Rayleigh scattering, the strongest electric field vector aligns perpendicularly to the scattering plane (the plane formed by the incident and emitted light rays). However, at small phase angles, the strongest electric vector is predominantly parallel to the scattering plane for rough surfaces (the first report was by Brewster 1863). Recognizing this behavior, Lyot (1929) proposed a modified linear polarization degree for use in observational and experimental studies: P r B P cos(2θ r ) ≈ I ⊥ − I ∥ , I ⊥ + I ∥ (1) where P represents the total linear polarization degree, θ r is the position angle of the strongest electric vector relative to the normal vector of the scattering plane (0/180 ◦ : normal to the scattering plane, 90/270 ◦ : within the scattering plane), and I ⊥ and Article number, page 1 of 21" 2401.04637v1,"Applying Large Language Models API to Issue Classification Problem Gabriel Aracena Kyle Luster Fabio Santos GTeixeiraL@my.gcu.edu Grand Canyon University Phoenix, Arizona, USA kluster1@my.gcu.edu Grand Canyon University Phoenix, Arizona, USA fabiomarcos.deabre@gcu.edu Grand Canyon University Phoenix, Arizona, USA Igor Steinmacher Marco A. Gerosa igor.steinmacher@nau.edu Northern Arizona University Flagstaff, Arizona, USA marco.gerosa@nau.edu Northern Arizona University Flagstaff, Arizona, USA ABSTRACT 1 Effective prioritization of issue reports is crucial in software engineering to optimize resource allocation and address critical problems promptly. However, the manual classification of issue reports for prioritization is laborious and lacks scalability. Alternatively, many open source software (OSS) projects employ automated processes for this task, albeit relying on substantial datasets for adequate training. This research seeks to devise an automated approach that ensures reliability in issue prioritization, even when trained on smaller datasets. Our proposed methodology harnesses the power of Generative Pre-trained Transformers (GPT), recognizing their potential to efficiently handle this task. By leveraging the capabilities of such models, we aim to develop a robust system for prioritizing issue reports accurately, mitigating the necessity for extensive training data while maintaining reliability. In our research, we have developed a reliable GPT-based approach to accurately label and prioritize issue reports with a reduced training dataset. By reducing reliance on massive data requirements and focusing on few-shot fine-tuning, our methodology offers a more accessible and efficient solution for issue prioritization in software engineering. Our model predicted issue types in individual projects up to 93.2% in precision, 95% in recall, and 89.3% in F1-score. The onboarding of newcomers is important to keep OSS projects sustainable [11]. One of the initial steps of the onboarding process in an OSS project is to find an appropriate task (e.g. bugs, features, etc) to work with. The literature shows that this is a crucial step to determine the future of the newcomer in the project [10, 14]. One strategy adopted by the communities is to add labels to the issues to help new contributors find the most appropriate ones [8, 12]. However, labeling issues in big projects is time-consuming and demands efforts from the (already overloaded) maintainers [1]. More recently, many researchers proposed approaches to label issue types automatically to help managers prioritize and allocate better available resources. Kallis et al. [4, 5] use fastText to classify issues as bug, feature or question. Still, Colavito et al. [2] employed SETFIT in the last NLBSE competition to predict issue types. Santos et al. [9] predicted skills to solve an issue using API domains as a proxy. The work was extended to use Social Network Analysis (SNA), improving the predictions [7]. Finally, a tool is available to OSS communities to recommend issues based on skills informed by developers [13]. In this study, we leverage OpenAI API to create a fine-tuned model to classify issues as bugs, features, or questions. We reached an F1-score of 82.8%. OpenAI is the innovative company behind the development of ChatGPT—the most notorious of the many Large Language Models (LLM) they have built. An LLM is a sophisticated neural network model that undergoes training using extensive datasets, including books, code, articles, and websites. This training enables the model to grasp the inherent patterns and relationships within the language for which it was trained. Consequently, the LLM can produce cohesive content, such as grammatically accurate sentences and paragraphs, replicating human language, or syntactically precise code snippets [6] and it is capable of adapting incredibly when fine-tuned. RQ1: To what extent can we predict the issue types using OpenAI’s fine-tuning API? To answer RQ1, we fine-tuned the gpt-3.5-turbo base model provided in the OpenAI API. Fine-tuning is the process of giving specific and niched training for a pre-trained model. Fine-tuning through the OpenAI API is a multi-step process that involves simulating conversations with the LLM and telling them the expected response. We used the title and body of the issues in our training data as part of our prompt and the correct label as the expected response. KEYWORDS Issue Report Classification, Large Language Model, Natural Language Processing, Software Engineering, Labeling, Multi-class Classification, Empirical Study ACM Reference Format: Gabriel Aracena, Kyle Luster, Fabio Santos, Igor Steinmacher, and Marco A. Gerosa. 2024. Applying Large Language Models API to Issue Classification Problem. In Proceedings of 46th International Conference on Software Engineering (ICSE 2024). ACM, New York, NY, USA, 4 pages. https: //doi.org/10.1145/nnnnnnn.nnnnnnn Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE 2024, April 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn INTRODUCTION" 2401.04642v1,"Training embedding quantum kernels with data re-uploading quantum neural networks Pablo Rodriguez-Grasa, 1, 2, 3 Yue Ban, 4, 3 and Mikel Sanz 1, 2, 5, 6 1 Department of Physical Chemistry, University of the Basque Country UPV/EHU, Apartado 644, 48080 Bilbao, Spain 2 EHU Quantum Center, University of the Basque Country UPV/EHU, Apartado 644, 48080 Bilbao, Spain 3 TECNALIA, Basque Research and Technology Alliance (BRTA), 48160 Derio, Spain ∗ 4 Departamento de Fı́sica, Universidad Carlos III de Madrid, Avda. de la Universidad 30, 28911 Leganés, Spain 5 IKERBASQUE, Basque Foundation for Science, Plaza Euskadi 5, 48009, Bilbao, Spain 6 Basque Center for Applied Mathematics (BCAM), Alameda de Mazarredo, 14, 48009 Bilbao, Spain † Kernel methods play a crucial role in machine learning and the Embedding Quantum Kernels (EQKs), an extension to quantum systems, have shown very promising performance. However, choosing the right embedding for EQKs is challenging. We address this by proposing a p-qubit Quantum Neural Network (QNN) based on data re-uploading to identify the optimal q-qubit EQK for a task (p-to-q). This method requires constructing the kernel matrix only once, offering improved efficiency. In particular, we focus on two cases: n-to-n, where we propose a scalable approach to train an n-qubit QNN, and 1-to-n, demonstrating that the training of a single-qubit QNN can be leveraged to construct powerful EQKs. I. INTRODUCTION Quantum computing is a promising computational paradigm for tackling some complex computational problems which are classically intractable. In particular, its potential in enhancing machine learning tasks has garnered significant attention [1–4] with parametrized quantum circuits as the most common approach [5–8]. Although there are evidences of quantum advantage in some tailored problems [9–12], advantage over classical counterparts for practical applications remains as an area of active research. Amidst the exploration of quantum machine learning models, previous studies, particularly in Refs. [13, 14], have delineated a categorization into explicit and implicit models. In explicit models, data undergoes encoding into a quantum state, and then a parametrized measurement is performed. In contrast, implicit or kernel models are based on a weighted summation of inner products between encoded data points. A specialized category within parametrized quantum circuits, which can be considered separately, consists of data reuploading models [15]. This architecture features an alternation between encoding and processing unitaries, yielding expressive models that have found extensive use [16–18]. However, Ref. [19] shows that these models can be mapped onto an explicit model, thereby unifying these three approaches within the framework of linear models within Hilbert space. Beyond this overarching theoretical framework, significant effort has been devoted to studying the performance of quantum kernel methods [20–23]. Furthermore, theorizing about them as a way to explain quantum machine learning models has also been pursued [14, 24, 25]. This interest is substantiated by several compelling factors. Firstly, the act of embedding data into quantum states provides direct access to the exponentially vast quantum Hilbert space, where inner products can be efficiently computed. Secondly, the creation of embedding quantum kernels that pose classical intractability yet ∗ Corresponding author: † Corresponding author: pablojesus.rodriguez@ehu.eus mikel.sanz@ehu.eus offers the potential for quantum advantages [26]. Finally, in both classical machine learning and kernel methods, the representer theorem [27] ensures that they consistently achieve a training loss lower than or equal to that of explicit models, provided the same encoding and training set are considered. However, it is worth noting that this enhanced expressivity may be accompanied by reduced generalization capability, a point explored and discussed in Ref. [19]. While the arguments above might suggest a preference for kernel or implicit models over explicit ones, practical challenges persist. Firstly, the computational complexity associated with constructing the kernel matrix scales quadratically with the number of training samples. Additionally, selecting the appropriate embedding that defines the kernel function is contingent on the specific problem at hand, demanding careful consideration. Regarding the last one, two approaches to train kernels customized for the dataset in question have been considered: multiple kernel learning and kernel target alignment. In the former, a combination of kernel functions is trained to minimize an empirical risk function [28, 29]. In the latter, it is defined a kernel using an embedding ansatz which is trained to align with an ideal kernel [30]. However, these techniques require the computation of the kernel matrix at each training iteration, incurring substantial computational costs. In this Article, we employ a quantum neural network (QNN) to create an embedding quantum kernel (EQK). This strategy utilizes QNN training to construct the corresponding kernel matrix, significantly reducing the computational cost when compared to constructing the kernel matrix at each training step. In particular, we utilize the data re-uploading architecture for the QNN and propose a method to straightforwardly scale the training up to an p−qubit QNN. Following training on a given dataset, this QNN is used to generate a q−qubit EQK. This construction is denoted as the p-to-q approach. Here, we will focus on two specific cases: the n-to-n and the 1-to-n. The former is fundamentally relevant, since we can prove that the classification accuracy of the QNN never decreases with n and that entanglement plays a role in this accuracy. Additionally, we have empirically observed that the classification accuracy of the EQK not only is higher than the one of the QNN, as expected, but also that it does not decrease" 2401.04644v1,"Weak antilocalization and localization in Eu 2 Ir 2 O 7 (111) thin films by reactive solid phase epitaxy Xiaofeng Wu, 1, 2 Zhen Wang, 1, 2, 3 Zhaoqing Ding, 1, 2 Zeguo Lin, 1, 2 Mingyu Yang, 1, 2 Minghui Gu, 1, 2 Meng Meng, 1 Fang Yang, 1 Xiaoran Liu, 1, a) and Jiandong Guo 1, 2, b) 1) Beijing National Laboratory for Condensed Matter Physics and Institute of Physics, Chinese Academy of Sciences, Beijing 100190, China. 2) School of Physical Sciences, University of Chinese Academy of Sciences, Beijing 100049, China. 3) Institute of High Energy Physics, Chinese Academy of Sciences, Beijing 100049, China. (Dated: 10 January 2024) Thin films of the pyrochlore iridates along the [111] direction have drawn significant attention to investigate exotic correlated topological phenomena. Here, we report the fabrication of Eu 2 Ir 2 O 7 thin films via reactive solid phase epitaxy using the pulsed laser deposition technique. We mainly focus on the transport properties of the films below the magnetic phase transition at 105 K. Analyses on the temperature and the field dependences of resistivity unveil the presence of weak antilocalization, a characteristic signature of the Weyl semimetallic state that has been “buried” by magnetism. Moreover, it is noteworthy that the contribution from many-body interactions in Eu 2 Ir 2 O 7 thin films is enhanced at lower temperatures and competes with the weak antilocalization effect, and eventually drives the crossover to weak localization at 2 K. Authors to whom correspondence should be addressed: ran.liu@iphy.ac.cn; Jiandong Guo, jdguo@iphy.ac.cn] a) Electronic mail: xiaoran.liu@iphy.ac.cn b) Electronic mail: jdguo@iphy.ac.cn 1 [Xiaoran Liu, xiao-" 2401.04655v1,"DepressionEmo: A novel dataset for multilabel classification of depression emotions Abu Bakar Siddiqur Rahman a , Hoang-Thang Ta b , Lotfollah Najjar a , Azad Azadmanesh a , Ali Saffet Gönül c a College of Information Science and Technology, University of Nebraska Omaha, USA b Department of Information Technology, Dalat University, Da Lat, Lam Dong, Vietnam c Department of Psychiatry, Ege University, Bornova, Izmir, Turkey Abstract Emotions are integral to human social interactions, with diverse responses elicited by various situational contexts. Particularly, the prevalence of negative emotional states has been correlated with negative outcomes for mental health, necessitating a comprehensive analysis of their occurrence and impact on individuals. In this paper, we introduce a novel dataset named DepressionEmo designed to detect 8 emotions associated with depression by 6037 examples of long Reddit user posts. This dataset was created through a majority vote over inputs by zero-shot classifications from pre-trained models and validating the quality by annotators and ChatGPT, exhibiting an acceptable level of interrater reliability between annotators. The correlation between emotions, their distribution over time, and linguistic analysis are conducted on DepressionEmo. Besides, we provide several text classification methods classified into two groups: machine learning methods such as SVM, XGBoost, and Light GBM; and deep learning methods such as BERT, GAN-BERT, and BART. The pretrained BART model, bart-base allows us to obtain the highest F1- Macro of 0.76, showing its outperform compared to other methods evaluated in our analysis. Across all emotions, the highest F1-Macro value is achieved by suicide intent, indicating a certain value of our dataset in identifying emotions in individuals with depression symptoms through text analysis. The curated dataset is publicly available at: https://github.com/abuBakarSiddiqurRahman/DepressionEmo. Keywords: Depression Identification, Dataset, Text Classification, Emotion Analysis, Psycholinguistic Analysis 1. Introduction Depression is a complex mental disorder that afflicts approximately 300 million people worldwide, which is about 1 in every 25 individuals experience the impact of depression [1]. It hinders patients’ quality of life, represents a significant global health concern, and becomes a threat if one suffers from severe depression condition [2]. Depression, stemming from emotions like emptiness, sadness, and anger, often leads to a communication barrier and increased suicide risk. This isolation can result in resentment towards others. The challenge lies in effective communication and seeking help. Social media, particularly platforms, has become Email addresses: abubakarsiddiqurra@unomaha.edu (Abu Bakar Siddiqur Rahman), tahoangthang@gmail.com (Hoang-Thang Ta ), lnajjar@unomaha.edu (Lotfollah Najjar), azad@unomaha.edu (Azad Azadmanesh), ali.saffet.gonul@ege.edu.tr (Ali Saffet Gönül) Preprint submitted to Journal of Affective Disorder a space for individuals to share their emotions. Recognizing varied emotions among depressed individuals is crucial, especially in the vast social media landscape. Natural Language Processing and deep learning are effective tools for automatically identifying these emotions, offering insights into factors contributing to suicidal thoughts among users. In the field of text classification, depression detection in text often utilizes machine learning and deep learning approaches. Deep learning, in particular, tends to achieve superior performance overall due to its ability to capture the semantic relationships between words effectively, especially when training models with billions of parameters. Various methods for automated depression detection in text include word embedding and bi-LSTM with attention [3], Prompt-based Topicmodeling (PTDD)[4], multi-task learning[5], LIWC with culture and suicide lexicons [6], knowledge-aware deep learning [7], a deep learning framework with expectation loss [8], Hierarchical Attention Network [9], January 10, 2024" 2401.04662v1,"The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web Pengcheng Xia 1 , Zhou Yu 1 , Kailong Wang 2 , Kai Ma 2 , Shuo Chen 1 , Xiapu Luo 3 , Yajin Zhou 4 , Lei Wu 4 , Guangdong Bai 5 , Haoyu Wang 2* 1* Beijing University of Posts and Telecommunications, Beijing, China. 2 Huazhong University of Science and Technology, Wuhan, China. 3 The Hong Kong Polytechnic University, Hong Kong, China. 4 Zhejiang University, Hangzhou, China. 5 University of Queensland, Brisbane, Australia. *Corresponding author(s). E-mail(s): haoyuwang@hust.edu.cn; Abstract The dark web has emerged as the state-of-the-art solution for enhanced anonymity. Just like a double-edged sword, it also inadvertently becomes the safety net and breeding ground for illicit activities. Among them, cryptocurrencies have been prevalently abused to receive illicit income while evading regulations. Despite the continuing efforts to combat illicit activities, there is still a lack of an in-depth understanding regarding the characteristics and dynamics of cryptocurrency abuses on the dark web. In this work, we conduct a multi-dimensional and systematic study to track cryptocurrency-related illicit activities and campaigns on the dark web. We first harvest a dataset of 4,923 cryptocurrency-related onion sites with over 130K pages. Then, we detect and extract the illicit blockchain transactions to characterize the cryptocurrency abuses, targeting features from single/clustered addresses and illicit campaigns. Throughout our study, we have identified 2,564 illicit sites with 1,189 illicit blockchain addresses, which account for 90.8 BTC in revenue. Based on their inner connections, we further identify 66 campaigns behind them. Our exploration suggests that illicit activities on the dark web have strong correlations, which can guide us to identify new illicit blockchain addresses and onions, and raise alarms at the early stage of their deployment. 1" 2401.04665v1,"Experimental bounds on linear-friction dissipative collapse models from levitated optomechanics Giovanni Di Bartolomeo 1, 2, ∗ and Matteo Carlesso 1, 2, 3 1 2 Department of Physics, University of Trieste, Strada Costiera 11, 34151 Trieste, Italy Istituto Nazionale di Fisica Nucleare, Trieste Section, Via Valerio 2, 34127 Trieste, Italy 3 Centre for Quantum Materials and Technologies, School of Mathematics and Physics, Queens University, Belfast BT7 1NN, United Kingdom Collapse models constitute an alternative to quantum mechanics that solve the well-know quantum measurement problem. In this framework, a novel approach to include dissipation in collapse models has been recently proposed, and awaits experimental validation. Our work establishes experimental bounds on the so-constructed linear-friction dissipative Diósi-Penrose (dDP) and Continuous Spontaneous localisation (dCSL) models by exploiting experiments in the field of levitated optomechanics. Our results in the dDP case exclude collapse temperatures below 10 −13 K and 6 × 10 −12 K respectively for values of the localisation length smaller than 10 −6 m and 10 −8 m. In the dCSL case the entire parameter space is excluded for values of the temperature lower than 6 × 10 −9 K. I. INTRODUCTION Models of spontaneous wavefunction collapse, or simply collapse models [1–3], represent a well established paradigm in the realm of quantum foundations, and constitute a strong figure of merit for the study of the macroscopic limits of quantum mechanics. The key idea of collapse models is that quantum mechanics must be modified to explain the quantum-to-classical transition at macroscopic scales. Thus, they add suitably constructed phenomenological terms to the standard Schrödinger equation. Their action can be seen as that of a noise field that leads to the collapse of the wavefunction. Depending on the specific collapse model, the origin of such a field can be either of unknown origin or be related to the gravitational field. The two most studied collapse models are the Diósi-Penrose (DP) model [4, 5] and the Continuous Spontaneous Localisation (CSL) model [6, 7]. The latter is parametrised by a collapse rate λ and a localisation length r C . Conversely, the former model, which is related to gravity, is characterised only by a localisation length R 0 as the collapse rate is fixed by the gravitation constant G. Since the predictions of these models deviate from those of standard quantum mechanics, such models can be tested, and experimental bounds can be derived on the values of their free parameters [8–19]. An acknowledged challenge within collapse models is the energy divergence due to the collapse mechanism. To address this concern, dissipative extensions of collapse models were proposed as a solution [20, 21], implying the existence of a fundamental and universal damping mechanism which can be probed by mechanical systems with very low dissipation [16, 22, 23]. Recently, a new approach to the introduction of dissipation in collapse model has been proposed [24]. The latter is based on a different mechanism with respect to that previously proposed, namely the linear-friction of the current of the many-body system. Such an approach has not been tested yet. The present work falls within this context. We derive the first experimental bounds on linear-friction dissipative DP (dDP) and CSL (dCSL) models from levitated optomechanics characterised by ultralow damping [16, 23, 25]. In particular, for the dDP model, values of the temperature T β of the collapse field lower than 10 −13 K and 6 × 10 −12 K are excluded respectively for values of the localisation length smaller than 10 −6 m and 10 −8 m. On the other hand, for the dCSL model, the entire parameter space is excluded for T β lower than 6 × 10 −9 K. Finally, we compare the approach recently proposed in [24] with those previously suggested in [20, 21], and conclude that they can be in principle experimentally distinguished. ∗ Electronic address: giovanni.dibartolomeo@phd.units.it" 2401.04693v1,"Co-Clustering Multi-View Data Using the Latent Block Model Joshua Tobin a, , Michaela Black b , James Ng a , Debbie Rankin b , Jonathan Wallace c , Catherine Hughes d , Leane Hoey d , Adrian Moore e , Jinling Wang b , Geraldine Horigan d , Paul Carlin f , Helene McNulty d , Anne M Molloy g , Mimi Zhang a a School of Computer Science & Statistics, Trinity College Dublin, Dublin, Ireland b School of Computing, Engineering & Intelligent Systems, Ulster University, Derry ∼ Londonderry, United Kingdom c School of Computing, Ulster University, Belfast, United Kingdom d School of Biomedical Sciences, Nutrition Innovation Centre for Food and Health, Ulster University, Coleraine, United Kingdom e School of Geographic & Environmental Sciences, Ulster University, Coleraine, United Kingdom f School of Health, Wellbeing & Social Care, The Open University, Belfast, United Kingdom g School of Medicine, Trinity College Dublin, Dublin, Ireland Abstract The Latent Block Model (LBM) is a prominent model-based co-clustering method, returning parametric representations of each block cluster and allowing the use of well-grounded model selection methods. The LBM, while adapted in literature to handle different feature types, cannot be applied to datasets consisting of multiple disjoint sets of features, termed views, for a common set of observations. In this work, we introduce the multi-view LBM, extending the LBM method to multi-view data, where each view marginally follows an LBM. In the case of two views, the dependence between them is captured by a cluster membership matrix, and we aim to learn the structure of this matrix. We develop a likelihood- based approach in which parameter estimation uses a stochastic EM algorithm integrating a Gibbs sampler, and an ICL criterion is derived to determine the number of row and column clusters in each view. To motivate the application of multi-view methods, we extend recent work developing hypothesis tests for the null hypothesis that clusters of observations in each view are independent of each other. The testing procedure is integrated into the model estimation strategy. Furthermore, we introduce a penalty scheme to generate sparse row clusterings. We verify the performance of the developed algorithm using synthetic datasets, and provide guidance for optimal parameter selection. Finally, the multi-view co-clustering method is applied to a complex genomics dataset, and is shown to provide new insights for high-dimension multi-view problems. Keywords: Co-Clustering, Latent Block Model, Multi-View Data, Mixed Data Types 1. Introduction Clustering algorithms help to provide a global overview of a dataset. In cases where the number of features is large, just as it is necessary to summarize the individuals into homogeneous groups, it is useful to summarize the features. This simultaneous clustering of instances and features is referred to as co-clustering. A large and complex data matrix can thus be summarized by a limited number of blocks, corresponding to the intersection of the row and column clusters. The Latent Block Model (LBM) [13, 14] is a model-based co-clustering method that models the elements of a block cluster using a parametric distribution. This makes the block interpretable through the distribution’s parameters. Additionally, model selection methods like the Integrated Completed Email address: tobinjo@tcd.ie (Joshua Tobin) Preprint submitted to Elsevier January 10, 2024" 2401.04695v1,"Narrowing the Knowledge Evaluation Gap: Open-Domain Question Answering with Multi-Granularity Answers Gal Yona Google Research galyona@google.com Roee Aharoni Google Research roeeaharoni@google.com Abstract Mor Geva Tel Aviv University, Google Research pipek@google.com Question: Where was Leslie Ash born? multiple granularity levels Gold Answers: Factual questions can typically be answered correctly at different levels of granularity. For example, both “August 4, 1961” and “1961” are correct answers to the question “When was Barack Obama born?”. Standard question answering (QA) evaluation protocols, however, do not take this into account explicitly and instead compare a predicted answer against reference answers of a single granularity level. In this work, we propose GRANOLA QA, a novel evaluation setting where a predicted answer is evaluated in terms of accuracy and informativeness against a set of multi-granularity answers. We present a simple methodology for enriching existing datasets with multi-granularity answers, and create G RANOLA -EQ, a multigranularity version of the E NTITY Q UESTIONS dataset. We evaluate models using a range of decoding methods on G RANOLA -EQ, including a new algorithm called Decoding with Response Aggregation (DRAG), that is geared towards aligning the answer granularity with the model’s uncertainty. Our experiments show that large language models with standard decoding methods tend to generate specific answers, which are often incorrect. In contrast, when evaluated on multi-granularity answers, DRAG yields a nearly 20 point increase in accuracy on average, which further increases for rare entities, revealing that standard evaluation and decoding schemes may underestimate the knowledge encapsulated in language models. 1 Standard QA { Clapham } GRANOLA QA [ Clapham, London, England ] Generated Answers: Greedy decoding Edmonton Sampling Manchester Edmonton London DRAG England Knowledge evaluation gap Figure 1: Top: GRANOLA QA evaluation with multigranularity answers. Middle: Decoding with Response Aggregation (DRAG) outputs a (potentially coarser) response by aggregating several responses of the model. Bottom: Accuracy gain from evaluating using multigranularity answers for several decoding strategies. DRAG reveals a significant knowledge evaluation gap. Large language models (LLMs) often generate factual errors, especially when the task requires less widely-known knowledge (Mallen et al., 2023; Sciavolino et al., 2021). Such factual errors are commonly attributed to the LM lacking relevant knowledge (Zheng et al., 2023) or over-committing to earlier mistakes (Zhang et al., 2023b). We conjecture that factual mistakes can stem from a different failure source, when the model prioritizes different textual attributes (e.g., fluency or specific formats that appeared in the training corpora) over factuality. Such failures can result in generated text that mixes both correct and incorrect statements, even when the incorrect parts are not strictly required by the question. Consider for example the question “When was Mark Bils born?”. When prompting ChatGPT 2 for answering this question, sampled responses include “March 22, 1958”, “May 19, 1958” and “August 15, 1958”. This may suggest that the model is confident that Bils was born in 1958 – which is a correct answer in this case, albeit not the most 1 Data will be released soon at https://github.com/ google-research-datasets/granola-eq 2 Responses were obtained by querying ChatGPT 3.5 using the standard Web API in December 2023. 1 Introduction" 2401.04712v1,"DPUR/TH/78 January, 2024 Effective Potential for Conformal Factor and GL(4) Symmetry Ichiro Oda 1 Department of Physics, Faculty of Science, University of the Ryukyus, Nishihara, Okinawa 903-0213, Japan Abstract We revisit the issue that the effective potential for the conformal factor of the metric, which is generated by quantized matter fields, possesses a non-vanishing vacuum expectation value (VEV) or not. We prove that the effective potential has a vanishing vacuum expectation value on the basis of a global GL(4) symmetry. We also account for the reason why there seem to be two different effective potentials for the conformal factor in a theory, one of which gives rise to a vanishing VEV for the conformal factor whereas the other does a non-vanishing VEV. 1 E-mail address: ioda@sci.u-ryukyu.ac.jp" 2401.04737v1,"Music Genre Classification: A Comparative Analysis of CNN and XGBoost Approaches with Mel-frequency cepstral coefficients and Mel Spectrograms Yigang Meng 1, a) Department of Statistics, University of California, Davis, 95616, United States Corresponding author: mgmeng@ucdavis.edu Abstract. In recent years, various well-designed algorithms have empowered music platforms to provide content based on one's preferences. Music genres are defined through various aspects, including acoustic features and cultural considerations. Music genre classification works well with content-based filtering, which recommends content based on music similarity to users. Given a considerable dataset, one premise is automatic annotation using machine learning or deep learning methods that can effectively classify audio files. The effectiveness of systems largely depends on feature and model selection, as different architectures and features can facilitate each other and yield different results. In this study, we conduct a comparative study investigating the performances of three models: a proposed convolutional neural network (CNN), the VGG16 with fully connected layers (FC), and an eXtreme Gradient Boosting (XGBoost) approach on different features: 30-second Mel spectrogram and 3-second Mel-frequency cepstral coefficients (MFCCs). The results show that the MFCC XGBoost model outperformed the others. Furthermore, applying data segmentation in the data preprocessing phase can significantly enhance the performance of the CNNs. INTRODUCTION The classification of musical genres has long been discussed and implemented in scientific and industrial fields. It is a subset of Automatic Music Retrieval (AMR). Two main techniques build an effective recommendation system: collaborative filtering and content-based filtering. Collaborative filtering provides recommendations based on user proximity [1]. Previous research has identified two main challenges arising from the inherent nature of sparse matrices and algorithm design. The first challenge is the cold start problem, which introduces new users to the system who need more information to generate predictions [2]. Popularity bias can occur within algorithms, causing the system to frequently prioritize recommending popular items and ignore lesser-known options [3]. One way to address this problem is by employing well-designed algorithms with content-based filtering. This method extracts content information based on music annotations or classifications and does not require user information. Music Genre Classification Methods Various methods of music genre classification have been extensively researched, including deep learning and traditional methods. C. Liu et al. have significantly contributed to a state-of-the-art CNN that can analyze timefrequency information at multiple scales, achieving 93.9% accuracy on the GTZAN dataset. Moreover, Elbir and Aydin proposed a hybrid architecture that combines CNN with support vector machines (SVM), achieving an accuracy of 97.6% [4]. Purpose The implemented methods with features are shown in Table 1. The study focuses on the effectiveness comparison between three methods in the aspects of:" 2401.04753v1,"Biostatistics (2024), 0, 0, pp. 1–?? doi:10.1093/biostatistics/main Dynamic Models Augmented by Hierarchical Data: An Application Of Estimating HIV Epidemics At Sub-National Level Le Bao ∗ and Xiaoyue Niu Department of Statistics, Penn State University, University Park, PA, USA Tim Brown Research Program, East-West Center, Honolulu, HI USA Jeffrey W. Imai-Eaton Center for Communicable Disease Dynamics, Department of Epidemiology, Harvard T.H. Chan School of Public Health, Boston, MA, USA MRC Centre for Global Infectious Disease Analysis, School of Public Health, Imperial College London, London, UK Summary Dynamic models have been successfully used in producing estimates of HIV epidemics at the national level due to their epidemiological nature and their ability to estimate prevalence, inci- dence, and mortality rates simultaneously. Recently, HIV interventions and policies have required more information at sub-national levels to support local planning, decision making and resource allocation. Unfortunately, many areas lack sufficient data for deriving stable and reliable results, and this is a critical technical barrier to more stratified estimates. One solution is to borrow ∗ To whom correspondence should be addressed. lebao@psu.edu © The Author 2024. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com" 2401.04779v1,"Influence of plasma on the optical appearance of spinning black hole in Kalb-Ramond gravity and its Existence around M87* and Sgr A* Muhammad Ali Raza, 1, ∗ M. Zubair, 1, † and Eiman Maqsood 1, ‡ 1 Department of Mathematics, COMSATS University Islamabad, Lahore Campus, Lahore, Pakistan The visible universe is filled with different types of plasma media in the form of stars, nebulas and other forms of excited gases. These matter fields have a high influence on the gravity and are likely to be present around the black holes due to the immense gravitational attraction. Since a plasma medium affects the speed of light, therefore we investigated the null geodesics and various optical features around the rotating black hole in Kalb-Ramond gravity immersed in plasma medium. Various plasma distributions are considered to develop a comparative study for their influence on unstable null circular orbits, shadows and evaporation rate of the black hole in the presence of a plasma medium. Moreover, the shadow results are also compared with Event Horizon Telescope data for M78* and Sgr A* in order to estimate the parametric bounds for which the rotating black hole in Kalb-Ramond gravity is considered either M87* or Sgr A* under the different values of plasma parameters. From this analysis, we also found the distribution of plasma that has a significant impact on the above mentioned features and is most likely to be present around M87* and Sgr A*. Keywords: Black hole, Kalb-Ramond field, plasma, shadow, M87*, Sgr A*. I. INTRODUCTION According to Newton’s concept, the gravity being a force of attraction is instantaneous and eventually becomes weaker as the separation between the two objects increases. This concept did not support the cosmic catastrophe problem, that is, the Earth would leave its orbit immediately as the Sun vanishes. This implies that a signal traveled to Earth from the Sun faster than the cosmic speed. To answer such complicated mysteries of the universe, Albert Einstein laid the foundation of a new concept of gravity, in 1915, based on the concept of spacetime curvature known as General Relativity (GR) [1–4]. It describes how the force of gravity actually works. Soon after this discovery, Schwarzschild [5] proposed the pioneering solution of the Einstein field equations in the most ideal scenario resulting into a black hole (BH) known as Schwarzschild BH. Later, various other BH solutions were presented based on different characteristics and properties such as Reissner-Nordström [6, 7], Kerr [8] and Kerr-Newman [9, 10] BHs being the most fundamental solutions. Besides the fundamental background of the theory, another group of scientists was looking to unify gravity with the other subatomic fundamental forces of nature. In this context, Kaluza [11] and Klein [12, 13] proposed Kaluza- Klein theory that describes the unification of the electromagnetic and gravitational theories based on 5D structure with quantum interpretation. Over the decades, several attempt were made by the scientists in order to construct a theory based on the principles of GR and quantum mechanics. Several theories have been proposed, however the technological deficiencies restrict us to verify some of these theories. However, we are still capable enough to use the advancement of the technology to a certain extent. In this regard, GR has been tested observationally at high resolutions and obtained great precision [14, 15]. For the theoretical description of the results, it was required to construct the modified and alternative gravitational theories. A modified theory can be constructed by modifying the Einstein-Hilbert action that can be accomplished by introducing the Kalb-Ramond (KR) field as a possible example [16]. Since, the hybridization of a superstring and a bosonic string generates a closed string that gives rise to heterotic string theory. Hence, the KR field, being inherently a quantum field, exhibits a strong connection to the excitation of closed strings within the framework of heterotic string theory [17]. The KR field is described by an antisymmetric tensor of rank two whose vacuum expectation value (VEV) remains non-zero. Spontaneous Lorentz symmetry breaking (LSB) manifests as a consequence of a nonminimal coupling between gravity and a non-zero VEV [18]. Khodadi [19] considered a BH with spin in Einstein-bumblebee gravity for which he studied the effect of the spontaneous LSB on superradiance scattering and instability. He found the weakening of superradiance scattering for scalar wave with low frequencies and the positive values of LSB parameter. However, for the negative values, the scattering becomes stronger. Moreover, Khodadi [20] also investigated that LSB parameter gives rise to a BH with fast rotation that is ∗ Electronic address: maliraza01234@gmail.com † Electronic address: mzubairkk@gmail.com;drmzubair@cuilahore.edu.pk ‡ Electronic address: eiman1482000@gmail.com" 2401.04783v1,"HYPERBOLIC MACHINE LEARNING MOMENT CLOSURES FOR THE BGK EQUATIONS ∗ ANDREW J. CHRISTLIEB † § , MINGCHANG DING † , JUNTAO HUANG ‡ , AND NICHOLAS A. KRUPANSKY § Abstract. We introduce a hyperbolic closure for the Grad moment expansion of the Bhatnagar- Gross-Krook’s (BGK) kinetic model using a neural network (NN) trained on BGK’s moment data. This closure is motivated by the exact closure for the free streaming limit that we derived in our paper on closures in transport [15]. The exact closure relates the gradient of the highest moment to the gradient of four lower moments. As with our past work, the model presented here learns the gradient of the highest moment in terms of the coefficients of gradients for all lower ones. By necessity, this means that the resulting hyperbolic system is not conservative in the highest moment. For stability, the output layers of the NN are designed to enforce hyperbolicity and Galilean invariance. This ensures the model can be run outside of the training window of the NN. Unlike our previous work on radiation transport that dealt with linear models, the BGK model’s nonlinearity demanded advanced training tools. These comprised an optimal learning rate discovery, one cycle training, batch normalization in each neural layer, and the use of the AdamW optimizer. To address the nonconservative structure of the hyperbolic model, we adopt the FORCE numerical method to achieve robust solutions. This results in a comprehensive computing model combining learned closures with methods for solving hyperbolic models. The proposed model can capture accurate moment solutions across a broad spectrum of Knudsen numbers. Our paper details the multi-scale model construction and is run on a range of test problems. Key words. BGK equation, moment closure, machine learning, neural network, hyperbolicity MSC codes. 82C40, 82C32, 82C70 1. Introduction. Kinetic models are important in many of the physical sciences and engineering applications when a physical system is far away from a local equilibrium, such is the case in micro-electromechanical system (MEMS) [34], atmospheric re-entry [44], and controlled nuclear fusion [42] to name a few. When describing systems of interest these models are plagued by the so-called “curse of dimensionality”: in one-spatial dimension, one-velocity dimension, and time evolution we have a problem in R 3 and in three spatial dimensions this associated model is in R 7 phase space for each particle. This leads to the use of distributions which are further complicated by their multi-scale nature, where the behavior of solutions is dependent on the characteristic length of collisions involved. Resolving features in detail on realistic applications can quickly reach resource limits in computation with respect to discretization. The method of moments is an approach to reduce the dimensionality in kinetic models. The first such technique was by Chapman-Enksog and Hilbert expansion, which suffered from singular moments after the first few. The “modern” example is ∗ Submitted to the editors DATE. Funding: This work was funded in part by the US Department of Energy DE-SC0023164, the US National Science Foundation NSF-2309655 and NSF-2008004, and the US Department of Defense Science, Mathematics, and Research for Transformation (SMART) Scholarship, funded by OUSD/R&E (The Under Secretary of Defense-Research and Engineering), National Defense Education Program (NDEP) / BA-1, Basic Research. † Department of Computational Mathematics, Science, and Engineering, Michigan State University, East Lansing, MI (dingmin2@msu.edu) ‡ Department of Mathematics and Statistics, Texas Tech University, Lubbock, TX (juntao.huang@ttu.edu) § Department of Mathematics, Michigan State University, East Lansing, MI (christli@msu.edu, krupans4@msu.edu) 1" 2401.04792v2,"REACT: Autonomous Intrusion Response System for Intelligent Vehicles Mohammad Hamad a,∗ , Andreas Finkenzeller a , Michael Kühr a , Andrew Roberts c , Olaf Maennel d , Vassilis Prevelakis b , Sebastian Steinhorst a a Technical University of Munich, Munich, Germany b Technical University of Braunschweig, Braunschweig, Germany c Tallinn University of Technology, Tallinn, Estonia d University of Adelaide, Adelaide, Australia Abstract Autonomous and connected vehicles are rapidly evolving, integrating numerous technologies and software. This progress, however, has made them appealing targets for cybersecurity attacks. As the risk of cyber threats escalates with this advancement, the focus is shifting from solely preventing these attacks to also mitigating their impact. Current solutions rely on vehicle security operation centers, where attack information is analyzed before deciding on a response strategy. However, this process can be timeconsuming and faces scalability challenges, along with other issues stemming from vehicle connectivity. This paper proposes a dynamic intrusion response system integrated within the vehicle. This system enables the vehicle to respond to a variety of incidents almost instantly, thereby reducing the need for interaction with the vehicle security operation center. The system offers a comprehensive list of potential responses, a methodology for response evaluation, and various response selection methods. The proposed solution was implemented on an embedded platform. Two distinct cyberattack use cases served as the basis for evaluating the system. The evaluation highlights the system’s adaptability, its ability to respond swiftly, its minimal memory footprint, and its capacity for dynamic system parameter adjustments. The proposed solution underscores the necessity and feasibility of incorporating dynamic response mechanisms in smart vehicles. This is a crucial factor in ensuring the safety and resilience of future smart mobility. Keywords: Security, Intrusion Response System, Intelligent Vehicle 1. Introduction In recent years, there has been remarkable progress in the development of smart vehicles. Today’s vehicles resemble interconnected networks on wheels, with numerous embedded computers, called Electronic Control Units (ECUs), linked through various types of networks, hosting an extensive number of software components totaling over a hundred million lines of code. Moreover, these networks incorporate various intelligent sensors (such as cameras, LiDAR, radar, etc.) and different connectivity technologies that enhance the vehicle’s ability to perceive and interact with the surrounding environment, thus bolstering autonomy and minimizing the reliance on human intervention. However, with the rise of connectivity and the softwarization of vehicles, the vulnerability to cyberattacks targeting these systems has also escalated [66]. Recently, there has been a growing interest in addressing the security threats that may target smart vehicles. For instance, the ∗ Corresponding author. Email addresses: mohammad.hamad@tum.de (Mohammad Hamad ), andreas.finkenzeller@tum.de (Andreas Finkenzeller), michael.kuehr@tum.de (Michael Kühr), andrew.Roberts@taltech.ee (Andrew Roberts), olaf.maennel@adelaide.edu.au (Olaf Maennel), prevelakis@ida.ing.tu-bs.de (Vassilis Prevelakis), sebastian.steinhorst@tum.de (Sebastian Steinhorst) Preprint submitted to Elsevier ISO 21434 [34] standard has been introduced, with a significant portion dedicated to the development of threat analysis and risk assessment methodologies. Moreover, the field of intrusion detection and prevention in the automotive domain has witnessed extensive research, leading to various avenues for research [39]. However, despite these efforts, the number of attacks targeting smart vehicles continues to rise [66]. This is to be expected, as security is not absolute, and we must acknowledge that complete prevention of all security threats may not be attainable. Therefore, greater emphasis should be placed on defining how the system should behave when confronted with such unavoidable attacks. The cybersecurity incident response is an integral aspect of security management, as outlined in ISO/SAE 21434 within the operational and maintenance clause [34]. Based on the standard, this process aims to provide remedial actions and updates, which may involve post-development changes to address security vulnerabilities. The process necessitates the vehicle to share cybersecurity information about the vulnerability that triggered the cybersecurity incident response. Being part of the ISO/SAE 21434, it is now imperative that manufacturers comply with new regulations by having a cybersecurity management system that oversees the cybersecurity activities and processes in the product life-cycle. To achieve this, Vehicle January 18, 2024" 2401.04829v1,"GNNShap: Fast and Accurate GNN Explanations using Shapley Values Selahattin Akkas Ariful Azad Indiana University Bloomington Bloomington, Indiana, USA sakkas@iu.edu ABSTRACT Graph neural networks (GNNs) are popular machine learning models for graphs with many applications across scienti�c domains. However, GNNs are considered black box models, and it is challenging to understand how the model makes predictions. Game theory-based Shapley value approaches are popular explanation methods in other domains but are not well-studied for graphs. Some studies have proposed Shapley value-based GNN explanations, yet they have several limitations: they consider limited samples to approximate Shapley values; some mainly focus on small and large coalition sizes, and they are an order of magnitude slower than other explanation methods, making them inapplicable to even moderatesize graphs. In this work, we propose GNNShap, which provides explanations for edges since they provide more natural explanations for graphs and more �ne-grained explanations. We overcome the limitations by sampling from all coalition sizes, parallelizing the sampling on GPUs, and speeding up model predictions by batching. GNNShap gives better �delity scores and faster explanations than baselines on real-world datasets. 1 INTRODUCTION Graph Neural Networks (GNNs) are powerful models to learn representations of graph-structured data such as social [6, 21, 39], biological [7, 25], and chemical [4, 18, 41] networks. By capturing graph structures and node/edge features in an embedding space, GNNs achieved state-of-the-art performance on various tasks such as node classi�cation, link prediction, graph classi�cation, and recommendation [11, 14, 37, 40]. As with most deep learning models, a GNN represents a complex encoding function whose outputs cannot be easily explained by its inputs (graph structure and features). As GNNs are widely used in scienti�c and business applications, understanding their predictions based on the input graph is necessary to gain users’ trust in the model. Like other branches of machine learning [16, 26, 31, 35], several e�ective GNN explanation methods have been developed in recent years, such as GNNExplainer [43], PGExplainer [17], PGM- Explainer [38], SubgraphX [46], and GraphSVX [5]. These methods often adapt explanation methods for structured data by incorporating graph topology information. For example, GraphLIME [13] is built on a popular linear model called LIME [26] and GraphSVX [5] is based on another popular method called SHAP [16]. Shapley’s game-theoretic approach [32] is arguably the most widely-used explanation model where model predictions are explained by assuming that each feature is a “player” in a game where the prediction is the payout. Although Shapley value-based methods are known to provide good explanations, their main limitation Indiana University Bloomington Bloomington, Indiana, USA azad@iu.edu is their computational costs. These methods require multiple perturbed input model predictions, which can be time-consuming. For deeper GNNs, the computational demand is even more prohibitive because of the rapid growth in the number of edges in the computational graph (commonly known as the neighborhood explosion problem[11]). To keep the running time reasonable, Shapley-based methods must use sampling, but sampling can also hurt the �delity of the obtained explanations. The trade-o� between �delity and computational complexity is one of the main challenges in Shapley-based explanation methods. Earlier approaches like GraphSVX [5] dealt with this by excluding some edges from computations, potentially compromising explanation �delity. Furthermore, these methods are often computationally ine�cient, making them impractical for application to large graphs. To address these challenges, we develop GNNShap—a computationally fast method that delivers high-�delity explanations for GNNs. GNNShap provides importance scores for all relevant edges when performing prediction for a target node. In contrast to alternative Shapley-based explanation methods, which selectively sample from small and large coalition sizes, GNNShap conducts sampling across all coalition sizes, recognizing the crucial roles they play in GNN explanations. This balanced sampling helps identify edges that contribute signi�cantly (measured by 834;8C~ + ) or insigni�cantly (measured by 834;8C~ ) to GNN predictions. Additionally, we integrate parallel algorithms and pruning strategies to expedite the explanation process. As a result, GNNShap runs an order of magnitude faster than other state-of-the-art (SOTA) Shapley-based methods. GNNShap achieves this faster performance without sacri�cing the explanation �delity. The main contributions of the paper are as follows: • We develop GNNShap, a Shapley-value based GNN explanation model that provides importance scores for all relevant edges for a target node. GNNShap enhanced the �delity of GNN explanations while also optimizing the speed of the explanation method. • By improving the sampling coverage among all possible subgraphs, GNNShap improves the �delity of explanations. • GNNShap is an order of magnitude faster than other Shapleybased explanation methods such as GraphSVX. This performance is obtained from our pruning strategies and parallel algorithms. 2 BACKGROUND AND RELATED WORK Let ⌧ (+ , ⇢) be a graph where + is a set of nodes and ⇢ is a set of edges with |+ | = # . Let 2 R # ⇥# be the sparse adjacency matrix of the graph where 8 9 = 1 if {E 8 , E 9 }2⇢, otherwise 8 9 = 0." 2401.04836v1,"CoNST: Code Generator for Sparse Tensor Networks SAURABH RAJE, University of Utah, USA YUFAN XU, University of Utah, USA ATANAS ROUNTEV, Ohio State University, USA EDWARD F. VALEEV, Virginia Tech, USA SADAY SADAYAPPAN, University of Utah, USA Sparse tensor networks are commonly used to represent contractions over sparse tensors. Tensor contractions are higher-order analogs of matrix multiplication. Tensor networks arise commonly in many domains of scientific computing and data science. After a transformation into a tree of binary contractions, the network is implemented as a sequence of individual contractions. Several critical aspects must be considered in the generation of efficient code for a contraction tree, including sparse tensor layout mode order, loop fusion to reduce intermediate tensors, and the interdependence of loop order, mode order, and contraction order. We propose CoNST, a novel approach that considers these factors in an integrated manner using a single formulation. Our approach creates a constraint system that encodes these decisions and their interdependence, while aiming to produce reduced-order intermediate tensors via fusion. The constraint system is solved by the Z3 SMT solver and the result is used to create the desired fused loop structure and tensor mode layouts for the entire contraction tree. This structure is lowered to the IR of the TACO compiler, which is then used to generate executable code. Our experimental evaluation demonstrates very significant (sometimes orders of magnitude) performance improvements over current state-of-the-art sparse tensor compiler/library alternatives. CCS Concepts: • Software and its engineering → Source code generation; Domain specific languages. 1 INTRODUCTION This paper describes CoNST, a code generator for networks of sparse tensors. Sparse tensor networks are commonly used to represent collections of tensor contractions over sparse tensors. Tensor contractions are higher-order analogs of matrix-matrix multiplication. For example, the binary tensor contraction 𝑌 𝑖 𝑗𝑙𝑚 = 𝑈 𝑖 𝑗𝑘 × 𝑊 𝑘𝑙𝑚 represents the computation ∑︁ ∀𝑖, 𝑗, 𝑙, 𝑚 : 𝑌 𝑖 𝑗𝑙𝑚 = 𝑈 𝑖 𝑗𝑘 × 𝑊 𝑘𝑙𝑚 𝑘 Multi-tensor product expressions, e.g., 𝑍 𝑖𝑚 = 𝑈 𝑖 𝑗𝑘 × 𝑉 𝑗𝑙 × 𝑊 𝑘𝑙𝑚 , arise commonly in many domains of scientific computing and data science (e.g., high-order models in quantum chemistry [24], tensor decomposition schemes [13]). Such expressions involve multiple tensors and multiple summation indices: ∑︁ ∀𝑖, 𝑚 : 𝑍 𝑖𝑚 = 𝑈 𝑖 𝑗𝑘 × 𝑉 𝑗𝑙 × 𝑊 𝑘𝑙𝑚 𝑗,𝑘,𝑙 Tensor network example Such multi-tensor products are also referred to as tensor networks, represented with a node for every tensor instance and edges representing the indices that index the various tensors. Efficient evaluation of such an expression typically requires a transformation into a tree of binary contractions, which is then executed as a sequence of these individual contractions. Many efforts have been directed towards compiler optimization of sparse matrix and tensor computations [3, 5, 11, 12, 16, 17, 28, 30, 34]. However, the current state of the art does not adequately Authors’ addresses: Saurabh Raje, saurabh.raje@utah.edu, University of Utah, Salt Lake City, Utah, USA; Yufan Xu, yf.xu@utah.edu, University of Utah, Salt Lake City, Utah, USA; Atanas Rountev, rountev@cse.ohio-state.edu, Ohio State University, Columbus, USA; Edward F. Valeev, valeev-76@vt.edu, Virginia Tech, Blacksburg, USA; Saday Sadayappan, saday@cs.utah.edu, University of Utah, USA." 2401.04849v1,"SIM-GAT for Spatial Planning of Business Clusters A Deep Learning Representation of Spatial Interaction Model for Resilient Spatial Planning of Community Business Clusters Haiyan HAO 1 and Yan WANG 2* 1 Ph.D., Department of Urban and Regional Planning and Florida Institute for Built Environment Resilience, College of Design, Construction and Planning, Univ. of Florida, 1480 Inner Rd., Gainesville, FL 32611. Email: hhao@ufl.edu. 2 Assistant Professor, Department of Urban and Regional Planning and Florida Institute for Built Environment Resilience, Univ. of Florida, P.O. Box 115706, Gainesville, FL 32611 (corresponding author). Email: yanw@ufl.edu. Abstract: The increasing risks posed by adverse events, such as extreme climatic events and pandemics, have negatively impacted the vitality of community businesses. These challenges necessitate resilient strategies to empower community businesses to adapt to the various adversities. For example, scholars have advocated for improved spatial planning to accommodate customers’ changing behaviors during adverse events. However, existing Spatial Interaction Models (SIMs) are limited in capturing the complex and context-aware interactions between business clusters and trade areas. To address this limitation, we propose a SIM-GAT model to predict spatio-temporal visitation flows between community business clusters and their trade areas. The model innovatively represents the integrated system of business clusters, trade areas, and transportation infrastructure within an urban region using a connected graph. Then, a graph-based deep learning model, i.e., Graph AttenTion network (GAT), is used to capture the complexity and interdependencies of business clusters. We developed this model with data collected from the Miami metropolitan area in Florida. We then demonstrated its effectiveness in capturing varying attractiveness of business clusters to different residential neighborhoods and across scenarios with an eXplainable AI approach. We contribute a novel method supplementing conventional SIMs to predict and analyze the dynamics of inter-connected community business clusters. The analysis results can inform data-evidenced and place-specific planning strategies helping community business clusters better accommodate their customers across scenarios, and hence improve the resilience of community businesses. Keywords: AI-assisted planning, Community business cluster, Graph attention network, Resilience, Spatial interaction model 1. Introduction Community businesses play a crucial role in shaping the vitality and viability of communities. Individually, businesses in sectors tied to “third places”, such as retail trade , accommodation and food services , and arts, entertainment, and recreation , provide spaces for local residents to gather, socialize, and share information. Scholars have indicated that such ""third places"" are vital for building social capital and rapport within communities (Jacob, 1961; Oldenburg, 1999; Xiao et al., 2022). In aggregation, the spatial distribution of business clusters can shape patterns of mobility flows, resource allocation, and employment opportunities (Barata-Salgueiro & Cachinho, 2021; Barata-Salgueiro & Erkip, 2014; Jacobs, 1969). Despite the importance, these community business clusters are highly vulnerable to environmental shocks and their precarity has become particularly evident during the pandemic and recent weather and climate events (e.g., Zhang et al., 2009; Chang et al., 2022; Xiao et al., 2022; Fairlie, 2020). Though associated with high vulnerability, a large number of community businesses are located in hazardprone locations, such as the storm surge planning zone in coastal cities, which could alter the composition of community businesses during extreme events (e.g., tropical storms and tidal floods). However, many of these coastal cities are still encouraging developments in hazard-prone areas due to the significant commercial benefits (e.g., Lorincz, 2021), which present significant challenges to the planning practices of community business clusters. In response, scholars and practitioners have promoted different resilience strategies to help community businesses prepare for, respond to, and adapt to adversities (Barata-Salgueiro & Cachinho, 1/26" 2401.04852v1,"Answer Retrieval in Legal Community Question Answering Arian Askari [0000−0003−4712−832X] , Zihui Yang, Zhaochun Ren , and Suzan Verberne [0000−0002−9609−9505] [0000−0002−9076−6565] Leiden University, Leiden, the Netherlands a.askari@liacs.leidenuniv.nl, zoeyangzihui@gmail.com, s.verberne@liacs.leidenuniv.nl, z.ren@liacs.leidenuniv.nl Abstract. The task of answer retrieval in the legal domain aims to help users to seek relevant legal advice from massive amounts of professional responses. Two main challenges hinder applying existing answer retrieval approaches in other domains to the legal domain: (1) a huge knowledge gap between lawyers and non-professionals; and (2) a mix of informal and formal content on legal QA websites. To tackle these challenges, we propose CE FS , a novel cross-encoder (CE) re-ranker based on the f inegrained structured inputs. CE FS uses additional structured information in the CQA data to improve the effectiveness of cross-encoder re-rankers. Furthermore, we propose LegalQA: a real-world benchmark dataset for evaluating answer retrieval in the legal domain. Experiments conducted on LegalQA show that our proposed method significantly outperforms strong cross-encoder re-rankers fine-tuned on MS MARCO. Our novel finding is that adding the question tags of each question besides the question description and title into the input of cross-encoder re-rankers structurally boosts the rankers’ effectiveness. While we study our proposed method in the legal domain, we believe that our method can be applied in similar applications in other domains. Keywords: Legal Answer Retrieval · Legal IR · Data collection · Finegrained structured cross-encoder 1 Introduction As an established problem in information retrieval, answer 1 retrieval [6] has been studied in a variety of domains, including healthcare [8], social media [6,30], and programming [32]. Community question answering (CQA) platforms provide common sources for answer retrieval [5, 23, 24], e.g., Stackoverflow 2 for finding answers of programming questions [5]. In the legal domain, users 3 seek legal 1 We interchangeably use the word answer and response to refer to the content written by the professional lawyer. 2 https://stackoverflow.com/ 3 We refer to the person who posts a question as a user or questioner throughout this paper." 2401.04854v1,"Are Language Models More Like Libraries or Like Librarians? Bibliotechnism, the Novel Reference Problem, and the Attitudes of LLMs Harvey Lederman Kyle Mahowald Department of Philosophy Department of Linguistics The University of Texas at Austin {harvey.lederman,kyle}@utexas.edu Abstract Are LLMs cultural technologies like photocopiers or printing presses, which transmit information but cannot create new content? A challenge for this idea, which we call bibliotechnism, is that LLMs often do generate entirely novel text. We begin by defending bibliotechnism against this challenge, showing how novel text may be meaningful only in a derivative sense, so that the content of this generated text depends in an important sense on the content of original human text. We go on to present a different, novel challenge for bibliotechnism, stemming from examples in which LLMs generate “novel reference”, using novel names to refer to novel entities. Such examples could be smoothly explained if LLMs were not cultural technologies but possessed a limited form of agency (beliefs, desires, and intentions). According to interpretationism in the philosophy of mind, a system has beliefs, desires and intentions if and only if its behavior is well-explained by the hypothesis that it has such states. In line with this view, we argue that cases of novel reference provide evidence that LLMs do in fact have beliefs, desires, and intentions, and thus have a limited form of agency. 1 Introduction Do modern LLMs have beliefs, desires, and intentions? Over the last few years, this question has received an enormous amount of attention (e.g., Hase et al., 2023; Mahowald et al., 2023; Bender and Koller, 2020; Shanahan et al., 2023; Bubeck et al., 2023). The hypothesis that LLMs do have these states is attractive in part because it offers a natural tool for explaining their behavior. It is standard to explain the complex behavior of humans and non-human animals in terms of what they think (believe), what they want (desire), and what they intend. If modern LLMs have beliefs, desires, and intentions, that is, if they are agents, we can employ the same explanations of their behavior. A challenge for those who deny that current LLMs are agents in this sense is to provide an alternative, equally powerful, explanation of their behavior. The psychologist Alison Gopnik and her coauthors have articulated a striking idea in this direction (Gopnik, 2022b,a; Yiu et al., 2023). In Gopnik’s view, LLMs are a “cultural technology”, like a library or a printing press. The writer Ted Chiang also gives voice to an idea in this vein: “Prompting it [the LLM] with text is something like searching over a library’s contents for passages that are close to the prompt, and sampling from what follows.” (Chiang, 2023). Cosma Shalizi, who has developed this idea in more technical detail (Shalizi, 2023), has dubbed the view “Gopnikism”. Because we will develop it in our own direction, we call it “bibliotechnism”, combining the Greek for “book” with the Greek for “skill”. According to bibliotechnism, LLMs are not agents; they are “just” cultural technologies, like books and libraries, for processing and querying written text. Can this view provide an explanation of the agent-like behavior of LLMs, which is sufficiently powerful to compete with the hypothesis that they have beliefs, desires and intentions? We address this question in a specific application, by examining the meaning-relevant behavior of LLMs (joining a growing body of work at the intersection of philosophy, cognitive science, and NLP; Bender and Koller, 2020; Andreas, 2022; Coelho Mollo and Millière, 2023; Chalmers, 2023; Mandelkern and Linzen, 2023; Piantadosi and Hill, 2022). We argue that if LLMs are “just” a cultural technology (and not agents in their own right) then the fact that their outputs refer to certain objects must in an important sense depend on the fact that their inputs refer to those objects. If LLMs’ reference were not of this “derivative” kind, then there would be an important sense in which they were not simply transmitting existing cultural knowledge, but generating new instances of reference, and perhaps even" 2401.04855v2,"1 LPAC: Learnable Perception-Action-Communication Loops with Applications to Coverage Control Saurav Agarwal, Ramya Muthukrishnan, Walker Gosrich, Vijay Kumar, and Alejandro Ribeiro Abstract—Coverage control is the problem of navigating a robot swarm to collaboratively monitor features or a phenomenon of interest not known a priori. The problem is challenging in decentralized settings with robots that have limited communication and sensing capabilities. We propose a learnable Perception-Action-Communication (LPAC) architecture for the problem, wherein a convolution neural network (CNN) processes localized perception; a graph neural network (GNN) facilitates robot communications; finally, a shallow multi-layer perceptron (MLP) computes robot actions. The GNN enables collaboration in the robot swarm by computing what information to communicate with nearby robots and how to incorporate received information. Evaluations show that the LPAC models—trained using imitation learning—outperform standard decentralized and centralized coverage control algorithms. The learned policy generalizes to environments different from the training dataset, transfers to larger environments with more robots, and is robust to noisy position estimates. The results indicate the suitability of LPAC architectures for decentralized navigation in robot swarms to achieve collaborative behavior. Index Terms—Graph Neural Networks, Coverage Control, Distributed Robot Systems, Swarm Robotics, Deep Learning Methods I. I NTRODUCTION AVIGATING a swarm of robots through an environment to achieve a common collaborative goal is a challenging problem, especially when the sensing and communication capabilities of the robots are limited. These problems require systems with high-fidelity algorithms comprising three key capabilities: perception, action, and communication, which are executed in a feedback loop, i.e., the Perception-Action- Communication (PAC) loop. To seamlessly scale the deployment of such systems across vast environments with large robot swarms, it is imperative to consider a decentralized system wherein each robot autonomously makes decisions, drawing upon its own observations and information received from neighboring robots. However, designing a navigation algorithm for a decentralized system is challenging. The robots perform perception and action independently, while the communication module N This work was supported in part by grants ARL DCIST CRA W911NF- 17-2-0181 and ONR N00014-20-1-2822. The source code for the architecture implementation and simulation platform is available at https://github.com/KumarRobotics/CoverageControl. S. Agarwal, W. Gosrich, and V. Kumar are with the GRASP Laboratory, University of Pennsylvania, USA. E-mail: {sauravag,gosrich,kumar}@seas.upenn.edu R. Muthukrishnan is with the CSAIL, Massachusetts Institute of Technology, USA. Her contributions were made while she was affiliated with the University of Pennsylvania. E-mail: ramyamut@mit.edu A. Ribeiro is with the Department of Electrical and Systems Engineering, University of Pennsylvania, USA. E-mail: aribeiro@seas.upenn.edu is the only component that can facilitate robot collaboration. Under limited communication capabilities, the robots must decide what information to communicate to their neighbors and how to use the received information to take appropriate actions. This paper studies the coverage control problem [1] as a canonical problem for the decentralized navigation of robot swarms. We propose a learnable PAC (LPAC) architecture that can learn to process sensor observations, communicate relevant information, and take appropriate actions. Coverage control is the problem of collaboration in a robot swarm to provide optimal sensor coverage to a set of features or a phenomenon of interest in an environment [1]. The relative importance of the features is modeled as an underlying scalar field known as the importance density field (IDF) [2]. Coverage control with unknown features of interest has applications in various domains, including search and rescue, surveillance [3], and target tracking [4]. Consider a critical search and rescue scenario where a robot swarm assists and monitors survivors in a disaster area. A simple solution could be to distribute the robots in a manner that keeps them further away from each other and covers the entire environment. However, if one or more survivors are detected, it is desirable to have a robot close to the survivor to provide vigilance, which is not captured by this simple solution. The fundamental question, then, is how the robots should collaborate to cover the environment efficiently while accounting for the features of interest, i.e., the survivors in this example. Similarly, coverage control can be used to monitor a continuous phenomenon of interest, such as a wildfire or soil moisture. This paper considers a decentralized multi-robot system with limited communication and sensing capabilities. Furthermore, the environment is not known a priori, and the robots use their sensors to make localized observations of the IDF in the environment. Decentralized algorithms based on centroidal Voronoi tessellation (CVT), e.g., Lloyd’s method, have been developed for robots with limited communication capabilities [1], [5]. However, in the absence of any prior knowledge of the IDF, such algorithms exhibit poor performance compared to their centralized counterpart. The primary reason for this is that the robots communicate only the relative positions to their neighbors, which does not directly capture the observations of the robots. In contrast, communicating the entire observation of a robot to its neighbors scales poorly with team size, observation size, and time. The LPAC architecture proposed in this paper addresses this issue by learning an abstract representation of the observations and communicating the relevant information to nearby robots. The primary contribution of the paper is a learnable" 2401.04857v1,"Transportation Market Rate Forecast Using Signature Transform Haotian Gu ∗ Tim Jacobs † Philip Kaminsky † Xin Guo †‡ Xinyu Li ‡§ January 11, 2024 Abstract Currently, Amazon relies on third parties for transportation marketplace rate forecasts, despite the poor quality and lack of interpretability of these forecasts. While transportation marketplace rates are typically very challenging to forecast accurately, we have developed a novel signature-based statistical technique to address these challenges and built a predictive and adaptive model to forecast marketplace rates. This novel technique is based on two key properties of the signature transform. The first is its universal nonlinearity which linearizes the feature space and hence translates the forecasting problem into a linear regression analysis; the second is the signature kernel which allows for comparing computationally efficiently similarities between time series data. Combined, these properties allow for efficient feature generation and more precise identification of seasonality and regime switching in the forecasting process. Preliminary result by the model shows that this new technique leads to far superior forecast accuracy versus commercially available industry models with better interpretability, even during the period of Covid-19 and with the sudden onset of the Ukraine war. 1 Introduction Overview. Linehaul transportation costs make up a significant portion of overall Amazon transportation costs. To manage these costs, Amazon has developed a variety of tools to manage linehaul capacity mix and procurement. One key input to all of these models is the forecast of transportation marketplace rates, which however are notoriously difficult to forecast – they are driven a number of factors: the ever-changing network of tens of thousands of drivers, shippers of all sizes with a mix of occasional, seasonal, and regular demand, a huge set of brokers, traditional and digital exchanges, and local, regional, national, and international economic factors of all kinds. In addition, the transportation marketplace frequently goes through fundamental shifts – whether because of wars, pandemics, fuel prices, or due to shifting international trade patterns. Although Amazon has purchased externally-created forecasts for some time, these forecasts are neither explainable nor sufficient/accurate to the specific Amazon needs. To address this challenge, we built a forecasting model based on time series data to predict weekly marketplace rates for the North America market, at both the national and the regional levels. Our approach incorporates an innovative statistical technique capable of efficiently capturing significant fluctuations in transportation marketplace rates. ∗ Department of Mathematics, University of California, Berkeley. Email: haotian gu@berkeley.edu † Middle Mile Marketplace Science, Amazon Research. Email: {timojaco,philipka,xnguo}@amazon.com ‡ Department of Industrial Engineering & Operations Research, University of California, Berkeley. xinyu li}@berkeley.edu § Corresponding author 1 Email: {xinguo," 2401.04867v2,"An Analysis of User Behaviors for Objectively Evaluating Spoken Dialogue Systems Koji Inoue, Divesh Lala, Keiko Ochi, Tatsuya Kawahara and Gabriel Skantze Abstract Establishing evaluation schemes for spoken dialogue systems is important, but it can also be challenging. While subjective evaluations are commonly used in user experiments, objective evaluations are necessary for research comparison and reproducibility. To address this issue, we propose a framework for indirectly but objectively evaluating systems based on users’ behaviors. In this paper, to this end, we investigate the relationship between user behaviors and subjective evaluation scores in social dialogue tasks: attentive listening, job interview, and first-meeting conversation. The results reveal that in dialogue tasks where user utterances are primary, such as attentive listening and job interview, indicators like the number of utterances and words play a significant role in evaluation. Observing disfluency also can indicate the effectiveness of formal tasks, such as job interview. On the other hand, in dialogue tasks with high interactivity, such as first-meeting conversation, behaviors related to turn-taking, like average switch pause length, become more important. These findings suggest that selecting appropriate user behaviors can provide valuable insights for objective evaluation in each social dialogue task. Koji Inoue Kyoto University, Japan, e-mail: inoue.koji.3x@kyoto-u.ac.jp Divesh Lala Kyoto University, Japan, e-mail: lala@sap.ist.i.kyoto-u.ac.jp Keiko Ochi Kyoto University, Japan, e-mail: ochi.keiko.5f@kyoto-u.ac.jp Tatsuya Kawahara Kyoto University, Japan, e-mail: kawahara@i.kyoto-u.ac.jp Gabriel Skantze KTH Royal Institute of Technology, Sweden, e-mail: skantze@kth.se This paper has been accepted for presentation at International Workshop on Spoken Dialogue Systems Technology 2024 (IWSDS 2024) and represents the author’s version of the work. 1" 2401.04873v1,"1 December 29, 2023 Electrostatics of Salt-Dependent Reentrant Phase Behaviors Highlights Diverse Roles of ATP in Biomolecular Condensates Yi-Hsuan L IN , 1,2,†,§ Tae Hun K IM , 1,2,3,4,‡,§ Suman D AS , 1,5,§ Tanmoy P AL , 1 Jonas W ESSÉN , 1 Atul Kaushik R ANGADURAI , 1,2,3,4 Lewis E. K AY , 1,2,3,4 Julie D. F ORMAN -K AY 2,1 and Hue Sun C HAN 1,∗ 1 Department of Biochemistry, University of Toronto, Toronto, Ontario M5S 1A8, Canada 2 Molecular Medicine, Hospital for Sick Children, Toronto, Ontario M5G 0A4, Canada 3 Department of Molecular Genetics, University of Toronto, Toronto, Ontario M5S 1A8, Canada 4 Department of Chemistry, University of Toronto, Toronto, Ontario M5S 3H6, Canada 5 Department of Chemistry, Gandhi Institute of Technology and Management, Visakhapatnam, Andhra Pradesh 530045, India † Present address: HTuO Biosciences, 610 Main Street, Suite 400, Vancouver, British Columbia V6A 2V3, Canada. ‡ Present address: Department of Biochemistry, School of Medicine, Case Western Reserve University, Cleveland, Ohio 44106, U.S.A. § Contributed equally. ∗ Correspondence information: Hue Sun C HAN . E-mail: huesun.chan@utoronto.ca Tel: (416)978-2697; Fax: (416)978-8548 Department of Biochemistry, University of Toronto, Medical Sciences Building – 5th Fl., 1 King’s College Circle, Toronto, Ontario M5S 1A8, Canada." 2401.04893v1,"Machine learning-enhanced optical tweezers for defect-free rearrangement Yongwoong Lee, Eunmi Chae ∗ Department of Physics, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul, 02841, Republic of Korea Abstract Optical tweezers constitute pivotal tools in Atomic, Molecular, and Optical(AMO) physics, facilitating precise trapping and manipulation of individual atoms and molecules. This process affords the capability to generate desired geometries in both one-dimensional and two-dimensional spaces, while also enabling real-time reconfiguration of atoms. Due to stochastic defects in these tweezers, which cause catastrophic performance degradation especially in quantum computations, it is essential to rearrange the tweezers quickly and accurately. Our study introduces a machine learning approach that uses the Proximal Policy Optimization model to optimize this rearrangement process. This method focuses on efficiently solving the shortest path problem, ensuring the formation of defect-free tweezer arrays. By implementing machine learning, we can calculate optimal motion paths under various conditions, resulting in promising results in model learning. This advancement presents new opportunities in tweezer array rearrangement, potentially boosting the efficiency and precision of quantum computing research. Keywords: Optical tweezer, Tweezer rearrangement, Reinforcement learning 1. Introduction Optical tweezer, a technique utilizing laser beams to trap and manipulate atoms or molecules, was proposed by Askin [1, 2]. When laser beams ∗ Corresponding author Email address: echae@korea.ac.kr (Eunmi Chae) Preprint submitted to Current Applied Physics January 11, 2024" 2401.04898v1,"ANGO: A N EXT -L EVEL E VALUATION B ENCHMARK F OR G ENERATION -O RIENTED L ANGUAGE M ODELS I N C HINESE D OMAIN Wang, Bingchao wangbingchaofun@gmail.com A BSTRACT Recently, various Large Language Models (LLMs) evaluation datasets have emerged, but most of them have issues with distorted rankings and difficulty in model capabilities analysis. Addressing these concerns, this paper introduces ANGO, a Chinese multi-choice question evaluation benchmark. ANGO proposes Keypoint categorization standard for the first time, each question in ANGO can correspond to multiple keypoints, effectively enhancing interpretability of evaluation results. Base on performance of real humans, we build a quantifiable question difficulty standard and divide ANGO questions into 9 difficulty levels, which provide more precise guidance for model training. To minimize data leakage impact and fully leverage ANGO’s innovative features, we have engineered exclusive sampling strategies and a new evaluation framework that support swift testset iteration. Our experiments demonstrate that ANGO poses a stronger challenge to models and reveals more details in evaluation result compared to existing benchmarks. 1 Introduction The field of Natural Language Processing (NLP) has witnessed significant advancements in recent years, largely attributed to the development of the LLM which possesses a vast number of parameters and trains on extensive corpus. A pivotal breakthrough is the introduction of the Transformer architecture, which incorporates the Attention mechanism [1]. This architecture facilitates the modeling of long-range dependencies in textual data and enables parallel training. Subsequently, pioneering models such as BERT [2] emerged, setting new standards for self-supervised pretraining. More recently, decoder-only models like GPT [3] have gained widespread adoption as the foundation for constructing LLMs. As LLMs have progressed, the benchmarks used to evaluate them have also evolved. Initial works primarily focused on assessing Natural Language Understanding (NLU) tasks, exemplified by benchmarks like GLUE [4] and its multi-task variant superGLUE [5]. However, as research has delved deeper into the linguistic capabilities of LLMs, specialized benchmarks with multiple-choice question formats have emerged to evaluate specific abilities such as reasoning and inference. Notable examples include MMLU [6], TruthfulQA [7], Big-Bench [8] in English, and AGI-Eval [9], C-Eval [10], CMMLU [11] for the Chinese domain, which are now widely adopted and prominently featured on leaderboards. Challenges: Existing multi-choice question benchmarks primarily rely on collecting exam questions to construct datasets and establish categories and difficulty levels based on the Subject covered in these exams. However, this simplistic categorization suffers from the following general problems: • Single-Question Single-Subject: Subject-based categories disregard that questions often require proficiency in multiple subjects and overlooking the existence of further subdivisions within each subject. • Immeasurable Difficulty: Difficulty levels typically determined by the educational grade associated with the subject, despite significant variations in difficulty for different questions in same subject. • Hard To Update: Benchmark data leaks always result in serious distortion[12]. Most of them are challenging to conduct periodic updates due to potential sampling biases." 2401.04903v1,"SnapCap: Efficient Snapshot Compressive Video Captioning Jianqiao Sun, Yudi Su, Hao Zhang*, Ziheng Cheng, Zequn Zeng, Zhengjue Wang, Bo Chen* National Key Laboratory of Radar Signal Processing, Xidian University Xi’an, China, 710071 jianqiaosun@stu.xidian.edu.cn, zhanghao01@xidian.edu.cn, bchen@mail.xidian.edu.cn Xin Yuan* Westlake University Hangzhou, China, 310030 xyuan@westlake.edu.cn Traditional Camera Video decoding Video compression … (a) Video reconstruction Live scene (b) Compression-free and reconstruction-free end-to-end captioning Computational Camera Measurement Sampling & captioning People are singing on stage with an orchestra in the background. (c) Figure 1. Comparing our novel video captioning pipeline in (c) with the traditional pipeline in (a) and a potential two-stage solution in (b), indicated by red, blue, and yellow, respectively. Abstract Video Captioning (VC) is a challenging multi-modal task since it requires describing the scene in language by understanding various and complex videos. For machines, the traditional VC follows the “imaging-compressiondecoding-and-then-captioning” pipeline, where compression is pivot for storage and transmission. However, in such a pipeline, some potential shortcomings are inevitable, i.e., information redundancy resulting in low efficiency and information loss during the sampling process for captioning. To address these problems, in this paper, we propose a novel VC pipeline to generate captions directly from the compressed measurement, which can be captured by a snapshot compressive sensing camera and we dub our model Snap- Cap. To be more specific, benefiting from the signal simulation, we have access to obtain abundant measurementvideo-annotation data pairs for our model. Besides, to better extract language-related visual representations from the compressed measurement, we propose to distill the knowledge from videos via a pre-trained CLIP with plentiful * Corresponding authors. language-vision associations to guide the learning of our SnapCap. To demonstrate the effectiveness of SnapCap, we conduct experiments on two widely-used VC datasets. Both the qualitative and quantitative results verify the superiority of our pipeline over conventional VC pipelines. In particular, compared to the “caption-after-reconstruction” methods, our SnapCap can run at least 3× faster, and achieve better caption results. 1. Introduction Video captioning (VC) is an attractive visual-language task, involving understanding dynamic visual contents and generating textual descriptions. While describing what we see is a natural task for most people, it is not trivial for machines to do the same [45]. For machines, a straightforward pipeline is “imaging-compression-reconstruction-and-thencaptioning”, as shown in Fig. 1(a). Specifically, a highdefinition (HD) video camera captures videos with high resolution in both spatial and temporal domains, which are further compressed for efficient storage and transmission. Hence, recovering the original video frames is often neces-" 2401.04907v1,"Stability Criteria and Calculus Rules via Conic Contingent Coderivatives in Banach Spaces Boris S. Mordukhovich ∗ Pengcheng Wu † Xiaoqi Yang ‡ January 11, 2024 Abstract. This paper addresses the study of novel constructions of variational analysis and generalized differentiation that are appropriate for characterizing robust stability properties of constrained set-valued mappings/multifunctions between Banach spaces important in optimization theory and its applications. Our tools of generalized differentiation revolves around the newly introduced concept of ε-regular normal cone to sets and associated coderivative notions for set-valued mappings. Based on these constructions, we establish several characterizations of the central stability notion known as the relative Lipschitz-like property of set-valued mappings in infinite dimensions. Applying a new version of the constrained extremal principle of variational analysis, we develop comprehensive sum and chain rules for our major constructions of conic contingent coderivatives for multifunctions between appropriate classes of Banach spaces. Keywords: variational analysis, generalized differentiation, well-posedness, relative Lipschitzian stability, constrained systems, normal cones and coderivatives, calculus rules Mathematics Subject Classifications (2010): 49J53, 49J52, 49K40 1 Introduction This paper is devoted to developing adequate machinery of variational analysis and generalized differentiation to study robust well-posedness properties of set-valued mappings subject to constraints. The importance of such properties and their applications to optimization, control, and related areas has been highly recognized over the years, while the main attention was paid to unconstrained mappings in finite and infinite dimensions; see, e.g., the books [1, 2, 5, 7, 8, 11, 12] with the extensive bibliographies therein. The study and applications of such properties for set-valued mappings relative to given sets has begun quite recently in [6, 10, 13], where the challenges in the study of the constrained properties in comparison with their unconstrained counterparts have been well realized. In this paper, we focus on investigating the relative Lipschitz-like property of setvalued mappings between Banach spaces, which in fact is equivalent to the relative metric regularity and relative linear openness of the inverses; see [10]. We address here infinitedimensional settings of Banach spaces, although the major results obtained below are ∗ Department of Mathematics, Wayne State University Detroit MI 48202 (e-mail: aa1086@wayne.edu). Research of this author was partly supported by the U.S. National Science Foundation under grants DMS-1808978 and DMS-2204519, by the Australian Research Council under grant DP-190100555, and by Project 111 of China under grant D21024. † Department of Applied Mathematics, The Hong Kong Polytechnic University, Hong Kong (e-mail: pcwu0725@163.com). ‡ Department of Applied Mathematics, The Hong Kong Polytechnic University, Kowloon, Hong Kong (mayangxq@polyu.edu.hk). Research of this author was partly supported by the Research Grants Council of Hong Kong (PolyU 15205223). 1" 2401.04923v1,"Inconsistency-Based Data-Centric Active Open-Set Annotation Ruiyu Mao, Ouyang Xu, Yunhui Guo The University of Texas at Dallas {ruiyu.mao, oxu, yunhui.guo}@utdallas.edu Abstract Active learning, a method to reduce labeling effort for training deep neural networks, is often limited by the assumption that all unlabeled data belong to known classes. This closed-world assumption fails in practical scenarios with unknown classes in the data, leading to active open-set annotation challenges. Existing methods struggle with this uncertainty. We introduce N EAT , a novel, computationally efficient, data-centric active learning approach for open-set data. N EAT differentiates and labels known classes from a mix of known and unknown classes, using a clusterability criterion and a consistency measure that detects inconsistencies between model predictions and feature distribution. In contrast to recent learning-centric solutions, N EAT shows superior performance in active openset annotation, as our experiments confirm. Our implementations for the metrics and datasets are publicly available at: https://github.com/RuiyuM/Active-OpenSet-NEAT. Introduction The remarkable performance of modern deep neural networks owes much to the availability of large-scale datasets such as ImageNet (Deng et al. 2009). However, creating such datasets is a challenging task that requires a significant amount of effort to annotate data points (Sorokin and Forsyth 2008; Snow et al. 2008; Raykar et al. 2010; Welinder et al. 2010). Fortunately, active learning offers a solution by enabling us to label only the most significant samples (Settles 2009; Cohn, Ghahramani, and Jordan 1996; Settles 2011; Beygelzimer, Dasgupta, and Langford 2009; Gal, Islam, and Ghahramani 2017). In active learning, a small set of labeled samples from known classes is combined with unlabeled samples, with the goal of selecting specific samples to label from the pool to enhance model training. Typical active learning methods for training deep neural networks involve selecting samples that have high levels of uncertainty (Settles 2009; Cohn, Atlas, and Ladner 1994; Balcan, Beygelzimer, and Langford 2006), are in close proximity to the classification boundary (Ducoffe and Precioso 2018), or reveal cluster structures from the data (Sener and Savarese 2017; Ash et al. 2019). Despite the considerable body of research on active learning, its practical implementation in an open-world context remains relatively unexplored (Ning et al. 2022). Unlike in Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: Dataset consists of color images as known dog class and gray-scale images as unknown wolf class. Prior work using learning-based approach may identify some unknown classes as known classes. Our work focusing on local feature distribution can find known classes more accurately. closed-world active learning settings, where the unlabeled data pool is assumed to consist only of known classes, the open world introduces unknown classes into the unlabeled data pool, making active open-set annotations a challenge. For example, when collecting data to train a classifier to distinguish between different dog breeds as known classes, a large number of unlabeled images collected from online sources may include images from unknown classes such as wolves and coyotes. The task is to identify images with known classes and select informative samples for labeling, while avoiding samples from unknown classes. Existing active learning methods face a significant obstacle in this task, as they may tend to select samples from unknown classes for labeling due to their high uncertainty (Ning et al. 2022), which is undesirable. Addressing the active open-set annotation problem requires specialized methods, and one such approach, called L F OSA was recently proposed by Ning et al. (2022). L F OSA is a learning-based active open-set annotation as it involves training a detector network with an additional output for unknown classes. The predictions of the detector network on unlabeled data are used for identifying known classes. While this approach can achieve impressive performance, it has two limitations: 1) training the additional detector network is costly, 2) and it is difficult to identify informative samples from the known classes as there is a contradiction in that while excluding unknown classes is necessary, it is also easy to exclude informative samples from the known classes. In this paper, we propose a novel inconsistency-based data-" 2401.04925v3,"The Impact of Reasoning Step Length on Large Language Models Mingyu Jin 1 , Qinkai Yu 2 , Dong Shu 1 , Haiyan Zhao 3 , Wenyue Hua 4 , Yanda Meng 2 , Yongfeng Zhang 4 , Mengnan Du 3 1 Northwestern University 2 University of Liverpool 3 New Jersey Institute of Technology 4 Rutgers University {u9o2n2, dongshu2024}@u.northwestern.edu, {sgqyu9, yanda.meng2}@liverpool.ac.uk, {hz54, mengnan.du}@njit.edu, {yongfeng.zhang, wenyue.hua}@rutgers.edu Abstract Chain of Thought (CoT) is significant in improving the reasoning abilities of large language models (LLMs). However, the correlation between the effectiveness of CoT and the length of reasoning steps in prompts remains largely unknown. To shed light on this, we have conducted several empirical experiments to explore the relations. Specifically, we design experiments that expand and compress the rationale reasoning steps within CoT demonstrations, while keeping all other factors constant. We have the following key findings. First, the results indicate that lengthening the reasoning steps in prompts, even without adding new information into the prompt, considerably enhances LLMs’ reasoning abilities across multiple datasets. Alternatively, shortening the reasoning steps, even while preserving the key information, significantly diminishes the reasoning abilities of models. This finding highlights the importance of the number of steps in CoT prompts and provides practical guidance to make better use of LLMs’ potential in complex problem-solving scenarios. Second, we also investigated the relationship between the performance of CoT and the rationales used in demonstrations. Surprisingly, the result shows that even incorrect rationales can yield favorable outcomes if they maintain the requisite length of inference. Third, we observed that the advantages of increasing reasoning steps are task-dependent: simpler tasks require fewer steps, whereas complex tasks gain significantly from longer inference sequences. Code is available at https://github.com/jmyissb/The-Impact-of-Reasoning-Step-Length-on- Large-Language-Models. 1 Introduction Today, the advent of large language models (LLMs) and their advanced prompting strategies has marked a significant progression, especially in classical NLP tasks (Kojima et al., 2023; Wei et al., 2022; Shao et al., 2023; Lyu et al., 2023). A key innovation among these is the Chain of Thought (CoT) prompting technique (Kojima et al., 2023; Wang et al., 2023; Zhang et al., 2022), known for its efficacy in multi-step problem solving. This technique, reflecting human sequential reasoning, has shown remarkable effectiveness in various challenges, including cross-domain, length-generalization, and cross-lingual tasks. The CoT approach, with its logical, step-by-step methodology, offers crucial interpretability in complex problem-solving scenarios. Interestingly, Wang et al. found that even incorrect but coherent rationales can improve reasoning performance, highlighting the value of logical continuity (Wang et al., 2023). Building on this, Fu et al. introduced complexity-based prompting, significantly improving accuracy and setting new benchmarks (Fu et al., 2023). This research further Preprint. Under review." 2401.04927v1,"MC Crystallographic defects in Weyl semimetal LaAlGe Inseo Kim 1 , Byungkyun Kang 2 , Hyunsoo Kim 3 , and Minseok Choi 1∗ 1 Department of Physics, Inha University, Incheon 22212, Korea College of Arts and Sciences, University of Delaware, Newark, Delaware 19716, United States and 3 Department of Physics, Missouri University of Science and Technology, Rolla, 65409, MO, United States (Dated: January 11, 2024) 2 Crystallographic defects in a topological semimetal can result in charge doping, and the scattering due to the defects may mask its exotic transport properties. Here, we investigate the possible crystallographic defects including vacancy and antisite in Weyl semimetal LaAlGe using hybriddensity-functional theory calculations. We show that a considerable concentration of Al- and Gerelated defects naturally form during growth due to their low formation enthalpy. Specifically, Al can be easily replaced by Ge in the I4 1 md phase of LaAlGe, forming the Ge-on-Al antisite, Ge Al . The counterpart, Al-on-Ge (Al Ge ), is also probable. The most abundant defect Ge Al is donor-like, effectively electron-doping, and these defects are therefore not only scattering centers in the electronic transport process but may also induce the substantial vertical shift of the chemical potential. The results imply that the naturally occurring defects hinder both spectroscopic and transport features arising from the Weyl physics in LaAlGe. Our work can be applied to the RAlGe family (R=rare earth) and help improve the quality of single-crystal magnetic Weyl semimetal. I. INTRODUCTION Solid states with relativistic low-energy excitations arising from the linear band crossing are promising platforms for next-generation device technology [1, 2]. The first kind is the Dirac fermion emerging when timereversal and parity symmetries are preserved [3], and the two-dimensional Dirac fermion is realized at the boundary of a topological insulator [4] and in graphene [5]. When, at least, one of the aforementioned symmetries is broken, and the spin-degeneracy is lifted, the Weyl fermion emerges [6]. When the band intersection is sufficiently close to the chemical potential, the Weyl semimetal (WSM) exhibits unique properties, including the Veselago effect [7] and selective interfacial transmission [8, 9], that allow unprecedented applications [10]. In the known WSMs, the position of the linear crossings, the Weyl nodes, is as close as a few meV to the chemical potential [6, 11]. In the three-dimensional system, the bulk Weyl nodes exist as a pair with opposite chirality, and they have topologically distinct characters with opposite Chern numbers [3]. The Weyl nodes are responsible for negative magnetoresistance due to chiral anomaly when the magnetic field is applied in the direction of the electrical current [12]. While the Weyl nodes are separated in bulk, they are connected through the one-dimensional surface state, the Fermi arc [6]. Experimental observations of chiral anomaly and the Fermi arc are regarded as direct evidence of the WSM phase. In LaAlGe, one of the WSM family LnAlX (Ln = lanthanide, X = Ge, Si), the angle-resolved photoemission spectroscopy (ARPES) measurement successfully resolved the Fermi arc electron states on the surface ∗ Electronic address: minseok.choi@inha.ac.kr [13]. However, neither anomalous Hall effect nor chiral anomaly was observed to date [14, 15]. Quantum oscillations were not observed in a typical laboratory field range (<10 T) while the other members of the family (Ln = Ce, Nd, and Pr) exhibit quantum oscillations at much lower fields, which is counterintuitive considering the presence of excess inelastic scattering in LnAlX due to localized moments. The normal state transport property in LaAlGe is consistent with conventional metal, but the residual resistivity is considerably high, which is comparable with that of a magnetic counterpart CeAlGe [14]. These experimental observations can be attributed to the relatively high content of native defects in LaAlGe. Moreover, native crystallographic defects can be a charge dopant [16], and a significant amount of such defects can shift the chemical potential. In topological semimetals, this issue may result in a significant discrepancy between the bulk and surface chemical potentials [17, 18]. In the WSMs, the energy level of Weyl nodes relative to the chemical potential is crucial for Weyl physics, and it can be irrelevant if the nodes are far away from the chemical potential. The LaAlGe single crystals are typically grown out of Al self-flux because of its low melting point [14, 15]. The volatile nature of Al may play a role and result in various crystallographic defects such as Al vacancy and subsequent interstitial or antisite associated with La and Ge that may occur during the crystal growth. Therefore, it is crucial to understand the defect energetics at the growth level. Our aim here is to theoretically identify the potential defects that affect crystal quality and the physics of Weyl fermion in LaAlGe. In the present work, we performed density functional theory calculation with a hybrid functional, an approach that has been demonstrated to result in accurate band structures and enthalpy of formation and has provided a reliable description of defect formation energies and defect levels in materials [19, 20]. Details of the calcu-" 2401.04928v1,"Relaxed Contrastive Learning for Federated Learning Seonguk Seo * 1 Jinkyu Kim * 1 Geeho Kim * 1 Bohyung Han 1,2 1 ECE & 1,2 IPAI, Seoul National University Abstract Accuracy (%) {seonguk, jinkyu, snow1234, bhhan}@snu.ac.kr We propose a novel contrastive learning framework to effectively address the challenges of data heterogeneity in federated learning. We first analyze the inconsistency of gradient updates across clients during local training and establish its dependence on the distribution of feature representations, leading to the derivation of the supervised contrastive learning (SCL) objective to mitigate local deviations. In addition, we show that a naı̈ve adoption of SCL in federated learning leads to representation collapse, resulting in slow convergence and limited performance gains. To address this issue, we introduce a relaxed contrastive learning loss that imposes a divergence penalty on excessively similar sample pairs within each class. This strategy prevents collapsed representations and enhances feature transferability, facilitating collaborative training and leading to significant performance improvements. Our framework outperforms all existing federated learning approaches by huge margins on the standard benchmarks through extensive experimental results. We plan to release the source code of our work for better reproducibility. 40 60 30 45 20 30 10 0 200 400 FedAvg FedSCL FedRCL (ours) 600 800 Rounds (a) Tiny-ImageNet 15 0 200 400 FedAvg FedSCL FedRCL (ours) 600 800 Rounds (b) CIFAR-100 Figure 1. Performance curves of our framework, dubbed as FedRCL, in comparison to other baselines on the Tiny-ImageNet and CIFAR-100 with non-i.i.d. setting (α = 0.1). FedSCL incorporates the supervised contrastive learning objective into FedAvg, but it suffers from slow convergence and restrained performance enhancement. Our framework is significantly superior in both convergence speed and performance improvement. tween local training and regularization. However, aligning the local models with the global model entails a trade-off as the global model is not necessarily optimal. Recently, there have been several attempts to analyze the inconsistent local training in a principled way [33, 42]. For example, Zhang et al. [42] investigate the label distribution skewness from a statistical perspective, and introduce a deviation bound for analyzing the inconsistency of gradient updates in local training. We reformulate the deviation bound proposed in [42] and establish its dependence on the distribution of feature representations. Subsequently, we derive that incorporating the supervised contrastive learning (SCL) objective enhances this bound, resulting in consistent local updates across heterogeneous clients. In other words, we show that employing SCL facilitates federated learning by alleviating the variations of local models. Although SCL is helpful for the optimization in federated learning, the empirical results show that a naı̈ve integration of SCL suffers from slow convergence and limited performance gains as shown in Figure 1. Due to the limited and imbalanced data in the local training set, the intra-class attraction force in SCL hampers feature diver- 1. Introduction Federated learning (FL) trains a shared model through the collaboration of distributed clients while safeguarding the privacy of local data by restricting their sharing and transfer. The primary challenge in this learning framework arises from the data heterogeneity across clients and the class imbalance in local data. These problems eventually lead to severe misalignments of the local optima of the client models, hindering the search for better global optima of the aggregated model and slowing down the convergence. In addressing these challenges, most existing approaches focus on minimizing the discrepancy between the global and local models by incorporating regularization techniques on either model parameters [1, 2, 12, 21, 44] or feature representations [15, 18, 19, 23, 40], aiming to balance be- * indicates equal contribution. 1" 2401.04958v1,"FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning Kazi Samin Mubasshir* Purdue University West Lafayette, IN, USA kmubassh@purdue.edu Imtiaz Karim* Purdue University West Lafayette, IN, USA karim7@purdue.edu networks, Fake Base Stations (FBSes), a.k.a. rouge base stations, stingrays, and IMSI catchers, are among the most widespread and represent a significant threat. Due to the lack of authentication of initial broadcast messages as well as the unprotected connection setup in the bootstrapping phase [3,4], adversaries can install FBSes that can lure unsuspecting devices to connect to them and then launch sophisticated multi-step attacks (MSAs) [5–11]. Motivation. The threat posed by FBSes is not new and has been around for a while, but they are still extensively used by attackers worldwide [12, 13]. The key motivations of our work are: (1) A persistent problem. Despite numerous efforts, FBSes are still one of the most persistent problems in cellular network security and can be deployed and used for attacks in 5G cellular networks, despite the use of the encrypted permanent ID SUCI compared to the unencrypted IMSI in 4G, which the UE sends to the base station for authentication [14]. Recent efforts have introduced certificate-based solutions and digital signatures [15–17] to address such problems. Nonetheless, these proposals are still in their infancy and would impose substantial overhead and require changes to the specifications to be applicable in a real-world setting. Moreover, the proposed certificate-based solutions make the design of roaming difficult for cellular network providers. When a user travels from one place to another place or from one country to another country, the different network providers will have to share their secret keys for authentication, which is very challenging considering the security aspects of the sharing process [18]. (2) Billions of unprotected devices. The 3GPP is planning to incorporate several defense mechanisms in the protocol to defend against FBSes [17] in future generations. However, these defense mechanisms will still take several years to roll out in the specification and then to the implementation. Currently, billions of devices worldwide are vulnerable to FBS-based attacks, and billions of new devices released in the coming years will be vulnerable to attacks until the new protocol is implemented. These devices need to be secured through in-device solutions because replacing them is impractical and would incur huge costs. (3) Impracticality and high cost of existing defense mechanisms. Although efforts [3,4,19–33] have been undertaken to detect and take down FBSes, they suffer from at least one of the following limitations: (A) Heuristic [30, 31, 33] and signature [3] based solutions fail to adapt to the detection of ever-evolving attacks. (B) Some solutions depend on crowd-sourced data [29], which is impractical to scale up to a system that has to protect billions of devices. (C) Some detection solutions [21–23, 34, 35] require installing expensive hardware; in most cases, they are proprietary. For example, CellDAM [36] requires a separate companion node near the UEs to capture the signaling messages. This is not a practical solution for protecting billions of devices. (D) Lower layer based solutions [19,20,24–28,37] ABSTRACT Fake base stations (FBSes) pose a significant security threat by impersonating legitimate base stations. Though efforts have been made to defeat this threat, up to this day, the presence of FBSes and the multi-step attacks (MSAs) stemming from them can lead to unauthorized surveillance, interception of sensitive information, and disruption of network services for legitimate users. Therefore, detecting these malicious entities is crucial to ensure the security and reliability of cellular networks. Traditional detection methods often rely on additional hardware, predefined rules, signal scanning, changing protocol specifications, or cryptographic mechanisms that have limitations and incur huge infrastructure costs in accurately identifying FBSes. In this paper, we develop FBSDetector–an effective and efficient detection solution that can reliably detect FBSes and MSAs from layer-3 network traces using machine learning (ML) at the user equipment (UE) side. To develop FBSDetector, we created FBSAD and MSAD, the first-ever high-quality and large-scale datasets for training machine learning models capable of detecting FBSes and MSAs. These datasets capture the network traces in different real-world cellular network scenarios (including mobility and different attacker capabilities) incorporating legitimate base stations and FBSes. The combined network trace has a volume of 6.6 GB containing 751963 packets. Our novel ML models, specially designed to detect FBSes and MSAs, can effectively detect FBSes with an accuracy of 92% and a false positive rate of 5.96% and recognize MSAs with an accuracy of 86% and a false positive rate of 7.82%. We deploy FBSDetector as a real-world solution to protect end-users through an Android app and validate in a controlled lab environment. Compared to the existing heuristic-based solutions that fail to detect FBSes, FBSDetector can detect FBSes in the wild in real time. 1 Elisa Bertino Purdue University West Lafayette, IN, USA bertino@purdue.edu INTRODUCTION The widespread adoption of cellular networks has brought about unprecedented improvements in data rates, latency, and device connectivity, resulting in a surge in the number of connected devices worldwide. In 2023, the number of mobile devices is assessed at 16.8 billion having an estimated 5.25 billion global users, marking a 4.9% annual increase [1], and the number of mobile devices is expected to reach 18.22 billion by 2025 having 5.67 billion users [2]. Given the extensive usage and dependence on cellular networks, they become desirable targets for malicious entities. These entities try to disrupt cellular network services by exploiting different types of vulnerabilities in cellular network protocols with the help of sophisticated hardware. Of all the attacks and threat models targeting cellular *Equal contribution. The student author’s name is given first. 1" 2401.04972v1,"Whose wife is it anyway? Assessing bias against same-gender relationships in machine translation Ian Stewart Pacific Northwest National Laboratory ian.stewart@pnnl.gov Rada Mihalcea University of Michigan mihalcea@umich.edu Abstract Machine translation often suffers from biased data and algorithms that can lead to unacceptable errors in system output. While bias in gender norms has been investigated, less is known about whether MT systems encode bias about social relationships, e.g. sentences such as “the lawyer kissed her wife”. We investigate the degree of bias against same-gender relationships in MT systems, using generated template sentences drawn from several noun-gender languages (e.g. Spanish). We find that three popular MT services consistently fail to accurately translate sentences concerning relationships between nouns of the same gender. The error rate varies considerably based on the context, e.g. same-gender sentences referencing high female-representation occupations are translated with lower accuracy. We provide this work as a case study in the evaluation of intrinsic bias in NLP systems, with respect to social relationships. 1 Introduction Machine translation (MT) is meant to achieve a faithful and fluent representation of a source language utterance in a given target language. While NLP research continues to improve the accuracy and robustness of MT systems (Lai et al., 2022; Liu et al., 2020), the full space of possible translation failures remains to be determined, particularly with respect to gender (Stanovsky et al., 2019). One example is how MT systems may generate masculine-gender words as the default for gendered languages (Savoldi et al., 2021), which led Google Translate to provide simultaneous translations for all genders. Focusing on word-based bias in MT is a good start, but translation systems may also exhibit grammatical bias that can reflect social stereotypes (Savoldi et al., 2021). We show an example of grammatical bias in Figure 1, where Figure 1: Example translation error of same-gender sentence between English and Spanish (Google Translate; accessed 1 November 2023). a sentence containing a same-gender relationship (“the lawyer kissed his husband”) is re-translated as a sentence with a different-gender relationship (“her husband”). This error seems to reveal the model’s bias toward fluent translation at the cost of faithfulness (Feng et al., 2020), generating an output sentence with higher likelihood in the target language (“her husband”) but a possibly inaccurate meaning for the source language. Furthermore, this kind of error can only be brought to light by focusing on relationships between entities, an issue which is more complicated but equally important as bias in individual entities like “doctor.” Addressing bias in translation of relationships is important for some social groups such as LGBTQ people, who often face discrimination for engaging in relationships with partners of the same gender (Poushter and Kent, 2020). This study presents an analysis of the discrepancy in representation of same-gender vs. different-gender relationships in multilingual data and translation systems, focusing on languages with noun gender-marking. Our study proceeds as follows: • We generate a curated data set of sentence templates for a variety of relationships in French, Italian, and Spanish, using the format “OCCUPATION RELATIONSHIP-VERB HIS/HER RELATIONSHIP-TARGET.” (§ 3.1). • We test several leading MT models on this dataset, and we find a consistent bias against" 2401.04976v1,"FULL-FREQUENCY DYNAMIC CONVOLUTION: A PHYSICAL FREQUENCY-DEPENDENT CONVOLUTION FOR SOUND EVENT DETECTION Haobo Yue, Zhicheng Zhang B , Da Mu, Yonghao Dang, Jianqin Yin, Jin Tang Beijing University of Posts and Telecommunications, Beijing, China {hby, zczhang}@bupt.edu.cn Acoustic feature ABSTRACT Recently, 2D convolution has been found unqualified in sound event detection (SED). It enforces translation equivariance on sound events along frequency axis, which is not a shiftinvariant dimension. To address this issue, dynamic convolution is used to model the frequency dependency of sound events. In this paper, we proposed the first full-dynamic method named full-frequency dynamic convolution (FFD- Conv). FFDConv generates frequency kernels for every frequency band, which is designed directly in the structure for frequency-dependent modeling. It physically furnished 2D convolution with the capability of frequency-dependent modeling. FFDConv outperforms not only the baseline by 6.6% in DESED real validation dataset in terms of PSDS1, but outperforms the other full-dynamic methods. In addition, by visualizing features of sound events, we observed that FFDConv could effectively extract coherent features in specific frequency bands, consistent with the vocal continuity of sound events. This proves that FFDConv has great frequencydependent perception ability. Code is available at FFDConv. Index Terms— sound event detection, full-frequency dynamic convolution, frequency-dependent modeling, independent representation spaces, vocal continuity 1. INTRODUCTION Sound event detection (SED) is one of the subtasks of computational auditory scene analysis (CASA) [1], which helps machines understand the content of an audio scene. Similar to visual object detection [2] and segmentation [3], SED aims to detect sound events and corresponding timestamps (onset and offset), considered as a prior task of automatic speech recognition (ASR) and speaker verification. It has wide applications in information retrieval [4], smart homes [5], and smart cities [6]. SED has achieved great success with the help of deep learning (DL). The general paradigm is that acoustic spectral features are passed through a deep neural network and then transformed into discriminative acoustic representations to distinguish different sound events. Designing an effective feature extractor has become a hot topic in SED, which has Shared kernel f t Ours Acoustic feature f t Frequency-adaptive kernels Acoustic feature Kernel application Frequency spaces Kernels generating Convolution Kernel Fig. 1. Illustration of frequency-dependent modeling. Top models time-frequency patterns in the same space with a shared kernel. Bottom models them in serval spaces with frequency-adaptive kernels, in which time-frequency patterns specific to sound events can be considered. been adopting methods qualified in other domains in the past few years. Convolutional neural networks (CNN) from the field of computer vision, such as SENet [7], SKNet [8], and CBAM [9] have been migrated to SED in the spirit of acoustic spectrogram being similar to two-dimensional image data. With the intention that speech and audio are both sound data, Conformer [10] from the field of speech recognition has migrated to SED. However, they all failed to show good performance in SED. Specifically, SENet, SKNet, and CBAM are designed on image data with a clear 2D spatial concept, while audio data is a sequence. Conformer is designed on speech data containing only the speech sound event, meaning time-frequency patterns of speech data are distributed only in a certain fixed frequency band. However, audio data always contains multiple sound events, and so has diverse timefrequency patterns of sound events. All of the above emphasize that DL methods qualified in other domains may not nec-" 2401.04979v1,"Invertible Solution of Neural Differential Equations for Analysis of Irregularly-Sampled Time Series YongKyung Oh 1 , Dongyoung Lim 2,3 , Sungil Kim 2,3 1 Industry Intelligentization Institute, UNIST Department of Industrial Engineering, UNIST 3 Graduate school of Artificial Intelligence, UNIST Ulsan, Republic of Korea {yongkyungoh, dlim, sungil.kim}@unist.ac.kr 2 Abstract To handle the complexities of irregular and incomplete time series data, we propose an invertible solution of Neural Differential Equations (NDE)-based method. While NDE-based methods are a powerful method for analyzing irregularly-sampled time series, they typically do not guarantee reversible transformations in their standard form. Our method suggests the variation of Neural Controlled Differential Equations (Neural CDEs) with Neural Flow, which ensures invertibility while maintaining a lower computational burden. Additionally, it enables the training of a dual latent space, enhancing the modeling of dynamic temporal dynamics. Our research presents an advanced framework that excels in both classification and interpolation tasks. At the core of our approach is an enhanced dual latent states architecture, carefully designed for high precision across various time series tasks. Empirical analysis demonstrates that our method significantly outperforms existing models. This work significantly advances irregular time series analysis, introducing innovative techniques and offering a versatile tool for diverse practical applications. Introduction Effectively modeling time series data stands as a foundational pursuit in machine learning, anchoring countless applications. Among the myriad of innovations, Neural Ordinary Differential Equations (Neural ODEs) have distinguished themselves, garnering widespread acclaim for their prowess in encapsulating complex temporal dynamics (Chen et al. 2018). Neural Controlled Differential Equations (Neural CDEs) represent a noteworthy enhancement, ingeniously integrating controlled paths. This integration facilitates dynamic adjustment of continuous trajectories, catering to incoming observations, thereby imbuing the model with heightened adaptability (Kidger et al. 2020). Neural differential equation (NDE)-based methods, despite their powerful expressiveness, confront limitations in scenarios with sparse or irregularly sampled data. These methods often struggle to encapsulate the inherent uncertainty in underlying dynamics, a critical aspect in many real-world time-series data (Norcliffe et al. 2020). Additionally, NDE- based methods exhibit instability in stiff problems, where the solver of the differential equation necessitates minuscule Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. integration steps, a phenomenon observed in both known and training-induced stiff latent dynamics (Massaroli et al. 2020b; Biloš et al. 2021). In parallel with the evolution of NDE-based methods, the other researches have focused on the continuum limit of neural networks. This approach realizes the input-output mapping through the solution of NDEs (Lu et al. 2018; Sonoda and Murata 2019; Massaroli et al. 2020a; Biloš et al. 2021). Unlike methods that rely on ODE solvers, Neural Flows prioritize capturing the solution curves, or ""flows,"" inherent to an ODE using neural networks, thereby offering a distinct approach to modeling. Flow model can provide the invertible solution that leverage the change of variables formula to compute probability density functions, enhancing solution stability (Kobyzev, Prince, and Brubaker 2020; Papamakarios et al. 2021). The effectiveness of the naïve implementation of neural flow is significantly influenced by the choice of initial values, necessitating meticulous design and fine-tuning for optimal performance. Motivated by the complementary strengths of these paradigms, our work introduces an innovative methodology that incorporates Neural CDEs and Neural Flows within a unified framework, all underpinned by a dual latent space architecture for the irregularly-sampled time series classification. This synthesis endows our model with the dexterity to harness the combined might of both approaches. Related Works Neural ODEs Neural ODEs present a fascinating synergy between continuous-time dynamics and the flexibility of neural architectures (Chen et al. 2018). These models exploit ODE solvers to address the challenges associated with integral formulations, as detailed in eq. (1). For a given time t, let us denote a hidden representation as z(t), which is derived from an original irregularly-sampled observation, x = (x 0 , x 1 , . . . , x n ). Neural ODEs can be formally expressed as: Z t z(t) = z(0) + f (s, z(s); θ f )ds, (1) 0 where the initial value z(0) = h(x; θ h ), and h : R d x → R d z characterized by its learnable parameters, θ h . The differential function, f (s, z(s); θ f ), which approximates the rate of" 2401.04997v1,"Prompting Large Language Models for Recommender Systems: A Comprehensive Framework and Empirical Analysis LANLING XU and JUNJIE ZHANG, Gaoling School of Artificial Intelligence, Renmin University of China, China BINGQIAN LI, Beijing Key Laboratory of Big Data Management and Analysis Methods, China JINPENG WANG and MINGCHEN CAI, Meituan Group, China WAYNE XIN ZHAO ∗ and JI-RONG WEN, Gaoling School of Artificial Intelligence, Renmin University, China Recently, large language models such as ChatGPT have showcased remarkable abilities in solving general tasks, demonstrating the potential for applications in recommender systems. To assess how effectively LLMs can be used in recommendation tasks, our study primarily focuses on employing LLMs as recommender systems through prompting engineering. We propose a general framework for utilizing LLMs in recommendation tasks, focusing on the capabilities of LLMs as recommenders. To conduct our analysis, we formalize the input of LLMs for recommendation into natural language prompts with two key aspects, and explain how our framework can be generalized to various recommendation scenarios. As for the use of LLMs as recommenders, we analyze the impact of public availability, tuning strategies, model architecture, parameter scale, and context length on recommendation results based on the classification of LLMs. As for prompt engineering, we further analyze the impact of four important components of prompts, i.e., task descriptions, user interest modeling, candidate items construction and prompting strategies. In each section, we first define and categorize concepts in line with the existing literature. Then, we propose inspiring research questions followed by experiments to systematically analyze the impact of different factors on two public datasets. Finally, we summarize promising directions to shed lights on future research. CCS Concepts: • Information systems → Recommender systems. Additional Key Words and Phrases: Large Language Models, Recommender Systems, Empirical Study ACM Reference Format: Lanling Xu, Junjie Zhang, Bingqian Li, Jinpeng Wang, Mingchen Cai, Wayne Xin Zhao, and Ji-Rong Wen. 2018. Prompting Large Language Models for Recommender Systems: A Comprehensive Framework and Empirical Analysis. In . ACM, New York, NY, USA, 46 pages. https://doi.org/XXX.XXX 1 INTRODUCTION In order to alleviate the problem of information overload [31, 76], recommender systems explore the needs of users and provide them with recommendations based on their historical interactions, which are widely studied in both industry ∗ Wayne Xin Zhao (batmanfly@gmail.com) is the corresponding author. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2018 Association for Computing Machinery. Manuscript submitted to ACM 1" 2401.05004v1,"Prepared for submission to JINST Cryogenic setup for the characterization of wavelength-shifting materials for noble element radiation detectors S. Choudhary 𝑎 A. F. V. Cortez 𝑎,1 M. Kuźniak 𝑎 G. Nieradka 𝑎 T. Sworobowicz 𝑎 Ł. Świderski 𝑏 and T. Szczęśniak 𝑏 𝑎 AstroCeNT, Nicolaus Copernicus Astronomical Center of the Polish Academy of Sciences, ul. Rektorska 4, 00-614 Warsaw, Poland 𝑏 National Center for Nuclear Research, 05-400 Otwock - Świerk, Poland E-mail: acortez@camk.edu.pl Abstract: In the present work, we describe a cryogenic setup for studies of wavelength-shifting materials for optimised light collection in noble element radiation detectors, and discuss the commissioning results. This SiPM-based setup uses alpha induced scintillation in gaseous argon as the vacuum ultraviolet light source with the goal of characterising materials, such as polyethylene naphthalate (PEN) and tetraphenyl butadiene (TPB), in terms of their wavelength-shifting efficiency. Further extensions of the system are currently being studied. The foreseen upgrades are expected to allow the study of GEM-like structures potentially interesting for rare-event searches. The design of the setup will be addressed along with the first results. Keywords: dark matter detectors; gaseous detectors; micropattern gaseous detectors; wavelength shifters; noble gas detectors; noble liquid detectors; time projection chambers; FAT-GEM 1Corresponding author." 2401.05013v1,"Imperfect Measurements and Conjugate Observables Adarsh S, ∗ P. N. Bala Subramanian, † and T. P. Sreeraj ‡ Department of Physics, National Institute of Technology Calicut, Kozhikode, India. In the standard von Neumann interaction used in Quantum measurements, the chosen observable to which the environment (apparatus) entangles is exactly reproduced in the state of the environment, thereby decohering the quantum system in the eigenbasis of the observable. We relax this by allowing for imperfect measurements whereby the environment evolves to a state that approximately, but not exactly, reflects the state of the system. In this scheme it is possible to attain approximate decoherence of conjugate quantities that resembles classical physics, which we demonstrate using an example. I. INTRODUCTION Our general intuition of the world around us is built into a paradigm called classical physics. Although fundamentally quantum mechanical, these systems exhibit generic behavior which we usually call as classical, and can be thought of as consisting of at least the following features: 1. A perfect measurement of any observable of the system does not interfere with the measurement of any other. In particular, a measurement of generalized coordinates do not interfere with that of conjugate momenta. Since any other observable maybe written in terms of them, they may be used to label the state of the system. Equivalently, state of the system maybe denoted by a point in the phase space. This necessarily implies that there are no entangled states. 2. State of the system obeys Hamilton’s equations of motion and given the state of system at any instant of time, it follows a unique trajectory in phase space called the classical trajectory. 3. State of the system cannot be in a linear combination of eigenstates of observables. In particular, it cannot be a linear combination of eigenstates of generalized coordinates or conjugate momenta. ∗ Electronic address: s.adarsh4812@gmail.com Electronic address: pnbala@nitc.ac.in ‡ Electronic address: sreerajtp@nit.ac.in †" 2401.05015v1,"An Information Theoretic Approach to Interaction-Grounded Learning Xiaoyan Hu ∗ Farzan Farnia † Ho-fung Leung ‡ January 11, 2024 Abstract Reinforcement learning (RL) problems where the learner attempts to infer an unobserved reward from some feedback variables have been studied in several recent papers. The setting of Interaction-Grounded Learning (IGL) is an example of such feedback-based reinforcement learning tasks where the learner optimizes the return by inferring latent binary rewards from the interaction with the environment. In the IGL setting, a relevant assumption used in the RL literature is that the feedback variable Y is conditionally independent of the context-action (X, A) given the latent reward R. In this work, we propose Variational Information-based IGL (VI-IGL) as an information-theoretic method to enforce the conditional independence assumption in the IGL-based RL problem. The VI-IGL framework learns a reward decoder using an information-based objective based on the conditional mutual information (MI) between the context-action (X, A) and the feedback variable Y observed from the environment. To estimate and optimize the information-based terms for the continuous random variables in the RL problem, VI-IGL leverages the variational representation of mutual information and results in a min-max optimization problem. Furthermore, we extend the VI-IGL framework to general f - Information measures in the information theory literature, leading to the generalized f -VI-IGL framework to address the RL problem under the IGL condition. Finally, we provide the empirical results of applying the VI-IGL method to several reinforcement learning settings, which indicate an improved performance in comparison to the previous IGL-based RL algorithm. 1 Introduction In several applications of reinforcement learning (RL) algorithms, the involved agent lacks complete knowledge of the reward variable, e.g. in applications concerning brain-computer interface (BCI) (Schalk et al., 2004; Serrhini and Dargham, 2017) and recommender systems (Maghakian et al., 2023). In such RL settings, the lack of an explicit reward could lead to a challenging learning task where the learner needs to infer the unseen reward from observed feedback variables. The additional inference task for the reward variable could significantly raise the computational and statistical complexity of the RL problem. Due to the great importance of addressing such RL problems with a misspecified reward variable, they have been exclusively studied in several recent papers (Xie et al., 2021b, 2022; Maghakian et al., 2023). ∗ The Chinese University of Hong Kong. Email: xyhu21@cse.cuhk.edu.hk The Chinese University of Hong Kong. Email: farnia@cse.cuhk.edu.hk ‡ Independent Researcher. Email: ho-fung.leung@outlook.com † 1" 2401.05039v1,"Accelerating Maximal Biclique Enumeration on GPUs Chou-Ying Hsieh 1 , Chia-Ming Chang 1 , Po-Hsiu Cheng 2 and Sy-Yen Kuo 1 1 2 Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan Graduate Institute of Electronic Engineering, National Taiwan University, Taipei, Taiwan { f07921043, r10921101, r10943151, sykuo } @ntu.edu.tw Abstract—Maximal Biclique Enumeration (MBE) holds critical importance in graph theory with applications extending across fields such as bioinformatics, social networks, and recommendation systems. However, its computational complexity presents barriers for efficiently scaling to large graphs. To address these challenges, we introduce cuMBE, a GPU-optimized parallel algorithm for MBE. Utilizing a unique data structure, called compact array, cuMBE eradicates the need for recursion, thereby significantly minimizing dynamic memory requirements and computational overhead. The algorithm utilizes a hybrid parallelism approach, in which GPU thread blocks handle coarsegrained tasks associated with part of the search process. Besides, we implement three fine-grained optimizations within each thread block to enhance performance. Further, we integrate a workstealing mechanism to mitigate workload imbalances among thread blocks. Our experiments reveal that cuMBE achieves an average speedup of 6.1x and 6.3x compared to the state-of-theart serial algorithm and parallel CPU-based algorithm on both common and real-world datasets, respectively. I. I NTRODUCTION The graph, a central discipline in computer science, servers as a versatile representation tool for complex real-world problems. Among its diverse applications, the concept of bicliques, especially maximal biclique, stands as a core problem. A biclique is a complete subgraph of a biparitite graph, where every vertex in one set connects to every vertex in another set. A maximal biclique extends this concept as a biclique that cannot include any other adjacent vertices without violating the biclique condition. Maximal biclique enumeration (MBE), which finds all the maximal bicliques in a given bipartite, has profound implication across a spectrum of fields such as bioinfomatics [1]–[5], text mining [6]–[8], recommendation systems [9], [10], and even the accelerating of the graph neural network [11]. In these field, the maximal biclque can reveal intricate structure and essential relationships. For instance, in recommendation systems, a maximal biclique can represent a group of users who share high preference on certain products. This property can help recommendation systems be more accurate. One of the most prestigious MBE algorithm is the MBEA proposed by Zhang, et.al [12]. Inspired by Bron-Kerbosch’s maximal clique enumeration (MCE) [13], MBEA refines the backtracking technique in Bron-Kerbosch’s algorithm by traversing a searching tree. During the traversal, the procedure adds a vertex into the current biclique and check if it can construct a maximal biclique recursively. Unfortunately, due to the inherent combinatorial complexity of MBE, the computational task is often intensive and even becomes significantly challenging for large-scale real-world graph data. Despite there are numerous prior works [14]–[18] have introduced versatile improvements on reducing the algorithm complexity, the state-of-the-art [19] sequential approach still consumes considerable time on large-scale datasets. To address the limitation, Das et al. [16] leveraged the power of multi-core CPUs to parallelize the MBE algorithm, achieving significant improvements in performance. Despite these advancements, the pursuit for greater scalability persists. The emergence of Graphics Processing Units (GPUs), renowned for their extensive parallel computational capabilities, presents an intriguing prospect for further enhancing the scalability beyond what has been achieved with CPUs alone Nevertheless, the specific application of GPUs for efficient maximal biclique enumeration remains an open problem. In particular, avoiding memory explosion on GPUs, managing the granularity of parallelism, and distributing workload evenly across GPU threads pose unique challenges. In this paper, we present cuMBE, a novel GPU parallel algorithm for MBE. cuMBE employs a depth-first approach and addresses its recursive overhead with an innovative data structure, the compact array. This mitigates memory overload and negates the need for dynamic memory allocation. To efficiently manage tasks, cuMBE adopts hybrid parallelism, with a GPU thread block handling coarse-grained tasks and optimized fine-grained task management within each block. To further enhance performance, a k-level workstealing algorithm is incorporated to balance workload among thread blocks. Comparative analysis against traditional CPU- based methods, using real-world graph datasets, demonstrates cuMBE’s superior performance with an average 6.1x and 6.3x speedups over state-of-the-art serial and parallel algorithms, respectively, on prevalent datasets. We also demonstrate that the implemented work-stealing algorithm effectively mitigates workload disparities. Notably, the cuMBE code is openly available to facilitate future research. The paper is organized as the below: In the next section, we first introduce the preliminary of MBE algorithm as well as the advanced techniques used in MBE algorithm. Then, we point out the challenges that implements MBEA on GPUs and" 2401.05049v1,"Content-Aware Depth-Adaptive Image Restoration Tom Richard Vargis, Siavash Ghiasvand Center for Interdisciplinary Digital Sciences (CIDS), Technische Universität Dresden, Germany Center for Scalable Data Analytics and Artificial Intelligence (ScaDS.AI) Dresden/Leipzig. Germany {tom richard.vargis , siavash.ghiasvand}@tu-dresden.de Index Terms—Modular adaptive pipeline, Content-aware restoration, Layered scene editing, Explainable AI, Open source The pursuit of enhancing visual clarity, detail, and overall aesthetic appeal in image restoration has evolved with the emergence of deep learning models. While existing models like Midjourney, Stable-Diffusion, and DALL-E 2 simplify the restoration process with prompts, they lack fine-grained user control. Furthermore, the generated output is highly nondeterministic. This research introduces a modular pipeline designed to empower users with comprehensive control over image restoration, demanding minimal skills and time. The pipeline independently recognizes and restores individual objects within the input image, allowing for precise control over their categorical restoration, placement, and layering. Its modular design facilitates easy substitution of models, enhancing adaptability to specific object domains such as medical image restoration. To facilitate the reproducibility of this work, the source code and sample data are publicly available [1]. Several research efforts have aimed to enhance image restoration by introducing additional functionalities. Despite the advantages of text-based approaches highlighted in [2], and [3], they fall short in providing fine-grained user control, especially with severely distorted images. Although the methodologies proposed in [4], and [5] involve direct user participation in restoration, such as controlling denoising and deblurring or modifying masks for personalized preferences, they typically adopt a coarser granular approach, treating the entire image as a single entity. Existing content-aware methods like [6], [7], and [8] often focus on individual issues, lacking a single method encompassing all benefits. The proposed pipeline integrates functionalities with unique content awareness, providing users complete control over image edits with user-friendly accessibility. The pipeline’s adaptability suggests potential extensions to other specialized image domains like in [7]. Moreover, the suggested contentaware modular pipeline, provides a deterministic restoration method even in the face of underlying models’ unpredictable behavior, thereby ensuring that each produced outcome is explainable and reproducible. The proposed pipeline comprises distinct stages, each processed separately and replaceable based on user preferences. Users can configure the pipeline using a simple dictionary file, tailoring it to their specific needs. The modular framework integrates existing deep learning models, leveraging their strengths to enhance the overall performance of the pipeline. This approach stands in contrast to traditional methods that create models from scratch, providing a more flexible and efficient restoration process. The pipeline’s dynamic stages adapt to user-defined configurations, offering fine-grained control over the image restoration. A directory-based approach facilitates image-in, and image-out processing at each stage, ensuring a seamless flow of information. Users can view and alter the models for any stage, adding a layer of flexibility to the automated workflow. The pipeline isolates the contents of the image using a combination of object detection [YOLOv3u, YOLOv8n] 1 and background removal [DeepLabv3 2 , YOLOv8-seg] algorithms (Path 1) or by alternatively using an instance segmentation [YOLOv8-seg] algorithm (Path2) before proceeding to image restoration [runwayml/StableDiffusion-inpainting] 3 . The models independently restore each identified object and its background and reposition them to generate the final output. It is important to highlight that the mentioned models are solely utilized as a proof of concept, and any other model relevant to the image content can be employed. In the inpainting image restoration step, a mask is required to selectively restore essential regions of the instance rather than the entire entity. An additional finer granularity control is achieved through image tuning that allows the user to modify individual objects based on a prompt and layered scene customization that facilitates depth adaptive remodeling of the image. This component of the pipeline allows users to seamlessly remove objects from the image and restructure them by adjusting their positions in the x, y, and z directions within the scene. These two additional steps provide extra control and may not necessarily be integral components of the main pipeline branch. The models selected for each component are pre-trained and chosen based on their efficiency in handling the COCO animal dataset. A wrapper code facilitates the seamless integration of the models into the pipeline, ensuring a smooth execution of the restoration process. Additional functionalities, such as padding the cropped instances and morphological operations on masks, 1 https://github.com/ultralytics/ultralytics 2 https://pytorch.org/hub/pytorch vision deeplabv3 resnet101/ 3 https://github.com/runwayml/stable-diffusion" 2401.05071v1,"This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics 1 Inertial wave super-attractor in a truncated elliptical cone 1 Benjamin Favier 1 † and Stéphane Le Dizès 1 Aix Marseille Univ, CNRS, Centrale Marseille, IRPHE, Marseille, France (Received xx; revised xx; accepted xx) We consider inertial waves propagating in a fluid contained in a non-axisymmetric threedimensional rotating cavity. We focus on the particular case of a fluid enclosed inside a truncated cone or frustum, which is the volume that lies between two horizontal parallel planes cutting an upright cone. While this geometry has been studied in the past, we generalise it by breaking its axisymmetry and consider the case of a truncated elliptical cone for which the horizontal sections are elliptical instead of circular. The problem is first tackled using ray tracing where local wave packets are geometrically propagated and reflected within the closed volume without attenuation. We complement these results with a local asymptotic analysis and numerical simulations of the original linear viscous problem. We show that the attractors, well-known in two dimensional or axisymmetric domains, can be trapped in a particular plane in three-dimension provided that the axisymmetry of the domain is broken. Contrary to previous examples of attractors in three-dimensional domains, all rays converge towards the same limit cycle regardless of initial conditions, and it is localised in the bulk of the fluid. 1. Introduction Inertial waves and internal gravity waves are waves propagating in rotating and stratified fluids, respectively. In three dimensions, when forced locally in a uniformly rotating (or stratified) fluid, these waves have the particularity to propagate along a double cone that makes a constant angle with respect to the axis of rotation (or to the direction of stratification). This property allows to show that, when propagating within a closed container, wave packets may converge after multiple reflections on solid boundaries to a particular surface called attractor in 2D (Maas & Lam 1995) or axisymmetric geometries such as the spherical shell (Rieutord & Valdettaro 1997). One of the simplest geometries giving rise to attractors is a rectangular container with a sloping boundary. This trapezoidal geometry has been the subject of numerous works since the first study in a stratified fluid by Maas et al. (1997). The theoretical attractors obtained by ray tracing have been observed both experimentally (Hazewinkel et al. 2008, 2010; Scolan et al. 2013) and numerically (Drijfhout & Maas 2007; Grisouard et al. 2008). Similar results were also obtained in rotating fluids in the same geometry (Maas 2001; Manders & Maas 2003, 2004) or in its axisymmetric version (Klein et al. 2014; Sibgatullin et al. 2019; Boury et al. 2021; Pacary et al. 2023). Attractors have also been found to be generic features of inertial waves in spherical shells (Rieutord & Valdettaro 1997; Rieutord et al. 2000). Early studies concerned attractors localised close to the equator (Stern 1963; Bretherton 1964; Stewartson 1972) which possess similar properties as 2D attractors (Rieutord et al. 2002). But the picture seems more complex in a spherical shell owing to the presence of the rotation axis in the domain and of a critical latitude singularity † Email address for correspondence: benjamin.favier@cnrs.fr" 2401.05075v1,"Interface-Driven Peptide Folding: Quantum Computations on Simulated Membrane Surfaces Daniel Conde-Torres, 1, 2 Mariamo Mussa-Juane, 3 Daniel Faı́lde, 3 Andrés Gómez, 3 Rebeca Garcı́a-Fandiño, 2, 4, ∗ and Ángel Piñeiro 1, 4, † 1 Departamento de Fı́sica Aplicada, Facultade de Fı́sica, Universidade de Santiago de Compostela,Santiago de Compostela, E-15782,Spain 2 Organic Chemistry Department, Centro Singular de Investigación en Quı́mica Biolóxica e Materiais Moleculares (CiQUS), Universidade de Santiago de Compostela, Campus Vida s/n, Santiago de Compostela, E-15782, Spain 3 Centro de Supercomputación de Galicia (CESGA),Santiago de Compostela,15705, Spain 4 MD.USE Innovations S.L., Ed. Emprendia, Campus Vida s/n, Santiago de Compostela, E-15782, Spain (Dated: January 11, 2024) Antimicrobial peptides (AMPs) are pivotal in combating infections. They play important roles in broader health contexts, including cancer, autoimmune diseases, and aging. A critical aspect of AMP functionality is their targeted interaction with pathogen membranes, which often possess altered lipid compositions. Designing AMPs with enhanced therapeutic properties relies on a nuanced understanding of these interactions, which are believed to trigger a rearrangement of these peptides from random coil to alpha-helical conformations, essential for their lytic action. Traditional supercomputing has consistently encountered difficulties in accurately modeling these structural changes, especially within membrane environments, thereby opening an opportunity for more advanced approaches. This study extends an existing quantum computing algorithm, initially designed to simulate peptide folding in homogeneous environments, by adapting it to address the complexities of antimicrobial peptide (AMP) interactions at interfaces. Our approach enables the prediction of the optimal conformation of peptides located in the transition region between hydrophilic and hydrophobic phases, akin to lipid membranes. The new method has been applied to model the structure of three 10-amino-acid-long peptides, each exhibiting hydrophobic, hydrophilic, or amphipathic properties in different media and at interfaces between solvents of different polarity. Notably, our approach does not demand a higher number of qubits compared to simulations in homogeneous media, making it more feasible with current quantum computing resources. Despite existing limitations in computational power and qubit accessibility, our findings demonstrate the significant potential of quantum computing in accurately characterizing complex biomolecular processes, particularly the folding of AMPs at membrane models. This research paves the way for future advances in quantum computing to enhance the accuracy and applicability of biomolecular simulations, with promising implications for the development of novel therapeutic agents. I. INTRODUCTION Antimicrobial peptides (AMPs) are critical components of the innate immune system present in all living organisms[1]. These peptides have been primarily associated with a defensive role against exogenous infections caused by bacteria, viruses, and fungi, and they are considered powerful and versatile endogenous antibiotics, capable of resisting bacterial adaptation for millions of years. However, recent research advances have pointed to the link between AMPs and a broader spectrum of diseases, such as cancer and various human inflammatory and autoimmune diseases, including aging[2, 3]. Although more than 3,000 AMPs have been identified so far in distinct cells and tissues of animals, insects, plants, and bacteria, only a few have reached the pharmaceutical market[4]. Challenges for the clinical application of AMPs include cytotoxic effects, production costs, and problems related to sustained, targeted, and effective delivery. The quest to discover and refine new antimicrobial ∗ E-mail me at: rebeca.garcia.fandino@usc.es † E-mail me at: angel.pineiro@usc.es peptides (AMPs), including both natural and engineered variants, represents a dynamic and promising field of research. The goal is to overcome these challenges, optimizing these peptides for medical use and leveraging their full potential as therapeutic agents. Unraveling this matter is crucial when antibiotic resistance is a growing global threat but also in the fight against cancer and aging, areas where AMPs can still provide significant solutions. Despite varying length, sequence, and conformation, most AMPs share crucial structural and physicochemical properties: they are typically short, cationic, and amphipathic peptides. This unique combination of characteristics enables them to selectively target and interact with pathogenic or pathological membranes, such as those found in cancer, bacteria, and senescent cells. This selective targeting stems from a common feature in these membranes: a high proportion of negatively charged lipids, in contrast to what happens in healthy mammalian cells whose electrostatic charge density is normally negligible. AMPs are known to undergo conformational shifts, transitioning from random structures in solution to helical structures upon encountering a membrane, a change driven by their inherent amphiphilic nature (Fig. 1)." 2401.05083v1,"Article Discrete-Time Stress Matrix-Based Formation Control of General Linear Multi-Agent Systems Okechi Onuoha 1 , Suleiman Kurawa 2 , Zezhi Tang 3 and Yi Dong 4 1 2 3 4 Abstract: This paper considers the distributed leader-follower stress-matrix-based affine formation control problem of discrete-time linear multi-agent systems with static and dynamic leaders. In leader-follower multiagent formation control, the aim is to drive a set of agents comprising leaders and followers to form any desired geometric pattern and simultaneously execute any required manoeuvre by controlling only a few agents denoted as leaders. Existing works in literature are mostly limited to the cases where the agents’ inter-agent communications are either in the continuous-time settings or the sampled-data cases where the leaders are constrained to constant (or zero) velocities or accelerations. Here, we relax these constraints and study the discrete-time cases where the leaders can have stationary or time-varying velocities. We propose control laws in the study of different situations and provide some sufficient conditions to guarantee the overall system stability. Simulation study is used to demonstrate the efficacy of our proposed control laws. Keywords: Formation Control; Multi-agent System; Stress Matrix; Linear Systems; Distributed Control 1. INTRODUCTION Citation: Onuoha, O.; Kurawa, S.; Tang, Z.; Dong, Y. Discrete-Time Stress Matrix-Based Formation Control of General Linear Multi-Agent Systems. Journal Not Specified 2024, 1, 0. https://doi.org/ Received: Revised: Accepted: Published: Copyright: © 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). School of Computing, Engineering, and Intelligent Systems, Ulster University; o.onuoha@ulster.ac.uk School of Electrical and Electronic Engineering, The University of Manchester; suleiman.kurawa@postgrad.manchester.ac.uk Department of Automatic Control and Systems Engineering, University of Sheffield; zezhi.tang@sheffield.ac.uk School of Electronics & Computer Science, University of Southampton; yi.dong@soton.ac.uk Formation control of multi-agent systems (MASs) has attracted several research interests in recent times because of its wide applications in both civil and military operations. This includes areas such as environment and facilities monitoring using e.g., unmanned aerial vehicles (UAVs); military attack and defence systems using multiple unmanned aircraft, boats, and underwater vehicles; and agricultural applications such pest control using UAVs. Some other application areas includes mobile robots control and sensor networks. The primary goal of formation control is to steer a team of agents to form any required geometric pattern and also to simultaneously accomplish any required manoeuvre control of the team such as formation translation, scaling, shearing, rotation, etc. Researcher have used different strategies to accomplish formation in the last two decades. For example, in the last decade, the consensus-based formation control strategy has been used to study formation control problems in [1], [2] and [3]. The consensus-based strategy primarily consists of three methods namely the: displacement-based [4], distance-based [5], and bearingbased [6] formation control methods. They accomplish formation control by imposing pre-defined constant off-sets on a chosen reference. The reference can be for example, the leader position or consensus value of the agents. The imposed constant off-set can be on the agents bearing (for bearing-based formation control), distance (for distance-based formation control), or displacement (for displacement-based formation control). A major problem with these methods of formation control is that the imposed off-sets are defined at the design stage and normally cannot be changed during operation without a redesign of the system. This therefore limits the formation manoeuvre the agents can accomplish. Note that agents of these methods cannot simultaneously accomplish the commonly required formation manoeuvres such as scaling, rotation, translation, shearing, etc [7]. Recently, the complex Laplacian [8], [9] formation control strategy has been used to overcome the limitation of the consensus-based strategy. The strategy is able to accomplish most of the commonly required formation manoeuvre control. Unfortunately, the strategy is limited to 2-dimensional Journal Not Specified 2024, 1, 0. https://doi.org/10.3390/1010000 https://www.mdpi.com/journal/notspecified" 2401.05097v1,"Any-Way Meta Learning Junhoo Lee, Yearim Kim * , Hyunho Lee * , Nojun Kwak † Seoul National University {mrjunoo, yerim1656, hhlee822, nojunk} @ snu.ac.kr Numeric Class Abstract Although meta-learning seems promising performance in the realm of rapid adaptability, it is constrained by fixed cardinality. When faced with tasks of varying cardinalities that were unseen during training, the model lacks its ability. In this paper, we address and resolve this challenge by harnessing ‘label equivalence’ emerged from stochastic numeric label assignments during episodic task sampling. Questioning what defines “true” meta-learning, we introduce the “anyway” learning paradigm, an innovative model training approach that liberates model from fixed cardinality constraints. Surprisingly, this model not only matches but often outperforms traditional fixed-way models in terms of performance, convergence speed, and stability. This disrupts established notions about domain generalization. Furthermore, we argue that the inherent label equivalence naturally lacks semantic information. To bridge this semantic information gap arising from label equivalence, we further propose a mechanism for infusing semantic class information into the model. This would enhance the model’s comprehension and functionality. Experiments conducted on renowned architectures like MAML and ProtoNet affirm the effectiveness of our method. Introduction Meta-learning, often referred to as ‘learning to learn’, is a training strategy designed to enable rapid adaptation to new tasks with only a few examples. Despite the impressive performance of deep learning models on extensive datasets, they still fall short of human abilities when it comes to learning from a small number of instances. To tackle this, various approaches have been proposed (Thrun and Pratt 2012). There are two main meta-learning approaches. The first approach focuses on creating an effective feature extractor, like ProtoNet (Snell, Swersky, and Zemel 2017), which can accurately cluster unseen instances from the same class to enable the model to generalize well to new data. The second approach aims to find a suitable initialization point for the model, facilitating rapid adaptation to unseen tasks (Finn, Abbeel, and Levine 2017; Rusu et al. 2018). To imbue the model with meta-learning ability, both methods involve episodes. Each episode consists of multiple tasks * These authors contributed equally. † Corresponding Author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 1, 2, 3, 4, … Semantic Class - Bear - Owl - Turtle - Cat - … Figure 1: Task sampling procedure in our any-way metalearning. Meta-learning employs episodic learning using a mother dataset with numerous classes (M ) where each label represents each semantic class (e.g. ‘turtle’, ‘octopus’, and ‘deer’). Each episode samples N < M classes from this dataset and assigns a random numeric class (∈ [N ]) to each selected class. The flexibility of our any-way setting allows varying N across tasks, distinguishing it from the conventional fixed sampling procedure. and tests the model’s meta-learning ability in the regime of few-shot learning (Fig.1). This continuous exposure to new tasks helps the model improve its learning ability from limited data, simulating the conditions where humans learn. Nonetheless, in contrast to the human’s remarkable flexibility in classifying varying numbers of classes, the current learning models remain rigid, restricted to the fixed ‘way’ they were trained on. As evident in Table 1, when a model trained on 10-way-5-shot tasks from MiniImageNet (Vinyals et al. 2016) is tested on a 3-way-5-shot cars (Krause et al. 2013) setting, its performance plunges to a mere 41%. Considering that random sampling would yield at least 33%, this reveals a glaring deficiency in meta-learning’s adaptability across different ‘way’ settings. The sharp decline in performance is more than just a testament to the model’s inflexibility; it also suggests that different ‘way’ episodes might hail from different distributions. This variation between distributions touches upon a deeper, underlying problem: domain generalization. Essentially, to achieve true ‘any-way’ learning, our models must address the broader challenge of performing effectively even in disparate, unseen domains. The core objective of this paper is to highlight and ad-" 2401.05106v1,"Exploring the formation of gold/silver nanoalloys with gas-phase synthesis and machine-learning assisted simulations Quentin Gromoff, 1 Patrizio Benzo, 1 Wissam A. Saidi, 2, 3 Christopher M. Andolina, 2, 3 Marie-José Casanove, 1 Teresa Hungria, 4 Sophie Barre, 1 Magali Benoit, 1 and Julien Lam 1, 5, ∗ 1 2 CEMES, CNRS and Université de Toulouse, 29 rue Jeanne Marvig, 31055 Toulouse Cedex, France National Energy Technology Laboratory, United States Department of Energy, Pittsburgh, PA 15236, USA 3 Department of Mechanical Engineering and Materials Science, University of Pittsburgh, Pittsburgh, PA 15261, USA 4 Centre de MicroCaractérisation Raimond Castaing, Université de Toulouse, 3 rue Caroline Aigle, F-31400 Toulouse, France 5 Univ. Lille, CNRS, INRA, ENSCL, UMR 8207, UMET, Unité Matériaux et Transformations, F 59000 Lille, France While nanoalloys are of paramount scientific and practical interests, the main processes leading to their formation are still poorly understood. Key structural features in the alloy systems, including crystal phase, chemical ordering, and morphology, are challenging to control at the nanoscale, making it difficult to transfer their usage to industrial applications. In this contribution, we focus on the gold/silver system that has two of the most prevalent noble metals, and combine experiments with simulations to uncover the formation mechanisms at the atomic-level. Nanoparticles are produced using state-of-the-art inert-gas aggregation source and analyzed using transmission electron microscopy and energy-dispersive x-ray spectroscopy. Machine-learning-assisted molecular dynamics simulations are employed to model the crystallization process from liquid droplets to nanocrystals. Our study finds a preponderance of nanoparticles with five-fold symmetric morphology, including icosahedron and decahedron which is consistent with previous results on mono-metallic nanoparticles. However, we observe that gold atoms, rather than silver atoms, segregate at the surface of the obtained nanoparticles for all the considered alloy compositions. These segregation tendencies are in contrast to previous studies and have consequences on the crystallization dynamics and the subsequent crystal ordering. We finally show that the underpinnings of this surprising segregation dynamics is due to charge transfer and electrostatic interactions rather than surface energy considerations. I. INTRODUCTION By combining two or more metallic elements within the same nanoparticle, synergistic properties can emerge and result into innovative technological applications.[1–4] Numerous research fields including optics, catalysis, biomedicine and electronics are already considering these socalled nanoalloys mainly because they exhibit the fundamental advantage of an extremely rich structural landscape with a variety of shapes, chemical orderings and crystalline phases. However, since the physical and the chemical properties of nanoalloys are intrinsically related to their internal structure, advances in this field are strictly constrained by synthesis experiments, and it becomes crucial to better understand the intricate relationship between the experimental conditions and the obtained structures. Addressing this pivotal challenge first comes directly from experimental studies, where two types of complementary approaches are usually considered: (1) Systematic variations of experimental conditions are followed by post-mortem structural analysis[5– 10] and (2) In situ experiments allow for a direct observation of the nanoalloys formation.[11–17] Computational simulations have been the ideal com- ∗ julien.lam@cnrs.fr plementary tool because it offers an unambiguous atomistic picture and enables standardized examinations of various experimental parameters. In this context, the dynamics of nanoalloy formation are usually investigated with classical force fields via Monte Carlo and molecular dynamics simulations, typically employed to study large-scale systems.[18–22] The derived predictions, however, often lack chemical accuracy and can hardly be used to draw quantitative conclusions. As an alternative, quantum simulations based on first-principles density functional theory (DFT) have been performed in order to address this accuracy issue.[23–27] However, due to their high computational costs, these methods are often limited to the equilibrium properties of bulk systems or small clusters. Recently, machine-learning approaches have been proposed to bridge the gap between these two approaches. Indeed, machine-learning interaction potentials (MLIP) are constructed by combining a very complex mathematical formulation with numerous fitting parameters along with an extensive DFT- generated database composed of different structures in conjunction with their associated energies, forces, and virials. Evidence of the success of these methods can be seen through the very diverse types of materials that were so far modeled with MLIP, including metals, oxides, carbon and silicon-based, organics, and perovskites.[28–44] Prompted by these advances, DFT accurate large scale simulations can finally be carried out to investigate the" 2401.05112v1,"Finding XPath Bugs in XML Document Processors via Differential Testing Shuxin Li ∗ Manuel Rigger shuxin.li.lv@gmail.com Southern University of Science and Technology China rigger@nus.edu.sg National University of Singapore Singapore ABSTRACT 1 Extensible Markup Language (XML) is a widely used file format for data storage and transmission. Many XML processors support XPath, a query language that enables the extraction of elements from XML documents. These systems can be affected by logic bugs, which are bugs that cause the processor to return incorrect results. In order to tackle such bugs, we propose a new approach, which we realized as a system called XPress. As a test oracle, XPress relies on differential testing, which compares the results of multiple systems on the same test input, and identifies bugs through discrepancies in their outputs. As test inputs, XPress generates both XML documents and XPath queries. Aiming to generate meaningful queries that compute non-empty results, XPress selects a so-called targeted node to guide the XPath expression generation process. Using the targeted node, XPress generates XPath expressions that reference existing context related to the targeted node, such as its tag name and attributes, while also guaranteeing that a predicate evaluates to true before further expanding the query. We tested our approach on six mature XML processors, BaseX, eXist-DB, Saxon, PostgreSQL, libXML2, and a commercial database system. In total, we have found 27 unique bugs in these systems, of which 25 have been verified by the developers, and 20 of which have been fixed. XPress is efficient, as it finds 12 unique bugs in BaseX in 24 hours, which is 2× as fast as naive random generation. We expect that the effectiveness and simplicity of our approach will help to improve the robustness of many XML processors. Extensible Markup Language (XML) is a widely used file format for data storage and transmission. XPath is an expression language, which provides the ability to navigate through XML documents to select wanted nodes. XPath is also at the core of other XML query language standards such as XSLT [7] and XQuery [6], making it a fundamental XML query language. Various XML document processors have been developed for extracting information from XML documents efficiently. We loosely categorize them depending on whether they can store XML documents in addition to processing them—that is, whether they are Database Management Systems (DBMSs), or provide only processing functionality. In terms of DBMSs specialized for XML, popular examples include BaseX [8] and eXist-DB [10]. Many generalpurpose DBMSs such as Oracle Database [14], MySQL [13], and PostgreSQL [15] have adopted support for processing XML documents. In fact, out of the 10 most popular DBMSs according to the DB-engines ranking [9], 6 support at least partial XML document parsing. A popular example of a processor without storage functionality is Saxon. Saxon [18] is an in-memory XML processor that can be either used in a standalone way or embedded as a library. Finally, libxml2 [12] is a popular XML processing library written in C. XPath is supported by all of these processors. XML document processors can be affected by logic bugs. Logic bugs are bugs that cause the XML processor to produce incorrect results without crashing the system, meaning that they can often go unnoticed. In order to find such bugs, developers mainly rely on test suites such as the XPathMark test suite for XPath [25], the W3C qt3 test suite [19], or hand-written unit tests. Manually writing tests requires much effort, and it is challenging to comprehensively cover the XML processors’ functionality. To find logic bugs automatically, a so-called test oracle is required that can determine whether the system’s output is correct in order to find logic bugs. Todic and Uzelac have proposed an automated testing technique for SQLServer’s index support; their test oracle compared the results of a given query with and without index definition [41]. A limitation of this technique is that it is applicable only to finding index-related bugs in DBMSs. To the best of our knowledge, no other test oracles have been proposed in this context. In order to detect XPath-related bugs in XML processors, we propose differential testing as an oracle. The core idea of differential testing is to use one input that is executed using multiple systems; any discrepancy in the results indicates a potential bug in the system. For testing XML processors, the input for the XML processors under test is an XML document and XPath expression, and the results are a sequence of XML nodes or values. Differential testing has been successfully applied in various related domains, CCS CONCEPTS • Software and its engineering → Software testing and debugging. KEYWORDS XML processors, XPath generation, differential testing ACM Reference Format: Shuxin Li and Manuel Rigger. 2024. Finding XPath Bugs in XML Document Processors via Differential Testing. In 2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE ’24), April 14–20, 2024, Lisbon, Portugal. ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/3597503.3639208 ∗ Work done during an internship at the National University of Singapore. ICSE ’24, April 14–20, 2024, Lisbon, Portugal © 2024 Copyright held by the owner/author(s). This is the author’s version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in 2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE ’24), April 14–20, 2024, Lisbon, Portugal, https://doi.org/10.1145/3597503.3639208. INTRODUCTION" 2401.05114v1,"PARAMETER ESTIMATION FOR MULTI-MIXED FRACTIONAL ORNSTEIN–UHLENBECK PROCESSES BY GENERALIZED METHOD OF MOMENTS HAMIDREZA MALEKI ALMANI School of Technology and Innovations, University of Vaasa, P.O. Box 700, FIN-65101 Vaasa, FINLAND TOMMI SOTTINEN School of Technology and Innovations, University of Vaasa, P.O. Box 700, FIN-65101 Vaasa, FINLAND Abstract. We develope the generalized method of moments (GMM) estimation for the parameters of the finitely mixed multi-mixed fractional Ornstein–Uhlenbeck (mmfOU) processes, and analyze the consistency and assymptotic normality of this estimator. We also include some simulations and provide numerical observations considering different statistical errors. 1. Introduction and Preliminaries Langevin [13] postulated the model f F t dU t = − U t + , dt m m to the velocity U of a free particle with mass m > 0, moving in a liquid by the alternating force F of surrounding molecules, and a constant friction coefficient f . By imposing probabilistic hypotheses to the force F , Ornstein and Uhlenbeck [18] derived that the solution of (1) has a Gaussian distribution with exponential mean. Later on, considering the initial variable U 0 to be central Gaussian and independent from F , Doob [5] showed that the solution to (1) is stationary and for some constant c > 0, the time-changed scaled process t 1/2 U (c log t) is in fact the well-known Einstein’s [6] Brownian motion for t ≥ 0. As the Brownian motion in nowhere differentiable, Doob understood (1) as (1) (2) dU t = −λU t dt + dX t , E-mail addresses: hmaleki@uwasa.fi, tommi.sottinen@uwasa.fi. Date: January 11, 2024. 2020 Mathematics Subject Classification. 60G10, 60G15, 60G22, 62M09. Key words and phrases. generalized method of moments, fractional Langevin equation, multi-mixed fractional Ornstein–Uhlenbeck process, parameter estimation. 1" 2401.05115v1,"Unpacking Human-AI interactions: From interaction primitives to a design space KONSTANTINOS TSIAKAS and DAVE MURRAY-RUST, Delft University of Technology, The Netherlands This paper aims to develop a semi-formal design space for Human-AI interactions, by building a set of interaction primitives which specify the communication between users and AI systems during their interaction. We show how these primitives can be combined into a set of interaction patterns which can provide an abstract specification for exchanging messages between humans and AI/ML models to carry out purposeful interactions. The motivation behind this is twofold: firstly, to provide a compact generalisation of existing practices, that highlights the similarities and differences between systems in terms of their interaction behaviours; and secondly, to support the creation of new systems, in particular by opening the space of possibilities for interactions with models. We present a short literature review on frameworks, guidelines and taxonomies related to the design and implementation of HAI interactions, including human-in-the-loop, explainable AI, as well as hybrid intelligence and collaborative learning approaches. From the literature review, we define a vocabulary for describing information exchanges in terms of providing and requesting particular model-specific data types. Based on this vocabulary, a message passing model for interactions between humans and models is presented, which we demonstrate can account for existing systems and approaches. Finally, we build this into design patterns as mid-level constructs that capture common interactional structures. We discuss how this approach can be used towards a design space for Human-AI interactions that creates new possibilities for designs as well as keeping track of implementation issues and concerns. CCS Concepts: • Human-centered computing → Interaction design; Interaction paradigms; • Computing methodologies → Artificial intelligence. Additional Key Words and Phrases: Human-AI interaction, design patterns, explainable AI, human-in-the-loop, hybrid intelligence ACM Reference Format: Konstantinos Tsiakas and Dave Murray-Rust. 2023. Unpacking Human-AI interactions: From interaction primitives to a design space. 1, 1 (January 2023), 46 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Artificial Intelligence and Machine Learning (AI/ML) models are in the midst of a transition from use in back-end data science systems, operated and interacted with by experts, to end-user focused applications that prioritise ease of use and interactional fluidity [77]. This transition to human-centered AI approaches is driven by several factors – the increasing power of the models and systems; the need for more engagement with real-world data; the enlisting of users as participants in model development through annotation or other feedback; the desire by more organisations to make use of the possibilities of AI/ML; and the corresponding need to make sure that the models are operating correctly or adapt them for particular tasks. This has given rise to a growing set of human-AI interaction paradigms, in particular human-in-the-loop (HITL) [15, 54], explainable AI (XAI) [42, 63] and hybrid intelligence (HI) and collaborative learning systems [20, 75]. This expansion in interactivity, coupled with the need to understand how systems grow and change Authors’ address: Konstantinos Tsiakas, k.tsiakas@tudelft.nl; Dave Murray-Rust, d.s.murray-rust@tudelft.nl, Delft University of Technology, Delft, The Netherlands. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. Manuscript submitted to ACM Manuscript submitted to ACM 1" 2401.05146v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 Federated Unlearning: A Survey on Methods, Design Guidelines, and Evaluation Metrics Nicolò Romandini , Alessio Mora , Carlo Mazzocca Abstract—Federated Learning (FL) enables collaborative training of a Machine Learning (ML) model across multiple parties, facilitating the preservation of users’ and institutions’ privacy by keeping data stored locally. Instead of centralizing raw data, FL exchanges locally refined model parameters to build a global model incrementally. While FL is more compliant with emerging regulations such as the European General Data Protection Regulation (GDPR), ensuring the right to be forgotten in this context — allowing FL participants to remove their data contributions from the learned model — remains unclear. In addition, it is recognized that malicious clients may inject backdoors into the global model through updates, e.g. to generate mispredictions on specially crafted data examples. Consequently, there is the need for mechanisms that can guarantee individuals the possibility to remove their data and erase malicious contributions even after aggregation, without compromising the already acquired “good” knowledge. This highlights the necessity for novel Federated Unlearning (FU) algorithms, which can efficiently remove specific clients’ contributions without full model retraining. This survey provides background concepts, empirical evidence, and practical guidelines to design/implement efficient FU schemes. Our study includes a detailed analysis of the metrics for evaluating unlearning in FL and presents an in-depth literature review categorizing stateof-the-art FU contributions under a novel taxonomy. Finally, we outline the most relevant and still open technical challenges, by identifying the most promising research directions in the field. Index Terms—Federated Learning, Federated Unlearning, Machine Unlearning, Privacy, Right to be Forgotten, Unlearning Metrics I. I NTRODUCTION To achieve high-performance levels suitable for real-world applications, Machine Learning (ML) and, in particular, Deep Learning (DL) models need to access large amounts of data. In numerous scenarios, users willingly furnish their data to service providers in return for enhanced service quality and improved user experience. Practical examples include the training of natural language processing models on datasets derived from Amazon reviews [1] or the development of micro-video recommendation systems leveraging user data from platforms such as TikTok and Instagram [2]. Data analytics hold the promise of delivering unprecedented value to companies and organizations, e.g., as pointed out by its key role in influencing election campaigns in the so-called Facebook-Cambridge Analytica scandal [3]. Therefore, the growing outsourcing of user information has also led to an increasing interest in privacy preservation mea- Nicolò Romandini, Alessio Mora, Carlo Mazzocca, Rebecca Montanari, and Paolo Bellavista are with the Department of Computer Science and Engineering (DISI), University of Bologna, Bologna, Italy (e-mail: nicolo.romandini@unibo.it, alessio.mora@unibo.it, carlo.mazzocca@unibo.it, rebecca.montanari@unibo.it, paolo.bellavista@unibo.it). , Rebecca Montanari , Paolo Bellavista sures. In this direction, recent years have witnessed a worldwide development and establishment of privacy-protection regulations, aiming to address the growing sensibility of individuals to the treatment of their personal information by third parties. The European Union (EU) and California state have been among the pioneers in proposing such regulations, respectively with the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Among the enforced guidelines about the collection, storage, and processing of personal data, both GDPR and CCPA include the on-demand removal of personal data that were previously voluntarily disclosed by the users. For example, the right of erasure, also known as the right to be forgotten, is one of the cardinal articles in the EU GDPR [4] and states that “the data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay [...] where the data subject withdraws consent on which the processing is based [...].”. Similarly, CCPA [5] includes the right to delete, which empowers business users with the right to request that businesses delete the personal information they collected from them and tell their service providers to do the same. In the context of ML, the right to have data removed can be realized through Machine Unlearning (MU) [6]. Data owners may want to withdraw their contributions to a trained model due to privacy or security concerns [7]. MU involves the postprocessing of a trained model, by selectively eliminating the influence of specific training samples. At first glance, the intuitive approach to unlearn targeted data consists of retraining the model from scratch utilizing the remaining data. However, this seemingly straightforward method poses significant technical challenges in terms of load and performance: retraining from scratch is not only computationally expensive but also becomes impractical when faced with frequent unlearning requests. Furthermore, the emergence of increasingly privacyconscious data owners and the adoption of data regulations have influenced the perception of traditional centralized ML/DL, where the training corpus frequently contains user data, e.g., habits or preferences. In this context, Federated Learning (FL) is considered a promising solution, laying the foundation for privacy-preserving ML. In FL, data remains distributed among various sources or data owners, and a global model is iteratively built by aggregating the contributions of participants (often referred to as clients), e.g., model updates or gradients. Consequently, clients exchange ephemeral information, locally computed on their private data and only valid for the current state of the global ML model. Nevertheless, even under the FL paradigm, how to guarantee" 2401.05148v1,"On the Influence of Reading Sequences on Knowledge Gain during Web Search Wolfgang Gritz 1[0000−0003−1668−3304] , Anett Hoppe 1,2[0000−0002−1452−9509] , and Ralph Ewerth 1,2[0000−0003−0918−6297] 1 TIB – Leibniz Information Centre for Science and Technology, Welfengarten 1B, Hannover, 30167, Germany 2 Leibniz University Hannover, L3S Research Center, Appelstraße 9A, Hannover, 30167, Germany wolfgang.gritz@tib.eu Abstract. Nowadays, learning increasingly involves the usage of search engines and web resources. The related interdisciplinary research field search as learning aims to understand how people learn on the web. Previous work has investigated several feature classes to predict, for instance, the expected knowledge gain during web search. Therein, eye-tracking features have not been extensively studied so far. In this paper, we extend a previously used reading model from a line-based one to one that can detect reading sequences across multiple lines. We use publicly available study data from a web-based learning task to examine the relationship between our feature set and the participants’ test scores. Our findings demonstrate that learners with higher knowledge gain spent significantly more time reading, and processing more words in total. We also find evidence that faster reading at the expense of more backward regressions may be an indicator of better web-based learning. We make our code publicly available at https://github.com/TIBHannover/reading web search/. Keywords: Search as Learning · Web Search · Eye-Tracking · Reading · Knowledge Gain. 1 Introduction The research field Search as Learning (SAL) examines knowledge acquisition processes during and with the help of web search. Whereas conventional information retrieval systems focus on satisfying an information need, the objective here is to determine how individuals can be best supported to perform an engaging and successful learning session. The learning success is often measured by knowledge gain, that is, the change in the learner’s knowledge state achieved through the search [14,15]. Past SAL research on knowledge gain has followed various directions, e.g., the time frames in which learning happens [21,27], the characteristics of a web resource indicating suitability for learning [24,25,17,11,22], and the user behavior. The research to user behavior is based on e.g., the analysis of input queries [8], navigation logs [9], or other behavioral features [10,24,25,22]. One branch of user" 2401.05151v1,"Disorder-induced enhancement of lithium-ion transport in solid-state electrolytes Zhimin Chen 1 , Tao Du 1,* , N. M. Anoop Krishnan 2 , Yuanzheng Yue 1 , Morten M. Smedskjaer 1,* 1 Department of Chemistry and Bioscience, Aalborg University, Aalborg East 9220, Denmark Department of Civil Engineering, Indian Institute of Technology Delhi, New Delhi 110016, India * Corresponding authors. E-mail: taod@bio.aau.dk (T.D.), mos@bio.aau.dk (M.M.S.) 2 ABSTRACT Enhancing the ion conduction in solid electrolytes is critically important for the development of highperformance all-solid-state lithium-ion batteries (LIBs). Lithium thiophosphates are among the most promising solid electrolytes, as they exhibit superionic conductivity at room temperature. However, the lack of comprehensive understanding regarding their ion conduction mechanism, especially the effect of structural disorder on ionic conductivity, is a long-standing problem that limits further innovations of all-solid-state LIBs. Here, we address this challenge by establishing and employing a deep learning potential to simulate Li 3 PS 4 electrolyte systems with varying levels of disorder. The results show that disorder-driven diffusion dynamics significantly enhances the room-temperature conductivity. We further establish bridges between dynamical characteristics, local structural features, and atomic rearrangements by applying a machine learning-based structure fingerprint termed “softness”. This metric allows the classification of the disorder-induced “soft” hopping lithium ions. Our findings offer insights into ion conduction mechanisms in complex disordered structures, thereby contributing to the development of superior solid-state electrolytes for LIBs. 1" 2401.05152v1,"Multi S-Graphs: an Efficient Real-time Distributed Semantic-Relational Collaborative SLAM Miguel Fernandez-Cortizas 1,2 , Hriday Bavle 1 , David Perez-Saura 2 , Jose Luis Sanchez-Lopez 1 , Pascual Campoy 2 and Holger Voos 1 Abstract— Collaborative Simultaneous Localization and Mapping (CSLAM) is critical to enable multiple robots to operate in complex environments. Most CSLAM techniques rely on raw sensor measurement or low-level features such as keyframe descriptors, which can lead to wrong loop closures due to the lack of deep understanding of the environment. Moreover, the exchange of these measurements and lowlevel features among the robots requires the transmission of a significant amount of data, which limits the scalability of the system. To overcome these limitations, we present Multi S-Graphs, a decentralized CSLAM system that utilizes high-level semantic-relational information embedded in the four-layered hierarchical and optimizable situational graphs for cooperative map generation and localization while minimizing the information exchanged between the robots. To support this, we present a novel room-based descriptor which, along with its connected walls, is used to perform inter-robot loop closures, addressing the challenges of multi-robot kidnapped problem initialization. Multiple experiments in simulated and real environments validate the improvement in accuracy and robustness of the proposed approach while reducing the amount of data exchanged between robots compared to other state-ofthe-art approaches. Software available within a docker image: https:// github.com/snt-arg/multi_s_graphs_docker I. I NTRODUCTION Collaborative Simultaneous Localization and Mapping (CSLAM) is a technology that enables multi-robot systems to work together to create a map of their environment while simultaneously determining their own positions within the map. Most CSLAM techniques, such as [1], [2], [3], are 1 Authors are with the Automation and Robotics Research Group, Interdisciplinary Centre for Security, Reliability, and Trust (SnT), University of Luxembourg, Luxembourg. Holger Voos is also associated with the Faculty of Science, Technology, and Medicine, University of Luxembourg, Luxembourg. {hriday.bavle, joseluis.sanchezlopez, Fig. 1: Collaborative graph generated by three robots mapping a building floor (orange, gray, and blue for robots 1, 2, and 3 respectively). The collaborative graph is generated from the point of view of Robot 1. Semantic information gathered by the other robots, such as rooms or walls appears in transparent colors in the graph layers. The origin of the coordinate systems of the other robots appears surrounded by a circle. Below is the result of merging the point clouds obtained from each of the robots. This point cloud is displayed for visualization purposes and is not utilized in inter-robot communication. holger.voos}@uni.lu 2 Authors are with the Computer Vision and Aerial Robotics Group at Universidad Politécnica de Madrid, Spain (CVAR- UPM) at the Centre for Automation and Robotics C.A.R. (UPM-CSIC). {miguel.fernandez.cortizas, david.perez.saura, pascual.campoy}@upm.es *This work was partially funded by the Fonds National de la Recherche of Luxembourg (FNR), under the projects C22/IS/17387634/DEUS, by the European Union’s Horizon 2020 Project No. 101017258 SESAME, by European Union’s Horizon Europe Project No. 101070254 CORESENSE, as well as project COPILOT ref. 2020/EMT6368, funded by the Madrid Government under the R&D Synergic Projects Program, project INSERTION ref. ID2021-127648OBC32 and project RATEC ref: PDC2022-133643-C22, both funded by the Spanish Ministry of Science and Innovation. For the purpose of Open Access, and in fulfillment of the obligations arising from the grant agreement, the author has applied a Creative Commons Attribution 4.0 International (CC BY 4.0) license to any Author Accepted Manuscript version arising from this submission. highly based on the transmission of low-level features, such as keyframe descriptors, between robots. With these lowlevel features, each robot creates its own map and can match it to integrate them into a common map. This is used for both visual and LiDAR-based approaches. However, the use of these low-level features usually leads to incorrect loop closures [4]. Works such as [1] or [5] focus on robustifying their loop closure algorithms to avoid incorrect loop closures. The main drawback of these methods emerges from the fact that the system has limited understanding of the environment. Novel approaches to single-robot SLAM address this issue of limited understanding of the environment by incorporat-" 2401.05167v2,"Watermark Text Pattern Spotting in Document Images Mateusz Krubiński 1, * , † , Stefan Matcovici 2, * , Diana Grigore 2 , Daniel Voinea 2 and Alin-Ionut Popa 2, ** 1 2 Charles University, Faculty of Mathematics and Physics Amazon Inc. Abstract Watermark text spotting in document images can offer access to an often unexplored source of information, providing crucial evidence about a record’s scope, audience and sometimes even authenticity. Stemming from the problem of text spotting, detecting and understanding watermarks in documents inherits the same hardships - in the wild, writing can come in various fonts, sizes and forms, making generic recognition a very difficult problem. To address the lack of resources in this field and propel further research, we propose a novel benchmark (K-Watermark) containing 65, 447 data samples generated using 𝒲 render, a watermark text patterns rendering procedure. A validity study using humans raters yields an authenticity score of 0.51 against pre-generated watermarked documents. To prove the usefulness of the dataset and rendering technique, we developed an end-to-end solution ( 𝒲 extract) for detecting the bounding box instances of watermark text, while predicting the depicted text. To deal with this specific task, we introduce a variance minimization loss and a hierarchical self-attention mechanism. To the best of our knowledge, we are the first to propose an evaluation benchmark and a complete solution for retrieving watermarks from documents surpassing baselines by 5 AP points in detection and 4 points in character accuracy. Keywords watermark text patterns, text spotting, text recognition, visual document understanding 1. Introduction Information retrieval seen through the prism of visual document understanding (VDU) has recently become a mainstream task in the industry plus a hot topic in the computer vision and the natural language processing communities. It is fueled by the constant need to create automated document processing workflows and manifested through use-cases such as named-entity recognition [1, 2, 3, 4, 5, 6], document classification [7, 8], explainability in the context of validation [9, 10] or question answering [11]. In spite of the growing body of research addressing VDU-related problems, several challenges remain unsolved as we are still to attain holistic understanding of the document, to name a few - high variability in terms of layout, complexity of the visual information distribution or the multi-lingual / semantically different character of the depicted text. Additionally, since the task requires an efficient combination of visual and textual modalities that would complement each other in case one is incomplete or missing, it is difficult from the modeling perspective. Figure 1: Sample watermarked document image patches. The task of watermark text recovering is challenging (a) from a visual perspective due to resemblance with other document elements (rightmost image) and (b) from a textual / language perspective due to high fadedness causing text misinterpretation from overlapping document text (left upper image). In addition to the aforementioned challenges, there are several unexplored areas of equal difficulty. One such topic is the problem of watermark text understanding from document images. Recognizing watermark content can enhance the understanding of the document information beyond the level provided by document text alone. For example, some documents might contain watermark text signaling the status of the file (e.g., confidential, draft) or conveying additional information regarding the discussed content (i.e., hazardous substances). One SDU@AAAI-24: Workshop on Scientific Document Understanding, document analysis domain where this is of critical imporco-located with AAAI 2024, Vancouver, Canada tance is within compliance-related tasks where in order * These authors contributed equally. to demonstrate the validity of a document, one must en- ** Corresponding author. † sure that there is no watermark text on top, and if there Work done while at Amazon. is one, that it follows the required pattern, e.g., denoting $ krubinski@ufal.mff.cuni.cz (M. Krubiński); the type of document or provenience. The most difficult stefmatc@amazon.com (S. Matcovici); digrigor@amazon.com (D. Grigore); dvoinea@amazon.com (D. Voinea); aspect resides in the fact that we are dealing with two popaaln@amazon.com (A. Popa) pattern distributions (watermark text vs. document text) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). that are very similar in terms of visual and textual appear- CEUR Workshop Proceedings (CEUR-WS.org) CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073" 2401.05178v1,"CLASSIFYING CONJUGACY CLASSES OF WEYL GROUPS DILPREET KAUR AND UDAY BHASKAR SHARMA A BSTRACT . This paper concerns the enumeration of z-classes of Weyl groups of the types B n , C n , D n , and the exceptional types F 4 , G 2 , E 6 , E 7 and E 8 . Through this work, we answer the question about z-classes in Weyl Groups, which Anupam and Sushil have asked in their survey tiled “z-classes in groups: a survey.” 1. I NTRODUCTION Let G be a group. We recall the definition of a z-class. We say that two elements x, y ∈ G, are said to be z-equivalent, if and only if their respective centralizers Z G (x) and Z G (y) are conjugate to each other by an element of G. This relation is an equivalence relation, and the equivalence classes of this relation are called z-classes, conjugacy class types, or simply types. z-classes were introduced by Ravi Kulkarni in [Ku]. These have since been studied widely. For an arbitrary group G, there is the question of the finiteness of the number of z-classes in it. The answer is true for a finite group. For an infinite group, the answer to this question is not necessarily true. The group GL 2 (Q) of 2 × 2 invertible matrices over the field of rationals has an infinite number of z-classes. It was due to Steinberg, that reductive algebraic groups over an algebraically closed field were proven to have a finite number of z-classes. Let k be a perfect field, where for any integer n, k has only finitely many extensions of degree n. Such a field k is called a field of type (F ). Garge and Singh [GS] proved that reductive groups over a field of type (F ) have a finite number of z-classes. However, when a group is not reductive, the number of z-classes need not be finite. Bhunia [Bh] proved that for n ≥ 6, and an infinite field F , the group of upper triangular n × n matrices over F has an infinite number of z-classes. z-classes have been studied for classical groups over finite fields [Sh, SS], upper triangular and upper unitriangular matrices over finite fields [KSS]. In these, they were a useful tool in enumerating the number of simultaneous conjugacy classes of commuting tuples of elements these groups. In general determining simultaneous conjugacy classes for a finite group G are usfeul in calculating the probability cp k (G) that a k-tuple of elements of G commutes. z-classes have been studied for various groups of Lie type. They have been studied for isometry groups of the real hyperbolic space by Gongopadhyay and Kulkarni ( [GK]). z-classes of Lie Groups of types A n , B n , C n , D n F 4 and G 2 were calculated explicitly by Bose [Bo] .For more literature in this area, we refer the reader to a survey article by Bhunia and Singh [BS]. W We attempt to determine the Z-classes of Weyl groups of the types A n , B n , C n , D n , etc. The Weyl group of type A n is the symmetric group S n+1 . The z-classes of S n+1 have already been determined by Bhunia, Kaur and Singh in [BKS]. Thus, we need to determine the z-classes of B n , C n and D n . It is a well known fact that the Weyl groups of B n and C n are isomorphic, and D EPARTMENT OF M ATHEMATICS , I NDIAN I NSTITUTE OF T ECHNOLOGY J ODHPUR , I NDIA UPES, D EHRADUN , I NDIA E-mail addresses: dilpreetkaur@iitj.ac.in, udaybsharmaster@gmail.com. We are thankful to Anupam Singh for his useful comments on our work. The first named author would like to acknowledge the support of SERB through MATRICS project MTR/2022/000231. 1" 2401.05187v1,"GENERIC COLORIZED JOURNAL, VOL. XX, NO. XX, XXXX 2017 1 Decoding of Selective Attention to Speech From Ear-EEG Recordings Mike D. Thornton, Danilo P. Mandic, Fellow, IEEE, and Tobias Reichenbach Abstract— Many people with hearing loss struggle to comprehend speech in crowded auditory scenes, even when they are using hearing aids. Future hearing technologies which can identify the focus of a listener’s auditory attention, and selectively amplify that sound alone, could improve the experience that this patient group has with their hearing aids. In this work, we present the results of our experiments with an ultra-wearable in-ear electroencephalography (EEG) monitoring device. Participants listened to two competing speakers in an auditory attention experiment whilst their EEG was recorded. We show that typical neural responses to the speech envelope, as well as its onsets, can be recovered from such a device, and that the morphology of the recorded responses is indeed modulated by selective attention to speech. Features of the attended and ignored speech stream can also be reconstructed from the EEG recordings, with the reconstruction quality serving as a marker of selective auditory attention. Using the stimulus-reconstruction method, we show that with this device auditory attention can be decoded from short segments of EEG recordings which are of just a few seconds in duration. The results provide further evidence that ear-EEG systems offer good prospects for wearable auditory monitoring as well as future cognitively-steered hearing aids. Index Terms— Auditory attention decoding, Electroencephalography, Wearable health I. I NTRODUCTION P EOPLE with hearing loss often struggle to comprehend speech in noisy environments, even when they wear their hearing aids [1], [2]. Various interventions have been developed to address this problem; for example, modern hearing aids incorporate advanced noise suppression technologies, which can reduce the impact of interfering sounds such as wind and other non-speech noises [3]. In cocktail-party scenarios, where the interfering sounds are also speech, a hearing aid must first identify the target speaker, and then selectively amplify that voice alone. If the target speaker is known a priori (for example, it is the teacher in a classroom environment), then the voice of that speaker can be wirelessly transmitted to hearing aid users via a hearing loop [4]. In more spontaneous settings such as social scenarios, beamforming technologies are usually utilised [5]. These rely on directional microphones M. Thornton is supported by the UKRI CDT in AI for Healthcare http://ai4health.io (Grant No. P/S023283/1). M. Thornton and D. Mandic are with Imperial College London, SW7 2RH, U.K. (e-mail: d.mandic@imperial.ac.uk). Tobias Reichenbach was with Imperial College London. He is now with the Friedrich-Alexander-Universität Erlangen-Nürnberg, 91052 Erlangen, Germany (e-mail: tobias.j.reichenbach@fau.de). to identify the direction of the listener’s head, and attempt to selectively amplify sounds emanating from that direction. Amongst these interventions, only beamforming hearing aids offer users the ability to selectively and spontaneously choose which voice to enhance. In everyday environments, however, beamforming hearing aids often provide only limited benefits to their users [6], [7]. This limitation arises because individuals do not constantly orient their head towards a target speaker during naturalistic listening. Furthermore, interfering speech can easily divert the listener’s attention and shift the direction of their gaze away from the intended speaker [8]. Whilst listeners can learn to adapt their behaviours in order to experience the most benefit from their beamforming hearing aids, even with practice they may struggle to quickly reorient their gaze when the focus of their attention changes location or is re-directed. This means that beamforming technology can actually increase the difficulty of locating off-axis sources for hearing aid users [9], [10]. Alternative techniques for determining the focus of a listener’s attention could be used in place of, or in conjunction with, beamforming algorithms. Recent research has demonstrated that the focus of a listener’s selective attention to speech can be decoded from neuroimaging data [11]–[13]. If a discrete and wearable brain monitoring device can be incorporated into a hearing aid, then it may be possible for the user to control the hearing aid through their attentional focus alone [14]–[16]. Most studies identify electroencephalography (EEG) as the most suitable neuroimaging modality for realworld auditory attention decoding, due to its relative accessibility, its high temporal resolution, and the variety of wearable EEG devices which are already commercialised. Usually, auditory attention is decoded from EEG recordings through a technique known as stimulus-reconstruction [13], [17], [18]. This involves training regression models (known as backward models in the context of stimulus-reconstruction) to reconstruct features of the speech stimuli from time-aligned EEG signals. Usually, the feature of choice is the temporal envelope of speech, since this feature is strongly represented in EEG responses to speech [19]. Moreover, the strength of the EEG response to the speech envelope is modulated by selective attention, with responses to the attended speech envelope being dominant. Typically, the strength of the response is assessed by determining the accuracy with which the attended and ignored speech envelopes can be reconstructed from the EEG signals, by taking the Pearson correlation between the reconstructed envelopes and the ground-truth envelopes [13]. The speech stream which yields the greatest Pearson correlation is then" 2401.05202v1,"Video-based Automatic Lameness Detection of Dairy Cows using Pose Estimation and Multiple Locomotion Traits Helena Russello a,∗ , Rik van der Tol a , Menno Holzhauer b , Eldert J. van Henten a , Gert Kootstra a,∗ a Agricultural Biosystems Engineering group, Wageningen University & Research, Wageningen, The Netherlands b Ruminant Health Department, Royal GD AH, Deventer, The Netherlands Abstract This study presents an automated lameness detection system that uses deeplearning image processing techniques to extract multiple locomotion traits associated with lameness. Using the T-LEAP pose estimation model, the motion of nine keypoints was extracted from videos of walking cows. The videos were recorded outdoors, with varying illumination conditions, and T- LEAP extracted 99.6% of correct keypoints. The trajectories of the keypoints were then used to compute six locomotion traits: back posture measurement, head bobbing, tracking distance, stride length, stance duration, and swing duration. The three most important traits were back posture measurement, head bobbing, and tracking distance. For the ground truth, we showed that a thoughtful merging of the scores of the observers could improve intra-observer reliability and agreement. We showed that including multiple locomotion traits improves the classification accuracy from 76.6% with only one trait to 79.9% with the three most important traits and to 80.1% with all six locomotion traits. 1. Introduction Lameness is a painful gait disorder in dairy cows and is often characterized by abnormal locomotion of the cow. A recent literature review [1] estimated ∗ Corresponding authors. Email address: firstname.lastname@wur.nl Preprint submitted to Elsevier January 11, 2024" 2401.05206v1,"Tailoring Frictional Properties of Surfaces Using Diffusion Models Even Marius Nordhagen, ∗ Henrik Andersen Sveinsson, and Anders Malthe-Sørenssen † This Letter introduces an approach for precisely designing surface friction properties using a conditional generative machine learning model, specifically a diffusion denoising probabilistic model (DDPM). We created a dataset of synthetic surfaces with frictional properties determined by molecular dynamics simulations, which trained the DDPM to predict surface structures from desired frictional outcomes. Unlike traditional trial-and-error and numerical optimization methods, our approach directly yields surface designs meeting specified frictional criteria with high accuracy and efficiency. This advancement in material surface engineering demonstrates the potential of machine learning in reducing the iterative nature of surface design processes. Our findings not only provide a new pathway for precise surface property tailoring but also suggest broader applications in material science where surface characteristics are critical. I. INTRODUCTION Traditional physics-based material design, often reliant on trial-and-error approaches, faces challenges of being resource-intensive and time-consuming [1]. To address these limitations, various iterative inverse design algorithms have emerged, introducing specific strategies to explore the configuration space efficiently. Notably, Alex Zunger’s group developed a genetic algorithm-based method for inverse design of materials’ band structures, enabling the prediction of materials with specific band gaps [2–4]. Additionally, a two-step inverse algorithm has been applied for tailoring the frictional properties of metals [5]. Recent advancements include the use of neural networks for rapid prediction of material properties, significantly accelerating the search process [6–10]. Despite these advancements, challenges remain, particularly regarding the convergence and iteration requirements of these iterative optimization-based methods. In this Letter, we demonstrate the use of a diffusion denoising probabilistic model (DDPM) for generating surfaces with specific frictional properties, leveraging advancements in machine learning [11, 12]. Our methodology includes training the DDPM on synthetic surfaces, designed using simplex noise and labeled with frictional properties determined from molecular dynamics simulations. Once trained, the model efficiently generates targeted surfaces with a specified frictional strength without further optimization. This approach aligns with recent trends in material science, where generative machine learning models have been employed for material design [13, 14] and stress prediction [15, 16]. It also parallels developments in physics, such as latent variational diffusion models for inverse problems in high-energy physics [17]. Our method is distinguished by its direct input of ∗ evenmn@mn.uio.no † Also at The Njord Center (a) (b) rigid 3 1 thermo (c) f s,max 2 f Department of Physics, University of Oslo, Sem Sælands vei 24, NO-0316 Oslo, Norway (Dated: January 11, 2024) x 1 2 3 5 10 z x 0 Displacement x (Å) FIG. 1. Molecular dynamics simulation. (a) We keep the uppermost and lowermost layers of the system rigid, and apply a Langevin thermostat to the atoms close to the layers. Here, the upper system surface is partly transparent to show the structure. (b) The lateral force is measured while the system is sheared, and the static friction is taken as the largest lateral force. (c) Cross-sectional view of the system initially (1), just before failure (2) and after failure (3). conditions into the model, generating outputs specific to those conditions. II. METHODOLOGY To prepare for training the DDPM, we first create a dataset linking surface topologies to friction properties. Simplex noise, known for its capability of generating realistic surfaces, is used to create these topologies [19]. For each sample, we randomly select a scaling factor between 2 and 10 and choose a number of octaves from 1, 2, or 3. Lacunarity and persistence are fixed at 2 and 1, respectively. The noise is thresholded to ensure a uniform porosity of 40% across all samples, represented as" 2401.05218v1,"I NVARIANT C AUSAL P REDICTION WITH L OCALLY L INEAR M ODELS A P REPRINT Alexander Mey Department of Mathematics and Computer Science Eindhoven University of Technology Eindhoven, The Netherlands and ASML Research, Veldhoven, The Netherlands a.mey@tue.nl Rui Manuel Castro Department of Mathematics and Computer Science and Eindhoven Artificial Intelligence Systems Institute (EAISI) Eindhoven University of Technology Eindhoven, The Netherlands rmcastro@tue.nl January 11, 2024 A BSTRACT We consider the task of identifying the causal parents of a target variable among a set of candidate variables from observational data. Our main assumption is that the candidate variables are observed in different environments which may, for example, correspond to different settings of a machine or different time intervals in a dynamical process. Under certain assumptions different environments can be regarded as interventions on the observed system. We assume a linear relationship between target and covariates, which can be different in each environment with the only restriction that the causal structure is invariant across environments. This is an extension of the ICP (Invariant Causal Prediction) principle by Peters et al. [2016], who assumed a fixed linear relationship across all environments. Within our proposed setting we provide sufficient conditions for identifiability of the causal parents and introduce a practical method called LoLICaP (Locally Linear Invariant Causal Prediction), which is based on a hypothesis test for parent identification using a ratio of minimum and maximum statistics. We then show in a simplified setting that the statistical power of LoLICaP converges exponentially fast in the sample size, and finally we analyze the behavior of LoLICaP experimentally in more general settings. 1 Introduction We consider the problem of identifying the causal parents of a target variable, among a set of candidate variables, based only on observational data. The main assumption we make is that data is observed in different environmental scenarios. An emblematic example is that of machine diagnostics, where we are monitoring several connected components of the machine. Different environments correspond, for example, to machines in different locations, different settings of a machine, or data collected in different points in time. If the system behaves differently across environments we talk about heterogeneous environments, and these can be interpreted as accidental interventions on the system. This means that, under certain modeling assumptions, one can leverage the information provided by those accidental interventions to perform causal discovery tasks. One particular way of using this information is based on the idea that the performance of any prediction model for the target variable should be invariant under interventions (in different environments) if and only if this prediction model uses exclusively the causal parents of the target: For example, a model that uses the color green to predict that an image contains a cow may work well if we only have cow pictures from grassy areas. The green background is, however, only a correlated variable and not a causal parent, and the performance of such a model should significantly drop if we suddenly present it with cow images with a sandy background. This principle of invariant causal prediction (ICP) was proposed by Peters et al. [2016], who assumed that the causal relationship between the target and its parents follows a linear model which is fixed across all environments. We extend upon that work by relaxing the global linearity assumption to a locally linearity assumption, meaning that each environment is equipped with its own linear model. Relaxing the global model to local models carries a couple of interesting implications that we address in this paper. In particular, locally linear models extend the scope of what might be considered heterogeneous environments." 2401.05219v1,"Distributed Monitoring for Data Distribution Shifts in Edge-ML Fraud Detection Nader Karayanni 1 , Robert J. Shahla 2 , Chieh-Lien Hsiao 1 1 Columbia University 2 Technion nader.karayanni@columbia.edu, shahlarobert@campus.technion.ac.il, ch3689@columbia.edu Abstract The digital era has seen a marked increase in financial fraud. edge ML emerged as a promising solution for smartphone payment services fraud detection, enabling the deployment of ML models directly on edge devices. This approach enables a more personalized real-time fraud detection. However, a significant gap in current research is the lack of a robust system for monitoring data distribution shifts in these distributed edge ML applications. Our work bridges this gap by introducing a novel open-source framework designed for continuous monitoring of data distribution shifts on a network of edge devices. Our system includes an innovative calculation of the Kolmogorov-Smirnov (KS) test over a distributed network of edge devices, enabling efficient and accurate monitoring of users behavior shifts. We comprehensively evaluate the proposed framework employing both real-world and synthetic financial transaction datasets and demonstrate the framework’s effectiveness. Introduction In recent years, smartphone payment services such as Apple Pay, smart wallets, and banking apps have revolutionized financial transactions, offering unprecedented convenience to users. However, these advancements have significantly increased fraud risk, by methods including identity theft, phishing, and smartphone theft (Bosamia 2017; Wang, Hahn, and Sutrave 2016). To combat these risks, payment service providers (referred to as operators) increasingly rely on Machine Learning (ML) to identify and prevent fraudulent activities with high accuracy (Omar, Fred, and Swaib 2018). Recently, there has been increased adoption of on-device ML, also known as edge ML, which is a paradigm where lightweight ML models are deployed directly on edge devices such as smartphones, sensors, and IoT devices. One advantage to this approach is the lower latency in detecting fraud since the inference doesn’t require traveling over the network. Another advantage is enabling the deployment of a personalized fine-tuned ML model per user, significantly enhancing the understanding of user-specific spending patterns and other relevant variables, therefore opening new avenues in Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. improving the detection of fraudulent activities (Sharma, Sharma, and Lal 2019; Chen et al. 2019). ML-based fraud detection systems often operate under a critical assumption: the data used for training these models closely mirrors the data encountered in real-world applications. However, this assumption doesn’t always hold. Data distribution shift is a phenomenon where the statistical properties of the data distribution change over time. This change can possibly lead to a significant undermining of the ML model’s performance, as the encountered data no longer reflects the distribution on which the ML model was originally trained (Widmer and Kubat 1994), denoted as originial training data. In the context of financial transactions, as an example, consumer behavior changes lead to shifts in spending patterns that ML models may not be trained to handle, invalidating the assumption that the ML model original training data mirrors the real-world encountered data (Dal Pozzolo et al. 2015). Identifying the distribution shift is typically done via a proactive monitoring process, where the newly incoming data distribution is continuously monitored and compared against the original training data distribution. This monitoring empowers the operators to promptly identify instances of data distribution shift and take action accordingly, preventing prolonged performance degradation of the ML models. In the context of edge ML, monitoring shifts in data distribution becomes more challenging. The newly incoming data is distributed across a network of edge devices, and new samples are continuously being generated at each device. Identifying distribution shifts across the edge devices requires consideration of the data generated by the distributed edge devices. A monitoring system deployed in the operator’s cloud cluster is tasked with aggregating and monitoring the data distribution from these devices. The naı̈ve solution is for the edge devices to send each new sample to the cloud. However, this approach is impractical due to its overhead for both the clients and the operator. The transmission of a vast number of samples would demand excessive bandwidth and runtime at the edge devices. Furthermore, the operator would need substantial processing power to handle the volume of incoming data. The challenge mentioned above remains underexplored. This work addresses this gap, We introduce a novel framework for continuous monitoring of data distribution shifts in" 2401.05234v1,"Extreme-value statistics and super-universality in critical percolation? Mohadeseh Feshanjerdi ∗ Department of Condensed Matter Physics, Faculty of Physics, Alzahra University, P. O. Box 1993893973, Tehran, Iran Peter Grassberger † JSC, FZ Jülich, D-52425 Jülich, Germany and Max Planck Institute for the Physics of Complex Systems, Nöthnitzer Str.38, 01187 Dresden, Germany (Dated: January 11, 2024) Recently, the number of non-standard percolation models has proliferated. In all these models, there exists a phase transition at which long range connectivity is established, if local connectedness increases through a threshold p c . In ordinary (site or bond) percolation on regular lattices, this is a well understood second-order phase transition with rather precisely known critical exponents, but there are non-standard models where the transitions are in different universality classes (i.e. with different exponents and scaling functions), or even are discontinuous or hybrid. It was recently claimed that certain scaling functions are in all such models given by extreme-value theory and thus independent of the precise universality class. This would lead to super-universality (even encompassing first-order transitions!) and would be a major break-through in the theory of phase transitions. We show that this claim is wrong. I. INTRODUCTION Percolation [1, 2] is one of the paradigmatic topics in statistical physics. It is concerned with the appearance or breakdown of long-range connectivity, as local connections are established or removed. This can be the formation of a gel if bonds between molecules are increased, the spreading of a disease if contact between people is increased above a threshold, or even the acceptance of a scientific theory as the number of its supporters surpasses a critical level. It is thus not surprising that percolation is a topic discussed in all branches of science, from condensed matter physics to astrophysics, biology, finance, and sociology [3, 4]. What makes percolation an interesting object of research is that the transition to long-range connectivity is, in the large system limit, abrupt with all features usually attached to a phase transition. In what we shall call in the following “ordinary percolation” (OP), this is a well-understood continuous (‘second order’) transition, whose critical exponents are exactly known in d = 2 and for d > 6, and known to high precision in dimensions three to five. The best known examples of OP are bond and site percolation on regular lattices [1, 2]. Just like other critical phenomena, also OP enjoys what is known as universality. This means that properties like critical exponents and scaling functions are strictly independent of details like the type (but not the dimension) of the lattice, and whether local connections are broken by removing sites or bonds. A set of microscopic models which thus have identical scaling behavior is called a universality class. ∗ Electronic address: m.feshanjerdi@alzahra.ac.ir † Electronic address: p.grassberger@fz-juelich.de But the very wide conceptual range of the notion of percolation implies that there are systems which fall outside the standard universality classes or, otherwise said, there are different universality classes. Examples are rigidity [5], bootstrap [6, 7], correlated [8, 9] (e.g. pacman [10] and aftermath [11]) and explosive [12] percolation, percolation on random (Erdös-Renyi) networks [13], agglomerative percolation [14], percolation driven by random walks [15], systems where the ‘local’ bonds can be arbitrarily long and have power-law distributions [16–18], and systems where several local elements have to cooperate in order to establish connections [19, 21–23]. In some of these cases [6, 7, 19, 21–23] the differences to OP are so big that the transition is discontinuous (‘first order’). Even when two systems are in different universality classes, it may happen that for some reason one or more critical exponents (or scaling functions) are identical, which is then called super-universality. The best known examples are provided by surface critical phenomena [24]. Take e.g. site percolation on a semi-infinite square lattice with −∞ < x, y < ∞, 0 < z < ∞. In this case clusters growing from a surface site with z = 0 have different fractal dimensions than clusters deep in the bulk, but correlations are described by the usual (bulk) correlation length exponent ν, even very close to the surface [25]. The same happens for the Ising model and for self-avoiding random walks. Another example is random interfaces within the so-called Kardar-Parisi-Zhang [26] universality class. Here the critical exponents are independent of the genus of the surface (asymptotically flat, circular, ...), but scaling functions do in general depend on the genus [27]. Finally, we might mention polymer networks [28] where the Flory index controlling the size is independent of the topology, but the exponents controlling the free energy are not. Recently, it was claimed [29] that such superuniversality is for percolation much more common than" 2401.05259v1,"Metric Spaces in Which Many Triangles Are Degenerate Vašek Chvátal 1 , Noé de Rancourt 2 , Guillermo Gamboa Quintero 3 , Ida Kantor 4 , Péter G.N. Szabó 5 Abstract Richmond and Richmond (American Mathematical Monthly 104 (1997), 713–719) proved the following theorem: If, in a metric space with at least five points, all triangles are degenerate, then the space is isometric to a subset of the real line. We prove that the hypothesis is unnecessarily strong: In a metric space on n points, fewer than 7n 2 /6 suitably placed degenerate triangles suffice. However, fewer than n(n − 1)/2 degenerate triangles, no matter how cleverly placed, never suffice. Given a metric space (V, dist), we follow [1] in writing [rst] to signify that r, s, t are pairwise distinct points of V and dist(r, s) + dist(s, t) = dist(r, t). Following [5], we refer to three-point subsets of V as triangles; if [rst], then the triangle {r, s, t} is called degenerate. If a metric space is isometric to a subset of the real line with the usual Euclidean metric, then all its triangles are degenerate. Richmond and Richmond [5] proved the converse under a mild lower bound on the number of points in the metric space: Theorem 1 (Richmond and Richmond). If, in a metric space with at least five points, all triangles are degenerate, then this metric space is isometric to a subset of the real line with the usual Euclidean metric. 1 Department of Computer Science and Software Engineering, Concordia University, Montreal (Emeritus) and Department of Applied Mathematics, Charles University, Prague (Visiting). Supported by NSERC grant RGPIN/5599-2014 and by H2020-MSCA-RISE project CoSP-GA No. 823748. E-mail address: chvatal@cse.concordia.ca 2 Univ. Lille, CNRS, UMR 8524 – Laboratoire Paul Painlevé, F-59000 Lille, France. Supported by the Labex CEMPI (ANR-11-LABX-0007-01). E-mail address: nderancour@univ-lille.fr 3 Computer Science Institute of Charles University, Prague. Supported by GAČR grant 2-17398S. E-mail address: gamboa@iuuk.mff.cuni.cz 4 Computer Science Institute of Charles University, Prague. Supported by GAČR grant 22-19073S and by Charles University project UNCE/SCI/004. E-mail address: ida@iuuk.mff.cuni.cz 5 Department of Engineering Mathematics, Faculty of Engineering and Information Technology, University of Pécs, Pécs, Hungary and Department of Computer Science and Information Theory, Budapest University of Technology and Economics, Hungary E-mail address: szape@cs.bme.hu Preprint submitted to Elsevier January 11, 2024" 2401.05282v1,"The Rise of Data-Driven Microscopy powered by Machine Learning Leonor Morgado 1 , Estibaliz Gómez-de-Mariscal 1 , Hannah S. Heil 1, , and Ricardo Henriques 1,2, 2 1 Instituto Gulbenkian de Ciência, Oeiras, Portugal MRC-Laboratory for Molecular Cell Biology. University College London, London, United Kingdom Optical microscopy is an indispensable tool in life sciences research, but conventional techniques require compromises between imaging parameters like speed, resolution, field-of-view, and phototoxicity. To overcome these limitations, data-driven microscopes incorporate feedback loops between data acquisition and analysis. This review overviews how machine learning enables automated image analysis to optimise microscopy in real-time. We first introduce key data-driven microscopy concepts and machine learning methods relevant to microscopy image analysis. Subsequently, we highlight pioneering works and recent advances in integrating machine learning into microscopy acquisition workflows, including optimising illumination, switching modalities and acquisition rates, and triggering targeted experiments. We then discuss the remaining challenges and future outlook. Overall, intelligent microscopes that can sense, analyse, and adapt promise to transform optical imaging by opening new experimental possibilities. data-driven | reactive microscopy | image analysis | machine learning Correspondence: (H. S. Heil) hsheil@igc.gulbenkian.pt, (R. Henriques) rjhenriques@igc.gulbenkian.pt r.henriques@ucl.ac.uk Introduction Optical microscopy techniques, such as brightfield, phase contrast, fluorescence, and super-resolution imaging, are widely used in life sciences to obtain valuable spatiotemporal information for studying cells and model organisms. However, these techniques have certain limitations with respect to critical parameters such as resolution, acquisition speed, signal to noise ratio, field of view, extent of multiplexing, zdepth dimensions and phototoxicity. The trade-offs between these critical imaging parameters are often represented within a ""pyramid of frustration"" (Fig. 1A). Although improving hardware can extend capabilities, optimal balancing depends on the imaging context. Especially, as scientific research delves into more complex questions, trying to understand the mechanisms of cell and infection biology at a molecular level in physiological context, traditional static microscopes may not be sufficient to capture relevant dynamics or rare events. Innovative efforts focus on overcoming these restrictions through integrated automation. Data-driven microscopes employ real-time data analysis to dynamically control and adapt acquisition (Fig. 1B). The core concept involves introducing automated feedback loops between image-data interpretation and microscope parameters tuning. Quantitative metrics extracted via computational analysis then dictate adaptive protocols tailored to phenomena of interest. The system reacts to predefined observational triggers by optimising imaging Data-driven microscope: The data-driven microscope integrates advanced computational techniques into its imaging capabilities. It uses machine learning algorithms and real time data analysis to automatically adjust the acquisition parameters. This way it is possible to optimise imaging conditions, enhance image quality and extract meaningful information without heavy reliance on manual intervention. parameters - such as excitation, stage position, and objective lenses - to capture critical events efficiently (Fig. 1C). Image analysis algorithms are pivotal in data-driven methodologies with customised approaches serving a large variety of situations. These approaches can use machine learning techniques to perform tasks such as classification, segmentation, tracking, and reconstruction without the need for explicit programming. By integrating machine learning, intelligent microscopes can make contextual decisions by identifying subtle features that traditional rule-based software may miss. Thus, these data-driven principles are able to increase the efficiency of image acquisition and enrich the information contents in diverse scenarios, especially in high throughput and high content imaging. It enables to capture discrete and rare events at different temporal and spatial scales and relate it to population behaviour. This information cannot be accessed with classical imaging approaches, especially because they would require extended exposure to cell damaging imaging conditions (1). In this review, we will first introduce the concept of datadriven microscopy and the common methods used to address microscopy challenges. Then, we will explain the principles and frameworks that enable reactive machine learning-based data-driven systems. Finally, we will showcase various applications that benefit from the integration of data-driven microscopy to highlight new experimental possibilities. Morgado et al. | arXiv | 1–7" 2401.05302v2,"Theory of Mind abilities of Large Language Models in Human-Robot Interaction : An Illusion? Mudit Verma ∗ Siddhant Bhambri ∗ Subbarao Kambhampati Arizona State University School of Computing and Augmented Intelligence Tempe, USA muditverma@asu.edu Arizona State University School of Computing and Augmented Intelligence Tempe, USA sbhambr1@asu.edu Arizona State University School of Computing and Augmented Intelligence Tempe, USA rao@asu.edu Figure 1: Fetch executes the maneuver to pick the block and takes a step (towards robot’s) left indicating its choice of goal as Loc2 (instead of the alternative Loc3) thereby being legible. Left : Fetch executes the maneuver. Center : Fetch has a label on its head stating ""Not a Legible robot"" in a small font which the human observer is unable to read. Right : Human has a blurred view of Fetch making them unable to comment on whether the robot is being legible. Robot expects the LLM (human proxy) to ""think what the ’human would think of the robot’s behavior’"" ABSTRACT Large Language Models (LLMs) have shown exceptional generative abilities in various natural language and generation tasks. However, possible anthropomorphization and leniency towards failure cases have propelled discussions on emergent abilities of LLMs especially on Theory of Mind (ToM) abilities in Large Language Models. While several false-belief tests exists to verify the ability to infer and maintain mental models of another entity, we study a special application of ToM abilities that has higher stakes and possibly irreversible consequences : Human Robot Interaction. In this work, we explore the task of Perceived Behavior Recognition, where a robot employs an LLM to assess the robot’s generated behavior in a manner similar to human observer. We focus on four behavior types, namely - explicable, legible, predictable, and obfuscatory behavior which have been extensively used to synthesize interpretable robot behaviors. The LLMs goal is, therefore to be a human proxy to the agent, and to answer how a certain agent behavior would be perceived by the human in the loop, for example ""Given a robot’s behavior X, would the human observer find it explicable?"". We conduct a human subject study to verify that the users are able to correctly answer such a question in the curated Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. HRI ’24 Companion, March 11–14, 2024, Boulder, CO, USA © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0323-2/24/03. . . $15.00 https://doi.org/10.1145/3610978.3640767 situations (robot setting and plan) across five domains. A first analysis of the belief test yields extremely positive results inflating ones expectations of LLMs possessing ToM abilities. We then propose and perform a suite of perturbation tests which breaks this illusion, i.e. Inconsistent Belief, Uninformative Context and Conviction Test. The high score of LLMs on vanilla prompts showcases its potential use in HRI settings, however to possess ToM demands invariance to trivial or irrelevant perturbations in the context which LLMs lack. We report our results on GPT-4 and GPT-3.5-turbo. CCS CONCEPTS • Computing methodologies → Theory of mind; Knowledge representation and reasoning; Planning and scheduling. KEYWORDS Theory of Mind; Large Language Models; Reasoning ACM Reference Format: Mudit Verma, Siddhant Bhambri, and Subbarao Kambhampati. 2024. Theory of Mind abilities of Large Language Models in Human-Robot Interaction : An Illusion?. In Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction (HRI ’24 Companion), March 11–14, 2024, Boulder, CO, USA. ACM, New York, NY, USA, 37 pages. https://doi.org/10.1145/ 3610978.3640767 1 INTRODUCTION As Artificial Intelligence (AI) progresses, the development of the next generation of AI agents require the ability to interact with * These authors contributed equally to this work" 2401.05312v1,"Hemodynamical Behavior Analysis of Anemic, Diabetic, and Healthy Blood Flow in the Carotid Artery Hashnayne Ahmed a, b * , Chinmayee Podder a a Department of Mathematics, Faculty of Science & Engineering, University of Barishal, Barishal 8200, Bangladesh b Department of Mechanical and Aerospace Engineering, University of Florida, Gainesville, Florida 32611, USA ABSTRACT The influence of blood rheology on hemodynamic parameters is investigated using Computational Fluid Dynamics on blood flow through the human carotid artery. We performed three-dimensional modeling and simulation to study blood flow through the carotid artery, which is divided into internal and exterior parts with a decreased radius. The blood flow was classified as basic pulsatile to simulate the human heart's rhythmic pulses. For hemodynamic modeling viscosity of the fluid, the Carreau model was utilized with four distinct blood instances: Anemic, diabetic, and two healthy blood types. The boundary conditions with Carreau viscosity were applied using the Ansys Fluent simulator, and the governing equations were solved using the finite volume technique. Different time steps were tested for their impact on wall deformation, strain rate, blood velocity, pressure, wall shear, and skin friction coefficient. The hemodynamical parameters were calculated using many cross-sectional planes along the artery. Finally, the impact of the four types of blood cases listed above was investigated, and we discovered that each blood case has a substantial impact on blood velocity, pressure, wall shear, and strain rate along the artery. Keywords: Carotid artery, Rheology, Hemodynamical behaviors, Blood flow analysis * Corresponding Author E-mail addresses: hashnayneahmed17@gmail.com (H. Ahmed), chinmayeepodder1@gmail.com (C. Podder) 1. Introduction Blood plays a key role in regulating the body’s internal systems and functioning the living organism to adjust its internal environment into a stable state position. It performs many functions within the body, such as providing oxygen and nutrients to tissues, removing waste materials, transporting of hormones and other signals, regulating the body’s immune and hydraulic functions, temperature and pH, endocrine and digestion systems throughout the whole body [41]. So, major health conditions that affect the blood flow can be life-threatening to humankind. Atherosclerosis is one of the most common cardiovascular diseases blocking blood’s regular movement, which causes increased morbidity. Even though atherosclerosis is a complex disease, it predominantly attacks artery bifurcation walls [1]. Its concentrated nature is caused by local hemodynamic characteristics such as wall shear stress and flow recirculation in specific locations [2]. Atherosclerosis of the large arteries is one of the leading causes of ischemic stroke, as well as a major cause of mortality and disability. Carotid stenosis and blockage are intimately linked to weakened brain hemodynamics. Transient ischemic attack is one of the symptoms [3]. The degree of internal carotid artery stenosis does not affect the early risk of stroke. Stroke can also occur because of plaque rupture in a stenosed carotid artery, which is a favorable site for the development of atherosclerosis due to arterial bifurcations that disrupt and complicate flow [4]. Because of the relevance of hemodynamic parameters such as blood pressure and wall shear stress in the development and progression of cardiovascular disease, a full understanding of carotid artery hemodynamics is required [3]. Blood is a non-Newtonian fluid that contains platelets, white blood cells, red blood cells, and other components [5], however, researchers have considered blood as a Newtonian fluid because in large vessels (diameter varying from 1 to 3 𝑚𝑚) the shear rates are higher than 100 𝑠 −1 [6-9]. In cardiovascular biomechanics, the structural modeling of the artery is thoroughly studied [10, 11]. Assume that the arterial material is linearly elastic. This is a straightforward technique to represent an artery. This assumption has Page 1" 2401.05365v1,"Online Action Recognition for Human Risk Prediction with Anticipated Haptic Alert via Wearables Cheng Guo 1,2 , Lorenzo Rapetti 1 , Kourosh Darvish 3 , Riccardo Grieco 1 , Francesco Draicchio 4 , Daniele Pucci 1,2 Abstract— This paper proposes a framework that combines online human state estimation, action recognition and motion prediction to enable early assessment and prevention of worker biomechanical risk during lifting tasks. The framework leverages the NIOSH index to perform online risk assessment, thus fitting real-time applications. In particular, the human state is retrieved via inverse kinematics/dynamics algorithms from wearable sensor data. Human action recognition and motion prediction are achieved by implementing an LSTM- based Guided Mixture of Experts architecture, which is trained offline and inferred online. With the recognized actions, a single lifting activity is divided into a series of continuous movements and the Revised NIOSH Lifting Equation can be applied for risk assessment. Moreover, the predicted motions enable anticipation of future risks. A haptic actuator, embedded in the wearable system, can alert the subject of potential risk, acting as an active prevention device. The performance of the proposed framework is validated by executing real lifting tasks, while the subject is equipped with the iFeel wearable system. The source code for this paper is available at https : //github.com/ami − iit/paper guo 2023 humanoids lif ting risk prediction. I. INTRODUCTION Work-related low-back disorders (WLBDs) still represent a societal challenge that threat the health conditions of working adults [1]. Among the large variety of their causes, payload lifting tasks in industrial environments play a pivotal role in determining poor ergonomic conditions that favor WLBDs [2]–[4]. In this context, ergonomics techniques to assess the quality of work conditions emerged, albeit based on qualitative questioners that are often costly and inconvenient to apply for dynamically changing work environments. It is then essential to develop quantitative scalable systems that online monitor human ergonomics and that potentially alert the worker before endangering health conditions. This paper proposes a framework that combines wearable sensors and haptic devices, learning-based prediction algorithms and traditional lifting ergonomics to enable early assessment and active prevention of worker biomechanical risk during lifting task execution. *This work was supported by the Italian National Institute for Insurance against Accidents at Work (INAIL) ergoCub Project. 1 Artificial and Mechanical Intelligence at Istituto Italiano di Tecnologia, Center for Robotics Technologies, Genova, Italy. email: firstname.lastname@iit.it 2 School of Computer Science, The University of Manchester, Manchester, United Kingdom. 3 University of Toronto, Toronto, Ontario, Canada. 4 Department of Occupational and Environmental Medicine, Epidemiology and Hygiene, INAIL, Rome, Italy. Fig. 1: An overview of the proposed framework. The Revised NIOSH Lifting Equation (RNLE) is a renowned tool for assessing two-handed manual lifting ergonomics – it is published by the National Institute for Occupational Safety and Health (NIOSH) [5], [6]. The RNLE defines a Recommended Weight Limit (RWL) and a Lifting Index (LI) based on payload weight, which may lead to reliable risk assessment for WLMDs [4]. Unfortunately, approximately 35% of lifting tasks and 63% of workers can not be assessed by means of the RNLE due to its limited number of parameters and system constraints [7]. To overcome such limitations, further approaches have been proposed to assess lifting-related risks, e.g., L5-S1 Internal Forces [8], Mechanical Energy Consumption [9] and Muscles Co-Activation [10]. However, these offline ergonomics evaluation tools are not flexible enough to be used directly in an unstructured work environment. As an attempt towards online human ergonomics evaluation, observational methods – like the Rapid Entire Body Assessment (REBA) and Rapid Upper Limb Assessment (RULA) – are leveraged for human-robot interaction [11]. The human data are measured by wearable sensors and an estimation of motion’s ergonomics is provided by automatically fulfilling the worksheet. More recently, real-time tools for tracking joint compressive forces during robot interactions are employed [12]. Analogously, the overloading joint torques can be computed using the displacement of the center of pressure during heavy lifting tasks, returning visual feedback of the worker state [13]. For manual lifting tasks, the existing attempts are either overly generic, e.g. [11], or limited by hardware settings, e.g. portability restriction [13]. They also lack the ability to alert the worker in advance, beforehand that biomechanical risks endanger health conditions." 2401.05373v1,"Dynamic Spiking Graph Neural Networks Nan Yin 1 , Mengzhu Wang 2 , Zhenghan Chen 3 , Giulia De Masi 4 , Bin Gu 5,1* , Huan Xiong 6,1 * Mohamed bin Zayed University of Artificial Intelligence 2 Hebei University of Technology 3 Peking University 4 Technology Innovation Institute 5 Jilin University 6 Harbin Institute of Technology {yinnan8911,dreamkily,pandaarych,jsgubin,huan.xiong.math}@gmail.com, giulia.demasi@tii.ae 1 Abstract The integration of Spiking Neural Networks (SNNs) and Graph Neural Networks (GNNs) is gradually attracting attention due to the low power consumption and high efficiency in processing the non-Euclidean data represented by graphs. However, as a common problem, dynamic graph representation learning faces challenges such as high complexity and large memory overheads. Current work often uses SNNs instead of Recurrent Neural Networks (RNNs) by using binary features instead of continuous ones for efficient training, which would overlooks graph structure information and leads to the loss of details during propagation. Additionally, optimizing dynamic spiking models typically requires propagation of information across time steps, which increases memory requirements. To address these challenges, we present a framework named Dynamic Spiking Graph Neural Networks (Dy-SIGN). To mitigate the information loss problem, Dy-SIGN propagates early-layer information directly to the last layer for information compensation. To accommodate the memory requirements, we apply the implicit differentiation on the equilibrium state, which does not rely on the exact reverse of the forward computation. While traditional implicit differentiation methods are usually used for static situations, Dy-SIGN extends it to the dynamic graph setting. Extensive experiments on three large-scale real-world dynamic graph datasets validate the effectiveness of Dy-SIGN on dynamic node classification tasks with lower computational costs. Introduction Graph Neural Networks (GNNs) (Scarselli et al. 2008) have been widely applied in various fields to learn the graph representation by capturing the dependencies of nodes and edges, such as relation detection (Schlichtkrull et al. 2018; Chen, Li, and Tang 2020; Mi and Chen 2020; Xu et al. 2019b) and recommendation (Wu et al. 2022). However, most GNNs are primarily designed for static or nontemporal graphs, which cannot meet the requirement of dynamic evolution over time in practice. The established solution is to extend the dynamic graphs into sequence models directly. Typically, these methods (Yin et al. 2023b; Shi et al. 2021; Kumar, Zhang, and Leskovec 2019; Yin et al. 2022a) utilize the Recurrent Neural Networks (RNNs) (Cho * Corresponding authors. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. et al. 2014) to capture the dynamic evolution of graphs for numerous downstream tasks such as time series prediction or graph property prediction (Yin et al. 2022b; Wieder et al. 2020; Yin et al. 2023a). Despite the promising performance of dynamic graphs, the majority of these approaches typically involve complex structures that consume significant computational resources during training and testing. Inspired by the way the brain process information, Spiking Neural Networks (SNNs) represent the event or clock-driven signals as inference for updating the neuron nodes parameters (Brette et al. 2007). Different from traditional deep learning methods, SNNs utilize discrete spikes information instead of continuous features, resulting in significantly lower power consumption during model training. Considering the inherent characteristics of SNNs (Maass 1997; Pfeiffer and Pfeil 2018; Schliebs and Kasabov 2013), a few recent works (Zhu et al. 2022; Xu et al. 2021; Li et al. 2023) have attempted to integrate SNNs into the GNNs framework to tackle the issue of high computational complexity. These methods transform the node features into a series of spikes with Poisson rate coding, and follow a graph convolution layer with SNN neurons, which employ a membrane potential threshold to convert continuous features to spike information (Kim et al. 2020; Bu et al. 2022). Although Spiking Graph Networks (SGNs) are gradually gaining attention, the use of SNNs in dynamic graphs is still less explored, which is a more common scenario in life. To address the gap, the work focuses on the problem of spiking dynamic graph, which applies SNNs for dynamic graph node classification. However, the problem is highly challenging due to the following reasons: (1) Information Loss. The representation of GNNs includes the information on graph structure and neighboring nodes, which are crucial for downstream tasks. However, SNNs employ spike signals instead of continuous features, leading to the loss of details regarding the structure and neighbors. Moreover, with the evolution of graphs over time, the information loss issue may further deteriorate the graph representation. (2) Memory Consumption. The RNN-based dynamic graph methods typically require significant memory resources to store the temporal node information (Sak, Senior, and Beaufays 2014). Moreover, SNNs inherently operate with multiple time latencies (i.e., calculate the spike signals with time latency steps in each SNN layer)." 2401.05392v1,"1 AT-2FF: Adaptive Type-2 Fuzzy Filter for De-noising Images Corrupted with Salt-and-Pepper Vikas Singh Member, IEEE Abstract—Noise is inevitably common in digital images, leading to visual image deterioration. Therefore, a suitable filtering method is required to lessen the noise while preserving the image features (edges, corners, etc.). This paper presents the efficient type-2 fuzzy weighted mean filter with an adaptive threshold to remove the SAP noise. The present filter has two primary steps: The first stage categorizes images as lightly, medium, and heavily corrupted based on an adaptive threshold by comparing the M-ALD of processed pixels with the upper and lower MF of the type-2 fuzzy identifier. The second stage eliminates corrupted pixels by computing the appropriate weight using GMF with the mean and variance of the uncorrupted pixels in the filter window. Simulation results vividly show that the obtained denoised images preserve image features, i.e., edges, corners, and other sharp structures, compared with different filtering methods. The code and experimented data of the AT-2FF is available on the GitHub platform: https://github.com/vikkyak/Image-Denoising. Index Terms—SAP, Type-2 Fuzzy Set, PSNR, M-ALD I. I NTRODUCTION I N the modern image processing system, image denoising plays a vital role in suppressing the noise from the image. The noise adversely affects the image processing task, image acquisition, video processing, image analysis, coding, tracking, etc. Impulse noise inevitably influences the natural image during image acquisition, coding, transmission, and imperfection in sensors. Removing and restoring the original image to speed up the image processing task, such as image detection, segmentation, object recognition, etc. [1]. In image processing, the primary purpose of image denoising is to preserve the edges, corners, and detailed image information. It has been studied in the literature that nonlinear filtering methods perform better than linear filtering methods [2]. The non-linear filtering methods, including standard median filter (MF) [3], weighted median filter (WM) [4], adaptive median filter (AMF) [5], adaptive weighted median filter (AWMF) [6], and truncated median filter (TMF) [7], have been used for filtering impulse noise. However, these filters blur the images and do not preserve edges while removing impulse noise at higher values. In [8], a modified AMF is presented in which the median filter replaces the corrupted pixels or their neighbor’s pixel values estimate the corrupted pixels. In [9], a weighted mean filter is utilized to lessen the SAP noise by assuming equal weights of uncorrupted pixels. The past success of fuzzy filters due to an extra degree of fuzziness provides a more helpful way of handling uncertainty Vikas Singh is with the Dept. of School of Life Science, Gwangju Institute of Science and Technology, South Korea (e-mail: vikkysingh07@gmail.com) in a noisy environment. In the literature, weighted fuzzy mean (WFM) [10], adaptive fuzzy (AF) [11], fuzzy c-means clustering filter (FRFCM) [12], iterative adaptive fuzzy (IAF) [13] and adaptive fuzzy switching weighted mean [14] filters are presented to reduce salt and pepper (SAP) noise. The filtering output of WFM is obtained by membership value with their associated fuzzy rule base. In contrast, the AF filter works on filter window enlargement to identify and denoise SAP noise. These filters still have a problem with weight assignment and cannot preserve detailed image information. Recent studies have suggested that the type-2 fuzzy filter can figure them out more efficiently with improved performance due to uncertainty modeling [15]. Liang and Mendel have proposed a fuzzy filter with a type-2 Takagi-Sugeno-Kang (TSK) fuzzy model to remove the SAP noise [16]. Yıldırım et al. [17] have proposed a detailed fuzzy filter based on type- 2 fuzzy and experimented on different noise density levels. The problem with these methods is the high computational complexity for a large rule base. To overcome the rule-based problem recently, authors have presented type-2 fuzzy filter [18], [19] and type-2 fuzzy filter with Matrix Completion (T-2FFMC) [20]. These methods perform well, but choosing a reasonable threshold is still problematic. In [21], authors have presented a two-stage adaptive filter with fuzzy weight switching to remove the SAP noise. The problem with this method is that the threshold is heuristic and does not preserve the image features at higher noise. In the present work, I have presented a two-stage fuzzy filter: The first stage categorizes images as lightly, medium, and heavily corrupted based on an adaptive threshold using a type-2 fuzzy approach with maximum absolute luminance difference (M-ALD) of the processed pixels, and the second stage eliminates corrupted pixels by computing the appropriate weight using GMF of the uncorrupted pixels in the filter window. The simulation results show that the present approach preserves the image details at higher and lower noise levels. The notable contributions of the paper are summarized as: 1) The first stage categorizes images as lightly, medium, and heavily corrupted based on an adaptive threshold by comparing the M-ALD of processed pixels with the upper and lower MF of the type-2 fuzzy identifier. 2) The second stage eliminates corrupted pixels by computing the appropriate weight using GMF with the mean and variance of the uncorrupted pixels. The rest of the paper is organized as: An adaptive threshold, and denoising method is discussed in Section III. Simulation and comparison with different filtering methods are discussed" 2401.05395v1,"SRNI-CAR: A Comprehensive Dataset for Analyzing the Chinese Automotive Market Ruixin Ding Bowei Chen James M. Wilson Adam Smith Business School University of Glasgow 2589583d@student.gla.ac.uk Adam Smith Business School University of Glasgow bowei.chen@glasgow.ac.uk Adam Smith Business School University of Glasgow james.wilson@glasgow.ac.uk Zhi Yan Yufei Huang CIAD UMR 7533 UTBM zhi.yan@utbm.fr Trinity Business School Trinity College Dublin yufei.huang@tcd.ie Abstract—The automotive industry plays a critical role in the global economy, and particularly important is the expanding Chinese automobile market due to its immense scale and influence. However, existing automotive sector datasets are limited in their coverage, failing to adequately consider the growing demand for more and diverse variables. This paper aims to bridge this data gap by introducing a comprehensive dataset spanning the years from 2016 to 2022, encompassing sales data, online reviews, and a wealth of information related to the Chinese automotive industry. This dataset serves as a valuable resource, significantly expanding the available data. Its impact extends to various dimensions, including improving forecasting accuracy, expanding the scope of business applications, informing policy development and regulation, and advancing academic research within the automotive sector. To illustrate the dataset’s potential applications in both business and academic contexts, we present two application examples. Our developed dataset enhances our understanding of the Chinese automotive market and offers a valuable tool for researchers, policymakers, and industry stakeholders worldwide. Index Terms—Automotive industry, big data, sales forecasting, text mining, machine learning I. I NTRODUCTION The automotive industry has been one of the important economic sectors in many countries and regions. It also has an important role in global energy consumption, energy sustainability and environmental impact. At present, China has become the world’s largest market for new energy vehicles (NEVs) and one of the largest automobile markets. Studying the Chinese automobile market reveals its profound impact on the global automotive ecosystem in terms of market growth opportunities, innovation cooperation, market diversity, environmental sustainability, and more. For a long time, the automotive industry has been facing many challenges in the marketing process, such as fierce market competition, the diversity of consumer demand, and the pressure of environmental protection policies. With the growth of social media and digital advertising, consumer engagement on the Web has greatly increased, and rational and effective digital marketing has become another serious challenge in the automotive industry [1]. The imperative for precise and efficient forecasting, rooted in historical data, becomes evident to address the challenges mentioned above. A substantial cohort of automotive industry stakeholders including executives, marketers, and academics are actively in pursuit of more efficacious methods for market analysis. Traditional forecasting approaches face formidable hurdles when contending with vast datasets, often falling short in ensuring the fidelity of sales predictions [2]. While the advent of cutting-edge data-driven methods such as data mining and machine learning has led to significant advancements in knowledge discovery and predictive capabilities, their efficacy hinges crucially on the availability of comprehensive and accurate datasets. However, currently available datasets are often fragmented, making it difficult for researchers to integrate industry information, automakers’ behavior, consumer demand, market feedback, and sales forecasts. It is increasingly important to create a dataset that can meet the multiple business analytics needs of the automotive industry. Therefore, we collected car model sales data, consumer online review data, and automotive industry news and information data from different sources, and integrated them into a comprehensive dataset, called SRNI-CAR. Our work makes two significant contributions. Firstly, we have curated a more comprehensive and scalable data resource. It not only consolidates industry news, development insights, automotive marketing data, consumer online reviews, and sales information but also introduces valuable variables previously absent, such as model launch dates and brand inception dates. Therefore, our dataset supports a broader spectrum of research possibilities compared to existing publicly available datasets in the automotive domain. Furthermore, it enhances analytical accuracy and interpretability. Secondly, our dataset possesses substantial business value in the automotive sector. Sales data aids automakers and marketers in discerning market trends, while review data facilitates the identification of consumer preferences, evaluation of marketing effectiveness," 2401.05399v1,"Proceedings of Machine Learning Research 1:1–12, 2024 AI for Education Automated Assessment of Students’ Code Comprehension using LLMs Priti Oli Rabin Banjade Jeevan Chapagain Vasile Rus POLI @ MEMPHIS . EDU RBNJADE 1@ MEMPHIS . EDU JCHPGAIN @ MEMPHIS . EDU VRUS @ MEMPHIS . EDU University of Memphis, Memphis TN 38152,USA Abstract Assessing student’s answers and in particular natural language answers is a crucial challenge in the field of education. Advances in machine learning, including transformer-based models such as Large Language Models(LLMs), have led to significant progress in various natural language tasks. Nevertheless, amidst the growing trend of evaluating LLMs across diverse tasks, evaluating LLMs in the realm of automated answer assesment has not received much attention. To address this gap, we explore the potential of using LLMs for automated assessment of student’s short and open-ended answer. Particularly, we use LLMs to compare students’ explanations with expert explanations in the context of line-by-line explanations of computer programs. For comparison purposes, we assess both Large Language Models (LLMs) and encoder-based Semantic Textual Similarity (STS) models in the context of assessing the correctness of students’ explanation of computer code. Our findings indicate that LLMs, when prompted in few-shot and chain-of-thought setting perform comparable to fine-tuned encoder-based models in evaluating students’ short answers in programming domain. Keywords: Automated Assessment, Large Language Model, Code Comprehension, Self-Explanation 1. Introduction Large Language Models (LLMs), such as ChatGPT, have garnered significant attention for their remarkable ability to generate responses to user prompts. These models have been explored for their potential (and risks) for education, particularly in the realm of computer science (CS) education, which is our focus. For CS education, LLMs have been investigated with respect to creating programming exercises (Sarsa et al., 2022), generating code explanations (McNeil et al., 2023), and even providing assistance in debugging coding problems (Liffiton et al., 2023), among other educational applications. While numerous studies have highlighted ChatGPT’s generative capabilities of educational resources and assistance, there is a notable gap in exploring ChatGPT’s assessment capabilities within educational contexts. In this work, we evaluate the effectiveness of LLMs to automatically assess students’ self-explanations of code. Such explanations are generated, for instance, while students engage in code comprehension activities with a computer tutor, which needs to automatically assess the correctness of students’ explanations of code in order to provide feedback. It should be noted that self-explanation, i.e., explaining learning material to oneself through speaking or writing (McNamara and Magliano, 2009), has been shown to improve comprehension and learning of programming concepts in introductory computer science courses (Tamang et al., 2021; Oli et al., 2023). A simple and scalable approach to assessing student explanations is semantic similarity, i.e. measuring the similarity of such natural language explanations to an appropriate reference/correct answer, e.g., provided by an expert, through an automated short answer grading system (Mohler and Mihalcea, © 2024 P. Oli, R. Banjade, J. Chapagain & V. Rus." 2401.05402v1,"Vector Field Oriented Diffusion Model for Crystal Material Generation Astrid Klipfel 123 , Yaël Fregier 2 , Adlane Sayede 3 , Zied Bouraoui 1 1 Univ. Artois, UMR 8188, Centre de Recherche en Informatique de Lens (CRIL), F-62300 Lens, France. 2 Univ. Artois, UR 2462, Laboratoire de Mathématiques de Lens (LML), F-62300 Lens, France. 3 Univ. Artois, UMR 8181, Unité de Catalyse et de Chimie du Solide (UCCS), F-62300 Lens, France. {astrid.klipfel, yael.fregier, adlane.sayede, zied.bouraoui}@univ-artois.fr Abstract Discovering crystal structures with specific chemical properties has become an increasingly important focus in material science. However, current models are limited in their ability to generate new crystal lattices, as they only consider atomic positions or chemical composition. To address this issue, we propose a probabilistic diffusion model that utilizes a geometrically equivariant GNN to consider atomic positions and crystal lattices jointly. To evaluate the effectiveness of our model, we introduce a new generation metric inspired by Frechet Inception Distance, but based on GNN energy prediction rather than InceptionV3 used in computer vision. In addition to commonly used metrics like validity, which assesses the plausibility of a structure, this new metric offers a more comprehensive evaluation of our model’s capabilities. Our experiments on existing benchmarks show the significance of our diffusion model. We also show that our method can effectively learn meaningful representations. 1 Introduction Crystal materials play a crucial role in numerous technological applications, such as the aerospace industry and semiconductors. As global warming poses a significant threat to our society, developing new materials can be vital to our ability to adapt to change and minimize our carbon footprint. To support the ecological transition, it is important to search for and generate new crystals, such as new semiconductors, that can be used to produce solar hydrogen or store hydrogen in solid form (Tournet et al. 2020; Rusman and Dahari 2016). New methods, such as high-throughput screening, rely heavily on machine learning models to speed up the development process. Recently, there has been growing interest in developing machine learning models to create new crystals (Noh et al. 2019; Dan et al. 2020; Long et al. 2021). In particular, Graph-based Neural Networks (GNNs) models have been proven effective for handling crystal structures. While, however, these models have shown excellent performances for regression tasks and property prediction such as the formation energy or the band-gap (Xie and Grossman 2018; Jørgensen, Jacobsen, and Schmidt 2018; Choudhary and DeCost 2021), the progress is still hampered by the limited extent to which generation is performed. As far as we Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. know, no existing model can perform sampling with a precise composition. This type of sampling is crucial for exploring the various phases of a material within a specific composition and generating a convex hull. The ability to do this is essential in searching for new materials (Kim et al. 2020). Our work is unique in enabling this type of sampling, whereas other models are not as well-suited for this task. In this paper, we propose an effective probabilistic sampling diffusion process with GNN for crystal materials generation. Crystals are periodic structures consisting of a minimal set of atoms (unit cell) infinitely repeated in all directions of 3D space. Contrary to organic chemistry, where diffusion models have led to spectacular results on generation, a key challenge when dealing with crystals is how the periodicity and the complex chemistry of materials are taken into account and handled by the generative model. In (Xie et al. 2021), a GNN-based model for material generation has been proposed where the diffusion process is only applied to atomic positions but not cells. Generating an appropriate cell is crucial for crystals. A cell defines the repetition pattern of a material and its density, which have an important impact on the properties of the crystal lattice. To this end, we propose a diffusion process on all the geometry of the structures (atomic positions and cells). In particular, our model relies on a diffusion process in a torus (for the atoms) and on a lattice (for the cells). We use a neural network based on an equivariant vector field to create our lattices, which sets us apart from others who only predict lattice parameters from geometry. Additionally, we use an equivariant graph neural network layer. This layer is equivariant to both E and SL 3 (Z). Although introducing this diffusion process is challenging, we offer an elegant solution and explain how to reverse the process. Our model generates a more realistic lattice, as confirmed by our experiments. To assess the quality of the generated structure, several metrics such as validity, density and formation energy are commonly used (Xie et al. 2021; Court et al. 2020). The validity metric performs well when the generated crystals are bad, i.e., to discard invalid materials having a poor validity ratio. When a generative model produces a good crystal structure, this metric is no longer meaningful. The density and formation energy are good metrics. However, they are arbitrary and partially cover material characteristics. There exist also metrics that compare the distributions of other" 2401.05405v1,"SelfEEG: A Python library for Self-Supervised Learning in Electroencephalography Federico Del Pup 1, 2, 3 , Andrea Zanola 3 , Louis Fabrice Tshimanga 2, 3 , Paolo Emilio Mazzon 3 , and Manfredo Atzori 2, 3, 4 DOI: DOIunavailable Software • Review • Repository • Archive Editor: Pending Editor Reviewers: • @Pending Reviewers Submitted: N/A Published: N/A License Authors of papers retain copyright and release the work under a Creative Commons Attribution 4.0 International License (CC BY 4.0). Preprint Policy This work has been submitted to The Journal of Open Source Software for possible publication. More information about the journal Preprint Policy can be found at the following link. 1 Department of Information Engineering, University of Padova, Via Gradenigo 6/b, 35131 Padova, Italy 2 Department of Neuroscience, University of Padua, Via Belzoni 160, 35121 Padova, Italy 3 Padova Neuroscience Center, University of Padova, Via Orus 2/B, 35129 Padova, Italy 4 Information Systems Institute, University of Applied Sciences Western Switzerland (HES-SO Valais), 2800 Sierre, Switzerland Summary SelfEEG is an open-source Python library developed to assist researchers in conducting Self- Supervised Learning (SSL) experiments on electroencephalography (EEG) data. Its primary objective is to offer a user-friendly but highly customizable environment, enabling users to efficiently design and execute self-supervised learning tasks on EEG data. SelfEEG covers all the stages of a typical SSL pipeline, ranging from data import to model design and training. It includes modules specifically designed to: split data at various granularity levels (e.g., session-, subject-, or dataset-based splits); effectively manage data stored with different configurations (e.g., file extensions, data types) during mini-batch construction; provide a wide range of standard deep learning models, data augmentations and SSL baseline methods applied to EEG data. Most of the functionalities offered by selfEEG can be executed both on GPUs and CPUs, expanding its usability beyond the self-supervised learning area. Additionally, these functionalities can be employed for the analysis of other biomedical signals often coupled with EEGs, such as electromyography or electrocardiography data. These features make selfEEG a versatile deep learning tool for biomedical applications and a useful resource in SSL, one of the currently most active fields of Artificial Intelligence. Statement of need SelfEEG answers to the lack of Self-Supervised Learning (SSL) frameworks for the analysis of EEG data. In fact, despite the recent high number of publications (more than 20 journal papers in the last 4 years (Del Pup & Atzori, 2023), there are currently no frameworks or common standards for developing EEG-based SSL pipelines, contrary to other fields such as computer vision (see LightlySSL or ViSSL). In the field of EEG data analysis, where it has been demonstrated that SSL can improve models’ accuracy and mitigate overfitting (Rafiei et al., 2022) (Banville et al., 2021), the absence of a self-supervised learning framework dedicated to EEG signals limits the development of novel strategies, reproducibility of results, and the progress of the field. Thanks to selfEEG, researchers can instead easily build SSL pipelines, speeding up experimental design and improving the reproducibility of results. Reproducibility is a key factor in this area, as it enhances the comparison of different strategies and supports the creation of useful benchmarks. ¿citation_author?, (2023). SelfEEG: A Python library for Self-Supervised Learning in Electroencephalography. Journal of Open Source Software, 1 ¿VOL?(¿ISSUE?), ¿PAGE?. https://doi.org/DOIunavailable" 2401.05406v1,"RFRL Gym: A Reinforcement Learning Testbed for Cognitive Radio Applications Daniel Rosen ∗ , Illa Rochez ∗ , Caleb McIrvin ∗ , Joshua Lee ∗ , Kevin D’Alessandro ∗ , Max Wiecek ∗ , Nhan Hoang ∗ , Ramzy Saffarini ∗ , Sam Philips ∗ , Vanessa Jones ∗ , Will Ivey ∗ , Zavier Harris-Smart † , Zavion Harris-Smart † , Zayden Chin † , Amos Johnson † , Alyse M. Jones ∗ , William C. Headley ∗ ∗ Virginia Tech National Security Institute, † Morehouse College amos.johnson@morehouse.edu, alysemjones@vt.edu, cheadley@vt.edu Abstract—Radio Frequency Reinforcement Learning (RFRL) is anticipated to be a widely applicable technology in the next generation of wireless communication systems, particularly 6G and next-gen military communications. Given this, our research is focused on developing a tool to promote the development of RFRL techniques that leverage spectrum sensing. In particular, the tool was designed to address two cognitive radio applications, specifically dynamic spectrum access and jamming. In order to train and test reinforcement learning (RL) algorithms for these applications, a simulation environment is necessary to simulate the conditions that an agent will encounter within the Radio Frequency (RF) spectrum. In this paper, such an environment has been developed, herein referred to as the RFRL Gym. Through the RFRL Gym, users can design their own scenarios to model what an RL agent may encounter within the RF spectrum as well as experiment with different spectrum sensing techniques. Additionally, the RFRL Gym is a subclass of OpenAI gym, enabling the use of third-party ML/RL Libraries. We plan to open-source this codebase to enable other researchers to utilize the RFRL Gym to test their own scenarios and RL algorithms, ultimately leading to the advancement of RL research in the wireless communications domain. This paper describes in further detail the components of the Gym, results from example scenarios, and plans for future additions. Index Terms—machine learning, reinforcement learning, wireless communications, dynamic spectrum access, OpenAI gym I. I NTRODUCTION Due to the rapid growth of Radio Frequency (RF) spectrum usage, efficient use of the spectrum has become increasingly difficult, leading to over-congestion in the RF spectrum [1]. This largely is a consequence of the exponential increase in wireless devices, with the CTIA citing a growth of 183 times its size since 2010 in its 2021 Wireless Internet Survey [2], ultimately resulting in decreased data rates from poor channel conditions and collisions [3]. These collisions are a form of signal jamming, also known as interference, leading to incomplete and corrupted transmissions. Interference can either be intentional from an adversary or unintentional due to less-thanideal conditions in the RF spectrum. Furthermore, spectrum congestion makes it more difficult to differentiate whether the collision was from an adversary or over-congestion. Regardless, to avoid further loss to communication systems, both interference types must be prevented. Thus, to prevent interference as well as losses in data rate, there is a clear need for improvement in the utilization of the RF Spectrum. In recent years, Cognitive Radios (CR) have gained traction as a promising solution to alleviating spectrum congestion [4] due to its ability to intelligently determine which channels are currently occupied, and which are not through Dynamic Spectrum Access (DSA) [5]. DSA was proposed to overcome the shortcomings of traditional methods, such as Frequency Hopping Spread Spectrum (FHSS) [6] and Direct Sequence Spread Spectrum (DSSS) [7], where both fail in a dynamic RF spectrum from not adapting its method to where holes in the spectrum are located. DSA, however, is able to do so through spectrum sensing, where methods such as energy detection are utilized to identify which frequency bands are in use [8], allowing a CR to switch to an empty band. However, DSA alone is not enough to handle spectrum congestion since it cannot predict the location of future spectrum holes, resulting still in accidental collisions. However, by coupling DSA with predictive intelligence, a CR can predict where and when other users will occupy the RF spectrum in the future. One promising solution is Reinforcement Learning (RL). RL is a Machine Learning method known for its ability to predict the best decisions to achieve a desired outcome [9]. When applied to CRs, RL’s predictive capabilities enable signals to preemptively respond to the movements of other signals in the spectrum as well as changing channel conditions such that the optimal frequency at which to transmit can be identified. Significant effort has been invested into investigating RL-based protocols for spectrum assignment and wireless communication enhancement, where RL has shown to drastically reduce congestion in the spectrum [10]–[13]. From these works, it is clear that RL Algorithms must be trained in a representative environment, in this case the RF spectrum. However, there is currently an absence of a comprehensive, universal tool simulating the RF spectrum that researchers can use to develop and test RL algorithms for CR-specific applications. Conventionally, new tools have been developed for each project and can not be easily used in other applications. Thus, this paper introduces the RFRL Gym 1 , a training environment of the RF spectrum designed to provide comprehensive functionality, such as custom scenario generation, multiple learning settings, and compatibility with third-party RL packages. As a result, the RFRL Gym can 1 https://github.com/vtnsiSDD/rfrl-gym" 2401.05421v1,"WildGEN: Long-horizon Trajectory Generation for Wildlife Ali Al-Lawati Elsayed Eshra Prasenjit Mitra aha112@psu.edu Penn State State College, Pennsylvania, USA eme5375@psu.edu Penn State State College, Pennsylvania, USA pum10@psu.edu Penn State State College, Pennsylvania, USA ABSTRACT Trajectory generation is an important concern in pedestrian, vehicle, and wildlife movement studies. Generated trajectories help enrich the training corpus in relation to deep learning applications, and may be used to facilitate simulation tasks. This is especially significant in the wildlife domain, where the cost of obtaining additional real data can be prohibitively expensive, time-consuming, and bear ethical considerations. In this paper, we introduce WildGEN: a conceptual framework that addresses this challenge by employing a Variational Auto-encoders (VAEs) based method for the acquisition of movement characteristics exhibited by wild geese over a long horizon using a sparse set of truth samples. A subsequent postprocessing step of the generated trajectories is performed based on smoothing filters to reduce excessive wandering. Our evaluation is conducted through visual inspection and the computation of the Hausdorff distance between the generated and real trajectories. In addition, we utilize the Pearson Correlation Coefficient as a way to measure how realistic the trajectories are based on the similarity of clusters evaluated on the generated and real trajectories. KEYWORDS Trajectory Generation, Wildlife Trajectory, Trajectory Framework ACM Reference Format: Ali Al-Lawati, Elsayed Eshra, and Prasenjit Mitra. 2023. WildGEN: Longhorizon Trajectory Generation for Wildlife. In Proceedings of InfoWild (InfoWild’23). ACM, New York, NY, USA, 9 pages. https://doi.org/XXXXXXX. XXXXXXX 1 INTRODUCTION Animals in the wild move for a variety of reasons, including foraging, exploration, or migration [19]. A better understanding of the drivers of wildlife movement can have tremendous benefits in environmental planning, preservation efforts, and anti-poaching. It contributes to mitigating conflict between wildlife and human settlements [11]. Scientists in wildlife studies use datasets of animal trajectories collected, typically, using telemetry devices, such as GPS collars, to capture the animals’ exact location over time. However, the limitations of using these devices arise from the complications and dangers associated with attaching the devices to the animals, Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. InfoWild’23, Oct 2023, Birmingham, UK © 2023 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX Figure 1: Real (green) vs Generated (blue) Trajectories including constraints on device size and weight depending on the animal, potential failures, and battery life. As a result, considerable work in movement ecology attempts to generate wildlife trajectories based on concepts such as Correlated Random Walk (CRW) [13] and Brownian Motion [5]. However, some of these methods are limited in their effectiveness to landbased animals. Furthermore, in their basic form, these methods can only model the wandering effect of animals within a foraging area [2]. Methods such as Brownian Bridges [18] extend these movement models using a beginning and endpoint, and interpolate the inbetween points based on the maximum speed and time budget of the animal over the expected duration of the trajectory. However, these methods fail to take existing measured trajectories as input in the process of trajectory generation. Instead, they rely on random variables to induce movement, and thereby achieve limited success. On the other hand, pedestrian and vehicle trajectory generation problems are constrained by the road and pedestrian networks which are not applicable in the wildlife domain. Likewise, trajectory generation in the UAV literature is irrelevant as it is more concerned with optimization, and minimizing flying time through the target waypoints [17]. In this paper, we present a novel framework we call WildGEN that attempts to generate trajectories by learning the statistical properties of a sparse set of known trajectories. The framework, WildGEN, is based on proven deep learning-based Variational Autoencoders (VAEs) which have successfully been applied to similar problems [4]. WildGEN applies a post-processing filter on each trajectory path using a Minimum Bounding Region (MBR) based constraint. Furthermore, in order to reduce the excessive wandering effect, a smoothing filter is applied. In the next section, we discuss some related work, followed by a brief motivation of the methods we used to develop our Framework. Section 4 presents the experimental settings, experimental results, and an ablation study that demonstrates the contribution of each" 2401.05458v1,"CoLafier: Collaborative Noisy Label Purifier With Local Intrinsic Dimensionality Guidance Dongyu Zhang ∗ Ruofan Hu ∗ Abstract Deep neural networks (DNNs) have advanced many machine learning tasks, but their performance is often harmed by noisy labels in real-world data. Addressing this, we introduce CoLafier, a novel approach that uses Local Intrinsic Dimensionality (LID) for learning with noisy labels. CoLafier consists of two subnets: LID-dis and LID-gen. LID-dis is a specialized classifier. Trained with our uniquely crafted scheme, LID-dis consumes both a sample’s features and its label to predict the label - which allows it to produce an enhanced internal representation. We observe that LID scores computed from this representation that effectively distinguish between correct and incorrect labels across various noise scenarios. In contrast to LID-dis, LID-gen, functioning as a regular classifier, operates solely on the sample’s features. During training, CoLafier utilizes two augmented views per instance to feed both subnets. CoLafier considers the LID scores from the two views as produced by LID- dis to assign weights in an adapted loss function for both subnets. Concurrently, LID-gen, serving as classifier, suggests pseudo-labels. LID-dis then processes these pseudolabels along with two views to derive LID scores. Finally, these LID scores along with the differences in predictions from the two subnets guide the label update decisions. This dual-view and dual-subnet approach enhances the overall reliability of the framework. Upon completion of the training, we deploy the LID-gen subnet of CoLafier as the final classification model. CoLafier demonstrates improved prediction accuracy, surpassing existing methods, particularly under severe label noise. For more details, see the code at https://github.com/zdy93/CoLafier. Keywords: Noise Label, Label Correction. 1 Introduction Motivation. Deep neural networks (DNNs) have achieved remarkable success in a wide range of machine learning tasks [39, 38, 40]. Their training typically requires extensive, accurately labeled data. However, acquiring such labels is both costly and labor-intensive [24, 41, 7]. To circumvent these challenges, researchers ∗ Worcester Polytechnic denst}@wpi.edu Institute, {dzhang5, rhu, run- Elke Rundensteiner ∗ and practitioners increasingly turn to non-expert labeling sources, such as crowd-sourcing [9] or automated annotation by pre-trained models [23]. Although these methods enhance efficiency and reduce costs, they frequently compromise label accuracy [9]. The resultant ’noisy labels’ may inaccurately reflect the true data labels. Studies show that despite their robustness in AI applications, DNNs are susceptible to the detrimental effects of such label noise, which risks impeding their performance and also generalization ability [1, 24]. State-of-the-Art. Recent studies on learning with noisy labels (LNL) reveal that Deep Neural Networks (DNNs) exhibit interesting memorization behavior [1, 31]. Namely, DNNs tend to first learn simple and general patterns, and only gradually begin to learn more complex patterns, such as data with noisy labels. Many methods thus leverage signals from the early training stage [13], such as loss or confidence scores, to identify potentially incorrect labels. For label correction, the identified faulty labels are either dropped, assigned with a reduced importance score, or replaced with generated pseudo labels [5, 12, 42]. However, these methods can suffer from accumulated errors caused by incorrect selection or miscorrection - with the later further negatively affecting the representation learning and leading to potential overfitting to noisy patterns [24, 27]. Worse yet, most methods require prior knowledge about the noise label ratio or the specific pattern of the noisy labels [5, 13]. In real-world scenarios, this information is typically elusive, making it difficult to implement these methods. Local Intrinsic Dimensionality (LID), a measure of the intrinsic dimensionality of data subspaces [8], can be leveraged for training DNNs on noisy labels. Initially, LID decreases as the DNN models the low-dimensional structures inherent in the data. Subsequently, LID increases, indicating the model’s shift towards overfitting the noisy label. Another study [19] applied LID to identify adversarial examples in DNNs, which typically increase the local subspace’s dimensionality. These findings suggest LID’s sensitivity to noise either from input features or labels. Nonetheless, previous research has utilized LID as a general indicator for the training Copyright © 2024 by SIAM Unauthorized reproduction of this article is prohibited" 2401.05474v1,"Model-Driven Dataset Generation for Data-Driven Battery SOH Models Khaled Sidahmed Sidahmed Alamin ∗ , Francesco Daghero ∗ , Giovanni Pollo ∗ , Daniele Jahier Pagliari ∗ , Yukai Chen † , Enrico Macii ∗ , Massimo Poncino ∗ , Sara Vinco ∗ ∗ Politecnico Di Torino, Turin, Italy {name.surname@polito.it} † IMEC, Leuven, Belgium {yukai.chen@imec.be} Abstract—Estimating the State of Health (SOH) of batteries is crucial for ensuring the reliable operation of battery systems. Since there is no practical way to instantaneously measure it at run time, a model is required for its estimation. Recently, several data-driven SOH models have been proposed, whose accuracy heavily relies on the quality of the datasets used for their training. Since these datasets are obtained from measurements, they are limited in the variety of the charge/discharge profiles. To address this scarcity issue, we propose generating datasets by simulating a traditional battery model (e.g., a circuitequivalent one). The primary advantage of this approach is the ability to use a simulatable battery model to evaluate a potentially infinite number of workload profiles for training the data-driven model. Furthermore, this general concept can be applied using any simulatable battery model, providing a fine spectrum of accuracy/complexity tradeoffs. Our results indicate that using simulated data achieves reasonable accuracy in SOH estimation, with a 7.2% error relative to the simulated model, in exchange for a 27X memory reduction and a ≈2000X speedup. Index Terms—Battery modeling, digital twin, automotive I. I NTRODUCTION The accuracy of onboard State of Health (SOH) estimation in Battery Management Systems (BMS) is essential for ensuring the safety and reliability of battery systems of a battery-powered device, and in particular for Electric Vehicles (EVs). As there is no practical physical way to instantaneously measure the SOH, such tracking inevitably requires a model. The literature about SOH models is extremely vast, including electrochemical, equivalent circuits, semi-empirical, analytical, and statistical models [1]. More recently, on the wave of the Machine Learning (ML) hype, a new category of datadriven models has emerged, in which a set of instantaneously measurable battery parameters (typically, voltage, current, and temperature) relative to a charge or discharge session of a battery is labeled with corresponding SOH values calculated at session’s end [2]. These labeled measures are then used as a dataset to train appropriate ML models [3], [4]. Data-driven models essentially solve the two main drawbacks of traditional models: (i) they are more general, as models for different battery types can be naturally obtained by training them with measurements on different devices, thus also covering variability aspects; and (ii) they do not require any kind of simulation, thus resulting in significant reductions in time and space complexity when deploying the model on resource-constrained devices (i.e., no need for a large amount of simulation operations to estimate battery dynamics and/or for a simulation engine). On the other hand, the quality of data-driven models is strongly dependent on the size and the variety of the dataset. As these datasets are obtained by experimental measurements, it is materially unfeasible to provide an acceptable coverage of the design space: datasets are generated at specific working conditions, determined by the application domain, and in limited time, thus restricting the variety of explored charge/discharge/rest patterns, discharge current profiles, and load currents. Last but not least, such a large exploration space should possibly be repeated on multiple battery instances in order to account for the intrinsic variability of the devices. The consequence is that datasets obtained by measurements are by definition very accurate, but accuracy is guaranteed only in the few points of the experiment space that have been measured. The key motivation of this paper is to fundamentally swap this asymmetry, i.e., to sacrifice some accuracy while extending the coverage of the design space. We propose to use measurements (possibly much fewer than those required to generate the whole dataset) to build a simulatable battery model that incorporates the desired effects. This model can then be used to generate arbitrarily large datasets, which will serve as the training set for constructing more lightweight and flexible data-driven models. Several are the advantages of this approach: • Exploration of virtually unlimited data points: once the battery model is built, any kind of current and/or temperature workload can be simulated to generate as many data points as needed, at a lower cost and in less time than would be required for experimental measurement setups; • Tunable accuracy/complexity tradeoff: depending on the quality of the available measurement data, more or less accurate battery models can be built, providing a flexible range of datasets for the data-driven model; • Possibility of model combination: multiple types of battery models can be built [1]) and integrated to cover different aspects of battery dynamics, increasing the comprehensiveness of the final battery model; • The final SOH model is still a data-driven SOH model: its execution does not require simulation and it is essentially a callable function of “live” parameters that can be deployed on a target resource-constrained device. Our results show that using data obtained from the chosen simulation models [5], we achieved an error of about 7% with respect to the SOH data while reducing memory usage by 27X and speeding up calculations by ≈2000X. ©2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Published as a conference paper at the 2023 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED). DOI: 10.1109/ ISLPED58423.2023.10244587" 2401.05475v1,"D RAFT VERSION J ANUARY 12, 2024 Typeset using L A TEX twocolumn style in AASTeX63 NE2001p: A Native Python Implementation of the NE2001 Galactic Electron Density Model S TELLA K OCH O CKER 1, 2 AND J AMES M. C ORDES 3 1 Cahill Center for Astronomy and Astrophysics, California Institute of Technology, Pasadena, CA 91101, USA 2 The Observatories of the Carnegie Institution for Science, Pasadena, CA 91101, USA 3 Department of Astronomy and Cornell Center for Astrophysics and Planetary Science, Cornell University, Ithaca, NY, 14853, USA ABSTRACT The Galactic electron density model NE2001 describes the multicomponent ionized structure of the Milky Way interstellar medium. NE2001 forward models the dispersion and scattering of compact radio sources, including pulsars, fast radio bursts, AGNs, and masers, and the model is routinely used to predict the distances of radio sources lacking independent distance measures. Here we present the open-source package NE2001p, a fully Python implementation of NE2001. The model parameters are identical to NE2001 but the computational architecture is optimized for Python, yielding small (< 1%) numerical differences between NE2001p and the Fortran code. NE2001p can be used on the command-line and through Python scripts available on PyPI. Future package releases will include modular extensions aimed at providing short-term improvements to model accuracy, including a modified thick disk scale height and additional clumps and voids. This implementation of NE2001 is a springboard to a next-generation Galactic electron density model now in development. Keywords: Interstellar medium – Warm ionized medium – Hot ionized medium – Interstellar plasma – Radio transient sources – Active galactic nuclei – Pulsars – – Astrophysical masers – Interstellar scintillation – Distance indicators – Galactic radio sources – Extragalactic radio sources 1. INTRODUCTION The time has come for a next-generation model of the Galactic electron density (n e ). Models such as TC93 (Taylor & Cordes 1993), NE2001 (Cordes & Lazio 2002, 2003), and YMW16 (Yao et al. 2017), were primarily calibrated using radio pulsars with independent distance measurements, including interferometric parallaxes (the gold standard), pulsar timing parallaxes, globular cluster and supernova remnant associations, and HI kinematic distances. The most widely used models, NE2001 and YMW16, were calibrated using 108 and 189 distances, respectively, and of these, only about 14 (NE2001) and 40 (YMW16) were interferometric parallax distances. Over the past few years, the sample of precise pulsar distances has more than doubled 1 from very long baseline interferometry programs such as PSRπ and MSPSRπ (Deller et al. 2019; Ding et al. 2023), in addition to ongoing pulsar timing experiments (e.g. Agazie et al. 2023). Pulsar searching programs have also broadened the sample of globular clusters containing known pulsars 2 (Pan et al. 2021; Ridolfi et al. 2022), compounded by concurrent improvements in globular cluster distance measurements (Baumgardt & Vasiliev 2021). This continually increasing dataset of precise pulsar distances, combined with imminent widefield, high-resolution surveys of the Galactic interstellar medium (ISM) across its multiple ionized density-temperature phases (SDSS-V Local Volume Mapper and DSA-2000, among others), indicates that we are well poised to begin construction of a new model. The first step to a next-generation model is NE2001p, a fully Python implementation of the Fortran model NE2001. NE2001p serves two key purposes. It makes the model accessible to a broader range of users by employing widely adopted community practices for open-source Python package distributions. Secondly, NE2001p is a testbed for revisions that will inform a next-generation model, both by necessitating a restructuring of the model’s computational architecture for Python, and by allowing us to provide future updates to specific model parameters. As such, NE2001p is Corresponding author: Stella Koch Ocker socker@caltech.edu 1 http://hosting.astro.cornell.edu/research/parallax/ 2 https://www3.mpifr-bonn.mpg.de/staff/pfreire/GCpsr.html" 2401.05516v1,"FPRF: Feed-Forward Photorealistic Style Transfer of Large-Scale 3D Neural Radiance Fields GeonU Kim 1 , Kim Youwang 2 , Tae-Hyun Oh 1,2,3 1 3 Grad. School of Artificial Intelligence and 2 Dept. of Electrical. Engineering, POSTECH Institute for Convergence Research and Education in Advanced Technology, Yonsei University {gukim, youwang.kim, taehyun}@postech.ac.kr Abstract We present FPRF, a feed-forward photorealistic style transfer method for large-scale 3D neural radiance fields. FPRF stylizes large-scale 3D scenes with arbitrary, multiple style reference images without additional optimization while preserving multi-view appearance consistency. Prior arts required tedious per-style/-scene optimization and were limited to small-scale 3D scenes. FPRF efficiently stylizes large-scale 3D scenes by introducing a style-decomposed 3D neural radiance field, which inherits AdaIN’s feed-forward stylization machinery, supporting arbitrary style reference images. Furthermore, FPRF supports multi-reference stylization with the semantic correspondence matching and local AdaIN, which adds diverse user control for 3D scene styles. FPRF also preserves multi-view consistency by applying semantic matching and style transfer processes directly onto queried features in 3D space. In experiments, we demonstrate that FPRF achieves favorable photorealistic quality 3D scene stylization for largescale scenes with diverse reference images. Project page: https://kim-geonu.github.io/FPRF/ 1 Introduction Large-scale 3D scene reconstruction is a longstanding problem in computer vision and graphics (Früh and Zakhor 2004; Snavely, Seitz, and Szeliski 2006; Pollefeys et al. 2008; Agarwal et al. 2009; Zhu et al. 2018; Tancik et al. 2022), which aims to build realistic 3D virtual scenes from a set of images. Recently, Neural Radiance Fields (Mildenhall et al. 2020; Barron et al. 2021, 2022; Fridovich-Keil et al. 2022; Jun- Seong et al. 2022; Müller et al. 2022; Fridovich-Keil et al. 2023) and its large-scale extensions (Tancik et al. 2022; Turki, Ramanan, and Satyanarayanan 2022; Zhenxing and Xu 2022) have shown remarkable progress in modeling coherent and photorealistic outdoor 3D scenes, suggesting promising future directions, e.g., VR/AR applications. In this work, we take a step further and focus on a task, photorealistic style transfer (PST) for large-scale 3D scenes, i.e., 3D scene PST. The 3D scene PST task aims to transfer the visual styles of style reference images onto a large-scale 3D scene represented by a neural radiance field. Within this objective, the resulting stylized output is expected to be photorealistic and preserve the geometric structure of the original scene. Large-scale 3D scene PST has various applications, where it can enrich virtual 3D spaces of XR applications and re- UPST-NeRF StyleRF (arXiv2022) Photorealistic Feed-forward Multi-reference Single-stage training ✓ ✓ ✗ ✗ LipRF FPRF (CVPR2023) (CVPR2023) (Ours) ✗ ✓ ✗ ✗ ✓ ✗ - ✗ ✓ ✓ ✓ ✓ Table 1: FPRF provides a photorealistic, feed-forward style transfer method for large-scale neural radiance fields, while supporting multiple style reference images in the stylization stage. Our model, FPRF, differs from competing methods, where it needs only an efficient single stage training, and it works with arbitrary style images in a feed-forward manner. alistically augment existing real-world autonomous driving datasets (Geiger, Lenz, and Urtasun 2012; Cordts et al. 2016). Recent studies (Chen et al. 2022; Zhang et al. 2023) have developed methods for 3D scene PST and shown plausible visual qualities. However, all of them require additional time-consuming learning and optimization stages even after scene reconstruction (Chen et al. 2022) or tedious per-style optimization steps to apply even just a single style to the scene (Zhang et al. 2023). More importantly, due to the aforementioned drawbacks, the previous 3D scene PST methods do not scale to large 3D scenes. This motivates us to develop an efficient PST method for large-scale 3D scenes that stylizes the whole 3D scene without exhaustive and timeconsuming per-scene or per-style optimization. In this work, we propose FPRF, an efficient and feedforward PST for large-scale 3D scenes. To implement a feedforward PST method for a large-scale 3D scene, we employ the adaptive instance normalization (AdaIN) method, which has shown efficient and promising style transfer results on various tasks (Huang and Belongie 2017; Huang et al. 2018; Gunawan et al. 2023; Wang et al. 2020; Aberman et al. 2020; Segu et al. 2020; Huang et al. 2022; Liu et al. 2023). Specifically, we propose a photorealistic stylizable radiance field consisting of a scene content field and a scene semantic field. Given a large set of photos of the target scene, we first train a grid-based scene content field to embed the scene geometry and content features that can be later decoded to a large-scale radiance field of arbitrary styles. The scene semantic field is" 2401.05521v1,"1 Current Effect-eliminated Optimal Target Assignment and Motion Planning for a Multi-UUV System Danjie Zhu and Simon X. Yang Abstract—The paper presents an innovative approach (CBN- NTAP) that addresses the complexities and challenges introduced by ocean currents when optimizing target assignment and motion planning for a multi-unmanned underwater vehicle (UUV) system. The core of the proposed algorithm involves the integration of several key components. Firstly, it incorporates a bio-inspired neural network-based (BINN) approach which predicts the most efficient paths for individual UUVs while simultaneously ensuring collision avoidance among the vehicles. Secondly, an efficient target assignment component is integrated by considering the path distances determined by the BINN algorithm. In addition, a critical innovation within the CBNNTAP algorithm is its capacity to address the disruptive effects of ocean currents, where an adjustment component is seamlessly integrated to counteract the deviations caused by these currents, which enhances the accuracy of both motion planning and target assignment for the UUVs. The effectiveness of the CBNNTAP algorithm is demonstrated through comprehensive simulation results and the outcomes underscore the superiority of the developed algorithm in nullifying the effects of static and dynamic ocean currents in 2D and 3D scenarios. Index Terms—bio-inspired neural network, current effect, motion planning, target assignment, unmanned underwater vehicle. I. I NTRODUCTION T HE studies on unmanned underwater vehicles (UUV) have been attractive for many researchers in recent decades due to the flexibility of the vehicle in the underwater area [1, 2]. To overcome the difficulty of accomplishing complex underwater operations, the multi-UUV system, which refers to the system of multiple UUVs and multiple targets, has attracted great attention owing to its high parallelism, robustness and efficiency [3–5]. In a multi-UUV system, the target assignment and motion planning problem is the most basic and significant issue as it decides the efficiency of the UUV collaboration [6]. The most optimal target assignment and motion planning in the multi-UUV system is realized by deducting the solution that consumes the shortest total distance or the shortest time. Algorithms regarding the optimal target assignment and motion planning problem for UUVs have been investigated by many researchers, where most algorithms focus on path The authors are with Advanced Robotics and Intelligent System (ARIS) Laboratory, School of Engineering, University of Guelph, Guelph, ON. N1G2W1, Canada (e-mail: danjie@dal.ca, syang@uoguelph.ca). planning and rely on the grid-based modeling of the environment [7–10]. Dijkstra algorithm is one of the earliest gridbased path planning methods where a global search on all possible path solutions is required [11]. A* algorithm is then raised with the advancement of adding the heuristic cost to reduce the searching space [12]. However, when considering the disturbances in various kinds of environment, most studies focus on the wind effect of the unmanned aerial vehicle (UAV), instead of the underwater environmental factors [13– 16]. The typical underwater disturbances, for example, the effect of currents and obstacles usually have an inevitable influence on the UUV operation process due to their irregular distribution and low visibility of the marine environment [17]. Therefore the traditional grid-based path planning methods that need maps of high accuracy and consistency are not appropriate to the UUV system [18]. The A* algorithm has been adapted for application in the marine system, incorporating environmental influences such as moving obstacles and ocean currents [18, 19]. While feasible methods have been proposed for maintaining safety and efficiency during optimal path tracking, these approaches are primarily limited to unmanned surface vehicles (USVs), which require fewer dimensions. However, the use of the A* algorithm on UUVs is challenging due to their limited velocity and operating space, necessitating real-time feedback for navigating complex undersea environments [20]. To address this issue, the genetic algorithm (GA) has been combined with path planning for UUVs, as it allows for regulation of optimization based on environmental factors [21–23]. Nonetheless, the high computational complexity and large data inputs associated with the GA method limit its applicability in UUV path planning [24]. This challenge is particularly evident in multi-UUV systems, where efficient target assignment plays a crucial role in managing multiple tasks simultaneously and improving system efficiency [25]. Various intelligent algorithms have been developed to address the efficient assignment of targets and planning for multiple UUVs with multiple targets, with the self-organizing map (SOM) algorithm being widely accepted [25–29]. The SOM algorithm has been employed in multi-UUV systems due to the similarity between the target assignment and SOM network assignment. However, the collaboration efficiency among UUVs still has room for improvement, and the impact" 2401.05548v1,"1 X-HEEP: An Open-Source, Configurable and Extendible RISC-V Microcontroller for the Exploration of Ultra-Low-Power Edge Accelerators Simone Machetti , Pasquale Davide Schiavone , Thomas Christoph Müller , Miguel Peón-Quirós , David Atienza , Fellow, IEEE Abstract—The field of edge computing has witnessed remarkable growth owing to the increasing demand for real-time processing of data in applications. However, challenges persist due to limitations in the performance and power efficiency of edgecomputing devices. To overcome these challenges, heterogeneous architectures have emerged that combine host processors with specialized accelerators tailored to specific applications, leading to improved performance and reduced power consumption. However, most of the existing platforms lack configurability and extendability options, necessitating extensive modifications of the register transfer level (RTL) code for integrating custom accelerators. To overcome these limitations, we introduce in this paper the eXtendible Heterogeneous Energy-Efficient Platform (X-HEEP). X-HEEP is an open-source platform designed to natively support the integration of ultra-low-power edge accelerators. It provides customization options to match specific application requirements by exploring various core types, bus topologies, and memory addressing modes. It also enables a fine-grained configuration of memory banks to match the constraints of the integrated accelerators. The platform prioritizes energy efficiency by implementing low-power strategies, such as clock-gating and power-gating, and integrating these with connected accelerators through dedicated power control interfaces. We demonstrate the real-world applicability of X-HEEP by providing an integration example tailored for healthcare applications that includes a coarse-grained reconfigurable array (CGRA) and in-memory computing (IMC) accelerators. The resulting design, called HEEPocrates, has been implemented both in field programmable gate array (FPGA) on the Xilinx Zynq-7020 chip, for prototyping and exploration, and in silicon with TSMC 65 nm low-power CMOS technology, for silicon validation. The fabricated chip can operate from 0.8 V to 1.2 V, achieving a maximum frequency of 170 MHz and 470 MHz, respectively. Its power consumption ranges from 270 µW at 32 kHz and 0.8 V, to 48 mW at 470 MHz and 1.2 V. We run a set of healthcare applications and measure their energy consumption to demonstrate the alignment of our chip with other state-of-the-art microcontrollers commonly adopted in this domain. Moreover, we showcase the energy benefit of 4.9 × gained by exploiting the integrated CGRA accelerator, compared to running on the host CPU. Index Terms—Ultra-Low Power, Energy Efficiency, Microcontroller, Accelerator, Field Programmable Gate Array (FPGA), Course-Grained Reconfigurable Array (CGRA), In-Memory Computing (IMC), Tapeout, Silicon Validation. Simone Machetti, Pasquale Davide Schiavone, Thomas Christoph Müller, and David Atienza are with the Embedded Systems Laboratory (ESL), EPFL, Switzerland (simone.machetti, davide.schiavone, christoph.mueller, miguel.peon, david.atienza@epfl.ch). Miguel Peón-Quirós is with EcoCloud, EPFL, Switzerland. I. I NTRODUCTION I N recent years, the field of edge computing has witnessed remarkable growth and adoption, driven by the increasing demand for real-time computing solutions. As data processing at the edge has become more prevalent, the performance and power consumption limitations of edge-computing devices have become increasingly apparent. These limitations have posed significant challenges for researchers and engineers seeking to optimize the performance and power efficiency of edge-computing solutions. To overcome these challenges, a trend has emerged in the form of heterogeneous architectures. These architectures offer a promising path toward high energy efficiency while maintaining performance constraints. Heterogeneous architectures rely on a combination of ultra-low-power host processors to run control and communication tasks, and custom accelerators tailored to specific application domains, such as artificial intelligence, image processing, healthcare, and cryptography, to run computationally demanding tasks. Control and communication tasks include accessing external memories, acquiring data from analog-to-digital converters (ADCs) or sensors, preparing data for computations, and running real-time operating system (RTOS) functions. Meanwhile, computational demanding tasks focus on data processing, for example, convolutional and fully connected layers in neural networks (NNs), fast-Fourier transforms (FFTs) in temporal series, secure-hash algorithms (SHA) in cryptography, etc. Each accelerator comes with unique requirements, such as memory size, area, performance, and power, to match the constraints of the target applications. For this reason, proper customization of host platforms is imperative. This may include exploring different CPUs to trade performance and power, bus topologies and addressing modes to match the needed bandwidth, memory sizes to accommodate the required computational data, peripherals to provide the necessary I/O connectivity, etc. However, commercial platforms limit hardware exploration due to their non-open-source nature. They involve costly licensing models and do not allow for customization. As a result, there is a growing preference for open-source platforms as a more attractive solution that does not limit exploration and customization, and it gives designers digital sovereignty and control over IPs. As of today, there is an increasing number of open-source" 2401.05552v1,"Continuous-Wave Cavity Ring-Down for High-Sensitivity Polarimetry and Magnetometry Measurements Dang-Bao-An Tran, 1, 2 Evan Edwards, 1 David P Tew, 1 Robert Peverall, 1 and Grant A D Ritchie 1, a) 1) Department of Chemistry, Physical and Theoretical Chemistry Laboratory, University of Oxford, South Parks Road, Oxford, OX1 3QZ, United Kingdom 2) Current Address: Time and Frequency Department, National Physical Laboratory, Teddington, TW11 0LW, United Kingdom We report the development of a novel variant of cavity ring-down polarimetry using a continuous-wave laser operating at 532 nm for highly precise chiroptical activity and magnetometry measurements. The key methodology of the apparatus relies upon the external modulation of the laser frequency at the frequency splitting between non-degenerate left- and right-circularly polarised cavity modes. The method is demonstrated by evaluation of the Verdet constants of crystalline CeF 3 and fused silica, in addition to the observation of gas- and solution-phase optical rotations of selected chiral molecules. Specifically, optical rotations of (i) vapours of α-pinene and R-(+)-limonene, (ii) mutarotating D-glucose in water, and (iii) acidified L-histidine solutions, are determined. The detection sensitivities for the gas- and solutionphase chiral activity measurements are ∼ 30 µdeg and ∼ 120 µdeg over a 30 s detection period per cavity roundtrip pass, respectively. Furthermore, the measured optical rotations for R-(+)-limonene are compared with computations performed using the Turbomole quantum chemistry package. The experimentally observed optically rotatory dispersion of this cyclic monoterpene was thus rationalised via consideration of its room temperature conformer distribution as determined by the aforementioned single-point energy calculations. I. INTRODUCTION Optical polarimetry is a fundamental technique for studying magnetometry and chirality, and has its basis in the rotation of the polarisation plane of linearly polarised light when passing through a magneto-optic or chiral medium, respectively. Magneto-optic rotational activity plays a key role in technologically important areas such as the development of novel Faraday rotators, magnetometry, and controlling light polarisation 1–4 , while chirality is of crucial importance across many areas of science, from fundamental physics and investigations of parity violation 5,6 , to pharmacology and biochemistry 7 . Standard laboratory polarimeters have a typical detection precision no better than a few mdeg Hz −1/2 that is limited by birefringence, and are suitable only for liquid-phase observations. It is important to be able to make precise measurements of optical rotation for all phases of matter and thus there has been a continuous effort to develop novel, more sensitive, and precise polarimetric methods 8–10 . Particularly attractive in this regard is cavity-based polarimetry, which allows the interaction path length between the light and the magnetooptic/chiral medium to be increased manyfold, thus enhancing the detection sensitivity; for example, cavity ring-down techniques using a high-finesse linear cavity offer a large interaction path length between the light beam and sample of the order of a few km, compared to the few tens of cm afforded by a single cell. However, linear cavities without intracavity optics cannot be employed for chirality observations because the optical rotation is dependent upon the propagation direction of the light beam, and so is suppressed when the linearly polarised light passes back and forth between a) Author to whom correspondence should be addressed: grant.ritchie@ chem.ox.ac.uk two cavity mirrors. Vaccaro et al. circumvented this problem by developing pulsed laser-based cavity ring-down polarimetry (CRDP) by inserting a pair of intracavity quarterwave plates to amplify the chiroptical rotation by the number of cavity roundtrip passes—the stress-induced birefringence of the intracavity optics, however, is correspondingly increased 11–13 . This apparatus was used successfully in studying the gas-phase optical rotation of chiral molecules, and utilised a pulsed ns laser source. More recently, Bougas et al. demonstrated a continuous-wave (cw) variant of CRDP at 408 nm within a linear cavity for which the laser frequency is locked to a cavity resonance. Note, however, that this technique only applies for the measurement of the non-resonant Faraday effect of gases and magneto-optic crystals 14 , where the Faraday rotation is independent of the light propagation direction. Given the limitations associated with using linear cavity geometries, a variety of CRDP instruments based upon bow-tie cavities have recently been demonstrated using pulsed and cw lasers. The first pulsed laser CRDP methodology using a bowtie cavity was demonstrated by Rakitzis and co-workers, and employs two counter-propagating linearly (and orthogonally) polarised beams 15–18 . An intra-cavity magneto-optic crystal is inserted into one arm of the cavity to provide a large bias rotation angle—the intracavity anisotropies of opposite symmetry are suppressed by a signal reversing technique. The chiroptical rotation is then extracted from the ring-down decay signals of the two counter-propagating beams. These instruments have ring-down times, τ, between 0.5 and 1 µs, and have been used for magnetometry measurements and chirality detection across a range of environments, including open air, pressure-controlled vapours, and the liquid phase, with precision ≥ 80 µdeg per cavity pass. Recently, our group has demonstrated an implementation of bow-tie cavity-enhanced polarimetry with a cw laser source at 730 nm 19,20 . A key feature of the method is the controlled perturbation of the laser" 2401.05556v1,"Assessing High-Order Links in Cardiovascular and Respiratory Networks via Static and Dynamic Information Measures Gorana Mijatovic, ∗ Laura Sparacino, † Yuri Antonacci, † Michal Javorka, ‡ Daniele Marinazzo, § Sebastiano Stramaglia, ¶ and Luca Faes ∗∗ (Dated: January 12, 2024) The network representation is becoming increasingly popular for the description of cardiovascular interactions based on the analysis of multiple simultaneously collected variables. However, the traditional methods to assess network links based on pairwise interaction measures cannot reveal high-order effects involving more than two nodes, and are not appropriate to infer the underlying network topology. To address these limitations, here we introduce a framework which combines the assessment of high-order interactions with statistical inference for the characterization of the functional links sustaining physiological networks. The framework develops information-theoretic measures quantifying how two nodes interact in a redundant or synergistic way with the rest of the network, and employs these measures for reconstructing the functional structure of the network. The measures are implemented for both static and dynamic networks mapped respectively by random variables and random processes using plug-in and model-based entropy estimators. The validation on theoretical and numerical simulated networks documents the ability of the framework to represent high-order interactions as networks and to detect statistical structures associated to cascade, common drive and common target effects. The application to cardiovascular networks mapped by the beat-to-beat variability of heart rate, respiration, arterial pressure, cardiac output and vascular resistance allowed noninvasive characterization of several mechanisms of cardiovascular control operating in resting state and during orthostatic stress. Our approach brings to new comprehensive assessment of physiological interactions and complements existing strategies for the classification of pathophysiological states. I. INTRODUCTION In recent years, there has been a growing focus on exploring interactions within the cardiovascular and respiratory systems aimed at gaining insights into diverse pathophysiological mechanisms [1]. This surge of interest is driven by fast advancements in the techniques for recording and processing biomedical signals, which nowadays offer unprecedented opportunities for the simultaneous monitoring of multiple cardiovascular parameters. In turn, biomedical signal processing methods are shifting towards the multivariate analysis of several parameters, which naturally leads to representing physiological systems as interconnected networks whose nodes and links are associated respectively to the parameters and to the interactions between them. This representation is very popular in the field of Network Physiology [2] where cardiovascular, cardiorespiratory interactions and others are studied in a wide range of healthy and diseased states [3– 6]. The analysis of physiological networks typically relies ∗ Faculty of Technical Sciences, University of Novi Sad, Serbia; gorana86@uns.ac.rs † Department of Engineering, University of Palermo, Italy ‡ Department of Physiology and Biomedical Center Martin, Jesse- nius Faculty of Medicine, Comenius University, Martin, Slovakia § Department of Data Analysis, University of Ghent, Belgium ¶ Department of Physics, University of Bari Aldo Moro, and INFN Sezione di Bari, Italy of Engineering, University of Palermo, Italy; luca.faes@unipa.it ∗∗ Department on pairwise measures, i.e. measures that quantify the existence and strength of a link focusing exclusively on the activity of the two nodes connected by it. Pairwise measures such as the linear correlation, the spectral coherence or the mutual information (MI) and MI rate (MIR) have been successfully applied to assess link strength in cardiovascular and respiratory networks [1, 3, 7–9]. Nevertheless, these measures suffer from two main limitations: they are not appropriate to infer the topological structure of the analyzed functional network, because they do not allow to distinguish direct relations between two nodes from indirect relations caused by common drive or cascade effects [10, 11]; and they cannot assess functional high-order interactions (HOIs), i.e. interactions that result from the combined activity of more than two nodes and encompass the statistical concepts of synergy and redundancy [12, 13]. To address these limitations, several approaches have been proposed which separately consider static or dynamic network systems, i.e. systems where the temporal correlations within and between the node activities are neglected or investigated. In particular, the inference of network structure has been faced combining correlation and partial correlation [11] for static systems, and exploiting the concept of multivariate Granger causality [14] for dynamic systems. The analysis of HOIs is performed via emerging informationtheoretic methods like the partial information decomposition [15] or the so-called O-information [12], originally proposed for random variables and recently extended to dynamic systems [16, 17]. Interestingly, while network reconstruction and HOIs assessment are both grounded on multivariate analysis, their interrelationships remain" 2401.05562v1,"Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning Zhangchen Xu * 1 , Fengqing Jiang * 1 , Luyao Niu 1 , Jinyuan Jia 2 , Radha Poovendran 1 1 University of Washington The Pennsylvania State University {zxu9,fqjiang,luyaoniu,rp3}@uw.edu, jinyuan@psu.edu 2 Abstract Federated learning (FL) enables multiple participants to train a global machine learning model without sharing their private training data. Peer-to-peer (P2P) FL advances existing centralized FL paradigms by eliminating the server that aggregates local models from participants and then updates the global model. However, P2P FL is vulnerable to (i) honestbut-curious participants whose objective is to infer private training data of other participants, and (ii) Byzantine participants who can transmit arbitrarily manipulated local models to corrupt the learning process. P2P FL schemes that simultaneously guarantee Byzantine resilience and preserve privacy have been less studied. In this paper, we develop Brave, a protocol that ensures Byzantine Resilience And priVacyprEserving property for P2P FL in the presence of both types of adversaries. We show that Brave preserves privacy by establishing that any honest-but-curious adversary cannot infer other participants’ private data by observing their models. We further prove that Brave is Byzantine-resilient, which guarantees that all benign participants converge to an identical model that deviates from a global model trained without Byzantine adversaries by a bounded distance. We evaluate Brave against three state-of-the-art adversaries on a P2P FL for image classification tasks on benchmark datasets CI- FAR10 and MNIST. Our results show that the global model learned with Brave in the presence of adversaries achieves comparable classification accuracy to a global model trained in the absence of any adversary. 1 Introduction Federated learning (FL) (McMahan et al. 2017; Konečnỳ et al. 2016) allows multiple participants to collaboratively train a global model while avoiding sharing their private data. In a classic centralized FL paradigm, a central server coordinates the training process among the distributed participants and aggregates their local models. However, centralized FL is not viable when the server is subject to faults or becomes untrustworthy and/or unavailable (Lalitha et al. 2019). To address the high dependence on the reliability of the server in centralized FL, Peer-to-Peer (P2P) federated learning has been proposed in (Lalitha et al. 2019; Roy et al. * These authors contributed equally. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 2019). In P2P FL, the global model is updated by leveraging information exchange between individual participants, thereby eliminating the need for a central server. The P2P paradigm presents two significant advantages. First, it eliminates the potential vulnerabilities associated with a single point of failure. Second, it can be deployed for decentralized applications such as vehicle-to-vehicle networks (Chen et al. 2021) and Internet-of-Things (Savazzi, Nicoli, and Rampa 2020). Due to the absence of central coordination in the P2P setting, the behaviors of participants are unpredictable and uncontrollable. An unauthorized agent can participate in P2P FL aiming to obtain sensitive data and/ or disrupt the training process. Since local models are shared among participants, honest-but-curious participants may be able to infer private training data by launching a membership inference attack (Nasr, Shokri, and Houmansadr 2019). Therefore, it is crucial to implement privacy-preserving techniques such as secure Multi-Party Computation (MPC) (Yao 1982) for model aggregation in P2P settings. Besides honest-but-curious participants, Byzantine participants can send inconsistent models to different participants in P2P networks, inject biased models, or even withhold its updates (Tolpegin et al. 2020; Xie, Koyejo, and Gupta 2019; Fang et al. 2020). As a consequence, Byzantine participants can degrade the global model or even cause the FL to fail. Therefore, Byzantine-resilient model aggregation rules are needed to defend against Byzantine attacks in P2P FL. The current Byzantine-resilient model aggregation rules (Blanchard et al. 2017; Yin et al. 2018; Li et al. 2019), however, are not readily compatible with privacy-preserving techniques such as MPC. These model aggregation rules (Blanchard et al. 2017; Yin et al. 2018; Li et al. 2019) eliminate the compromised models from adversaries by disclosing each individual participant’s information. Consequently, the honest-but-curious adversaries can infer private training data owned by the other participants, leveraging such information disclosure. At present, however, P2P FL schemes that simultaneously guarantee Byzantine resilience and preserve privacy have been less investigated. In this paper, we design a P2P FL scheme that achieves Byzantine resilience while preserving privacy. We consider the presence of both honest-but-curious and Byzantine participants, and define three properties:" 2401.05573v1,"Draft version January 12, 2024 Typeset using L A TEX default style in AASTeX631 M31N 2013-10c: A Newly Identified Recurrent Nova in M31 Allen W. Shafter , 1 Kamil Hornoch , 2 Hana Kučáková , 3 Petr Fatka , 2 Jingyuan Zhao (赵经远) , 4 Xing Gao (高兴) , 4 Shahidin Yaqup (夏伊丁·亚库普), 5 Tuhong Zhong (钟土红), 5 Ali Esamdin (艾力·伊沙木丁) , 5 Chunhai Bai (白春海), 5 Na Wang (王娜) , 5 Paul Benni , 6 Aiden Luo, 7 and Ilana Yousuf 7 1 Department of Astronomy, San Diego State University, San Diego, CA 92182, USA 2 Astronomical Institute of the Czech Academy of Sciences, Ondřejov, Czech Republic 3 Astronomical Institute, Charles University, Faculty of Mathematics and Physics, Prague, Czech Republic 4 Xingming Observatory, Mount Nanshan, Xinjiang, China 5 Xinjiang Astronomical Observatory, Chinese Academy of Sciences, Xinjiang, China 6 Acton Sky Portal Private Observatory, Acton, MA, USA 7 Westview High School, San Diego, CA 92129, USA ABSTRACT The nova M31N 2023-11f (2023yoa) has been recently identified as the second eruption of a previously recognized nova, M31N 2013-10c, establishing the latter object as the 21st recurrent nova system thus far identified in M31. Here we present well sampled R-band lightcurves of both the 2013 and 2023 eruptions of this system. The photometric evolution of each eruption was quite similar as expected for the same progenitor system. The 2013 and 2023 eruptions each reached peak magnitudes just brighter than R ∼ 16, with fits to the declining branches of the eruptions yielding times to decline by two magnitudes of t 2 (R) = 5.5 ± 1.7 and t 2 (R) = 3.4 ± 1.5 days, respectively. M31N 2013-10c has an absolute magnitude at peak, M R = −8.8 ± 0.2, making it the most luminous known recurrent nova in M31. Keywords: Novae (1127) – Recurrent Novae (1366) – Andromeda Galaxy (39) 1. INTRODUCTION A recent nova in the Andromeda galaxy, M31N 2023-11f, has been confirmed by Shafter et al. (2023) to be the second known eruption of a previously identified nova M31N 2013-10c (Hornoch et al. 2013a,b). The identification of M31N 2013-10c as a recurrent nova (RN) brings to 21 the total number of such systems known in M31 – more than twice the number of RNe known in the Milky Way (Schaefer 2010). The observed time interval between eruptions establishes an upper limit of ∼10.1 yr on the recurrence time (it is conceivable, though unlikely, that one or more eruptions may have been missed). Such a short recurrence time is typical of RNe in M31, but is quite short by Galactic standards where of the 10 RNe known, only U Sco (t recur ≃ 10.3 yr) has a comparably short recurrence interval. Here, we present R-band lightcurves for the two known eruptions of M31N 2013-10c, demonstrating that, as expected, they are quite similar. 2. THE LIGHT CURVES M31N 2013-10c was discovered by the Lick Observatory Supernova Search (LOSS) on 2013 October 09.30 UT at a magnitude, m = 18.8 (unfiltered). Shortly thereafter, an observation by N. James on October 09.813 UT revealed that the object had brightened to m = 15.9 (unfiltered) 1 . A series of R-band measurements were subsequently made with the 0.65-m reflector at the Ondřejov Observatory. The top panel of Figure 1 shows the full lightcurve for M31N 2013-10c. The declining portion of the light curve for both eruptions is best represented by a two-component linear fit (shown as broken lines in Figure 1). The fit to the M31N 2013-10c data suggests t 2 (R) = 5.5 ± 1.7 d. Corresponding author: A. W. Shafter ashafter@sdsu.edu 1 http://www.cbat.eps.harvard.edu/unconf/followups/J00430954+4115399.html" 2401.05583v1,"Diffusion Priors for Dynamic View Synthesis from Monocular Videos Chaoyang Wang 1 Peiye Zhuang 1 Aliaksandr Siarohin 1 Junli Cao 1 Guocheng Qian 1,2 Hsin-Ying Lee 1 Sergey Tulyakov 1 1 2 Snap Research KAUST {cwang9, pzhuang, asiarohin, jcao2, gqian, hlee5, stulyakov}@snap.com Reference view T-NeRF Nerfies HyperNeRF DpDy (Ours) Depth Self-occlusion Out-of-view Complex motion Figure 1. Comparison with dynamic novel view synthesis methods from monocular videos. When dealing with self-occlusions, outof-view details, and complex motions previous methods render severe artifacts (columns 2-4). In contrast, our novel approach based on diffusion prior elegantly handles such cases, producing high quality visual results and geometry (right two columns). Abstract Dynamic novel view synthesis aims to capture the temporal evolution of visual content within videos. Existing methods struggle to distinguishing between motion and structure, particularly in scenarios where camera poses are either unknown or constrained compared to object motion. Furthermore, with information solely from reference im- ages, it is extremely challenging to hallucinate unseen regions that are occluded or partially observed in the given videos. To address these issues, we first finetune a pretrained RGB-D diffusion model on the video frames using a customization technique. Subsequently, we distill the knowledge from the finetuned model to a 4D representations encompassing both dynamic and static Neural Radiance Fields (NeRF) components. The proposed pipeline achieves" 2401.05615v1,"Analytical approximations for generalized quantum Rabi models Chon-Fai Kam ∗ Department of Physics, University at Buffalo, SUNY, Buffalo, New York 14260, USA Yang Chen † Department of Mathematics, Faculty of Science and Technology, University of Macau, Avenida da Universidade, Taipa, Macau, China The quantum Rabi model is essential for understanding interacting quantum systems. It serves as the simplest non-integrable yet solvable model describing the interaction between a two-level system and a single mode of a bosonic field. In this study, we delve into the exploration of the generalized quantum Rabi model, wherein the bosonic mode of the field undergoes squeezing. Utilizing the Segal-Bargmann representation of the infinitedimensional Hilbert space, we demonstrate that the energy spectrum of the generalized quantum Rabi model, when both the Rabi coupling strength and the squeezing strength are not significantly large compared to the field mode frequency, can be analytically determined by a bi-confluent Fuchsian equation with two regular singularities at 0 and 1 and an irregular singularity of rank two at infinity. I. INTRODUCTION The quantum Rabi model is probably one of the simplest physical systems surpassing the quantum harmonic oscillator. It describes the interaction of a single two-level system and a single bosonic mode. Rabi’s original paper concerned the effect of a rapidly varying magnetic field on an oriented atom possessing nuclear spin [1, 2]. Over the last eighty years, it has become the cornerstone for theoretically explaining various physical systems, including cavity quantum electrodynamics (QED) [3, 4], superconducting circuits [5], mechanical oscillators [6], and photonic crystals [7], among others. Although the quantum Rabi model possesses a degree of freedom of two, which is smaller than that of a hydrogen atom, the energy spectrum of the infinite-dimensional state space has only been obtained through numerical diagonalization of the truncated finite-dimensional Hilbert space for an extended period. It was not until 2011 that Braak demonstrated that the exact solvability of the quantum Rabi model [8]. Braak’s approach is based on the Segal-Bargmann holomorphic representation of Hilbert space [9, 10]. In this representation, the state vector is expressed as an integral transform known as the Segal-Bargmann transform. The kernel of this transform is the inner product between a Gilmore-Perelomov coherent state [11, 12] and the state vector itself. In Braak’s original paper, the regular part of the spectrum is determined by the zeros of a transcendental G-function associated with the Hamiltonian. This G-function serves as a generalized spectral determinant with only zeros on the real axis, comprising all regular subsets of the discrete eigenvalues. Following Braak’s groundbreaking work, it was further recognized that the holomorphic function in Segal-Bargmann space, satisfying the square-integrability condition, is governed by the confluent Heun equation [13]. This equation, featuring two regular singularities at 0 and 1 and an irregular singularity at infinity, represents the confluent form of the ∗ Email: dubussygauss@gmail.com † Email: yangbrookchen@yahoo.co.uk general Heun equation [14]. The latter includes four regular singularities in the extended complex plane, representing the simplest differential equation that cannot be solved by conventional special functions. The quantization condition is determined by gluing the local holomorphic Heun functions near each regular singularity into a global entire function on the complex plane. The regular spectrum of the quantum Rabi model is determined by a transcendental entire function constructed by the Wronskian of the local Heun functions. The exceptional eigenvalues in the energy spectrum, called Judd points [15], are determined by the condition that the confluent Heun function is truncated into the confluent Heun polynomial, which is regular at all singularities on whole complex plane. In this regard, it is no wonder that the exact solution of the quantum Rabi model has not been discovered for many decades. All previously solvable models, such as the quantum harmonic oscillator, the hydrogen atom, and the symmetric top, incorporate the hypergeometric function and its confluent form [16]. These functions are simpler than Heun functions in the sense that they have at most three regular singularities in the extended complex plane. Besides, the coefficients of the local Heun series are determined by a three-term recursion relation, in contrast to the conventional two-term recursion relation found in all hypergeometric series [14]. The versatility of Heun functions in solving complicated differential equations makes them a valuable tool in theoretical physics. In recent years, Heun functions and their confluent forms have found numerous applications, including solving the time-dependent quantum two-state problem [17– 20], describing the quantum Ising chain in a periodic transverse magnetic field [22], analyzing two-dimensional massless Dirac fermions in spatially inhomogeneous fields [22], and addressing non-Hermitian physics in optical waveguides [23, 24], among others. In this study, we investigate the energy spectrum of a generalized quantum Rabi model, where the bosonic mode experiences squeezing. This model can be employed to describe the interaction of a two-level atom with squeezed light [25], or characterize a quantum dot in a squeezed cavity field [26]. Here, squeezed states refer to a class of nonclassical" 2401.05626v1,"A Composable Dynamic Sparse Dataflow Architecture for Efficient Event-based Vision Processing on FPGA Yizhao Gao Baoheng Zhang yzgao@eee.hku.hk University of Hong Kong Hong Kong bhzhang@eee.hku.hk University of Hong Kong Hong Kong Yuhao Ding Hayden Kwok-Hay So yhding@eee.hku.hk University of Hong Kong Hong Kong hso@eee.hku.hk University of Hong Kong Hong Kong ABSTRACT CCS CONCEPTS Event-based vision represents a paradigm shift in how vision information is captured and processed. By only responding to dynamic intensity changes in the scene, event-based sensing produces far less data than conventional frame-based cameras, promising to springboard a new generation of high-speed, low-power machines for edge intelligence. However, processing such dynamically sparse input originated from event cameras efficiently in real time, particularly with complex deep neural networks (DNN), remains a formidable challenge. Existing solutions that employ GPUs and other frame-based DNN accelerators often struggle to efficiently process the dynamically sparse event data, missing the opportunities to improve processing efficiency with sparse data. To address this, we propose ESDA, a composable dynamic sparse dataflow architecture that allows customized DNN accelerators to be constructed rapidly on FPGAs for event-based vision tasks. ESDA is a modular system that is composed of a set of parametrizable modules for each network layer type. These modules share a uniform sparse token-feature interface and can be connected easily to compose an all-on-chip dataflow accelerator on FPGA for each network model. To fully exploit the intrinsic sparsity in event data, ESDA incorporates the use of submanifold sparse convolutions that largely enhance the activation sparsity throughout the layers while simplifying hardware implementation. Finally, a network architecture and hardware implementation co-optimizing framework that allows tradeoffs between accuracy and performance is also presented. Experimental results demonstrate that when compared with existing GPU and hardware-accelerated solutions, ESDA achieves substantial speedup and improvement in energy efficiency across different applications, and it allows much wider design space for real-world deployments. • Computer systems organization → Reconfigurable computing; Neural networks; Data flow architectures; • Computing methodologies → Object recognition. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). FPGA ’24, March 3–5, 2024, Monterey, CA, USA © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0418-5/24/03. https://doi.org/10.1145/3626202.3637558 KEYWORDS event-based vision, event camera, sparse DNN accelerator, submanifold sparse convolution, dataflow accelerator, FPGA ACM Reference Format: Yizhao Gao, Baoheng Zhang, Yuhao Ding, and Hayden Kwok-Hay So. 2024. A Composable Dynamic Sparse Dataflow Architecture for Efficient Eventbased Vision Processing on FPGA. In Proceedings of the 2024 ACM/SIGDA International Symposium on Field Programmable Gate Arrays (FPGA ’24), March 3–5, 2024, Monterey, CA, USA. ACM, New York, NY, USA, 12 pages. https://doi.org/10.1145/3626202.3637558 1 INTRODUCTION Event-based vision systems are bio-inspired systems that represent a paradigm shift from conventional frame-based vision systems [16]. Instead of capturing the entire field of view as dense matrices of pixel values like in a conventional camera, an event camera only produces a spiking event when a substantial change in light intensity local to each pixel is detected. Despite the fundamentally different way of sensing, substantial progress has been made in recent years to perform a wide range of vision tasks such as object classification, object detection, and tracking utilizing deep neural network models [49]. However, deploying event-based vision systems with deep learning models in near-sensor or edge-computing contexts remains a great challenge. On the one hand, off-the-shelf GPU platforms and dense DNN accelerators that are optimized to operate on dense input from conventional cameras can rarely exploit the sparsity in event-based inputs. As a result, if blindly employed to accelerate event camera output, these systems struggle to deliver the promised energy efficiency and performance benefits due to a large amount of wasted computation. On the other hand, some sparse DNN accelerators have previously been proposed to address the need for event vision processing [1, 31]. Yet, these designs primarily concentrate on optimizing sparse computation at the matrix multiplication or single layer level, often through a reusable processing engine for various layers. Such an approach may lead to considerable latency and energy overhead, mainly due to the recurrent" 2401.05632v1,"1 Natural Language Processing for Dialects of a Language: A Survey ADITYA JOSHI, University of New South Wales, Australia RAJ DABRE, National Institute of Information and Communications Technology, Japan DIPTESH KANOJIA, Institute for People-Centred AI, University of Surrey, United Kingdom ZHUANG LI, Monash University, Australia HAOLAN ZHAN, Monash University, Australia GHOLAMREZA HAFFARI, Monash University, Australia DORIS DIPPOLD, University of Surrey, United Kingdom State-of-the-art natural language processing (NLP) models are trained on massive training corpora, and report a superlative performance on evaluation datasets. This survey delves into an important attribute of these datasets: the dialect of a language. Motivated by the performance degradation of NLP models for dialectic datasets and its implications for the equity of language technologies, we survey past research in NLP for dialects in terms of datasets, and approaches. We describe a wide range of NLP tasks in terms of two categories: natural language understanding (NLU) (for tasks such as dialect classification, sentiment analysis, parsing, and NLU benchmarks) and natural language generation (NLG) (for summarisation, machine translation, and dialogue systems). The survey is also broad in its coverage of languages which include English, Arabic, German among others. We observe that past work in NLP concerning dialects goes deeper than mere dialect classification, and . This includes early approaches that used sentence transduction that lead to the recent approaches that integrate hypernetworks into LoRA. We expect that this survey will be useful to NLP researchers interested in building equitable language technologies by rethinking LLM benchmarks and model architectures. CCS Concepts: • Computing methodologies → Natural language processing. Additional Key Words and Phrases: NLP, dialects, natural language processing, linguistic diversity, large language models, inclusion ACM Reference Format: Aditya Joshi, Raj Dabre, Diptesh Kanojia, Zhuang Li, Haolan Zhan, Gholamreza Haffari, and Doris Dippold. xxxx. Natural Language Processing for Dialects of a Language: A Survey. J. ACM 1, 1, Article 1 (January xxxx), 33 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Natural language processing (NLP) is an area of artificial intelligence that deals with the processing of text. NLP tasks are broadly viewed as two categories: natural language understanding (NLU) and natural language generation (NLG). The former covers tasks such as sentiment analysis, where the Authors’ addresses: Aditya Joshi, aditya.joshi@unsw.edu.au, University of New South Wales, Sydney, Australia, 2052; Raj Dabre, raj.dabre@nict.go.jp, National Institute of Information and Communications Technology, Kyoto, Japan; Diptesh Kanojia, d.kanojia@surrey.ac.uk, Institute for People-Centred AI, University of Surrey, Guildford, United Kingdom; Zhuang Li, zhuang.li1@monash.edu, Monash University, Melbourne, Australia; Haolan Zhan, haolan.zhan@monash.edu, Monash University, Melbourne, Australia; Gholamreza Haffari, Gholamreza.Haffari@monash.edu, Monash University, Melbourne, Australia; Doris Dippold, d.dippold@surrey.ac.uk, University of Surrey, Guildford, United Kingdom. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Association for Computing Machinery. 0004-5411/xxxx/1-ART1 $15.00 https://doi.org/XXXXXXX.XXXXXXX J. ACM, Vol. 1, No. 1, Article 1. Publication date: January xxxx." 2401.05634v1,"Images of hairy Reissner-Nordström black hole illuminated by static accretions Yuan Meng, 1, ∗ Xiao-Mei Kuang, 1, † Xi-Jing Wang, 1, ‡ Bin Wang, 1, 2, § and Jian-Pin Wu 1, ¶ 1 Center for Gravitation and Cosmology, College of Physical Science and Technology, Yangzhou University, Yangzhou, 225009, China 2 Shanghai Frontier Science Center for Gravitational Wave Detection, Shanghai Jiao Tong University, Shanghai 200240, China (Dated: January 12, 2024) In this paper, we investigate the shadow and optical appearance of the hairy Reissner-Nordström (RN) black hole illuminated by two toy models of static accretion. The hairy RN black hole describes the deformation of a Schwarzschild black hole due to the inclusion of additional arbitrary source (scalar field, tensor field, fluidlike dark matter, etc.), which is characterized by the parameters: mass (M ), deformation factor (α), electric charge (Q) and the additional hairy charge (l o ). We find that for the hairy RN black hole, the event horizon, radius of photon sphere and critical impact parameter all increase as the increasings of Q and l o , but decrease as α grows. Furthermore, the three characterized parameters are found to have significant effects on the photon trajectories, and shadows as well as images of the hairy RN black hole surrounded by the static accretion disk and spherical accretion, respectively. In particular, both Q and l o have mutually reinforcing effects on the optical appearance and shadows of the hairy RN black hole, which implies that we may not distinguish the electric charge and hairy charge from the shadow and image of black hole in this scenario. Additionally, because of the competing effects of the charge parameters (Q, l o ) and the deviation parameter α on the observed intensities of brightness, the optical appearance between the hairy RN black hole and RN black hole could have degeneracies, indicating the indistinguishability. Contents I. Introduction 2 II. Photons sphere of the hairy RN black hole 3 III. Images of hairy RN black hole illuminated by thin accretions disk A. Classification of the light rays B. Observed intensities and optical appearances 5 5 7 IV. Images of hairy RN black hole illuminated by static spherical accretions 9 V. Conclusion and discussion 11 Acknowledgments A. Brief derivation of the hairy RN black hole via GD approach ∗ Electronic address: mengyuanphy@163.com † Electronic address: xmeikuang@yzu.edu.cn (corresponding author) ‡ Electronic address: xijingwang@yzu.edu.cn § Electronic address: wang b@sjtu.edu.cn ¶ Electronic address: jianpinwu@yzu.edu.cn 12 12" 2401.05642v1,"Optimistic Prediction of Synchronization-Reversal Data Races Zheng Shi Umang Mathur Andreas Pavlogiannis National University of Singapore Singapore, Singapore shizheng@u.nus.edu National University of Singapore Singapore, Singapore umathur@comp.nus.edu.sg Aarhus University Aarhus, Denmark pavlogiannis@cs.au.dk ABSTRACT Dynamic data race detection has emerged as a key technique for ensuring reliability of concurrent software in practice. However, dynamic approaches can often miss data races owing to nondeterminism in the thread scheduler. Predictive race detection techniques cater to this shortcoming by inferring alternate executions that may expose data races without re-executing the underlying program. More formally, the dynamic data race prediction problem asks, given a trace 𝜎 of an execution of a concurrent program, can 𝜎 be correctly reordered to expose a data race? Existing state-of-the art techniques for data race prediction either do not scale to executions arising from real world concurrent software, or only expose a limited class of data races, such as those that can be exposed without reversing the order of synchronization operations. In general, exposing data races by reasoning about synchronization reversals is an intractable problem. In this work, we identify a class of data races, called Optimistic Sync(hronization)-Reversal races that can be detected in a tractable manner and often include non-trivial data races that cannot be exposed by prior tractable techniques. We also propose a sound algorithm OSR for detecting all optimistic sync-reversal data races in overall quadratic time, and show that the algorithm is optimal by establishing a matching lower bound. Our experiments demonstrate the effectiveness of OSR— on our extensive suite of benchmarks, OSR reports the largest number of data races, and scales well to large execution traces. ACM Reference Format: Zheng Shi, Umang Mathur, and Andreas Pavlogiannis. 2024. Optimistic Prediction of Synchronization-Reversal Data Races. In Proceedings of International Conference on Software Engineering (ICSE ’24). ACM, New York, NY, USA, 28 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Concurrency bugs such as data races and deadlocks often escape in-house testing and manifest only in production [19, 59], making the development of reliable concurrent software a challenging task. Automated data race detection has emerged as a first line of defense against undesired behaviors caused by data races, has been actively studied over multiple decades, and is also the subject of this paper. In particular, our focus is on dynamic analyses, which, unlike static Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE ’24, April 12–21, 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn 𝑡 1 1 2 3 4 5 6 7 8 9 10 11 12 𝑡 2 𝑡 3 𝑡 4 𝑤 (𝑥) w(𝑦) acq(ℓ) w(𝑧 1 ) r(𝑦) rel(ℓ) acq(ℓ) w(𝑧 2 ) rel(ℓ) r(𝑧 1 ) r(𝑧 2 ) 𝑤 (𝑥) (a) Trace 𝜎 1 𝑡 1 1 2 3 4 5 6 7 8 9 10 11 12 𝑡 2 𝑡 3 𝑡 4 acq(ℓ) w(𝑧 2 ) rel(ℓ) acq(ℓ) w(𝑧 1 ) r(𝑧 1 ) r(𝑧 2 ) 𝑤 (𝑥) 𝑤 (𝑥) w(𝑦) r(𝑦) rel(ℓ) (b) Reordering 𝜌 1 Figure 1: The two conflicting events 𝑒 1 = ⟨𝑡 1 , w(𝑥)⟩ and 𝑒 12 = ⟨𝑡 4 , w(𝑥)⟩ is a predictable data race of 𝜎 1 which is also an optimistic sync-reversal race, witnessed by the correct reordering 𝜌 1 that reverses critical sections. techniques, are the preferred class of techniques for detecting data races for industrial scale software applications [59]. A dynamic data race detector observes an execution of a concurrent program 𝑃 and infers the presence of a data race by analysing the trace of the observed execution. A key challenge in the design of such a technique is sensitivity to non-deterministic thread schedules — even for a fixed program input, a data race may be observed under a very specific thread schedule, but not under other thread schedules. This means that a simplistic race detector that, say, only checks for two conflicting events appearing simultaneously in the execution trace, is likely going to miss many bugs. This is where predictive analysis techniques shine — instead of looking for bugs only in the execution that was observed, they additionally also detect bugs in executions that, while not explicitly observed during testing, can nevertheless be inferred from the observed execution, without rerunning the underlying program 𝑃 [31, 34, 45, 57, 60, 65]. Predictive techniques identify the space of executions or reorderings that can provably be inferred from a given observed execution 𝜎, and then look for a reordering 𝜌 in this space, that can serve as a witness to a bug such as a data race. Consider the execution 𝜎 1 in Figure 1a consisting of events 𝑒 1 , 𝑒 2 , . . . , 𝑒 12 where 𝑒 𝑖 denotes the 𝑖 th event from the top. The two write events on variable 𝑥, 𝑒 1 and 𝑒 12 , are far apart and not witnessed as a data race in 𝜎 1 . However, the correct reordering 𝜌 1 of 𝜎 1 , in which the two write events appear consecutively, shows that it is nevertheless, a predictable data race of 𝜎 1 . Indeed any program 𝑃 that generates 𝜎 1 will also generate 𝜌 1 albeit with a different thread interleaving. In general, sound (no false positives) and complete (no false negatives) data race prediction is known to be an intractable problem [44]. Soundness is a key desired property, since false positives need to be otherwise vetted manually, a task which is particularly challenging in the case of concurrent programs. Consequently," 2401.05643v1,"MNRAS 000, 1–9 (2023) Preprint 12 January 2024 Compiled using MNRAS L A TEX style file v3.0 Shock-driven synchrotron radio emission from the 2021 outburst of RS Ophiuchi Nayana A.J., 1,2★ G.C. Anupama, 2 Nirupam Roy 3 Dipankar P. K. Banerjee 4 Kulinder Pal Singh 5 Sonith L.S., 2 and U. S. Kamath 2 1 Department of Astronomy, University of California, Berkeley, CA 94720-3411, USA. 2 Indian Institute of Astrophysics, II Block, Koramangala, Bangalore 560034, India. 3 Department of Physics, Indian Institute of Science, Bangalore 560012, India. 4 Astronomy & Astrophysics Division, Physical Research Laboratory, Ahmedabad 380009, India. 5 Department of Physical Sciences, IISER Mohali, Knowledge City, Sector 81, Manauli PO, SAS Nagar, Punjab 140306, India. Accepted XXX. Received YYY; in original form ZZZ ABSTRACT We present low-frequency radio observations of the Galactic symbiotic recurrent nova RS Ophiuchi during its 2021 outburst. The observations were carried out with the upgraded Giant Metrewave Radio Telescope (uGMRT) spanning a frequency range of 0.15−1.4 GHz during 23−287 days post the outburst. The average value of the optically thin spectral index is 𝛼 ∼ −0.4 (𝐹 𝜈 ∝ 𝜈 𝛼 ), indicating a non-thermal origin of the radio emission at the observed frequencies. The radio light curves are best represented by shock-driven synchrotron emission, initially absorbed by a clumpy ionized circumbinary medium. We estimate the mass-loss rate of the red giant companion star to be 𝑀 ¤ ∼ 7.5 × 10 −8 𝑀 ⊙ yr −1 for an assumed stellar wind velocity of 20 km/s. The 0.15–1.4 GHz radio light curves of the 2021 outburst are systematically brighter than those of the 2006 outburst. Considering similar shock properties between the two outbursts, this is indicative of a relatively higher particle number density in the synchrotron emitting plasma in the current outburst. Key words: Nova: general — Nova: RS Ophiuchi — radiation mechanisms: non-thermal — radio continuum: general 1 INTRODUCTION RS Ophiuchi is a Galactic symbiotic recurrent nova system composed of a primary white dwarf that accretes matter from its red giant companion. The nova has undergone seven reported outbursts, at somewhat irregular intervals, in the years 1898, 1933, 1958, 1967, 1985, 2006, and 2021 (Schaefer 2010, and references therein). The 2021 outburst was discovered on 2021 August 08.93 (UT) in the optical bands 1 . The nova brightened to a visual magnitude of 4 mag, which is ∼ 1000 times brighter than its quiescent magnitude. Subsequently, the nova showed luminous emission over a wide range of frequencies from radio to the Very High Energy (VHE) 𝛾-rays. 𝛾-ray emission was detected with Fermi-LAT (Cheung et al. 2022; Zheng et al. 2022), H.E.S.S (H. E. S. S. Collaboration et al. 2022), and MAGIC (Acciari et al. 2022) telescopes in the GeV-TeV energy regime, marking the first detection of VHE emission from a nova. The GeV to TeV emission has been interpreted under either a hadronic (H. E. S. S. Collaboration et al. 2022; Acciari et al. 2022; Zheng et al. 2022; Diesing et al. 2023) or a lepto-hadronic (De Sarkar et al. 2023) particle acceleration scenario. The evolution of the hard X-ray emission, arising from shock interaction between the nova ejecta and the red giant wind, was found to be similar to the 2006 outburst (Page et al. 2022). On the other hand, the evolution in the soft X-ray, during the super soft state (SSS), was found to be ★ E-mail: nayana.aj@iiap.res.in 1 http://ooruri.kusastro.kyoto-u.ac.jp/mailarchive/vsnet-alert/26131 © 2023 The Authors fainter compared to the 2006 outburst (Page et al. 2022). High resolution X-ray spectra observed during 𝑡 ∼ 18 − 21 days with Chandra and XMM Newton (Orio et al. 2022) indicated the presence of multiple thermal components over a range of temperatures 𝑇 = 0.07 − 3.4 keV. Ness et al. (2023) analyzed the X-ray grating spectra of both the 2006 and 2021 outbursts and concluded the low SSS emission in 2021 to be due to higher absorption in the line of sight compared to that of 2006. The early optical spectrum of the 2021 outburst showed emission lines of full width at half maximum ∼ 2900 km s −1 (Munari & Valisa 2021b). The ejecta accelerated to velocities ∼ 4700 km s −1 (Mikolajewska et al. 2021) in the first two days followed by decreasing line velocities indicating deceleration (Pandey et al. 2022). The optical photometric and spectroscopic evolution of the 2021 outburst presented by Munari & Valisa (2021a, 2022) indicate it to be very similar to that of previous outbursts. The morphokinematic modeling of H 𝛼 emission lines suggested a bipolar ejecta geometry (Pandey et al. 2022) similar to that seen during the 2006 outburst (Rupen et al. 2008). Radio emission was detected from RS Ophiuchi from ∼ 1 day postoutburst at multiple frequencies (0.15 − 35 GHz) (Williams et al. 2021; Sokolovsky et al. 2021; Nayana et al. 2021; de Ruiter et al. 2023). Munari et al. (2022) presented the European Very Large Baseline Interferometry Network (EVN) observations of RS Oph at 5 GHz and reported the total extension of the radio-emitting region to be ∼ 90 mas at 𝑡 ∼ 34 days. Radio emission from novae could be thermal free-free emission from hot ionized ejecta and/or non-thermal syn-" 2401.05651v1,"Exploring the Critical Points in QCD with Multi-Point Padé and Machine Learning Techniques in (2+1)-flavor QCD Jishnu Goswami 1,∗ , D. A. Clarke 2 , P. Dimopoulos 2 , F. Di Renzo 3 , C. Schmidt 4 , S. Singh 4 , and K. Zambello 5 1 RIKEN Center for Computational Science, Kobe 650-0047, Japan Department of Physics and Astronomy, University of Utah, Salt Lake City, Utah 84112, United States 3 Dipartimento di Scienze Matematiche, Fisiche e Informatiche, Università di Parma and INFN, Gruppo Collegato di Parma I-43100 Parma, Italy 4 Fakultät für Physik, Universität Bielefeld, D-33615 Bielefeld, Germany 5 Dipartimento di Fisica dell’Università di Pisa and INFN–Sezione di Pisa, Largo Pontecorvo 3, I-56127 Pisa, Italy. 2 Using simulations at multiple imaginary chemical potentials for (2 + 1)-flavor QCD, we construct multi-point Padé approximants. We determine the singularties of the Padé approximants and demonstrate that they are consistent with the expected universal scaling behaviour of the Lee-Yang edge singularities. We also use a machine learning model, Masked Autoregressive Density Estimator (MADE), to estimate the density of the Lee-Yang edge singularities at each temperature. This ML model allows us to interpolate between the temperatures. Finally, we extrapolate to the QCD critical point using an appropriate scaling ansatz. Abstract. 1 Introduction Our ability to predict thermodynamic observables and determine the QCD critical point at real values of chemical potentials is severely limited by the infamous sign problem. To address this issue, there are two common approaches: expanding the QCD partition function in a Taylor series with respect to the charge chemical potentials (µ B , µ Q , µ S ) [1, 2] or analytically continuing from imaginary chemical potentials [3, 4]. However, both methods have limitations, particularly for larger values of the baryon chemical potential. Recently, we proposed a multi-point Padé approach [5, 6]. In this proceeding, we will focus on the QCD critical point, which will emerge at a real value of the baryon chemical potential. We use the multi-point Padé approach to locate the Lee-Yang edge (LYE) singularities in the complex chemical potential plane, which are obtained from lattice QCD simulated data. The universal scaling of singularities in the vicinity of the QCD critical endpoint is also investigated. LYEs associated with the QCD critical point at real chemical potential for various temperatures are calculated. As the temperature decreases, the imaginary part of the singularities becomes smaller, hinting at the possible existence of a critical point at low temperature. A machine learning technique is used to model the probability density of the singularities and interpolate the real and imaginary parts of the ∗ e-mail: jishnu.goswami@riken.jp" 2401.05659v1,"Noname manuscript No. (will be inserted by the editor) Engineering Adaptive Information Graphics for Disabled Communities: A Case Study with Public Space Indoor Maps Anuradha Madugalla · Yutan Huang · John Grundy · Min Hee Cho · Lasith Koswatta Gamage · · Tristan Leao · Sam Thiele Received: date / Accepted: date Abstract Most software applications contain graphics such as charts, diagrams and maps. Currently, these graphics are designed with a “one size fits all"" approach and do not cater to the needs of people with disabilities. Therefore, when using software with graphics, a colour-impaired user may struggle to interpret graphics with certain colours, and a person with dyslexia may struggle to read the text labels in the graphic. Our research addresses this issue by developing a framework that generates adaptive and accessible infor- A. Madugalla Dept. of Software Systems and Cybersecurity, Monash University, Melbourne, Australia E-mail: anu.madugalla@monash.edu Y. Huang Dept. of Software Systems and Cybersecurity, Monash University, Melbourne, Australia E-mail: yutan.huang@monash.edu J. Grundy Dept. of Software Systems and Cybersecurity, Monash University, Melbourne, Australia E-mail: john.grundy@monash.edu M.H. Cho Dept. of Software Systems and Cybersecurity, Monash University, Melbourne, Australia E-mail: minhee.c.j@gmail.com L.K. Gamage Dept. of Software Systems and Cybersecurity, Monash University, Melbourne, Australia E-mail: lasithvindu1@gmail.com Y.P. Lau Dept. of Software Systems and Cybersecurity, Monash University, Melbourne, Australia E-mail: desmondyplau@gmail.com T. Leao Dept. of Software Systems and Cybersecurity, Monash University, Melbourne, Australia E-mail: tlea0003@student.monash.edu S. Thiele Dept. of Software Systems and Cybersecurity, Monash University, Melbourne, Australia E-mail: sthi0002@student.monash.edu" 2401.05665v1,"Augmented Reality User Interface for Command, Control, and Supervision of Large Multi-Agent Teams Frank Regal, Chris Suarez, Fabian Parra, Mitch Pryor I. OVERVIEW Multi-agent human-robot teaming allows for the potential to gather information about various environments more efficiently by exploiting and combining the strengths of humans and robots. In industries like defense, search and rescue, firstresponse, and others alike, heterogeneous human-robot teams show promise to accelerate data collection and improve team safety by removing humans from unknown and potentially hazardous situations. In recent work, we developed AugRE [1], an Augmented Reality (AR) based scalable human-robot teaming framework that enables users to localize and communicate with 50+ autonomous agents. Built as a framework to enable large multi-agent human-robot teaming, studies focused on analyzing the framework’s scalability and practicality with limited user interface supervision modalities and no command and control functionalities via the Microsoft HoloLens 2 AR Head Mounted Display (HMD). Through ongoing demonstrations and frequent human-robot teaming tests with AugRE in outdoor urban environments, unexpected events would often transpire, and an autonomous agent would need a manual intervention to redirect or redefine navigation goals to continue to make progress toward the mission goal. It became apparent that users need the ability to supervise, command, and control these agents via the AR headset. This work also exposed the need for users to have the ability to interact with both close line-of-sight (LOS) and remote non-line-of-sight (NLOS) autonomous agents. Therefore, this work takes the AugRE framework and builds upon it with various AR-based command, control, and supervision modalities. Through our efforts, users are able to interact with large autonomous agent teams without the need to modify the environment prior and without requiring users to use typical hardware (i.e. joysticks, keyboards, laptops, tablets, etc.) in the field. The demonstrated work shows early indications that combining these AR-HMD-based user interaction modalities for command, control, and supervision will help improve human-robot team collaboration, robustness, and trust. Fig. 1. [A] Top-down map view of HoloLens 2 and robotic agent locations. [B] Joystick teleoperation control with FPV robot view for NLOS operation. [C] Autonomous agent navigating to virtual waypoint provided by AR-HMD user. [D] AR-HMD user viewing an agent’s navigation path. II. BACKGROUND AR-HMDs, equipped with onboard compute, vision, depth, and IR sensors, can localize within unstructured environments, track body motion, and offer users digital displays that superimpose virtual information on the physical world. These built-in capabilities make AR-HMDs a practical and efficient solution for connecting and localizing non-expert robotic operators with robotic agents while maintaining portability and situational awareness of the physical world. AR-HMDs additionally provide users with a simple-to-use gesture-based interface, enhancing the practicality of these devices as users can keep their hands free in the field. AR- HMD devices, paired with robotic systems, have proved to enhance user situational awareness of robotic system intentions [2]. Additionally, many studies have used AR-HMDs to enable users to command and control unmanned aerial vehicles (UAVs) [3], [4], unmanned ground vehicles (UGVs) [5], [6], and manipulators [7], [8]. Most research though has focused on the command, control, and supervision of a single robotic platform in controlled environments. In previous work, we presented Augmented Robot Environment (AugRE) [1]. This AR-based framework uses Azure Spatial Anchors (ASAs) [9] and Robotfleet [10] to localize and enable bi-lateral communication between humans and teams of robots. The work is limited in user interface design and only allows users to simply view and interact with LOS autonomous agents and receive notifications from those agents. This work presents an AR-based user interface specifically designed for autonomous agent command, control, and supervision in multi-agent human-robot teams. Demonstrated on hardware 1 in a realistic urban environment, our AR in- All authors are with the Nuclear and Applied Robotics Group (NRG) at The University of Texas at Austin. Austin, TX, 78712, USA. {fregal, mpryor}@utexas.edu 1 Demonstration Video: https://utnuclearroboticspublic. github.io/Augmented-Robot-Environment" 2401.05671v1,"RESEARCH ARTICLE Deciphering Interphase Instability of Lithium Metal Batteries with Localized High-Concentration Electrolytes at Elevated Temperatures Tao Meng, Shanshan Yang, Yitong Peng, Xiwei Lan, Pingan Li, Kangjia Hu, and Xianluo Hu* [*] T. Meng, S. S. Yang, Y. T. Peng, X. W. Lan, P. A. Li, K. J. Hu, Prof. X. L. Hu State Key Laboratory of Materials Processing and Die & Mould Technology School of Materials Science and Engineering Huazhong University of Science and Technology Wuhan 430074, China E-mail: huxl@mail.hust.edu.cn (X. L. Hu) LHCEs comprise a conductive salt, a solvating (or ionizing) solvent, and a non-solvating (or non-ionizing) diluent. [7] While they retain the solvation structure of HCEs, LHCEs optimize viscosity and wettability, [8] making them among the most advanced electrolytes for NCM811||Li batteries. [9] Nevertheless, the performance of LHCEs at elevated temperatures remains understudied. Thermodynamically, increased temperatures elevate electron energy levels in both the cathode and anode, altering and narrowing the gap between the highest occupied molecular orbit (HOMO) and the lowest unoccupied molecular orbit (LUMO) of electrolytes. This undermines the stability of both the SEI (solid electrolyte interphase) and CEI (cathode electrolyte interphase). Thus, the electrolytes workable at ambient temperatures might falter at elevated temperatures. [10] Practically, broadening the operational temperature range of electrolytes offers advantages in LMBs for varied and extreme environments, such as electric vehicles, space missions, and energy storage systems. [11] Additionally, higher temperatures can initiate parasitic reactions in LMBs, such as SEI/CEI degradation and electrolyte decomposition, leading to significant heat production and potential thermal runaway. [12] Therefore, expanding the operating temperature of electrolytes may not only enhance the tolerance of LMBs to thermal shocks but also boost their safety. [13] Hence, the workable temperature range of electrolytes has recently attracted much attention, which is a crucial normative for assessing their practicality in LMBs, especially at elevated temperatures. [14] Recently, several strategies for regulating the solvation structure of LHCEs have been reported to suppress the electrodeelectrolyte interactions at elevated temperatures. For example, tuning the terminal alkyl chain of ethers in LHCEs could promote the generation of anion-derived SEI/CEI species. [15] Fluorinated solvents (e.g., methyl difluoroacetate) are also beneficial to broaden the operating temperature for their wider electrochemical stability window, and enhance thermal stability. [14b,16] Nevertheless, their performance in NCM811||Li batteries is unsatisfactory. These challenges arise from the need to simultaneously address the thermodynamic interface instability against the Li anode and the NCM811 cathode. [17] Moreover, previous research usually relies on a trial-and-error method due to the lack of profound understanding of the intrinsic design principle. It is essential to elucidate the correlation between Abstract: Lithium metal batteries (LMBs), when coupled with a localized high-concentration electrolyte and a high-voltage nickel-rich cathode, offer a solution to the increasing demand for high energy density and long cycle life. However, the aggressive electrode chemistry poses safety risks to LMBs at higher temperatures and cutoff voltages. Here, we decipher the interphase instability in LHCE- based LMBs with a Ni 0.8 Co 0.1 Mn 0.1 O 2 cathode at elevated temperatures. Our findings reveal that the generation of fluorine radicals in the electrolyte induces the solvent decomposition and consequent chain reactions, thereby reconstructing the cathode electrolyte interphase (CEI) and degrading battery cyclability. As further evidenced, introducing an acid scavenger of dimethoxydimethylsilane (DODSi) significantly boosts CEI stability with suppressed microcracking. A Ni 0.8 Co 0.1 Mn 0.1 O 2 ||Li cell with this DODSi-functionalized LHCE achieves an unprecedented capacity retention of 93.0% after 100 cycles at 80 °C. This research provides insights into electrolyte engineering for practical LMBs with high safety under extreme temperatures. Introduction With the increasing demand for energy storage, lithium-ion batteries (LIBs) no longer meet the practical needs for their comparatively low energy density (< 300 Wh kg −1 ). [1] Lithium metal, recognized for its remarkable specific capacity (3860 mAh g −1 ) and low potential (−3.04 V), is pivotal in the forthcoming highenergy-density battery systems. [2] To optimize the energy density of lithium metal batteries (LMBs), the best strategy is to couple the Li metal anode with a high-specific energy cathode. When combined with nickel (Ni)-rich cathodes, like LiNi 0.8 Co 0.1 Mn 0.1 O 2 (NCM811), the energy density of LMBs is expected to 500 Wh kg −1 . [3] Ether-based solvents are highly compatible with Li metal owing to their outstanding reduction stability, yet they are limited by poor oxidation potential (< 4.0 V vs. Li + /Li). [4] Employing highconcentration electrolytes (HCEs) [5] and localized highconcentration electrolytes (LHCEs) [6] has not only improved the reversibility of Li metal anodes but also expanded the operational voltage range of ether-based solvents. This advancement will bring the practical implementation of high-energy-density LMBs. 1" 2401.05731v1,"On Gröbner-Shirshov bases for Markov semirings Xiaohui NIU 1 Wenxi LI †2 Zhongzhi WANG 3 ( School of Microelectronics and Data Science, AnHui University of Technology, Ma’anshan, 243002, China) Abstract: In order to investigate the relationship between Shannon information measure of random variables, scholars such as Yeung utilized information diagrams to explore the structured representation of information measures, establishing correspondences with sets. However, this method has limitations when studying information measures of five or more random variables. In this paper, we consider employing algebraic methods to study the relationship of information measures of random variables. By introducing a semiring generated by random variables, we establish correspondences between sets and elements of the semiring. Utilizing the Gröbner-Shirshov basis, we present the structure of the semiring and its standard form. Furthermore, we delve into the structure of the semiring generated under Markov chain conditions (referred to as Markov semiring), obtaining its standard form. Key words: Information measures, semiring, Gröbner-Shirshov bases, information diagram, Markov chain. Mathematics Subject Classification (2020): 16Y60, 16Z10, 94A15. 1. Introduction In order to find simplified solutions to difficult problems in information theory, Hu[5] initially studied the set-theoretic structure of Shannon information measures. It was shown in his paper that every information identity implies a set identity via a substitution of symbols, and the corresponding relationship between set theory and Shannon information measures was also established. Throughout many years, the use of Venn diagrams to represent the structure of Shannon information measures for two or three random variables has been suggested by lots of authors, for instances, Reza [9], Abramson [1]and Papoulis [8]. Meanwhile, in 1991, the I-measure introduced by Yeung [12] is another way to explain it. Therefore, the rich computing tools and methods in set theory can be applied to information theory. By using this method, Yeung visualizes the relationship between Shannon information measures of four or less random variables with an information diagram. For information diagram, there are also applications in computer science and technology, physics, mechanics and engineering. In 2003, by using information diagram, Fry [3] presented a brief overview of the design process of systems theory and 1 E-mail address:nxiaohui0219@163.com 2 †Corresponding author’s E-mail address: wxli@ahut.edu.cn. 3 E-mail address: zhongzhiw@126.com. 1" 2401.05738v1,"LKCA: Large Kernel Convolutional Attention Chenghao Li 1 , Boheng Zeng 2 , Yi Lu 3,4 , Pengbo Shi 1 , Qingzi Chen 1 , Jirui Liu 1 , and Lingyun Zhu 1 1 Chongqing University of Technology, Chongqing, China University of Electronic Science and Technology of China, Chengdu, China 3 Capital Normal University, Beijing, China 4 University of Liverpool, Liverpool, United Kingdom m17692405449@gmail.com;zengboheng@std.uestc.edu.cn;2230501004@cnu.edu.cn; {shipengbo;chenqingzi;liujirui}@stu.cqut.edu.cn;zhulingyun@cqut.edu.cn 1 2 Abstract. We revisit the relationship between attention mechanisms and large kernel ConvNets in visual transformers and propose a new spatial attention named Large Kernel Convolutional Attention (LKCA). It simplifies the attention operation by replacing it with a single large kernel convolution. LKCA combines the advantages of convolutional neural networks and visual transformers, possessing a large receptive field, locality, and parameter sharing. We explained the superiority of LKCA from both convolution and attention perspectives, providing equivalent code implementations for each view. Experiments confirm that LKCA implemented from both the convolutional and attention perspectives exhibit equivalent performance. We extensively experimented with the LKCA variant of ViT in both classification and segmentation tasks. The experiments demonstrated that LKCA exhibits competitive performance in visual tasks. Our code will be made publicly available at https://github.com/CatworldLee/LKCA. Keywords: ConvNet, Vision Transformer, Large Kernel CNN, Attention Mechanism Introduction Convolutional Neural Networks (CNNs) [1,2] have been a common choice for visual encoders in modern visual models. However, the emergence of Vision Transformers (ViTs) [3] has expanded the options for the backbone network of models. ViTs have demonstrated excellent performance in various visual tasks [4,5,6,7]. CNN and ViT each possess unique advantages. CNN is fundamentally translation equivariance and shifting window invariance [8], providing robustness to subtle changes in object positions and orientations in images, leading to significant success in various computer vision tasks. In contrast, ViT effectively captures global context information through its self-attention mechanism [9], enabling the modeling of long-range dependencies [10] and contextual relationships [11]. Despite the significant progress made by CNN and ViT over the years," 2401.05773v1,"Enhanced Stability in Quantum Optimal Transport Pseudometrics: From Hartree to Vlasov–Poisson Mikaela Iacobelli ETH Zürich, Department of Mathematics, Rämistrasse 101, 8092 Zürich, Switzerland Laurent Lafleche Unité de Mathématiques pures et appliquées, École Normale Supérieure de Lyon, Lyon, France Abstract. In this paper we establish almost-optimal stability estimates in quantum optimal transport pseudometrics for the semiclassical limit of the Hartree dynamics to the Vlasov–Poisson equation, in the regime where the solutions have bounded densities. We combine Golse and Paul’s method from [Arch. Ration. Mech. Anal. 223:57–94, 2017], which uses a semiclassical version of the optimal transport distance and which was adapted to the case of the Coulomb and gravitational interactions by the second author in [J. Stat. Phys. 177:20–60, 2019], with a new approach developed by the first author in [Arch. Ration. Mech. Anal. 244:27–50, 2022] to quantitatively improve stability estimates in kinetic theory. 1. Introduction 1.1. General overview. In this article, we study the nonrelativistic quantum and classical equations that govern the dynamics of an infinite number of particles’ density in the mean field regime. These equations are known as the Vlasov equation and the Hartree equation, respectively. More precisely we aim to give an almost-optimal convergence rate, in the semiclassical limit, from the Hartree equation to the Vlasov– Poisson equation, in the so-called quantum optimal transport pseudometrics. E-mail addresses: mikaela.iacobelli@math.ethz.ch, laurent.lafleche@ens-lyon.fr. 2020 Mathematics Subject Classification. 81Q20 · 81S30 · 35Q83 · 35Q55 (82C10, 49Q22). Key words and phrases. Hartree equation, Vlasov–Poisson equation, semiclassical limit, quantum optimal transport." 2401.05775v1,"Classical and Quantum solutions in Scalar field cosmology via the Eisenhart lift and linearization Andronikos Paliathanasis 1, 2, ∗ 1 Institute of Systems Science, Durban University of Technology, PO Box 1334, Durban 4000, South Africa 2 Departamento de Matemáticas, Universidad Católica del Norte, Avda. Angamos 0610, Casilla 1280 Antofagasta, Chile (Dated: January 12, 2024) This study introduces a novel approach for solving the cosmological field equations within scalar field theory by employing the Eisenhart lift. The field equations are reformulated as a system of geodesic equations for the Eisenhart metric. In the case of an exponential potential, the Eisenhart metric is shown to be conformally flat. By applying basic geometric principles, a new set of dynamical variables is identified, allowing for the linearization of the field equations and the derivation of classical cosmological solutions. However, the quantization of the Eisenhart system reveals a distinct set of solutions for the wavefunction, particularly in the presence of symmetry breaking at the quantum level. PACS numbers: 98.80.-k, 95.35.+d, 95.36.+x I. INTRODUCTION Gravitational models with scalar fields play a crucial role in describing cosmological observations [1]. Specifically, scalar fields provide new degrees of freedom in the Einstein field equations, influencing the dynamics to reproduce the observed cosmological history [2–7]. Additionally, scalar fields attributes the new degrees of freedom provided by the modification of the Einstein-Hilbert Action with the introduction of new geometric invariants [8]. In the literature, numerous scalar field models have been proposed; for example, refer to ∗ Electronic address: anpaliat@phys.uoa.gr" 2401.05783v1,"What Else Would I Like? A User Simulator using Alternatives for Improved Evaluation of Fashion Conversational Recommendation Systems Maria Vlachou and Craig Macdonald University of Glasgow, Glasgow, UK m.vlachou.1@research.gla.ac.uk, craig.macdonald@glasgow.ac.uk Abstract. In Conversational Recommendation Systems (CRS), a user can provide feedback on recommended items at each interaction turn, leading the CRS towards more desirable recommendations. Currently, different types of CRS offer various possibilities for feedback, i.e., natural language feedback, or answering clarifying questions. In most cases, a user simulator is employed for training as well as evaluating the CRS. Such user simulators typically critique the current retrieved (items) based on knowledge of a single target item. Still, evaluating systems in offline settings with simulators suffers from problems, such as focusing entirely on a single target item (not addressing the exploratory nature of a recommender system), and exhibiting extreme patience (consistent feedback over a large number of turns). To overcome these limitations, we obtain extra judgements for a selection of alternative items in common CRS datasets, namely Shoes and Fashion IQ Dresses. Going further, we propose improved user simulators that allow simulated users not only to express their preferences about alternative items to their original target, but also to change their mind and level of patience. In our experiments using the relative image captioning CRS setting and different CRS models, we find that using the knowledge of alternatives by the simulator can have a considerable impact on the evaluation of existing CRS models, specifically that the existing single-target evaluation underestimates their effectiveness, and when simulated users are allowed to instead consider alternatives, the system can rapidly respond to more quickly satisfy the user. 1 Introduction In recent years, online shopping is becoming increasingly popular, leading to the development of e-shopping platforms such as Amazon, which help users with product search [65,64]. Due to the prevalence of online services and personal digital assistants [66], research in fashion recommendation is gaining ground. As a result, various approaches and related datasets have been proposed that focus mainly on image recommendation and retrieval [69,70,71,72]. The influence of fashion-related research in the recommender systems community is also" 2401.05785v1,"There and back again: bridging meso- and nanoscales to understand lipid vesicle patterning † Julie Cornet, a Nelly Coulonges, a,b Weria Pezeshkian, c Maël Penissat-Mahaut, b Siewert-Jan Marrink, d Nicolas Destainville, a,‡ Matthieu Chavent, b,e, § and Manoel Manghi, a,¶ We describe a complete methodology to bridge the scales between nanoscale Molecular Dynamics and (micrometer) mesoscale Monte Carlo simulations in lipid membranes and vesicles undergoing phase separation, in which curving molecular species are furthermore embedded. To go from the molecular to the mesoscale, we notably appeal to physical renormalization arguments enabling us to rigorously infer the mesoscale interaction parameters from its molecular counterpart. We also explain how to deal with the physical timescales at stake at the mesoscale. Simulating the so-obtained mesoscale system enables us to equilibrate the long wavelengths of the vesicles of interest, up to the vesicle size. Conversely, we then backmap from the meso- to the nano- scale, which enables us to equilibrate in turn the short wavelengths down to the molecular length-scales. By applying our approach to the specific situation of the patterning of a vesicle membrane, we show that macroscopic membranes can thus be equilibrated at all length-scales in achievable computational time offering an original strategy to address the fundamental challenge of time scale in simulations of large bio-membrane systems. 1 Introduction Physics of living systems is permanently confronted to the multiplicity of length- and time- scales of interest: from the nanoscopic molecular scale where events occur below the nano-second timescale, to the micrometric cellular scale where microseconds or seconds are at stake. Different physical and numerical techniques have been developed to study these different scales, which are either quantum or classical, with explicit or implicit water, including stochasticity or hydrodynamics. But bridging these scales is still a difficult task as methods employed at each scale may not use the same physical dynamics – e.g., Molecular Dynamics (MD) or Monte Carlo (MC) – nor the same integration scheme – e.g., Newtonian or Brownian dynamics. Thus even if recently multi-scale workflows are emerging 1–3 , this type of approaches a Laboratoire de Physique Théorique, Université de Toulouse, CNRS, UPS, France. Institut de Pharmacologie et Biologie Structurale, Université de Toulouse, CNRS, Université Toulouse III – Paul Sabatier, 31400, Toulouse, France. c Niels Bohr International Academy, Niels Bohr Institute, University of Copenhagen, Blegdamsvej 17, 2100 Copenhagen, Denmark. d Groningen Biomolecular Sciences and Biotechnology Institute, University of Groningen, Nijenborgh 7, 9747 AG Groningen, The Netherlands. e Laboratoire de Microbiologie et Génétique Moléculaires (LMGM), Centre de Biologie Intégrative (CBI), Université de Toulouse, CNRS, UPS, France. † Electronic Supplementary Information (ESI) available at end: supplementary text and 6 figures. ‡ E-mail: nicolas.destainville@univ-tlse3.fr § E-mail: matthieu.chavent@univ-tlse3.fr ¶ E-mail: manoel.manghi@univ-tlse3.fr b has been limited in term of spatial/timing range they can span 4 and they has been generally constrained to ""one spatial direction"" 5–7 , from the nanoscale to the meso/micro-scale or the other way around. Here, thanks to recent advances in the field 8,9 , we detail and rationalize a method to fully bridge, forward and backward, nano- and meso- scales in biomembranes (see Figure 1). We develop this approach in the specific context of lipidic biomembrane patterning. With the recent in vivo, in vitro, and in silico developments, it is now recognized that cell membrane components are not homogeneously distributed, but are organized into functional lipid and protein sub-micrometric domains 10–16 . These nanodomains are playing fundamental roles in cell biology, especially as they serve as platforms or micro-reactors for many biological functions such as infections (viral or bacterial), cell adhesion, transport of solutes, or signaling. Thus, deciphering the formation and evolution of these domains is essential to fully understand these fundamental biological processes. Among the mechanisms proposed for their formation, the role of spontaneous curvature induced by different membrane constituents, with specific shapes, is the focus of a particular attention 17 . For example, the glycosphingolipid GM1 has a bulky head comprised of four monosaccharides conferring to this lipid a globally conical shape 15,18 (see Figure 1-a). Present predominantly in the outer cell membrane 19,20 , this lipid can act as a membrane anchor for different toxins, bacteria and viruses 21,22 and play important roles in several neuronal processes and diseases, notably auto-immune ones 22,23 . Although knowledge about its lateral organization remains an active field of research 20 , the properties of GM1 are thought to be linked to its propensity to curve the membrane, ensuing from its conical shape 19,24,25 . To test this hypothesis on well-defined model systems, Giant Unilamellar Vesicles (GUVs) were used to better characterize in vitro the relationship between curvature generation and lipid domain formation 19,25–27 . Yet, fully linking microscopy visualization, with an intrinsically limited resolution, to nanoscale partitioning of the lipids, is still a challenge. On the one hand, MD simulations are the suitable tool to understand how GM1 perturbs the lipid membrane organization at the molecular scale, notably by curving the bilayer 29 , or by destabilizing lipid-lipid phase separation in multicomponent membranes 20 . On the other hand, describing the effect of phase separation combined with intrinsic curvature at vesicular or cellular scales makes the use of a much larger degree of coarse-graining inevitable. Here, we illustrate how to bridge the theoretical gap between Coarse-Grained Molecular Dynamics (CG-MD) simulations and mesoscale (Meso for short) Monte Carlo simulations 30,31 focusing on vesicular systems, as illustrated in Figure 1. Using physically relevant concepts, we first show which data to extract at the J our na l Na me, [ y ea r ] , [ vol . ] , 1" 2401.05808v1,"Tracking Consensus of Networked Random Nonlinear Multi-agent Systems with Intermittent Communications Ali Azarbahram Abstract—The paper proposes an intermittent communication mechanism for the tracking consensus of high-order nonlinear multi-agent systems (MASs) surrounded by random disturbances. Each collaborating agent is described by a class of high-order nonlinear uncertain strict-feedback dynamics which is disturbed by a wide stationary process representing the external noise. The resiliency level of this networked control system (NCS) to the failures of physical devices or unreliability of communication channels is analyzed by introducing a linear auxiliary trajectory of the system. More precisely, the unreliability of communication channels sometimes makes an agent incapable of sensing the local information or receiving it from neighboring nodes. Therefore, an intermittent communication scheme is proposed among the follower agents as a consequence of employing the linear auxiliary dynamics. The closed-loop networked system signals are proved to be noise-to-state practically stable in probability (NSpS-P). It has been justified that each agent follows the trajectory of the corresponding local auxiliary virtual system practically in probability. The simulation experiments finally quantify the effectiveness of our proposed approach in terms of providing a resilient performance against unreliability of communication channels and reaching the tracking consensus. Index Terms—networked control systems (NCSs), tracking consensus, intermittent communications over network, wide stationary process, multi-agent systems. I. Introduction HE cooperative control of multi-agent systems (MASs) has certainly been among the most referred topics in the field of systems engineering in the past decade [1]–[5]. The control of collaborative MASs is inevitably linked with the concept of networked control systems (NCSs) [6]–[9]. For instance, when a networked group of interconnected agents performs a specific mission, the resiliency of network to measurement failures in transmission channels is considered among the essential concerns that should be taken into account. Moreover, the realworld MASs are usually surrounded by environmental disturbances and the nature of these external forces is in fact random. The irrefutable presence of environmental disturbances has highlighted the significance of investigating and analyzing the stability of nonlinear MASs modeled by stochastic [10]–[13] or random [2], [14] differential equations. With this general overview of the multi-agent NCSs challenges, now we review some of the most important T Ali Azarbahram is with the Department of Mechanical and Process Engineering, Rheinland-Pfälzische Technische Universität Kaiserslautern-Landau, 67663 Kaiserslautern, Germany. Current contact via email address: ali.azarbahram@mv.uni-kl.de. technical considerations regarding the implementation of random networked MASs in more details. In real MAS applications, the induced disturbances by different factors certainly degrade the overall performance of system and in some cases cause instability and even system damage. In prior methods for controlling nonlinear MASs, time varying deterministic external disturbances are considered and compensated (see for instance, [15]). However, environmental disturbances contain stochastic components. The stability analysis and control of nonlinear MASs modeled by stochastic differential equations including standard Wiener process is widely studied in recent years [10], [13]. In theoretical approaches, white noise originated possess are favorable due to their convenience in analysis. However, such a process fails to fully model many realistic situations. Besides, a standard Wiener process is not strictly differentiable. Accordingly, colored noise processes have attracted much attention in recent years [14], [16]–[19]. Although the cooperative control of nonlinear MASs subject to colored noise disturbances is recently addressed in [18] and [19], agents sometimes cannot well sense the local information or receive it from neighboring nodes due to the failure of physical devices or unreliability of communication channels in real NCS implementations. Therefore, it is reasonable to assume that each agent can make the measurements only intermittently and the control system is supposed to compensate this effect [20]. More precisely, investigating the cooperative performance of MASs subject to the wide stationary processes (which stands for the colored noise) is more favorable to be addressed while other NCSs limitations have also been taken into account. The intermittent control approach is known as a discontinuous mechanism that is applied periodically on the system [21], [22]. This control method has been widely studied in recent years and showed significant superiority in terms of increasing the flexibility and being cost-efficient compared to traditional continuous control schemes [20]. The intermittent control has different practical applications in various real-world scenarios including a single system [23]– [26] and collaborative MASs [21], [22]. The state-dependent intermittent control approaches are proposed in [23], [24] for general classes of linear networked system. Howbeit, the nature of almost all real systems are intrinsically nonlinear. The intermittent control schemes are designed for single nonlinear networked systems in [25], [26]. Subsequently, the collaborative performance of nonlinear MASs is recently studied in [21], [22] by introducing the intermittent mechanisms. However, the proposed approaches in [21], [22] are" 2401.05822v1,"Towards Goal-Oriented Agents for Evolving Problems Observed via Conversation Michael Free 1,3 , Andrew Langworthy 1,2,3 , Mary Dimitropoulaki 1,3 , and Simon Thompson 1 BT Applied Research, Ipswich, UK Corresponding author: andrew.langworthy@bt.com 3 These authors contributed equally 1 2 Abstract. The objective of this work is to train a chatbot capable of solving evolving problems through conversing with a user about a problem the chatbot cannot directly observe. The system consists of a virtual problem (in this case a simple game), a simulated user capable of answering natural language questions that can observe and perform actions on the problem, and a Deep Q-Network (DQN)-based chatbot architecture. The chatbot is trained with the goal of solving the problem through dialogue with the simulated user using reinforcement learning. The contributions of this paper are as follows: a proposed architecture to apply a conversational DQN-based agent to evolving problems, an exploration of training methods such as curriculum learning on model performance and the effect of modified reward functions in the case of increasing environment complexity. Keywords: Reinforcement Learning · Q-learning · Task-Oriented Chatbot. 1 Introduction Task-oriented dialogue systems have found use in a wide variety of tasks. They have been employed successfully in several different applications where the task to be accomplished is well defined. Examples include restaurant booking [12], healthcare [2], and entertainment [13]. These tasks are often ‘data collection tasks’ where a number of known information points must be collected by the agent to complete an end goal, with the information gathered rarely changing over the course of the conversation. There are two main drawbacks with this approach, firstly that data-driven task-oriented dialogue systems require large amounts of heavily annotated training data, needing labels for intents, entities, and the flow from one dialogue state This preprint has not undergone peer review or any post-submission improvements or corrections. The Version of Record of this contribution is published in Artificial Intelligence XL. SGAI 2023. Lecture Notes in Computer Science, vol 14381, and is available online at https://doi.org/10.1007/978-3-031-47994-6_11." 2401.05823v1,"Quantum Probability Theoretic Asset Return Modeling: A Novel Schrödinger-Like Trading Equation and Multimodal Distribution Lin Li a,b,∗ a Department of Finance, Business School, East China University of Science and Technology, Shanghai, 200237 b Risk-Center, ETH Zürich, Switzerland, CH8092 Abstract Quantum theory offers a comprehensive framework for quantifying uncertainty, and many studies in quantum finance explore the stochastic nature of asset returns based on this theory, where the returns are likened to the motion of microscopic particles, adhering to physical laws characterized by quantum probabilities. However, such approaches inevitably presuppose that the changes in returns exhibit certain microscopic quantum effects, a presumption that may not guaranteed and has been criticized. In contrast to conventional approaches, this paper takes a novel perspective by asserting that quantum probability is primarily a mathematical scheme extending the classical probability from real to complex numbers, not exclusively tied to microscopic quantum phenomena. By directly linking the mathematical structure of quantum probability to traders’ decisions and market trading behaviors, it circumvents the presupposition of quantum effects for returns and invocation the wave function. The phase in complex form of quantum probability serves as a additional element, capturing transitions between long and short decisions but also take information interaction among traders into account, This gives quantum probability an inherent advantage over classical probability in characterizing the multimodal distribution of asset returns. Through Fourier decomposition, we derive a Schrödinger- like trading equation, wherein each term corresponds explicitly to implications of market trading. The equation suggests discrete energy levels in financial trading, and returns follows the normal distribution at the lowest level. As the market shifts to higher trading levels, a phase transition occurs in the distribution of returns, leading to multimodality and fat tails. Empirical research on the Chinese stock market supports the existence of energy levels and multimodal distributions from this quantum probability asset returns model. Keywords: quantum finance, asset returns, Schrödinger’s equation, stock market, multimodal distribution ∗ Corresponding author Email address: llin@ecust.edu.cn (Lin Li) Preprint submitted to Journal of L A TEX Templates January 12, 2024" 2401.05826v1,"Crumbled Cookies: Exploring E-commerce Websites’ Cookie Policies with Data Protection Regulations Nivedita Singh Yejin Do Yongsang Yu singhnivvy@g.skku.edu Sungkyunkwan University South Korea dyj001213@g.skku.edu Sungkyunkwan University South Korea eysl14198@g.skku.edu Sungkyunkwan University South Korea Imane Fouad Jungrae Kim Hyoungshick Kim ∗ imane.fouad@inria.fr Inria, Univ Lille France dale40@skku.edu Sungkyunkwan University South Korea hyoung@skku.edu Sungkyunkwan University South Korea ABSTRACT CCS CONCEPTS Despite stringent data protection regulations such as the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and other country-specific regulations, many websites continue to use cookies to track user activities. Recent studies have revealed several data protection violations, resulting in significant penalties, especially for multinational corporations. Motivated by the question of why these data protection violations continue to occur despite strong data protection regulations, we examined 360 popular e-commerce websites in multiple countries to analyze whether they comply with regulations to protect user privacy from a cookie perspective. We were interested in whether the cookie policies of websites differ from country to country and whether the strictness of data protection rules in a country affects the cookie policies of websites in that country. Our investigation explored cookie attributes and their links to potential security and privacy breaches, such as cross-site scripting (XSS) and cross-site request forgery (CSRF). We found that approximately 84% of all examined cookies are susceptible to XSS attacks. While preventive mechanisms against CSRF attacks lie at the mercy of browsers, our results are concerning, revealing that 81% of cookies are prone to these attacks. We also discovered masquerading cookies, where third-party cookies pose as first-party cookies, making it difficult to distinguish them from first-party cookies. These deceptive cookies can track users without their knowledge or consent. To our knowledge, we are the first study to analyze how well e-commerce websites in different countries uphold the GDPR/CCPA and countryspecific regulations. Our findings suggest that many websites still use insecure cookie policies. Therefore, there is an urgent need for uniform and consistent cookie policies. This need also underscores the importance of enacting stringent regulations that define the attributes associated with cookies. • Security and privacy → Privacy protections; Social aspects of security and privacy. KEYWORDS Web security; privacy; cookie; GDPR; CCPA; tracking. ACM Reference Format: Nivedita Singh, Yejin Do, Yongsang Yu, Imane Fouad, Jungrae Kim, and Hyoungshick Kim. 2018. Crumbled Cookies: Exploring E-commerce Websites’ Cookie Policies with Data Protection Regulations. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 14 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Cookies are an intrinsic element of web applications, initially designed to streamline the state between client and server, but their use has expanded as application needs have evolved. While some cookies are essential for the proper functioning of the website, a majority of them are used for user tracking and advertisement [5]. Recently, web user tracking has garnered substantial attention from the public due to its proliferation in data privacy incidents. These cookies are under scrutiny because of their covert acquisition of extensive user information, subsequently monetized by the ad tech sectors, often leading to notable incidents such as the Cambridge Analytica scandal [50]. In 2019, it was reported that about 90% of all the websites use tracking cookies [47]. As a result, they have become a focal point in ongoing legislative endeavors. Concerns over user privacy arising from the mismanagement of cookies have been voiced over the years in several press media outlets, research publications, and prominent academic conferences [37]. Consequently, a more comprehensive examination of this topic has emerged, encompassing diverse perspectives [36]. This exploration delves into technical considerations related to cookie syncing [13] among web entities, as well as legislative measures governing user privacy and behavior. Third-party sources inject JavaScript code to enhance user experiences and ensure websites run smoothly. Nonetheless, this cross-domain inclusion of third-party JS code invites privacy and security risks making them an essential nuisance [10]. In an online web context, third-party tracking and breaches are unarguably the most persistent intrusion in users’ data. Though several efforts have been made to restrict these third-party cookies tracking, not much Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX 1" 2401.05834v2,"Modeling Online Paging in Multi-Core Systems Mathieu Mari ∗ , Anish Mukherjee † , Runtian Ren ‡ , Piotr Sankowski § Abstract Web requests are growing exponentially since the 90s due to the rapid development of the Internet. This process was further accelerated by the introduction of cloud services. It has been observed statistically that memory or web requests generally follow power-law distribution (Breslau et al., INFOCOM’99). That is, the i th most popular web page is requested with a probability proportional to 1/i α (α > 0 is a constant). Furthermore, this study, which was performed more than 20 years ago, indicated Zipf-like behavior, i.e., that α ≤ 1. Such laws are useful for designing caching algorithms in general and configuring proxy caches, and therefore it is important to understand how universal they are. We revisit these stochastic models in the case of cache requests in the context of modern cloud systems. Surprisingly, the memory access traces coming from petabyte-size systems not only show that α can be bigger than one but also illustrate a shifted power-law distribution — called Pareto type II or Lomax. These previously not reported phenomenon calls for statistical explanation. Our first contribution is a new statistical multi-core power-law model indicating that double-power law can be attributed to the presence of multiple cores running many virtual machines in parallel on such systems. We verify experimentally the applicability of this model using the Kolmogorov-Smirnov test (K-S test). The second contribution of this paper is a theoretical analysis indicating why LRU and LFU-based algorithms perform well in practice on data satisfying power-law or multi-core assumptions. We provide an explanation by studying the online paging problem in the stochastic input model, i.e., the input is a random sequence with each request independently drawn from a page set according to a distribution π. To study the performance of LRU and Perfect LFU (PLFU, an ideal version of LFU), we use ratio-of-expectations (RoE), by comparing the expected cost of LRU or PLFU with the expected cost of the optimal offline solution OPT, both dealing with a random sequence of requests with sequence length large enough. We derive formulas (as a function of the page probabilities in π) to upper bound their ratio-of-expectations, which help in establishing RoE(LRU) = O(1) and RoE(PLFU) = O(1) given the random sequence following power-law and multi-core power-law distributions. 1 Introduction Nowadays, the public search online for news and information, anytime and anywhere. Thanks to the rapid development of the Internet, billions of users have registered on Google, Facebook, Twitter, YouTube, etc, and thousands of requests from these users are sent to the cloud servers every second. Optimizing the average response time for user requests, as a consequence, becomes a core issue for running the business of the platform. For this purpose, caching plays a central ∗ University of Montpellier, Montpellier, France. mari.mathieu.06@gmail.com University of Warwick, Coventry, England. anish343@gmail.com ‡ IDEAS NCBR, Warsaw, Poland. renruntian@gmail.com § University of Warsaw, IDEAS NCBR and MIM Solutions, Warsaw, Poland. piotr.sankowski@gmail.com † 1" 2401.05835v1,"Privacy Analysis of Affine Transformations in Cloud-based MPC: Vulnerability to Side-knowledge Teimour Hosseinalizadeh a , Nils Schlüter b , Moritz Schulze Darup b , Nima Monshizadeh a a b ENTEG, Faculty of Science and Engineering, University of Groningen, 9747 AG Groningen, The Netherlands Department of Mechanical Engineering, TU Dortmund University, Leonhard-Euler-Str. 2, Dortmund, 44227, Germany Abstract Search for the optimizer in computationally demanding model predictive control (MPC) setups can be facilitated by Cloud as a service provider in cyber-physical systems. This advantage introduces the risk that Cloud can obtain unauthorized access to the privacy-sensitive parameters of the system and cost function. To solve this issue, i.e., preventing Cloud from accessing the parameters while benefiting from Cloud computation, random affine transformations provide an exact yet light weight in computation solution. This research deals with analyzing privacy preserving properties of these transformations when they are adopted for MPC problems. We consider two common strategies for outsourcing the optimization required in MPC problems, namely separate and dense forms, and establish that random affine transformations utilized in these forms are vulnerable to side-knowledge from Cloud. Specifically, we prove that the privacy guarantees of these methods and their extensions for separate form are undermined when a mild side-knowledge about the problem in terms of structure of MPC cost function is available. In addition, while we prove that outsourcing the MPC problem in the dense form inherently leads to some degree of privacy for the system and cost function parameters, we also establish that affine transformations applied to this form are nevertheless prone to be undermined by a Cloud with mild side-knowledge. Numerical simulations confirm our results. Key words: Cyber-Physical Systems, Privacy, Security, Cryptography, Cloud-based Control, MPC. 1 Introduction Cloud computing allows accessing to computing resources such as networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction [1]. Researchers in control systems have reaped these benefits for a computationally demanding controller, namely model predictive control (MPC), across numerous domains where often interacting with geographically dispersed sensors and actuators are required. For instance, Cloud-based MPC offers 53% energy saving and 36% improvement in thermal comfort for an office building [2], consumption reduction of electrical energy by 71% in geothermal fields [3], reducing the peak demand during cooling season by 24% in public schools [4], and flexibility of services in control of an industrial robot [5]. Nonetheless, numerous security Email addresses: t.hosseinalizadeh@rug.nl (Teimour Hosseinalizadeh), nils.schlueter@tu-dortmund.de (Nils Schlüter), moritz.schulzedarup@tu-dortmund.de (Moritz Schulze Darup), n.monshizadeh@rug.nl (Nima Monshizadeh). issues arise in Cloud based MPC due to the nature of Cloud computing, which among them is the unauthorized access of Could to private data such as system and controller parameters [6]. To benefit from Cloud based MPC or in general Cloud based optimization and to preserve the privacy of sensitive parameters against Cloud, numerous solutions have been proposed which can be categorized into three main classes. The first class is based on the idea of using noise, where differential privacy (DP) is the main method in adjusting its amount [7]. DP designs a mechanism for sufficiently perturbing data using noises with distributions such as Gaussian and Laplace before releasing the results of computation; for a tutorial in control systems, see [8]. While DP was used for private filtering in [9], it was employed in [10] to design a Cloud-enabled deferentially private multi-agent optimization. The works [11] and [12] also study DP for distributed optimizations, where perturbing the signals and objective functions are the tools in achieving DP. Further on, the authors in [13] and [14] utilize Cloud for designing a linear quadratic controller, where the first study focuses on system properties and the second is concerned with de-" 2401.05839v1,"Modelling physical activity profiles in COPD patients: a fully functional approach to variable domain functional regression models Pavel Hernández-Amaro 1∗ , Marı́a Durbán 1 , M. Carmen Aguilera-Morillo 2 , Cristobal Esteban Gonzalez 3 , Inmaculada Arostegui 4 1 Universidad Carlos III de Madrid, 2 Universitat Politècnica de València, 3 Osakidetza Basque Health Service, 4 University of the Basque Country UPV/EHU E-mail address for correspondence: pahernan@est-econ.uc3m.es Summary Physical activity plays a significant role in the well-being of individuals with Chronic obstructive Pulmonary Disease (COPD). Specifically, it has been directly associated with changes in hospitalization rates for these patients. However, previous investigations have primarily been conducted in a cross-sectional or longitudinal manner and have not considered a continuous perspective. Using the telEPOC program we use telemonitoring data to analyze the impact of physical activity adopting a functional data approach. However, Traditional functional data methods, including functional regression models, typically assume a consistent data domain. However, the data in the telEPOC program exhibits variable domains, presenting a challenge since the majority of functional data methods, are based on the fact that data are observed in the same domain. To address this challenge, we introduce a novel fully functional methodology tailored to variable domain functional data, eliminating the need for data alignment, which can be computationally taxing. Although models designed for variable domain data are relatively scarce and may have inherent limitations in their estimation methods, our approach circumvents these issues. We substantiate the effectiveness of our methodology through a simulation study, comparing our results with those obtained using established methodologies. Finally, we apply our methodology to analyze the impact of physical activity in COPD patients using the telE- POC program’s data. Software for our method is available in the form of R code on request at https://github.com/Pavel-Hernadez-Amaro/V.D.F.R.M-new-estimation-approach.git. Key words: B-splines; COPD; Mixed models; Variable domain functional data ∗ To whom correspondence should be addressed. 1" 2401.05856v1,"Seven Failure Points When Engineering a Retrieval Augmented Generation System Scott Barnett, Stefanus Kurniawan, Srikanth Thudumu, Zach Brannelly, Mohamed Abdelrazek {scott.barnett,stefanus.kurniawan,srikanth.thudumu,zach.brannelly,mohamed.abdelrazek}@deakin.edu.au Applied Artificial Intelligence Institute Geelong, Australia ABSTRACT Software engineers are increasingly adding semantic search capabilities to applications using a strategy known as Retrieval Augmented Generation (RAG). A RAG system involves finding documents that semantically match a query and then passing the documents to a large language model (LLM) such as ChatGPT to extract the right answer using an LLM. RAG systems aim to: a) reduce the problem of hallucinated responses from LLMs, b) link sources/references to generated responses, and c) remove the need for annotating documents with meta-data. However, RAG systems suffer from limitations inherent to information retrieval systems and from reliance on LLMs. In this paper, we present an experience report on the failure points of RAG systems from three case studies from separate domains: research, education, and biomedical. We share the lessons learned and present 7 failure points to consider when designing a RAG system. The two key takeaways arising from our work are: 1) validation of a RAG system is only feasible during operation, and 2) the robustness of a RAG system evolves rather than designed in at the start. We conclude with a list of potential research directions on RAG systems for the software engineering community. CCS CONCEPTS • Software and its engineering → Empirical software validation. KEYWORDS Retrieval Augmented Generation, RAG, SE4AI, Case Study ACM Reference Format: Scott Barnett, Stefanus Kurniawan, Srikanth Thudumu, Zach Brannelly, Mohamed Abdelrazek . 2024. Seven Failure Points When Engineering a Retrieval Augmented Generation System. In Proceedings of 3rd International Conference on AI Engineering — Software Engineering for AI (CAIN 2024). ACM, New York, NY, USA, 6 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION The new advancements of Large Language Models (LLMs), including ChatGPT, have given software engineers new capabilities to Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CAIN 2024, April 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn build new HCI solutions, complete complex tasks, summarise documents, answer questions in a given artefact(s), and generate new content. However, LLMs suffer from limitations when it comes to up-to-date knowledge or domain-specific knowledge currently captured in company’s repositories. Two options to address this problem are: a) Finetuning LLMs (continue training an LLM using domain specific artifacts) which requires managing or serving a fine-tuned LLM; or b) use Retrieval-Augmented Generation (RAG) Systems that rely on LLMs for generation of answers using existing (extensible) knowledge artifacts. Both options have pros and cons related to privacy/security of data, scalability, cost, skills required, etc. In this paper, we focus on the RAG option. Retrieval-Augmented Generation (RAG) systems offer a compelling solution to this challenge. By integrating retrieval mechanisms with the generative capabilities of LLMs, RAG systems can synthesise contextually relevant, accurate, and up-to-date information. A Retrieval-Augmented Generation (RAG) system combines information retrieval capabilities, and generative prowess of LLMs. The retrieval component focuses on retrieving relevant information for a user query from a data store. The generation component focuses on using the retrieved information as a context to generate an answer for the user query. RAG systems are an important use case as all unstructured information can now be indexed and available to query reducing development time no knowledge graph creation and limited data curation and cleaning. Software engineers building RAG systems are expected to preprocess domain knowledge captured as artifacts in different formats, store processed information in appropriate data store (vector database), implement or integrate the right query-artifact matching strategy, rank matched artifacts, and call the LLMs API passing in user queries and context documents. New advances for building RAG systems are constantly emerging [8, 12] but how they relate and perform for a specific application context has to be discovered. In this work we present the lessons learned and 7 failure points arising from 3 case studies. The purpose of this paper is to provide 1) a reference to practitioners and 2) to present a research road map for RAG systems. To the best of our knowledge, we present the first empirical insight into the challenges with creating robust RAG systems. As advances in LLMs continue to take place, the software engineering community has a responsibility to provide knowledge on how to realise robust systems with LLMs. This work is an important step for robustness in building RAG systems. Research questions for this work include: • What are the failure points that occur when engineering a RAG system? (section 5) We present an empirical experiment using the BioASQ data set to report on potential failure points. The experiment involved 15,000 documents and 1000 question" 2401.05857v1,"Secure Dynamic Event-triggered Consensus Under Asynchronous Denial of Service Ali Azarbahram, and Amir Amini Abstract—This article proposes a secure implementation for consensus using a dynamic event-triggered (DET) communication scheme in high-order nonlinear multi-agent systems (MAS) under asynchronous (distributed) denial of service (DoS) attacks. By introducing a linear auxiliary trajectory of the system, the DET data transmission scheme among the neighboring agents is employed to reduce the communication for each agent. The asynchronous DoS attacks can block each communication channel among the cooperative agents independently in an unknown pattern. To guarantee state consensus of auxiliary MAS under DoS, a linear matrix inequality (LMI) based optimization approach is proposed which simultaneously designs all the unknown DET communication parameters as well as the state feedback control gain. In addition to asynchronous DoS attacks over the graph topology, the destructive effects of independent DoS attacks over the communication links between actual and auxiliary states are compensated as an additional layer of resiliency for the system. The output of each agent ultimately tracks the auxiliary state of the system and this results in the output consensus. Simulation results quantify the effectiveness of the proposed approach. Index Terms—Networked Control Systems (NCSs), Dynamic event-triggering (DET) Communication, Event-triggered Consensus, Asynchronous Denial of Service (DoS), high-order nonlinear systems. I. Introduction VER the past decade, cooperative control in multiagent systems (MASs) has been a topic of extensive research in control and signal processing community [1]–[4]. Among many cooperative tasks, consensus has attracted overwhelming attention due to its vast applications in many areas such as estimation in sensor networks [5], attitude alignment for spacecrafts [6], and control of microgrids [7], to name a few. This article studies the consensus problem for uncertain high-order nonlinear MASs under a class of distributed cyber attacks, namely denial of service, and an advanced class of event-based data transmission scheme referred to as the dynamic event-triggering communication. An important subject in cooperative control of MASs is to design suitable control/communication schemes which utilize a reasonable amount of energy and computation resources. Conventional consensus frameworks are based O Ali Azarbahram is with the Department of Mechanical and Process Engineering, Rheinland-Pfälzische Technische Universität Kaiserslautern-Landau, 67663 Kaiserslautern, Germany. Email address: ali.azarbahram@mv.uni-kl.de. Amir Amini is with the Department of Electrical and Computer Engineering, Concordia University, Montreal, QC, Canada. Email address: amir.amini@mail.concordia.ca on continuous-time data transmission protocol which is energy consuming and difficult to implement from a practical point of view. Recently, event-triggered control (ETC) strategies are employed which enable the control protocol to be updated or the data to be transmitted only if a pre-designed condition is satisfied [8]–[10]. Several ETC strategies have been proposed for consensus in MAS [11], [12]. More recently, dynamic event-triggering control (DETC) schemes [13], [14] have been recognized as one of the most efficient ETC schemes. Unlike conventional ETC schemes, in DETC an auxiliary dynamic variable is designed which helps in reducing the amount of control updates. The advantage of DETC scheme in reducing the amount of events over other simplified schemes is proved in [15]. The DETC schemes often depend on multiple unknown parameters which should be designed based on the stability of the closed-loop MAS. The capability of the event-triggering schemes in reducing the number of transmissions highly depends on the operating values of the design parameters. Regarding the DETC schemes, it is often the case that some feasible regions are derived for the design parameters [16]–[19]. However, even when the feasible regions are known, selecting proper operating values that efficiently reduces the communications over the network is still inexplicable and requires trial and error. It is, therefore, desirable to develop a systematic design framework that computes the exact values of the unknown parameters and guarantee a substantial reduction for the control updates. Motivated by [20]–[22], where the convex optimization techniques are utilized to include some performance objectives (such as H ∞ optimization and interevent interval maximization), in this article we develop a convex optimized design framework with a focus on reducing the burden of communication as much as possible. Cyber security against malicious attacks is another important issue, which poses new challenges in performance and stability guarantees of the MASs [23], [24]. Generally, there exist three types of attacks targeted at cyber-physical systems, namely replay attacks, false data injection (FDI), and denial of service (DoS). In DoS [25]–[28], the adversary blocks the communication channels, hence the neighbouring agents do not receive the transmitted signals. It is clear that DoS can significantly impact the behaviour of the agents and, in extreme cases, can destabilize the MAS. In literature, the occurrence of DoS is often modeled either in a periodic [29], [30] or unknown pattern [31]– [33]. In practice, the periodic scenario may not be able to fully model the pattern of DoS, as the adversary can launch the attacks in non-periodic patterns. A common" 2401.05867v1,"Effects on neutrino propagation in space-time foam of D-branes revisited Chengyi Li a , Bo-Qiang Ma a,b,c,∗ a School of Physics, Peking University, Beijing 100871, China b Center for High Energy Physics, Peking University, Beijing 100871, China c Collaborative Innovation Center of Quantum Matter, Beijing, China Abstract Neutrinos from the cosmos have proven to be ideal for probing the nature of space-time. Previous studies on high-energy events of IceCube suggested that some of these events might be gamma-ray burst neutrinos, with their speeds varying linearly with their energy, implying also the coexistence of subluminal and superluminal propagation. However, a recent reanalysis of the data, incorporating revised directional information, reveals stronger signals that neutrinos are actually being slowed down compared to previous suggestion of neutrino speed variation. Thus, it is worth discussing its implications for the brane/string inspired framework of spacetime foam, which has been used to explain previous observations. We revisit effects on neutrino propagation from specific foam models within the framework, indicating that the implied violation of Lorentz invariance could necessarily cause the neutrino to decelerate. We therefore argue that this sort of model is in agreement with the updated phenomenological indication just mentioned. An extended analysis of the revised IceCube data will further test these observations and stringy quantum gravity. Keywords: neutrino propagation, string foam, Lorentz violation, IceCube neutrino, gamma-ray burst The quantization of gravitational field would endows space-time itself a ‘foamy’ p structure at scales of order the Planck length l P = ℏG N /c 3 ≃ 1.6 × 10 −33 cm (corresponding to the scale M P = 1/l P ∼ 10 28 eV in units of c = ℏ = 1 used here). This is expected to modify the propagation of ultrarelativistic particles such as neutrinos, such that they may experience a nontrivial index of refraction in vacuo. In the often considered scenario of a linear violation of Lorentz invariance (LV) motivated by the underlying idea of quantum gravity (QG) [1], this would result in a modification increasing linearly with the energy E of the particle to the velocity of propagation, v = 1−sE/E LV , where E LV , of order M P from one’s intuition, stands for the first-order LV scale to be measured experimentally, and, s = +1 (−1), the LV sign factor, indicates the ‘subluminal’ (‘superluminal’) effect from quantized space-time. Neutrinos from cosmologically remote objects like gamma-ray bursts (GRBs) are suggested to be ideal for probing such candidate QG effects [5–7]. Albeit events with energies of several hundreds of TeV (and those even ∗ Corresponding author Email address: mabq@pku.edu.cn (Bo-Qiang Ma) Preprint submitted to arXiv exceeding PeV energies) have been registered [2, 3] by the IceCube telescopes [4]) one is not sure about their exact sources still. Recent studies [7–12] using IceCube data of near- TeV to PeV energies compare observation times and directions of GRBs with those of neutrinos, finding intriguing preliminary signature that there could be a variation in the speed of GRB neutrinos. Comparable statistical significance for events delayed and that advanced by LV is inferred, 1 pointing likely to an opposite effect on the propagation between neutrinos and antineutrinos [10–13] (a hypothesis that might be relevant because we have no helicity information for IceCube events). It is suggested [14] that the space-time foam model with recoiling (D-brane) cosmic defects [15] may induce a breakdown of CPT invariance for the neutrino/antineutrino sector and 1 We recall that 5 of 9 (candidate) GRB neutrinos appear to have travel times retarded (i.e., neutrinos that could have been slowed down) by QG, whereas the other 4 are ‘advance’ events, if confined to IceCube 60–500 TeV events [8, 9]; likewise, for the four PeV neutrinos (that include 1 ‘track’ event and 3 ‘shower’ events), 2 are delayed (so subluminal) and the rest 2, superluminal, see [10], where the interested reader will find these described in detail. January 12, 2024" 2401.05871v1,"Enhancing Personality Recognition in Dialogue by Data Augmentation and Heterogeneous Conversational Graph Networks Yahui Fu, Haiyue Song, Tianyu Zhao, Tatsuya Kawahara Abstract Personality recognition is useful for enhancing robots’ ability to tailor user-adaptive responses, thus fostering rich human-robot interactions. One of the challenges in this task is a limited number of speakers in existing dialogue corpora, which hampers the development of robust, speaker-independent personality recognition models. Additionally, accurately modeling both the interdependencies among interlocutors and the intra-dependencies within the speaker in dialogues remains a significant issue. To address the first challenge, we introduce personality trait interpolation for speaker data augmentation. For the second, we propose heterogeneous conversational graph networks to independently capture both contextual influences and inherent personality traits. Evaluations on the RealPersonaChat corpus demonstrate our method’s significant improvements over existing baselines. 1 1 Introduction Personality recognition aims to identify an individual’s characteristic patterns of feeling, thinking, and behaving, which make each different from one another [1]. Such capability is essential in the realm of human-robot interaction, where correctly Yahui Fu, Tatsuya Kawahara Graduate School of Informatics, Kyoto University, Japan e-mail: [fu][kawahara]@sap.ist.i.kyoto-u.ac.jp Haiyue Song Graduate School of Informatics, Kyoto University, Japan and NICT, Japan e-mail: song@nlp.ist.i.kyoto-u.ac.jp Tianyu Zhao rinna Co., Ltd., Japan e-mail: tianyuz@rinna.co.jp 1 Our codes are RealPersonaChat. available at https://github.com/fuyahuii/Personality-Recognition-on- 1" 2401.05875v1,"GPTArticleExtractor: An Automated Workflow for Magnetic Material Database Construction Yibo Zhang a,b , Suman Itani a , Kamal Khanal a , Emmanuel Okyere a , Gavin Smith a , Koichiro Takahashi a , Jiadong Zang a a Department of Physics and Astronomy, University of New Hampshire, 9 Library Way, Durham, 03824, NH, USA b Department of Chemistry, University of New Hampshire, 23 Academic Way, Durham, 03824, NH, USA Abstract A comprehensive database of magnetic materials is valuable for researching the properties of magnetic materials and discovering new ones. This article introduces a novel workflow that leverages large language models for extracting key information from scientific literature. From 22,120 articles in the Journal of Magnetism and Magnetic Materials, a database containing 2,035 magnetic materials was automatically generated, with ferromagnetic materials constituting 76% of the total. Each entry in the database includes the material’s chemical compounds, as well as related structures (space group, crystal structure) and magnetic temperatures (Curie, Néel, and other transitional temperatures). To ensure data accuracy, we meticulously compared each entry in the database against the original literature, verifying the precision and reliability of each entry. Keywords: Magnetic Materials, Database, Large Language Models 1. Introduction Magnetic materials play an indispensable role in modern science and engineering domains. Their applications span a wide range, from data storage devices like hard disks and tapes to electrical power conversion and transmission systems, and extend to medical and consumer electronics. The unique magnetic properties of these materials enable various technological applications to function efficiently and precisely [1, 2]. While discovering antiferromagnets is relatively easy due to the superexchange nature therein[3], predicting new ferromagnets poses significant challenges. The interplay of the correlation and itinerancy is believed to be the origin of most ferromagnetism, but a complete understanding is yet to be available [4]. The first-principles calculations, such as density functional theory (DFT), are generally accurate in determining the energy of non-magnetic materials. Unfortunately, they often result in incorrect predictions of magnetic properties, especially for magnetic materials where the electronic correlation is relevant, particularly ferromagnetism. Many magnetic materials are strongly correlated, and one often has to go beyond DFT or DFT + U approaches [5]. Moreover, the limitations of the DFT+U method in predicting magnetic structures are demonstrated by the disagreement between the observed experimental and the calculated magnetic configurations [6]. Another drawback of the DFT calculations is that to get a successful description of exchange interactions in some materials (like antiferromagnetic Mn 3 O 4 ), one has to use hybrid exchange-correlation functionals, which have a considerable computational cost [7]. Another study [8] also suggests that none of the functionals Email addresses: yibo.zhang@unh.edu (Yibo Zhang), jiadong.zang@unh.edu (Jiadong Zang) Preprint submitted to Elsevier work in all conditions, indicating the need for further development of exchange-correlation functionals. The paramount impact is clearly doomed if a reliable way of predicting new ferromagnets cannot be achieved. Data-driven materials discovery is an effective solution to this challenge. For example, the high-throughput (HT) methods efficiently pinpoint materials with distinct properties by conducting broad screenings within databases [9, 10, 11]. However, HT outcomes, rooted in the first-principles calculations, are still constrained by these algorithms’ drawbacks above. On the other hand, Data mining techniques in materials science are significantly enhanced by various analytical methods. Key among these are machine learning [12, 13], deep learning [14], linear regression [15], and trend analysis [16], which all garnered success in identifying materials and developing screening models. However, the effectiveness of these methods relies heavily on the availability of a comprehensive dataset, which has yet to be ready for magnetic materials. Databases based on experimentally verified information do exist [17, 18, 19, 20], yet they all lack magnetic property information, such as Curie or Néel temperatures. The Bilbao Magnetic Materials Database [21] comes closest to meeting these criteria. It offers a complete lattice and magnetic structure for each entry and leads to success in discovering magnetic topological insulators [22]. However, its dataset is limited to 1,890 entries, a scale insufficient to support more intricate deep-learning models. Some efforts to create a magnetic material database have been noticed in articles [12, 13, 23] and books[24, 25, 26]. Notably, Matthew et al. [27] developed a rule-based syntax toolkit for the automatic extraction of chemical information. It requires substantial programming efforts to use regular expressions, which may fail to adapt to different articles’ writing styles and layouts. Callum et al. [28] automated January 12, 2024" 2401.05883v2,"Generative Deduplication For Socia Media Data Selection Xianming Li, Jing Li ∗ Department of Computing, The Hong Kong Polytechnic University xianming.li@connect.polyu.hk jing-amelia.li@polyu.edu.hk Abstract Per Sample Social media data is plagued by the redundancy problem caused by its noisy nature, leading to increased training time and model bias. To address this issue, we propose a novel approach called generative deduplication. It aims to remove duplicate text from noisy social media data and mitigate model bias. By doing so, it can improve social media language understanding performance and save training time. Extensive experiments demonstrate that the proposed generative deduplication can effectively reduce training samples while improving performance. This evidence suggests the effectiveness of generative deduplication and its importance in social media language understanding. 1 Introduction Recently, data selection (Liu et al., 2019a; Lee et al., 2022; Xie et al., 2023) has gained much interest in the NLP community. It involves selecting a subset of relevant data from a larger set of data. It has profoundly affected the performance of large language model pretraining (Xie et al., 2023) and downstream task finetuning (Yu et al., 2023). Early works (Axelrod et al., 2011; Ruder et al., 2017; Liu et al., 2019a; Xie et al., 2023) selected data for domain adaptation via augmenting training instances relevant to the target domain. Recent studies employed deduplication approaches (Lee et al., 2022) to remove redundant data for improving language model pertaining. We focus on adopting deduplication to address the redundancy challenge (Tao et al., 2013) caused by the noisy nature (Zhang et al., 2023) in social media language understanding. The redundancy not only increases the training time and computational resources but also biases the model and adversely affects its generalization ability, as illustrated in Figure 1. However, existing deduplication approaches, typically such as shingles (Broder, 1997) and simhash ∗ Corresponding author 📄 Input ⛽ Resource 🎯 Target Model Training After the Blood Moon comes the Pumpkin Sun negative After the Blood Moon comes the Pumpkin Sun via @user positive LOOK: Move over Blood Moon, here's the Pumpkin Sun ⛽ Total Resource neutral T5 Model Inference @user Pumpkin will be at a Dunkin' near you by August 31! LMs bias negative ✗ neutral ✓ positive Figure 1: An redundancy example on TweetEval (Barbieri et al., 2020) sentiment analysis. A set of semantically similar tweets containing “pumpkin” and having the same “neutral” label are fed into the model for training. A tweet including “pumpkin” is incorrectly predicted to be “neutral” due to redundancy bias in inference. The green trees denote computational resource consumption. (Manku et al., 2007), are inadequate for handling noisy social media data. They can deduplicate simple character-level similar data but not semantically similar data. While semantic textual similarity models (Reimers and Gurevych, 2019; Gao et al., 2021; Li and Li, 2023) can improve the deduplication performance on noisy data, the pairwise comparison has high complexity. These challenges significantly hinder the application of deduplication for social media language understanding. To tackle these issues, we propose a novel semantic deduplication approach, generative deduplication, for social media language understanding. Specifically, we adopt generative models, such as T5 (Raffel et al., 2020) and LLaMA (Touvron et al., 2023), as the generative backbone. We then design a self-supervised task where the generative backbone predicts the keyword from the given input text, denoted as g(keyword|text). The generative deduplication process includes two stages. Firstly, we train the generative backbone solely on keyword prediction for only one epoch in the training" 2401.05884v1,"Intercalation-induced states at the Fermi level and the coupling of intercalated magnetic ions to conducting layers in Ni 1/3 NbS 2 Yuki Utsumi Boucher, 1, ∗ Izabela Biało, 2, † Mateusz A. Gala, 2 Wojciech Tabiś, 2 Marcin Rosmus, 3, 4 Natalia Olszowska, 3 Jacek J. Kolodziej, 3, 4 Bruno Gudac, 5 Mario Novak, 5 Naveen Kumar Chogondahalli Muniraju, 1 Ivo Batistić, 5 Neven Barišić, 5, 6 Petar Popčević, 1, ‡ and Eduard Tutiš 1, § 1 Institute of Physics, Bijenička c. 46, 10000 Zagreb, Croatia AGH University of Krakow, Faculty of Physics and Applied Computer Science, 30-059 Krakow, Poland 3 Solaris National Synchrotron Radiation Centre, Jagiellonian University, Czerwone Maki 98, 30-392 Krakow, Poland 4 Faculty of Physics, Astronomy, and Applied Computer Science, Jagiellonian University, Łojasiewicza 11, 30-348 Krakow, Poland 5 Department of Physics, Faculty of Science, University of Zagreb, Bijenička c. 32, 10000 Zagreb, Croatia 6 Institute of Solid State Physics, TU Wien, 1040 Vienna, Austria 2 The diversity of magnetic orders that appear in layered magnetic materials is of great interest from the fundamental point of view and for applications. In particular, the magnetic sublayers, introduced by intercalation into van der Waals gaps of the host transition-metal dichalcogenide (TMD), are known to produce various magnetic states, with some being tunable by pressure and doping. The magnetic sublayers and their magnetic ordering strongly modify the electronic coupling between layers of the host compound. Understanding the roots of this variability, starting from the underlying electronic structure, is a significant challenge. Here we employ the angle-resolved photoelectron spectroscopy at various photon energies, the ab initio electronic structure calculations, and modeling to address the particular case of Ni-intercalate, Ni 1/3 NbS 2 . We find that the bands around the Fermi level bear the signature of a strong yet unusual hybridization between NbS 2 conduction band states and the Ni 3d orbitals. The hybridization between metallic NbS 2 layers is almost entirely suppressed in the central part of the Brillouin zone, including the part of the Fermi surface around the Γ point. Simultaneously, it gets very pronounced towards the zone edges. It is shown that this behavior is the consequence of the rather exceptional, symmetry imposed, spatially strongly varying, zero total hybridization between relevant Ni magnetic orbitals and the neighboring Nb orbitals that constitute the metallic bands. We also report the presence of the so-called β-feature, discovered only recently in two other magnetic intercalates with very different magnetic orderings. In Ni 1/3 NbS 2 , the feature shows only at particular photon energies, indicating its bulk origin. Common to prior observations, it appears as a series of very shallow electron pockets at the Fermi level, positioned along the edge of the Brillouin zone. Unforeseen by ab initio electronic calculations, and its origin still unresolved, the feature appears to be a robust consequence of the intercalation of 2H-NbS 2 with magnetic ions. I. INTRODUCTION For decades, the interaction between localized magnetic moments and itinerant electronic subsystems has been central to condensed matter research. In particular, it has been regularly and extensively discussed in the context of heavy fermions [1] and high-temperature superconducting cuprates, whose discovery has posed many puzzles to the research community [2–6]. Even earlier, various materials, where the same interaction may be expected, have been discovered and cataloged after inquiries appropriate for the times. The magnetic intercalates of transition metal dichalcogenides (TMDs) are one such family of compounds [7–9]. Probably the best known and most numerous of those are based on 2H-NbS 2 , with formula M 1/3 NbS 2 (M: 3d transition metal). These compounds are particularly attractive due to the high quality of the crystals achieved at the 1/3 concentration of intercalated atoms and the range of exciting intertwined magnetic and ∗ yutsumi@ifs.hr † Current affiliation: Physik-Institut, Universität Zürich, Winterthurerstrasse 190, CH-8057 Zürich, Switzerland ‡ ppopcevic@ifs.hr § etutis@ifs.hr transport properties they exhibit [9–12]. In recent times, along with the development of new experimental techniques and theoretical concepts, there has been a revived interest in the 2H-NbS 2 intercalates. With the interaction mentioned above taking the limelight, the question of the electronic properties of these materials seems far from being settled. Apart from the common questions regarding the charge transfer between metallic layers of the host compound and the intercalated species, and the resulting spin and charge states of the latter, the other questions remain to be addressed: How do the magnetic ions connect the otherwise weakly connected metallic layers, and how their magnetic states and fluctuations affect the electronic structure in the vicinity of the Fermi level. Some of these questions are to be addressed here. The host compound 2H-NbS 2 is a superconductor below 6 K [13]. The intercalation of transition metal ions between NbS 2 layers suppresses the superconductivity and often results in complex magnetic orderings. In M 1/3 NbS 2 the transition metal ions occupy √ √ the octahedral voids between NbS 2 layers and form a 3× 3 superlattice rotated by 30 ◦ in respect to the 1×1 unit cell of 2H-NbS 2 . Intercalation of the late transition metals Fe, Co, and Ni leads to predominant antiferromagnetism, whereas the early transition metals V, Mn, and Cr tend to order ferromagnetically [9–12]. In some cases, the type of long-range magnetic order is found tunable by" 2401.05896v1,"1 The Role of Deep Learning in Advancing Proactive Cybersecurity Measures for Smart Grid Networks: A Survey Nima Abdi, Abdullatif Albaseer, Member, IEEE, Mohamed Abdallah, Senior Member, IEEE, Abstract—As smart grids (SG) increasingly rely on advanced technologies like sensors and communication systems for efficient energy generation, distribution, and consumption, they become enticing targets for sophisticated cyber-attacks. These evolving threats demand robust security measures to maintain the stability and resilience of modern energy systems. While extensive research has been conducted, a comprehensive exploration of proactive cyber defense strategies utilizing Deep Learning (DL) in SG remains scarce in the literature. This survey bridges this gap, studying the latest DL techniques for proactive cyber defense. The survey begins with an overview of related works and our distinct contributions, followed by an examination of SG infrastructure. Next, we classify various cyber defense techniques into reactive and proactive categories. A significant focus is placed on DL-enabled proactive defenses, where we provide a comprehensive taxonomy of DL approaches, highlighting their roles and relevance in the proactive security of SG. Subsequently, we analyze the most significant DL-based methods currently in use. Further, we explore Moving Target Defense, a proactive defense strategy, and its interactions with DL methodologies. We then provide an overview of benchmark datasets used in this domain to substantiate the discourse. This is followed by a critical discussion on their practical implications and broader impact on cybersecurity in Smart Grids. The survey finally lists the challenges associated with deploying DL-based security systems within SG, followed by an outlook on future developments in this key field. Keywords: . Smart Grid, Early detection, Proactive Security, Deep Learning, Moving Target Defense I. I NTRODUCTION A smart grid (SG) is an advanced electricity delivery system that leverages digital technology to enhance the power grid’s efficiency, reliability, and sustainability. The SG facilitates the integration of renewable energy sources such as solar and wind power, electric vehicles, and energy storage systems, promoting eco-friendly electricity generation. It harnesses the potential of cutting-edge technologies such as sensors, communication networks, and advanced control systems. This utilization enables real-time monitoring and control over the electric power grid [1]. The role of SG is crucial in adapting to the dynamic conditions presented by distributed generation Nima Abdi, Abdullatif Albaseer, and Mohamed Abdallah are with the Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar {niab52126,aalbaseer, moabdallah}@hbku.edu.qa and renewable energy, with its advanced technologies facilitating the bidirectional flow of electrical energy. Its objective is to establish a flexible system capable of accommodating power demand, supply, and storage options associated with the distribution system. The seamless exchange of data and communication among consumers, power utilities, and system operators in SG is made possible by implementing smart meters (SMs) in residences, buildings, and industrial facilities, a key component of the Advanced Metering Infrastructure (AMI). SMs observe consumers’ electricity usage and transmit detailed readings, either through wireless [2] or wired [3] communications methods. The data is then conveyed to the utility company for power quality monitoring and pricing management [4]. This can help consumers monitor and manage their energy consumption offering the potential for cost savings and a reduced carbon footprint‘ [5]. Supervisory Control and Data Acquisition (SCADA) system monitors and manages the transmission network. However, despite the benefits the SG offers, it is important to address the security and privacy issues associated with its implementation [6]. Integrating digital technology into the electric power grid introduces new vulnerabilities that cybercriminals can exploit, which result in disruption of power supply, theft of sensitive data, and damage to critical infrastructure [7]–[9]. Cyberattacks against SG can take many forms, including customer data theft, the failure of cyber systems, compromising communication instruments, spreading false data and malware, and eavesdropping [10], [11]. Ensuring the security of the SG is vital to protecting the electric power system’s reliability and public safety, as cybersecurity breaches can disrupt the power supply and damage critical infrastructure. Implementing robust security measures, including incident response and recovery plans, is essential. Within the SG, communication protocols such as IEC 60870- 5-104 and DNP3 are widely utilized, providing standardized data transfer and control commands [12], [13]. However, these protocols lack critical security measures like authentication and integrity protection, leaving them vulnerable to attacks such as Man-in-the-middle (MITM) [14], [15], denial-of-service (DoS) [16], and spoofing [17]. Such vulnerabilities also extend to other common SG protocols like DNP3 [18]–[20]. The extended lifetimes of power grid field devices, like protection devices and PLCs, further exacerbate the potential for these" 2401.05905v1,"Feasible pairwise pseudo-likelihood inference on spatial regressions in irregular lattice grids: the KD-T PL algorithm Giuseppe Arbia a , Niccolò Salvini a,∗ a Università Cattolica del Sacro Cuore, Department of Statistical Sciences, L.go Gemelli 8, 00168, Rome, Italy Abstract Spatial regression models are central to the field of spatial statistics. Nevertheless, their estimation in case of large and irregular gridded spatial datasets presents considerable computational challenges. To tackle these computational problems, Arbia [1] introduced a pseudo-likelihood approach (called pairwise likelihood, say PL) which required the identification of pairs of observations that are internally correlated, but mutually conditionally uncorrelated. However, while the PL estimators enjoy optimal theoretical properties, their practical implementation when dealing with data observed on irregular grids suffers from dramatic computational issues (connected with the identification of the pairs of observations) that, in most empirical cases, negatively counter-balance its advantages. In this paper we introduce an algorithm specifically designed to streamline the computation of the PL in large and irregularly gridded spatial datasets, dramatically simplifying the estimation phase. In particular, we focus on the estimation of Spatial Error models (SEM). Our proposed approach, efficiently pairs spatial couples exploiting the KD tree data structure and exploits it to derive the closed-form expressions for fast parameter approximation. To showcase the efficiency of our method, we provide an illustrative example using simulated data, demonstrating the computational advantages if compared to a full likelihood inference are not at the expenses of accuracy. Keywords: Pseudo-Likelihood, Pairwise Estimation, Non Lattice Dataset, Spatial Regression, Large Spatial Data, KD-Tree Corresponding author Email addresses: giuseppearbia13@gmail.com (Giuseppe Arbia), niccolo.salvini27@gmail.com (Niccolò Salvini) ∗ Preprint submitted to Spatial Statistics January 12, 2024" 2401.05912v1,"Prompt-based mental health screening from social media text Wesley Ramos dos Santos 1 , Ivandré Paraboni 1 1 University of São Paulo (EACH-USP) Av Arlindo Bettio 1000, São Paulo, Brazil {wesley.ramos.santos,ivandre}@usp.br Abstract. This article presents a method for prompt-based mental health screening from a large and noisy dataset of social media text. Our method uses GPT 3.5. prompting to distinguish publications that may be more relevant to the task, and then uses a straightforward bag-of-words text classifier to predict actual user labels. Results are found to be on pair with a BERT mixture of experts classifier, and incurring only a fraction of its computational costs. 1. Introduction Textual representation models used in NLP applications have changed dramatically in recent years, moving on from simple token counts (e.g., bag-of-words) to transformerbased and large language models (LLMs) such as GPT 1 and Bloom 2 , among many others. In particular, LLMs have successfully circumvented the need for labelled training data entirely, in so-called prompt-based methods that are now mainstream in the field, and have been shown to obtain higher accuracy in a wide range of tasks. Despite its potential to reduce training costs, however, LLM prompting still requires careful consideration in applications involving large or noisy data, as it is often the case of social media. In particular, we notice that social media data may be available as a long history of publications, often stretching over thousands of posts, and yet many or most may be unrelated to the underlying task. This may be the case, for instance, when screening for user-level information such as mental health statuses (e.g., related to depression), a task that may challenge supervised and prompt-based methods alike. Based on these observations, this work investigates the use of LLM prompting as an aid to mental health screening from social media text. Taking the issue of depression detection from Brazilian Twitter timelines as a case study, we propose a method that combines GPT prompting and standard bag-of-words classification for fast, computationally inexpensive results, and which is evaluated against SOTA results obtained by BERT mixture of experts [dos Santos et al. 2023b]. 2. Related work Depression detection may be seen as an instance of author profiling [Rangel et al. 2020, Flores et al. 2022, Pavan et al. 2023] from social media text. Recent studies in the field are summarised in Table 1, categorised by text genre (Reddit, Twitter), text model (b=bag of words, BERT, e=embeddings, s=sentiment), and methods. 1 2 https://platform.openai.com/docs/models https://huggingface.co./bigscience/bloom" 2401.05926v2,"Using Large Language Models for Commit Message Generation: A Preliminary Study Linghao Zhang, Jingshu Zhao, Chong Wang ∗ , Peng Liang ∗ School of Computer Science, Wuhan University, Wuhan, China {starryzhang, candyzhao, cwang, liangp}@whu.edu.cn shot and zero-shot setups, even without explicit training on certain tasks. However, there is still a lack of attention on the ability of LLMs to automatically generate commit messages. In this work, we conducted a preliminary evaluation to explore the feasibility and performance of LLMs on commit message generation task. In addition to the traditional metrics BLEU [4] and Rouge-L [5], we also conducted the human- ChatGPT evaluation. The results show that LLMs have comparable performance to existing methods on BLEU and Rouge-L metrics. In the human evaluation, surprisingly, LLMs beat other methods by an absolute margin. In 78% of 366 samples, the commit message generated by LLMs was considered the best by human participants. Interestingly, we also included humanwritten commit messages as one of the options, and only 13.1% of the 366 samples were manually evaluated as the best. This work highlights the potential of LLMs in commit message generation task and underscores the limitations in using existing metrics to evaluate the quality of commit messages. The main contributions of this work are as follows: • To provide a 2-phase evaluation study to explore the feasibility and performance of LLMs on commit message generation. • To explore the weakness of BLEU and Rouge-L metrics in evaluating the quality of auto-generated commit messages. I. I NTRODUCTION The rest of this paper is organized as follows. Section II A commit is an operation to submit updates to the version provides existent studies on commit message generation control system (VCS), which is the key operation of Git VCS. and applications of LLMs. Section III presents the research Each commit should be accompanied by a commit message, questions of this work and the overview of our approach. which serves as a concise textual description of the update. Section IV is the results and discussion. Commit messages can record changes of the source code, The evaluation data and scripts used in this work have been help developers understand the code, and facilitate efficient made available online [6]. collaboration. However, manually writing commit messages II. R ELATED W ORK is time-consuming, and the commit messages sometimes are non-informative or even empty [1]. To address this problem, In recent years, some researchers explored the automatic researchers have proposed techniques for automatically gener- generation of commit messages. According to the classification ating commit messages which achieved some success [2]. of the commit message generation models in [2], the proposed Large Language Model (LLM) is a popular artificial in- methods can be grouped into the following two categories. telligence technology that uses deep learning and massively Generation-based methods normally utilize the encoderlarge data sets to understand, summarize, generate, and predict decoder architectural framework and are trained on the datasets new text content. LLMs often have an extremely large number collected from open-source repositories. For example, Commitof parameters and are trained on huge datasets. Nowadays, Gen [7] is an early attempt to use neural machine translation the application of LLMs in the field of software engineering in commit message generation. NMT [8] is another neural has achieved great success [3] and attracted the attention of machine translation method similar to CommitGen, but uses researchers. Recent advances in LLMs are very promising as a different attention mechanism. CoDiSum [9] uses a multireflected in their capability for general problem-solving in few- layer bidirectional GRU (Gated Recurrent Unit) as its encoder Abstract—A commit message is a textual description of the code changes in a commit, which is a key part of the Git version control system (VCS). It captures the essence of software updating. Therefore, it can help developers understand code evolution and facilitate efficient collaboration between developers. However, it is time-consuming and labor-intensive to write good and valuable commit messages. Some researchers have conducted extensive studies on the automatic generation of commit messages and proposed several methods for this purpose, such as generationbased and retrieval-based models. However, seldom studies explored whether large language models (LLMs) can be used to generate commit messages automatically and effectively. To this end, this paper designed and conducted a series of experiments to comprehensively evaluate the performance of popular open-source and closed-source LLMs, i.e., Llama 2 and ChatGPT, in commit message generation. The results indicate that considering the BLEU and Rouge-L metrics, LLMs surpass the existing methods in certain indicators but lag behind in others. After human evaluations, however, LLMs show a distinct advantage over all these existing methods. Especially, in 78% of the 366 samples, the commit messages generated by LLMs were evaluated by humans as the best. This work not only reveals the promising potential of using LLMs to generate commit messages, but also explores the limitations of commonly used metrics in evaluating the quality of auto-generated commit messages. Index Terms—Commit Message Generation, Large Language Model, LLM, ChatGPT, Llama 2" 2401.05928v1,"Mitigating Unhelpfulness in Emotional Support Conversations with Multifaceted AI Feedback Jiashuo WANG, Chunpu XU, Chak Tou LEONG, Wenjie LI, Jing LI Hong Kong Polytechnic University {csjwang,cswjli,jing-amelia.li}@comp.polyu.edu.hk {chun-pu.xu,chak-tou.leong}@connect.polyu.hk Abstract An emotional support conversation system aims to alleviate users’ emotional distress and assist them in addressing their challenges. To generate supportive responses, it is critical to consider multiple factors such as empathy, support strategies, and response coherence, as established in prior methods. Nonetheless, previous models occasionally generate unhelpful responses, which intend to provide support but display counterproductive effects. According to psychology and communication theories, poor performance in just one contributing factor might cause a response to be unhelpful. From the model training perspective, since these models have not been exposed to unhelpful responses during their training phase, they are unable to distinguish if the tokens they generate might result in unhelpful responses during inference. To address this issue, we introduce a novel model-agnostic framework named Mitigating unhelpfulness with multifaceted AI feedback for emotional support (Muffin). Specifically, Muffin employs a multifaceted AI feedback module to assess the helpfulness of responses generated by a specific model with consideration of multiple factors. Using contrastive learning, it then reduces the likelihood of the model generating unhelpful responses compared to the helpful ones. Experimental results demonstrate that Muffin effectively mitigates the generation of unhelpful responses while slightly increasing response fluency and relevance. 1 Introduction Emotional support conversation systems (supporters) are designed to generate responses that can buffer the emotional distress experienced by users (help-seekers) and help users to work through the challenges they are confronting (Liu et al., 2021). Recent work on emotional support conversations has shown promise in generating supportive responses with consideration of multiple A Conversation between a Help-Seeker and the Supporter My fiance left me yesterday. I really have no one to talk to because my family and friends didn't like him so they think this is for the best. Ok, I am to listen. I just don't understand why someone would pretend to be happy for a year and then decide they were lying and leave. Supporter Responses Generated by Models BlenderBot: Have you considered therapy? That might help for people in bad relationship. (Bare empathy) KEMI: I know how hard it is. I suggest that you talk to you parents about this. (Inapporaite suggestion strategy) MultiESC: I am sorry to hear that. Maybe you should ask his family about it? (Incoherent) Figure 1: Examples of unhelpful responses generated by recent emotional support conversation models, including BlenderBot (Roller et al., 2021), MultiESC (Cheng et al., 2022), and KEMI (Deng et al., 2023) factors, such as empathy and support strategies (Deng et al., 2023; Zhao et al., 2023; Cheng et al., 2022; Tu et al., 2022). However, their models may generate responses that produce a counterproductive support effect, i.e., exacerbating the negative emotional states of users or inhibiting effective problem-solving, as shown in Figure 1. According to psychology and communication theories, these failed support attempts are termed as “unhelpful messages” (Greene and Burleson, 2003; Burleson, 1985). Notably, a response can be regarded as “unhelpful” only if it always produces negative effects. Responses that Although the frequency of unhelpful responses generated by some previous models is not extremely high—with about 27% observed in Multi- ESC generations (Cheng et al., 2022) on ESConv benchmark (Liu et al., 2021)—even a single instance has the potential to undermine previous supportive efforts and erode the trust of the help-seeker in the supporter. Therefore, mitigating unhelpful responses is critical. In pursuit of this goal, two questions arise: Q1: What factors contribute" 2401.05929v1,"Second Harmonic Generation from Ultracold Bosons in an Optical Cavity Megha Gopalakrishna, 1, ∗ Emil Viñas Boström, 2, 3, † and Claudio Verdozzi 4, ‡ 1 Department of Physics, Division of Mathematical Physics, Lund University, 22100 Lund, Sweden 2 Max Planck Institute for the Structure and Dynamics of Matter, Luruper Chaussee 149, 22761 Hamburg, Germany 3 Nano-Bio Spectroscopy Group, Departamento de Fisica de Materiales, Universidad del Pais Vasco, 20018 San Sebastian, Spain 4 Department of Physics, Division of Mathematical Physics and ETSF, Lund University, 22100 Lund, Sweden (Dated: January 12, 2024) Within a cavity quantum electrodynamics description, we characterize the fluorescent spectrum from ultracold bosons atoms, in the second harmonic generation (SHG) and resonant cases. Two situations are considered: i) bosons loaded into an optical lattice and ii) in a trapped two-component dilute Bose-Einstein Condensate (BEC), in the regime where the Bogoliubov approximation is often employed. Atom and photon degrees of freedom are treated on equal footing within an exact timedependent configuration interaction scheme, and cavity leakage is included by including classical oscillator baths. For optical lattices, we consider few bosons in short chains, described via the Bose- Hubbard model with two levels per site, and we find that the spectral response grows on increasing the number of atoms at weak interactions, but diminishes at high interactions (if the number of chain sites does not exceed the number of atoms), and is shifted to lower frequency. In the BEC regime, the spectra display at noticeable extent a scaling behavior with the number of particles and a suitable rescaling of the BEC-cavity and inter-particle interactions, whilst the SHG spectrum redshifts at large atom-atom correlations. Overall, our results provide some general trends for the fluorescence from ultracold bosons in optical cavities, which can be of reference to experimental studies and further theoretical work. I. INTRODUCTION Ultracold boson systems [1] provide a powerful and accurately tuneable environment to address fundamental and applied notions in several and broad of areas of physics, such as atomic, molecular and condensed matter physics [2, 3], light-matter interaction, thermalization and localization phenomena [4–6], quantum information and metrology [7, 8]. Two paradigmatic settings in ultracold boson physics are free atoms in a trapping potential [9], and atoms loaded in standing-wave, laser-generated periodic potential patterns [10] (also commonly referred to as ultracold bosons in optical lattices). The first of these two setups, where the experimental detection of a Bose-Einstein condensate (BEC) originally occurred [11, 12]), has been key in establishing ultracold-atoms as a prominent and distinctive branch of quantum physics, and in making possible to address subjects as different as e.g. atom chips [13], topological magnetism[14]), supersolidity [15], and early-universe expansion [16]. An important topic in this area, relevant to the present work, are two-component BEC:s [17], that can be realised by e.g. using atoms with different internal states [18], or subjecting a BEC to spatial separation (for example, via double-well trapping [19, 20]). The other setup, atoms loaded onto optical lattices, further broadens the scope of ultracold boson physics, ∗ megha.gopalakrishna@teorfys.lu.se † emil.bostrom@mpsd.mpg.de ‡ claudio.verdozzi@teorfys.lu.se by making it possible accurate realizations/simulations of lattice models of condensed matter [3, 21–24]: for example, by tuning depth/shape of the periodic potential and of the strength of the interactions, to address superfluidto-Mott insulator transitions [25], chaotic behavior [26], entanglement [27], (artificial) gauge fields [28], atomic and molecular clocks [29, 30], to mention a few. Electromagnetic fields, in addition to creating the potential landscapes for ultracold (boson) atoms, are also used to modify the state/behavior and probe the optical response of the latter in the quantum-electrodynamics regime. This is often accomplished by considering ultracold bosons in optical cavities [31–33], to select photon modes of specific frequencies, to control the number of photons for a given mode [34], and tune the parameters regulating the cavity-matter interactions. This permits to explore, modify and/or induce novel equilibrium and nonequilibrium light-induced physical scenarios, and to develop and test theoretical models and techniques [35]. As few examples, we mention that the role of dissipation [36], spontaneous emission [37], and the Stark effect [38] have been analysed in relation to the optical behavior of an BEC in the presence cavity optical modes. Also, a two-component Bose-Hubbard model in a cavity has been used to characterise the transition between superfluid and Mott insulator phases [31]. These phases have also been investigated via two-photon spectroscopy for a BEC in a two-mode cavity [39]. Finally, the Bose- Hubbard model in a cavity field has been employed to characterize the formation of atom-photon correlations and entanglement among different atomic phases [40]. A common optical de-excitation mechanism in matter is fluorescence (where light is emitted from the system" 2401.05942v1,"Increased accuracy of the two-point correlation function at no extra cost Martin Kerscher Ludwig–Maximilians Universtät München, Fakultät für Physik, Schellingstr. 4, D-80799 München martin.kerscher@lmu.de January 11, 2024 Using the pair-count implementaion from the Corrfunc package we show that with a low discrepency sequence we can calculate the two-point correlation function more accurately than with random points at no extra computational cost. 1 2 Introduction Given the data points {x i }, i = 1, . . . , N within the observational window x i ∈ W the The Corrfunc package (Sinha & Garrison, 2020; Sinha & Garrison, 2019) offers one of the fastest implementation of pair-counts and is frequently used for calculating the two-point correlation function for large-scale-structure statistics in cosmology. We illustrate how one can combine the conceptual improvements suggested by Kerscher (2022) with the blazingly fast pair-counts from Corrfunc 1 . With this approach we are increasing the numerical accuracy of the pair-counts and we are reducing the systematic error in calculations of the two-point correlation function. DD(r) = ϱ 2 (x 1 , x 2 ) = ϱ (1 + ξ(|x 1 − x 2 |)) N N 1 X X N 2 i=1 1 [r,r+δ] (|x i − x j |) (2) j=1,j̸ = i is the normalised number of data–data pairs with a distance of r = |x i − x j | in the interval [r, r + δ]. The indicator function 1 A of the set A is defined as 1 A (q) = 1 if q ∈ A and 0 for q ∈ / A. Now we consider N r random points {r i }, r i ∈ W , i = 1, . . . , N r within the same sample geometry W as the data and define the normalised number of data-random pairs The two-point correlation function of the galaxy distribution is often used to constrain models of structure and galaxy formation and to estimate parameters of cosmological models. Observations give us the positions of galaxies in space. The two-point density 2 Pair-counts and estimators N DR(r) = (1) N r 1 X X 1 [r,r+δ] (|x i − r j |), N N r i=1 j=1 (3) N r N r X 1 X 1 [r,r+δ] (|r i − r j |), N r 2 i=1 j=1,j̸ = i (4) and similarly is the probability of finding two galaxies at x 1 and x 2 , where ϱ is the number density and ξ(r) is the two-point correlation function. In a homogeneous and isotropic point process ξ(r) only depends on the separation r = |x 1 − x 2 |. We use estimators to determine ξ(r) from a galaxy catalogue within a finite domain W ⊂ R 3 . In cosmology estimators based on random point sets are most commonly used. These rely on the data–data DD, data–random DR, and random–random RR pair-counts. RR(r) = the normalised number of random–random pairs. Landy & Szalay (1993) estimator is then given by b = DD(r) − 2DR(r) + RR(r) . ξ(r) RR(r) With DR and RR one performs a Monte-Carlo integration using random points (Kerscher, 2022, 1999). Replacing these random point sets with a low-discrepancy sequence of points results in a quasi Monte-Carlo integration. This leads to an improved scaling of the error that is almost proportional to 1/N q , where N q is the number of points from this low-discrepancy sequence. The (5) As an alternative to the random points we consider a low discrepancy sequence of points. We use two distinct low discrepancy sequence {q i } and {s i }, with q i , s i ∈ W , i = 1, . . . , N q (see also Dávila-Kurbán et al. 2021). With one sequence {q i } we can define DQ in full analogy to DR. To define QQ we need both sequences, In Sec. 2 we give the relevant definitions, in Sec. 3 we illustrate the preferable properties of the quasi Monte-Carlo integration with a numerical example, and in Sec. 4 we provide details on the implementation 2 and give some further comments. N q N q 1 X X QQ(r) = 1 [r,r+δ] (|q i − s j |). N q 2 i=1 j=1 (6) QQ is the quasi Monte-Carlo integration scheme, and correspondingly, RR is the standard Monte-Carlo integration scheme for the same six-dimensional volume integral (see 1 https://github.com/manodeep/Corrfunc 2 see https://github.com/makerscher/corracc for the code. 1" 2401.05943v1,"S O K: A NALYSIS T ECHNIQUES FOR W EB A SSEMBLY A P REPRINT Håkon Harnes Department of Computer Science Norwegian University of Science and Technology Trondheim, Norway haakaha@alumni.ntnu.no Donn Morrison Department of Computer Science Norwegian University of Science and Technology Trondheim, Norway donn.morrison@ntnu.no January 12, 2024 A BSTRACT WebAssembly is a low-level bytecode language that allows high-level languages like C, C++, and Rust to be executed in the browser at near-native performance. In recent years, WebAssembly has gained widespread adoption is now natively supported by all modern browsers. However, vulnerabilities in memory-unsafe languages, like C and C++, can translate into vulnerabilities in WebAssembly binaries. Unfortunately, most WebAssembly binaries are compiled from such memory-unsafe languages, and these vulnerabilities have been shown to be practical in real-world scenarios. WebAssembly smart contracts have also been found to be vulnerable, causing significant financial loss. Additionally, WebAssembly has been used for malicious purposes like cryptojacking. To address these issues, several analysis techniques for WebAssembly binaries have been proposed. In this paper, we conduct a comprehensive literature review of these techniques and categorize them based on their analysis strategy and objectives. Furthermore, we compare and evaluate the techniques using quantitative data, highlighting their strengths and weaknesses. In addition, one of the main contributions of this paper is the identification of future research directions based on the thorough literature review conducted. Keywords WebAssembly · Vulnerability Analysis · Browser Security · Cryptojacking · Smart Contracts 1 Introduction The Internet has come a long way since its inception and one of the key technologies that have enabled its growth and evolution is JavaScript. JavaScript, which was developed in the mid-1990s, is a programming language that is widely used to create interactive and dynamic websites. It was initially designed to enable basic interactivity on web pages, such as form validation and image slideshows. However, it has evolved into a versatile language that is used to build complex web applications. Today, JavaScript is one of the most popular programming languages in the world, currently being used by 98% of all websites [76]. Despite its popularity and versatility, JavaScript has some inherent limitations that have become apparent as web applications have grown more complex and resource-demanding. Specifically, JavaScript is a high-level, interpreted, dynamically typed language, which fundamentally limits its performance. Consequently, it is not suited for developing resource-demanding web applications. To address the shortcomings of JavaScript, several technologies, like ActiveX [8], NaCl [12], and asm.js [50], have been developed. However, these technologies have faced compatibility issues, security vulnerabilities, and performance limitations. WebAssembly was developed by a consortium including Mozilla, Microsoft, Apple, and Google, as a solution to the limitations of existing technologies. WebAssembly is designed as a safe, fast, and portable compilation target for highlevel languages like C, C++ , and Rust, allowing them to be executed with near-native performance in the browser. It has gained widespread adoption and is currently supported by 96% of all browser instances [33]. Moreover, WebAssembly is also being extended to desktop applications [51], mobile devices [56], cloud computing [23], blockchain Virtual Machines (VMs) [21, 19, 16], IoT [44, 47], and embedded devices [64]." 2401.05952v1,"LLM-as-a-Coauthor: The Challenges of Detecting LLM-Human Mixcase Chujie Gao 1,†,‡ , Dongping Chen 1,2,†,‡ , Qihui Zhang 1,†,‡ , Yue Huang 1,‡ , Yao Wan 2 , Lichao Sun 1 1 2 LAIR Lab, Lehigh University Huazhong University of Science and Technology {gaochujie1107, dongpingchen0612, maskhui1003}@gmail.com Abstract With the remarkable development and widespread applications of large language models (LLMs), the use of machine-generated text (MGT) is becoming increasingly common. This trend brings potential risks, particularly to the quality and completeness of information in fields such as news and education. Current research predominantly addresses the detection of pure MGT without adequately addressing mixed scenarios including AI-revised Human-Written Text (HWT) or human-revised MGT. To confront this challenge, we introduce mixcase, a novel concept representing a hybrid text form involving both machine-generated and human-generated content. We collected mixcase instances generated from multiple daily text-editing scenarios and composed M IX S ET , the first dataset dedicated to studying these mixed modification scenarios. We conduct experiments to evaluate the efficacy of popular MGT detectors, assessing their effectiveness, robustness, and generalization performance. Our findings reveal that existing detectors struggle to identify mixcase as a separate class or MGT, particularly in dealing with subtle modifications and style adaptability. This research underscores the urgent need for more fine-grain detectors tailored for mixcase, offering valuable insights for future research. Code and Models are available at https://github.com/Dongping-Chen/MixSet. 1 Introduction The rapid advancement of Large Language Models (LLMs) has ignited global discussions on the effective utilization of AI assistants (OpenAI, 2022, 2023b). As LLMs accurately interpret and execute human instructions, an increasing number of individuals integrate these powerful tools into their workflows. They utilize LLMs to revise Machine Generated Text (MGT) or enhance their Human Written Text (HWT), with applications ranging from fact-checking revisions in journalism (Guerra, 2023) to storytelling enhancements in the gaming industry (AIContentfy, 2023). Despite its varied applications, the usage of MGT presents potential risks, stirring public concerns over various forms of misuse. These include the undermining of journalistic integrity and quality (Christian, 2023), the reproduction and amplification of biases (Sison et al., 2023), plagiarism among students (Heavenarchive, 2023), and disruptions in trust towards scientific knowledge (Else, 2023). Such misuse of machine-generated text has garnered serious attention and concern from experts across † These authors contributed equally. The order was determined by rolling dice: Chujie Gao rolled a 6, Dongping Chen rolled a 4, Qihui Zhang rolled a 1. ‡ Visting Students to LAIR Lab, Lehigh University. Preprint. Under review." 2401.05961v1,"Securing an Application Layer Gateway: An Industrial Case Study Carmine Cesarano, Roberto Natella Università degli Studi di Napoli Federico II, Italy {carmine.cesarano2, roberto.natella}@unina.it Abstract—Application Layer Gateways (ALGs) play a crucial role in securing critical systems, including railways, industrial automation, and defense applications, by segmenting networks at different levels of criticality. However, they require rigorous security testing to prevent software vulnerabilities, not only at the network level but also at the application layer (e.g., deep traffic inspection components). This paper presents a vulnerabilitydriven methodology for the comprehensive security testing of ALGs. We present the methodology in the context of an industrial case study in the railways domain, and a simulation-based testing environment to support the methodology. Index Terms—Application Layer Gateway, Security Testing, Virtualized Testing Environment I. I NTRODUCTION The interconnection of diverse applications and networks is essential for building complex systems. Application Layer Gateways (ALGs) are responsible for handling the communication between different networks, with different levels of criticality, and for performing security controls. In particular, ALGs are crucial in critical domains such as railways, avionics, and defense. In these domains, network segments for industrial control (e.g., TDRP traffic in the railways domains) should be protected from attacks arising from other network segments (e.g., multimedia traffic over HTTP, FTP, or XMPP); at the same time, communication between network segments should be allowed for specific cases (e.g., for diagnostic purposes). The ALG performs security controls, by analyzing the traffic at the application layer to enforce security policies (e.g., based on the contents and on the authors of the data). Given the role of ALGs in such critical domains, there is a need for methodologies for rigorous security testing, in order to prevent software vulnerabilities that could allow attackers to escape security controls. Security standards, such as Common Criteria [1], define security functional requirements (SFR) catalogs for several software categories, including ALGs [2]. The same standard also defines the security assurance requirements (SARs) for specific types of software. Although SARs can be useful to assess software security, they are broadly expressed and lack completeness for ALG systems [2]. Furthermore, in the literature, no comprehensive methodologies have been proposed for the assessment of ALG systems. Existing toolkits and techniques focus on network layer attacks (e.g., IP and port scanning [3], IP and MAC spoofing, or frameworks like BurpSuite [4] and ZAP [5]), leaving out the application layer. In this work, we present a novel methodology for assessing the security of ALG systems. Our proposal offers a com- prehensive approach that addresses not only network-layer vulnerabilities but also delves into the application layer, where ALGs mainly operate. For example, our tests include attack scenarios involving techniques like fuzzing and stress testing specifically tailored to trigger vulnerabilities at the application layer. The contributions of this paper include: We conduct an in-depth analysis of potential ALG system weaknesses and propose an assessment methodology for their systematic identification. • We develop a simulation-based testing environment for performing ALG systems evaluations, improving the test reproducibility and system observability. • We present a practical case study in the railways domain, demonstrating the application of our methodology to assess the security of an ALG system built on opensource components. • The proposed methodology offers systematic guidance for assessing ALG products, covering network and application layers in a holistic testing framework. The methodology is adaptable to different ALG systems, while the practical case study is meant to demonstrate its applicability in real systems. In the following of this paper, Section II provides an overview of related work concerning ALGs, Section III presents the proposed methodology, Section IV introduces the case study, Section V outlines the experimental analysis, and Section VI summarizes findings and outlines future research directions. II. R ELATED WORK Many commercial and open-source systems have been proposed for ALGs. Most notably, GoThings [6] proposes an extensible architecture that facilitates interconnectivity between different messaging protocols such as REST, CoAP, MQTT, and XMPP. However, even if these systems address connectivity challenges in the IoT landscape, they are not primarily oriented toward the enforcement of security policies. Other products, instead, are specifically designed to ensure security policies in communication. For example, we can mention Multiple Independent Levels of Security (MILS) kernels [7], a high assurance architecture for handling separate execution environments with different classification levels and controlled information flow among them. MILS security guards [8] are specialized components in secure MILS kernel communication, and can be considered as an ALG." 2401.05963v1,"A uniform non-linear subdivision scheme reproducing polynomials at any non-uniform grid Sergio López-Ureña ∗ Dept. de Matemàtiques, Universitat de València, Doctor Moliner Street 50, 46100 Burjassot, Valencia, Spain. Abstract In this paper, we introduce a novel non-linear uniform subdivision scheme for the generation of curves in R n , n ≥ 2. This scheme is distinguished by its capacity to reproduce second-degree polynomial data on non-uniform grids without necessitating prior knowledge of the grid specificities. Our approach exploits the potential of annihilation operators to infer the underlying grid, thereby obviating the need for end-users to specify such information. We define the scheme in a non-stationary manner, ensuring that it progressively approaches a classical linear scheme as the iteration number increases, all while preserving its polynomial reproduction capability. The convergence is established through two distinct theoretical methods. Firstly, we propose a new class of schemes, including ours, for which we establish C 1 convergence by combining results from the analysis of quasilinear schemes and asymptotically equivalent linear non-uniform non-stationary schemes. Secondly, we adapt conventional analytical tools for non-linear schemes to the non-stationary case, allowing us to again conclude the convergence of the proposed class of schemes. We show its practical usefulness through numerical examples, showing that the generated curves are curvature continuous. Keywords: Subdivision schemes, polynomial reproduction, non-uniform, non-stationary, quasilinear, annihilation operators, asymptotically equivalent. 1. Introduction Recursive subdivision is a well-established technique for creating smooth geometric models from discrete initial data. It has found extensive application in Computer-Aided Design (CAD) thanks to its exceptional performance and straightforward implementation (e.g., see Dyn (1992); Ma (2005)). In this paper, our focus is on generating curves in R n , n ≥ 2. To achieve this, we will employ the following type of subdivision schemes. Definition 1 (Vector-valued subdivision scheme). For a given initial data f 0 ∈ ℓ(Z, R n ), so that f i 0 ∈ R n ∀i ∈ Z, more data is generated by the recursive formula f k+1 = S k f k , k ∈ N 0 := N ∪ {0}, where S k : ℓ(Z, R n ) −→ ℓ(Z, R n ) is a subdivision operator defined as (S k f ) 2i = Ψ k 2i (f i−p , . . . , f i+p+1 ), (S k f ) 2i+1 = Ψ k 2i+1 (f i−p , . . . , f i+p+1 ), i ∈ Z, f ∈ ℓ(Z, R n ), for some p ∈ N 0 and some Ψ ki : (R n ) 2p+2 −→ R n , i ∈ Z. The subdivision scheme is identified as the sequence of subdivision operators S = {S k } k∈N 0 . The scheme is linear iff each Ψ ki is a linear function. The scheme is uniform iff Ψ k 2i = Ψ k 0 and Ψ k 2i+1 = Ψ k 1 , ∀i ∈ Z, ∀k ∈ N 0 . The scheme is stationary iff Ψ ki = Ψ 0 i , ∀i ∈ Z, ∗ Corresponding author Email address: sergio.lopez-urena@uv.es (Sergio López-Ureña) Preprint submitted to arXiv January 12, 2024" 2401.05967v1,"Block-Diagonal Orthogonal Relation and Matrix Entity for Knowledge Graph Embedding Yihua Zhu 1,2 Hidetoshi Shimodaira 1,2 1 2 Kyoto University RIKEN zhu.yihua.22h@st.kyoto-u.ac.jp, shimo@i.kyoto-u.ac.jp Abstract The primary aim of Knowledge Graph embeddings (KGE) is to learn low-dimensional representations of entities and relations for predicting missing facts. While rotation-based methods like RotatE (Sun et al., 2019) and QuatE (Zhang et al., 2019) perform well in KGE, they face two challenges: limited model flexibility requiring proportional increases in relation size with entity dimension, and difficulties in generalizing the model for higher-dimensional rotations. To address these issues, we introduce OrthogonalE, a novel KGE model employing matrices for entities and block-diagonal orthogonal matrices with Riemannian optimization for relations. This approach enhances the generality and flexibility of KGE models. The experimental results indicate that our new KGE model, OrthogonalE, is both general and flexible, significantly outperforming state-of-the-art KGE models while substantially reducing the number of relation parameters. Our code is available at OrthogonalE 1 Introduction The fundamental elements of knowledge graphs (KGs) are factual triples, each represented as (h, r, t), indicating a relationship r between head entity h and tail entity t. Notable examples include Freebase (Bollacker et al., 2008), Yago (Suchanek et al., 2007), and WordNet (Miller, 1995). KGs have practical applications in diverse fields such as question-answering (Hao et al., 2017), information retrieval (Xiong et al., 2017), recommender systems (Zhang et al., 2016), and natural language processing (Yang and Mitchell, 2019), garnering considerable interest in academic and commercial research. Addressing the inherent incompleteness of KGs, link prediction has become a pivotal area of focus. Recent research (Bordes et al., 2013; Trouillon et al., 2016) has extensively leveraged Knowledge Graph Embedding (KGE) techniques, aiming to ... ... Figure 1: Fundamental operations and inherent challenges of rotation-based KGE models. learn compact, low-dimensional representations of entities and relations. These approaches, marked by scalability and efficiency, have shown proficiency in modeling and deducing KG entities and relations from existing facts. Recently, rotation-based KGE methods have achieved notable success in the field. For instance, RotatE (Sun et al., 2019) conceptualizes relations as 2D rotations, while QuatE (Zhang et al., 2019) employs 3D rotations. Essentially, as illustrated in Fig. 1 , both operate by multiplying the relation matrix e 1 R ∈ R n×n composed of numerous small rotation blocks B i ∈ R d×d (RotatE: R 2×2 , QuatE: R 3×3 ) with the head entity vector e 1 h ∈ R n . Nevertheless, these approaches encounter two primary issues as shown in Fig. 1. First, the model’s lack of flexibility necessitates increasing the overall relation matrix (e 1 R ∈ R n×n → e 2 R ∈ R (n+l)×(n+l) ) to meet entity dimension requirements (e 1 h ∈ R n → e 2 h ∈ R n+l ) for better represent entities, which often leads to redundancy and inefficiency in representing relations. Second, exploring high-dimensional rotational KGE models is challenging due to the significant computational de-" 2401.05982v3,"A tree-based varying coefficient model Henning Zakrisson ∗† Mathias Lindholm ∗ January 17, 2024 Abstract The paper introduces a tree-based varying coefficient model (VCM) where the varying coefficients are modelled using the cyclic gradient boosting machine (CGBM) from Delong et al. (2023). Modelling the coefficient functions using a CGBM allows for dimension-wise early stopping and feature importance scores. The dimension-wise early stopping not only reduces the risk of dimension-specific overfitting, but also reveals differences in model complexity across dimensions. The use of feature importance scores allows for simple feature selection and easy model interpretation. The model is evaluated on the same simulated and real data examples as those used in Richman and Wüthrich (2023), and the results show that it produces results in terms of out of sample loss that are comparable to those of their neural network-based VCM called LocalGLMnet. Keywords: Generalised linear models, Multivariate gradient boosting, Feature selection, Interaction effects, Early stopping 1 Introduction Many machine learning models that yield accurate results and high predictive power struggle with another important factor – interpretability. This is especially a problem for deep learning models, see e.g. Marcinkevičs and Vogt (2023). One way to address this is to use a model structure that is inherently interpretable, such as a generalised linear model (GLM). However, without manual feature engineering, GLMs can not handle non-linear effects and interactions between features. A more flexible model family that retains some of the interpretability of GLMs are varying-coefficient models (VCMs), introduced in Hastie and Tibshirani (1993). In a VCM, the regression coefficients are replaced by feature-dependent regression coefficient functions, which can be of any, possibly non-linear, functional form. A recent example of a VCM is the LocalGLMnet model introduced in Richman and Wüthrich (2023), where the regression coefficient functions are modeled using a feed-forward neural network (FFNN). This creates a locally interpretable machine learning model, as those discussed in e.g. (Marcinkevičs and Vogt, 2023, Section 4.2.6). The LocalGLMnet shows promising accuracy on both simulated and real-world data, while also allowing for more insightful feature selection and local interpretability. Other examples of VCMs combined with neural networks are e.g. Alvarez Melis and Jaakkola (2018); Al-Shedivat et al. (2020); Thompson et al. (2023), and these are sometimes referred to as “contextual” models. As an alternative to using feed-forward neural network (FFNN)-based models for the coefficient functions, tree-based models are generally easier to interpret, and they are often easier to tune and faster to train. In Wang and Hastie (2014), this idea is introduced, focusing on linear models and gradient boosting machines (GBMs) using vector-valued trees, i.e. trees ∗ † Department of Mathematics, Stockholm University Corresponding author: zakrisson@math.su.se 1" 2401.05998v1,"Combating Adversarial Attacks with Multi-Agent Debate Steffi Chern * Zhen Fan * Andy Liu * Carnegie Mellon University {steffic,zhenfan,andyliu}@andrew.cmu.edu Abstract While state-of-the-art language models have achieved impressive results, they remain susceptible to inference-time adversarial attacks, such as adversarial prompts generated by red teams (Ganguli et al., 2022). One approach proposed to improve the general quality of language model generations is multi-agent debate, where language models self-evaluate through discussion and feedback (Du et al., 2023). We implement multi-agent debate between current state-of-the-art language models and evaluate models’ susceptibility to red team attacks in both single- and multi-agent settings. We find that multi-agent debate can reduce model toxicity when jailbroken or less capable models are forced to debate with non-jailbroken or more capable models. We also find marginal improvements through the general usage of multiagent interactions. We further perform adversarial prompt content classification via embedding clustering, and analyze the susceptibility of different models to different types of attack topics. 1 1 Introduction Previous research has shown that large language models (LLMs) can be vulnerable to attacks at both training and inference time. Some examples of adversarial methods that have successfully elicited improper LLM generations include data poisoning (Du et al., 2022) and adversarially generated prompts (Zou et al., 2023). Such attacks aim to manipulate the model and cause it to generate unsafe outputs that will be harmful for users. Improving language models’ robustness to such adversarial prompts is therefore a key aspect of making such models safe for real-world deployment. Multi-agent debate is a technique where multiple instances of a language model critique each others’ responses, which can be seen as an extension of 1 Code can be found at https://github.com/andyjliu/ llms-course-project. *equal contribution previous work such as chain-of-thought prompting and self-refinement. Previous work has used this to improve language models’ factuality and reasoning, as well as their performance on downstream tasks such as evaluation. It seems reasonable that some amount of self-discussion could allow a language model to recognize potential downstream harms caused by its generation and revise its response. However, if an LLM “agent” outputs a toxic response, it could also poison the responses of other agents in the debate, leading to a more toxic output or no significant improvement in model toxicity. For this reason, while multi-agent debate has proven successful in other applications, it is important to study the debate dynamics specifically amongst LLMs prompted adversarially. In this way, we can not only analyze its efficacy in improving models’ adversarial robustness, but also validate that this new technique does not introduce new risks at inference time. In this work, we implement multi-agent debate between LLMs in the Llama-2 and GPT-3 families, using prompt engineering to simulate the effects of having poisoned models participate in a multiagent debate. We then probe models’ responses to prompts known to elicit toxic responses in singleagent, self-refine, and multi-agent debate settings. We find that models equipped with multi-agent debate at inference time generally produce less toxic responses to adversarial prompts, even for models that have previously been fine-tuned with methods such as reinforcement learning from human feedback. We also find that multi-agent debate outperforms methods like self-refinement in cases where an initial model is poisoned. This work motivates future exploration into multi-agent debate dynamics between LLMs and whether they can improve robustness in more realistic environments." 2401.05999v1,"Boosting Mixed-Initiative Co-Creativity in Game Design: A Tutorial SOLANGE MARGARIDO, LICÍNIO ROQUE, PENOUSAL MACHADO, and PEDRO MARTINS, Uni- versity of Coimbra, CISUC, Department of Informatics Engineering, Portugal In recent years, there has been a growing application of mixed-initiative co-creative approaches in the creation of video games. The rapid advances in the capabilities of artificial intelligence (AI) systems further propel creative collaboration between humans and computational agents. In this tutorial, we present guidelines for researchers and practitioners to develop game design tools with a high degree of mixed-initiative co-creativity (MI-CCy). We begin by reviewing a selection of current works that will serve as case studies and categorize them by the type of game content they address. We introduce the MI-CCy Quantifier, a framework that can be used by researchers and developers to assess co-creative tools on their level of MI-CCy through a visual scheme of quantifiable criteria scales. We demonstrate the usage of the MI-CCy Quantifier by applying it to the selected works. This analysis enabled us to discern prevalent patterns within these tools, as well as features that contribute to a higher level of MI-CCy. We highlight current gaps in MI-CCy approaches within game design, which we propose as pivotal aspects to tackle in the development of forthcoming approaches. CCS Concepts: • Applied computing → Computer games; • Human-centered computing → Collaborative interaction; • General and reference → Surveys and overviews. Additional Key Words and Phrases: Mixed-initiative, human-AI co-creativity, co-creative systems, video games 1 INTRODUCTION Mixed-initiative and co-creativity are two increasingly prominent subjects within the research areas of human-computer interaction and computational creativity. As AI systems are becoming increasingly powerful and sophisticated, we are shifting from the view of AI as a tool towards AI as an active participant. Thus, there is a growing concern among researchers in exploring how we can benefit from human-AI partnerships. Particularly, there has been extensive research into the interaction between humans and computational systems to foster a collaborative environment where both agents exhibit initiative and proactivity, hopefully enhancing the creative process [60]. As stated by Davis[17], “human-computer co-creativity describes a situation in which the human and the computer improvise in real-time to generate a creative product”. Mixed-initiative systems were defined in 1970 by Carbonell [12] as those “in which both humans and machines can make contributions to a problem solution, often without being asked explicitly”. More recently, Yannakakis et al. [60] introduced the term mixed-initiative co-creation, describing it as “the task of creating artifacts via the interaction of a human initiative and a computational initiative”, where they emphasize the proactivity of both parties. Although the use of different terms to describe mixed-initiative may cause some ambiguity, the addition of co-creativity, or an alternative term such as human-computer co-creativity, can serve as a highlight of the close collaboration among the agents and the creative nature of the process and its resulting output. Throughout this paper, we refer to mixed-initiative co-creativity (MI-CCy) as we are focusing on a strong creative partnership between humans and computers. Video games are a domain of particular interest for the application of mixed-initiative co-creative approaches. As the market grows and the players’ expectations increase, so does the time, money, and effort needed to create games with large amounts of unique content that meet the expected quality [6, 53, 59]. For this reason, several support tools (e.g. level editors or game engines) have been developed to streamline game development processes [60]. Along with these, there has been major research and development of tools to automate content generation, known as procedural Authors’ address: Solange Margarido, solange@dei.uc.pt; Licínio Roque, lir@dei.uc.pt; Penousal Machado, machado@dei.uc.pt; Pedro Martins, pjmm@ dei.uc.pt, University of Coimbra, CISUC, Department of Informatics Engineering, Coimbra, Portugal. 1" 2401.06003v1,"TRIPS: Trilinear Point Splatting for Real-Time Radiance Field Rendering Linus Franke, Darius Rückert, Laura Fink and Marc Stamminger Visual Computing Erlangen, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany {firstname.lastname}@fau.de ADOP 3D Gaussians Ours Ground Truth Figure 1: Previous point-based radiance field rendering methods provide great results in many cases, but renderings can be aliased and incomplete (ADOP [RFS22] (left), missing parts of the bike’s tire), or overblurred (3D Gaussian Splatting [KKLD23] (middle), missing fine grass details). Our approach combines the advantages of both to render crisp, complete, and alias-free images. Abstract Point-based radiance field rendering has demonstrated impressive results for novel view synthesis, offering a compelling blend of rendering quality and computational efficiency. However, also latest approaches in this domain are not without their shortcomings. 3D Gaussian Splatting [KKLD23] struggles when tasked with rendering highly detailed scenes, due to blurring and cloudy artifacts. On the other hand, ADOP [RFS22] can accommodate crisper images, but the neural reconstruction network decreases performance, it grapples with temporal instability and it is unable to effectively address large gaps in the point cloud. In this paper, we present TRIPS (Trilinear Point Splatting), an approach that combines ideas from both Gaussian Splatting and ADOP. The fundamental concept behind our novel technique involves rasterizing points into a screen-space image pyramid, with the selection of the pyramid layer determined by the projected point size. This approach allows rendering arbitrarily large points using a single trilinear write. A lightweight neural network is then used to reconstruct a hole-free image including detail beyond splat resolution. Importantly, our render pipeline is entirely differentiable, allowing for automatic optimization of both point sizes and positions. Our evaluation demonstrate that TRIPS surpasses existing state-of-the-art methods in terms of rendering quality while maintaining a real-time frame rate of 60 frames per second on readily available hardware. This performance extends to challenging scenarios, such as scenes featuring intricate geometry, expansive landscapes, and auto-exposed footage. The project page is located at: https://lfranke.github.io/trips CCS Concepts • Computing methodologies → Rendering; Image-based rendering; Reconstruction; 1. Introduction Novel view synthesis methods have been a significant driver for computer graphics and vision, as they have revolutionized the way we perceive and interact with 3D scenes. Many of these methods rely on explicit representations, such as meshes or points. Typically, the explicit models are derived from 3D reconstruction processes and can be efficiently rendered through rasterization, which aligns well with contemporary GPU capabilities. Nevertheless, these reconstructed models often fall short of perfection and necessitate additional steps to mitigate artifacts." 2401.06004v1,"Pressure waves from air gun bubbles: a numerical analysis based on Finite Volume Method Shi-Ping Wang (王诗平) a, b , Hang Geng (耿航) a, b , Shuai Zhang (张帅) a, b , Si-Wei Wang (王思伟) c * a College of Shipbuilding Engineering, Harbin Engineering University, Harbin, 150001, China b Nanhai Institute of Harbin Engineering University, Sanya, 572024, China c Yichang Testing Technique Research Institute, Yichang , 443003, China ABSTRACT: The pressure wave emitted from the air gun contains many frequencies, among which the low-frequency waves are desirable for exploration and imaging, while the high-frequency waves need to be suppressed as they are harmful to marine species. The high-frequency waves originate from the fast oscillations of the flow during the release of the air, such as the impingement of the gas jet into the liquid, the expansion of the air gun bubble, and the interaction between the air gun body and the bubble. However, those dynamic and the emitted waves are adjustable by the special design of the air guns. To analyze the underlying relations, we present a numerical study with a compressible air gun bubble model using the volume of fluid (VOF) approach combined with the finite volume method (FVM) implemented in STAR-CCM+. The venting process of an air gun is investigated to reveal the influence of the air gun body. The results show that air gun pressure for the far field is mainly proportional to the expansion acceleration of the whole gas. Our results also indicate that the opening and chamber shape of the air gun affects the gas expansion acceleration, which influences the first peak of the pressure wave significantly. The larger the opening is, the faster the gas is released, the greater the amplitude of the first peak is. The larger the chamber length/diameter ratio, the slower the gas is released and the lower the amplitude of the first peak. Keywords: Air gun bubble; Pressure wave; Volume of fluid method. 1. Introduction The seismic air guns are the main acoustic wave source in ocean geological prospecting 1,2 . The air gun source is usually filled with high-pressure gas, which is instantly released into the ocean and creates an oscillating bubble emitting sound waves 3,4 . Such signals are over quite a wide range of frequencies and are reflected by various geological layers when propagating to the seafloor 5,6 . The principle can be seen * Corresponding author. E-mail addresses: zhangshuai8@hrbeu.edu.cn 1" 2401.06009v1,"Sea ice detection using concurrent multispectral and synthetic aperture radar imagery. Martin S J Rogers a* , Maria Fox a , Andrew Fleming a , Louisa van Zeeland b , Jeremy Wilkinson a , and J. Scott Hosking a,b a British Antarctic Survey, High Cross, Madingley Rd, Cambridge CB3 0ET b The Alan Turing Institute, British Library, 96 Euston Rd., London NW1 2DB Corresponding author*: marrog@bas.ac.uk Author email addresses: marfox@bas.ac.uk, ahf@bas.ac.uk, lvanzeeland@turing.ac.uk, jpw28@bas.ac.uk, jask@bas.ac.uk 1" 2401.06014v1,"Creation of a tweezer array for cold atoms utilizing a generative neural network Zejian Ren, 1, ∗ Xu Yan, 2, ∗ Kai Wen, 1 Huijin Chen, 1 Elnur Hajiyev, 2 Chengdong He, 2 and Gyu-Boong Jo 1, 2, † 2 1 Microelectronics Thrust, The Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China Department of Physics, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong, China ∗ These authors contributed equally. † Corresponding author email: gbjo@ust.hk U-net model Prediction SLM Training re Introduction An optical tweezer, a highly focused laser beam, have found applications in a wide range of fields, including biology, chemistry, and material science [1]. In recent years, optical tweezers have also been widely exploited in quantum science [2], where they have enabled the control and manipulation of individual atoms [3, 4] and molecules [5] in the quantum regime with unprecedented precision. The ability to control quantum systems at the individual level is crucial for the development of quantum technologies, such as quantum computing [6], quantum simulation [7] and quantum sensing [8]. To date, the creation of tweezer arrays using the spatial light modulator (SLM) has been mostly achieved through classical algorithms like the Gerchberg-Saxton (GS) algorithm [9] and its variations [10]. However, these methods often face a trade-off between the quality of reconstruction and the time required for calculations. Moreover, the time-consuming nature of these algorithms limits their potential application in quantum control with dynamic shot-to-shot re-configuration, as the quantum system’s coherence time is finite [11]. Recently, the emergence of artificial intelligence presents a new opportunity to optimize control [12, 13], analysis [14–19] and monitoring [20] of quantum experiments, while also providing a new approach to holography [21]. In this work, we utilize the power of artificial intelligence and propose a simple deep learning approach that utilizes generative neural networks to generate atom arrays on demand based on the U-net model [22]. Our work offers an effective way to advance quantum control through the use of machine learning, which holds the potential to drive dynamic control in optical-tweezer-based systems. In the typical setup, a static optical pattern is generated by utilizing the SLM, resulting in the formation of an optical tweezer array for neutral atoms. To achieve this, a phase-only hologram (POH) needs to be loaded into the SLM. This approach allows for the generation of arbitrary tweezer geometries, providing flexibility and control. However, there is a trade-off between the calculation time and the reconstruction time associated with al n tic ctio op constru Optical tweezers have become essential tools for dynamically manipulating objects, ranging from microspheres or biological molecules to neutral atoms. In this study, we demonstrate the creation of tweezer arrays using a generative neural network, which allows for the trapping of neutral atoms with tunable atom arrays. We have successfully loaded cold strontium atoms into various optical tweezer patterns generated by a spatial light modulator (SLM) integrated with generative models. Our approach shortens the process time to control the SLM wtih minimal time delay, eliminating the need for repeated re-optimization of the hologram for the SLM. paired tweezzer dataset At om FIG. 1. Overview of the scheme for producing an atom array based on deep learning To trap 88 Sr atoms, a optical tweezer array is utilized. The Spatial Light Modulator (SLM) is controlled by a generative neural network that is based on the U-net model. This generative model is trained using a hologram dataset consisting of tweezer images and corresponding holograms for the SLM. Various tweezer configurations can be created on demand. this method. One of the challenges with this technique is the need to re-optimize the phase-only hologram whenever a new tweezer pattern is required. This re-optimization step can be time-consuming and may hinder the real-time operation of the atom array system. To address this limitation, our objective is to leverage a trained generative neural network. By employing this neural network, we aim to bypass the re-optimization process and realize the generation of real-time atom arrays. By utilizing the trained generative neural network, we anticipate significant improvements in the efficiency and speed of generating atom arrays. This approach would eliminate the need for repeated re-optimization of the phase-only hologram, saving valuable time and resources. Ultimately, our goal is to enable the realization of real-time atom arrays with enhanced flexibility and control, opening up new possibilities for research and practical applications in the field of neutral atom manipulation. General idea Fig. 1 illustrates the basic concept of using a neural network model to create a tweezer atom array. Initially, we create two sets of data comprising the" 2401.06018v2,"Implications of comprehensive nuclear and astrophysics data on the equations of state of neutron star matter Sk Md Adil Imam 1,2 , ∗ Tuhin Malik 3 , † Constança Providência 3 , ‡ and B. K. Agrawal 1,2§ 1 Saha Institute of Nuclear Physics, 1/AF Bidhannagar, Kolkata 700064, India. Homi Bhabha National Institute, Anushakti Nagar, Mumbai 400094, India. and 3 CFisUC, Department of Physics, University of Coimbra, 3004-516 Coimbra, Portugal (Dated: January 25, 2024) 2 The equations of state (EoSs) governing neutron star (NS) matter obtained for both non-relativistic and relativistic mean-field models are systematically confronted with a diverse set of terrestrial data and astrophysical observations within the Bayesian framework. The terrestrial data, spans from bulk properties of finite nuclei to the heavy-ion collisions, constrain the symmetric nuclear matter EoS and the symmetry energy up to twice the saturation density (ρ 0 = 0.16 fm −3 ). The astrophysical observations encompass the NS radius, the tidal deformability, and the lower bound on maximum mass. Three distinct posterior distributions of EoSs are generated by gradually updating the priors with different constraints: (i) only the maximum NS mass, (ii) incorporating additional terrestrial data, (iii) combining both the terrestrial data and astrophysical observations. These distributions are then compared using the Kullback-Liebler divergence which highlights the significant constraints imposed on the EoSs by the currently available lower bound of NS maximum mass and terrestrial data. The remaining astrophysical observations marginally refine the EoS within the density range ∼ 2-3ρ 0 . It is observed that the non-relativistic mean field model yields stiffer EoS for the symmetric nuclear matter while softer density dependent symmetry energy compared to the relativistic one when all the data/observations are considered. I. INTRODUCTION Determining the unified equation of state (EoS) accurately requires inputs from both nuclear physics experiments and astrophysical observations. The experimental data on heavy-ion collisions (HIC) and bulk properties of finite nuclei confine the behavior of the EoS at low densities (ρ ≤ 2ρ 0 ). These data specifically constrain the EoS for symmetric nuclear matter (SNM) and the density-dependent symmetry energy, crucial elements for determining the EoS of neutron star matter [1–9].The astrophysical observations such as neutron star radius, tidal deformability, and maximum mass further constrain the EoS at high densities [10–15].The radius and tidal deformability parameter of neutron stars are sensitive to the EoS. They have been deduced from the gravitational wave events GW170817 and GW190425 observed using the Advanced- LIGO [16] and Advanced-Virgo detectors [17]. In particular, the gravitational waves associated to the event GW170817 stemmed from a binary neutron star (BNS) merger with component masses ranging from 1.17 to 1.6 M ⊙ [18, 19] has sparked numerous theoretical investigations into the neutron star (NS) properties [7, 20–26]. Future observations of coalescing BNS events by detectors like LIGO-Virgo-KAGRA, Einstein Telescope [27], and Cosmic Explorer [28] are likely to occur more frequently, enabling a more precise determination of the EoS [29–32]. The Neutron star Interior Composition Explorer (NICER) also offers complementary information on the NS properties [33, 34]. The nuclear matter parameters are the key quantities that ∗ Electronic address: skmdadilimam@gmail.com † Electronic address: tm@uc.pt ‡ Electronic address: cp@uc.pt § Electronic address: bijay.agrawal@saha.ac.in determine the EoS. The combined constraints from the bulk properties of finite nuclei and NS observable has been employed to constrain the nuclear matter parameters which are the expansion coefficients in the Taylor model for the EoS [35]. The finite nuclei constraints are encoded through a few low order nuclear matter parameters treating them independent of each other. The NS observable considered are the radius, 10.62 km < R 1.4 < 12.83 km [36], the dimensionless tidal deformability Λ 1.4 ≤800 [20, 37] and lower limit of the maximum mass imposed by the NS PSR J0348 - 0432 with a mass 2.01 ± 0.04 M ⊙ [38, 39]. It is demonstrated that these constraints limit the multidimensional space of few higher order nuclear matter parameters. It may be emphasized that the astrophysical inputs employed in Ref.[35] have undergone significant revision. Two different groups of NICER have reported neutron star’s mass and radius simultaneously for PSR J0030+0451 with radius R = 13.02 +1.24 −1.06 km for mass +0.15 M = 1.44 −0.14 M ⊙ [40] and R = 12.71 +1.14 −1.19 km for M = 1.34 +0.15 −0.16 M ⊙ [41]. Recently, another (heavier) pulsar PSR J0740+6620, R = 13.7 +2.6 −1.5 km with M = 2.08±0.07 M ⊙ [42] and R = 12.39 +1.30 km with M = 2.072 +0.067 −0.98 −0.066 M ⊙ [43] have been reported. The improvement in the precision of astrophysical observation and the terrestrial data has triggered the search for the universal EoS . A Bayesian inference technique has been employed [44] to combine data from astrophysical multi-messenger observations of neutron stars [20, 26, 40–43, 45–47], high-energy heavy-ion collisions involving gold nuclei [48, 49] and microscopic nuclear theory calculations [50–55] to constrain the EoS of dense matter. The microscopic input was extended up to 1.5 times the nuclear saturation density (ρ 0 ) for the β-EoS derived from chiral effective field theory (χEFT). The nuclear experimental data includes the symmetry energy and symmetric nuclear matter pressure extracted from the FOPI [48] and the ASY-EoS [49] experiments, respec-" 2401.06035v1,"RAVEN: Rethinking Adversarial Video Generation with Efficient Tri-plane Networks Partha Ghosh † , Soubhik Sanyal † , Cordelia Schmid ∗1 , Bernhard Schölkopf 1†‡ † Max Planck Institute for intelligent Systems, Tübingen, Germany ∗ Inria, École normale supérieure, CNRS, PSL Research University ‡ ELLIS Institute Tübingen, Germany {pghosh, soubhik.sanyal, bernhard.schoelkopf}@tuebingen.mpg.de, cordelia.schmid@inria.fr Abstract We present a novel unconditional video generative model designed to address long-term spatial and temporal dependencies. To capture these dependencies, our approach incorporates a hybrid explicit-implicit tri-plane representation inspired by 3D-aware generative frameworks developed for three-dimensional object representation and employs a singular latent code to model an entire video sequence. Individual video frames are then synthesized from an intermediate tri-plane representation, which itself is derived from the primary latent code. This novel strategy reduces computational complexity by a factor of 2 as measured in FLOPs. Consequently, our approach facilitates the efficient and temporally coherent generation of videos. Moreover, our joint frame modeling approach, in contrast to autoregressive methods, mitigates the generation of visual artifacts. We further enhance the model’s capabilities by integrating an optical flow-based module within our Generative Adversarial Network (GAN) based generator architecture, thereby compensating for the constraints imposed by a smaller generator size. As a result, our model is capable of synthesizing high-fidelity video clips at a resolution of 256 × 256 pixels, with durations extending to more than 5 seconds at a frame rate of 30 fps. The efficacy and versatility of our approach are empirically validated through qualitative and quantitative assessments across three different datasets comprising both synthetic and real video clips. 0 Sec 0.8 Sec 1.7 Sec 2.6 Sec 3.4 Sec 4.3 Sec 0 Sec 0.8 Sec 1.7 Sec 2.6 Sec 3.4 Sec 4.3 Sec Figure 1. RAVEN can generate long-term spatially and temporally coherent videos. For visualization purposes, we only show 6 equally spaced frames from a video clip of length 5.3 seconds here. as image generation due to two primary challenges: the inherent complexity of video data and the intensive computational demand video processing entails. In the realm of unconditional video generation, most existing approaches leverage high-performing image generation models, creating videos in a sequential, autoregressive manner within the latent space. This technique, while innovative, is widely accepted to often result in accumulation of error over the regression chain, often known as exposure bias [1, 7, 19, 21]. Image generators often are imperfect, even when they are carefully trained with underlying 3D structure in narrow domain [12]. This further complicates building autoregressive models that use pretrained image generators. Content-guided video generation, on the other hand, relies on additional modalities and is depen- 1. Introduction The field of video generation has made remarkable progress in recent years, with the aim of generating high-quality content-guided videos that are both realistic and efficient. This progress, however, has not reached the same heights 1 Equal contribution. 1" 2401.06052v1,"Fast High Dynamic Range Radiance Fields for Dynamic Scenes † † Guanjun Wu 1⋆ , Taoran Yi 2⋆ , Jiemin Fang 2 , Wenyu Liu 2 , Xinggang Wang 2 1 School of CS, Huazhong University of Science and Technology 2 School of EIC, Huazhong University of Science and Technology {guajuwu, taoranyi, liuwy, xgwang}@hust.edu.cn jaminfong@gmail.com Multi Exposure Dynamic Images 𝑡𝑡 HDR-HexPlane Depth LDR Novel View LDR Novel View Tonemapped HDR Novel View HDR Novel View Figure 1. Our model is capable of synthesizing novel viewpoint images in dynamic scenes by capturing images with different exposure values at different time points. Additionally, it can seamlessly combine images with varying exposures and produce high dynamic range (HDR) images. With the tone mapping function applied, a better color balance is achieved, enhancing the overall visual quality of images. Abstract quality novel-view images at any time point can be rendered with any desired exposure. We further construct a dataset containing multiple dynamic scenes captured with diverse exposures for evaluation. All the datasets and code are available at https://guanjunwu.github.io/ HDR-HexPlane/. Neural Radiances Fields (NeRF) and their extensions have shown great success in representing 3D scenes and synthesizing novel-view images. However, most NeRF methods take in low-dynamic-range (LDR) images, which may lose details, especially with nonuniform illumination. Some previous NeRF methods attempt to introduce highdynamic-range (HDR) techniques but mainly target static scenes. To extend HDR NeRF methods to wider applications, we propose a dynamic HDR NeRF framework, named HDR-HexPlane, which can learn 3D scenes from dynamic 2D images captured with various exposures. A learnable exposure mapping function is constructed to obtain adaptive exposure values for each image. Based on the monotonically increasing prior, a camera response function is designed for stable learning. With the proposed model, high- ⋆ Equal contributions; † Project lead; 1. Introduction Novel view synthesis has been a hot topic in the field of 3D vision. With a set of 2D images as input, a new image needs to be generated from a novel view that maintains geometric consistency with the other images. NeRF (Neural Radiance Fields) [34] proposes to model the scene with an implicit function, e.g. MLP [18], and produces high-quality novelview images. Over the years, the research community has significantly expanded the capabilities of NeRF: accelerating the training and rendering speed [5, 36, 45], extending Corresponding author. 1" 2401.06056v1,"MatSynth: A Modern PBR Materials Dataset Giuseppe Vecchio giuseppevecchio@hotmail.com Valentin Deschaintre Adobe Research deschain@adobe.com Figure 1. Samples of materials from the dataset. Our dataset contains 4, 069 high-quality, 4K, tileable materials with permissive licences. Each material is augmented, rendered and supplemented by metadata containing its origin, tags, categories, method of creation, and more. Abstract 1. Introduction Materials are a key component of the rendering pipeline, describing the appearance of objects, for example in terms of colours, shininess or metallicity. The design of high quality virtual materials is a complex endeavour, usually requiring significant artistic expertise [29]. To reproduce existing objects and surfaces, material acquisition and generation have been active research fields for decades [14]. More recently, the field turned to Machine Learning to tackle the ill-posedness of few images (lightweight) material acquisition [5, 23], and to explore new opportunities in material generation[18, 49]. Since 2018, most of the field relies on a single dataset [5] or, when possible, on company-owned large material libraries [1, 27, 43, 49]. As company owned libraries are typically orders of magnitude bigger than what is publicly available, they enable very high quality results and experiments with higher resolutions. These materials are however not availabe to the community, underlining the need for larger, more diverse, public datasets to enable further research. Such material data is also particularly useful for synthetic data generation, for example for object acquisition [8, 24], material based selection [37], and numerous applications further from material understanding and authoring [33, 39, 41]. We introduce MatSynth, a dataset of 4, 000+ CC0 ultrahigh resolution PBR materials. Materials are crucial components of virtual relightable assets, defining the interaction of light at the surface of geometries. Given their importance, significant research effort was dedicated to their representation, creation and acquisition. However, in the past 6 years, most research in material acquisiton or generation relied either on the same unique dataset, or on company-owned huge library of procedural materials. With this dataset we propose a significantly larger, more diverse, and higher resolution set of materials than previously publicly available. We carefully discuss the data collection process and demonstrate the benefits of this dataset on material acquisition and generation applications. The complete data further contains metadata with each material’s origin, license, category, tags, creation method and, when available, descriptions and physical size, as well as 3M+ renderings of the augmented materials, in 1K, under various environment lightings. The MatSynth dataset is released through the project page at: https://www.gvecchio.com/ matsynth. To bridge the gap between the private and public datasets, we present MatSynth, a dataset of 4, 069 tileable 1" 2401.06091v1,"A Closer Look at AUROC and AUPRC under Class Imbalance Matthew B. A. McDermott 1 Lasse Hyldig Hansen * 2 Haoran Zhang * 3 Giovanni Angelotti 4 Jack Gallifant 3 Abstract evaluation metrics to guide appropriate model choices and understand performance nuances (Hicks et al., 2022). This study focuses on two pivotal metrics for binary classification tasks: the Area Under the Precision-Recall Curve (AUPRC) and the Area Under the Receiver Operating Characteristic (AUROC). Within the ML community, it is widely believed that AUPRC is a “better” metric than AUROC for model comparison when positive instances are substantially rarer than negative ones. Literature justifies this claim on several grounds, many of which we contest: In machine learning (ML), a widespread adage is that the area under the precision-recall curve (AUPRC) is a superior metric for model comparison to the area under the receiver operating characteristic (AUROC) for binary classification tasks with class imbalance. This paper challenges this notion through novel mathematical analysis, illustrating that AUROC and AUPRC can be concisely related in probabilistic terms. We demonstrate that AUPRC, contrary to popular belief, is not superior in cases of class imbalance and might even be a harmful metric, given its inclination to unduly favor model improvements in subpopulations with more frequent positive labels. This bias can inadvertently heighten algorithmic disparities. Prompted by these insights, a thorough review of existing ML literature was conducted, utilizing large language models to analyze over 1.5 million papers from arXiv. Our investigation focused on the prevalence and substantiation of the purported AUPRC superiority. The results expose a significant deficit in empirical backing and a trend of misattributions that have fuelled the widespread acceptance of AUPRC’s supposed advantages. Our findings represent a dual contribution: a significant technical advancement in understanding metric behaviors and a stark warning about unchecked assumptions in the ML community. All experiments are accessible at https://github.com/ mmcdermott/AUC_is_all_you_need. • Precision-recall curves may be more visually indicative of real-world deployment objectives than the receiver operating characteristic (Cook & Ramadas, 2020; Leisman, 2018; Saito & Rehmsmeier, 2015; Ozenne et al., 2015; Yuan et al., 2015; Zhou et al., 2020). • AUPRC is unaffected by the (large) number of true negatives, making it somehow “less optimistic” than AUROC (Albora & Zaccaria, 2022; Leisman, 2018; Czakon, 2022). • In scenarios of low prevalence, AUPRC is often significantly lower compared to AUROC (Goadrich et al., 2006; Mazzanti, 2023; Bleakley et al., 2007). • AUPRC’s dependence on prevalence is argued to be an advantageous property (Saito & Rehmsmeier, 2015; Goadrich et al., 2006; Yuan et al., 2015). In this work, we show through careful mathematical, logical, and epistemological reasoning that this claim and many associated reasons are invalid or misapplied in common ML settings. More specifically, we show the following: AUROC and AUPRC are probabilistically interrelated First, we show the following theorem: Theorem 1. Let f denote a model that outputs scores from distributions p + , p − , and p for samples with positive, negative, and arbitrary labels, respectively. Then, 1. Introduction Machine learning (ML), especially in critical domains like healthcare, necessitates carefully selecting and applying AUROC(f ) = 1 − E p + [FPR(p + )]   FPR(p + ) AUPRC(f ) = 1 − P y (0)E p + P p (p > p + ) * Equal contribution 1 Harvard Medical School, Department of Biomedical Informatics 2 Cognitive Science, Aarhus University, Denmark 3 Massachusetts Institute of Technology 4 IRCCS Humanitas Research Hospital, Artificial Intelligence Center, Milan, Italy. Correspondence to: Matthew B. A. McDermott . Presented this way, it is clear that for a fixed dataset, AU- ROC and AUPRC only differ w.r.t. model-dependent parameters in that AUROC weighs all false positives equally, Pre-print 1" 2401.06115v1,"Phase Transition and Magneto-caloric Properties of Perovskites Pr 0.55 Sr 0.45 MnO 3 : Modeling versus Experiments Yethreb Essouda 1∗ , Hung T. Diep 2† , Mohamed Ellouze 1‡ 1 Sfax University, Faculty of Sciences of Sfax, LM2EM, B.P. 1171, 3000, Sfax, Tunisia. 2 Laboratoire de Physique Théorique et Modélisation, CY Cergy Paris Université, CNRS, UMR 8089 2, Avenue Adolphe Chauvin, 95302 Cergy-Pontoise Cedex, France. (Dated: January 12, 2024) Experimental data obtained with the perovskite compounds Pr 0.55 Sr 0.45 MnO 3 show that the magnetization decreases with increasing temperature T and undergoes a very sharp phase transition to the paramagnetic phase. The sharp transition in a system with a strong disorder is very rare, if not non-existent, in the theory of phase transition in systems of short-range pairwise exchange interactions. To understand this remarkable property, we introduce a model including a multispin (cluster-like) interaction between Mn ions, in addition to the usual pairwise exchange terms between these ions and the Mn-Pr interactions. We carry out Monte Carlo (MC) simulations using this model. The crystal is a body-centered tetragonal lattice where the corner sites are occupied by Mn ions and the center sites by Pr or Sr ions. Due to the doping, Mn 4+ with S = 3/2 has the concentration of Pr 3+ (S = 1) and Mn 3+ with S = 2 has the Sr concentration. After attempts with different spin models and various Hamiltonians, we find that the many-state Ising spin model reproduces most of the experimental results. For the Hamiltonian, we find that pairwise interactions alone between ions cannot reproduce the sharp transition and the magnetization below T C . We have to include a multispin interaction as said above. We fit the MC results with experimental data, and we estimate values of various exchange interactions in the system. These values are found to be in the range of those found in perovskite manganite compounts. We also study the applied-field effect on the magnetization in the temperature region below and above the transition temperature T C . We calculate the magnetic entropy change |∆S m | and the Relative Cooling Power, for magnetic field from 1 to 3 Tesla. Our simulation results are in good agreement with experiments. The role of the multispin interaction is analyzed and discussed. PACS numbers: 5.10.Ln;64.30.-t;75.50.Cc Keywords: Praseodymium strontium manganite (PSMO); Phase transition; Magnetic entropy change; Relative Cooling Power; Monte Carlo simulation I. INTRODUCTION Interest in seeking broad clean air protections and environmentally green technology to reduce production and consumption of hydrofluorocarbons (HFCs) has continued to grow over the last decades. Much ink has been spilled on the topic of ‘’innovation new technology for cooling ‘’ in view to replace refrigerants with high global warming potential (GWP). Among the most cooling technologies used today across the world, magnetic refrigeration can be considered as a successfully solution that may offer larger efficiencies than a traditional refrigeration technique owing its promissing characgteristics. This emergent technology could provide efficient heating and cooling, which accounts for more than half of the energy used in homes, and help phase out conventional gas-compression refrigeration [1], which use gases with high GWP as refrigerants. The magnetic refrigeration, based on magnetocaloric effect (MCE) would eliminate the risk of such gases escaping into the atmosphere by replacing them with heating or cooling of a magnetic material upon application or removal of magnetic field which makes it environmentally safe refrigerant with zero GWP [2]. Therefore, materials with magnetocaloric properties are suitable for use in refrigeration and air conditioning. Both a large, isothermal entropy change (∆S m ) induced by a variation of the external magnetic field [3] and adiabatic temperature change (∆T ) determine the large MCE for a magnetic material. As noted earlier, the gadolinium (Gd) metal is mostly conspicuous magnetic refrigeration with a large MCE but has a drawback and restriction for its use in the actual application because it has a high cost [4]. With the goal to innovate new substance with low price and large MCE, a lot of research has been done on magnetic materials that offered the best magnetic properties and cheaper than Gd. The rare-earth manganite perovskites with the general formula Ln 1−x A x MnO 3 (Ln= ∗ yethreb.essouda@gmail.com † diep@cyu.fr, corresponding author,https://orcid.org/0000-0003-1852-3435 ‡ mohamed.ellouze@fss.usf.tn, https://orcid.org/my-orcid?orcid=0000-0002-5662-8572" 2401.06117v1,"Landscape of nuclear deformation softness with spherical quasi-particle random phase approximation Nguyen Le Anh ∗ Department of Physics, Ho Chi Minh City University of Education, 280 An Duong Vuong, District 5, Ho Chi Minh City, Vietnam Department of Theoretical Physics, Faculty of Physics and Engineering Physics, University of Science, Ho Chi Minh City, Vietnam and Vietnam National University, Ho Chi Minh City, Vietnam Bui Minh Loc † Center for Exotic Nuclear Studies, Institute for Basic Science (IBS), Daejeon 34126, Korea and San Diego State University, 5500 Campanile Drive, San Diego, CA 92182 Panagiota Papakonstantinou ‡ Rare Isotope Science Project, Institute for Basic Science, Daejeon 34047, Korea Naftali Auerbach § School of Physics and Astronomy, Tel Aviv University, Tel Aviv 69978, Israel We investigate the stability and softness of nuclei against quadrupole, octupole, and hexadecapole deformation. By applying the spherical Skyrme-force Hartree-Fock Bardeen-Cooper-Schrieffer quasiparticle random phase approximation, we diagnose ground-state deformation when imaginary solutions are obtained, i.e., the spherical ground state collapses. We also calculate the multipole polarizability in spherical nuclei with no collapse, as a measure of softness. This numerically light and theoretically sound method is found able to capture deformation patterns across the nuclide chart. The connection between the intrinsic shape of nuclei and the dynamics of their low-lying collective states is established and the role of shell structure is discussed. I. INTRODUCTION New experimental techniques and theoretical methods continue to advance our understanding of nuclear deformation, in stable and exotic nuclei. Notably, the hydrodynamic model description of relativistic heavy-ion collisions is currently being used to infer deformation in nuclei. Specifically, the elliptic flow v 2 and the triangular flow v 3 , which are patterns of particle movement observed in high-energy nuclear collisions, are used in the study of quadrupole and octupole deformation, respectively [1, 2]. The flow v 4 can also be measured, as has been done at the Relativistic Heavy Ion Collider (RHIC), and be used to study hexadecapole deformation. In their ground state, most of the nuclei are not spherical but quadrupole deformed [3]. A handful of octupole nuclei were confirmed in the experiment [4]. Very recently, evidence of hexadecapole deformation in Uranium-238 at the RHIC was reported in Ref. [5]. Observables related to the J π = 4 + 1 states of the Krypton isotopes and, in particular, on the hexadecapole degree of freedom were discussed in Ref. [6]. One question is whether deformation values extracted through low- ∗ anhnl@hcmue.edu.vn † lmbui@sdsu.edu (present address) ‡ ppapakon@ibs.re.kr § auerbach@tauex.tau.ac.il energy observables are consistent with the new data obtained at high energy. A more general question is whether we can understand in a systematic way which nuclei tend to develop hexadecapole deformation. A number of global theoretical models of nuclear deformation are available. The finite-range-droplet model (FRDM) [7] is a microscopic-macroscopic model, while the fully microscopic Skyrme Hartree-Fock (HF) Bardeen-Cooper-Schrieffer (BCS) [8], Gogny Hartree- Fock-Bogolyubov [9] and deformed relativistic Hartree- Bogoliubov theory in continuum (DRHBc) [10] are based on a mean-field approach and take as input an effective interaction or Lagrangian. In mean-field approaches, the onset of deformation can be interpreted to some extent in terms of shell structure that plays an important role in the phenomenon of deformation: for example, magic nuclei are always spherical. From the shell model, it is understood that the accumulating p−n interaction strength leads to additional configuration mixing and deviations from spherical symmetry in the ground state [11, 12]. The Nilsson model has been very useful for relating nuclear deformation and shell structure [13, 14]. From a theoretical point of view, to predict whether a nucleus is likely deformed in its ground state, one typically performs precise calculations of the density distributions and deformation parameters. In this work, we follow a different computationally light approach to examine deformation patterns throughout the nuclide chart. Specifically, we solve the self-consistent spherical Skyrme HFBCS quasi-particle random phase approxima-" 2401.06119v1,"Highly multimode visible squeezed light with programmable spectral correlations through broadband up-conversion Federico Presutti 1,* , Logan G. Wright 1,2,*,‡ , Shi-Yuan Ma 1 , Tianyu Wang 1 , Benjamin K. Malia 1,3 , Tatsuhiro Onodera 1,2 , Peter L. McMahon 1,4,* 1 School of Applied and Engineering Physics, Cornell University, NY, USA. 2 NTT Physics and Informatics Laboratories, NTT Research, Inc., CA, USA. 3 Intelligence Community Postdoctoral Research Fellowship Program, Cornell University, NY, USA. 4 Kavli Institute at Cornell for Nanoscale Science, Cornell University, NY, USA. Multimode squeezed states of light have been proposed as a resource for achieving quantum advantage in computing and sensing. Recent experiments that demonstrate multimode Gaussian states to this end have most commonly opted for spatial or temporal modes, whereas a complete system based on frequency modes has yet to be realized. Instead, we show how to use the frequency modes simultaneously squeezed in a conventional, singlespatial-mode, optical parametric amplifier when pumped by ultrashort pulses. Specifically, we show how adiabatic frequency conversion can be used not only to convert the quantum state from infrared to visible wavelengths, but to concurrently manipulate the joint spectrum. This near unity-efficiency quantum frequency conversion, over a bandwidth >45 THz and, to our knowledge, the broadest to date, allows us to measure the state with an electron-multiplying CCD (EMCCD) camera-based spectrometer, at non-cryogenic temperatures. We demonstrate the squeezing of >400 frequency modes, with a mean of approximately 700 visible photons per shot. Our work shows how many-mode quantum states of light can be generated, manipulated, and measured with efficient use of hardware resources – in our case, using one pulsed laser, two nonlinear crystals, and one camera. This ability to produce, with modest hardware resources, large multimode squeezed states with partial programmability motivates the use of frequency encoding for photonics-based quantum information processing. The generation, control, and measurement of entangled multimode Gaussian states of light are crucial elements of continuous-variable (CV) quantum information processing [1–4]. Most quantum technologies based on multimode quantum optics benefit from being able to use as many modes as possible. As an example, a Gaussian boson sampler (GBS) [5, 6] is a special-purpose quantum computer that can – at least in the ideal case – perform certain calculations that are believed to be intractable on a classical computer when the number of modes and number of photons in the GBS are sufficiently large [6]. The recent demonstration of Gaussian boson sampling in the regime of quantum computational supremacy, with tens to hundreds of squeezed modes and detected photons per shot [7–10], was a milestone in the development of CV-based quantum systems that was achieved because of the success in pushing to large numbers of modes and photons. A GBS executes a sequence of three steps, which are common to many CV quantum-information-processing protocols: (1) generate squeezed states, (2) apply a unitary transformation to entangle them, and (3) measure the final state (by photon counting). Optics gives us the choice of several possible degrees of freedom within which to encode information – most importantly: space, time and frequency (or any combination thereof). While large-scale GBS experiments have been realized using space [7–9] and time [10] encodings, the frequency domain remains to be explored. Frequency encoding offers important potential advantages over space or time encoding for both the generation and the manipulation (unitary control) of multimode squeezed light: reduced hardware resources and complexity, and reduced loss. The extremely broad bandwidth of light enables frequency-encoded systems to operate on many frequency modes in a compact system [11–17]. Many demonstrations of large-scale multimode squeezing, for example, use the frequency domain, e.g., in broadband frequency combs [15, 16, 18–30]. Linear unitary operations in the frequency domain, i.e., acting on the frequency modes, can be implemented in a hardware-efficient way, operating on all frequency modes in parallel [31, 32]. One approach is to use one or more electro-optic modulators [31–34] (although there are limitations on the unitary from the driving microwave bandwidth being ≲ 100 GHz); another is to use nonlinear wave mixing to convert photons in each frequency mode to photons in a combination of other frequency modes [35]. Unitaries based on nonlinear wave mixing mediated by a classical field, such as four-wave mixing [36], provide a route to realizing programmable unitaries that can operate over wide bandwidths, in compact hardware with low loss. The programming of the unitary can be done by shaping the classical field(s) used to control the wave mixing *Corresponding authors: fp267@cornell.edu; logan.wright@yale.edu; pmcmahon@cornell.edu. ‡ Present address: Department of Applied Physics, Yale University, CT, USA. 1" 2401.06123v1,"Theory of nonlinear sub-Doppler laser spectroscopy taking into account atomic-motion-induced density-dependent effects in a gas V. I. Yudin, 1, 2, 3, ∗ A. V. Taichenachev, 1, 2 M. Yu. Basalaev, 1, 2, 3 O. N. Prudnikov, 1, 2 V. G. Pal’chikov, 4, 5 T. Zanon-Willette, 6 and S. N. Bagayev 1, 2 1 Novosibirsk State University, Novosibirsk, 630090 Russia Institute of Laser Physics, Siberian Branch, Russian Academy of Sciences, Novosibirsk, 630090 Russia 3 Novosibirsk State Technical University, Novosibirsk, 630073 Russia 4 All-Russian Research Institute of Physical and Radio Engineering Measurements, Mendeleevo, Moscow region, 141570 Russian 5 National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Moscow, 115409 Russia 6 Sorbonne Université, Observatoire de Paris, Université PSL, CNRS, LERMA, F-75005 Paris, France 2 We develop a field-nonlinear theory of sub-Doppler spectroscopy in a gas of two-level atoms, based on a self-consistent solution of the Maxwell-Bloch equations in the mean field and singleatom density matrix approximations. This makes it possible to correctly take into account the effects caused by the free motion of atoms in a gas, which lead to a nonlinear dependence of the spectroscopic signal on the atomic density even in the absent of a direct interatomic interaction (e.g., dipole-dipole interaction). Within the framework of this approach, analytical expressions for the light field were obtained for an arbitrary number of resonant waves and arbitrary optical thickness of a gas medium. Sub-Doppler spectroscopy in the transmission signal for two counterpropagating and co-propagating waves has been studied in detail. A previously unknown red shift of a narrow sub-Doppler resonance is predicted in a counterpropagating waves scheme, when the frequency of one wave is fixed and the frequency of the other wave is varied. The magnitude of this shift depends on the atomic density and can be more than an order of magnitude greater than the known shift from the interatomic dipole-dipole interaction (Lorentz-Lorenz shift). The found effects, caused by the free motion of atoms, require a significant revision of the existing picture of spectroscopic effects depending on the density of atoms in a gas. Apart of fundamental aspect, obtained results are important for precision laser spectroscopy and optical atomic clocks. PACS numbers: I. INTRODUCTION Modern laser spectroscopy is a powerful research tool of great importance both for fundamental science and for numerous practical applications. The basic principles of this science were formulated several decades ago and are widely presented in the scientific and educational literature [1 – 7]. A special role is played by laser spectroscopy of atomic gases for the time and frequency standards (atomic clocks), for which the reference is resonances excited at the frequency of atomic transitions. The metrological characteristics of these devices are largely determined by the parameters of the resonance lineshape. According to established concepts, interatomic dipole-dipole interaction is the main reason for the nonlinear dependence of the spectroscopic signal on the atomic density in a gas [8 – 45]. In particular, for a monatomic gas, collective effects lead to distortion of the resonance lineshape (shift, asymmetry, broadening). As is known Ref. [10], in the case of an ensemble of two-level atoms with an unperturbed frequency ω eg for a closed optical transition |gi↔|ei [see Fig. 1(a)], the scale of influence of the dipole-dipole interaction is determined by the Lorentz-Lorenz shift ∆ LL = −πN k −3 γ, where N is the density of atoms (the number of particles per unit volume), k = ω eg /c (c is the speed of light in a vacuum), γ is the spontaneous decay rate of the upper level [see. Fig. 1(a)]. In particular, for an atomic ensemble confined in a flat layer of thickness L, the total red shift caused by the dipole-dipole interaction is described by the formula (see Ref. [8]):   3 sin 2kL ∆ dd = ∆ LL − ∆ LL 1 − < 0 , (1) 4 2kL where the second term is the collective Lamb shift. For a sufficiently thick layer (kL ≫ 1) from (1) we obtain the ∗ Electronic address: viyudin@mail.ru" 2401.06127v1,"E 2 GAN: Efficient Training of Efficient GANs for Image-to-Image Translation Yifan Gong ∗1,2 , Zheng Zhan ∗2 , Qing Jin 1 , Yanyu Li 1,2 , Yerlan Idelbayev 1 , Xian Liu 1 , Andrey Zharkov 1 , Kfir Aberman 1 , Sergey Tulyakov 1 , Yanzhi Wang 2 , Jian Ren 1 1 Snap Inc. 2 Northeastern University gong.yifa@northeastern.edu, jren@snapchat.com Abstract One highly promising direction for enabling flexible realtime on-device image editing is utilizing data distillation by leveraging large-scale text-to-image diffusion models, such as Stable Diffusion, to generate paired datasets used for training generative adversarial networks (GANs). This approach notably alleviates the stringent requirements typically imposed by high-end commercial GPUs for performing image editing with diffusion models. However, unlike text-to-image diffusion models, each distilled GAN is specialized for a specific image editing task, necessitating costly training efforts to obtain models for various concepts. In this work, we introduce and address a novel research direction: can the process of distilling GANs from diffusion models be made significantly more efficient? To achieve this goal, we propose a series of innovative techniques. First, we construct a base GAN model with generalized features, adaptable to different concepts through fine-tuning, eliminating the need for training from scratch. Second, we identify crucial layers within the base GAN model and employ Low-Rank Adaptation (LoRA) with a simple yet effective rank search process, rather than fine-tuning the entire base model. Third, we investigate the minimal amount of data necessary for fine-tuning, further reducing the overall training time. Extensive experiments show that we can efficiently empower GANs with the ability to perform real-time high-quality image editing on mobile devices with remarkable reduced training cost and storage for each concept. 1 1. Introduction Recent development of diffusion-based image editing models has witnessed remarkable progress in synthesizing contents containing photo-realistic details with full of imagination [35, 36, 38, 39]. Albeit being creative and powerful, 1 Project website: https://yifanfanfanfan.github.io/ e2gan/ these generative models typically require a huge amount of computation even for inference and storage for saving weights. For example, Stable Diffusion [38] has more than one billion parameters and takes 30 seconds to conduct iterative denoising process to get one image on T4 GPU. Such low-efficiency issue prohibits their real-time application on mobile devices [24]. Exiting works try to tackle the problem through two main directions. One is accelerating the diffusion models by designing efficient model architecture or reducing the number of denoising steps [16, 23, 26, 40]. However, these efforts still struggle to obtain models that can run in real-time on mobile devices [24]. Another area focuses on data distillation, where diffusion models are leveraged to create datasets to train other mobile-friendly models, such as generative adversarial networks (GANs) for image-toimage translation [33, 54]. Nevertheless, although GAN is efficient for on-device deployment, each new concept still asks for the costly training of a GAN model from scratch. In this work, we propose and aim to address a new research direction: can the GAN models be trained efficiently under the data distillation pipeline to perform real-time ondevice image editing? To tackle the challenge, we introduce E 2 GAN, powered with the following techniques for the Efficient training and Efficient inference of GAN models with the help of diffusion models: • First, we construct a base GAN model trained from various prompts and the corresponded edited images obtained from diffusion models. It enables efficient transfer learning for different new concepts by fine-tuning, rather than training models from scratch, to reduce the training cost. Meanwhile, the base GAN model achieves fast inference with fewer parameters on mobile devices (as in Fig. 1 Right), and maintaining high-performance. • Second, we identify that only partial layers are necessary to be fine-tuned for new concepts. LoRA is applied on these layers with a simple yet effective rank search process, eliminating the need to fine-tune the entire base model (as in Fig. 1 Left). It brings two advantages – both" 2401.06144v2,"DFU: scale-robust diffusion model for zero-shot super-resolution image generation Alex Havrilla Department of Mathematical Sciences Georgia Institute of Technology Atlanta, GA 30332 ahavrilla3@gatech.edu Kevin Rojas Department of Mathematical Sciences Georgia Institute of Technology Atlanta, GA 30332 kevin.rojas@gatech.edu Wenjing Liao Department of Mathematical Sciences Georgia Institute of Technology Atlanta, GA 30332 wliao60@gatech.edu Molei Tao Department of Mathematical Sciences Georgia Institute of Technology Atlanta, GA 30332 mtao@gatech.edu Abstract Diffusion generative models have achieved remarkable success in generating images with a fixed resolution. However, existing models have limited ability to generalize to different resolutions when training data at those resolutions are not available. Leveraging techniques from operator learning, we present a novel deep-learning architecture, Dual-FNO UNet (DFU), which approximates the score operator by combining both spatial and spectral information at multiple resolutions. Comparisons of DFU to baselines demonstrate its scalability: 1) simultaneously training on multiple resolutions improves FID over training at any single fixed resolution; 2) DFU generalizes beyond its training resolutions, allowing for coherent, high-fidelity generation at higher-resolutions with the same model, i.e. zero-shot super-resolution image-generation; 3) we propose a fine-tuning strategy to further enhance the zero-shot super-resolution image-generation capability of our model, leading to a FID of 11.3 at 1.66 times the maximum training resolution on FFHQ, which no other method can come close to achieving. 1 Introduction Diffusion models have been shown to be a powerful method for image generation [1–7]. Of particular interest is the diffusion model’s ability to generate high-resolution images. One approach is to generate lower-resolution samples and then upscale using existing learning-based methods [e.g., 4, 8, 9]. Also notable is image outpainting [e.g., 10, 11], which increases the resolution of an image by extending its content outside of the original palette of the diffusion model, again in a supervised fashion. However, both approaches require access to high-resolution training data and do not truly generalize the learned score beyond training resolution. In contrast, we seek to learn a model which can directly sample at high resolutions to generate the entire image after being trained at low resolutions, without access to high resolution training data. 1 We call this problem of generating resolution higher than that of training data zero-shot super-resolution generation. To tackle it, we start off by first considering a standard diffusion process as a discretization of an infinite dimensional generative process[12]. Under appropriate 1 Code: https://github.com/Dahoas/edm Neural Information Processing Systems Workshop on Diffusion Models (NeurIPS 2023)." 2401.06151v1,"Towards Joint Sequence-Structure Generation of Nucleic Acid and Protein Complexes with SE(3)-Discrete Diffusion Alex Morehead ∗ , Jeffrey A. Ruffolo, Aadyot Bhatnagar, & Ali Madani AI Research Lab Profluent Bio Berkeley, CA, USA acmwhb@missouri.edu, {jruffolo, abhatnagar, ali}@profluent.bio Abstract Generative models of macromolecules carry abundant and impactful implications for industrial and biomedical efforts in protein engineering. However, existing methods are currently limited to modeling protein structures or sequences, independently or jointly, without regard to the interactions that commonly occur between proteins and other macromolecules. In this work, we introduce MMD IFF , a generative model that jointly designs sequences and structures of nucleic acid and protein complexes, independently or in complex, using joint SE(3)-discrete diffusion noise. Such a model has important implications for emerging areas of macromolecular design including structure-based transcription factor design and design of noncoding RNA sequences. We demonstrate the utility of MMD IFF through a rigorous new design benchmark for macromolecular complex generation that we introduce in this work. Our results demonstrate that MMD IFF is able to successfully generate micro-RNA and single-stranded DNA molecules while being modestly capable of joint modeling DNA and RNA molecules in interaction with multi-chain protein complexes. Source code: https://github.com/Profluent-Internships/MMDiff. 1 Introduction The ability to effectively design proteins using computational methods is a long-sought-after goal of protein engineering research [Lutz, 2010]. Such techniques could enable accelerated development of vaccines targeting novel viruses, enhanced exploration of the space of designable materials, and the ability to engineer new protein-based energy resources towards a more sustainable climate future. Recent progress in computationally designing protein variants given an initial wildtype sequence has demonstrated the utility of machine learning in protein engineering [Hie and Yang, 2022]. More recently, deep learning models based on structure prediction networks have demonstrated the ability to flexibly design novel protein structures with desired functions in wet-lab experiments [Watson et al., 2023]. Nonetheless, considerably less attention has been directed toward the design of novel protein-nucleic acid interactions, which carry implications for computationally engineering new means of transcription factors and intervening in a host of essential functions within living organisms. Approaching such design tasks is arguably more challenging, as the number of high-quality macromolecular complexes currently available in the RCSB Protein Data Bank (PDB) [Berman et al., 2000] is notably scarce while the shapes of such complexes can also be much more flexible compared to proteins. ∗ Alex Morehead was employed by Profluent Bio as a research intern at the time of this work. Machine Learning for Structural Biology Workshop, NeurIPS 2023." 2401.06171v1,"Harnessing Artificial Intelligence for Sustainable Agricultural Development in Africa: Opportunities, Challenges, and Impact Kinyua Gikunda Dedan Kimathi University of Technology, Kenya patrick.gikunda@dkut.ac.ke Abstract—This paper explores the transformative potential of artificial intelligence (AI) in the context of sustainable agricultural development across diverse regions in Africa. Delving into opportunities, challenges, and impact, the study navigates through the dynamic landscape of AI applications in agriculture. Opportunities such as precision farming, crop monitoring, and climate-resilient practices are examined, alongside challenges related to technological infrastructure, data accessibility, and skill gaps. The article analyzes the impact of AI on smallholder farmers, supply chains, and inclusive growth. Ethical considerations and policy implications are also discussed, offering insights into responsible AI integration. By providing a nuanced understanding, this paper contributes to the ongoing discourse on leveraging AI for fostering sustainability in African agriculture. Index Terms—Artificial Intelligence, Agriculture, Sustainable Development. I. I NTRODUCTION Africa’s rich agricultural heritage is at the forefront of a technological revolution, with artificial intelligence (AI) poised to address critical challenges in the sector [1]. The integration of AI technologies holds great promise for improving efficiency, increasing yields, and fostering sustainable agricultural practices. In Africa, agriculture is at a pivotal juncture, facing the dual challenges of ensuring food security for a growing population and mitigating the impact of climate change on traditional farming practices [2]. AI emerges as a transformative force capable of revolutionizing the sector by offering innovative solutions to age-old problems [3]. This article explores the multifaceted role of AI in shaping sustainable agricultural development across diverse regions of Africa, navigating through opportunities, challenges, and overall impact. The integration of AI technologies opens doors to precision farming, allowing farmers to optimize resource use through real-time insights into soil conditions, crop health, and weather patterns [4]. As demonstrated by Shaikh et al. precision farming not only increases yields but also contributes to resource conservation, making it a crucial element in the pursuit of sustainable agriculture. However, the adoption of AI in African agriculture is not without its hurdles. Limited access to advanced technology and inadequate infrastructure in rural areas pose significant barriers to the widespread implementation of AI-driven solutions [5]. The digital divide exacerbates existing disparities, hindering the equitable distribution of technological benefits [6]. Addressing infrastructure challenges is essential to ensuring the transformative potential of AI reaches all corners of the agricultural sector in Africa. In addition, the success of AI applications in agriculture hinges on the availability and quality of data. Challenges related to data privacy, security, and the sheer volume of data required for accurate analyses must be systematically addressed. This article critically examines the data-related impediments to AI adoption in African agriculture, offering insights into strategies to enhance data quality, accessibility, and security for sustainable AI integration. The proficiency of agricultural stakeholders in utilizing AI technologies is another significant challenge that merits attention. The dearth of skilled personnel capable of navigating the complexities of AI systems poses a considerable obstacle to the adoption of these technologies, particularly in rural communities [7]. The intersection of AI and agriculture in Africa represents a dynamic arena filled with both promise and obstacles. This introduction sets the stage for an indepth exploration of how AI can be harnessed to propel sustainable agricultural development, navigating through the complex landscape of opportunities, challenges, and impact. Through a comprehensive analysis informed by the insights of various studies, this article aims to contribute to the evolving discourse on the integration of AI in African agriculture for the betterment of the continent’s food security and economic resilience. The rest of the paper is structured as follows: section II we present opportunities presented by AI in African agriculture, section III discussion on challenges to AI adoption in agriculture , section IV impact on smallholder farmers and the agricultural value chain, section V ethical considerations and policy implications, section VI case studies: AI in action, section VII future trends and section VIII the conclusion. II. O PPORTUNITIES P RESENTED BY AI IN A FRICAN A GRICULTURE The agricultural landscape in Africa is on the brink of a technological revolution, with AI emerging as a catalytic force offering a spectrum of transformative opportunities. As nations grapple with the dual challenges of feeding growing populations and ensuring the resilience of farming practices" 2401.06183v1,"End to end Hindi to English speech conversion using Bark, mBART and a finetuned XLSR Wav2Vec2 Aniket Tathe Anand Kamble ∗ Suyash Kumbharkar Department of Mechanical Engineering Department of Scientific Computing Department of Electrical Engineering MES College of Engineering, Pune, India Florida State University, USA and Information Technology anikettathe.08@gmail.com amk23j@fsu.edu Technische Hochschule Ingolstad, Germany suk9387@thi.de Atharva Bhandare 1 Anirban C. Mitra Department of Mechanical Engineering Department of Mechanical Engineering MES College of Engineering, Pune, India MES College of Engineering, Pune, India atharvabhandare512@gmail.com amitra@mescoepune.org Abstract Speech has long been a barrier to effective communication and connection, persisting as a challenge in our increasingly interconnected world. This research paper introduces a transformative solution to this persistent obstacle – an end-to-end speech conversion framework tailored for Hindi-to-English translation, culminating in the synthesis of English audio. By integrating cutting-edge technologies such as XLSR Wav2Vec2 for automatic speech recognition (ASR), mBART for neural machine translation (NMT), and a Text-to-Speech (TTS) synthesis component, this framework offers a unified and seamless approach to cross-lingual communication. We delve into the intricate details of each component, elucidating their individual contributions and exploring the synergies that enable a fluid transition from spoken Hindi to synthesized English audio. 2 Keywords XLSR Wav2Vec2, mBART, Bark, End-to-end Speech Conversion, Common Voice Corpus. 3 Introduction In the intricate tapestry of global communication, speech has persisted as a formidable barrier, hindering effective connection and understanding in our increasingly interconnected world. Despite ongoing research efforts, addressing this challenge becomes more intricate when dealing with low-resource Automatic Speech Recognition (ASR) languages. A variety of open-source ASR models, including XLSR Wav2Vec2[1], Whisper[2] and Kaldi[3], are available, each with its own strengths and weaknesses based on factors such as usability, speed, accuracy, and the intended task. Similarly, the landscape of Neural Machine Translation (NMT) introduces diverse options like mBart[4], MarianMT[5] and T5[6], each offering unique advantages. Furthermore, Text-to- Speech (TTS) models play a crucial role in speech-enabled applications that require converting text to speech, simulating the nuances of the human voice. Models such as Tortoise TTS[7], Bark[8], Tachotron[9], Tachotron 2[10] and FastSpeech[11],FastSpeech2[12] contribute to this realm. This research endeavors to address the persistent challenge of cross-lingual communication by proposing a novel approach to convert spoken Hindi into understandable English. Our devised system integrates cutting-edge technologies, employing a finetuned XLSR Wav2Vec2 for speech recognition, mBART for language translation, and Bark for audio handling. In the following sections, we explore the intricacies of each model, shedding light on their distinctive contributions and demonstrating how, together, they transform spoken Hindi into coherent English audio. ∗ Corresponding author. Email: amk23j@fsu.edu 1" 2401.06191v1,"TriNeRFLet: A Wavelet Based Multiscale Triplane NeRF Representation Rajaei Khatib Electrical Engineering Tel Aviv University Raja Giryes Electrical Engineering Tel Aviv University rajaeikhatib@mail.tau.ac.il raja@tauex.tau.ac.il https://rajaeekh.github.io/trinerflet-web Abstract In recent years, the neural radiance field (NeRF) model has gained popularity due to its ability to recover complex 3D scenes. Following its success, many approaches proposed different NeRF representations in order to further improve both runtime and performance. One such example is Triplane, in which NeRF is represented using three 2D feature planes. This enables easily using existing 2D neural networks in this framework, e.g., to generate the three planes. Despite its advantage, the triplane representation lagged behind in its 3D recovery quality compared to NeRF solutions. In this work, we propose TriNeRFLet, a 2D wavelet-based multiscale triplane representation for NeRF, which closes the 3D recovery performance gap and is competitive with current state-of-the-art methods. Building upon the triplane framework, we also propose a novel super-resolution (SR) technique that combines a diffusion model with TriNeRFLet for improving NeRF resolution. Figure 1. Our approach improves the quality of NeRF reconstruction. (Left) Using a multiscale wavelet representation with Triplane improves 3D reconstruction quality; (Right) Combining diffusion-based super-resolution with TriNeRFLet leads to highresolution reconstruction from low-resolution 2D views. The MLP weights are learned via end-to-end optimization, by comparing the values between the rendered pixel and its value in the corresponding 2D image. After the training process is over, the MLP can be used to render novel views. Due to its success in representing 3D scenes, many methods proposed improvements to NeRF [5, 6, 28]. They sought to enhance NeRF 3D reconstruction capabilities, as well as other drawbacks such as high runtime and aliasing artifacts that it suffered from. One such approach uses three axis-aligned 2D feature planes, denoted as Triplane, to represent the NeRF [7]. In the rendering process, each point is sampled by projecting it onto each of the three planes and then concatenating the features that correspond to the three projections. This forms a single feature vector for the point that is then passed to a small MLP that outputs the density and color values of this point. A significant advantage of the Triplane representation is that it can be used with many already existing 2D methods. In the original work [7], the authors used an existing 2D Generating Adversarial Network (GAN) architecture to generate its planes. Follow-up works employed the 2D 1. Introduction 3D scene reconstruction from multiple 2D views is a challenging task that has been widely studied, and many methods have been proposed to solve it. Neural radiance field (NeRF) [27] is prominent among these methods as it has demonstrated a high level of generalizability in generating novel views with high quality and consistent lighting. NeRF utilizes an implicit representation of the 3D scene in the form of a multi-layer perceptron (MLP). This enables it to capture complex 3D geometry and lighting. At a high level, NeRF relies on the rendering equation that approximates each pixel in the image using points sampled along the ray that passes through it [27]. The MLP in NeRF takes as input the frequency encoding of the Euclidean coordinates and view direction of the point of interest, and outputs the radiance and density at this point. 1" 2401.06201v1,"E ASY T OOL : Enhancing LLM-based Agents with Concise Tool Instruction 1 2 Siyu Yuan ∗ , Kaitao Song ∗† , 1 2 3 2 2 1 Jiangjie Chen , Xu Tan , Yongliang Shen , Ren Kan , Dongsheng Li , Deqing Yang † 1 2 3 Fudan University , Microsoft Research Asia , Zhejiang University syyuan21@m.fudan.edu.cn, {kaitaosong, xuta, dongsli}@microsoft.com syl@zju.edu.cn, {jjchen19,yangdeqing}@fudan.edu.cn Abstract Tool Documentation W { To address intricate real-world tasks, there has been a rising interest in tool utilization in applications of large language models (LLMs). To develop LLM-based agents, it usually requires LLMs to understand many tool functions from different tool documentation. But these documentations could be diverse, redundant or incomplete, which immensely affects the capability of LLMs in using tools. To solve this, we introduce E ASY T OOL , a framework transforming diverse and lengthy tool documentation into a unified and concise tool instruction for easier tool usage. E ASY T OOL purifies essential information from extensive tool documentation of different sources, and elaborates a unified interface (i.e., tool instruction) to offer standardized tool descriptions and functionalities for LLM-based agents. Extensive experiments on multiple different tasks demonstrate that E ASY T OOL can significantly reduce token consumption and improve the performance of tool utilization in real-world scenarios. Our code will be available at https: //github.com/microsoft/JARVIS/ in the future. 1 Introduction Large language models (LLMs) (OpenAI, 2023; Touvron et al., 2023a,b; Team and Google, 2023) have recently ignited the spark of LLM-based autonomous agents (Shen et al., 2023a; Gravitas, 2023), which aim to interact with the real-world scenarios and address complex user requests. To utilize more comprehensive existing tools in LLM- based agents, a rising trend is to endow them with the capability of using external tools (Schick et al., 2023; Shen et al., 2023a; Qin et al., 2023). To bridge the gap between LLMs and tool-usage, ∗ The first two authors have equal contributions. This work was done when the first author was an intern at Microsoft Research Asia. † Corresponding authors. ""downloads"":1677372, ""id"":""ProsusAI/finbert"", ""likes"":186, ""pipeline_tag"":""text-classification"", ""task"":""text-classification"", ""meta"":{ ""language"":""en"", ""tags"":[ ""financial-sentiment-analysis"", ""sentiment-analysis"" ], ""widget"":[ { ""text"":""Stocks rallied and the British pound gained."" } ] }, ""description"":""\n\nFinBERT is a pretrained NLP model to analyze sentiment of financial text. It is built by further training the BERT language model in the finance domain, using a large financial corpus and thereby fine-tuning it for financial sentiment classification. [Financial PhraseBank] (https://www.researchgate.net/ publication/ 251231107_Good_Debt_or_Bad_Debt_Detectin g_Semantic_Orientations_in_Economic_Text s) by Malo et al. (2014) is used for fine-tuning. For more details, please see the paper [FinBERT: Financial Sentiment Analysis with Pre-trained Language Models](https://arxiv.org/abs/ 1908.10063) and our related [blog post] (https://medium.com/prosus-ai-tech-blog/ finbert-financial-sentiment-analysiswith-bert-b277a3607101) on Medium. \n\nThe model will give softmax outputs for three labels: positive, negative or neutral.\n\n"" { ""product_id"": ""api_20295783-1e06-4cf8-98a2-4b09b829ae7 c"", ""home_url"": ""https://rapidapi.com/ jpbermoy/api/list-movies/"", ""pricing"": ""FREEMIUM"", ""host"": ""listmovies.p.rapidapi.com"", ""tool_description"": ""An API used to list and search through out all the available movies. Can sort, filter, search and order the results"", ""name"": ""List Movies"", ""title"": ""List Movies"", ""tool_name"": ""List Movies"", ""api_list"": [ { ""name"": ""With RT Ratings"", ""url"": ""https://listmovies.p.rapidapi.com/list_movies.json/ false"", ""description"": ""Returns the list with the Rotten Tomatoes rating included"", ""method"": ""GET"", ""required_parameters"": [ { ""name"": ""with_rt_ratings"", ""type"": ""BOOLEAN"", ""description"": """", ""default"": ""false"" } ], ""optional_parameters"": [], } ] } HFModel RapidAPI pricing: FREEMIUM host: list-movies.p.rapidapi.com home_url:https://rapidapi.com/jpbermoy/ api/list-movies/ So much redundant information! Without examples, I do not know when I should use these tools... Why the formats of these tool documents are so different! I can not deal with them consistently! Tool Instruction: Concise, Unified and Effective Tool Description List Movies is a tool used to list and search through all the available movies. This tool has 9 APIs: 1. 'With RT Ratings' returns the list with the Rotten Tomatoes rating included... RapidAPI Tool Functionality Guideline with Example { Scenario: if you want to get the list of movies with Rotten Tomatoes ratings included. Parameters: with_rt_ratings: true Example ""name"": ""With RT Ratings"", ""description"": ""Returns the list with the Rotten Tomatoes rating included"", ""required_parameters"": [ { ""name"": ""with_rt_ratings"", ""type"": ""BOOLEAN"", ""description"": """", ""default"": ""false"" } ], ""optional_parameters"": [], ""Example"": { ""Scenario"": ""if you want to get the list of movies with Rotten Tomatoes ratings included"", ""Parameters"": { ""with_rt_ratings"": true } } } Figure 1: An illustration of the proposed E ASY T OOL , and some issues in tool documentation, e.g., Inconsistency, Redundancy, Incompleteness. The documentations can be polished and refined by E ASY T OOL into more concise and effective tool instructions for better tool usage. agents usually first analyze a user request and conduct planning or reasoning to decompose it into sub-tasks, and then select the most suitable tools for execution to obtain the final answer. Therefore, how to improve the capability of LLMs to precisely invoke and use tools has been critical to develop an autonomous agent. Previously, some researchers (Schick et al., 2023; Qin et al., 2023; Patil et al., 2023; Parisi et al., 2022; Hao et al., 2023) fine-tune opensource LLMs to generate function calls to use tools. However, these methods usually require additional datasets with tool use for training, cannot be extended to widely deployed black-box LLMs (e.g., ChatGPT (OpenAI, 2022, 2023) and Gemini (Team and Google, 2023)), and lack flexibility in integrating external tools in a plug-and-play way. An- ""paths"": { ""/movie/{movie_id}/ keywords"": { ""parameters"": [ {""name"": ""movie_id"", ""in"": ""path"", ""required"": true," 2401.06213v1,"The Astrophysical Journal, 961:31 (17pp), 2024 January 20 https://doi.org/10.3847/1538-4357/ad0634 © 2024. The Author(s). Published by the American Astronomical Society. Synthetic Observations of the Infalling Rotating Envelope: Links between the Physical Structure and Observational Features 1 Shoji Mori 1,2 , Yuri Aikawa 2 , Yoko Oya 3 , Satoshi Yamamoto 4,5 , and Nami Sakai 6 Astronomical Institute, Graduate School of Science, Tohoku University, 6-3 Aoba, Aramaki, Aoba-ku, Sendai, Miyagi, 980-8578, Japan; mori.s@astr.tohoku.ac.jp 2 Department of Astronomy, Graduate School of Science, The University of Tokyo, 113-0033, Tokyo, Japan 3 Center for Gravitational Physics and Quantum Information, Yukawa Institute for Theoretical Physics, Kyoto University, Kyoto, 606-8502, Japan 4 The Graduate University for Advanced Studies SOKENDAI, Shonan Village, Hayama, Kanagawa 240-0193, Japan 5 Research Center for the Early Universe, The University of Tokyo, 7-3-1, Hongo, Bunkyoku, Tokyo 113-0033, Japan 6 RIKEN Cluster for Pioneering Research, 2-1, Hirosawa, Wako-shi, Saitama 351-0198, Japan Received 2022 October 30; revised 2023 September 28; accepted 2023 October 2; published 2024 January 11 Abstract We performed synthetic observations of the Ulrich, Cassen, and Moosman (UCM) model to understand the relation between the physical structures of the infalling envelope around a protostar and their observational features in molecular lines, adopting L1527 as an example. We also compared the physical structure and synthetic position– velocity (P–V ) diagrams of the UCM model and a simple ballistic (SB) model. There are multiple ways to compare synthetic data with observational data. We first calculated the correlation coefficient. The UCM model and the SB model show similarly good correlation with the observational data. While the correlation reflects the overall similarity between the cube datasets, we can alternatively compare specific local features, such as the centrifugal barrier in the SB model or the centrifugal radius in the UCM model. We evaluated systematic uncertainties in these methods. In the case of L1527, the stellar mass values estimated using these methods are all lower than the value derived from previous Keplerian analysis of the disk. This may indicate that the gas infall motion in the envelope is retarded by, e.g., magnetic fields. We also showed analytically that, in the UCM model, the spin-up feature of the P–V diagram is due to the infall velocity rather than the rotation. The line-of-sight velocity V is thus ∝x −0.5 , where x is the offset. If the infall is retarded, rotational velocity should dominate so that V is proportional to x −1 , as is often observed in the protostellar envelope. Unified Astronomy Thesaurus concepts: Star formation (1569); Protostars (1302); Astrochemistry (75) (Aota et al. 2015; Miura et al. 2017; van Gelder et al. 2021; Shariff et al. 2022). Unsaturated hydrocarbons such as C 2 H and c-C 3 H 2 , on the other hand, are abundant in the infalling rotating envelope but sharply decrease at or around the transition region traced by SO (Sakai et al. 2014b, 2014b; Okoda et al. 2018). C 2 H, for example, reacts with H 2 to convert to C 2 H 2 ; the activation barrier can be overcome by shock heating. Hereafter, we refer to such molecules that are destroyed in disk regions as envelope tracing molecules (ETMs). These spatial variations of molecular abundances are found not only in integrated intensity maps, but also in position–velocity diagrams (P–V diagrams hereafter). The kinematic structures traced by the CO, SO, and C 2 H lines in L1527 are quite different from each other (Sakai et al. 2014b). This means that we can trace specific regions (e.g., disk and envelope) by choosing appropriate molecular lines. P–V diagrams are frequently used to analyze the kinematics and basic physical properties of protostellar systems. One of the basic parameters for star formation is the mass of the central star. For example, Aso et al. (2017) analyzed the P–V diagram of the C 18 O (J = 2 − 1) line toward L1527 to show that the rotation velocity inside a radius of ∼74 au is proportional to ∼R −0.5 , where R is the cylindrical radius measured from the central star. They derived the dynamical mass of the central star to be ∼0.45 M e from the P–V diagram by assuming Keplerian rotation. This is slightly larger than the value 0.3 M e estimated by Ohashi et al. (2014) with a lower spatial resolution. Ohashi et al. (2014) reported that the midplane infall velocity in the envelope has to be smaller than the free-fall velocity by a factor 1. Introduction The Atacama Large Millimeter/submillimeter Array (ALMA) is revealing circumstellar structures of low-mass protostars at spatial scales of a few tens of au in nearby starforming regions (e.g., Ohashi et al. 2014, 2023; Sakai et al. 2014b; Oya et al. 2016; Aso et al. 2017; Yen et al. 2017; Okoda et al. 2018, 2021; Jacobsen et al. 2019; Tobin et al. 2019; Bianchi et al. 2020; Harsono et al. 2021). In the vicinity of a protostar, a rotationally supported disk is formed from infalling material with angular momentum. While density distributions can be estimated from dust continuum observations, molecular line observations are essential to reveal the gas dynamics, such as the infall velocity of the envelope gas, the spin-up of the infalling material, and disk formation. While CO is stable and abundant in a large fraction of the volume around a protostar (e.g., Aso et al. 2017; van’t Hoff et al. 2020), lines of other molecules trace specific regions/ structures (e.g., Oya et al. 2016, 2017; Garufi et al. 2020; Pineda et al. 2020; Tychoniec et al. 2021; Lin et al. 2023; Yamato et al. 2023). SO is found in a transitional ring region between the envelope and Keplerian disk, e.g., around the class 0/I protostar L1527 (Sakai et al. 2014b, 2017; van’t Hoff et al. 2023) and the class I protostar IRAS 04365 + 2535 in TMC- 1A (Sakai et al. 2016; Tychoniec et al. 2021), possibly tracing a weak accretion shock with respect to the radial velocity Original content from this work may be used under the terms of the Creative Commons Attribution 4.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. 1" 2401.06214v1,"Constraining New Physics models from µ → e observables in bottom-up EFT Marco Ardu ∗ Departament de Fısica Teorica, Universitat de Valencia, Dr. Moliner 50, E-46100 Burjassot & IFIC, Universitat de Valencia & CSIC, E-46071, Paterna, Spain Sacha Davidson † LUPM, CNRS, Université Montpellier Place Eugene Bataillon, F-34095 Montpellier, Cedex 5, France Stéphane Lavignac ‡ Institut de Physique Théorique, Université Paris Saclay, CNRS, CEA, F-91191 Gif-sur-Yvette, France Upcoming experiments will improve the sensitivity to µ → e processes by several orders of magnitude, and could observe lepton flavour-changing contact interactions for the first time. In this paper, we investigate what could be learned about New Physics from the measurements of these µ → e observables, using a bottom-up effective field theory (EFT) approach and focusing on three popular models with new particles around the TeV scale (the type II seesaw, the inverse seesaw and a scalar leptoquark). We showed in a previous publication that µ → e observables have the ability to rule out these models because none can fill the whole experimentally accessible parameter space. In this work we give more details on our EFT formalism and present more complete results. We discuss the impact of some observables complementary to µ → e transitions (such as the neutrino mass scale and ordering, and LFV τ decays) and draw attention to the interesting appearance of Jarlskog-like invariants in our expressions for the low-energy Wilson coefficients. I. INTRODUCTION The observed neutrino mass matrix [m ν ] [1] requires New Physics beyond the Standard Model (SM) which is lepton flavour-changing. Observing lepton flavour-changing processes other than neutrino oscillations, would therefore give complementary information on New Physics in the lepton sector. Flavour-changing contact interactions among charged leptons (which we refer to as LFV), have not yet been observed, but upcoming experiments aim to improve the sensitivity to a few processes in the µ → e sector by orders of magnitude, and to probe a wide palet of τ → l processes with lesser sensitivity. This is summarised in Table I; it suggests that LFV could be discovered in µ → e, while τ → l is more promising for distinguishing among models. For a review of µ → e LFV, see e.g. [2]. The aim of this project is to explore what can be learned about New Physics in the lepton sector from observations of µ → eγ, µ → eēe and/or µA → eA. For instance, it would be ideal if the data could indicate properties of the New Physics model, such as whether new particles interact with lepton doublets or singlets or both, whether LFV occurs amoung SM particles at loop or tree level, or whether LFV is related to [m ν ], baryogenesis or New Physics in the quark flavour sector. In order to quantify what µ → e data could tell us about models, we study these questions in a bottom-up EFT approach, assuming Λ N P > ∼ TeV. We translate the data from the experimental scale to Λ N P using EFT, then match three “representative” models to the experimentally allowed Wilson coefficient space, and explore which differences among the models can be identified by the data. Model predictions for LFV have been widely studied; in particular, there is a large literature devoted to calculating LFV rates in neutrino mass models (for a review, see e.g [3, 4]; or for example [5–39]) and other Standard Model extensions such as leptoquarks [40–49]. We hope that our bottom-up EFT approach could give a complementary perspective on the well-studied relations between models and observables. Our study differs from top-down analyses in that firstly, we suppose that upcoming µ → e experiments will measure 12 Wilson coefficients, and not just three rates. So we are using a more optimistic/futuristic parametrisation of the LFV observables, using as input everything they could tell us. This allowed us to show in a previous publication [50], that the three models we consider could be ruled out by upcoming data. Secondly, model studies frequently scan over the model parameter space; this allows to estimate correlations among LFV observables, but the results depend on the choice of measure on model parameter ∗ E-mail address: marco.ardu@ific.uv.es † E-mail address: s.davidson@lupm.in2p3.fr ‡ E-mail address: stephane.lavignac@ipht.fr" 2401.06233v1,"LEGOB ENCH : Leaderboard Generation Benchmark for Scientific Models Shruti Singh ∗ Shoaib Alam ∗ Mayank Singh Department of Computer Science and Engineering Indian Institute of Technology Gandhinagar India {singh_shruti, shoaibalam, singh.mayank}@iitgn.ac.in Abstract The ever-increasing volume of paper submissions makes it difficult to stay informed about the latest state-of-the-art research. To address this challenge, we introduce LEGOB ENCH , a benchmark for evaluating systems that generate leaderboards. LEGOB ENCH is curated from 22 years of preprint submission data in arXiv and more than 11,000 machine learning leaderboards in the PapersWithCode portal. We evaluate the performance of four traditional graph-based ranking variants and three recently proposed large language models. Our preliminary results show significant performance gaps in automatic leaderboard generation. The code is available on github 2 and the dataset is hosted on OSF 3 . TLDR: A benchmark for leaderboard generation and a collection of leaderboard data curated from PapersWithCode, citation network, and comparison network curated from twenty-two years of arXiv. 1 Introduction Comparison of results with prior state-of-the-art (SOTA) is a standard practice in experimental research papers. Performance on a task using a specific metric establishes the efficacy of the paper’s proposed method. However, one of the primary challenges in scientific research is to keep up with the rapid volume of research progress and stay updated with the latest SOTA to compare with one’s work. The increasing number of manuscripts (depicted by arXiv submissions in Annexure 1.1 in Supplementary Material) showcases the severity of information overload. With the continuous stream of submission, revision, and acceptance timelines of conferences and journals, researchers often struggle to keep up with the latest models and developments. Thus, being acquainted with the latest papers, sieving through the massive set, and deciding which baselines to compare with can be challenging and time-consuming. Moreover, the latest papers with novel methods may have low visibility, and upcoming papers may overlook those for result comparison as citations are biased towards old papers compared to new papers. To address the information overload and to facilitate the comparison with meaningful baseline works, multiple previous works mine scientific tables from papers [Kayal et al., 2022, Zhong et al., 2020, Deng et al., 2019, Liu et al., 2007] and construct leaderboards [Yang et al., 2022, Kabongo et al., 2023, 2021, Kardas et al., 2020, Hou et al., 2019]. A leaderboard curates performance scores of competitive models against the triple . One of the most actively maintained ∗ equal contribution https://github.com/lingo-iitgn/LEGOBench 3 https://osf.io/9v2py/?view_only=6f91b0b510df498ba01595f8f278f94c 2" 2401.06243v1,"Modularis: Modular Underwater Robot for Rapid Development and Validation of Autonomous Systems Baker Herrin Victoria Close Nathan Berner Mechanical and Aerospace Engineering University of Florida Gainesville, FL, United States eherrin@ufl.edu Electrical and Computer Engineering University of Florida Gainesville, FL, United States vclose@ufl.edu Mechanical and Aerospace Engineering University of Florida Gainesville, FL, United States nberner@ufl.edu Joshua Hebert Ethan Reussow Ryan James Mechanical and Aerospace Engineering University of Florida Gainesville, FL, United States j.hebert@ufl.edu Electrical and Computer Engineering University of Florida Gainesville, FL, United States ryan.james@ufl.edu Electrical and Computer Engineering University of Florida Gainesville, FL, United States ryan.james@ufl.edu Cale Woodward Jared Mindlin Sebastian Paez Electrical and Computer Engineering University of Florida Gainesville, FL, United States calewoodward@ufl.edu Electrical and Computer Engineering University of Florida Gainesville, FL, United States jared.mindlin@ufl.edu Electrical and Computer Engineering University of Florida Gainesville, FL, United States carlos.paez@ufl.edu Nilson Bretas Jane Shin Electrical and Computer Engineering University of Florida Gainesville, FL, United States nbretas@ufl.edu Mechanical and Aerospace Engineering University of Florida Gainesville, FL, United States jane.shin@ufl.edu Abstract—Autonomous underwater robots typically require higher cost and time for demonstrations compared to other domains due to the complexity of the environment. Due to the limited capacity and payload flexibility, it is challenging to find off-the-shelf underwater robots that are affordable, customizable, and subject to environmental variability. Custom-built underwater robots may be necessary for specialized applications or missions, but the process can be more costly and time-consuming than purchasing an off-the-shelf autonomous underwater vehicle (AUV). To address these challenges, we propose a modular underwater robot, Modularis, that can serve as an open-source testbed system. Our proposed system expedites the testing of perception, planning, and control algorithms. Index Terms—Autonomous Underwater Robot, Low-cost Robot Design, Modular Design, Object Detection. I. I NTRODUCTION Recent years have witnessed a remarkable surge in the utilization of Autonomous Underwater Vehicles (AUVs) as a solution to the grand challenges confronting our oceans. Some examples include the realms of marine exploration, underwater mapping, environmental monitoring, underwater archaeology, and offshore industry activities. AUVs hold tremendous promise in addressing the pressing issues that demand our attention in these domains. The advent of AUVs facilitates remarkable advancements in various areas critical to underwater operations such as in mapping intricate underwater terrains, precisely localizing their positions, and devising efficient path planning strategies. These technological strides have already proven their worth in multiple applications, ranging from comprehensive surveys of unexplored marine ecosystems to high resolution documentation of underwater archaeological sites. Furthermore, AUVs prove to be instrumental in supporting offshore industry activities, optimizing resource exploration, and monitoring environmental parameters. The future of AUV development faces three bottlenecks: cost, bring-up time, and lack of modularity. Industrial and research-focused AUVs offered by various companies are more expensive compared to aerial or ground autonomous robots of similar quality. Developing a custom AUV involves extensive mechanical design iterations, custom hardware and electronic components, and programming, often utilizing ROS1 or ROS2. Even with low-cost AUVs available in the market, inexperienced organizations may spend over a year on prototyping, posing a significant barrier to entry. Modularity is crucial for accommodating diverse end-use" 2401.06247v1,"Player Beware: Driving Forces and Influencing Factors for Game-Adapted Dark Patterns Kirill Kronhardt kirill.kronhardt@tu-dortmund.de TU Dortmund University Inclusive Human-Robot Interaction Dortmund, NRW, Germany Kevin Rolfes k.r.whs@outlook.de Westfalian University of Applied Sciences Gelsenkirchen, NRW, Germany actions by exploiting psychological biases, such as prompting System 1 thinking, and humans’ fundamental need to belong [10]. Similarly to the lack of awareness about the amount of collected data, users are either unaware of dark patterns [15] or are aware that they are being manipulated but do not understand how dark patterns can concretely harm them [9]. To counteract dark patterns Bongard- Blanchy et al. propose raising awareness, facilitating detection, and bolstering resistance towards dark patterns through educational, design-oriented, technological or regulatory measures [9]. Similarly, Lu et al. propose that targeting user awareness and user action can lead to end-user-empowerment, bolstering resistance against dark patterns [27]. Our paper takes an educational approach to counteracting dark patterns, by exploring serious games as an alternative to traditional training courses. Serious games are games that are used for non-entertainment purposes [23]. There have been a number of serious games aimed at educating people about privacy and cyber security awareness or dark patterns [3, 8, 20, 28]. The idea is that games inherently increase motivation and fun and thereby improve learning, i.e. induce a change in behavior, attitude, health, understanding, or knowledge [7]. In their meta-analysis of serious games used in education Zhonggen et al. found that serious games encouraged longer engagement with the topic at hand and learners were generally more motivated than in nongame-based learning approaches. Serious games in the context of privacy awareness can take on a variety of forms, often aiming to train users directly to detect or understand certain privacy issues such as cookie consent forms with game mechanics such as rewards and competition (e.g. https://cookieconsentspeed.run/). However, we know from educational research, that such approaches may mostly trigger short-term memory learning and not allow the creation of new neural links for reflection and understanding [4, 26]. We think that this level of reflection is mandatory for users to not simply conduct rote memorization of dark patterns but to create overall awareness and resistance. In this paper, we present a serious game based on narrative storytelling in a non-privacy-related setting to raise awareness about specific privacy-related dark patterns 1 . We discuss our reasoning for how we created game-adapted dark patterns to fit into this context and present a first explorative user study. To summarize, our contribution is three-fold: (1) We present a narration-driven serious game concept, along with seven game-adapted dark patterns designed to create awareness of and bolster resistance against dark patterns through direct consequences of player actions. ABSTRACT Dark patterns are often used in interface design to manipulate users into performing actions they would otherwise not take, such as consenting to excessive data collection. We present a narrative serious game concept, along with seven game-adapted dark patterns designed to create awareness of and bolster resistance against dark patterns through direct consequences of player actions. We performed a qualitative, exploratory study investigating player behavior when confronted with game-adapted dark patterns. A thematic analysis provides insights into influencing factors for adapting dark patterns into gameplay, as well as player motivations and driving forces influencing player behavior. KEYWORDS education, privacy, dark patterns, serious games, awareness 1 Jens Gerken jens.gerken@tu-dortmund.de TU Dortmund University Inclusive Human-Robot Interaction Dortmund, NRW, Germany INTRODUCTION In the current digital landscape, website providers play a dual role: they offer free and important services to users, such as social media platforms, while quietly capitalizing on the data they collect about their users through targeted advertisements. This excessive data collection can lead to tangible harm to users through invasion of privacy, financial loss, and cognitive burden, as well as harm to the collective welfare through unfair competition or unanticipated societal consequences [30]. While users express concern about their information privacy in interviews and questionnaires, users do little to actually protect their data when observed, [1, 2, 36]. Users are often unaware of the extent of the information collected about them [16, 37]. Despite regulatory barriers like the EU General Data Protection Regulation (GDPR), which requires explicit informed consent from users to collect data, many users give consent through cookie consent banners quickly to get to the websites’ content, disregarding potential privacy risks [6, 17]. An important factor in influencing users’ decision to consent to data collection is interface design [35]. Specifically, website providers employ manipulative interface design strategies, so-called dark patterns, to increase the likelihood that users give consent to data collection [9, 18] or extend their stay on a website. Therefore, dark patterns trick users into performing unintended and unwanted This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license visit https://creativecommons.org/licenses/by/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA. Submitted to Proceedings on Privacy Enhancing Technologies 2024(1), 1–13 © 2024 Copyright held by the owner/author(s). ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 A playthrough video of the game can be viewed at http://bit.ly/player-beware- playthrough. 1" 2401.06251v1,"1 Semantic-Preserving Feature Partitioning for Multi-View Ensemble Learning Mohammad Sadegh Khorshidi , Navid Yazdanjue , Hassan Gharoun , Danial Yazdani , Member, IEEE, Mohammad Reza Nikoo , Fang Chen , and Amir H. Gandomi , Senior Member, IEEE Abstract—In machine learning, the exponential growth of data and the associated “curse of dimensionality” pose significant challenges, particularly with expansive yet sparse datasets. Addressing these challenges, multi-view ensemble learning (MEL) has emerged as a transformative approach, with feature partitioning (FP) playing a pivotal role in constructing artificial views for MEL. Our study introduces the Semantic-Preserving Feature Partitioning (SPFP) algorithm, a novel method grounded in information theory. The SPFP algorithm effectively partitions datasets into multiple semantically consistent views, enhancing the MEL process. Through extensive experiments on eight real-world datasets, ranging from high-dimensional with limited instances to low-dimensional with high instances, our method demonstrates notable efficacy. It maintains model accuracy while significantly improving uncertainty measures in scenarios where high generalization performance is achievable. Conversely, it retains uncertainty metrics while enhancing accuracy where high generalization accuracy is less attainable. An effect size analysis further reveals that the SPFP algorithm outperforms benchmark models by large effect size and reduces computational demands through effective dimensionality reduction. The substantial effect sizes observed in most experiments underscore the algorithm’s significant improvements in model performance. Index Terms—Multi-view learning, multi-view ensemble learning, information theory, feature partitioning, dimensionality reduction. I. I NTRODUCTION T HE contemporary digital era is characterized by an explosive growth in data generation, facilitated by various applications [1, 2]. The popularity of the Internet of Things (IoT) and web-based platforms has amplified the data creation rate accompanied by a wave of noisy data, compromising the efficacy of machine-learning algorithms [3, 4]. This surge in data complexity, also known as “big data”, not only challenges analytics but also escalates the burden on machine learning tools, especially for classification and pattern recognition tasks [5, 6]. Mohammad Sadegh Khorshidi, Navid Yazdanjue, Hassan Gharoun, Danial Yazdani, Fang Chen, and Amir H. Gandomi are with the Faculty of Engineering & Information Technology, University of Technology Sydney, Ultimo 2007, Australia. e-mails: ms.khorshidi@student.uts.edu.au, navid.yazdanjue@gmail.com, hassan.gharoun@student.uts.edu.au, danial.yazdani@gmail.com, fang.chen@uts.edu.au, gandomi@uts.edu.au Mohammad Reza Nikoo is with the Department of Civil and Architectural Engineering, Sultan Qaboos University, Muscat, Oman. (e-mail: m.reza@squ.edu.om Amir H. Gandomi is also with the University Research and Innovation Center (EKIK), Obuda University, Budapest 1034, Hungary. This work was supported by the Australian Government through the Australian Research Council under Project DE210101808. Corresponding author: Amir H. Gandomi The “curse of dimensionality” is ascribed to the dilemma of handling large yet sparse data in machine-learning tasks that undermine the performance of applied algorithms [7, 8]. This phenomenon underlines the challenges associated with navigating large feature spaces. As the dimensionality of these spaces expands, data tends to become increasingly sparse, rendering traditional algorithms ineffective [9, 10]. Several dimensionality reduction approaches have been proposed in the literature to overcome the challenges posed by the curse of dimensionality [11, 12]. Broadly, these strategies are categorized into feature selection (FS) and feature extraction (FE) [13]. However, employing these techniques eliminates features and results in loss of information. It is essential to note that even these seemingly trivial features in one feature set could hold intrinsic information value in another due to statistical interactions. Machine learning algorithms can predominantly struggle to capture and generalize feature interactions. Notably, this is often due to a mismatch between the mathematical complexity of these interactions and the structure of the algorithms [14]. To address this shortcoming, a distinctive machine-learning method called “multi-view learning” (MVL) has emerged in the literature [15]. This paradigm harnesses multiple distinct representations of data to enhance model performance. When data is sourced from various sources or observed from different angles, each offers a unique “view”. Relying on the complementary aspects of the information provided by multiple views, the MVL technique leverages distinct views during a collaborative learning process, including nagging, boosting, or stacking to achieve a single model with enhanced performance [16]. Multi-view ensemble learning (MEL), on the other hand, combines the principles of MVL with ensemble learning. The MEL technique aggregates the insights from individual models trained for each view through consensus mechanisms, including model averaging, voting, and meta-learning, aiming to enhance performance and robustness [17]. Both techniques are potent methods to improve the robustness and generalization and reduce overfitting of learning algorithms for high-dimensional and complex data [18]. In the context of MVL (and MEL), views can be categorized into two primary types: natural and artificial views [19]. Natural views arise intrinsically from the data acquisition sources that often result from different sensors, modalities, or feature extraction mechanisms [20]. For instance, MRI and CT scans provide two distinct natural views of the same anatomical structure in medical imaging. On the other" 2401.06275v1,"The Pulse of Mood Online: Unveiling Emotional Reactions in a Dynamic Social Media Landscape SIYI GUO, Information Sciences Institute, USA ZIHAO HE, Information Sciences Institute, USA ASHWIN RAO, Information Sciences Institute, USA FRED MORSTATTER, Information Sciences Institute, USA JEFFREY BRANTINGHAM, University of California, Los Angeles, USA KRISTINA LERMAN, Information Sciences Institute, USA The rich and dynamic information environment of social media provides researchers, policy makers, and entrepreneurs with opportu- nities to learn about social phenomena in a timely manner. However, using these data to understand social behavior is difficult due to heterogeneity of topics and events discussed in the highly dynamic online information environment. To address these challenges, we present a method for systematically detecting and measuring emotional reactions to offline events using change point detection on the time series of collective affect, and further explaining these reactions using a transformer-based topic model. We demonstrate the utility of the method by successfully detecting major and smaller events on three different datasets, including (1) a Los Angeles Tweet dataset between Jan. and Aug. 2020, in which we revealed the complex psychological impact of the BlackLivesMatter movement and the COVID-19 pandemic, (2) a dataset related to abortion rights discussions in USA, in which we uncovered the strong emotional reactions to the overturn of Roe v. Wade and state abortion bans, and (3) a dataset about the 2022 French presidential election, in which we discovered the emotional and moral shift from positive before voting to fear and criticism after voting. The capability of our method allows for better sensing and monitoring of population’s reactions during crises using online data. CCS Concepts: • Human-centered computing → Social media. Additional Key Words and Phrases: Emotional Reactions, Change Point Detection, Topic Modeling 1 INTRODUCTION Social media platforms connect billions of people worldwide, enabling them to exchange information and opinions, express emotions, and to respond to others. Researchers, policy makers, and entrepreneurs have grown interested in learning what the unfettered exchange of information reveals about current social conditions, including using social media data to track public opinion on important issues [22, 26] and monitor the well-being of populations at an unprecedented spatial scale and temporal resolution [36]. Using social media data to learn about human behavior, however, poses significant challenges. Social media represents a heterogeneous, highly dynamic information environment where some topics are widely discussed while others are barely mentioned [13]. It includes people’s self-reports of their own lives, as well as reactions to external events. Researchers have developed methods to detect events from online discussions [29, 34, 40, 47]. However, social media data provides evidence for learning about human behavior beyond shifts in topics. For example, it can also shed light on emotions and morality, which are important drivers of individual attitudes, beliefs, and psychological and social well-being [20, 46]. Authors’ addresses: Siyi Guo, Information Sciences Institute, Marina del Rey, USA, siyiguo@usc.edu; Zihao He, Information Sciences Institute, Marina del Rey, USA, zihaoh@usc.edu; Ashwin Rao, Information Sciences Institute, Marina del Rey, USA, mohanrao@usc.edu; Fred Morstatter, Information Sciences Institute, Marina del Rey, USA, fredmors@isi.edu; Jeffrey Brantingham, University of California, Los Angeles, Los Angeles, USA, branting@ucla.edu; Kristina Lerman, Information Sciences Institute, Marina del Rey, USA, lerman@isi.edu. 1" 2401.06281v1,"Demystifying Variational Diffusion Models Fabio De Sousa Ribeiro 1 and Ben Glocker 1 1 Department of Computing, Imperial College London, UK {fdesousa,b.glocker}@imperial.ac.uk January 15, 2024 Abstract Despite the growing popularity of diffusion models, gaining a deep understanding of the model class remains somewhat elusive for the uninitiated in non-equilibrium statistical physics. With that in mind, we present what we believe is a more straightforward introduction to diffusion models using directed graphical modelling and variational Bayesian principles, which imposes relatively fewer prerequisites on the average reader. Our exposition constitutes a comprehensive technical review spanning from foundational concepts like deep latent variable models to recent advances in continuous-time diffusion-based modelling, highlighting theoretical connections between model classes along the way. We provide additional mathematical insights that were omitted in the seminal works whenever possible to aid in understanding, while avoiding the introduction of new notation. We envision this article serving as a useful educational supplement for both researchers and practitioners in the area, and we welcome feedback and contributions from the community. 1 1 https://github.com/biomedia-mira/demystifying-diffusion" 2401.06298v1,"DERIVATION OF RENORMALIZED HARTREE-FOCK-BOGOLIUBOV AND QUANTUM BOLTZMANN EQUATIONS IN AN INTERACTING BOSE GAS THOMAS CHEN Department of Mathematics, University of Texas at Austin, Austin TX 78712, USA MICHAEL HOTT Department of Mathematics, University of Minnesota - Twin Cities, Minneapolis MN 55414, USA Abstract. Our previous work [37] presented a rigorous derivation of quantum Boltzmann equations near a Bose-Einstein condensate (BEC). Here, we extend it with a complete characterization of the leading order fluctuation dynamics. For this purpose, we correct the latter via an appropriate Bogoliubov rotation, in partial analogy to the approach by Grillakis-Machedon et al. [59], in addition to the Weyl transformation applied in [37]. Based on the analysis of the third order expansion of the BEC wave function, and the second order expansions of the pair-correlations, we show that through a renormalization strategy, various contributions to the effective Hamiltonian can be iteratively eliminated by an appropriate choice of the Weyl and Bogoliubov transformations. This leads to a separation of renormalized Hartree-Fock-Bogoliubov (HFB) equations and quantum Boltzmann equations. A multitude of terms that were included in the error term in [37] are now identified as contributions to the HFB renormalization terms. Thereby, the error bound in the work at hand is improved significantly. To the given order, it is now sharp, and matches the order or magnitude expected from scaling considerations. We expect our approach to be extensible to smaller orders in N 1 . Statements and Declarations. The authors do not declare financial or non-financial interests that are directly or indirectly related to the work submitted for publication. Acknowledgements. M.H.’s research was partially supported by Targeted Grant Award No. 896630 through the Simons Foundation. T.C. gratefully acknowledges support by the NSF through the grant DMS-2009800, and the RTG Grant DMS-1840314 - Analysis of PDE. Contents 1. Introduction 2. Statement of results 2 7 E-mail addresses: tc@math.utexas.edu, mhott@umn.edu. 1" 2401.06306v1,"You can use this material personally. Reprinting or republishing this material for the purpose of advertising or promotion, creating new collective works, reselling or redistributing to servers or lists, or using any copyrighted component in other works must adhere to IEEE policy. The DOI will be supplied as soon as it becomes available. Joint Network Slicing, Routing, and In-Network Computing for Energy-Efficient 6G Zeinab Sasan*, Masoud Shokrnezhad † , Siavash Khorsandi*, and Tarik Taleb †‡ * Amirkabir University of Technology, Tehran, Iran; {z.sasan, khorsandi}@aut.ac.ir † Oulu University, Oulu, Finland; {masoud.shokrnezhad, tarik.taleb}@oulu.fi ‡ Ruhr University Bochum, Bochum, Germany; tarik.taleb@rub.de Abstract—To address the evolving landscape of next-generation mobile networks, characterized by an increasing number of connected users, surging traffic demands, and the continuous emergence of new services, a novel communication paradigm is essential. One promising candidate is the integration of network slicing and in-network computing, offering resource isolation, deterministic networking, enhanced resource efficiency, network expansion, and energy conservation. Although prior research has explored resource allocation within network slicing, routing, and in-network computing independently, a comprehensive investigation into their joint approach has been lacking. This paper tackles the joint problem of network slicing, path selection, and the allocation of in-network and cloud computing resources, aiming to maximize the number of accepted users while minimizing energy consumption. First, we introduce a Mixed-Integer Linear Programming (MILP) formulation of the problem and analyze its complexity, proving that the problem is NP-hard. Next, a Water Filling-based Joint Slicing, Routing, and In-Network Computing (WF-JSRIN) heuristic algorithm is proposed to solve it. Finally, a comparative analysis was conducted among WF-JSRIN, a random allocation technique, and two optimal approaches, namely Opt-IN (utilizing in-network computation) and Opt-C (solely relying on cloud node resources). The results emphasize WF-JSRIN’s efficiency in delivering highly efficient near-optimal solutions with significantly reduced execution times, solidifying its suitability for practical real-world applications. Index Terms—6G, Beyond 5G, Resource Allocation, Network Slicing, Routing, and In-Network Computing. I. I NTRODUCTION The forthcoming generation of mobile networks is poised to contend with a substantial surge in traffic volume and user proliferation. Projections indicate that global mobile subscriptions will reach 13.8 billion by 2025 and expand further to 17.1 billion by 2030. Additionally, mobile traffic is anticipated to experience a yearly growth rate of 55% between 2020 and 2030, as reported by the International Telecommunication Union (ITU) [1]. Furthermore, these next-generation mobile networks are expected to underpin the introduction and development of diverse applications, including mobile holograms, augmented and extended reality, as well as online gaming, among others [2]. These applications typically necessitate data rates ranging from 1 to 100 Gbps and round-trip delay within the range of 0.1 to 1 ms [3]. In the context of a network grappling with such burgeoning demand, a substantial user base, and the emergence of novel services, many challenges come to the fore when contemplating the design of nextgeneration networks. One fundamental challenge lies in the formulation of a network architecture that can effectively segregate various services and ensure their specific requirements are met. A viable solution to this challenge, particularly in the context of 5G and beyond, is the concept of network slicing, which subdivides a shared infrastructure into multiple distinct logical networks, each tailored to support services with distinct requirements, as elucidated in scholarly works [4], [5]. Concurrently, another pressing challenge arises from the limited availability of computational and communication resources. Present-day networks predominantly rely on edge-cloud computing for their computational needs, a paradigm that grapples with capacity constraints [3]. An emergent solution to this resource scarcity conundrum is in-network computing, which endeavors to address the challenge of computational resource constraints. This strategy involves the utilization of programmable network components such as switches and routers, serving dual roles in facilitating both connectivity and computation [3], [6], [7]. Network slicing and in-network computing have been extensively investigated in the literature. Sasan et al. [8] explored resource management in cloud-integrated radio networks to maximize the number of accepted requests. They presented two heuristic algorithms to solve this problem near-optimally. Hu et al. [9] delved into the realm of in-network computing within next-generation networks, focusing on the processing of micro-service requests on network nodes. Their objective aimed to minimize both link load and energy consumption. To tackle this challenge, the authors employed a multi-objective evolutionary algorithm based on decomposition. Shokrnezhad et al. [10], [11] explored resource allocation within a cloudnetwork integrated framework. Their objective centered on the minimization of link and processing node costs, and they introduced two heuristic approaches to address this task. Chen et al. [12] addressed the problem of network slicing and routing with Virtual Network Function (VNF) placement. Their objective sought to minimize the number of active cloud nodes in the network, thereby reducing energy consumption. The authors streamlined the problem formulation to reduce complexity and facilitate its resolution. Dong et al. [13] considered a joint network slicing and routing mechanism with an objective to maximize network utilization and tenant satisfaction. To address resource allocation in this context, they employed the Deep Reinforcement Learning (DRL) method. While the aforementioned methodologies have demon-" 2401.06311v1,"MuGI: Enhancing Information Retrieval through Multi-Text Generation Intergration with Large Language Models Le Zhang 1,2 , Yihong Wu 2 Mila - Québec AI Institute 2 Université de Montréal 1 Abstract nDCG@10 80.0 Large Language Models (LLMs) have emerged as a pivotal force in language technology. Their robust reasoning capabilities and expansive knowledge repositories have enabled exceptional zero-shot generalization abilities across various facets of the natural language processing field, including information retrieval (IR). In this paper, we conduct an in-depth investigation into the utility of documents generated by LLMs for IR. We introduce a simple yet effective framework, Multi-Text Generation Integration (M U GI), to augment existing IR methodologies. Specifically, we prompt LLMs to generate multiple pseudo references and integrate with query for retrieval. The trainingfree M U GI model eclipses existing query expansion strategies, setting a new standard in sparse retrieval. It outstrips supervised counterparts like ANCE and DPR, achieving a notable over 18% enhancement in BM25 on the TREC DL dataset and a 7.5% increase on BEIR. Through M U GI, we have forged a rapid and high-fidelity re-ranking pipeline. This allows a relatively small 110M parameter retriever to surpass the performance of larger 3B models in in-domain evaluations, while also bridging the gap in out-of-distribution situations. We release our code and all generated references at https: //github.com/lezhang7/Retrieval_MuGI. 1 75.7 75.0 70.4 70.0 65.0 71.4 67.4 64.6 60.0 55.0 51.0 50.0 51.4 48.7 46.8 50.3 45.0 TREC DL BM25+Query2doc BM25+MuGI BEIR SOTA sup. AMBv2 (rerank) AMBv2+MuGI Figure 1: Performance Comparison. SOTA sup. refers to monoT5(3B). AMBv2 refers to ALL - MPNET - BASE - V 2(110M) Re-rank top 100 references from BM25+MuGI, BEIR results are averaged over DVpedia, NFCorpus, Scifact, Covid and Touche. calculating lexical overlaps and is renowned for its rapidity and generalization abilities, attributed to its non-parametric nature. Conversely, dense retrieval employs text embeddings from language models for conducting minimum inner product searches. An effective IR process often adopts a two-stage approach: initially using a sparse retriever to balance efficiency and effectiveness, followed by a dense retrieval phase for nuanced reordering of the initial outputs. A proficient method integrates both stages, ensuring swift and high-quality retrieval results. Introduction Information retrieval (IR) is paramount in extracting relevant documents from expansive databases, which is a fundamental operation in search engines, dialog systems (Yuan et al., 2019; Qian et al., 2021), question-answering (Qu et al., 2020), recommendation systems (Fan et al., 2023; Zhang et al., 2023), and Retrieval Augmented Generation (Lewis et al., 2021; Izacard and Grave, 2020; Zhang et al., 2022). IR techniques are primarily divided into two categories: classical sparse retrieval and neural dense retrieval. Sparse retrieval, typified by BM25 (Robertson et al., 1994), relies on Recent advancements in Large Language Models (LLMs), exemplified by ChatGPT, have demonstrated exceptional capabilities in language understanding, generation, generalization, and reasoning (Brown et al., 2020; Touvron et al., 2023). This has spurred research into developing zero-shot methods using LLMs for IR, bypassing the need for training or fine-tuning. Broadly, these methods fall into two categories: direct re-ranking and query rewriting. Direct Re-ranking employs LLMs to re-rank documents given the query, leveraging their extensive pretraining knowledge and reasoning abilities (Sun 1" 2401.06331v1,"APPLICATION OF VISION-LANGUAGE MODELS FOR ASSESSING OSTEOARTHRITIS DISEASE SEVERITY Banafshe Felfeliyan, Yuyue Zhou, Shrimanti Ghosh, Shaobo Liu, Abhilash Hareendranathan, Jacob L. Jaremko Department of Radiology & Diagnostic Imaging, University of Alberta, Edmonton, AB, Canada ABSTRACT Osteoarthritis (OA) poses a global health challenge, demanding precise diagnostic methods. Current radiographic assessments are time-consuming and prone to variability, prompting the need for automated solutions. The existing deep learning models for OA assessment are unimodal single-task systems and they don’t incorporate relevant text information such as patient demographics, disease history, or physician reports. This study investigates employing Vision- Language Processing (VLP) models to predict OA severity using X-ray images and corresponding reports. Our method leverages X-ray images of the knee and diverse report templates generated from tabular OA scoring values to train a CLIP (Contrastive Language-Image Pre-Training) style VLP model. Furthermore, we incorporate additional contrasting captions to enforce the model to discriminate between positive and negative reports. Results demonstrate the efficacy of these models in learning text-image representations and their contextual relationships, showcase potential advancement in OA assessment, and establish a foundation for specialized vision-language models in medical contexts. Index Terms— Vision-Language, Multi-modal Representation Learning, Osteoarthritis, Radiology Report 1. INTRODUCTION Osteoarthritis (OA), a progressive degenerative disease, stands as a leading cause of pain and disability among adults, causing a substantial burden on public health [1]. Moreover, OA holds the distinction of being the most prevalent joint disease worldwide, affecting over 500 million people [2] and the number of people affected worldwide has increased by 48% from 1990 to 2019 [2]. Imaging plays an important role in the diagnosis and feature characterization of OA [3]. Currently, the common clinical approach to diagnose and monitor the long-term progression is measuring the joint space narrowing (JSN) and assessing OA features using the Kellgren-Lawrence (KL) scoring in the planar radiograph (X-ray) [4]. Corresponding author: B.F., email: banfel@ualberta.ca However, KL grades are subject to intra/inter-reader variability and take a considerable amount of time which can have significant implications for patients and their diagnoses. Therefore, the need for an automatic method for evaluating X-rays of individual OA patients has become more evident over the last few years [5]. Such a method would facilitate more precise tracking of their disease progression. Over the past decade, different studies have deployed and developed numerous deep-learning (DL) methods to assess the severity of OA in different imaging modalities [6–8]. Different approaches have been proposed to predict KL grade from the X-ray images using deep-deep learning and generated relatively accurate results [5]. Despite the progress of DL methods, most of the models that are developed for OA assessment or other biomedical domains are unimodal single-task systems and they cannot incorporate relevant information such as patient demographics and disease history [9], which can bound their performance in real-world applications. To address this problem, different studies have begun to incorporate Vision-Language Processing (VLP) models, which integrate both visual and textual information, using medical images and corresponding text reports data [10–12]. Vision-language models have explored their effectiveness on a variety of downstream tasks [9, 13] and have demonstrated that cross-modal supervision can offer a more robust signal for training both images [14] and text [15] models, demonstrating considerable potential in various medical applications. The majority of methods primarily concentrate on vision-language pre-training specifically for chest X-rays. The utilization of these models holds promise in health, particularly in the realm of assessing osteoarthritis (OA) disease severity, presenting an area ripe for their effective application. To the best of our knowledge, there is no work for a multi-modal DL model in the OA domain. Motivated by these observations, in this paper, we propose to deploy a CLIP-style VLP model to predict the severity of OA in X-ray images. The proposed method is developed based on tabular medical scores data by increasing the data efficiency during vision-language modeling by deploying multiple caption styles. Additionally, the proposed method introduces an OA X-ray domain-specific vision-language pre-" 2401.06339v1,"Analysis and operating diagram of an interspecific density-dependent model ∗ TAHANI MTAR † and RADHOUANE FEKIH-SALEM ∗ † ‡ Abstract. This paper studies a two microbial species model in competition for a single resource in the chemostat including general interspecific density-dependent growth rates with distinct removal rates for each species. We give the necessary and sufficient conditions of existence, uniqueness, and local stability of all steady states. We show that a positive steady state, if it exists, then it is unique and unstable. In this case, the system exhibits a bi-stability where the behavior of the process depends on the initial condition. Our mathematical analysis proves that at most one species can survive which confirms the competitive exclusion principle. We conclude that adding only interspecific competition in the classical chemostat model is not sufficient to show the coexistence of two species even considering mortality in the dynamics of two species. Otherwise, we focus on the study, theoretically and numerically, of the operating diagram which depicts the existence and the stability of each steady state according to the two operating parameters of the process which are the dilution rate and the input concentration of the substrate. Using our mathematical analysis, we construct analytically the operating diagram by plotting the curves that separate their various regions. Our numerical method using MATCONT software validates these theoretical results but it reveals new bifurcations that occur by varying two parameters as Bogdanov-Takens and Zero-Hopf bifurcations. The bifurcation analysis shows that all steady states can appear or disappear only through transcritical bifurcations. Key words. Bi-stability, Bifurcation, Chemostat, MATCONT, Operating Diagram. MSC codes. 34A34, 34D20, 37N25, 92B05 1. Introduction. Invented by Monod [33] and almost simultaneously by Novick and Szilard [37] in 1950, the chemostat is a bioreactor fed continuously with a nutrient flow for the cultivation of cells or microorganisms. More precisely, the chemostat represents a device consisting of an enclosure, containing the reaction volume, connected by input to feed the system with resources, and an outlet through which microorganisms are removed. It is the source of several mathematical models describing various biological and ecological interactions between microbial species in the chemostat, for instance: mutualism [45, 46], commensalism [3, 4, 42], syntrophy [8, 13, 14, 40, 48], predator-prey relationship [5, 25], etc. Some of these models have been studied to understand and exploit the anaerobic digestion process used in wastewater and waste treatment. It includes a large number of species that coexist with a very complex relationship (see [14, 32], and the references therein). The classic chemostat model describes the competition of two or more microbial populations on a single non-reproducing nutrient [44]. It is well known that the Competitive Exclusion Principle (CEP) predicts, in a generic case, that only one of them can survive. That is, only the species with the lowest ”break-even” concentration survives while all other species will be ∗ Submitted to the editors 2024-01-05. Funding: This work was supported by the Euro-Mediterranean research network TREASURE (http://www.inra. fr/treasure). † University of Tunis El Manar, National Engineering School of Tunis, LAMSIN, Tunisia (tahani.mtar@enit.utm.tn). ‡ University of Monastir, Higher Institute of Computer Science of Mahdia, Tunisia (radhouane.fekihsalem@enit.utm.tn). 1 This manuscript is for review purposes only." 2401.06391v2,"Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation Chong Wang Jian Zhang Yebo Feng Nanyang Technological University Singapore, Singapore chong.wang@ntu.edu.sg Nanyang Technological University Singapore, Singapore jian_zhang@ntu.edu.sg Nanyang Technological University Singapore, Singapore yebo.feng@ntu.edu.sg Tianlin Li Weisong Sun Yang Liu Nanyang Technological University Singapore, Singapore tianlin001@e.ntu.edu.sg Nanyang Technological University Singapore, Singapore weisong.sun@ntu.edu.sg Nanyang Technological University Singapore, Singapore yangliu@ntu.edu.sg Xin Peng Fudan University Shanghai, China pengxin@fudan.edu.cn [13] constructed upon the Transformer model architecture [14]. These models are either pre-trained or fine-tuned on extensive code corpora, enabling them to automatically generate code based on provided natural language descriptions. These code LLMs have demonstrated notable effectiveness in the generation of code blocks or functions. For instance, CodeLlama [12], built upon the foundational Llama2 model [15], has achieved stateof-the-art results among open code LLMs (e.g., CodeGen [8] and StarCoder [11]), on benchmarks like HumanEval [3] and MBPP [16] that focus on standalone functions. However, it is crucial to emphasize that in real-world code repositories, more than 70% of functions are not standalone [17]. Code LLMs encounter significant challenges when generating such real-world functions, primarily because they cannot be aware of repository-level dependencies, such as userdefined functions and attributes, during the code generation process [17]. This limitation often leads to the generation of code with dependency errors, including undefined-variable and no-member errors. These errors impede the usability and effectiveness of the code LLMs [18]. For example, consider the scenario depicted in Figure 1. A code LLM (e.g., CodeLlama) might incorrectly predict “_updates” after generating “... self.”, resulting in a no-member error because the object “self” does not possess an attribute named “_updates”. Meanwhile, modern Integrated Development Environments (IDEs) take a different approach, which typically incorporates code autocompletion tools based on program analysis. These tools, like Jedi [19], leverage their ability to analyze the current incomplete function’s state and project context to provide valid I. I NTRODUCTION completion recommendations. This includes suggestions for Code generation has been a longstanding focal point in accessible variables, attributes, and functions. For instance, the field of software engineering. Recent advancements have when encountering “self.” in Figure 1, Jedi can infer and introduced a variety of code large language models (LLMs) [1]– recommend 68 accessible attributes defined within “self”, Abstract—Recent code large language models (LLMs) have shown promising performance in generating standalone functions. However, they face limitations in repository-level code generation due to their lack of awareness of repository-level dependencies (e.g., user-defined attributes), resulting in dependency errors such as undefined-variable and no-member errors. In this work, we introduce T OOL G EN , an approach that integrates autocompletion tools into the code LLM generation process to address these dependencies. T OOL G EN comprises two main phases: Trigger Insertion and Model Fine-tuning (Offline), and Tool-integrated Code Generation (Online). During the offline phase, T OOL G EN augments functions within a given code corpus with a special mark token, indicating positions to trigger autocompletion tools. These augmented functions, along with their corresponding docstrings, are then used to fine-tune a selected code LLM. In the online phase, T OOL G EN iteratively generates functions by predicting tokens step-by-step using the fine-tuned LLM. Whenever a mark token is encountered, T OOL G EN invokes the autocompletion tool to suggest code completions and selects the most appropriate one through constrained greedy search. We conduct comprehensive experiments to evaluate T OOL - G EN ’s effectiveness in repository-level code generation. To facilitate this evaluation, we create a benchmark comprising 680 realworld code repositories and introduce two new repository-level metrics: Dependency Coverage and Static Validity Rate. The results demonstrate that T OOL G EN significantly improves Dependency Coverage by 15.2% to 45.8% and Static Validity Rate by 10.9% to 42.2% across three distinct code LLMs, while maintaining competitive performance in widely-recognized similarity metrics such as BLEU-4, CodeBLEU, and Edit Similarity. Furthermore, our generalizability evaluation confirms T OOL G EN ’s consistent performance when applied to diverse code LLMs, including various model architectures and scales." 2401.06396v1,"Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. Digital Object Identifier 10.1109/ACCESS.2017.Doi Number Dense Optical Flow Estimation Using Sparse Regularizers from Reduced Measurements Muhammad Wasim Nawaz 1 , Abdesselam Bouzerdoum 2 , Senior Member, IEEE, Muhammad Mahboob Ur Rahman 3 , Member, IEEE, Ghulam Abbas 4 , Senior Member, IEEE, Faizan Rashid 5 1 Department of Computer Engineering, The University of Lahore 54000, Pakistan College of Science and Engineering, Hamad Bin Khalifa University (HBKU), Qatar. 3 Department of Electrical and Computer Engineering, KAUST 23955, Saudi Arabia 4 Department of Electrical Engineering, The University of Lahore 54000, Pakistan 5 The University of Doha for Science and Technology, Al Tarafa, Jelaiah Street, Duhail North, Doha, Qatar 2 Corresponding author: Faizan Rashid (e-mail: Faizan.rashid@udst.edu.qa). This paragraph of the first footnote will contain support information, including sponsor and financial support acknowledgment. ABSTRACT Optical flow is the pattern of apparent motion of objects in a scene. The computation of optical flow is a critical component in numerous computer vision tasks such as object detection, visual object tracking, and activity recognition. Despite a lot of research, efficiently managing abrupt changes in motion remains a challenge in motion estimation. This paper proposes novel variational regularization methods to address this problem since they allow combining different mathematical concepts into a joint energy minimization framework. In this work, we incorporate concepts from signal sparsity into variational regularization for motion estimation. The proposed regularization uses robust ℓ1 norm, which promotes sparsity and handles motion discontinuities. By using this regularization, we promote the sparsity of the optical flow gradient. This sparsity helps recover a signal even with just a few measurements. We explore recovering optical flow from a limited set of linear measurements using this regularizer. Our findings show that leveraging the sparsity of the derivatives of optical flow reduces computational complexity and memory needs. INDEX TERMS Energy Minimization, Motion Discontinuities, Optical Flow, Sparse Regularizers, Total Variation I. INTRODUCTION Optical flow computation, a fundamental task in computer vision, involves estimating motion from digital videos. Optical flow methods provide an approximation of the movement between consecutive image frames. Accurate optical flow estimates are essential for the extraction of meaningful information from video sequences. These precise estimates play a critical role in activities such as object detection and tracking, surveillance, motion compensation coding, depth measurement, and video analysis. Therefore, it is crucial to acquire precise optical flow estimations. Estimating optical flow is a challenging problem due to the well-known aperture problem [1], which is based on the fact that when moving objects are viewed locally in a digital image sequence, the direction of motion of local features or objects is ambiguous. Variational methods help address the aperture problem by regularizing the optical flow field. These methods try to estimate optical VOLUME XX, 2024 flow by introducing extra constraints such as the smoothness constraint, i.e., the motion of the neighboring pixels in a digital video changes smoothly over time. This ensures that the estimated optical flow is more accurate and reflects how things are truly moving in the video. Hence, the regularization enhances the stability of solutions to get realistic estimates of the motion field. Regularization of optical flow is typically accomplished using the ℓ 1 norm since it makes the regularizers convex, and efficient convex optimization techniques can be employed to minimize it. The use of the ℓ 1 norm produces sparse solutions by penalizing the small magnitudes. It also preserves large magnitudes that usually occur at object boundaries and motion discontinuities. The Total variation (TV) is an example of a convex regularizer that utilizes the ℓ 1 norm with the gradient magnitude [2]. Since motion discontinuities usually occur at object boundaries, a TV regularizer 1" 2401.06407v1,"UAV-borne Mapping Algorithms for Canopy-Level and High-Speed Drone Applications Jincheng Zhang 1 , Artur Wolek 2 and Andrew R. Willis 1 1 Department of Electrical and Computer Engineering Email: {jzhang72, arwillis} @charlotte.edu 2 Department of Mechanical Engineering and Engineering Science Email: {awolek} @charlotte.edu University of North Carolina at Charlotte, Charlotte, NC 28223 USA Abstract This article presents a comprehensive review of and analysis of state-of-the-art mapping algorithms for UAV (Unmanned Aerial Vehicle) applications, focusing on canopy-level and high-speed scenarios. This article presents a comprehensive exploration of sensor technologies suitable for UAV mapping, assessing their capabilities to provide measurements that meet the requirements of fast UAV mapping. Furthermore, the study conducts extensive experiments in a simulated environment to evaluate the performance of three distinct mapping algorithms: Direct Sparse Odometry (DSO), Stereo DSO (SDSO), and DSO Lite (DSOL). The experiments delve into mapping accuracy and mapping speed, providing valuable insights into the strengths and limitations of each algorithm. The results highlight the versatility and shortcomings of these algorithms in meeting the demands of modern UAV applications. The findings contribute to a nuanced understanding of UAV mapping dynamics, emphasizing their applicability in complex environments and high-speed scenarios. This research not only serves as a benchmark for mapping algorithm comparisons but also offers practical guidance for selecting sensors tailored to specific UAV mapping applications. Keywords— UAV; Drone; Mapping; SfM; Stereo reconstruction; 3D reconstruction 1 Introduction UAVs, commonly known as drones, have transcended conventional applications to become indispensable tools across an array of disciplines, from environmental monitoring and precision agriculture to disaster response and infrastructure inspection. At the heart of their efficacy lies the sophisticated interplay between UAVs and mapping algorithms, which serve as the backbone for converting raw sensor data into coherent, high-fidelity maps. These algorithms play a pivotal role in navigating complex terrains, extracting meaningful information, and ensuring precise localization of the UAV in real-time. From traditional photogrammetry to advanced techniques like Simultaneous Localization and Mapping (SLAM), mapping algorithms continuously evolve to meet the diverse demands of applications ranging from agriculture and forestry to disaster response and urban planning. Mapping algorithms for UAVs are significantly influenced by flight altitude, dictating the scale of environmental perception and mapping capabilities. Low-altitude flights excel in detailed and precise mapping, capturing intricate features with high precision. However, as altitude increases, challenges such as reduced sensor performance, diminished feature visibility, and heightened geometric distortions emerge. While 3D or 2D laser scanners generate effective terrain models, their weight and sensitivity to ground proximity pose challenges. Compact depth-sensing devices, though commercially available, often fall short in operational range. Camera-based mapping systems, while lightweight and scalable, face accuracy challenges at high altitudes due to reduced texture and discernible features. This limitation hampers feature tracking and matching, impacting overall mapping algorithm performance. High-altitude flights also amplify drift and uncertainty in UAV trajectory estimation, particularly affecting SLAM algorithms relying on sensor fusion. The accumulation of errors over time compromises pose estimations, emphasizing the critical consideration of flight altitude in optimizing mapping algorithm outcomes. Mapping algorithms tailored for high-speed UAVs address the specific demands of dynamic and rapid flight scenarios. Real-time operation is imperative, necessitating the synchronization and integration of data from diverse sensors such as LiDAR, cameras, and inertial measurement units (IMUs). Adaptive navigation is equally crucial to accommodate the UAV’s swift maneuvers and maintain mapping precision. Overcoming challenges related to large distances covered between sensor readings during high-speed flights is essential for achieving precise mapping results. Additionally, robustness in the face of environmental variability, including changes in" 2401.06409v1,"On Supercapacitors Time–Domain Spectroscopy. C/R Characteristic Slope. Dmitry Valentinovich Agafonov, Arina Romanovna Kuznetsova St. Petersburg State Institute of Technology, Russia, 190013 Mikhail Evgenievich Kompan, Vladislav Gennadievich Malyshkin Ioffe Institute, St. Petersburg, Russia, 194021 Abstract $Id: timedomain.tex,v 1.379 2024/01/11 22:45:11 mal Exp $ A novel time-domain technique for supercapacitor characterization is developed, modeled numerically, and experimentally tested on a number of commercial supercapacitors. The method involves momentarily shorting a supercapacitor for a brief duration, denoted as τ , R R and measuring first Idt and second I 2 dt moments of current along with the potential before and after shorting. The effective C(τ ) and R(τ ) are then obtained from charge preservation and energy dissipation invariants. A linear behavior in [R(τ ), C(τ )] parametric plot is observed by several orders of τ . This gives a C/R characteristic slope: how much ∆C we can “gain” if we are ready to “lose” ∆R in internal resistance. The C/R characteristic slope characterizes possible energy and power properties of the device in terms of materials and technology used, this is a measure of supercapacitor perfection. The technique has been proven with experimental measurements and then validated through computer modeling, analytic analysis, and impedance spectroscopy on a number of circuit types: transmission line, binary tree, etc., a new n-tree element (nTE) is introduced. The approach offers an alternative to low-frequency impedance spectroscopy and methods outlined in the IEC 62391 standard. It provides valuable insights into the performance and characteristics of supercapacitors. Email addresses: phti@lti-gti.ru (Dmitry Valentinovich Agafonov), arinaspbgti@yandex.ru (Arina Romanovna Kuznetsova), kompan@mail.ioffe.ru (Mikhail Evgenievich Kompan), malyshki@ton.ioffe.ru (Vladislav Gennadievich Malyshkin)" 2401.06426v1,"UPDP: A Unified Progressive Depth Pruner for CNN and Vision Transformer Ji Liu * , Dehua Tang * , Yuanxian Huang, Li Zhang, Xiaocheng Zeng, Dong Li, Mingjie Lu, Jinzhang Peng, Yu Wang, Fan Jiang, Lu Tian, Ashish Sirasao Advanced Micro Devices, Inc., Beijing, China {liuji, dehua.tang, yuanxian, xze, d.li, mingjiel, jinz.peng, yu.w, f.jiang, lu.tian, ashish.sirasao}@amd.com Abstract Traditional channel-wise pruning methods by reducing network channels struggle to effectively prune efficient CNN models with depth-wise convolutional layers and certain efficient modules, such as popular inverted residual blocks. Prior depth pruning methods by reducing network depths are not suitable for pruning some efficient models due to the existence of some normalization layers. Moreover, finetuning subnet by directly removing activation layers would corrupt the original model weights, hindering the pruned model from achieving high performance. To address these issues, we propose a novel depth pruning method for efficient models. Our approach proposes a novel block pruning strategy and progressive training method for the subnet. Additionally, we extend our pruning method to vision transformer models. Experimental results demonstrate that our method consistently outperforms existing depth pruning methods across various pruning configurations. We obtained three pruned ConvNeXtV1 models with our method applying on ConvNeXtV1, which surpass most SOTA efficient models with comparable inference performance. Our method also achieves state-of-the-art pruning performance on the vision transformer model. Figure 1: Performance vs. speedup on the ImageNet- 1K. Our three pruned ConvNeXtV1 models surpass most SOTA efficient models on performance including RegNetY, RepVGG, VanillaNet, ConvNeXtV2, Swin-T, PVT, DeiT, EdgeViT, EfficientFormerV2, and FastViT. Introduction weights or layer channels, and a concluding finetuning phase for the pruned model. Notably, model pruning can be classified into two categories: non-structured pruning and structured pruning. Structured pruning is the preferred approach for model deployment in industrial applications, primarily due to hardware limitations. In contrast to non-structured methods, where less important weights in convolutional kernel layers are zeroed out in a sparse manner within each kernel channel, structured pruning encompasses techniques like channel-wise pruning and block pruning. Channel-wise pruning focuses on eliminating entire channel filters within the kernel, while block pruning operates at a larger scale, typically targeting complete blocks. Given that block pruning often leads to a reduction in model depth, it is also referred to as a depth pruner. The evolution of CNN model design has led to the development of more efficient models. For instance, MobileNetV2 (Sandler et al. 2018) employs numerous depthwise convolutional layers and stacks inverted residual blocks, achieving high performance while minimizing parameters and flops. ConvNeXtV1 (Liu et al. 2022) leverages Deep neural networks (DNNs) have made significant strides across various tasks, culminating in remarkable successes within industrial applications. Among these applications, the pursuit of model optimization stands out as a prevalent need, offering the potential to elevate model inference speed while minimizing accuracy trade-offs. This pursuit encompasses a range of techniques, notably model pruning, quantization, and efficient model design. The efficient model design includes neural architecture search (NAS) (Cai et al. 2020; Yu and Huang 2019; Yu et al. 2020; Wang et al. 2021a) and handcraft design methodologies. Model pruning has emerged as a prevalent strategy for optimizing models in industrial applications. Serving as a primary acceleration approach, model pruning focuses on the deliberate removal of redundant weights while maintaining accuracy. This process typically involves three sequential steps: initial baseline model training, subsequent pruning of less vital * These authors contributed equally. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 1" 2401.06433v1,"Global well-posedness for the 2D incompressible heat conducting Navier-Stokes equations with temperature-dependent coefficients and vacuum Wenchao Dong 2 , Qingyan Li 1,∗ 1. School of Sciences, Chang’an University, Xi’an 710064, China; 2. Center for Nonlinear Studies, School of Mathematics, Northwest University, Xi’an 710127, China Abstract: We consider the initial boundary problem of 2D non-homogeneous incompressible heat conducting Navier-Stokes equations with vacuum, where the viscosity and heat conductivity depend on temperature in a power law of Chapman-Enskog. We derive the global existence of strong solution to the initial-boundary value problem, which is not trivial, especially for the nonisentropic system with vacuum. Significantly, our existence result holds for the cases that the viscosity and heat conductivity depend on θ with possibly different power laws (i.e., µ = θ α , κ = θ β with constants α, β ≥ 0) with smallness assumptions only on α and the measure of initial vacuum domain. In particular, the initial data can be arbitrarily large. Moreover, it is obtained that both velocity and temperature decay exponentially as time tends to infinity. Keywords: Navier-Stokes equations; Global strong solution; Large-time behavior; Temperature- dependent transport coefficients MSC2020: 35B40; 35B65; 35Q35; 76D03 1 Introduction The non-homogeneous incompressible heat conducting Navier-Stokes equations (see [33] p.117, [37] p.23) can be stated as follows:   ρ t + div(ρu) = 0,     (ρu) + div(ρu ⊗ u) + ∇P = div(2µD(u)), t  (1.1)  c v (ρθ) t + div(ρuθ) − 2µ|D(u)| 2 = div(κ∇θ),     div u = 0. The system is supplemented with the initial condition (ρ, u, θ)(x, 0) = (ρ 0 , u 0 , θ 0 )(x), x ∈ Ω, (1.2) and the boundary condition u = 0, ∗ ∂θ = 0, on ∂Ω, ∂n Corresponding author. Email addresses: wcdong@stumail.nwu.edu.cn (W.Dong), qyli22@126.com (Q. Li). 1 (1.3)" 2401.06443v1,"BOK-VQA: Bilingual Outside Knowledge-based Visual Question Answering via Graph Representation Pretraining MinJun Kim 1 * , SeungWoo Song 1 * , YouHan Lee 2 , Haneol Jang 1 , KyungTae Lim 3† 1 Hanbat National University 2 Kakao Brain 3 Seoul National University of Science and Technology {20181796, 20181620}@edu.hanbat.ac.kr, youhan.lee@kakaobrain.com, hejang@hanbat.ac.kr, ktlim@seoultech.ac.kr Abstract The current research direction in generative models, such as the recently developed GPT4, aims to find relevant knowledge information for multimodal and multilingual inputs to provide answers. Under these research circumstances, the demand for multilingual evaluation of visual question answering (VQA) tasks, a representative task of multimodal systems, has increased. Accordingly, we propose a bilingual outsideknowledge VQA (BOK-VQA) dataset in this study that can be extended to multilingualism. The proposed data include 17K images, 17K question-answer pairs for both Korean and English and 280K instances of knowledge information related to question-answer content. We also present a framework that can effectively inject knowledge information into a VQA system by pretraining the knowledge information of BOK- VQA data in the form of graph embeddings. Finally, through in-depth analysis, we demonstrated the actual effect of the knowledge information contained in the constructed training data on VQA. Introduction Visual question answering (VQA) (Antol et al. 2015) refers to a system that provides answers to natural language questions related to input images. In recent years, an extended form of VQA, called knowledge based VQA (KB-VQA), has developed that utilizes external knowledge sources, such as Wikipedia or knowledge graphs (KGs), to enable higher-level reasoning to answer complex questions. This knowledge-based approach in VQA leverages various types of information, including biographical (K-VQA) (Shah et al. 2019), common sense (FVQA) (Wang et al. 2017b), (KB- VQA) (Wang et al. 2017a), Wikipedia abstracts (OK-VQA) (Schwenk et al. 2022), and scene graphs (GQA) (Hudson and Manning 2019). However, despite these advancements, the existing versions of KB-VQA encounter various challenges. First, owing to the cost of construction, the size of training data is either relatively small (FVQA and KB-VQA) or generated automatically based on metadata (GQA). Second, most datasets are constructed predominantly in English. Given these language * These authors contributed equally. † Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. biases, a recent approach for addressing this issue introduced xGQA (Pfeiffer et al. 2022), a multilingual VQA evaluation dataset for a few-shot evaluation, however, xGQA is limited by the lack of sufficient training data. Further, KB-VQA encounters challenges in the construction of training data for less-resourced languages owing to the need for accompanying information (e.g., Wikipedia). The consideration of this issue gives rise to the major research question of this study, i.e., can we leverage the rich external knowledge of highly-resourced languages to construct KB-VQA training data for less-resourced languages? We attempted to address this question in this study. Considering that it is not necessary to rely on a specific language if utilizing the knowledge representation of highly-resourced languages in the form of entity embeddings, we proposed a bilingual dataset and method for representing knowledge through KG Embeddings (KGEs). The proposed dataset possessed the following characteristics: (1) We constructed a relatively large-scale training dataset using 17K Korean-English question-answer pairs and 280K instances of information. (2) It is compiled with the structure of bilingual outside-knowledge VQA (BOK-VQA), which utilizes knowledge base (KB) information from English, a representative high-resource language, in conjunction with other languages. KGs, which typically consist of object and relation information, can be used to represent complex relationships. Thus, KGE methods (Nickel et al. 2011; Bordes et al. 2013; Wang et al. 2014; Trouillon et al. 2016; Dettmers et al. 2018; Sun et al. 2019) have been proposed as techniques for compressing and representing data while preserving the structure and information of KGs. This leads us to the final question of this study, i.e., how can knowledge embeddings be efficiently fused into VQA? For that, we propose a graph-embedded learning-based VQA ( GEL - VQA ) model. This model acquires knowledge information from KGs through triple prediction and subsequently leverages this information to address VQA problems. The proposed multitasking model is designed to minimize the loss of information across different tasks by predicting the information required to solve VQA questions through triple prediction and concurrently conducting VQA training. Through in-depth experiments, we revealed that the performance of VQA varied widely from 21.16 to 55.48 depending" 2401.06452v1,"Automated Machine Learning for Positive-Unlabelled Learning Automated Machine Learning for Positive-Unlabelled Learning Jack D. Saunders jsaunders0027@gmail.com School of Computing, University of Kent Canterbury, CT2 7NT, UK Alex A. Freitas A.A.Freitas@kent.ac.uk School of Computing, University of Kent Canterbury, CT2 7NT, UK Editor: Editor Name Abstract Positive-Unlabelled (PU) learning is a growing field of machine learning that aims to learn classifiers from data consisting of labelled positive and unlabelled instances, which can be in reality positive or negative, but whose label is unknown. An extensive number of methods have been proposed to address PU learning over the last two decades, so many so that selecting an optimal method for a given PU learning task presents a challenge. Our previous work has addressed this by proposing GA-Auto-PU, the first Automated Machine Learning (Auto-ML) system for PU learning. In this work, we propose two new Auto- ML systems for PU learning: BO-Auto-PU, based on a Bayesian Optimisation approach, and EBO-Auto-PU, based on a novel evolutionary/Bayesian optimisation approach. We also present an extensive evaluation of the three Auto-ML systems, comparing them to each other and to well-established PU learning methods across 60 datasets (20 real-world datasets, each with 3 versions in terms of PU learning characteristics). Keywords: Positive-Unlabelled Learning, Automated Machine Learning (Auto-ML), Bayesian Optimisation, Genetic Algorithm, Classification 1. Introduction Positive-Unlabelled (PU) learning is a field of machine learning that aims to learn classifiers from data consisting of a set of labelled positive instances and a set of unlabelled instances which can be either positive or negative, but whose label is unknown (Bekker and Davis, 2020). To accurately utilise a standard machine learning method, a fully labelled dataset is required. However, in real-world applications this is often unfeasible due to the expense or impracticality of obtaining fully labelled data (Bekker and Davis, 2020). To address this issue, many methods have been proposed to learn classifiers from partially labelled data (Bekker and Davis, 2020) (Jaskie and Spanias, 2019). This field is referred to as semisupervised classification and usually focuses on learning classifiers from data where only a subset of instances is labelled as the positive or negative class, whilst all the other instances (usually the majority of instances) are unlabelled. PU learning is a specialised case of semisupervised learning where, among the truly positive-class instances, only a subset is labelled as positive; whilst all the other instances are unlabelled – i.e., it is unclear if they are positive or negative instances (Bekker and Davis, 2020). Thus, positive-unlabelled learning presents 1" 2401.06464v1,"Earth Planet. Sci. Lett. 627 (2024) 118567 Contents lists available at ScienceDirect Earth and Planetary Science Letters journal homepage: www.elsevier.com/locate/epsl Condensate evolution in the solar nebula inferred from combined Cr, Ti, and O isotope analyses of amoeboid olivine aggregates Christian A. Jansen a , Christoph Burkhardt a, b, * , Yves Marrocchi c , Jonas M. Schneider a, b , Elias Wölfer a, b , Thorsten Kleine a, b a b c Institut für Planetologie, University of Münster, Wilhelm-Klemm-Straße 10, Münster D-48149, Germany Max Planck Institute for Solar System Research, Justus-von-Liebig-Weg 3, Göttingen D-37077, Germany Centre de recherches pétrographiques et géochimiques (CRPG), CNRS, UMR 7358, F-54000, Nancy, France A R T I C L E I N F O A B S T R A C T Editor: Dr. F. Moynier Refractory inclusions in chondritic meteorites, namely amoeboid olivine aggregates (AOAs) and Ca-Al-rich in­ clusions (CAIs), are among the first solids to have formed in the solar system. The isotopic composition of CAIs is distinct from bulk meteorites, which either results from extreme processing of presolar carriers in the CAI- forming region, or reflects an inherited heterogeneity from the Sun’s parental molecular cloud. Amoeboid olivine aggregates are less refractory than CAIs and provide a record of how the isotopic composition of solid material in the disk may have changed in time and space. However, the isotopic composition of AOAs and how this composition relates to that of CAIs and later-formed solids is unknown. Here, using new O, Ti, and Cr isotopic data for eight AOAs from the Allende CV3 chondrite, we show that CAIs and AOAs share a common isotopic composition, indicating a close genetic link and formation from the same isotopic reservoir. Because AOAs are less refractory than CAIs, this observation is difficult to reconcile with a thermal processing origin of the isotope anomalies. Instead, the common isotopic composition of CAIs and AOAs is readily accounted for in a model in which the isotopic composition of infalling material from the Sun’s parental molecular cloud changed over time. In this model, CAIs and AOAs record the isotopic composition of the early infall, while later-formed solids contain a larger fraction of the later, isotopically distinct infall. This model implies that CAIs and AOAs record the isotopic composition of the Sun and suggests that the nucleosynthetic isotope heterogeneity of the solar system is predominantly produced by mixing of solar nebula condensates, which acquired their distinct isotopic compositions as a result of time-varied infall from the protosolar cloud. Keywords: Solar system formation Protoplanetary disks Chondrites Nucleosynthesis Isotopic abundances Meteorites 1. Introduction Chondritic meteorites derive from parent bodies that did not un­ dergo melting and chemical differentiation, and thus provide a record of the materials present in the solar nebula at different times and places of protoplanetary disk evolution. As such, the investigation of the distinct components preserved in chondrites—refractory inclusions, chondrules, metal, and matrix—provides some of the most direct constraints on the physicochemical conditions under which solid material in the disk was formed, transported, and mixed. To this end, refractory inclusions are of considerable interest, because they are the oldest dated samples of the solar system and thus provide a record of evaporation and condensation processes at high ambient temperatures close to the young Sun (e.g., Krot, 2019). In addition, as is evident from their ubiquitous presence in carbonaceous chondrites and even comets (McKeegan et al., 2006; Matzel et al., 2010), refractory inclusions bear testimony to large-scale transport of solid material through the disk, from their formation re­ gion close to the Sun to the outer solar system, where carbonaceous chondrites and comets later formed (e.g., Ciesla, 2007). Refractory inclusions are divided into two types: Ca-Al-rich in­ clusions (CAIs) and amoeboid olivine aggregates (AOAs). The chemical and mineralogical composition of CAIs is consistent with them being the first solids that formed in a cooling gas of solar composition (Grossman, 1972). Consistent with this, CAIs are the oldest dated objects of the solar system with an absolute age of between ~4567 and ~4568 Ma (Con­ nelly et al., 2012; Amelin et al., 2010; Bouvier and Wadhwa, 2010), and are commonly used to define the onset of solar system formation in cosmochemistry (Brennecka et al., 2020). The isotopic composition of * Corresponding author at: Max Planck Institute for Solar System Research, Justus-von-Liebig-Weg 3, Göttingen D-37077, Germany. E-mail address: burkhardtc@mps.mpg.de (C. Burkhardt). https://doi.org/10.1016/j.epsl.2024.118567 Received 13 October 2023; Received in revised form 28 December 2023; Accepted 4 January 2024 0012-821X/© 2024 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)." 2401.06509v1,"AntEval: Quantitatively Evaluating Informativeness and Expressiveness of Agent Social Interactions Yuanzhi Liang Linchao Zhu University of Technology Sydney Zhejiang University liangyzh18@outlook.com zhulinchao7@gmail.com Abstract While Large Language Models (LLMs) based agents have successfully mimicked human behaviors in various scenarios, the realm of complex, multi-character social interactions within extended contexts remains underexplored. The challenge is compounded by privacy concerns, making it difficult to capture and utilize intricate real-life interactions. More importantly, the absence of quantitative evaluation methods hampers the pursuit of high-quality agent interactions, often leading to interactions that are limited in informativeness and expressiveness, characterized by superficial small talk without clear intentions. In this work, we leverage the rules of Tabletop Role-Playing Games (TRPG) to create an environment conducive to complex, context-rich interactions, emphasizing informativeness and expressiveness. This virtual setting alleviates privacy concerns and motivates agents to engage in meaningful, highquality interactions as part of their in-game objectives. To assess these interactions, we introduce the Agent interaction Evaluation framework (AntEval), targeting the qualitative evaluation of interaction informativeness and expressiveness. Specifically, we propose two novel evaluation metrics: Information Exchanging Precision (IEP) and Interaction Expressiveness Gap (IEG). These metrics are designed to assess interactions in scenarios focused on information exchange and intention expression, respectively. Our experimental results demonstrate the effectiveness of these metrics in evaluating interaction quality. Notably, we identify significant areas for improvement in LLMs regarding social interactions, as highlighted by our metrics. We believe AntEval will guide further exploration in complex agent interactions, bringing them closer to emulating real human behavior and enhancing their integration and utility in real-world applications. 1 Introduction Advancements in Large Language Models (LLMs) have led to significant changes in AI research and Yi Yang Zhejiang University yangyics@zju.edu.cn applications. These models demonstrate exceptional abilities in understanding complex human semantics, addressing reasoning problems, and producing human-like expressions. Recent efforts have utilized LLMs to construct various agents, achieving notable success in diverse domains, including translation, question answering, writing, and complex tasks such as SAT and law examinations. However, the rapid progress of these models has outpaced the development of corresponding evaluation methods, challenging the AI community to explore new frontiers for AI intelligence. Current frameworks predominantly focus on domain-specific knowledge and abilities, such as mathematical reasoning and logical inference. Yet, a crucial aspect often overlooked is social interaction. Sociologically and anthropologically, human beings are inherently social, with interactions forming the backbone of societal structures and personal development. Previous studies have suggested potential links between intelligence and social interactions, underscoring the need to explore agents’ capabilities in this realm. The absence of effective and quantitative frameworks significantly impedes the exploration of human-like social interactions by AI agents. Human interactions, marked by their inherent flexibility and subtlety, pose a challenge in terms of definition, collection, and annotation for analytical purposes. Common conversational exchanges often lack explicit intentions or detailed information, e.g., small talk, diminishing their utility in representing the complexity of real-world interactions. Additionally, interactions that are rich in nuance and strategy, e.g., business negotiations, are rarely recorded due to privacy concerns. As a result, agents trained on these superficial interactions typically demonstrate limited informativeness and expressiveness, failing to adequately capture the depth and nuances of genuine human communication." 2401.06513v1,"ML-On-Rails: Safeguarding Machine Learning Models in Software Systems – A Case Study Hala Abdelkader habdelkader@deakin.edu.au Deakin University Australia Jean-Guy Schneider jean-guy.schneider@monash.edu Monash University Australia Mohamed Abdelrazek mohamed.abdelrazek@deakin.edu.au Deakin University Australia Priya Rani priya.rani@rmit.edu.au RMIT University Australia Scott Barnett scott.barnett@deakin.edu.au Deakin University Australia Rajesh Vasa rajesh.vasa@deakin.edu.au Deakin University Australia ABSTRACT 1 Machine learning (ML), especially with the emergence of large language models (LLMs), has significantly transformed various industries. However, the transition from ML model prototyping to production use within software systems presents several challenges. These challenges primarily revolve around ensuring safety, security, and transparency, subsequently influencing the overall robustness and trustworthiness of ML models. In this paper, we introduce ML-On-Rails, a protocol designed to safeguard ML models, establish a well-defined endpoint interface for different ML tasks, and clear communication between ML providers and ML consumers (software engineers). ML-On-Rails enhances the robustness of ML models via incorporating detection capabilities to identify unique challenges specific to production ML. We evaluated the ML-On- Rails protocol through a real-world case study of the MoveReminder application. Through this evaluation, we emphasize the importance of safeguarding ML models in production. Machine learning (ML) models have evolved into key components in various real-world applications, each with its own level of impact and complexity [16]. These technologies are extensively applied in human-centered systems, such as healthcare [6, 11, 15, 39, 48], autonomous driving [12–14, 43], and human pose estimation [5]. However, ML models face challenges that impact the overall software system robustness [7, 18, 19, 26, 38]. Robustness concerns towards ML-enabled systems have been categorised into three main aspects; transparency, safety, and security [8, 20]. Safety includes elements such as explainability, fairness, and robustness to dataset shift, while security includes defence against adversarial attacks [8, 20]. Transparency of ML models has also been a focus area to avoid the misuse of ML models and preserve their trustworthiness [8, 20, 32, 36]. Further to the above concerns is the silent failures of ML models. It is an inherent behaviour where ML models generate outputs without signaling expected errors or warnings, regardless of input validity [35]. This lack of explicit alerts poses a significant challenge when deploying ML models in production systems as it complicates the identification and resolution of performance issues. This silent failure, if left unaddressed, can lead to profound consequences, undermining the robustness and efficacy of the entire system. The recent emergence of large language models (LLMs) and their expanded application domains, further robustness challenges have been introduced. LLMs take a prompt as input and generate a set of tokens through sampling from a probability distribution. LLMs can easily be manipulated to generate off-topic responses [33]. Additionally, they tend to generate responses that are factually incorrect or entirely fabricated, referred to as hallucinations [9, 31, 34]. Furthermore, LLMs are vulnerable to prompt injection attacks, where malicious actors manipulate inputs to deceive the model into producing harmful outputs [24, 46, 49]. While traditional software engineering has established tools and methodologies for maintaining system robustness, the fundamental differences between ML and traditional software components make it challenging to apply these practices to ML models [7, 26]. Unlike traditional software, ML components rely on data-driven learning techniques that use training data to approximate a mapping function or logic to use for inference [26]. There is ambiguity surrounding the learned logic making it difficult to adopt traditional software engineering tools for ML components. CCS CONCEPTS • Computing methodologies → Artificial intelligence; Machine learning; • General and reference → Reliability; Validation; Design. KEYWORDS Robustness, Trustworthy-AI, Protocol ACM Reference Format: Hala Abdelkader, Mohamed Abdelrazek, Scott Barnett, Jean-Guy Schneider, Priya Rani, and Rajesh Vasa. 2018. ML-On-Rails: Safeguarding Machine Learning Models in Software Systems – A Case Study. In Woodstock ’18: ACM Symposium on Neural Gaze Detection, June 03–05, 2018, Woodstock, NY . ACM, New York, NY, USA, 6 pages. https://doi.org/XXXXXXX.XXXXXXX Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference acronym ’XX, June 03–05, 2018, Woodstock, NY © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX INTRODUCTION" 2401.06529v1,"Industrial Challenges in Secure Continuous Development Fabiola Moyón fabiola.moyon@siemens.com Siemens Technology and Technical University of Munich Germany Florian Angermeir angermeir@fortiss.org fortiss Germany ABSTRACT The intersection between security and continuous software engineering has been of great interest since the early years of the agile development movement, and it remains relevant as software development processes are more frequently guided by agility and the adoption of DevOps. Several authors have contributed studies about the framing of secure agile development and secure DevOps, motivating academic contributions to methods and practices, but also discussions around benefits and challenges. Especially the challenges captured also our interest since, for the last few years, we are conducting research on secure continuous software engineering from a more applied, practical perspective with the overarching aim to introduce solutions that can be adopted at scale. The short positioning at hands summarizes a relevant part of our endeavors in which we validated challenges with several practitioners of different roles. More than framing a set of challenges, we conclude by presenting four key research directions we identified for practitioners and researchers to delineate future work. CCS CONCEPTS • Security and privacy → Software security engineering; • General and reference → Empirical studies; • Software and its engineering → Agile software development. Daniel Mendez daniel.mendez@bth.se Blekinge Institute of Technology and fortiss Sweden and Germany consensus seems to be that the integration of security practices is, at least, difficult. This is corroborated by various secondary studies [4, 7–10, 12] and more practically oriented grey literature [3, 11] reporting on the state of the art and related challenges. However, existing recommendations require too often more empirical evaluations and especially acceptance by practitioners considering their aim at solving practical engineering challenges [2, 5]. To the best of our knowledge, while CSD has been adopted in various interpretations by large enterprises (e.g. scaled agile), the question of which security-specific challenges and needs are relevant in the context of CSD requires further exploration specifically in terms of relevance according to practitioners’ target (e.g. software product security, secure development process, security strategy). We consider this of particular importance to both practitioners as well as researchers developing plausible solutions to those challenges. In this paper, we report on our study results to provide a first answer to this very question. We extend existing discussions around security challenges in agile development and, in particular, DevOps, considering two perspectives: The experiences and expert opinions of individuals, and the perspective of engineering teams. We aim to analyze how groups of practitioners perceive which challenges in their specific context, as described next. KEYWORDS secure agile software engineering, secure DevOps, DevSecOps, secure continuous software engineering, security compliance, security challenges ACM Reference Format: Fabiola Moyón, Florian Angermeir, and Daniel Mendez. 2024. Industrial Challenges in Secure Continuous Development. In 46th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP ’24), April 14–20, 2024, Lisbon, Portugal. ACM, New York, NY, USA, 3 pages. https://doi.org/10.1145/3639477.3639736 1 INTRODUCTION AND BACKGROUND Combining secure development practices with continuous software development (CSD) workflows poses various challenges. How to cope with them has been in the scope of both researchers and practitioners alike for many years [5]. In our perception, a certain Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). ICSE-SEIP ’24, April 14–20, 2024, Lisbon, Portugal © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0501-4/24/04. https://doi.org/10.1145/3639477.3639736 Study Design in a Nutshell. In brief, we conducted case studies in 3 different companies operating in highly regulated environments. Initially, we partnered with security experts to produce a draft list of relevant challenges in the field combining pertinent practitioners and academic sources. Later, in 2019 and 2020, we held five workshops with security and CSD practitioners to refine and validate the list of challenges (see Figure 1). A exploratory workshop with security experts, who consult security for agile teams, delivered the final challenges. Subsequently, individuals of two focus groups reviewed and prioritized the challenges: subject experts (SE) in CSD with responsibility for security, and agile team members with cross-functional roles (AT). Our study participants chose a maximum of five challenges in CSD, that are of priority considering their common objective. Such an objective is either to improve the security of a specific software product or to implement strategies for secure agile development in their organization. The study reported here is part of our long-term investigation of our industrial partners with the goal of supporting an efficient integration of security practices in CSD. As we hope to foster the exchange and discussions around industrial challenges in CSD, we concentrate on reporting our distilled challenges and implications for further research." 2401.06534v1,"SOME REMARKS ON LINEAR-QUADRATIC CLOSED-LOOP GAMES WITH MANY PLAYERS MARCO CIRANT AND DAVIDE FRANCESCO REDAELLI Abstract. We identify structural assumptions which provide solvability of the Nash system arising from a linear-quadratic closed-loop game, with stable properties with respect to the number of players. In a setting of interactions governed by a sparse graph, both short-time and longtime existence of a classical solution for the Nash system set in infinitely many dimensions are addressed, as well as convergence to the solution to the respective ergodic problem as the time horizon goes to infinity; in addition, equilibria for the infinite-dimensional game are shown to provide ε-Nash closed-loop equilibria for the N -player game. In a setting of generalized mean- field type (where the number of interactions is large but not necessarily symmetric), directly from the N -player Nash system estimates on the value functions are deduced on an arbitrary large time horizon, which should pave the way for a convergence result as N goes to infinity. Contents 1. Introduction 2. Shift-invariant games 2.1. General setting 2.2. The evolutive infinite-dimensional Nash system 2.3. Self-controlled sequences for the discrete convolution 2.4. Short-time well-posedness for nearsighted interactions 2.5. Beyond shift-invariance 2.6. Long-time well-posedness for shift-invariant directed strongly gathering interactions 2.7. Almost-optimal controls for the N -player game 2.8. The ergodic Nash system 2.9. Long-time asymptotics 2.10. Digression on a delicate limit case 3. Mean-field-like games References 2 6 6 7 9 11 14 15 21 24 26 28 29 33 Dipartimento di Matematica “T. Levi-Civita”, Università degli Studi di Padova, Via Trieste 63, 35121, Padova, Italy E-mail addresses: cirant@math.unipd.it (Cirant), redaelli@math.unipd.it (Redaelli). Date: January 15, 2024. 1" 2401.06541v1,"Medical Dialogue Generation via Intuitive-then-Analytical Differential Diagnosis Kaishuai Xu 1 , Wenjun Hou 1,2 , Yi Cheng 1 , Jian Wang 1 , Wenjie Li 1 1 Department of Computing, The Hong Kong Polytechnic University, Hong Kong 2 Research Institute of Trustworthy Autonomous Systems and Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China {kaishuaii.xu, alyssa.cheng, jian-dylan.wang}@connect.polyu.hk, houwenjun060@gmail.com, cswjli@comp.polyu.edu.hk Abstract Medical dialogue systems have attracted growing research attention as they have the potential to provide rapid diagnoses, treatment plans, and health consultations. In medical dialogues, a proper diagnosis is crucial as it establishes the foundation for future consultations. Clinicians typically employ both intuitive and analytic reasoning to formulate a differential diagnosis. This reasoning process hypothesizes and verifies a variety of possible diseases and strives to generate a comprehensive and rigorous diagnosis. However, recent studies on medical dialogue generation have overlooked the significance of modeling a differential diagnosis, which hinders the practical application of these systems. To address the above issue, we propose a medical dialogue generation framework with the Intuitive-then-Analytic Differential Diagnosis (IADDx). Our method starts with a differential diagnosis via retrieval-based intuitive association and subsequently refines it through a graph-enhanced analytic procedure. The resulting differential diagnosis is then used to retrieve medical knowledge and guide response generation. Experimental results on two datasets validate the efficacy of our method. Besides, we demonstrate how our framework assists both clinicians and patients in understanding the diagnostic process, for instance, by producing intermediate results and graph-based diagnosis paths. Hi, I have been suffering from a dull pain in the 🙍 upper right abdomen all these days. How long have you been experiencing these symptoms? Do you usually have a regular diet? 👨⚕ For several years. My usual diet is relaDvely regular 🙍 and healthy. Intuitive Similar paDent cases & disease docs Differential Diagnosis Analytic System Organ Disease Symptom ve esD dig tem s sy r sdde lecy lbla cho gal ch s ma tristo gas -s n in pai … l sic fee acid k 👨⚕ ux refl Pain in this area primarily suggests cholecys))s and gastri)s. Have you had any tests done previously? I had a B-ultrasound this year, and the results 🙍 showed polyps in the gallbladder. So, gastri)s needs to be considered. I suggest … 👨⚕ Figure 1: An example of differential diagnosis in a medical dialogue, which contains intuitive and analytic reasoning. Introduction Medical dialogue systems (MDS) endeavor to provide diverse medical services such as diagnosis, treatment plans, and health consultations (Yan et al. 2022; Xu et al. 2023; Chen et al. 2022b). These systems have garnered increasing research attention in recent years due to their potential to assist clinicians in diagnosing and prescribing (Shi et al. 2023; Liu et al. 2022b; Zeng et al. 2020; Zhou et al. 2021; He et al. 2022; Xu et al. 2019). In medical dialogues, diagnosis is a crucial process as the results of diagnosis establish an essential foundation for subsequent consultations (Maynard and Heritage 2005; Silverman, Kurtz, and Draper 2016). However, previous studies on medical dialogue generation using pre-trained language models neglected to explicitly model the diagnostic process (Xu et al. 2023; Zhao et al. 2022; Li et al. 2021; Liu et al. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 2021; Lin et al. 2021; Liu et al. 2022b). One significant issue with these methods is that although responses benefiting from pre-trained models may appear coherent, they usually lack an interpretation grounded in meticulous medical diagnosis. It is challenging for clinicians or patients to accept responses from MDSs without a clear and interpretable diagnostic basis (Kurtz, Draper, and Silverman 2017). In practice, clinicians typically employ both intuitive and analytic reasoning during the dialogue to formulate a differential diagnosis, i.e., a set of potential diseases guiding how the subsequent dialogue unfolds (Croskerry 2009; Tchango et al. 2022; Silverman, Kurtz, and Draper 2016). Intuitive reasoning forms a rough disease list through a quick review of extensive clinical experience, while analytic reasoning cautiously verifies some diseases via a systematic analysis of body systems, organs, and symptoms. As an example shown in Figure 1, if a patient is diagnosed with a high possibility of gastritis but may still have chronic cholecystitis," 2401.06546v1,"Optimizing Feature Selection for Binary Classification with Noisy Labels: A Genetic Algorithm Approach Vandad Imani* 1 , Elaheh Moradi 1 Carlos Sevilla-Salcedo 2 , Vittorio Fortino 3 , and Jussi Tohka 1† 1 A. I. Virtanen Institute for Molecular Sciences, University of Eastern Finland, Finland, 2 Department of Computer Science, Aalto University, Espoo, Finland, 3 Institute of Biomedicine, University of Eastern Finland, Finland, {vandad.imani, elaheh.moradi, vittorio.fortino, jussi.tohka}@uef.fi, carlos.sevillasalcedo@aalto.fi Abstract. Feature selection in noisy label scenarios remains an understudied topic. We propose a novel genetic algorithm-based approach, the Noise-Aware Multi-Objective Feature Selection Genetic Algorithm (NMFS-GA), for selecting optimal feature subsets in binary classification with noisy labels. NMFS-GA offers a unified framework for selecting feature subsets that are both accurate and interpretable. We evaluate NMFS-GA on synthetic datasets with label noise, a Breast Cancer dataset enriched with noisy features, and a real-world ADNI dataset for dementia conversion prediction. Our results indicate that NMFS-GA can effectively select feature subsets that improve the accuracy and interpretability of binary classifiers in scenarios with noisy labels. Keywords: Genetic algorithm, Feature selection, Noisy labels, Classification, Mild cognitive impairment, Magnetic resonance imaging, ADNI, Converter dementia, Alzheimer’s disease. I. Introduction In the era of big data, machine learning (ML) algorithms are increasingly facing the challenges of high data dimensionality and redundant features. This can make it difficult to extract valuable knowledge from the massive feature space, and can lead to overfitting and poor generalization performance, known as the ”curse of dimensionality” [1]. This makes it hard for conventional ML methods to find valuable information from an expansive feature space laden with irrelevant and redundant features present in data [2]. Feature selection (FS) algorithms can be used to address these challenges by identifying a subset of features that are most relevant to the classification task [3]. These algorithms consider the † For the Alzheimer’s Disease Neuroimaging Initiative" 2401.06569v1,"Effect of the Nature of the Solid Substrate on Spatially Heterogeneous Activated Dynamics in Glass Forming Supported Films Anh D. Phan 1, 2, ∗ and Kenneth S. Schweizer 3, 4, 5, 6, † 1 Faculty of Materials Science and Engineering, Phenikaa University, Hanoi 12116, Vietnam 2 Phenikaa Institute for Advanced Study, Phenikaa University, Hanoi 12116, Vietnam 3 Departments of Materials Science, University of Illinois, Urbana, IL 61801, USA 4 Departments of Chemistry, University of Illinois, Urbana, IL 61801, USA 5 Departments of Chemical & Biomolecular Engineering, University of Illinois, Urbana, IL 61801, USA 6 Materials Research Laboratory, University of Illinois, Urbana, IL 61801, USA (Dated: January 15, 2024) We extend the force-level ECNLE theory to treat the spatial gradients of the alpha relaxation time and glass transition temperature, and the corresponding film-averaged quantities, to the geometrically asymmetric case of finite thickness supported films with variable fluid - substrate coupling. The latter typically nonuniversally slows down motion near the solid-liquid interface as modeled via modification of the surface dynamic free energy caging constraints which are spatially transferred into the film, and which compete with the accelerated relaxation gradient induced by the vapor interface. Quantitative applications to the foundational hard sphere fluid and a polymer melt are presented. The strength of the effective fluid-substrate coupling has very large consequences on the dynamical gradients and film-averaged quantities in a film thickness and thermodynamic state dependent manner. The interference of the dynamical gradients of opposite nature emanating from the vapor and solid interfaces is determined, including the conditions for the disappearance of a bulk-like region in the film center. The relative importance of surface-induced modification of local caging versus the generic truncation of the long range collective elastic component of the activation barrier is studied. The conditions for the accuracy and failure of a simple superposition approximation for dynamical gradients in thin films is also determined. The emergence of near substrate dead layers, large gradient effects on film-averaged response functions, and a weak non-monotonic evolution of dynamic gradients in thick and cold films, are briefly discussed. The connection of our theoretical results to simulations and experiments is briefly discussed, as is extension to treat more complex glass-forming systems under nanoconfinement. I. INTRODUCTION Understanding the spatially heterogeneous activated dynamics and kinetic vitrification of diverse glassforming liquids near interfaces and under thin film confinement remains a frontier scientific challenge [1–24]. Vapor and highly variable solid interfaces can induce spatial gradients of structural relaxation that can slow down or speed up relaxation, resulting in major shifts of the local and film-averaged glass transition temperature out to large length scales well beyond those that characterize changes of thermodynamics or structure near the interface [1–24]. For the two-interface thin film confinement case, the surfaces can be symmetric and composed of either solids of highly variable chemistry, stiffness and topography corresponding to capped films, or two vapor interfaces corresponding to free standing films. Asymmetric films with one vapor and one solid surface are even more complex, with competing spatial gradients of dynamics of opposite nature emanating from the different interfaces. Many theoretical models have been proposed for various aspects of these systems (for reviews see refs. [1, 10, 17]), which typically are built on very ∗ Electronic address: anh.phanduc@phenikaa-uni.edu.vn † Electronic address: kschweiz@illinois.edu different physical ideas for the origin of glassy dynamics in the bulk. Simulations have been extensively applied to study film dynamics, with many important findings [1, 2, 8, 10, 12, 13, 15–17, 24]. However, computational limitations restrict simulations from approaching the ultra-long time scales probed experimentally. Recently, a microscopic, particle level, homogeneous bulk dynamical theory has been created and widely applied to atomic, colloidal, molecular, and polymeric glass forming fluids – the Elastically Collective Nonlinear Langevin Equation (ECNLE) theory [25–29]. It is built on the view that the alpha relaxation process is of a coupled local-nonlocal nature, where large amplitude activated hopping on the cage scale is strongly coupled with longer range collective elastic distortions of all particles outside the cage. Based on an a priori coarse-grained mapping or complexity reduction strategy that retains key aspects of chemical specificity [25–29], the theory has been successfully applied to understand the temperature dependence of the alpha relaxation time of diverse families of equilibrium liquids over a range up to 14 orders of magnitude [26–28]. Both the high temperature Arrhenius regime and the lower temperature strongly non- Arrhenius regime have been addressed in a unified and predictive manner. The central concept is the idea of a dynamic free energy that quantifies cage scale localization and the local activation barrier, and also the jump distance and emergent dynamic elastic modulus in suf-" 2401.06591v1,"P ROMETHEUS -V ISION : Vision-Language Model as a Judge for Fine-Grained Evaluation Seongyun Lee 1 * Seungone Kim 1,2∗ Sue Hyun Park 1 Geewook Kim 1,3 Minjoon Seo 1 KAIST AI 1 NAVER AI Lab 2 NAVER Cloud AI 3 {seongyun, seungone, suehyunpark, geewook, minjoon}@kaist.ac.kr Abstract Assessing long-form responses generated by Vision-Language Models (VLMs) is challenging. It not only requires checking whether the VLM follows the given instruction but also verifying whether the text output is properly grounded on the given image. Inspired by the recent approach of evaluating LMs with LMs, in this work, we propose to evaluate VLMs with VLMs. For this purpose, we present a new feedback dataset called the P ERCEPTION C OLLECTION , encompassing 15K customized score rubrics that users might care about during assessment. Using the P ERCEPTION C OLLEC - TION , we train P ROMETHEUS -V ISION , the first open-source VLM evaluator model that can understand the user-defined score criteria during evaluation. P ROMETHEUS -V ISION shows the highest Pearson correlation with human evaluators and GPT-4V among open-source models, showing its effectiveness for transparent and accessible evaluation of VLMs. We open-source our code, dataset, and model at https:// github.com/kaistAI/prometheus-vision. 1 Introduction While recently developed Vision-Language Models (VLMs) are capable of generating long-form text from a combination of an image and instruction, assessing the quality of the output remains a significant challenge (Liu et al., 2023a; Dai et al., 2023; Gao et al., 2023; Ye et al., 2023a; Zhu et al., 2023a; OpenAI, 2023). Traditional metrics, which rely on text-based exact matches or edit distances, fall short in adhering to the granular evaluation criterion of interest and capturing the rich context within the outputs (Agrawal et al., 2023; Mañas et al., 2023; Bai et al., 2023). For instance, as shown in Figure 1, conventional metrics fail to explain what is missing within the response compared to the answer. * denotes equal contribution. Work was done when Seongyun was an intern at KAIST AI and Seungone was an intern at NAVER AI Lab. Consequently, the role of high-quality human evaluations remains pivotal for a comprehensive assessment. However, human evaluators are prone to biases, and scaling up is expensive in terms of time and cost (Ye et al., 2023c; Kim et al., 2023b). To address the need for flexible and automatic text evaluation, the ‘LM-as-a-Judge’ paradigm proposes using language models (LMs) as evaluators, where initial findings suggest its potential to emulate human judgement (Liu et al., 2023a; Zheng et al., 2023; Li et al., 2023; Ye et al., 2023c; Kim et al., 2023d; Zhu et al., 2023b; Bai et al., 2023). However, LMs cannot perceive visual contexts, which necessitates an additional model that could convert the image to text. As a result, such a multistage pipeline could potentially suffer from error propagation and also require multiple inference calls. This situation calls for the direct utilization of VLMs, referred to as VLM-as-a-Judge. On the other hand, despite GPT-4V’s (OpenAI, 2023) potential as an evaluator, its closed-source nature limits transparent evaluation (Kim et al., 2023d). Moreover, our initial tests indicate that open-source VLMs are not effective as evaluators sensitive to granular aspects, demonstrating a low score correlation with both human evaluators and GPT-4V. To address these challenges, we propose P ROMETHEUS -V ISION , a 13B VLM evaluator that excels at assessing based on fine-grained criteria. As shown in Figure 1, P ROMETHEUS - V ISION could evaluate based on the given criteria, pinpointing the differences between the parody artwork and the original masterpiece. To develop P ROMETHEUS -V ISION , we construct the P ERCEPTION C OLLECTION , the first multi-modal feedback dataset that includes 15K fine-grained score rubrics, thus going beyond traditional coarse-grained criteria such as helpfulness, relevance, accuracy, and comprehensiveness. Using the P ERCEPTION C OLLECTION , we fine-tune LLaVA-1.5 to create P ROMETHEUS -V ISION ." 2401.06602v1,"Automated Security Findings Management: A Case Study in Industrial DevOps Markus Voggenreiter Siemens Technology, LMU Munich Munich, Germany Florian Angermeir Ulrich Schöpp Fabiola Moyón fortiss GmbH Munich, Germany Siemens Technology, Technical University of Munich Munich, Germany Pierre Bonvin fortiss GmbH Munich, Germany pierre-louis.bonvin@hm.edu Munich University of Applied Sciences Munich, Germany ABSTRACT KEYWORDS In recent years, DevOps, the unification of development and operation workflows, has become a trend for the industrial software development lifecycle. Security activities turned into an essential field of application for DevOps principles as they are a fundamental part of secure software development in the industry. A common practice arising from this trend is the automation of security tests that analyze a software product from several perspectives. To effectively improve the security of the analyzed product, the identified security findings must be managed and looped back to the project team for stakeholders to take action. This management must cope with several challenges ranging from low data quality to a consistent prioritization of findings while following DevOps aims. To manage security findings with the same efficiency as other activities in DevOps projects, a methodology for the management of industrial security findings minding DevOps principles is essential. In this paper, we propose a methodology for the management of security findings in industrial DevOps projects, summarizing our research in this domain and presenting the resulting artifact. As an instance of the methodology, we developed the Security Flama, a semantic knowledge base for the automated management of security findings. To analyze the impact of our methodology on industrial practice, we performed a case study on two DevOps projects of a multinational industrial enterprise. The results emphasize the importance of using such an automated methodology in industrial DevOps projects, confirm our approach’s usefulness and positive impact on the studied projects, and identify the communication strategy as a crucial factor for usability in practice. DevOps, security, software engineering, security findings management CCS CONCEPTS • Software and its engineering → Software creation and management; • Security and privacy → Software and application security. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). ICSE-SEIP ’24, April 14–20, 2024, Lisbon, Portugal © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0501-4/24/04. https://doi.org/10.1145/3639477.3639744 ACM Reference Format: Markus Voggenreiter, Florian Angermeir, Fabiola Moyón, Ulrich Schöpp, and Pierre Bonvin. 2024. Automated Security Findings Management: A Case Study in Industrial DevOps. In 46th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP ’24), April 14–20, 2024, Lisbon, Portugal. ACM, New York, NY, USA, 11 pages. https://doi.org/ 10.1145/3639477.3639744 1 INTRODUCTION Over the last few years, the software development strategy in the industry has changed from traditional, waterfall-oriented models to iterative and incremental models. A change in the distribution, operation, and maintenance of industry software further caused many practitioners to follow DevOps principles [8]. Amongst multidisciplinary collaboration in the project, one of the key advantages is the automation of tests [26]. To comply with industrial security standards and best practices [2, 11, 18, 22, 30], integrating security aspects in the automation testing strategy is relevant for industrial companies [17], and represents a commonly recommended measure in software development lifecycles [14]. Due to the complexity and size of industrial software, the aspects under test range from software and infrastructure code over configurations and third-party dependencies to the running applications and their production environment. In practice, problems with the security of the software can be identified in each of its components. Hence, each security test category adds another perspective on the overall picture of the software security status and consequently utilizes a different terminology to describe the flaw. Regardless of the security problems cause, it must be managed and reacted to. For the purposes of this manuscript, we define the term security finding as any weakness related to the security of a software product that was identified but not yet confirmed or further processed. This definition is aligned with the ISO security standards treating software vulnerability analysis, which define weakness as software product characteristics that, in proper conditions, could contribute to introducing vulnerabilities [12]. Such security findings are detected, e.g., during automated" 2401.06612v1,"1 Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication Ali Abdullah S. AlQahtani, Member, IEEE, Thamraa Alshayeb, Mahmoud Nabil, and Ahmad Patooghy, Senior Member, IEEE Abstract—The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated frequently. To tackle this challenge, we present a novel 2FA approach replacing the user’s input with decisions made by Machine Learning (ML) that continuously verifies the user’s identity with zero effort. Our system exploits unique environmental features associated with the user, such as beacon frame characteristics and Received Signal Strength Indicator (RSSI) values from Wi- Fi Access Points (APs). These features are gathered and analyzed in real-time by our ML algorithm to ascertain the user’s identity. For enhanced security, our system mandates that the user’s two devices (i.e., a login device and a mobile device) be situated within a predetermined proximity before granting access. This precaution ensures that unauthorized users cannot access sensitive information or systems, even with the correct login credentials. Through experimentation, we have demonstrated our system’s effectiveness in determining the location of the user’s devices based on beacon frame characteristics and RSSI values, achieving an accuracy of 92.4%. Additionally, we conducted comprehensive security analysis experiments to evaluate the proposed 2FA system’s resilience against various cyberattacks. Our findings indicate that the system exhibits robustness and reliability in the face of these threats. The scalability, flexibility, and adaptability of our system render it a promising option for organizations and users seeking a secure and convenient authentication system. Index Terms—two-factor authentication, machine learning, zero effort, continuous authentication, beacon frames, wireless access points, authentication module, Wi-Fi radio waves, RSSI values, 2FA, ML. I. I NTRODUCTION S technology continues to advance at a rapid pace, the need for robust security measures to safeguard sensitive information and data has become paramount. The Identity Theft Resource Center (ITRC) report reveals that data breaches have surged by over 68% in 2020, with a total of 1,862 incidents [1]. In response to these threats, the adoption of Two- Factor Authentication (2FA) has seen a significant growth. A A. AlQahtani (the corresponding author) and A. Patooghy are with the Department of Computer Systems Technology, North Carolina A&T State University, Greensboro, NC, USA, 27411. E-mails: AlQahtani.aasa@gmail.com, apatooghy@ncat.edu T. Alshayeb is with the Department of Physics & Astronomy, George Mason University, Fairfax, VA, USA, 22030. E-mail: Alshayeb.t@gmail.com M. Nabil is with the Department of Electrical & Computer Engineering, North Carolina A&T State University, Greensboro, NC, USA, 27411. E-mail: mnmahmoud@ncat.edu Google’s 2020 study indicates that 150 million people employ 2FA to secure their accounts, the number is expected to rise as cybersecurity takes precedence among individuals and organizations [2]. Microsoft’s research corroborates the effectiveness of 2FA, demonstrating that it can thwart 99.9% of automated cyberattacks [3]. As a result, 2FA has become an indispensable tool for protecting sensitive data. A survey by the Ponemon Institute further underscores its importance, showing that 56% of U.S. organizations have implemented 2FA for at least a portion of their workforce [4]. As 2FA necessitates two authentication factors from users to augment the security beyond a mere password, the adoption of the second factor has become a research question and investigated in [5]–[7]. Researchers have used a range of factors encompassing knowledge-based, possession-based, inherencebased, location-based, behavioral-based, and ambient-based factors [8]. Each approach aims to uniquely verify a user’s identity while bolstering information security. However, existing 2FA techniques possess limitations, including user inconvenience, susceptibility to human error, single-point authentication, restricted adaptability, scalability challenges, and inflexibility. To tackle these issues, this paper introduces a novel 2FA system that harnesses Wi-Fi radio waves and Machine Learning (ML) to authenticate a user’s identity. The proposed system strives to deliver a seamless, user-friendly 2FA experience that minimizes the need for users to supply additional authentication factors beyond their primary login credentials. Furthermore, the proposed system addresses the limitations of existing 2FA methods, enhancing scalability, adaptability, and flexibility. This paper is an extension of our previously published paper [9]. The new contributions with respect to the older version are listed below: • We have incorporated four more ML models to develop an ML-based 2FA system that leverages Wi-Fi access point broadcast messages and RSSI values for reliable and secure user authentication. These models help eliminate the need for additional user input or action, reducing human error risks and improving the overall user experience. • We have incorporated continuous authentication into our system, which enhances security by constantly verifying the user’s identity while accessing protected resources, effectively thwarting unauthorized access. • We conducted a Feature Importance analysis, which provides insights into the significance of each feature in the" 2401.06627v1,"Device-independent certification of desirable properties with a confidence interval Wan-Guan Chang, 1, 2, 3 Kai-Chun Chen, 2 Kai-Siang Chen, 2 Shin-Liang Chen, 4, 3 and Yeong-Cherng Liang 2, 3, ∗ 1 Institute of Information Science, Academia Sinica, Taiwan Department of Physics and Center for Quantum Frontiers of Research & Technology (QFort), National Cheng Kung University, Tainan 701, Taiwan 3 Physics Division, National Center for Theoretical Sciences, Taipei 10617, Taiwan 4 Department of Physics, National Chung Hsing University, Taichung 40227, Taiwan (Dated: January 15, 2024) 2 In the development of quantum technologies, a reliable means for characterizing quantum devices, be it a measurement device, a state-preparation device, or a transformation device, is crucial. However, the conventional approach based on, for example, quantum state tomography or process tomography relies on assumptions that are often not necessarily justifiable in a realistic experimental setting. While the device-independent approach to this problem gets around the shortcomings above by making only minimal, justifiable assumptions, most of the theoretical proposals to date only work in the idealized setting where independent and identically distributed (i.i.d.) trials are assumed. Here, we provide a versatile solution for rigorous device-independent certification that does not rely on the i.i.d. assumption. Specifically, we describe how the prediction-based-ratio (PBR) protocol and martingale-based protocol developed for hypothesis testing can be applied in the present context to achieve a device-independent certification of desirable properties with confidence interval. To illustrate the versatility of these methods, we demonstrate how we can use them to certify—with finite data—the underlying negativity, Hilbert space dimension, entanglement depth, and fidelity to some target pure state. In particular, we give examples showing how the amount of certifiable negativity and fidelity scales with the number of trials. Our results also show that, while the martingale-based protocol is more straightforward to implement, its performance depends strongly on the choice of the Bell function. Intriguingly, a Bell function useful for self-testing does not necessarily give the optimal confidence-gain rate for certifying the fidelity to the corresponding target state. I. INTRODUCTION The proper analysis of quantum experiments is an indispensable part in the development of quantum technologies. However, it is not trivial to reliably characterize a quantum setup, which may include measurement devices and statepreparation devices. Moreover, imperfections in the experimental setup can easily result in a mismatch [1–3] between the characterization tools developed for an idealized situation and an actual experimental situation. However, we can circumvent this problem by the so-called “device-independent approach” [4, 5]. In quantum information, the term “deviceindependent” (DI) was first coined [6] in the task of quantum key distribution [7–9], even though the idea was already conceived independently, but implicitly in [10]. In a nutshell, the DI approach is a framework for analyzing physical systems without relying on any assumption about the degrees of freedom measured. Its basis is Bellnonlocality [5, 11], which shows that no local-hidden-variable theory (LHV) can reproduce all quantum predictions, even though no assumption is made about the details of such a theory. For example, it is known that the violation of Bell inequalities [11] obtained by locally measuring a shared state implies [12] shared entanglement [13], which is a powerful resource in many quantum information processing tasks. More generally, many other desirable properties of the underlying state [14–22], measurements [21–27], and channel [20, 28, 29] may be derived directly from the observa- ∗ ycliang@mail.ncku.edu.tw tion of a Bell-inequality-violating correlation between measurement outcomes. However, due to statistical fluctuations, even when the experimental trials are independent and identically distributed (i.i.d), relative frequencies of measurement outcomes obtained from a Bell experiment do not faithfully represent the underlying distribution. In particular, such raw distributions estimated from the experimental results typically [30– 32] lead to a violation of the nonsignaling conditions [33, 34], which is a prerequisite for the analysis in [15–18, 20–29]. In other words, statistical fluctuations render the many theoretical tools developed for such a purpose inapplicable. To address this issue, some ad hoc methods [30–32] have been proposed to regularize the relative frequencies obtained to ensure that the resulting distribution satisfy the nonsignaling conditions. In [35], a more in-depth discussion was provided and two better-motivated regularization methods were proposed. While these more recent attempts do provide a point estimator that fits within the framework of the usual DI analysis, they are still problematic in two aspects. Firstly, they do not provide any confidence region associated with the estimate. However, any real experiment only involves a finite number of experimental trials. Therefore a useful analysis should provide not only an estimate but also an indication of the reliability of such an estimate. In many of the Bell experiments reported [36–39], this is achieved by reporting the standard deviations of Bell violations. However, for finite, especially a relatively small number of trials, the central limit theorem is not warranted, so the usual interpretation of standard deviations may become dubious. Secondly, these usual approaches and those that provide a DI point estimator [30–32, 35] implicitly assumes that the experimental trials are i.i.d, and hence" 2401.06631v1,"GENERALIZED EXPONENTIAL PULLBACK ATTRACTOR FOR A NONAUTONOMOUS WAVE EQUATION MATHEUS C. BORTOLAN, TOMÁS CARABALLO, AND CARLOS PECORARI NETO Abstract. In this work we introduce the concept of generalized exponential D-pullback attractor for evolution processes, where D is a universe of families in X, which is a compact and positively invariant family that pullback attracts all elements of D with an exponential rate. Such concept was introduced in [1] for the general case of decaying functions (which include the exponential decay), but for fixed bounded sets rather than to universe of families. We prove a result that ensures the existence of a generalized exponential D C ∗ - pullback attractor for an evolution process, where D C ∗ is a specific universe. This required an adaptation of the results of [1], which only covered the case of a polynomial rate of attraction, for fixed bounded sets. Later, we prove that a nonautonomous wave equation has a generalized exponential D C ∗ -pullback attractor. This, in turn, also implies the existence of the D C ∗ -pullback attractor for such problem. Keywords: Generalized exponential pullback attractors. Exponential pullback κ-dissipativity. Nonautonomous wave equation. Evolution processes. Pullback attractors. MSC2020: 35B41, 35L20, 37L25. 1. Introduction The pullback attractor for an evolution process, in general terms, represents the sets of limit states of the solutions of a nonautonomous equation in the pullback sense, and also contain all the bounded solutions defined for all time (see [2, 3, 4], for instance). In other words, it contains all the physically relevant solutions, bearing in mind real world problems from Physics, Chemistry, Biology, Economy, etc. The problem is that there might be no information regarding the rate of attraction of an existing pullback attractor. Many authors have worked with the notion of a pullback exponential attractor (see for instance [5, 6]) for an evolution process, that is, a compact and positively invariant family that exponentially pullback attracts bounded subsets, which moreover, have a (uniformly) finite fractal dimension. We slightly generalize this notion, adapting the ideas of [1], dropping the requirement of finitude of the fractal dimension and adding the property of exponential pullback attraction of universes, which we call a generalized exponential D-pullback attractor, where D is a given universe (which we define later). Our main result, also inspired by [10], and following the ideas of [1], is to prove the existence of such an object, for a suitable universe D C ∗ , [M.C. Bortolan] This study was financed in part by the Coordenação de Aperfeiçoamento de Pessoal de Nı́vel Superior - Brasil (CAPES) - Finance Code 001 and by the Ministerio de Ciencia e Innovación, Agencia Estatal de Investigación (AEI) and FEDER under project PID2021-122991NB-C21. Address: Departamento de Matemática, Centro de Ciências Fı́sicas e Matemáticas, Universidade Federal de Santa Catarina (UFSC), Campus Florianópolis, CEP 88040-090, Florianópolis - SC, Brasil. e-mail: m.bortolan@ufsc.br, ORCiD: 0000-0002-4838-8847. [T. Caraballo] This study was financed in part by Ministerio de Ciencia e Innovación (MCI), Agencia Estatal de Investigación (AEI) and Fondo Europeo de Desarrollo Regional (FEDER) under the project PID2021-122991NB-C21. Address: Departamento de Ecuaciones Diferenciales y Análisis Numérico, Universidad de Sevilla, Campus Reina Mercedes, 41012, Seville, Spain. e-mail: caraball@us.es, ORCiD: 0000-0003-4697-898X. [C. Pecorari Neto] This study was financed in part by the Coordenação de Aperfeiçoamento de Pessoal de Nı́vel Superior - Brasil (CAPES) - Finance Code 001. Address: Departamento de Matemática, Centro de Ciências Fı́sicas e Matemáticas, Universidade Federal de Santa Catarina (UFSC), Campus Florianópolis, CEP 88040-090, Florianópolis - SC, Brasil. e-mail: carlospecorarineto@gmail.com, ORCiD: 0009-0007-4218-7781. 1" 2401.06637v3,"Adversarial Examples are Misaligned in Diffusion Model Manifolds Peter Lorenz 1,2,* , Ricard Durall 1 , and Janis Keuper 3 1 Fraunhofer ITWM 2 Heidelberg University 3 IMLA, Offenburg University * Correspondence to peter.lorenz@itwm.fhg.de Abstract In recent years, diffusion models (DMs) have drawn significant attention for their success in approximating data distributions, yielding state-of-the-art generative results. Nevertheless, the versatility of these models extends beyond their generative capabilities to encompass various vision applications, such as image inpainting, segmentation, adversarial robustness, among others. This study is dedicated to the investigation of adversarial attacks through the lens of diffusion models. However, our objective does not involve enhancing the adversarial robustness of image classifiers. Instead, our focus lies in utilizing the diffusion model to detect and analyze the anomalies introduced by these attacks on images. To that end, we systematically examine the alignment of the distributions of adversarial examples when subjected to the process of transformation using diffusion models. The efficacy of this approach is assessed across CIFAR- 10 and ImageNet datasets, including varying image sizes in the latter. The results demonstrate a notable capacity to discriminate effectively between benign and attacked images, providing compelling evidence that adversarial instances do not align with the learned manifold of the DMs. Figure 1: Illustration of the difference between an adversarial and a benign sample when subjected to the transformation process. p a (x) represents the distribution of adversarial images, while p b (x) represents the distribution of benign images. Using the inversion and reversion process of DDIM [19], x a and x b become x ′ a and x ′ b , respectively. These transformed counterparts now belong to distinct distributions, namely p ′ a (x) and p ′ b (x), characterized by a significantly reduced overlap. Therefore, this results in a distinct representation of adversarial samples compared to benign samples. gradients [3], adversarial training (AT) [4, 5, 6], image denoising [7, 8], and certified defences [9, 10, 11]. The exploration of adversarial attacks on larger image dimensions is progressing rapidly, as evidenced by recent studies [6, 12, 13]. This progress is particularly focused on enhancing transferability to broaden their scope of application. In contrast, defenses [14, 15] targeting adversarial examples [16, 17] concentrate on adjusting input or hyperparameters during test-time. However, these methods are restricted by computational demands, limiting their effectiveness to smaller image sizes (resolutions), such as CIFAR-10 [18]. Common defense methods are certifiable robustness [20], randomized smoothing [21], and adversarial training [16]. Consequently, supervised learning defense methods are more successful on larger image sizes but only show a proof-of-concept of the detection capabilities rather than being a defense. Diffusion models (DMs) have emerged as a powerful Keywords: Adversarial examples, diffusion models 1 INTRODUCTION A longstanding problem of deep learning (DL) is the vulnerability to adversarial examples [1, 2]. These instances are maliciously crafted by introducing imperceptible perturbations to natural examples, inducing in this way erroneous predictions in DL models, such as misclassifications. Given the potential security threats posed by the lack of adversarial robustness in real-world applications, substantial efforts have been dedicated to developing defenses against adversarial examples. Various strategies have been explored, including addressing obfuscated 1" 2401.06647v1,"Superorders and acoustic modes folding in BiFeO 3 /LaFeO 3 superlattices R. Gu 1 , R. Xu 2 , F. Delodovici 2 , B. Carcan 3 , M. Khiari 3 , G. Vaudel 1 , V. Juvé 1 , M. Weber 1 , A. Poirier 1 , P. Nandi 4 , B. Xu 5 , V. E. Gusev 6 , L. Bellaiche 7 , C. Laulhé 8,9 , N. Jaouen 9 , P. Manuel 10 , B. Dkhil 2 , C. Paillard 2,7∗ , L. Yedra 4 , H. Bouyanfif 3† , P. Ruello 1‡ 1 Institut des Molécules et Matériaux du Mans, UMR 6283 CNRS, Le Mans Université, 72085 Le Mans, France 2 Laboratoire Structures, Propriétés et Modélisation des Solides, CentraleSupélec, UMR CNRS 8580, Université Paris-Saclay, 91190 Gif-sur-Yvette, France 3 Laboratoire Physique de la Matière Condensée, Université Picardie-Jules Vernes, Amiens, France. 4 Laboratory of Electron Nanoscopies (LENS) - MIND - Department of Electronics and Biomedical Engineering & Institute of Nanoscience and Nanotechnology (IN2UB), University of Barcelona, Spain. 5 Institute of Theoretical and Applied Physics, Jiangsu Key Laboratory of Thin Films, School of Physical Science and Technology, Soochow University, Suzhou 215006, China 6 Laboratoire d’Acoustique de Le Mans Université, UMR CNRS 6613, Le Mans Université, ∗ Electronic address: paillard@uark.edu Electronic address: houssny.bouyanfif@u-picardie.fr ‡ Electronic address: pascal.ruello@univ-lemans.fr † 1" 2401.06648v1,"Real-time MPC with Control Barrier Functions for Autonomous Driving using Safety Enhanced Collocation ⋆ Jean Pierre Allamaa ∗,∗∗ Panagiotis Patrinos ∗∗ Toshiyuki Ohtsuka ∗∗∗ Tong Duy Son ∗ ∗ Siemens Digital Industries Software, 3001, Leuven, Belgium (e-mail: {jean.pierre.allamaa, son.tong}@siemens.com) ∗∗ Dept. Electr. Eng. (ESAT) - STADIUS research group, KU Leuven, 3001 Leuven, Belgium (e-mail: panos.patrinos@esat.kuleuven.be) ∗∗∗ Department of Informatics, Kyoto University, Kyoto, Japan (e-mail: ohtsuka@i.kyoto-u.ac.jp) Abstract: The autonomous driving industry is continuously dealing with more safety-critical scenarios, and nonlinear model predictive control (NMPC) is a powerful control strategy for handling such situations. However, standard safety constraints are not scalable and require a long NMPC horizon. Moreover, the adoption of NMPC in the automotive industry is limited by the heavy computation of numerical optimization routines. To address those issues, this paper presents a real-time capable NMPC for automated driving in urban environments, using control barrier functions (CBFs). Furthermore, the designed NMPC is based on a novel collocation transcription approach, named RESAFE/COL, that allows to reduce the number of optimization variables while still guaranteeing the continuous time (nonlinear) inequality constraints satisfaction, through regional convex hull approximation. RESAFE/COL is proven to be 5 times faster than multiple shooting and more tractable for embedded hardware without a decrease in the performance, nor accuracy and safety of the numerical solution. We validate our NMPC-CBF with RESAFE/COL approach with highly accurate digital twins of the vehicle and the urban environment and show the safe controller’s ability to improve crash avoidance by 91%. Keywords: Real-time NMPC, Control Barrier Function, Autonomous Driving 1. INTRODUCTION Advancements in autonomous driving (AD) and automated vehicles (AV) have been weakened by the acceptability of such intelligent components by human beings. This is mainly due to safety-critical nature of AVs that are required to navigate with high performance not only in normal scenarios, but also in safety-critical situations such as urban driving in presence of obstacles. In order to achieve optimal performance in such safety-critical situations, the AD motion planning module often needs to control the system at the limit of states and inputs. Nonlinear model predictive control (NMPC) is one solid control strategy allowing optimal and deterministic motion planning that optimizes over possibly conflicting stability, safety, and control objectives. There exists abundant work in the literature to tackle AD collision avoidance and NMPC has proven to be one promising approach, however, most of the work relies on simplified models, limited scenarios, and consider distance constraints with Euclidean norms. Although successful, the scalability of those approaches towards different applications, models ⋆ This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Sk lodowska-Curie grant agreement ELO-X No 953348 (for e.g. shorter horizon), and embedded hardware deployment, is tight. In particular, the usage of a fast NMPC in the control loop is hindered by two main challenges: 1) lack of general methods to tackle urban driving with long planning horizons, and 2) the computation time of the underlying numerical optimization. One possible contained approach to combine a mid-level planner for collision-free trajectories, and a low-level control for trajectory tracking is known as control barrier functions (CBF). CBF approaches provide safety guarantees for the trajectories of the continuous-time nonlinear system beyond the predicted horizon in the NMPC through set invariance that exploits a Lyapunov-like condition for safety. CBFs have shown to be advantageous over other methods, when used within the MPC formulation (Zeng et al. (2021); Son and Nguyen (2019)), or as a safety filter for end-to-end control approaches (Cosner et al. (2022)), yet not real-time capable. There are proven computationally efficient CBF formulations for collision avoidance as in He et al. (2021) but do not scale well for urban driving and long planning horizons. Therefore, in this paper we present a real-time capable NMPC-CBF, for simultaneous path tracking and collision avoidance allowing to safely navigate through urban environments, while satisfying spatio-temporal input/state constraints." 2401.06663v1,"Dynamics of elastic lattices with sliding constraints L. Cabras 1 , D. Bigoni ∗2 , and A. Piccolroaz 2 1 2 Department of Industrial and Mechanical Engineering, University of Brescia, Italy Department of Civil, Environmental, and Mechanical Engineering, University of Trento, Italy Abstract This study investigates the impact of sliders – constraints acting on elastic rods allowing for a transverse displacement jump while maintaining axial and rotational displacement continuity – on the dynamics of a periodic elastic grid, including the effects of axial preload. The grid is linearly elastic and subject to in-plane incremental deformation, involving normal and shear forces and bending moment. The periodicity of the infinite grid permits a Floquet-Bloch wave analysis and a rigorous dynamic homogenization, leading to an equivalent prestressed elastic solid. The investigation is complemented by ad hoc developed F.E. simulations and perturbations with a pulsating Green’s function. Results show that the sliders create band gaps, flat bands, and Dirac cones in the dispersion diagrams and generate macro-instability even for tensile prestress. The latter corresponds to the loss of ellipticity at the parabolic boundary in the equivalent elastic solid and provides a rare example of an almost unexplored form of material instability. Therefore, our results offer design strategies for metamaterials and architected materials showing reversible material instabilities and filtering properties for mechanical signals. Keywords Metamaterials · Floqet-Bloch analysis · Shear bands · Ellipticity loss · Material instabilities 1 Introduction Slider constraints implement transverse compliance (at the same time, maintaining continuity of axial displacement and rotation) in Euler-Bernoulli or Rayleigh rods, which are otherwise unshearable. Breaking unshearability leads to strong effects on structural mechanics, for instance, introduces tensile buckling in slender rods [1]. Architected materials, designed as a grid of axially preloaded elastic rods with sliders, were homogenized to obtain the response of an equivalent prestressed material [2]. The equivalent material was shown to possess a completely bounded stability domain, while unboundedness for tensile prestresses always occurs when sliders are absent [3]. Therefore, the use of sliders yields an elastic metamaterial which ‘fails’ (i.e. develops shear bands, instead of breaking bonds as in [4]) for every load path, while ‘integrity’ may be recovered by simply unloading. Although many results have been obtained, the investigation into the mechanical effects of sliders is far from concluded, so that important effects may still have to be discovered. The present article contributes in this direction by analyzing the dynamics of a periodic grid of axially-preloaded elastic rods, each jointed at mid-span with a slider, Fig. 1. Dispersion surfaces are obtained through a Bloch-Floquet wave analysis, revealing band gaps, flat bands, and Dirac cones. Here, the sliders lead to the emergence of twin band gaps and localize the propagation in a direction parallel to the sliding direction when the stiffness of the sliders tends to vanish, so that a ‘floppy mode’ is introduced in the kinematics. The analysis is complemented with F.E. simulations (of a portion of grid ad hoc implemented with a PML boundary), to be contrasted with results obtained using a Green’s function perturbation technique (see [5]), applied to an infinite body made up of the prestressed elastic material equivalent (through rigorous low-frequency, longwavelength dynamic homogenization [6–9]) to the elastic grid. When macroscopic bifurcation occurs, ∗ Corresponding author: e-mail: bigoni@unitn.it; phone: +39 0461 282507. 1" 2401.06667v1,"1 The SemIoE Ontology: A Semantic Model Solution for an IoE-based Industry Marco Arazzi 1 , Antonino Nocera 1 , Emanuele Storti 2 1 Department of Electrical, Computer and Biomedical Engineering, University of Pavia via A. Ferrata, 5 - 27100 - Pavia, Italy. marco.arazzi01@universitadipavia.it; antonino.nocera@unipv.it 2 Department of Information Engineering, Polytechnic University of Marche via Brecce Bianche - 60121 - Ancona, Italy e.storti@univpm.it Abstract—Recently, the Industry 5.0 is gaining attention as a novel paradigm, defining the next concrete steps toward more and more intelligent, green-aware and user-centric digital systems. In an era in which smart devices typically adopted in the industry domain are more and more sophisticated and autonomous, the Internet of Things and its evolution, known as the Internet of Everything (IoE, for short), involving also people, robots, processes and data in the network, represent the main driver to allow industries to put the experiences and needs of human beings at the center of their ecosystems. However, due to the extreme heterogeneity of the involved entities, their intrinsic need and capability to cooperate, and the aim to adapt to a dynamic user-centric context, special attention is required for the integration and processing of the data produced by such an IoE. This is the objective of the present paper, in which we propose a novel semantic model that formalizes the fundamental actors, elements and information of an IoE, along with their relationships. In our design, we focus on state-of-theart design principles, in particular reuse, and abstraction, to build “SemIoE”, a lightweight ontology inheriting and extending concepts from well-known and consolidated reference ontologies. The defined semantic layer represents a core data model that can be extended to embrace any modern industrial scenario. It represents the base of an IoE Knowledge Graph, on top of which, as an additional contribution, we analyze and define some essential services for an IoE-based industry. Index Terms—Industry 5.0, Internet-of-Everything, IoT, ontology, Knowledge Graph I. I NTRODUCTION T HE Industry 5.0 paradigm emphasizes the shift from traditional industries to intelligent, people-oriented, and environmentally conscious industrial ecosystems. According to this perspective, the focus of production processes should always revolve around the experiences and needs of human beings, fostering innovation and creativity on the production side, and individualizing product offerings on the customer side. To achieve these goals, production environments must undergo significant adjustments to delegate repetitive tasks to more and more autonomous devices and machines. The Internet of Things has strengthened the relationship between humans and intelligent devices, and the expansion of this network, known as the Internet of Everything (IoE), integrates devices, processes, data, and people into a single, highly interconnected environment. This technology allows for a smooth transition towards Industry 5.0, as the IoE natively builds a collaborative ecosystem involving people, autonomous devices (such as smart objects, robots, cobot, and so forth), and smart platforms. However, one of the main challenges of an Industry 5.0 scenario is to re-define the working context by putting human resources at the center of the production chain, so that all the services, facilities, data, and tools, available in the industry environment, are dynamically adapted to his/her needs. Under this point of view, if the IoE becomes a technological opportunity to build an Industry 5.0 on the one hand, suitably modeling its data and building humancentric services on top of them is a critical task, on the other hand. Moreover, modern IoT technology, which is part of the more general IoE ecosystem considered in this paper, provides access to increasingly autonomous smart devices that can often even act on behalf of their human owners. This leads to a very complex reality to which the industry should adapt, not only to surround human resources easing their access to the industrial environment, but also to allow a smooth shift from direct manual actions and tasks carried out by human resources to automatic actions carried out by suitably delegated smart devices. Such an opportunity implicitly requires a slight paradigm change from human-centric to user-centric, in which users can be either human resources or autonomous smart devices acting on their behalves. In such a scenario one of the main problems is how to integrate data produced by intelligent and autonomous devices with those produced by the actions carried out by humans in order to enable self-organization, self-optimization, selfhealing for the whole IoE. To address the above mentioned problem, large integration scenarios must be considered, up to the level of an entire enterprise, for collecting and processing flows of data produced by all the agents of an industrial IoE. In this setting, a model-based strategy may support the integration effort providing fundamental reference information to enable the declination of the above mentioned Industry 5.0, at least from a data management point of view. However, such a strategy should answer the following research question: how to" 2401.06671v1,"Learning Joint Space Reference Manifold for Reliable Physical Assistance Amirreza Razmjoo 1,2 , Tilen Brecelj 3 , Kristina Savevska 3 , Aleš Ude 3 , Tadej Petrič 3 , and Sylvain Calinon 1,2 Abstract— This paper presents a study on the use of the Talos humanoid robot for performing assistive sit-to-stand or stand-to-sit tasks. In such tasks, the human exerts a large amount of force (100–200 N) within a very short time (2–8 s), posing significant challenges in terms of human unpredictability and robot stability control. To address these challenges, we propose an approach for finding a spatial reference for the robot, which allows the robot to move according to the force exerted by the human and control its stability during the task. Specifically, we focus on the problem of finding a 1D manifold for the robot, while assuming a simple controller to guide its movement on this manifold. To achieve this, we use a functional representation to parameterize the manifold and solve an optimization problem that takes into account the robot’s stability and the unpredictability of human behavior. We demonstrate the effectiveness of our approach through simulations and experiments with the Talos robot, showing robustness and adaptability. I. INTRODUCTION The integration of robots into our daily lives is becoming increasingly feasible, and their presence in society is no longer a distant possibility. This possesses the capability to provide different forms of assistance to individuals in their daily lives, including social [1], collaborative [2], and physical support [3]. The current study specifically focuses on physical assistance, in which a humanoid robot, Talos, aids users in performing sit-to-stand or stand-to-sit (STS) tasks. Previous research in STS tasks has mainly concentrated on utilizing optimization techniques to estimate optimal assistance, with the aim of solving the problem offline [4], [5], [6]. The experimental setup utilized in these studies involved low-dimensional, fully actuated systems, allowing for the admissible implementation of pre-planned assistance in the reproduction phase. In this scenario, the human acts as a follower system, adapting his/her behavior to the preplanned actions of the robot. However, this paper aims to achieve a more human-like STS task, where the robot plays the role of a follower and reacts to the human’s actions while considering different constraints. A similar study to our work is the one conducted by Shimon et al. [7], where a ballbot was used to assist a human in an STS task by controlling its leaning angle based on the force received from the human. *This work was supported by the SWITCH project (https:// switch-project.github.io/), funded by the Swiss National Science Foundation and Slovenian Research Agency with grant number N2- 0153. 1 Idiap Research Institute, CH {name.surname}@idiap.ch 2 École Polytechnique Fédérale de Lausanne (EPFL), CH 3 Jožef Stefan Institute, SI {name.surname}@ijs.si a) Human-human interaction b) Dynamic model c) Simulation d) Real robot Fig. 1: Experimental setup. (a) Force and human articulation position data collection during human-human interaction (only force data is utilized in this paper), (b) Robot’s dynamic model, (c) Simulation setup where the human is modeled as an external force, and (d) human-robot interaction scenario. Humanoid robots hold a distinct position among various types of robots, as their physical resemblance to humans has fueled aspirations that humanoid robots may one day perform tasks at a level comparable to humans. However, these robots currently face numerous challenges, including underactuated dynamics, high dimensionality, and unilateral contact with the environment. Overcoming these research challenges has led to the development of reduced-order models such as the linear inverted pendulum mode (LIPM) [8] or centroidal dynamics [9], to reduce the dimensionality of the system. Additionally, different strategies such as hip or ankle strategies have been developed to recover the robot from unstable states [10]. Optimization-based methods have been employed to consider the locomotion of the robot while planning for the unactuated states and constraints [9], [11]. Another approach is to partition the robot into multiple kinematic chains, with some of them focusing on task performance and others being responsible for balance maintenance [12]. In the context of physical interactions between humanoid robots and humans, such as STS tasks, the aforementioned issues to control a humanoid become significantly more critical. STS tasks are challenging as they require humans to exert substantial force in a short period. According to data published in [7] and as demonstrated in this paper, the applied force can range between 100–200 N within 2– 8 seconds. Consequently, the robot must respond promptly" 2401.06683v1,"DQNC2S: DQN-based Cross-stream Crisis event Summarizer Daniele Rege Cambrin [0000−0002−5067−2118] , Luca Cagliero [0000−0002−7185−5247] , and Paolo Garza [0000−0002−1263−7522] Politecnico di Torino, Torino, Italy {daniele.regecambrin,luca.cagliero,paolo.garza}@polito.it Abstract. Summarizing multiple disaster-relevant data streams simultaneously is particularly challenging as existing Retrieve&Re-ranking strategies suffer from the inherent redundancy of multi-stream data and limited scalability in a multi-query setting. This work proposes an online approach to crisis timeline generation based on weak annotation with Deep Q-Networks. It selects on-the-fly the relevant pieces of text without requiring neither human annotations nor content re-ranking. This makes the inference time independent of the number of input queries. The proposed approach also incorporates a redundancy filter into the reward function to effectively handle cross-stream content overlaps. The achieved ROUGE and BERTScore results are superior to those of bestperforming models on the CrisisFACTS 2022 benchmark. Keywords: Cross-Stream Temporal Summarization · Crisis Management · Timeline Generation · Reinforcement Learning · Text Retrieval 1 Introduction Automating the extraction of valuable information from large streams of social and news data is particularly relevant to crisis management as could become an active support to disaster-response personnel [12,20]. The problem of generating crisis event summaries of time-evolving data streams has already been addressed by the Temporal Summarization [3] (TS) and Incident Stream [14] (IS) challenges, where the goals are to extract variable-length summaries for a particular event on a set day (TS) and to classify and prioritize information in a single social stream (IS), respectively. More recently, the CrisisFACTS task [13] has focused on retrieving daily timelines from social/news data streams. The main challenges are (1) The contemporary presence of multiple streams of crisisrelevant data (Twitter, Reddit, Facebook, and News), which makes the input collection particularly redundant and complex to summarize; (2) The lack of human annotations on text relevance and topic-level clusters, which limits the scope of supervised techniques; (3) A list of queries about information needed by emergency responders for each emergency event, which increases the complexity compared to single-query tasks. State-of-the-art approaches to the CrisisFACTS task (unicamp [16] and ohmkiz [21]) rely on ColBERT[10] or on the established" 2401.06686v1,"Exploring Conversational Agents as an Effective Tool for Measuring Cognitive Biases in Decision-Making Stephen Pilli UCD School of Computer Science University College Dublin Dublin, Ireland stephen.pilli@ucdconnect.ie Abstract—Heuristics and cognitive biases are an integral part of human decision-making. Automatically detecting a particular cognitive bias could enable intelligent tools to provide better decision support. Detecting the presence of a cognitive bias requires a hand-crafted experiment and human interpretation. Our research aims to explore conversational agents as an effective tool to measure various cognitive biases in different domains. Our proposed conversational agent incorporates a bias measurement mechanism that is informed by the existing experimental designs and various experimental tasks identified in the literature. Our initial experiments to measure framing and loss-aversion biases indicate that conversational agents can be effectively used to measure the biases. Index Terms—cognitive biases, decision-making, conversational agents, bias measurement I. I NTRODUCTION Almost all animals (including humans) use heuristics in their daily decision-making processes, which have been shown to be surprisingly effective [1]. Heuristics are characterised by the frugality of information and computation required to reach a satisfactory solution. While the near-universal prevalence of heuristics is testament to their evolutionary ’staying power’, heuristics have also been implicated in various sub-optimal (or even wrong) decisions made by human beings [2]. These have been categorised as cognitive biases, and more than two hundred have been catalogued, with different kinds of decisions being affected by different biases [3]. Behaviour change techniques like nudges can leverage biases to tailor effective interventions [4] [5]. Unfortunately, most bias measurement mechanisms require human interpretation of carefully designed experiments. The advent of Big Data and smartphones has added a new dimension to measuring bias. Not only are smartphones ubiquitous, but humans are now accustomed to using natural language as a medium to interact with them (e.g., Siri and Google Assistant). This means many contextual machine-human conversations could be used to measure bias. To the best of our knowledge, there is very little work on approaches to automate bias measurement in literature. We posit that conversational agents can be used to measure (and possibly ameliorate) bias among individuals computationally. Human-machine conversations can be engineered to provide information about the human interlocutor’s thought process and clues about the possible biases they exhibit. Although numerous cognitive biases have been identified through various studies, not all humans are susceptible to the same sub-set of biases. For example, some individuals may be affected by the framing effect, which refers to a cognitive bias in which individuals make choices influenced by how options are framed, whether they are presented with a positive or negative tone [6]. Similarly, loss-aversion bias may affect others, which is the tendency to prefer avoiding losses over acquiring equivalent gains [7]. The approaches employed in the existing literature use carefully crafted experiments to measure these biases. Automated methods for measuring these biases are crucial in behaviour change techniques like nudging, yet this area remains unexplored. Our research revealed that existing experimental tasks for cognitive bias measurement often necessitate multiple interactions or strategic elicitation to comprehensively evaluate users’ biases. However, we failed to identify a standard approach to measure cognitive bias using digital technologies. The decisions made by the individual on an experimental task could be influenced by factors other than cognitive bias. Therefore, one-shot (single measure) cognitive tasks are prone to classifying an unsystematic error with a systematic one. Repeated measures of experimental design can address this problem. We have identified that conversational agents can naturally facilitate repeated measures through multi-turn interactions. Moreover, our study highlighted that conversational agents have not been potentially used to measure cognitive biases. Conversational agents offer a richer experience by incorporating a conversational user interface (CUI) compared to the currently prevalent graphical user interfaces. II. R ELATED W ORK The existing research on cognitive bias measurement is relatively limited. Within the digital technologies context, we have identified two significant areas where cognitive bias measurement has been studied. The first area pertains to decision-making, while the second is related to digital" 2401.06687v1,"Proximal Causal Inference With Text Data Jacob M. Chen Williams College jmc8@williams.edu Rohit Bhattacharya Williams College rb17@williams.edu Abstract Recent text-based causal methods attempt to mitigate confounding bias by including unstructured text data as proxies of confounding variables that are partially or imperfectly measured. These approaches assume analysts have supervised labels of the confounders given text for a subset of instances, a constraint that is not always feasible due to data privacy or cost. Here, we address settings in which an important confounding variable is completely unobserved. We propose a new causal inference method that splits pre-treatment text data, infers two proxies from two zero-shot models on the separate splits, and applies these proxies in the proximal g-formula. We prove that our text-based proxy method satisfies identification conditions required by the proximal g-formula while other seemingly reasonable proposals do not. We evaluate our method in synthetic and semi-synthetic settings and find that it produces estimates with low bias. This combination of proximal causal inference and zero-shot classifiers is novel (to our knowledge) and expands the set of text-specific causal methods available to practitioners. 1 Introduction Data-driven decision making relies on estimating the effect of interventions, i.e. causal effect estimation. For example, a doctor must decide which medicine she will give her patient, ideally the one with the greatest effect on positive outcomes. Many causal effects are estimated via randomized controlled trials—considered the gold standard in causal inference; however, if an experiment is unfeasible or unethical, one must use observational data. In observational settings, a primary obstacle to unbiased causal effect estimation is confounding variables, variables that affect both the treatment (e.g., which medicine) and the outcome. Recently, some studies have attempted to mitigate confounding by incorporating (pre-treatment) Katherine A. Keith Williams College kak5@williams.edu unstructured text data as proxies for confounding variables or specifying linguistic properties as the confounding variables themselves, e.g., topic (Veitch et al., 2020; Roberts et al., 2020), tone (Sridhar and Getoor, 2019), or use of specific word types (Olteanu et al., 2017). A wide range of fields have used text in casual estimates, including medicine (Zeng et al., 2022), the behavioral social sciences (Kiciman et al., 2018), and scienceof-science (Zhang et al., 2023). See Keith et al. (2020); Feder et al. (2022); Egami et al. (2022) for general overviews of text-based causal estimation. If all confounders are directly observed, then causal estimation is relatively 1 straightforward with backdoor adjustment (Pearl, 2009). However, some applications use supervised classifiers to predict the confounding variables from text data. Because text classifiers rarely achieve perfect accuracy, analysts must account for measurement error. To address this, another line of work has developed post-hoc corrections of causal estimates in the presence of imperfect classifiers (Wood-Doughty et al., 2018; Fong and Tyler, 2021; Egami et al., 2023; Mozer et al., 2023). Yet, these approaches require ground-truth labels of the confounding variables for a subset of instances, a constraint that is not always feasible due to privacy restrictions, high costs, or lack of expert labor for labeling. Our work fills this gap. We address the causal estimation setting for which a practitioner has specified a confounding variable that is truly unmeasured (we have no observations of the variable), but unstructured text data could be used to infer proxies. For this setting, our method combines proximal causal inference with zero-shot classifiers. Proximal causal inference (Miao et al., 2018; Tchetgen Tchetgen et al., 2020) can identify the true causal effect given two proxies for the unmeasured confounder that satisfy certain causal identifi- 1 Setting aside challenges of high-dimensional covariate selection for causal estimation, e.g., see Tamarchenko (2023)." 2401.06704v1,"Scalable 3D Panoptic Segmentation With Superpoint Graph Clustering Damien Robert 1, 2 Hugo Raguet 3 Loic Landrieu 2,4 damien.robert@ign.fr hugo.raguet@insa-cvl.fr loic.landrieu@enpc.fr 1 CSAI, ENGIE Lab CRIGEN, France LASTIG, IGN, ENSG, Univ Gustave Eiffel, France 3 INSA Centre Val-de-Loire Univ de Tours, LIFAT, France 4 LIGM, Ecole des Ponts, Univ Gustave Eiffel, CNRS, France 2 Abstract We introduce a highly efficient method for panoptic segmentation of large 3D point clouds by redefining this task as a scalable graph clustering problem. This approach can be trained using only local auxiliary tasks, thereby eliminating the resource-intensive instance-matching step during training. Moreover, our formulation can easily be adapted to the superpoint paradigm, further increasing its efficiency. This allows our model to process scenes with millions of points and thousands of objects in a single inference. Our method, called SuperCluster, achieves a new state-of-the-art panoptic segmentation performance for two indoor scanning datasets: 50.1 PQ (+7.8) for S3DIS Area 5, and 58.7 PQ (+25.2) for ScanNetV2. We also set the first state-of-the-art for two large-scale mobile mapping benchmarks: KITTI-360 and DALES. With only 209k parameters, our model is over 30 times smaller than the best-competing method and trains up to 15 times faster. Our code and pretrained models are available at https://github.com/drprojects/ superpoint_transformer. Figure 1. Large-Scale Panoptic Segmentation. We present the results of SuperCluster for the entire Area 5 of S3DIS [4] (ceiling removed for visualization) with 9.2M points (78M pre-subsampling) and 1863 true “things” objects. Our model can process such large scan in one inference on a single V100-32GB GPU in 3.3 seconds and reach a state-of-the-art PQ of 50.1. on sparse LiDAR scans for autonomous navigation [5, 15, 81]. Given the relevance of large-scale analysis for industry and practitioners, there is surprisingly little work on largescale 3D panoptic segmentation [71]. Although they contain non-overlapping instance labels, S3DIS [3] and ScanNet [13] only have a few panoptic segmentation entries, and KITTI-360 [39] and DALES [58] currently have none. Large-scale 3D panoptic segmentation is particularly challenging due to the scale of scenes, often featuring millions of 3D points, and the diversity in objects—ranging from a few to thousands and with extreme size variability. Current methods typically rely on large backbone networks with millions of parameters, restricting their analysis to small scenes or portions of scenes due to their high memory consumption. Furthermore, training these models requires resourceintensive procedures, such as non-maximum suppression and instance matching. These costly operations prevent the 1. Introduction Understanding large-scale 3D environments is pivotal for numerous high-impact applications such as the creation of “digital twins” of extensive industrial facilities [24, 47, 53] or even the digitization of entire cities [29, 48, 73]. Extensive and comprehensive 3D analysis methods also benefit large-scale geospatial analysis, e.g. for land [59, 74] or forest surveys [18, 72], as well as building inventory [66] for country-scale mapping. These problems call for scalable models that can process large point clouds with millions of 3D points, accurately predict the semantics of each point, and recover all instances of specific objects, a task referred to as 3D panoptic segmentation [26]. Most existing 3D panoptic segmentation methods focus 1" 2401.06712v1,"F EW -S HOT D ETECTION OF M ACHINE -G ENERATED T EXT USING S TYLE R EPRESENTATIONS Rafael Rivera Soto 1,3,† , Kailin Koch 1 , Aleem Khan 3 , Barry Chen 1 , Marcus Bishop 2 , Nicholas Andrews 3,† 1 Lawrence Livermore National Laboratory 2 Department of Defense 3 Johns Hopkins University A BSTRACT The advent of instruction-tuned language models that convincingly mimic human writing poses a significant risk of abuse. For example, such models could be used for plagiarism, disinformation, spam, or phishing. However, such abuse may be counteracted with the ability to detect whether a piece of text was composed by a language model rather than a human. Some previous approaches to this problem have relied on supervised methods trained on corpora of confirmed human and machine-written documents. Unfortunately, model under-specification poses an unavoidable challenge for neural network-based detectors, making them brittle in the face of data shifts, such as the release of further language models producing still more fluent text than the models used to train the detectors. Other previous approaches require access to the models that may have generated a document in question at inference or detection time, which is often impractical. In light of these challenges, we pursue a fundamentally different approach not relying on samples from language models of concern at training time. Instead, we propose to leverage representations of writing style estimated from human-authored text. Indeed, we find that features effective at distinguishing among human authors are also effective at distinguishing human from machine authors, including state of the art large language models like Llama 2, ChatGPT, and GPT-4. Furthermore, given a handful of examples composed by each of several specific language models of interest, our approach affords the ability to predict which model generated a given document. 1 I NTRODUCTION Recent interest in large language models (LLM) has resulted in an explosion of LLM usage by a wide variety of users. Some users may regard LLM as something of a writing assistant. Well-intentioned as this use case may be, one concern is that text generated by LLM is not guaranteed to be factually accurate. Therefore such usage may contribute to the spread of misinformation or the reinforcement of biases if documents generated by these models are not carefully edited for accuracy. Other users may intend to use LLM for deception, such as for phishing attacks, disinformation, spam, and plagiarism (Hazell, 2023; Weidinger et al., 2022). Such malicious usage is the chief concern in this work. To minimize the abuse of commercial systems, one recently proposed recourse is for those systems to apply statistical watermarking techniques (Kirchenbauer et al., 2023). However, the advent of open-source LLM with performance approaching that of commercial LLMs and achievable on commodity hardware (Touvron et al., 2023) raises the possibility of circumventing the watermarking mechanisms of commercial systems to generate harmful content, potentially at a large scale. Thus, while watermarking may help mitigate some unintended consequences of LLM adoption, the approach fails to completely address the issue of malicious content. Because it seems inevitable that people will be exposed to machine-generated text masquerading as human-generated, one reasonable recourse is to develop models to predict whether a given document was composed by a LLM rather than a human. To this end, a number of methods have been proposed, such as OpenAI’s machine-generated text classifier (Solaiman et al., 2019). An † Corresponding authors: rafaelriverasoto@jhu.edu, noa@jhu.edu 1" 2401.06722v2,"NetMind: Adaptive RAN Baseband Function Placement by GCN Encoding and Maze-solving DRL Haiyuan Li ∗ , Peizheng Li † , Karcius Day Assis ‡ , Adnan Aijaz † , Sen Shen ∗ , Reza Nejabati ∗ , Shuangyi Yan ∗ , Dimitra Simeonidou ∗ ∗ Smart Internet Lab, University of Bristol, UK; † Bristol Research and Innovation Laboratory, Toshiba Europe Ltd., UK; ‡ Federal University of Bahia, Brazil Email: {ocean.h.li, sen.shen, reza.nejabati, shuangyi.yan, dimitra.simeonidou}@bristol.ac.uk; {peizheng.li, adnan.aijaz}@toshiba-bril.com; karcius.assis@ufba.br Abstract—The disaggregated and hierarchical architecture of advanced RAN presents significant challenges in efficiently placing baseband functions and user plane functions in conjunction with Multi-Access Edge Computing (MEC) to accommodate diverse 5G services. Therefore, this paper proposes a novel approach NetMind, which leverages Deep Reinforcement Learning (DRL) to determine the function placement strategies in RANs with diverse topologies, aiming at minimizing power consumption. NetMind formulates the function placement problem as a mazesolving task, enabling a Markov Decision Process with standardized action space scales across different networks. Additionally, a Graph Convolutional Network (GCN) based encoding mechanism is introduced, allowing features from different networks to be aggregated into a single RL agent. That facilitates the RL agent’s generalization capability and minimizes the negative impact of retraining on power consumption. In an example with three sub-networks, NetMind achieves comparable performance to traditional methods that require a dedicated DRL agent for each network, resulting in a 70% reduction in training costs. Furthermore, it demonstrates a substantial 32.76% improvement in power savings and a 41.67% increase in service stability compared to benchmarks from the existing literature. Index Terms—Graph convolutional network, deep reinforcement learning, RAN, baseband function placement I. I NTRODUCTION 5G networks, boasting capabilities such as enhanced Mobile Broadband (eMBB), massive Machine Type Communication (mMTC), and ultra Reliability and Low Latency Communication (uRLLC), have swiftly transitioned into widespread commercial deployment. In response to these advanced applications, the co-locating of Multi-access Edge Computing (MEC) and Radio Access Networks (RAN) have received much attention from academics and industries to establish rapid-response connections and reduce access latencies from users to their required services. Aligning with the 3GPP standards [1], the state-of-the-art RAN differentiates itself from previous solutions and baseband partitioning standards that were once integrated into Remote Radio Unit (RRU) and Baseband Unit (BBU), and evolves into more disaggregated functions including Radio Unit (RU, wireless connectivity), Distributed Unit (DU, data layer processing), Core Unit User Plane (CU-UP, user data processing) and Core Unit Control Plane (CU-CP, control signaling mechanisms). These modules can be separated by a variety of baseband function splitting options tailored to different service needs. In addition, edge computing networks composed of MEC servers further empower RANs by carrying these RAN functions and bringing the User Plane Function (UPF) from the 5G Core (5GC) to the user side. The close proximity of RAN and UPF to users reduces the transmission distance between CU and UPF, making real-time data session routing more efficient. However, while this intricate module segmentation enhances the flexibility and granularity of network services, without meticulous management measures for the placement of baseband functions, it might lead to substantial resource redundancy and power inefficiencies. Currently, two common approaches are used to address the baseband placement challenges, i.e., (Mixed) Integer Linear Programming ((M)ILP) and Deep Reinforcement Learning (DRL). ILP has been studied in works such as [2]–[4] for DU/CU placement in Centralized-RAN (C-RAN). Additionally, the authors in [5], [6] explored optimal service function chain placement and resource allocation to reduce end-toend latency. Meanwhile, study [7] proposed using MILP to minimize DU/CU placement power consumption considering functional split, latency, and capacity constraints. On the other hand, DRL approaches, as seen in research like [8] explored DRL strategies for placing CUs and DUs and associating UEs to minimize end-to-end latency and Open RAN (O- RAN) deployment costs. Moreover, in [9], the use of graph neural networks in conjunction with DRL is investigated for optimizing DUs and CUs placement while provisioning lightpaths. Furthermore, [10] delves into dynamic CU-DU selection using actor-critic learning in O-RAN for resource allocation. However, it is noticed that current literature poses three critical drawbacks in designing efficient baseband function placement policies for these advanced RAN architectures. • (M)ILP-based studies, while achieving near-optimal results, suffer from high computational complexity and timeconsuming characteristics, rendering them unsuitable for latency-sensitive 5G services. • Most previous DRL-based function placement literature described a non-Markovian environment where the future state is independent of the present. This suggests that the" 2401.06755v1,"Solving the Discretised Multiphase Flow Equations with Interface Capturing on Structured Grids Using Machine Learning Libraries Boyang Chen a , Claire E. Heaney a,b , Jefferson L. M. A. Gomes c,∗ , Omar K. Matar b,d , Christopher C. Pain a,b,e a Applied Modelling and Computation Group, Department of Earth Science and Engineering, Imperial College London, London, SW7 2AZ UK b Centre for AI-Physics Modelling, Imperial-X, White City Campus, Imperial College London, London, W12 7SL UK c Fluid Mechanics Research Group, School of Engineering, University of Aberdeen, Aberdeen, AB24 3FX UK d e Department of Chemical Engineering, Imperial College London, London, SW7 2AZ UK Data Assimilation Laboratory, Data Science Institute, Imperial College London, London, SW7 2AZ UK Abstract This paper solves the multiphase flow equations with interface capturing using the AI4PDEs approach (Artificial Intelligence for Partial Differential Equations). The solver within AI4PDEs uses tools from machine learning (ML) libraries to solve (exactly) partial differential equations (PDEs) that have been discretised using numerical methods. Convolutional layers can be used to express the discretisations as a neural network, whose weights are determined by the numerical method, rather than by training. To solve the system, a multigrid solver is implemented through a neural network with a U-Net architecture. Immiscible two-phase flow is modelled by the 3D incompressible Navier-Stokes equations with surface tension and advection of a volume fraction field, which describes the interface between the fluids. A new compressive algebraic volume-of-fluids method is introduced, based on a residual formulation using Petrov-Galerkin for accuracy and designed with AI4PDEs in mind. High-order finite-element based schemes are chosen to model a collapsing water column and a rising bubble. Results compare well with experimental data and other numerical results from the literature, demonstrating that, for the first time, finite element discretisations of multiphase flows can be solved using the neural network solver from the AI4PDEs approach. A benefit of expressing numerical discretisations as neural networks is that the code can run, without modification, on CPUs, GPUs or the latest accelerators designed especially to run AI codes. Keywords: Artificial Intelligence; Partial Differential Equations; Convolutional Neural Networks; U-Net; Graphics Processing Units; Finite Element Method; Multiphase Flow 1. Introduction 1.1. Motivation Detailed numerical flow simulations provide significant insight into a wide range of sectors, including the environment [1], energy [2] and food [3] sectors. Over the past two decades, computational fluid dynamics (CFD) models, including multiphase flow models, have become critical for predicting environmental [4] and industrial [5] flow behaviour; conducting safety [6] and environmental [7] assessments; studying the effect of cloud formation on the climate [8]; analysing slugging in fluidised bed reactors [9] and pipelines [10]; ∗ Corresponding author Email address: jefferson.gomes@abdn.ac.uk (Jefferson L. M. A. Gomes) Preprint submitted to arXiv January 15, 2024" 2401.06762v1,"SEEING THE ROADS THROUGH THE TREES: A BENCHMARK FOR MODELING SPATIAL DEPENDENCIES WITH AERIAL IMAGERY Caleb Robinson ∗1 , Isaac Corley 2 , Anthony Ortiz 1 , Rahul Dodhia 1 Juan M. Lavista Ferres 1 , Peyman Najafirad 2 Microsoft AI for Good Research Lab 1 , University of Texas at San Antonio 2 ABSTRACT Fully understanding a complex high-resolution satellite or aerial imagery scene often requires spatial reasoning over a broad relevant context. The human object recognition system is able to understand object in a scene over a longrange relevant context. For example, if a human observes an aerial scene that shows sections of road broken up by tree canopy, then they will be unlikely to conclude that the road has actually been broken up into disjoint pieces by trees and instead think that the canopy of nearby trees is occluding the road. However, there is limited research being conducted to understand long-range context understanding of modern machine learning models. In this work we propose a road segmentation benchmark dataset, Chesapeake Roads Spatial Context (RSC), for evaluating the spatial longrange context understanding of geospatial machine learning models and show how commonly used semantic segmentation models can fail at this task. For example, we show that a U-Net trained to segment roads from background in aerial imagery achieves an 84% recall on unoccluded roads, but just 63.5% recall on roads covered by tree canopy despite being trained to model both the same way. We further analyze how the performance of models changes as the relevant context for a decision (unoccluded roads in our case) varies in distance. We release the code to reproduce our experiments and dataset of imagery and masks to encourage future research in this direction – https: //github.com/isaaccorley/ChesapeakeRSC. Index Terms— remote sensing, spatial context, road extraction 1. INTRODUCTION Deep convolutional neural networks (CNN) and vision transformers (ViT) have shown impressive performance in geospatial machine learning tasks including land use and land cover (LULC) segmentation, scene understanding and classification, and building detection and segmentation [1, 2, 3]. It has been shown that, unlike the human vision system, modern ∗ Corresponding author: caleb.robinson@microsoft.com neural networks are often biased towards local textures and other local features while ignoring long-range dependencies even when global information is available [4, 5, 6]. This phenomenon is often overlooked since models can still perform well in most common benchmark datasets while only using local features. For example, Brendel et al. show that a bag of 32 × 32 features can achieve high performance (87.6% top-5 accuracy) on ImageNet [7]. Other vision applications like Visual Question Answering (VQA) require models to perform spatial reasoning [8] and, with the success of general purpose language models, there has been an explosion of research adapting language models to be able to capture long-range dependencies using transformers [9, 10]. Similarly there has been a revival of recurrent neural networks (RNN) [11] via state space models (SSM) [12, 13, 14, 15, 16, 17, 18] to avoid the quadratic cost of attention when modeling long sequences. These methods have recently been successfully applied to modeling images as sequences for image classification [19] and generation [20, 21] as a replacement to their fully convolutional counterparts. Multiple geospatial machine learning applications require models that are able to understand longer range dependencies in imagery. For example, identifying burn scars [22], estimating road network connectivity under occlusions from tree canopy or shadows, and identifying specific land use classes are examples of such applications [23, 24, 25]. However, there are no existing benchmark datasets designed specifically to test the long-range spatial reasoning capabilities of existing machine learning models in remote sensing settings. In this work we present a novel semantic segmentation dataset, Chesapeake Roads Spatial Context (RSC), containing highresolution aerial imagery and labels including “background”, “road” and “tree canopy over road” categories which we use to evaluate a machine learning model’s ability to incorporate long-range spatial context into predictions. Additionally, we perform an analysis of the long-range reasoning capabilities of multiple canonical segmentation models and find that performance decreases as a function of distance away from the necessary context needed to make a correct prediction. We release our code on GitHub and dataset publicly on Hugging-" 2401.06771v1,"Curiosity as a Self-Supervised Method to Improve Exploration in De novo Drug Design Mohamed-Amine CHADI Computer science department Faculté des sciences Semlalia Université Cadi Ayyad Marrakech, Morocco mohamedamine.chadi@ced.uca.ma Hajar Mousannif Computer science department Faculté des sciences Semlalia Université Cadi Ayyad Marrakech, Morocco mousannif@uca.ac.ma Abstract—In recent years, deep learning has demonstrated promising results in de novo drug design. However, the proposed techniques still lack an efficient exploration of the large chemical space. Most of these methods explore a small fragment of the chemical space of known drugs, if the desired molecules were not found, the process ends. In this work, we introduce a curiosity-driven method to force the model to navigate many parts of the chemical space, therefore, achieving higher desirability and diversity as well. At first, we train a recurrent neural network-based general molecular generator (G), then we fine-tune G to maximize curiosity and desirability. We define curiosity as the Tanimoto similarity between two generated molecules, a first molecule generated by G, and a second one generated by a copy of G (Gcopy). We only backpropagate the loss through G while keeping Gcopy unchanged. We benchmarked our approach against two desirable chemical properties related to drug-likeness and showed that the discovered chemical space can be significantly expanded, thus, discovering a higher number of desirable molecules with more diversity and potentially easier to synthesize. All Code and data used in this paper are available at https://github.com/amine179/Curiosity-RL-for-Drug-Design. Keywords—Drug design; Curiosity; reinforcement learning; Chemical space exploration I. I NTRODUCTION The chemical space of potential drug-like molecules is huge with a known estimation of ~10 60 compounds in size [1]. Consequently, the process of de novo drug design and discovery is easily prone to failure despite the relatively highcost and long working time put into it [2]. In this context, several deep learning-based techniques have been proposed in the last five years as a promising alternative to traditional virtual screening-based methods [3]. Often, deep learning-based approaches consist of training a deep generative model (e.g., recurrent neural network (RNN) [4]) to learn the underlying rules and structural patterns of chemically valid molecules, then, applying a finetuning technique such as transfer learning (TL) [5] or reinforcement learning (RL) [6] to focus the generative model on a minute part of the chemical space that is hopefully rich Ahmed Aamouche LISA laboratory National school of applied sciences Cadi Ayyad university Marrakech, Morocco a.aamouche@uca.ma in terms of desired drug candidates. However, the exploration capacity of the proposed techniques is relatively limited and poorly addressed. In this paper, the concept of chemical space refers to a cluster of all molecules with a defined quantifiable structural or chemical similarity. Over the last years, deep learning has emerged as a powerful tool in the field of computational de novo drug design. A relatively popular one is the work by [7]. Here, the authors utilized deep RL to bias an RNN-molecular generator to design molecules with optimized properties such as lipophilicity (logP) and the half-maximal inhibitory concentration (IC 50 ) against the Janus protein kinase 2. This same pipeline was used in other research to generate molecules for different targets, such as dopamine receptor type 2 in [8] and adenosine A 2A receptor in [9], as well as other chemical and structural per se optimization objectives as in [10] and [11] respectively. Besides, when there is a dataset available for the task at hand, but in a small quantity, transfer learning comes in handy. For this, other researchers exploited TL as the main technique to bias the general generative model. For instance, [12] fine-tuned an RNN-based generative model using a set of molecules belonging to the space of SARS-CoV- M pro inhibitors. In [13], the authors were able to reproduce 14% of 6051 and 28% of 1240 already available molecules designed by medicinal chemists. Finally, [14] and [15] demonstrated the usefulness of TL in this context against other general usecase chemical objectives. Despite the efforts, the presented approaches have so far focused solely on the desirability, that is, identifying some part of the chemical space with a potentially high number of desirable molecules. However, to maximize the chance of discovering potential hits, the diversity of the space should also be considered during the optimization process. This is of great importance because, although the model may generate drugs with optimized chemical properties, they might be synthetically infeasible in practice. Moreover, current techniques do not ensure that the learned part of the chemical" 2401.06775v1,"L ARGE L ANGUAGE M ODELS IN H EALTHCARE AND M EDICAL D OMAIN : A R EVIEW Zabir Al Nazi zabiralnabil@gmail.com Wei Peng Stanford University Palo Alto, CA wepeng@stanford.edu A BSTRACT The deployment of large language models (LLMs) within the healthcare sector has sparked both enthusiasm and apprehension. These models exhibit the remarkable capability to provide proficient responses to free-text queries, demonstrating a nuanced understanding of professional medical knowledge. This comprehensive survey delves into the functionalities of existing LLMs designed for healthcare applications, elucidating the trajectory of their development, starting from traditional Pretrained Language Models (PLMs) to the present state of LLMs in healthcare sector. First, we explore the potential of LLMs to amplify the efficiency and effectiveness of diverse healthcare applications, particularly focusing on clinical language understanding tasks. These tasks encompass a wide spectrum, ranging from named entity recognition and relation extraction to natural language inference, multi-modal medical applications, document classification, and question-answering. Additionally, we conduct an extensive comparison of the most recent state-of-the-art LLMs in the healthcare domain, while also assessing the utilization of various open-source LLMs and highlighting their significance in healthcare applications. Furthermore, we present the essential performance metrics employed to evaluate LLMs in the biomedical domain, shedding light on their effectiveness and limitations. Finally, we summarize the prominent challenges and constraints faced by large language models in the healthcare sector, offering a holistic perspective on their potential benefits and shortcomings. This review provides a comprehensive exploration of the current landscape of LLMs in healthcare, addressing their role in transforming medical applications and the areas that warrant further research and development. Keywords Large Language Model · Healthcare · Medicine · Natural Language Generation · Natural Language Processing · Machine Learning Applications · ChatGPT · Generative AI · Medical AI 1 Introduction Recent developments in clinical language understanding have ushered in the potential for a paradigm shift in the healthcare sector. These advancements hold the promise of ushering in a new era characterized by the deployment of intelligent systems designed to bolster decision-making, expedite diagnostic processes, and elevate the quality of patient care. In essence, these systems have the capacity to serve as indispensable aids to healthcare professionals as they grapple with the ever-expanding body of medical knowledge, decipher intricate patient records, and formulate highly tailored treatment plans. This transformative potential has ignited considerable enthusiasm within the healthcare community [1, 2]. Notably, this surge of enthusiasm is attributable, in part, to the exceptional performance of state-of-the-art large language models (LLMs) such as OpenAI’s GPT-3.5, GPT-4 [3, 4], and Google’s Bard. These models have exhibited remarkable proficiency in a wide spectrum of natural language understanding tasks, highlighting their pivotal role in healthcare. Their ability to comprehend and generate human-like text is poised to play a transformative role in healthcare practices, where effective communication and information processing are of paramount importance [5]." 2401.06787v1,"Annals of Emerging Technologies in Computing (AETiC) Vol. 8, No. 1, 2024 Research Article Deep Learning Based Cyberbullying Detection in Bangla Language Sristy Shidul Nath 1 , Razuan Karim 2 and Mahdi H. Miraz 3,4,5, * University of Science and Technology Chittagong, Bangladesh 1 sristynath54321@gmail.com American International University-Bangladesh, Dhaka, Bangladesh 2 rkarim@aiub.edu 3 Xiamen University Malaysia, Sepang, Selangor, Malaysia m.miraz@ieee.org Wrexham University, Wrexham, UK m.miraz@ieee.org 5 University of South Wales, Swansea, UK m.miraz@ieee.org *Correspondence: m.miraz@ieee.org 4 Received: 24 th September 2023; Accepted: 19 th December 2023; Published: 1 st January 2024 Abstract: The Internet is currently the largest platform for global communication including expressions of opinions, reviews, contents, images, videos and so forth. Moreover, social media has now become a very broad and highly engaging platform due to its immense popularity and swift adoption trend. Increased social networking, however, also has detrimental impacts on the society leading to a range of unwanted phenomena, such as online assault, intimidation, digital bullying, criminality and trolling. Hence, cyberbullying has become a pervasive and worrying problem that poses considerable psychological and emotional harm to the people, particularly amongst the teens and the young adults. In order to lessen its negative effects and provide victims with prompt support, a great deal of research to identify cyberbullying instances at various online platforms is emerging. In comparison to other languages, Bangla (also known as Bengali) has fewer research studies in this domain. This study demonstrates a deep learning strategy for identifying cyberbullying in Bengali, using a dataset of 12282 versatile comments from multiple social media sites. In this study, a two-layer bidirectional long short-term memory (Bi-LSTM) model has been built to identify cyberbullying, using a variety of optimisers as well as 5-fold cross validation. To evaluate the functionality and efficacy of the proposed system, rigorous assessment and validation procedures have been employed throughout the project. The results of this study reveals that the proposed model’s accuracy, using momentum-based stochastic gradient descent (SGD) optimiser, is 94.46%. It also reflects a higher accuracy of 95.08% and a F1 score of 95.23% using Adam optimiser as well as a better accuracy of 94.31% in 5-fold cross validation. Keywords: Bangla; Bengali; Cyberbullying; Deep Learning; K-Fold Cross Validation; Natural Language Processing 1. Introduction While various contemporary technologies, such as social media and similar other communication platforms, bring us closer to each other and let us stay connected, they pose multiple serious threats to our lives, including cyber bulling [1,2]. Since the adoption and usage of the social networking platforms has mushroomed in the recent past years, bullying is no longer limited to the physical space; rather, social media has brought into being a new model of this tyrannised behaviour, i.e., cyberbullying. The dissemination of unsuitable photos, videos, insulting statements or messages, threats, etc., using the cyberspace in any form, such as texts, images, voice, videos and so forth, is considered as cyberbullying. Cyberbullying is the term for bullying that occurs online, including on social media, messaging apps, over the voice call, gaming Sristy Shidul Nath, Razuan Karim and Mahdi H. Miraz, “Deep Learning Based Cyberbullying Detection in Bangla Language”, Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 50-65, Vol. 8, No. 1, 1 st January 2024, Published by International Association for Educators and Researchers (IAER), DOI: 10.33166/AETiC.2024.01.005, Available: http://aetic.theiaer.org/archive/v8/v8n1/p5.html." 2401.06792v2,"LightHouse: A Survey of AGI Hallucination Feng Wang Soochow University zurichrain403@gmail.com ⋆ https://github.com/ZurichRain/AGI-Hallucination Abstract With the development of artificial intelligence, large-scale models have become increasingly intelligent. However, numerous studies indicate that hallucinations within these large models are a bottleneck hindering the development of AI research. In the pursuit of achieving strong artificial intelligence, a significant volume of research effort is being invested in the AGI (Artificial General Intelligence) hallucination research. Previous explorations have been conducted in researching hallucinations within LLMs (Large Language Models). As for multimodal AGI, research on hallucinations is still in an early stage. To further the progress of research in the domain of hallucinatory phenomena, we present a bird’s eye view of hallucinations in AGI, summarizing the current work on AGI hallucinations and proposing some directions for future research. We will continuously update recent work on https://github.com/ ZurichRain/AGI-Hallucination. “Once this problem is solved, the path to AGI unfolds. We called it LightHouse for AGI.” —Anonymous 1 Introduction The research in deep learning on AGI has witnessed explosive growth, particularly with the advent of LLMs like GPT4 (OpenAI, 2023), LLaMA (Touvron et al., 2023b), accelerating the arrival of the AGI era. LLMs have achieved remarkable results in many downstream natural language tasks. Simultaneously, the development of multimodal large models, such as LLaVA (Liu et al., 2023b), has sprung up like mushrooms after rain. There have also been outstanding achievements in the fields of vision, audio, 3D, and agent (Lin et al., 2023a; Gong et al., 2023; Hong et al., 2023; Szot et al., 2023a). However, despite the astonishing progress in the LLM of AGI, the outputs of the model still do not Conflict in Intrinsic Knowledge of Models Factual Conflict in Information Forgetting and Updating Agent Agent Agent Conflict in Multimodal Fusion M1 M2 M1 M2 Figure 1: Illustration of Hallucination in AGI. Which classify by three types: 1. Conflict in Intrinsic Knowledge of Models. 2. Factual Conflict in Information Forgetting and Updating. 3. Conflict in Multimodal Fusion. is input information, is forgotten information, is new information, and is error output. fully align with human expectations, which called hallucination (Zhang et al., 2023c). For instance, LLMs occasionally produce factually incorrect answers, LVLMs(Large Vision-Language Models) can sometimes generate responses that object error or something of their own fantasy, video language models also suffer actions inconsistency, and 3D or agent may encounter issues with hallucination across multiple perspectives. This problems hinders AGI’s path towards greater intelligence. To mitigate the hallucinations in models during the AGI era, extensive works are underway. Currently, sparking in LLMs, RLHF (Christiano et al., 2017; Ouyang et al., 2022) (Reinforcement Learning from Human Feedback) is increasingly recognized as a prevalent method for mitigating hallucinatory phenomena in AI models. Enhances the model’s responses to more closely align with human preferences through a reward-based RL mechanism. In LVLMs, LURE (Zhou et al., 2023b) used a hallucination revisor to reduce model’s output hallucinations. There has a lot works engaged in fine-grained image captions to solve this prob-" 2401.06799v1,"Make Prompts Adaptable: Bayesian Modeling for Vision-Language Prompt Learning with Data-Dependent Prior Youngjae Cho 1 , HeeSun Bae 1 , Seungjae Shin 1 ,Yeo Dong Youn 2 , Weonyoung Joo 3 Il-Chul Moon 1 1 KAIST Seoul National University 3 Ewha Womans University {genius.cho, cat2507, tmdwo0910}@kaist.ac.kr, dbsduehd95@snu.ac.kr, weonyoungjoo@ewha.ac.kr, icmoon@kaist.ac.kr 2 Abstract Recent Vision-Language Pretrained (VLP) models have become the backbone for many downstream tasks, but they are utilized as frozen model without learning. Prompt learning is a method to improve the pre-trained VLP model by adding a learnable context vector to the inputs of the text encoder. In a few-shot learning scenario of the downstream task, MLE training can lead the context vector to over-fit dominant image features in the training data. This overfitting can potentially harm the generalization ability, especially in the presence of a distribution shift between the training and test dataset. This paper presents a Bayesian-based framework of prompt learning, which could alleviate the overfitting issues on few-shot learning application and increase the adaptability of prompts on unseen instances. Specifically, modeling data-dependent prior enhances the adaptability of text features for both seen and unseen image features without the trade-off of performance between them. Based on the Bayesian framework, we utilize the Wasserstein Gradient Flow in the estimation of our target posterior distribution, which enables our prompt to be flexible in capturing the complex modes of image features. We demonstrate the effectiveness of our method on benchmark datasets for several experiments by showing statistically significant improvements on performance compared to existing methods. The code is available at https://github.com/youngjae-cho/APP. Introduction Recently, Vision-Language Pretrained models (VLP) (Radford et al. 2021; Jia et al. 2021) have been used as backbones for various downstream tasks (Shen et al. 2022; Ruan, Dubois, and Maddison 2022), and the pre-trained models have shown successful adaptation. Since these pre-trained models are used as-is in downstream tasks, prompt learning adds a context vector to the input of pre-trained model, so the context vector becomes the learnable parameter to improve the representation from the pre-trained model (Zhou et al. 2022b) for the downstream task. For instance, a text input is concatenated to a context vector, and the new text input could be fed to the text encoder. The learning of context vector comes from the back-propagation after the feedforward of the concatenated text input. Since there is only a single context vector without being conditioned by inputs, Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. the inferred value of context vector becomes a static single context defined for the given downstream task. Whereas improving parameter-frozen VLP models by additional input context vector is a feasible solution, it can potentially overfit to a dense area of image features in few-shot learning. Since text features are hard to capture the multimodes of image features in MLE training, it could fail to infer the minor area of image features, eventually degrading the performance. In addition, MLE training undermines the generalization capability of VLP models especially when there is a distribution shift between the training and testing (Zhou et al. 2022a). Although several input-conditioned prompt learning (Zhou et al. 2022a; Derakhshani et al. 2023) tried to generalize unseen datasets, it inevitably undermines the performance of seen datasets. To alleviate the impact of uncertainty arising from a few-shot learning scenario, our paper proposes Adaptive Particle-based Prompt Learning (APP), which utilizes a Bayesian inference for prompt learning with a datadependent prior as shown in Figure 1. Through regularization using this data-dependent prior, the context vector is directed toward capturing the diverse modes in image features among the seen data instances. Additionally, we approximate the posterior distribution via Wasserstein Gradient Flow to enhance the flexibility of our text features to infer the complex image features. Furthermore, we extend the modeling of the data-dependent prior to unseen test instances to adapt the distribution shift. This adaptation of the context vector to the unseen instances enhances the model’s resilience in the face of distribution shifts, providing robustness to these variations. We summarize our contributions in two aspects. 1. Enhancing Flexibility of Prompt: By approximating prompt posterior with Wasserstein Gradient Flow, our context vectors can be more flexibly utilized to infer the complex image feature spaces. 2. Enhancing Adaptability of Prompt: By modeling datadependent prior based on the image feature information, text features capture the multi-modes of seen image features and adapt to unseen image features, which leads to the improved performances of seen and unseen datasets without trade-off." 2401.06802v1,"Hierarchical Knowledge Distillation on Text Graph for Data-limited Attribute Inference Quan Li Shixiong Jing Lingwei Chen Pennsylvania State University qbl5082@psu.edu Pennsylvania State University svj5489@psu.edu Wright State University lingwei.chen@wright.edu Abstract The popularization of social media increases user engagements and generates a large amount of user-oriented data. Among them, text data (e.g., tweets, blogs) significantly attracts researchers and speculators to infer user attributes (e.g., age, gender, location) for fulfilling their intents. Generally, this line of work casts attribute inference as a text classification problem, and starts to leverage graph neural networks (GNNs) to utilize higher-level representations of source texts. However, these text graphs are constructed over words, suffering from high memory consumption and ineffectiveness on few labeled texts. To address this challenge, we design a text-graph-based few-shot learning model for attribute inferences on social media text data. Our model first constructs and refines a text graph using manifold learning and message passing, which offers a better trade-off between expressiveness and complexity. Afterwards, to further use cross-domain texts and unlabeled texts to improve few-shot performance, a hierarchical knowledge distillation is devised over text graph to optimize the problem, which derives better text representations, and advances model generalization ability. Experiments on social media datasets demonstrate the state-of-the-art performance of our model on attribute inferences with considerably fewer labeled texts. 1 Introduction In the Internet-age, social media has drastically penetrated our everyday lives through countless websites and apps, which allows us to effortlessly connect with each other across the globe, and express personal ideas for social engagements [1]. Such a convenient environment that brims with vigor and vitality generates a mass of text data reserving basic yet rich user information, which, more importantly, often implies intrinsic user attributes [2, 3], such as age, gender, location, and political view. Due to this fact, different parties have been attracted to reveal user attributes from their text data [4], either conscientiously (e.g., for assessing pandemic risks and analyzing social behaviors [5, 6]) or opportunistically (e.g., for promoting advertisements and tracking users [1, 7]). While the intents of user attribute inferences on social media vary, the methods used to infer such information from text data are consistent. Among these developed machine learning models [8, 9], natural language processing (NLP) models (e.g., long short-term memory [10], and transformer [11]) provide the successful principles to learn high-level representations of source texts. Despite the promising performance, their inputs are inherently self-contained, and struggle to leverage structural interactions with other texts. Graph neural networks (GNNs) have recently emerged as one of the most powerful techniques for graph understanding and mining [12, 13]. These GNNs perform neighborhood aggregations and boost the state-of-the-arts for a variety of downstream tasks over graphs [14–16]. Therefore, a surge of effective research works apply GNNs to infer user attributes on social media [17, 18] or simply perform text classification [19–24]. For example, Yao et al. proposed a GNN-based method to analyze texts by converting the corpus to a heterogeneous graph with words/documents as nodes and word co-occurrence as edges, which requires high memory consumption yet delivers low expression power for individual texts. Huang et al. [23] reduced the computational cost by using global shared word representations, and Ding et al. [20] defined hyperedges on sequential and topic-related correlations to capture high-order interactions between words. Similar refinements can be also found in this line of work [21, 22, 24]. However, different" 2401.06804v1,"ChatGPT, Let us Chat Sign Language: Experiments, Architectural Elements, Challenges and Research Directions Nada Shahin Intelligent Distributed Computing and Systems (INDUCE) Lab, Department of CS and Software Engineering, College of IT, National Water and Energy Center, UAE University, Al-Ain, UAE 700039075@uaeu.ac.ae Leila Ismail Intelligent Distributed Computing and Systems (INDUCE) Lab, Department of CS and Software Engineering, College of IT, National Water and Energy Center, UAE University, Al-Ain, UAE CLOUDS lab, School of Computing and Information Systems, The University of Melbourne, Melbourne, Australia leila@uaeu.ac.ae Abstract— ChatGPT is a language model based on Generative AI. Existing research work on ChatGPT focused on its use in various domains. However, its potential for Sign Language Translation (SLT) is yet to be explored. This paper addresses this void. Therefore, we present GPT's evolution aiming a retrospective analysis of the improvements to its architecture for SLT. We explore ChatGPT's capabilities in translating different sign languages in paving the way to better accessibility for deaf and hard-of-hearing community. Our experimental results indicate that ChatGPT can accurately translate from English to American (ASL), Australian (AUSLAN), and British (BSL) sign languages and from Arabic Sign Language (ArSL) to English with only one prompt iteration. However, the model failed to translate from Arabic to ArSL and ASL, AUSLAN, and BSL to Arabic. Consequently, we present challenges and derive insights for future research directions. based on its input, whether it is audio, text, or images. The model combines GPT, a language model based on a decoder transformer, and reinforcement learning using the Proximal Policy Optimization (PPO) algorithm and human feedback [6]. It has the characteristic of keeping the history of what it learned during a conversation and using it along with the current input to produce a context-aware answer. This is thanks to its attention layers as part of its architecture [7]. Furthermore, ChatGPT was pre-trained on a massive text corpus, including books, articles, websites, and conversational data from online forums and chat rooms [8]. This enabled the model to grasp the patterns and structure of natural language. It can be used for natural language processing tasks such as language translation and summarizing, various conversational applications including question answering, and performing sentiment analysis (positive, negative, and neutral) [8]. ChatGPT can also generate, correct, and help with programming coding based on its understanding of programming concepts. Such a task is completed based on the pre-training of programming languages and frameworks. Despite its potential, in some cases, ChatGPT produces incorrect results. This is critical in areas such as healthcare, where an accurate diagnosis is essential to ensure seamless user experience errors are not tolerated [6]. Research work on ChatGPT discuss its potential in different application domains. However, to our knowledge, no work covers its potential for translating sign language. The main contributions in our paper are as follows: Keywords—AI, ChatGPT, Decoder, Encoder, NLP, Sign Language Translation, Transformer I. I NTRODUCTION Deaf and hard of hearing (DHH) constitute a significant percentage of the global population. According to the World Health Organization (WHO), 430 million individuals have hearing loss worldwide [1]. However, there are only around 30,000 employed interpreters in the United States [2], which is very low compared to the number of DHHs within the same country (37.5 million [3]). Therefore, sign language interpretation is critical. While Natural Langue Processing (NLP) has helped to transform spoken and written languages, there have been research efforts to expand its use to Sign Language Translations (SLT) [4] by converting a text to SL and vice-versa. However, due to the sophisticated structure of sign language gestures and the complexity of its grammar, SLT poses unique challenges [5]. In this paper, we test ChatGPT’s (Chat Generative Pre-Trained Transformer) ability to develop SLT applications while considering the grammar and syntax constraints of sign language. ChatGPT is an artificial intelligent generated content (AIGC) developed by OpenAI that produces text as a response Correspondence: leila@uaeu.ac.ae 1. Depict a retrospective analysis of the evolution of ChatGPT architecture. 2. Design and develop experiments for translating various SL to spoken languages using examples from healthcare scenarios. 3. Present the requirements and challenges of ChatGPT for developing real-time applications, such as SLT. The rest of the paper is organized as follows. Section II presents the related works. The evolution of GPT is discussed in Section III. Section IV outlines the architecture. Section V" 2401.06823v1,"Interpretable deep learning in single-cell omics Manoj M Wagle 1,2,3,+ , Siqu Long 1,3,+ , Carissa Chen 1,3 , Chunlei Liu 1,3 , Pengyi Yang 1,2,3,4,* 1 Computational Systems Biology Unit, Children’s Medical Research Institute, Faculty of Medicine and Health, The University of Sydney, Westmead, NSW 2145, Australia 2 School of Mathematics and Statistics, Faculty of Science, The University of Sydney, Camperdown, NSW 2006, Australia 3 Sydney Precision Data Science Centre, The University of Sydney, Camperdown, NSW 2006, Australia 4 Charles Perkins Centre, The University of Sydney, Camperdown, NSW 2006, Australia + Equal contribution * Correspondence: pengyi.yang@sydney.edu.au Abstract Recent developments in single-cell omics technologies have enabled the quantification of molecular profiles in individual cells at an unparalleled resolution. Deep learning, a rapidly evolving sub-field of machine learning, has instilled a significant interest in single-cell omics research due to its remarkable success in analysing heterogeneous high-dimensional single-cell omics data. Nevertheless, the inherent multi-layer nonlinear architecture of deep learning models often makes them ‘black boxes’ as the reasoning behind predictions is often unknown and not transparent to the user. This has stimulated an increasing body of research for addressing the lack of interpretability in deep learning models, especially in single-cell omics data analyses, where the identification and understanding of molecular regulators are crucial for interpreting model predictions and directing downstream experimental validations. In this work, we introduce the basics of single-cell omics technologies and the concept of interpretable deep learning. This is followed by a review of the recent interpretable deep learning models applied to various single-cell omics research. Lastly, we highlight the current limitations and discuss potential future directions. We anticipate this review to bring together the single-cell and machine learning research communities to foster future development and application of interpretable deep learning in single-cell omics research. Introduction The advances in high-throughput omics technologies have transformed our ability to probe molecular programs at a large scale, providing insight into the complex mechanisms underlying various biological systems and diseases. Until recently, most early omics technologies have been typically applied to profile a population of cells, known as ‘bulk’ profiling [19], where the heterogeneity of cells and cell types are masked by the average signal across the cell population [59]. Recent establishments of technologies such as single-cell RNA-sequencing (scRNA-seq) [47, 53] and single-cell assay for transposase-accessible chromatin by sequencing (scATAC-seq) [5] enables the 1/13" 2401.06825v1,"Jiangming Shi 1 , Xiangbo Yin 2 , Yeyun Chen 1 , Yachao Zhang 3 , Zhizhong Zhang 4, 5 , ∗ Yuan Xie 4, 5 , Yanyun Qu 1,2 * 1 Institute of Artificial Intelligence, 2 School of Informatics, Xiamen University 3 Tsinghua Shenzhen International Graduate School, Tsinghua University 4 East China Normal University, 5 Chongqing Institute of East China Normal University jiangming.shi@outlook.com, {zzzhang, yxie}@cs.ecnu.edu.cn, yyqu@xmu.edu.cn Abstract Unsupervised visible-infrared person re-identification (USL-VI-ReID) is a promising yet challenging retrieval task. The key challenges in USL-VI-ReID are to effectively generate pseudo-labels and establish pseudo-label correspondences across modalities without relying on any prior annotations. Recently, clustered pseudo-label methods have gained more attention in USL-VI-ReID. However, previous methods fell short of fully exploiting the individual nuances, as they simply utilized a single memory that represented an identity to establish cross-modality correspondences, resulting in ambiguous cross-modality correspondences. To address the problem, we propose a Multi-Memory Matching (MMM) framework for USL-VI-ReID. We first design a Cross-Modality Clustering (CMC) module to generate the pseudo-labels through clustering together both two modality samples. To associate cross-modality clustered pseudolabels, we design a Multi-Memory Learning and Matching (MMLM) module, ensuring that optimization explicitly focuses on the nuances of individual perspectives and establishes reliable cross-modality correspondences. Finally, we design a Soft Cluster-level Alignment (SCA) module to narrow the modality gap while mitigating the effect of noise pseudo-labels through a soft many-to-many alignment strategy. Extensive experiments on the public SYSU-MM01 and RegDB datasets demonstrate the reliability of the established cross-modality correspondences and the effectiveness of our MMM. The source codes will be released. Multi-Memory Matching for Unsupervised Visible-Infrared Person Re-Identification Figure 1. Comparision with different methods on ARI. The ARI indicates the Adjusted Rand Index, which is a similarity measure between two clusterings. The visualization is presented in Fig. 5. fields of video surveillance [12–14, 49], such as intelligent security and criminal investigation. However, in low-light conditions, the images captured by visible cameras are far from satisfactory, which renders methods [14, 24, 33, 43, 55] that primarily focus on matching visible images less effective. Fortunately, smart surveillance cameras that can switch from visible to infrared modes in poor lighting environments have become widespread, driving the development of visible-infrared person re-identification (VI-ReID) for the 24-hour surveillance system. VI-ReID aims at retrieving infrared images of the same person when provided with a visible person image, and vice versa [48, 53]. Many VI-ReID methods [19, 28, 41, 51– 53, 56] have shown promising progress. However, these methods are based on well-annotated cross-modality data, which is time-consuming and labor-intensive, thereby limiting the practical application of supervised VI-ReID methods in real-world scenarios. 1. Introduction Person re-identification (ReID) aims to match the same person across different cameras, with applications in various * Corresponding author. 1" 2401.06831v1,"This paper appears in International Conference on Computer and Applications (ICCA) 2023. A Survey on the Applications of Frontier AI, Foundation Models, and Large Language Models to Intelligent Transportation Systems Mohamed R. Shoaib 1 , Heba M. Emara 2 , Jun Zhao 1 1 School of Computer Science and Engineering, Nanyang Technological University, Singapore 2 Pyramids Higher Institute for Engineering and Technology, Giza Governorate, Egypt Emails: mohamedr003@e.ntu.edu.sg, heba.emara@el-eng.menofia.edu.eg, junzhao@ntu.edu.sg impact these language-driven models are making in enhancing the intelligence of transportation systems, optimizing traffic management, and propelling us towards the realization of smart cities [64], [65]. The foundation of LLMs is rooted in their ability to understand and generate human-like text by modeling language patterns and semantics [63]. Their utilization has transcended the boundaries of traditional language tasks, permeating diverse domains, including healthcare, finance, customer service, and, significantly, transportation. LLMs are not mere bystanders; they have emerged as intelligent co-pilots, enhancing the agility and adaptability of transportation systems [66]. This intersection of LLMs and ITS holds tremendous promise for addressing a host of challenges that have long plagued urban and interurban mobility. Congestion, accidents, and environmental concerns have weighed heavily on the transportation landscape [67]. ITS, which encompasses a suite of advanced technologies and data-driven solutions, offers a path towards alleviating these challenges. However, achieving the full potential of ITS requires the comprehension and effective utilization of vast amounts of textual data, from traffic reports and accident data to social media chatter and user feedback. Here, LLMs come to the forefront, providing the key to unlock the insights hidden within this textual goldmine. Foundation models [69] are a broader category of AI models designed to provide a general, adaptable base for various applications. They can encompass not only language tasks but also other modalities like images or even multimodal tasks. LLMs can be understood as a subset of fine-tuned foundation models with a specific focus on text-based tasks. We can further have large vision models (LVMs), large audio models (LAMs), and large multimodal models (LMMs). Foundation models [70] and frontier AI [71] are terms that refer to advanced developments in the field of AI, but they emphasize different aspects of these developments. The word “frontier” highlights a collection of advanced and potent foundation models at the forefront of technology. We can even propose the terminology “foundation AI” in replacement of “frontier AI” to highlight the foundation nature. Nevertheless, both “foundation AI” and “frontier AI” can be abbreviated as “FAI”. Regardless of which name is used, the eventual goal in AI research and development is to realize Artificial General Intelligence (AGI). The contributions of this paper can be stated as: Abstract—This survey paper explores the transformative influence of frontier AI, foundation models, and Large Language Models (LLMs) in the realm of Intelligent Transportation Systems (ITS), emphasizing their integral role in advancing transportation intelligence, optimizing traffic management, and contributing to the realization of smart cities. Frontier AI refers to the forefront of AI technology, encompassing the latest advancements, innovations, and experimental techniques in the field, especially AI foundation models and LLMs. Foundation models, like GPT-4, are large, general-purpose AI models that provide a base for a wide range of applications. They are characterized by their versatility and scalability. LLMs are obtained from finetuning foundation models with a specific focus on processing and generating natural language. They excel in tasks like language understanding, text generation, translation, and summarization. By leveraging vast textual data, including traffic reports and social media interactions, LLMs extract critical insights, fostering the evolution of ITS. The survey navigates the dynamic synergy between LLMs and ITS, delving into applications in traffic management, integration into autonomous vehicles, and their role in shaping smart cities. It provides insights into ongoing research, innovations, and emerging trends, aiming to inspire collaboration at the intersection of language, intelligence, and mobility for safer, more efficient, and sustainable transportation systems. The paper further surveys interactions between LLMs and various aspects of ITS, exploring roles in traffic management, facilitating autonomous vehicles, and contributing to smart city development, while addressing challenges brought by frontier AI and foundation models. This paper offers valuable inspiration for future research and innovation in the transformative domain of intelligent transportation. Index Terms—Intelligent Transportation Systems (ITS), Large Language Models (LLMs), Frontier AI, Foundation Models, 6G Wireless Communication, Internet of Vehicles (IoVs), Vehicular Technology, Smart Cities. I. I NTRODUCTION In an era defined by rapid technological advancements, the marriage of Artificial Intelligence (AI) and transportation systems has ushered in a new age of mobility—intelligent, efficient, and responsive. ITSs have evolved from conventional traffic management approaches to complex and data-driven systems that promise to reshape the way we navigate our cities and roads. At the heart of this transformation lies the remarkable power of Large Language Models (LLMs) [63], a class of AI algorithms that have, in recent years, become central actors in natural language processing and understanding. This survey paper explores the dynamic and multifaceted relationship between LLMs and ITS, illuminating the profound 1" 2401.06833v1,"A hierarchical control framework for autonomous decision-making systems: Integrating HMDP and MPC Xue-Fang Wang a , Jingjing Jiang b , Wen-Hua Chen ∗ b a School of Engineering, University of Leicester, UK b Department of Aeronautical and Automotive Engineering, Loughborough University, UK Abstract This paper proposes a comprehensive hierarchical control framework for autonomous decision-making arising in robotics and autonomous systems. In a typical hierarchical control architecture, high-level decision making is often characterised by discrete state and decision/control sets. However, a rational decision is usually affected by not only the discrete states of the autonomous system, but also the underlying continuous dynamics even the evolution of its operational environment. This paper proposes a holistic and comprehensive design process and framework for this type of challenging problems, from new modelling and design problem formulation to control design and stability analysis. It addresses the intricate interplay between traditional continuous systems dynamics utilized at the low levels for control design and discrete Markov decision processes (MDP) for facilitating high-level decision making. We model the decision making system in complex environments as a hybrid system consisting of a controlled MDP and autonomous (i.e. uncontrolled) continuous dynamics. Consequently, the new formulation is called as hybrid Markov decision process (HMDP). The design problem is formulated with a focus on ensuring both safety and optimality while taking into account the influence of both the discrete and continuous state variables of different levels. With the help of the model predictive control (MPC) concept, a decision maker design scheme is proposed for the proposed hybrid decision making model. By carefully designing key ingredients involved in this scheme, it is shown that the recursive feasibility and stability of the proposed autonomous decision making scheme are guaranteed. The proposed framework is applied to develop an autonomous lane changing system for intelligent vehicles. Simulation shows it exhibits a promising ability to handle diverse behaviors in dynamic and complex environments. It is envisaged that the proposed framework is applicable to autonomous decision making for a wide range of robotics and autonomous systems where both safety and optimality are key considerations. Key words: Hybrid Markov decision process (HMDP), autonomous decision-making systems, unified hierarchical control framework, model predictive control (MPC), safety and optimality 1 Introduction 1.1 Background The emergence of autonomous systems necessitates a novel shift in control methodologies due to its increasing complexity, capabilities and wide applications (see, for example, [1, 5, 11, 23, 31, 32, 38, 39]). Unlike traditional control systems that predominantly focus on the designing and implementing control algorithms for continuous system dynamics, autonomous systems require a holistic approach that includes high-level decision-making within an admissible decision set. This ne- cessitates the exploration and development of novel control methodologies that can effectively govern these autonomous decision-making systems. It is now established that the achievement of extensive decisionmaking capabilities is a fundamental element to accomplish full automation of vehicles. In the realm of autonomous driving (as ⋆ This work was supported by the UK Engineering and Physical Sciences Research Council (EPSRC) Established Career Fellowship (EP/T005734/1). Email addresses: xw259@leicester.ac.uk. (Xue-Fang Wang), j.jiang2@lboro.ac.uk (Jingjing Jiang), w.chen@lboro.ac.uk (Wen-Hua Chen ∗ ). 1 ∗ Corresponding author: Wen-Hua Chen. Fig. 1. Hierarchical autonomous control architecture that may consist of several levels. 17 January 2024" 2401.06834v1,"Optimization of Discrete Parameters Using the Adaptive Gradient Method and Directed Evolution Andrei Beinarovich, Sergey Stepanov ∗ , Alexander Zaslavsky QuData AI, Dnipro, Ukraine https://qudata.com/ December 21, 2023 Abstract The problem is considered of optimizing discrete parameters in the presence of constraints. We use the stochastic sigmoid with temperature and put forward the new adaptive gradient method CONGA. The search for an optimal solution is carried out by a population of individuals. Each of them varies according to gradients of the ’environment’ and is characterized by two temperature parameters with different annealing schedules. Unadapted individuals die, and optimal ones interbreed, the result is directed evolutionary dynamics. The proposed method is illustrated using the well-known combinatorial problem for optimal packing of a backpack (0–1 KP). 1 Introduction Deep learning models usually utilize real-valued parameters. This is due to the fact that the only known optimization method applicable to models with millions or more parameters is gradient descent. However, many tasks that machine learning is aiming to solve are intrinsically discrete in nature. This discreteness may follow directly from the structure of the input or output data, and also can be optimal configuration for the latent feature space. For example, natural language operates with tokens, the relationship between which can be described using tree structures. A similar situation occurs when working with particles, molecules, graphs and other objects that are of a discrete nature. Over the years, researchers have become adept at ’encoding’ discrete objects using continuous parameters (using embedding vectors, for example). However, this accomplishment comes at the cost of introducing a large number of redundant parameters. There are numerous real world problems that require a solution of optimization task with constrained parameters, some of the most prominent examples being the traveling salesman problem (TSP), ranking and sorting algorithms, routing optimization, the 0– 1 knapsack problem, and many other. Application to these combinatorial problems of the traditional ML methods that rely on the gradient descent is not straightforward, as the solution space is discrete and objective functions are not differentiable, as they involve step-wise decisions or discrete choices, rendering gradients undefined or impractical to compute. Also traditional gradient-based methods may not naturally integrate constraint satisfaction into the optimization process. Researchers put forward a number of approaches to tackle these difficulties. After the papers [1–3] introduced the continuous relaxation of discrete random variables it became possible to use the gradient method for discrete parameters. ∗ Corresponding author: 1" 2401.06835v1,"Austria’s KlimaTicket: Assessing the short-term impact of a cheap nationwide travel pass on demand Hannes Wallimann University of Applied Sciences and Arts Lucerne, Competence Center for Mobility Version January 2024 Abstract: Measures to reduce transport-related greenhouse gas emissions are of great importance to policy-makers. A recent example is the nationwide KlimaTicket in Austria, a country with a relatively high share of transport-related emissions. The cheap yearly season ticket introduced in October 2021 allows unlimited access to Austria’s public transport network. Using the synthetic control and synthetic difference-in-differences methods, I assess the causal effect of this policy on public transport demand by constructing a data-driven counterfactual out of European railway companies to mimic the number of passengers of the Austrian Federal Railways without the KlimaTicket. The results indicate public transport demand grew slightly faster in Austria, i.e., 3.3 or 6.8 percentage points, depending on the method, than it would have in the absence of the KlimaTicket. However, the growth effect after the COVID-19 pandemic appears only statistically significant when applying the synthetic control method, and the positive effect on public transport demand growth disappears in 2022. Keywords: Public transport; Policy evaluation; Synthetic control method; Case study; Natural experi- ment Acknowledgments: Michael Stöckli provided excellent research assistance. I would like to thank Kevin Blättler, Silvio Sticher, and Widar von Arx for interesting discussions and helpful comments. Addresses for correspondence: Hannes Wallimann, University of Applied Sciences and Arts Lucerne, Rösslimatte 48, 6002 Lucerne, hannes.wallimann@hslu.ch." 2401.06837v1,"S TRUCT S UM Generation for Faster Text Comprehension Parag Jain 1∗ , Andreea Marzoca 2 , Francesco Piccinno 2 School of Informatics, University of Edinburgh 1 Google DeepMind 2 parag.jain@ed.ac.uk, {andreeam,piccinno}@google.com 1 Abstract (a) We consider the task of generating structured representations of text using large language models (LLMs). We focus on tables and mind maps as representative modalities. Tables are more organized way of representing data, while mind maps provide a visually dynamic and flexible approach, particularly suitable for sparse content. Despite the effectiveness of LLMs on different tasks, we show that current models struggle with generating structured outputs. In response, we present effective prompting strategies for both of these tasks. We introduce a taxonomy of problems around factuality, global and local structure, common to both modalities and propose a set of critiques to tackle these issues resulting in an absolute improvement in accuracy of +37pp (79%) for mind maps and +15pp (78%) for tables. To evaluate semantic coverage of generated structured representations we propose A UTO -QA, and we verify the adequacy of A UTO -QA using SQuAD dataset. We further evaluate the usefulness of structured representations via a text comprehension user study. The results show a significant reduction in comprehension time compared to text when using table (42.9%) and mind map (31.9%), without loss in accuracy. Input Text Introduction The overwhelming amount of information available online poses a significant challenge for users seeking to quickly grasp and process relevant information. Current large language models (LLMs), such as P A LM-2 (PaLM2, 2023), Gemini (Gemini Team, 2023) and ChatGPT (OpenAI, 2022), while capable of providing text-based responses to user queries, often fail to adequately structure and organize this information in a way that facilitates comprehension (Tang et al., 2023). This can lead to information processing bottlenecks that hinder users’ ability to efficiently extract meaningful insights from text. ∗ Work done while interning at Google DeepMind. Text 1 Divide prompt Text 2 Text to table prompt Text N (b) Input Text root generation Expansion Figure 1: Overview of (a) tables and (b) mind map generation prompts. Prompting steps are colored. Figure (a) show divide-and-generate prompt for multiple table generation. Input passages is first segmented into subpassages, followed by table generation. Figure (b) is iterative expansion based mind map prompt. Starting from main concept generation, at each iteration current mind map is expanded until termination. To address this issue, we introduce the notion of structured summaries, or S TRUCT S UM in short. S TRUCT S UM s are derived by hierarchically organizing information and inducing semantic connections from an input text passage. Without loss of generality, we focus on tables (Wu et al., 2022; Li et al., 2023) and mind maps (Buzan, 1996; Huang et al., 2021) as possible S TRUCT S UM instantiations: • Tables are well-studied in the NLP literature. However the vast majority of the work focused on simpler tasks where tables are inputs – such as QA (Herzig et al., 2020), semantic parsing (Bogin et al., 2019), NLG (Andrejczuk et al., 2022; Puduppully and Lapata, 2021; Laha et al., 2020), etc. – rather than outputs. Indeed, faithfully transforming an arbitrary text passage into a table is a difficult task as the model must deal with different challenges, such as reasoning at multiple levels, dealing with missing information, and visually consistent formatting. Motivated by the limitations above, we propose to generate multi-" 2401.06848v1,"Quantum many-body scars from unstable periodic orbits Bertrand Evrard, 1, ∗ Andrea Pizzi, 2, 3, † Simeon I. Mistakidis, 4, 5, 2 and Ceren B. Dag 5, 2, ‡ 1 Institute for Quantum Electronics, ETH Zürich, CH-8093 Zürich, Switzerland Department of Physics, Harvard University, Cambridge, Massachusetts 02138, USA 3 Cavendish Laboratory, University of Cambridge, Cambridge CB3 0HE, United Kingdom 4 Department of Physics, Missouri University of Science and Technology, Rolla, MO 65409, USA 5 ITAMP, Center for Astrophysics, Harvard & Smithsonian, Cambridge, Massachusetts 02138, USA 2 Unstable periodic orbits (UPOs) play a key role in the theory of chaos, constituting the “skeleton” of classical chaotic systems and “scarring” the eigenstates of the corresponding quantum system. Recently, nonthermal many-body eigenstates embedded in an otherwise thermal spectrum have been identified as a many-body generalization of quantum scars. The latter, however, are not clearly associated to a chaotic phase space, and the connection between the single- and many-body notions of quantum scars remains therefore incomplete. Here, we find the first quantum many-body scars originating from UPOs of a chaotic phase space. Remarkably, these states verify the eigenstate thermalization hypothesis, and we thus refer to them as thermal quantum many-body scars. While they do not preclude thermalization, their spectral structure featuring approximately equispaced towers of states yields an anomalous oscillatory dynamics preceding thermalization for wavepackets initialized on an UPO. Remarkably, our model hosts both types of scars, thermal and nonthermal, and allows to study the crossover between the two. Our work illustrates the fundamental principle of classical-quantum correspondence in a many-body system, and its limitations. I. INTRODUCTION The dichotomy between regularity and chaos is a fundamental feature of classical dynamical systems [1]. Regular regions of the phase space exhibit predictable patterns and stable orbits, while chaotic domains unfold into complex and diverging trajectories characterized by an extreme sensitivity to initial conditions. This intricate maze of chaotic trajectories is underpinned by a dense set of unstable periodic orbits (UPOs), which wield a pervasive influence on the entire dynamics [2], and constitute the “skeleton” of a chaotic phase space [3]. Remarkably, UPOs play a central role not only in classical chaos, but also in quantum chaos. For a system with a semi-classical limit, a central question is how the structure of the classical phase space affects the spectral properties of the quantum counterpart. As for the energy spectrum, for instance, Gutzwiller’s trace formula [4, 5] expresses the density of states as a series expansion over the UPOs. As for the eigenstates, pioneering work by Heller [6, 7] on chaotic quantum billiards has shown that the quantum wave function exhibits larger probability density around the UPOs of the underlying classical dynamics. In this sense, the classical UPOs scar the quantum eigenstates. The original and now 40 years old notion of quantum scars was developed for single-particle systems, e.g., quantum billiards. Motivated by recent developments in the coherent control of quantum many-body systems, and in particular by the experiments with trapped ∗ bevrard@phys.ethz.ch † ap2076@cam.ac.uk ‡ ceren.dag@cfa.harvard.edu Rydberg atoms [8], a new notion of quantum manybody scars (QMBS) was proposed [9–11]. The QMBS are zero-measure and nonthermal eigenstates embedded in an otherwise thermal spectrum of states, featuring low entanglement entropy and giving rise to oscillatory dynamics for certain experimentally-accessible initial states [8, 12, 13]. Thanks to their ability to evade thermalization and break ergodicity, QMBS have attracted broad interest and now constitute an entire field of active research [9, 11, 13–27]. The names “quantum scars” and “quantum manybody scars” suggest a connection between the two. This connection is in fact far from granted. While both UPOs and QMBS are outliers in an otherwise chaotic system, QMBS are not associated with UPOs, as quantum scars by definition are. This ambiguity arises partly from the fact that most many-body systems lack a clear notion of classical phase space, in which the UPOs would reside. Recent works have addressed this challenge by constructing effective phase spaces based on variational ansatze [18, 19, 28]. In these systems, the quantum many-body state leaks out of the variational manifold into the rest of the Hilbert space, as quantified by a “quantum leakage” [18, 28]. The latter introduces the notion of instability inherent to quantum scars. At the same time, the leakage is not manifestly connected to an underlying classical instability, and indeed, in these works the QMBS correspond to regular regions of the variational phase space [28]. To date, no example of a many-body system exists in which scars emerge in their original sense, namely in relation to UPOs in an underlying chaotic classical dynamics. Here, we report the first such example in a spin−1 chain, whose mean-field description provides a natural notion of a classical phase space. Therein, we identify stable and unstable periodic orbits, both scarring" 2401.06855v2,"Fine-grained Hallucination Detection and Editing for Language Models Abhika Mishra † Akari Asai † Vidhisha Balachandran ‡ Yizhong Wang † Graham Neubig ‡ Yulia Tsvetkov † Hannaneh Hajishirzi †§ † University of Washington ‡ Carnegie Mellon University § Allen Institute for AI {abhikam, akari, yizhongw, yuliats, hannaneh}@cs.washington.edu {vbalacha, gneubig}@cs.cmu.edu Abstract Large language models (LMs) are prone to generate diverse factually incorrect statements, which are widely called hallucinations. Current approaches predominantly focus on coarse-grained automatic hallucination detection or editing, overlooking nuanced error levels. In this paper, we propose a novel task—automatic fine-grained hallucination detection—and present a comprehensive taxonomy encompassing six hierarchically defined types of hallucination. To facilitate evaluation, we introduce a new benchmark that includes fine-grained human judgments on two LM outputs across various domains. Our analysis reveals that ChatGPT and Llama2-Chat exhibit hallucinations in 60% and 75% of their outputs, respectively, and a majority of these hallucinations fall into categories that have been underexplored. As an initial step to address this, we train F AVA , a retrieval-augmented LM by carefully designing synthetic data generations to detect and correct fine-grained hallucinations. On our benchmark, our automatic and human evaluations show that F AVA significantly outperforms ChatGPT on fine-grained hallucination detection by a large margin though a large room for future improvement still exists. F AVA ’s suggested edits also improve the factuality of LM-generated text, resulting in 5-10% FActScore improvements. 1 1 Introduction Large language models (LMs; Brown et al. 2020) can generate highly fluent and plausible text. However, these models are prone to produce hallucinations—factually incorrect generations—which often impedes their deployment in real-world applications (Mallen et al., 2022). Prior work on hallucinations in natural language generation often 1 Our code, data, and demo are available at https:// fine-grained-hallucination.github.io/ LM Output Messi is a soccer player in Barcelona. He is also known for his role in the 2017 film ""The Messi Diaries”. References [1] Messi is now a captain for the Major League Soccer club Inter Miami. [2] Documentaries about Messi: -Messi, Lionel Messi: The Greatest, Messi vs. Ronaldo Binary (Course-grained) Hallucination Detection Messi is a soccer player in Barcelona. He is also known for his role in the 2017 film ""The Messi Diaries”. Fine-grained Hallucination Detection Messi is a soccer player in BarcelonaMiami. He is also known for his role in the 2017 film ""The Messi Diaries”. No further context on factuality errors Hallucination Types Entity Relation Contradictory Unverifiable Invented Subjective Figure 1: Overview of fine-grained detection system and the proposed taxonomy for hallucinations. assumes the presence of a specific reference text and focuses on studying faithfulness to the references (Ji et al., 2023). On the contrary, escalating apprehensions have been articulated with respect to LM generations that are not grounded in any specific source text, but rather in world knowledge and facts (Zhang et al., 2023; Huang et al., 2022). Such prevalence of hallucinations in LM outputs has motivated the development of automatic hallucination detection (Min et al., 2023) or editing systems (Gao et al., 2022; Chen et al., 2023). However, those existing systems tend to treat diverse types of factual errors uniformly, often simplifying them into binary categories such as “factual” or “not factual” with a focus on certain domains or specific types of errors. While entity-level contradictions (Figure 1 top) are usually evident and can be easily rectified with a single reference, LMs often fabricate entities that lack real-world existence (Figure 1 bottom). This variability underscores the need for a more fine-grained approach to hallucination detection for both model development and human verification, and we argue that a detection system should provide precise identification of hallucination sequences, discern different error types," 2401.06859v1,"Joint Power Optimization and AP Selection for Secure Cell-Free Massive MIMO Yasseen Sadoon Atiya, Zahra Mobini, Hien Quoc Ngo, and Michail Matthaiou Centre for Wireless Innovation (CWI), Queen’s University Belfast, U.K. Email:{yhimiari01, zahra.mobini, hien.ngo, m.matthaiou}@qub.ac.uk Abstract—In this paper, we investigate joint power control and access point (AP) selection scheme in a cell-free massive multipleinput multiple-output (CF-mMIMO) system under an active eavesdropping attack, where an eavesdropper tries to overhear the signal sent to one of the legitimate users by contaminating the uplink channel estimation. We formulate a joint optimization problem to minimize the eavesdropping spectral efficiency (SE) while guaranteeing a given SE requirement at legitimate users. The challenging formulated problem is converted into a more tractable form and an efficient low-complexity accelerated projected gradient (APG)-based approach is proposed to solve it. Our findings reveal that the proposed joint optimization approach significantly outperforms the heuristic approaches in terms of secrecy SE (SSE). For instance, the 50% likely SSE performance of the proposed approach is 265% higher than that of equal power allocation and random AP selection scheme. I. I NTRODUCTION CF-mMIMO has emerged as a promising wireless access technology for the next generations of wireless networks. In CF-mMIMO systems, a large number of APs are deployed over a certain area to communicate with a much smaller number of users in a user-centric scenario. Consequently, it can provide high coverage, spectral, and energy efficiency achieved by lowcomplexity signal processing [1]. CF-mMIMO leverages its architecture to provide efficient communication for all users in the network. However, this makes it more susceptible to eavesdropper (Eve) attacks due to the short distance between the APs and users. Therefore, the secrecy aspect of CF- mMIMO has attracted researchers’ attention in recent years. There are a few works in the context of secure CF-mMIMO systems. Specifically, in [2], a secrecy performance comparison between CF-mMIMO and co-located massive MIMO systems was performed by deriving the SSE expression under active pilot attacks. Then, using the same setup of [2], Hoang et al. in [3], proposed an approach for detecting the presence of the active Eve and designed power control schemes with different objectives including maximizing the achievable SE of the legitimate user who is under attack, maximizing the The authors are with the Centre for Wireless Innovation (CWI), Queen’s University Belfast, BT3 9DT Belfast, U.K. email:{yhimiari01, z.mobini, hien.ngo, m.matthaiou}@qub.ac.uk. This work is a contribution by Project REASON, a UK Government funded project under the Future Open Networks Research Challenge (FONRC) sponsored by the Department of Science Innovation and Technology (DSIT). The work of Z. Mobini and H. Q. Ngo was supported by the U.K. Research and Innovation Future Leaders Fellowships under Grant MR/X010635/1. The work of M. Matthaiou has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 101001331). SSE, and minimizing the total power at all APs subject to the constraints on the SE of the users and Eve. Later, the authors in [4] investigated the secrecy performance of CF-mMIMO utilizing non-orthogonal pilot sequences in the uplink training phase and proposed an approach for pilot transmission in the downlink phase. In addition, the authors in [5] addressed the problem of joint downlink power control and data transfer of CF-mMIMO under active eavesdropping. The effect of hardware impairments on the secrecy performance of a CF- mMIMO system was studied in [6]. Moreover, [7] studied the effect of radio frequency (RF) impairments and low-resolution analog-to-digital converters on the secrecy performance of CF- mMIMO system experiencing active eavesdropping. However, all the aforementioned works focused on power control designs, assuming that all APs serve all users. Numerous AP selection schemes have been introduced in the literature [8]–[12] with the objective of increasing the scalability of CF-mMIMO, while simultaneously improving its SE and energy efficiency. Nevertheless, a popular assumption in the existing literature on secure CF-mMIMO systems is that each user is served by all APs in the network. In practice, APs are located at a considerable distance from users, making minimal contributions to the SE, whereas others are close to a potential Eve. Therefore, the efficient selection of APs to serve users, especially users under an eavesdropping attack, is a meaningful and important challenge. In line with this idea, in our very recent work [13], we proposed a heuristic AP selection approach to improve the SSE and showed that AP selection can provide a noticeable secrecy improvement. In pursuit of harnessing the inherent benefits of concurrently optimizing power allocation and AP selection, in this paper we propose a joint optimization approach based on the APG method to minimize the overheard signal-to-interference-plusnoise ratio (SINR) at Eve while ensuring a predetermined quality of service (QoS) constraint at legitimate users. The main contributions of this paper can be summarized as follows: We propose a joint optimization approach for AP selection and power optimization. The formulated problem is under a transmit power constraint and individual QoS requirements of all legitimate users. • An efficient algorithm is then proposed to solve the challenging formulated mixed-integer non-convex problem. • Numerical results show that our joint optimization approach remarkably improves the secrecy performance of •" 2401.06876v1,"An empirical model of fleet modernization: on the relationship between market concentration and innovation adoption in the Brazilian airline industry Alessandro V. M. Oliveira  Thiago Caliari Rodolfo R. Narcizo This version: 12 December 2020 Abstract The modernization of an airline’s fleet can reduce its operating costs, improve the perceived quality of service offered to passengers, and mitigate emissions. The present paper investigates the market incentives that airlines have to adopt technological innovation from manufacturers by acquiring new generation aircraft. We develop an econometric model of fleet modernization in the Brazilian commercial aviation over two decades. We examine the hypothesis of an inverted-U relationship between market concentration and fleet modernization and find evidence that both the extremes of competition and concentration may inhibit innovation adoption by carriers. We find limited evidence associating either hubbing activity or low-cost carriers with the more intense introduction of new types of aircraft models and variants in the industry. Finally, our results suggest that energy cost rises may provoke boosts in fleet modernization in the long term, with carriers possibly targeting more eco-efficient operations up to two years after an upsurge in fuel price. Keywords: innovation adoption; airlines; aircraft manufacturers; LASSO; model averaging. JEL Classification: D22; L11; L93. ________________________________________  Corresponding author. Email address: alessandro@ita.br. ▪ Affiliations: Center for Airline Economics, Aeronautics Institute of Technology, Brazil. ▪ Acknowledgments: The first author wishes to thank the São Paulo Research Foundation (FAPESP)–grants n. 2013/14914-4 and 2015/19444-1; National Council for Scientific and Technological Development (CNPq)–grants n. 301654/2013-1, n. 301344/2017-5; The third author thanks the Coordination for the Improvement of Higher Education Personnel (CAPES)–Finance Code 001. The authors wish to thank Maurício Morales, Paulo Ivo Queiroz, Cláudio Jorge P. Alves, José Guerreiro Fregnani, Cristian Vieira dos Reis, Luiz André Gordo, Vitor Caixeta Santos, Paula Guimarães, Rogéria Arantes. All remaining errors are ours." 2401.06882v1,"Solution of JWST and HST problems by primordial black holes A.D. Dolgov 1, 2, ∗ 1 2 Novosibirsk State University, Novosibirsk, 630090, Russia Bogolyubov Laboratory of Theoretical Physics, JINR, Dubna, 141980, Russia Observations of the early universe at redshifts of order 10, collected during the last several years presented by the Hubble Space Telescope (HST) and recent data by the James Webb Space telescope (JWST) created strong doubts on the validity of the conventional ΛCDM cosmology. It is argued here that the 30 year old conjecture by A.Dolgov & J.Silk [1] of galaxy and quasar seeding by supermassive primordial black holes (SMBHs) naturally solves the problem of the observed dense early population of the universe, as well as the problem of the formation of SMBH in the contemporary universe. The idea of seeding of cosmic structures by SMBH is supported by a good agreement of the predicted log-normal mass spectrum of primordial black holes (PBH) with observations and by a noticeable antimatter population of the Milky Way. I. INTRODUCTION Recent observations of two orbital telescopes, HST and JWST created strong doubts on the validity of the standard cosmology. However, the 30 year old conjecture [1], that the galaxy formation is seeded by supermassive primordial black holes (PBH), not only rescued the accepted cosmological model but in fact predicted the observed rich population of the early universe by well developed galaxies and quasars. The suggested mechanism of PBH formation allows for creation of sufficient density of massive PBHs that seeded structure formation not only in the early universe at redshifs of order ten but during all cosmological epochs including the present day universe as well. Recently the idea of seeding by black holes was rediscovered in several papers under the pressure of HST and JWST observations. There is a strong confirmation of the model by ”experiment”. Namely the predicted log-normal mass spectrum of PBH very well agrees with observations; noticeable antimatter population of the Galaxy is predicted and confirmed by large amount of data: positrons, antinuclei, and (possibly) antistars, and the model could supply the sufficient number of SMBH binaries that presumably distorts the pulsar timing. The paper is organised as follows. In section II the observations of HST, JWST and ALMA are discussed and a possible conflict of the data with the standard λCDM cosmological model is described. In sec. III the seeding of cosmic structures by primordial black holes, originally proposed in our papers [1, 2] and recently rediscovered in several works, is discussed. Next, in sec. IV, the observations of gravitational waves generated by the coalescing black hole binary systems is considered and the arguments in favour that these black holes are primordial are presented. The chirp mass distribution are presented and compared with log-normal spectrum of PBHs. In sec. V the possibility of PBH being the cosmological dark matte is advocated. Sec. VI is dedicated to discussion of antimatter in cosmology. In the following section observational data indicating to noticeable amount of antimatter in the Milky Way is presented. Lastly in sec. VIII the mechanism of PBH creation with log-normal mass spectrum and antimatter formation in the Milky way suggested in refs. [1, 2] is briefly described II. A. CRISIS IN COSMOLOGY Crisis in cosmology, is it real? Dense population of the early universe, younger than one billion years at redshifts z ∼ 10, discovered by Hubble Space Telescope (HST) and James Webb Space Telescope (JWST), was taken as a strong blow to the conventional ΛCDM cosmology. However, the resolution of the problems by primordial black holes was suggested long before these problems emerged, see refs. [1, 2] and several subsequent papers by our group. The proposed model of the PBH creation is strongly supported by the predicted log-normal mass spectrum of the black holes:   dN = µ 2 exp −γ log 2 (M/M 0 )) , dM ∗ Electronic address: dolgov@nsu.ru (2.1)" 2401.06887v3,"The time problem in primordial perturbations Alice Boldrin, 1, ∗ Przemysław Małkiewicz, 1, † and Patrick Peter 2, ‡ 1 National Centre for Nuclear Research, Pasteura 7, 02-093 Warszawa, Poland GRεCO – Institut d’Astrophysique de Paris, CNRS & Sorbonne Université, UMR 7095 98 bis boulevard Arago, 75014 Paris, France 2 We study the non-unitary relation between quantum gravitational models defined using different internal times. We show that despite the non-unitarity, it is possible to provide a prescription for making unambiguous, though restricted, physical predictions independent of specific clocks. To illustrate this result, we employ a model of quantum gravitational waves in a quantum Friedmann universe. I. INTRODUCTION Quantum gravity models suffer from the infamous time problem [1–4] as the external and absolute time on which non-relativistic physics is based, is absent in Einstein’s theory of gravity. Therefore, one has to rely on largely arbitrary physical variables, known as internal time variables or internal clocks, to follow changes occurring in gravitational systems. By virtue of the principle of general relativity (time-reparametrization invariance), the free choice of internal time variable has no physical consequence in the classical theory. Upon passing to quantum theory, however, different choices of internal time variables are known to produce unitarily inequivalent quantum models [5–12]. The problem of finding the correct interpretation of these non-equivalent models is commonly referred to as the time problem. In this article, we look for the most plausible interpretation of such non-equivalent clocks. Our analysis is based on the model of primordial gravitational waves propagating across the Friedmann universe. It is important to note that similar models were previously used for making predictions for the primordial amplitude spectrum of density perturbation, which are greatly constrained by observations (see, e.g., Refs. [13–15]). Remarkably, to the best of our knowledge, the time problem has never been studied for such models, so it is important to clarify the role and the interpretation of internal time variables in their dynamics. We expect that the ensuing conclusions should equally apply to all cosmological models. The fact that the dynamics are unitarily inequivalent in different clocks is widely known and well-documented with plenty of examples, see e.g. Refs. [16–18]. In this context, it is sometimes emphasized that the only measurable quantities in quantum gravity are gauge-invariant variables that do not depend on the employed clock [19, 20]. They are constants of motion. However, they are said to encode all the relational dynamics in spite of being non-dynamical themselves. From this point of ∗ Alice.Boldrin@ncbj.gov.pl † Przemyslaw.Malkiewicz@ncbj.gov.pl ‡ patrick.peter@iap.fr view, dynamical quantities are not fundamental and are ambiguously given by one-parameter families of gaugeinvariant quantities, with each family representing the motion with respect to a specific internal time. The differences are seen as natural rather than inconsistencies that should be worried about. From our viewpoint, on the other hand, the dynamical variables can serve as fundamental variables, and the differences in their dynamics call for a careful interpretation, before allowing for physical predictions. The cosmological system examined in this article exhibits, as expected, dynamical discrepancies when based on different clocks. The discrepancies concern both the background and perturbation variables. This leads us to ask a fundamental question: what are the dynamical predictions of quantum cosmological models, which do not depend on the employed time variable? We address the above question within the reduced phase space quantization. Namely, we solve the Hamiltonian constraint and choose the internal time variable prior to quantization. An alternative approach would be to first quantize and then solve the constraint quantum mechanically while promoting one of the variables as internal time. Both approaches lead to the same time problem and therefore using the technically less involved reduced phase approach is well-justified (see, however, Ref. [21] for recent developments in the alternative approach). Most significantly, within the reduced phase space approach, there exists a theory of clock transformations, which is completely crucial for the purpose of this work [22]. Thanks to these precisely defined transformations, we are able to explore all possible clocks and quantize them with an assumption of fixed operator ordering. Hence, any quantum ambiguities found arise from the differences between clocks rather than the differences between quantization prescriptions. The outline of this article is as follows. In Sec. II, we make a brief introduction to the theory of clock transformations in the reduced phase space of gravitational models. We explain how this theory allows to remove irrelevant quantization ambiguities when passing to quantum theory based on different clocks and with different basic dynamical variables. In Sec. III, we formulate the reduced phase space description of the Friedmann universe with gravitational waves with respect to a fluid" 2401.06889v1,"Invisible Labor in Open Source Software Ecosystems JOHN MELUSO, University of Vermont, USA AMANDA CASARI, Google, Inc., USA and University of Vermont, USA KATIE MCLAUGHLIN, Google, Inc., Australia MILO Z. TRUJILLO, University of Vermont, USA Invisible labor is work that is not fully visible, not appropriately compensated, or both. In open source software (OSS) ecosystems, essential tasks that do not involve code (like content moderation) often become invisible to the detriment of individuals and organiza- tions. However, invisible labor is so difficult to measure that we do not know how much of OSS activities are invisible. Our study addresses this challenge, demonstrating that roughly half of OSS work is invisible. We do this by developing a survey technique with cognitive anchoring that measures OSS developer self-assessments of labor visibility and attribution. Survey respondents (𝑛 = 142) reported that their work is more likely to be nonvisible or partially visible (i.e. visible to at most 1 other person) than fully visible (i.e. visible to 2 or more people). Furthermore, cognitively anchoring participants to the idea of high work visibility increased perceptions of labor visibility and decreased visibility importance compared to anchoring to low work visibility. This suggests that advertising OSS activities as “open” may not make labor visible to most people, but rather lead contributors to overestimate labor visibility. We therefore add to a growing body of evidence that designing systems that recognize all kinds of labor as legitimate contributions is likely to improve fairness in software development while providing greater transparency into work designs that help organizations and communities achieve their goals. CCS Concepts: • Software and its engineering → Open source model; Maintaining software; • Human-centered computing → Empirical studies in collaborative and social computing; Computer supported cooperative work; • Social and professional topics → Employment issues; Computing organizations; Project management techniques; Software maintenance. Additional Key Words and Phrases: labor, feminism, openness, survey, articulation work, infrastructuring, contribution, anchoring 1 INTRODUCTION The processes of creating and maintaining open source software (OSS) involve many diverse tasks beyond just contributing code [7, 12, 16, 17, 47]. Conference organizing, community management, finance management, interaction design, data entry, and documenting have all become essential to OSS production and repair [11–13, 18, 32, 47, 50]. Despite growing interest in supporting noncode contributions [e.g. 30], much of this labor remains undocumented, unattributed to individuals, and “practically invisible” to outsiders and newcomers [16, 50]. This often makes noncode contributions forms of invisible labor, undercompensated or uncompensated activities that are “rendered invisible...because they take place out of sight, or because they lack physical form altogether” [11]. Labor invisibility creates significant challenges for individuals and organizations involved in OSS. For individuals, lower task visibility makes it difficult to demonstrate the value of their contributions [11, 41]. In turn, these individuals receive less compensation, whether in terms of future opportunities [3, 33], pay [46], or social status [38]. And so these individuals frequently burn out and stop performing crucial activities [13] that a growing number of scientists, organizations, and governments depend on [12]. Furthermore, these individuals are often members of minoritized groups [15], thereby reinforcing demographic representation disparities [3, 11]. Authors’ addresses: John Meluso, john.meluso@uvm.edu, University of Vermont, 33 Colchester Ave., Burlington, Vermont, USA, 05405; Amanda Casari, Google, Inc., Burlington, Vermont, USA and University of Vermont, 33 Colchester Ave., Burlington, Vermont, USA, 05405, amcasari@google.com; Katie McLaughlin, Google, Inc., Melbourne, Victoria, Australia, glasnt@google.com; Milo Z. Trujillo, University of Vermont, 33 Colchester Ave., Burlington, Vermont, USA, 05405, milo.trujillo@uvm.edu. 1" 2401.06893v1,"Local Gamma Augmentation for Ischemic Stroke Lesion Segmentation on MRI Jon Middleton †∗1,3 , Marko Bauer †3 , Jacob Johansen 1,3 , Mathias Perslev 3 , Kaining Sheng 1,3,4 , Silvia Ingala 3,4 , Mads Nielsen 1,2,3 , and Akshay Pai 3,4 1 Department of Computer Science, University of Copenhagen Pioneer Centre for Artificial Intelligence, University of Copenhagen 3 Cerebriu A/S 4 Department of Diagnostic Radiology, Rigshospitalet, Copenhagen, Denmark 2 Abstract The identification and localisation of pathological tissues in medical images continues to command much attention among deep learning practitioners. When trained on abundant datasets, deep neural networks can match or exceed human performance. However, the scarcity of annotated data complicates the training of these models. Data augmentation techniques can compensate for a lack of training samples. However, many commonly used augmentation methods can fail to provide meaningful samples during model fitting. We present local gamma augmentation, a technique for introducing new instances of intensities in pathological tissues. We leverage local gamma augmentation to compensate for a bias in intensities corresponding to ischemic stroke lesions in human brain MRIs. On three datasets, we show how local gamma augmentation can improve the image-level sensitivity of a deep neural network tasked with ischemic stroke lesion segmentation on magnetic resonance images. 1 Introduction The potential of deep neural networks to identify and localise pathological tissues in medical images continues to motivate research into novel training methods. In theory, deep architectures can achieve arbitrarily high levels of performance. In practice, however, these algorithms are trained on insufficient quantities of data. Overfitting arises as a result, and the full potential of these algorithms remains unrealised. Traditional approaches to the data scarcity problem use data augmentation to expand the size of the dataset. A typical setup selects a collection of data-agnostic operations which come from parameterized families of spatial and intensity transformations. Examples include affine transformations, elastic transformations, global gamma transformations, additive and multiplicative noise transformations, ∗ Corresponding Author: jami@di.ku.dk † Equal contribution. blurring transformations, and brightness transformations. An unlimited collection of novel samples can then be obtained by fixing probability distributions on the parameter spaces and sampling augmentation parameters from them. Though a dataset can be enlarged in this fashion, the approach may not provide relevant samples for image models tasked with classifying or segmenting regions of interest. Moreover, the augmentations themselves are not guaranteed to have an appreciable impact on model training. For example, the literature often claims that elastic deformations improve deep neural network performance [1–4]. Nonetheless, these transformations do not appear in all wellknown augmentation pipelines (for example, [5]), and some research indicates that these transformations can impair a network’s performance [6, 7]. The latter examples fit into the claim in [8] that the effectiveness of a data augmentation pipeline depends crucially on the content of a dataset. Thus, for models tasked with identifying and localising pathological tissues in medical images, practitioners are developing augmentation techniques that target these tissues. Recent work [4, 6, 9–11] has focused on local augmentations that expose deep networks to additional examples by isolating and altering regions of interest. We contribute a simple, targeted method of local data augmentation for a pathology segmentation model and apply this method to the problem of ischemic stroke lesion segmentation on multi-modal magnetic resonance images. The method exploits both the single-parameter family of gamma transformations and ischemic stroke lesion segmentation maps to mitigate an intensity bias in the training data. We compare local gamma augmentation against a baseline without it, and we show an improvement in image-level sensitivity as a result. 2 Related Work Gamma transformations frequently appear in probabilistic data augmentation pipelines for deep segmentation networks. The training pipeline for nnU-Net Proceedings of the 5th Northern Lights Deep Learning Conference (NLDL), PMLR 233, 2024. L M 2024 Jon Middleton † , Marko Bauer, Jacob Johansen, Mathias Perslev, Kaining Sheng, Silvia Ingala, Mads Nielsen, & Akshay Pai. This is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/)." 2401.06898v1,"Always-Sparse Training by Growing Connections with Guided Stochastic Exploration Mike Heddes University of California, Irvine mheddes@uci.edu Narayan Srinivasa Intel Labs narayan.srinivasa@intel.com Tony Givargis University of California, Irvine givargis@uci.edu Alexandru Nicolau University of California, Irvine anicolau@uci.edu Abstract The excessive computational requirements of modern artificial neural networks (ANNs) are posing limitations on the machines that can run them. Sparsification of ANNs is often motivated by time, memory and energy savings only during model inference, yielding no benefits during training. A growing body of work is now focusing on providing the benefits of model sparsification also during training. While these methods greatly improve the training efficiency, the training algorithms yielding the most accurate models still materialize the dense weights, or compute dense gradients during training. We propose an efficient, always-sparse training algorithm with excellent scaling to larger and sparser models, supported by its linear time complexity with respect to the model width during training and inference. Moreover, our guided stochastic exploration algorithm improves over the accuracy of previous sparse training methods. We evaluate our method on CIFAR-10/100 and ImageNet using ResNet, VGG, and ViT models, and compare it against a range of sparsification methods 1 . 1 Introduction Artificial neural networks (ANNs) are currently the most prominent machine learning method because of their unparalleled performance on a broad range of applications, including computer vision (Voulodimos et al., 2018; O’Mahony et al., 2019), natural language processing (Young et al., 2018; Otter et al., 2020), and reinforcement learning (Arulkumaran et al., 2017; Schrittwieser et al., 2020), among many others (Liu et al., 2017; Wang et al., 2020; Zhou et al., 2020). To improve their representational powers, ANNs keep increasing in size (Neyshabur et al., 2019; Kaplan et al., 2020). Recent large language models, for example, have widths surpassing 10,000 units and total parameter counts over 100 billion (Brown et al., 2020; Rae et al., 2021; Chowdhery et al., 2022). However, with their increasing sizes, the memory and computational requirements to train and make inferences with these models becomes a limiting factor (Hwang, 2018; Ahmed and Wahed, 2020). A large body of work has addressed problems arising from the immense model sizes (Reed, 1993; Gale et al., 2019; Blalock et al., 2020; Hoefler et al., 2021). Many studies look into sparsifying the model weights based on the observation that the weight distribution of a dense model is often 1 The source code is available at: https://github.com/mikeheddes/guided-stochastic-exploration 1" 2401.06908v1,"Multi-hop Relaying with Mixed Half and Full Duplex Relays for Offloading to MEC Pavel Mach 1 , Zdenek Becvar 1 , Mohammadsaleh Nikooroo 1 1 Czech Technical University in Prague, Czech republic, emails: {machp2, zdenek.becvar}@fel.cvut.cz Abstract—In this paper, we focus on offloading a computing task from a user equipment (UE) to a multi-access edge computing (MEC) server via multi-hop relaying. We assume a general relaying case where relays are energy-constrained devices, such as other UEs, internet of things (IoT) devices, or unmanned aerial vehicles. To this end, we formulate the problem as a minimization of the sum energy consumed by the energy-constrained devices under the constraint on the maximum requested time of the task processing. Then, we propose a multi-hop relaying combining half and full duplexes at each individual relay involved in the offloading. We proof that the proposed multi-hop relaying is convex, thus it can be optimized by conventional convex optimization methods. We show our proposal outperforms existing multi-hop relaying schemes in terms of probability that tasks are processed within required time by up to 38% and, at the same time, decreases energy consumption by up to 28%. Index Terms—offloading, MEC, half/full duplex relaying. I. I NTRODUCTION The multi-access edge computing (MEC) introduces a concept of offloading computationally demanding tasks from the energy-constrained user equipment (UE) to the MEC server located at the edge of mobile network [1]. Hence, the task processing delay and/or energy consumption of the UE can be reduced [2]. Benefits facilitated by MEC can be further augmented by a relaying of the tasks from the UE to the MEC servers via intermediate relay(s). The exploitation of neighboring UEs as relays and, thus, capitalizing on device-to-device (D2D) relaying concept [3], helps to minimize the task processing delay [4] or increase the number of tasks completed within a required time [5]. Moreover, an adoption of unmanned aerial vehicles (UAVs) acting as the relays can improve quality of experience to the UEs [6] or minimize their energy consumption [7]. Besides, the use of vehicles as the relays is considered in [8] to ensure a reliable offloading from the vehicles in the area without coverage of the MEC servers. Last, also intelligent reflecting surface (IRS) can assist in offloading of tasks to extend coverage [9]. All above-mentioned works assume only two-hop relaying, i.e., only one relay is used in the offloading process. To fully grab the potential of the relays, multi-hop relaying for the offloading purposes has recently drawn an attention from researches. The multi-hop relaying is addressed from a perspective of balancing the load among MEC servers [10], minimizing the processing delay of the tasks offloaded from the vehicles to the MEC servers [11]-[13] or to other computing vehicles [14][15], or to offload the tasks from one UE to other neighboring computing UEs [16]. The primary objective of all existing studies on the offloading with multi-hop relaying is to find a proper route between the offloading UE and the MEC server or other computing UE. All works but [16] assume only less efficient half-duplex (HD) mode adopted at each relay with the task subsequently offloaded over each hop in individual time intervals, thus, increasing communication delay. The paper [16] considers full-duplex (FD) mode, however, the paper fully disregards the problem of self-interference (SI) with which the FD is inevitably plagued [17]. Moreover, none of the existing works optimize multi-hop relaying in terms of radio resource management including i) allocation of time slots at each hop, ii) allocation of transmission power of the offloading UE as well as relays, and iii) allocation of bandwidth at each hop. Motivated by the above-mentioned gaps, the objective of this paper is to optimize radio resource management aspects of multi-hop relaying for the task offloading. Since the offloading UE and relays are usually energy-constrained, such as smartphones, UAVs, or internet of things (IoT) devices, we formulate the problem as the minimization of the sum energy consumed by the energy-constrained UEs involved in the multi-hop relaying under the constraint on the maximum processing time of the computing tasks. First, we propose several unique relaying cases combining HD and FD at each relay involved in multi-hop relaying. Note that existing works always assume the same relaying mode at all relays. Second, we adapt the general problem for each multi-hop relaying case and we prove its convexity so that we can solve it in an optimal way. Finally, we demonstrate that the proposal increases the probability of the tasks being processed within required time by up to 38% and, at the same time, decreases energy consumption by up to 28% with respect to state-ofthe-art works. II. S YSTEM M ODEL This section first describes the network model. Then, communication and computing models are introduced. A. Network model We contemplate a scenario with one powerful MEC server located, for example, at the base station (BS). Further, we assume one UE generating highly computationally demanding" 2401.06922v1,"Open RAN LSTM Traffic Prediction and Slice Management using Deep Reinforcement Learning Fatemeh Lotfi, Fatemeh Afghah Holcombe Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA Emails: flotfi@clemson.edu, fafghah@clemson.edu Abstract—With emerging applications such as autonomous driving, smart cities, and smart factories, network slicing has become an essential component of 5G and beyond networks as a means of catering to a service-aware network. However, managing different network slices while maintaining quality of services (QoS) is a challenge in a dynamic environment. To address this issue, this paper leverages the heterogeneous experiences of distributed units (DUs) in ORAN systems and introduces a novel approach to ORAN slicing xApp using distributed deep reinforcement learning (DDRL). Additionally, to enhance the decisionmaking performance of the RL agent, a prediction rApp based on long short-term memory (LSTM) is incorporated to provide additional information from the dynamic environment to the xApp. Simulation results demonstrate significant improvements in network performance, particularly in reducing QoS violations. This emphasizes the importance of using the prediction rApp and distributed actors’ information jointly as part of a dynamic xApp. Index Terms—Open RAN, network slicing, distributed learning, DRL, LSTM. I. I NTRODUCTION Diverse 6G applications need varying demands across service requirements, encompassing factors such as throughput, latency, traffic capacity, coverage, user density, reliability, and availability. Meeting these stringent demands necessitates the development of network slicing as a solution to maintain the desired network quality of service (QoS) for different heterogeneous sets of requirements in the face of dynamic changes [1]–[3]. The new open radio access network (ORAN) architecture has been able to maintain heterogeneous service requirements of emerging new technologies. However, different network slices require careful management to avoid diversity in service level agreements (SLAs). The ORAN disaggregates RAN functions into different units, leveraging machine learning (ML) approaches to improve performance. ORAN disaggregated modules include open central units (OCU), open distributed units (ODU), and open radio units (ORU) which are connected to a RAN’s intelligent controllers (RIC) module to control and manage them using artificial intelligence (AI) and ML approaches [1], [2], [4]–[10]. The RIC module consists of two distinct components: the near-real-time RIC and the non-realtime RIC, each designed to operate within different control loops. This material is based upon work supported by the National Science Foundation under Grant Numbers CNS-2202972, CNS- 2318726, and CNS- 2232048. The challenges of network slicing in ORAN systems have been explored in recent studies [11]–[14]. Leveraging the capabilities of ORAN architecture to enhance network performance through ML approaches [4], several works have delved into dynamic optimization techniques like reinforcement learning (RL) for improving network slicing in ORAN systems [11]– [13], [15], [16]. Some of these approaches employ multiple RL agents to further boost performance. In the studies by [12], [15], [16], team learning, federated learning, and distributed agents were employed to leverage collaboration among various intelligent agents. Additionally, other research has explored hybrid methods to enhance the performance of RL approaches [11]. However, fluctuations in traffic demand over time are non-stationary and unknown in the next-generation wireless networks. This can compromise the QoS of broadcasting services. Therefore, the continuous management of different network slices is essential to prevent QoS diversity caused by dynamic traffic demand. While some recent studies have addressed traffic prediction in ORAN systems [17], [18], they primarily applied their findings to offline network performance optimization. These offline methods lack real-time monitoring capabilities, which can result in SLA violations. To address these challenges, this paper proposes a novel approach that combines dynamic RL approaches with an RNN prediction to learn and predict ODUs traffic load pattern and improve ORAN network slicing and scheduling task. The LSTM-based traffic load prediction is used as rApp in the nonreal-time RIC to provide additional information of dynamic wireless network environment for deep RL-based xApp network slicing optimization. Inspired by [12] and by considering the potential within the ORAN architecture to create novel experiences through disaggregated modules, we adopt a distributed DRL (DDRL) approach combining with an LSTM- based rApp network traffic load predictor. In this approach, distributed agents are situated at various ODU locations, allowing them to encounter a wide range of network conditions. The main contribution of this paper is the integration of the rApp upcoming traffic load prediction results into the RL agent to enhance network slicing agent decision-making by providing additional information from the dynamic wireless network status. To the best of our knowledge, this is the first work that combines an RNN predictor with distributed DRL method for network slicing in ORANs. The rest of this paper is structured as follows. Section II outlines the system model and formulates the ORAN slicing" 2401.06935v1,"MiTTenS: A Dataset for Evaluating Misgendering in Translation Kevin Robinson † Sneha Kudugunta ♢‡ Romina Stella † Sunipa Dev † Jasmijn Bastings ♢ † Google Research ♢ Google DeepMind ‡ University of Washington {kevinrobinson,snehakudugunta,romistella,sunipadev,bastings}@google.com Abstract Misgendering is the act of referring to someone in a way that does not reflect their gender identity. Translation systems, including foundation models capable of translation, can produce errors that result in misgendering harms. To measure the extent of such potential harms when translating into and out of English, we introduce a dataset, MiTTenS 1 , covering 26 languages from a variety of language families and scripts, including several traditionally underpresented in digital resources. The dataset is constructed with handcrafted passages that target known failure patterns, longer synthetically generated passages, and natural passages sourced from multiple domains. We demonstrate the usefulness of the dataset by evaluating both dedicated neural machine translation systems and foundation models, and show that all systems exhibit errors resulting in misgendering harms, even in high resource languages. 1 Introduction It is well documented that dedicated machine translation systems show forms of gender bias (see Savoldi et al., 2021, for an overview). Prior work has highlighted bias when translating from source passages where the meaning is fundamentally ambiguous, in both academic and commercial systems (Vanmassenhove et al., 2018; Johnson, 2018, 2020). Forms of bias have been demonstrated with carefully constructed unambiguous English passages (Stanovsky et al., 2019), and with linguistic constructions targeting specific language pairs (Cho et al., 2019; Bentivogli et al., 2020; Alhafni et al., 2022; Singh, 2023a,b; Stella, 2021, i.a.). Recent advances have enabled general-purpose foundation models with powerful multilingual capabilities including translation (Ouyang et al., 2022; OpenAI et al., 2023; Chung et al., 2022; Anil 1 https://github.com/google-research-datasets/ mittens Bengali: সারা আমার খালা। আিম সিতত্যিই তার কৗত ু ক পছন্দ English: Sarah is my aunt. I really like his jokes. German: Tacetin Guntekin war Professor. Er war bekannt für seine Bücher… English: Tacettin Güntekin was a professor. She was known for her books… Spanish: Vino de inmediato cuando se enteró. Es una buena médica. English: He came immediately when he heard about it. He is a good doctor. Figure 1: Dataset examples targeting passages where translation errors may produce misgendering harms. Gender is encoded unambiguously in the source language (blue), and misgendering is highlighted in red. et al., 2023; Gemini Team Google, 2023). These models can be used as building blocks in a wide range of products and applications, foregrounding other work on gender bias in natural language processing more broadly (Sun et al., 2019; Costa-jussà, 2019; Stanczak and Augenstein, 2021, i.a.). Evaluating foundation models raises new challenges of measurement validity, given the wide range of use and potential harms (Weidinger et al., 2023; Shelby et al., 2023). Skew in training data and measures of bias in underlying models may not be reliable predictors or measurements of potential harm in downstream usage (Goldfarb-Tarrant et al., 2021; Blodgett et al., 2020, 2021). There also remain challenges in empirically measuring performance as systems rapidly improve (Jun, 2023; Krawczyk, 2023), ensuring high quality of service as multilingual capabilities expand (Akter et al., 2023; Yong et al., 2023) and measuring unintentional harms in new system designs (Renduchintala et al., 2021; Costa-jussà et al., 2023). In this work, we focus on measuring misgendering harms of both dedicated translation systems and foundation models. Within translation, misgen-" 2401.06936v1,"Accelerated Sampling of Rare Events using a Neural Network Bias Potential Xinru Hua Department of Computer Science Stanford University huaxinru@stanford.edu Rasool Ahmad Department of Mechanical Engineering Stanford University rasool@stanford.edu Jose Blanchet Department of Management Science and Engineering Stanford University jose.blanchet@stanford.edu Wei Cai Department of Mechanical Engineering Stanford University caiwei@stanford.edu Abstract In the field of computational physics and material science, the efficient sampling of rare events occurring at atomic scale is crucial. It aids in understanding mechanisms behind a wide range of important phenomena, including protein folding, conformal changes, chemical reactions and materials diffusion and deformation. Traditional simulation methods, such as Molecular Dynamics and Monte Carlo, often prove inefficient in capturing the timescale of these rare events by brute force. In this paper, we introduce a practical approach by combining the idea of importance sampling with deep neural networks (DNNs) that enhance the sampling of these rare events. In particular, we approximate the variance-free bias potential function with DNNs which is trained to maximize the probability of rare event transition under the importance potential function. This method is easily scalable to high-dimensional problems and provides robust statistical guarantees on the accuracy of the estimated probability of rare event transition. Furthermore, our algorithm can actively generate and learn from any successful samples, which is a novel improvement over existing methods. Using a 2D system as a test bed, we provide comparisons between results obtained from different training strategies, traditional Monte Carlo sampling and numerically solved optimal bias potential function under different temperatures. Our numerical results demonstrate the efficacy of the DNN-based importance sampling of rare events. 1 Introduction Contemporary machine learning models suffer a substantial degradation in performance when confronted with long-tail events that are not represented well in collected data [1–3]. Several approaches, including the detection of out-of-distribution samples [4] and data resampling techniques [5, 6], can address this issue. In this paper, we propose a method that is specifically designed to efficiently sample these long-tail events, also referred to as rare events. Our method aims to efficiently collect rare events in simulation and increase their representation in datasets. Specifically, in the domains of materials science and bio-chemistry, there is a pressing need to sample rare events that are associated with specific physical phenomena and estimate their probabilities. This is critical in advancing our understanding of various materials properties ranging from mechanical composites [7–9] to transport proteins [10], which are essential to aerospace and pharmaceutical 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2401.06942v1,"Role of Oxygen in Laser Induced Contamination at Diamond-Vacuum Interfaces Shreyas Parthasarathy, 1 Maxime Joos, 1, ∗ Lillian B. Hughes, 2 Simon A. Meynell, 1 Taylor A. Morrison, 1 J. D. Risner-Jamtgaard, 3 David M. Weld, 1 Kunal Mukherjee, 4 and Ania C. Bleszynski Jayich 1, † 1 Department of Physics, University of California, Santa Barbara, Santa Barbara, CA 93106, USA. Materials Department, University of California, Santa Barbara, Santa Barbara, CA 93106, USA. 3 Stanford Nano Shared Facilities, Stanford University, Palo Alto, CA 94305, USA 4 Department of Materials Science and Engineering, Stanford University, Palo Alto, CA 94305, USA. (Dated: January 12, 2024) 2 Many modern-day quantum science experiments rely on high-fidelity measurement of fluorescent signals emitted by the quantum system under study. A pernicious issue encountered when such experiments are conducted near a material interface in vacuum is “laser-induced contamination” (LIC): the gradual accretion of fluorescent contaminants on the surface where a laser is focused. Fluorescence from these contaminants can entirely drown out any signal from e.g. optically-probed color centers in the solid-state. Crucially, while LIC appears often in this context, it has not been systematically studied. In this work, we probe the onset and growth rate of LIC for a diamond nitrogen-vacancy center experiment in vacuum, and we correlate the contamination-induced fluorescence intensities to micron-scale physical build-up of contaminant on the diamond surface. Drawing upon similar phenomena previously studied in the space optics community, we use photo-catalyzed oxidation of contaminants as a mitigation strategy. We vary the residual oxygen pressure over 9 orders of magnitude and find that LIC growth is inhibited at near-atmospheric oxygen partial pressures, but the growth rate at lower oxygen pressure is non-monotonic. Finally, we discuss a model for the observed dependence of LIC growth rate on oxygen content and propose methods to extend in situ mitigation of LIC to a wider range of operating pressures. I. Introduction Modern quantum science experiments often deploy a combination of vacuum environments, engineered material interfaces, and high-intensity light to achieve the degree of control and stability necessary for sensing, computation, and simulation. Vacuum plays the dual role of enabling cryogenic operation and mitigating harmful contaminants on material surfaces. These surfaces can limit qubit performance in a variety of ways: adsorbates on electrode surfaces generate electric field noise in ion traps [1–3]; charge traps in diamond limit stability of near-surface nitrogen-vacancy (NV) centers [4, 5], surface-related two-level systems limit superconducting qubit scalability and optomechanical resonator lifetimes [6–8]. While vacuum and low temperature alone sometimes ameliorate these issues and enable access to new physical regimes, the introduction of high-intensity light can counter-productively generate surface contamination that shortens experimental lifespans. Here, we characterize this “laser-induced contamination” (LIC) – the progressive accumulation of photo-chemically bonded, fluorescent matter at the site of a laser focused onto a surface – and its effect on visible wavelength color center experiments. The NV center in diamond is an optically addressable qubit known for its stability in ambient conditions. Despite the ostensible convenience of atmospheric conditions, vacuum and cryogenic operation of NV centers ∗ Present address: Cailabs, 35000 Rennes, France. † ania@physics.ucsb.edu provide many advantages, and in some cases is required. A variety of condensed matter phenomena that are targets of sensing experiments only manifest at low temperatures [9, 10]. Molecular targets (e.g. spin labels and biomolecules) can be susceptible to photo-damage that is exacerbated at elevated temperatures or pressures [11, 12]. Low-temperature operation also facilitates spinphoton entanglement [13], single-shot readout [14], and decreased spin relaxation and decoherence rates [15–17]. Additionally, improving spin coherence and charge stability of the shallow NV’s used in highly sensitive nanoscale magnetometry experiments is an outstanding challenge that should benefit from the advanced level of surface characterization (e.g. LEED, XPS, NEXAFS) [18, 19], treatment (e.g. annealing, surface cleaning) [20, 21], and control (over e.g. surface adsorbates [22–24]) that is accessible in an ultra-high vacuum experiment. Fluorescent LIC is a persistent barrier to such progress; it has been observed in many vacuum NV experiments, but to our knowledge is not yet discussed in the literature. An example of LIC and its adverse impacts on NV center experiments is depicted in Fig. 1. Here, LIC forms when a green laser is focused on a diamond surface held in the vacuum chamber depicted in Fig. 1(a). As LIC- induced background fluorescence accrues over time, it masks the spin-state dependent fluorescence of the NV center (Fig. 1(b)), ultimately limiting the duration of the experiment. Moreover, the physical accumulation of contaminants at the site of measurement (characterized using atomic force microscopy (AFM) in Fig. 1(c) confounds study of other surface-related phenomena [20, 25] and hinders experiments which require proximity to a target, such as scanning NV magnetometry [26]." 2401.06957v1,"EVOKE: Emotion Enabled Virtual Avatar Mapping Using Optimized Knowledge Distillation Maryam Nadeem ∗ , Raza Imam ∗‡ , Rouqaiah Al-Refai ∗‡ , Meriem Chkir ∗ , Mohamad Hoda ∗† and Abdulmotaleb El Saddik ∗† ∗ Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI) † University of Ottawa {maryam.nadeem, raza.imam, rouqaiah.al-refai, meriem.chkir, mohamad.hoda, a.elsaddik}@mbzuai.ac.ae elsaddik@uottawa.ca Abstract—As virtual environments continue to advance, the demand for immersive and emotionally engaging experiences has grown. Addressing this demand, we introduce Emotion enabled Virtual avatar mapping using Optimized KnowledgE distillation (EVOKE), a lightweight emotion recognition framework designed for the seamless integration of emotion recognition into 3D avatars within virtual environments. Our approach leverages knowledge distillation involving multi-label classification on the publicly available DEAP dataset, which covers valence, arousal, and dominance as primary emotional classes. Remarkably, our distilled model, a CNN with only two convolutional layers and 18 times fewer parameters than the teacher model, achieves competitive results, boasting an accuracy of 87% while demanding far less computational resources. This equilibrium between performance and deployability positions our framework as an ideal choice for virtual environment systems. Furthermore, the multi-label classification outcomes are utilized to map emotions onto custom-designed 3D avatars. Index Terms—emotion recognition, EEG signals, 3D avatars, knowledge distillation, wellbeing I. I NTRODUCTION Nowadays, there is a growing need for better humancomputer interactions, especially in expressing emotions in virtual environments [1]. Emotions can be recognized using text, speech, facial expressions, gestures, and physiological signals [2]. Utilizing EEG signals for emotion recognition has evolved from defining certain sets of emotions to recognizing a wide range of them [3]–[5]. Mapping these emotions to avatar expressions in virtual environments can enhance the user experience and facilitate human-computer interactions in various applications such as healthcare and education, leading to advanced digital connectivity. Different frameworks have been introduced for emotion recognition using EEG signals, ranging from traditional machine learning algorithms to more complicated deep learning approaches [6], [7]. However, deploying these approaches in real-time can be a challenging task because of the huge number of parameters, resource-constrained environments, and the computational power needed to run them. In applications where fast processing is needed, using a lightweight and accelerated approach becomes a priority. Our primary objective is to bridge the gap between emotion recognition in the world of digital avatars while focusing ‡ Authors with equal contributions. Fig. 1. Inference speed of teacher and student models. Distilled student model can be deployed for real-time applications, as smaller models are faster with lower inference times. on their smooth integration into immersive virtual environments. To achieve this, we propose a knowledge distillationbased framework for multi-label classification that enables the transfer of features from a comparatively larger and more complex model (teacher model) to a smaller, more efficient one (student model). This distilled student model retains much of the teacher’s accuracy but operates with significantly reduced computational resources [8], making it highly suitable for deployment in resource-constrained environments or real-time applications as illustrated in Fig 1. EVOKE finds meaningful application in the realm of healthcare and emotional well-being. It enables the development of recognition systems that can benefit patients and therapists by establishing a baseline of a patient’s typical emotional states through extended EEG data collection, serving as a valuable health indicator. Moreover, visual representations of emotions via avatars enhance communication between therapists and patients, allowing patients to express their emotional experiences more effectively, thereby improving therapy outcomes. This approach also opens doors to virtual therapy and support groups within virtual environments, offering increased accessibility to emotional well-being, particularly for individuals with social anxiety or physical limitations. The major contributions of this paper are as follows: – Proposed lightweight distilled model for EEG-based emotion recognition called EVOKE, which significantly reduces computational parameters by a factor of 18x as compared to the originally trained model while maintaining a comparable performance. – This work introduces a combination Binary Cross En-" 2401.06961v1,"CHAMP: A Competition-level Dataset for Fine-Grained Analyses of LLMs’ Mathematical Reasoning Capabilities Yujun Mao Indepedent Researcher amao@bu.edu Yoon Kim MIT CSAIL yoonkim@mit.edu Yilun Zhou MIT CSAIL yilun@csail.mit.edu https://yujunmao1.github.io/CHAMP/ Abstract Recent large language models (LLMs) have shown indications of mathematical reasoning ability. However it has not been clear how they would fare on more challenging competitionlevel problems. And while self-generated verbalizations of intermediate reasoning steps (i.e., chain-of-thought prompting) have been shown to be helpful, whether LLMs can make use of helpful side information such as problemspecific hints has not been investigated before. In this paper, we propose a challenging benchmark dataset for enabling such analyses. The Concept and Hint-Annotated Math Problems (CHAMP) consists of high school math competition problems, annotated with concepts, or general math facts, and hints, or problemspecific tricks. These annotations allow us to explore the effects of additional information, such as relevant hints, misleading concepts, or related problems. This benchmark is difficult, with the best model only scoring 58.1% in standard settings. With concepts and hints, performance sometimes improves, indicating that some models can make use of such side information. We further annotate model-generated solutions for their correctness. Using this corpus, we find that models often arrive at the correct final answer through wrong reasoning steps. In addition, we test whether models are able to verify these solutions, and find that most models struggle. The dataset and code are available on the project website. 1 Introduction Recent large language model (LLMs) have demonstrated impressive performance on many tasks that previously required specialized models or were thought to be out of reach of conventional neural networks. One such capability is mathematical reasoning: LLMs can often solve simple math problems and make reasonable attempts at challenging, competition-level problems. In addition to model scaling (Kaplan et al., 2020), there are two key factors behind the progress: sophisticated prompt- 🅐 Problem Solving with External Information Math Problem 🅑 Concept 🅒 🅓 Hint × 270 Solution Verification × 540 Figure 1: Overview of our dataset and experiment contribution. A : We collect 270 challenging, high-school math competition problems (e.g., Find all positive integer solutions to the equation x 3 + 3 = 4y(y + 1)). For each problem, we write the relevant and helpful Concepts (e.g., a 3 ± b 3 = (a + b)(a 2 ± ab + b 2 )), and Hints (e.g, Express x 3 as the product of two factors involving y). B : In our experiments, to investigate a model’s ability to understand and use the additional C & H information, we design 17 prompts to evaluate four models: GPT-3.5 / 4 / 4-Turbo and PaLM 2 Medium. C : For each problem, we manually judge two model-generated solutions on their correctness, and further annotate the first wrong step of the reasoning (red highlights), if present. D : This corpus thus serves as a novel dataset for benchmarking and evaluating the solution verification ability of LLMs. ing methods such as chain-of-thought (Wei et al., 2022; Kojima et al., 2022) and self-consistency (Wang et al., 2022) which provide useful heuristics for generating and selecting better reasoning paths; and access to calculators or code interpreters which offloads some of the symbolic computation to external tools (Gao et al., 2023; Zhou et al., 2023). However, a direction which remains less explored is how external concepts and hints impact LLMs’ reasoning abilities. This is difficult to address with existing datasets which typically only contain problem statements and their solutions, and do not provide annotated concepts or hints that would be helpful for the problem at hand." 2401.06967v1,"NHANES-GCP: Leveraging the Google Cloud Platform and BigQuery ML for reproducible machine learning with data from the National Health and Nutrition Examination Survey B. Ross Katz 1 , Abdul Khan 1 , James York-Winegar 1 , and Alexander J. Titus 2, 3, 4 1 CorrDyn, Nashville, 37219, USA In Vivo Group, Los Angeles, 90292, USA 3 Information Sciences Institute, University of Southern California, Los Angeles, 90292, USA 4 Iovine and Young Academy, University of Southern California, Los Angeles, 90089, USA 2 Corresponding author: Alexander J. Titus (publications@theinvivogroup.com) Abstract Summary NHANES, the National Health and Nutrition Examination Survey, is a program of studies led by the Centers for Disease Control and Prevention (CDC) designed to assess the health and nutritional status of adults and children in the United States (U.S.). NHANES data is frequently used by biostatisticians and clinical scientists to study health trends across the U.S., but every analysis requires extensive data management and cleaning before use and this repetitive data engineering collectively costs valuable research time and decreases the reproducibility of analyses. Here, we introduce NHANES-GCP, a Cloud Development Kit for Terraform (CDKTF) Infrastructure-as-Code (IaC) and Data Build Tool (dbt) resources built on the Google Cloud Platform (GCP) that automates the data engineering and management aspects of working with NHANES data. With current GCP pricing, NHANES-GCP costs less than $2 to run and less than $15/yr of ongoing costs for hosting the NHANES data, all while providing researchers with clean data tables that can readily be integrated for large-scale analyses. We provide examples of leveraging BigQuery ML to carry out the process of selecting data, integrating data, training machine learning and statistical models, and generating results all from a single SQL-like query. NHANES-GCP is designed to enhance the reproducibility of analyses and create a well-engineered NHANES data resource for statistics, machine learning, and fine-tuning Large Language Models (LLMs). Availability and implementation NHANES-GCP is available at https://github.com/In-Vivo-Group/NHANES-GCP" 2401.06971v1,"IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, VOL. XXX, NO. XXX, AUGUST 2023 1 Accurate Loss Prediction of Realistic Hollow-core Anti-resonant Fibers Using Machine Learning Yordanos Jewani, Michael Petry , Graduate Student Member, IEEE, Student Member, Optica, Rei Sanchez-Arias Member, IEEE, Rodrigo Amezcua-Correa, Member, IEEE, Member, Optica, Md Selim Habib , Senior Member, IEEE, Senior Member, Optica Abstract—Hollow-core anti-resonant fibers (HC-ARFs) have proven to be an indispensable platform for various emerging applications due to their unique and extraordinary optical properties. However, accurately estimating the propagation loss of nested HC-ARFs remains a challenging task due to their complex structure and the lack of precise analytical and theoretical models. To address this challenge, we propose a supervised machine-learning framework that presents an effective solution to accurately predict the propagation loss of a 5-tube nested HC-ARF. Multiple supervised learning models, including random forest, logistic regression, quadratic discriminant analysis, tree-based methods, extreme gradient boosting, and K-nearest neighbors are implemented and compared using a simulated dataset. Among these methods, the random forest algorithm is identified as the most effective, delivering accurate predictions. Notably, this study considers the impact of random structural perturbations on fiber geometry, encompassing random variations in tube wall thicknesses and tube gap separations. In particular, these perturbations involve randomly varying outer and nested tube wall thicknesses, tube angle offsets, and randomly distributed non-circular, anisotropic shapes within the cladding structure. It is worth noting that these specific perturbations have not been previously investigated. Each tube exhibits its unique set of random values, leading to longer simulation times for combinations of these values compared to regular random variables in HC-ARFs with similar tube characteristics. The comprehensive consideration of these factors allows for precise predictions, significantly contributing to the advancement of HC- ARFs for many emerging applications. Index Terms—Hollow-core anti-resonant fiber, machine learning, fiber geometry misalignment, finite-element simulation. I. I NTRODUCTION Manuscript received August ××, 2023; ××, 2023; accepted ××, 2023. Date of publication ××, 2023; date of current version ××, 2023. This work was supported in part by the Woodrow W. Everett, Jr. SCEEE Development Fund in cooperation with the Southeastern Association of Electrical Engineering Department Heads and the U.S. Department of Treasury under the Coronavirus State and Local Fiscal Recovery Funds. M. Petry acknowledges support from U.S. Fulbright Scholarship. (Corresponding author: Md Selim Habib.) Y. Jewani and R. Sanchez-Arias are with the Department of Data Science and Business Analytics, Florida Polytechnic University, 4700 Research Way, Lakeland, FL-33805, USA (e-mail: yjewani9995@floridapoly.edu and rsanchezarias@floridapoly.edu). M. Petry is with the Faculty of Electrical Engineering and Information Technology, University of Applied Sciences Karlsruhe, BW-76133, Germany (e-mail: michael.petry@fulbrightmail.org). R. Amezcua-Correa is with the CREOL, University of Central Florida, Orlando, FL 32816 USA (e-mail: r.amezcua@creol.ucf.edu). M. Selim Habib is with the Department of Electrical Engineering and Computer Science, Florida Institute of Technology, Melbourne, FL-32901, USA (e-mail: mhabib@fit.edu). HE advent of optical fiber technology has sparked a revolutionary transformation in long-distance data transmission, profoundly impacting various industries [1]. By utilizing high-purity glass that minimizes signal loss, this technology enables the transmission of data through light, achieving exceptionally high-speed communication over long distances [2]. A notable advancement in this field is the utilization of hollow-core anti-resonant fibers (HC-ARFs), which employ a hollow-core surrounded by closely spaced anti-resonant tubes to guide light in the air-core with low loss, low power overlap with silica parts, and wider transmission bandwidth [3]–[20]. In contrast to solid-core fibers, HC-ARFs utilize an unconventional and remarkable guiding mechanism called inhibitedcoupling between the core modes and cladding modes, along with the anti-resonant effect, to facilitate strong and wellcontrolled light propagation within the air-core [21]. The exceptional optical characteristics of HC-ARFs give rise to a wide range of desirable applications. These include short-reach data transmission [22], [23], quantum state transmission [24], polarization purity [25], polarization control [26], [27], highpower delivery [28]–[31], extreme nonlinear optics [32]–[39], optofluidic [40], terahertz transmission [41]–[43], low-noise applications [44], and to mention a few. One of the primary performance factors is the accurate calculation of propagation loss in HC-ARFs. Several approaches have been utilized for calculating the loss of HC-ARFs, including analytical models [45], [46], semi-analytical models [47], and numerical methods such as the finite-element method (FEM) [48]. While the analytical and semi-analytical models are suitable for simplified fiber structures such as single-ring HC-ARFs [49] and stadium-shape HC-ARFs [50], achieving accurate modeling of HC-ARFs usually requires the extensive and time consuming FEM modeling. However, precisely estimating the propagation loss in realistic nested HC-ARFs remains challenging due to their intricate structure and the lack of precise analytical and theoretical models. Taking the HC-ARF platform to the next step requires precise loss prediction with feasible computational time. T Despite of numerous opportunities and ubiquitous applications, there has been a limited number of research investigations focusing on the utilization of machine learning methods to predict the loss of HC-ARFs [51], [52]. For example, a reinforcement learning methodology was employed to effectively optimize the design parameters of HC-ARF [51]. More recently, machine learning models were also employed" 2401.06974v1,"A Metric for Characterizing the Arm Nonuse Workspace in Post-stroke Individuals Using a Robot Arm Nathaniel Dennler 1∗ , Amelia Cain 2 , Erica De Guzman 1 , Claudia Chiu 1 , Carolee J. Winstein 2 , Stefanos Nikolaidis 1 , and Maja J. Matarić 1 1 2 Department of Computer Science, University of Southern California, Department of Biokinesiology and Physical Therapy, University of Southern California, ∗ To whom correspondence should be addressed; E-mail: dennler@usc.edu. This manuscript was published in Science Robotics on November 15, 2023. This version has not undergone final editing. Please refer to the complete version of record at https://www.science.org/doi/10.1126/scirobotics.adf7723. The manuscript may not be reproduced or used in any manner that does not fall within the fair use provisions of the Copyright Act without the prior, written permission of the American Association for the Advancement of Science (AAAS). 1" 2401.06986v1,"Learning driving style embedding from GPS-derived moving patterns for driver identification Lin Lu a,b,∗ a College of Computer and Information Technology, China Three Gorges University, Yichang, 443517, China ARTICLE INFO ABSTRACT Keywords: driver identification driving style representation learning driving behavior autoencoder recurrent neural network Learning fingerprint-like driving style representations is crucial to accurately identify who is behind the wheel in open driving situations. This study explores the learning of driving styles with GPS signals that are currently available in connected vehicles for short-term driver identification. First, an input driving trajectory is windowed into subtrajectories with fixed time lengths. Then, each subtrajectory is further divided into overlapping dynamic segments. For each segment, the local features are obtained by combining statistical and state transitional patterns. Finally, the driving style embedded in each subtrajectory is learned with the proposed regularized recurrent neural network (RNN) for short-term driver identification. We evaluate the impacts of key factors and the effectiveness of the proposed approach on the identification performance of 5 and 10 drivers. The results show that our proposed neural network structure, which complements movement statistics (MS) with state transitions (ST), provides better prediction performance than existing deep learning methods. 1. Introduction Automobile sensor data have promoted the popularity of data-driven methods to better understand driving behaviors. Vehicle driving data indicate drivers’ unique driving habits or styles (Enev et al., 2016; Xun et al., 2020; Halim et al., 2016), exactly as their fingerprints indicate their unique identities. This type of digital fingerprint plays a key role in driver identification tasks in many intelligent transportation applications (Azadani and Boukerche, 2021), such as risky driving recognition Wang et al. (2022), theft protection (Xun et al., 2020), personalized driver assistance systems (Lin et al., 2014) and even autonomous driving (Kuderer et al., 2015). The primary objective of the driver identification task is to determine the identity of the person behind the wheel (Nasr Azadani and Boukerche, 2022). With an increasing focus on privacy protection (Enev et al., 2016) and application cost savings (Engelbrecht et al., 2015), using sensor data, i.e., data collected through CAN-bus, GPS, and smartphones to understand and recognize driving styles, which uniquely identify drivers, has drawn considerable attention. GPS-based driver identification methods are especially popular since GPS sensors have lower costs and are widely equipped in vehicles and mobile phones. Therefore, this research focuses on developing a characterization of driving style with GPS signals that can be used to model and understand human driver behavior. However, the raw GPS traces themselves cannot directly distinguish between drivers with different driving styles. Hence, the primary challenge is how to transform drivers’ variable-length GPS trajectories into an appropriate structure that can characterize driving activities and corresponding spatiotemporal dynamics. Recently, deep learning has been introduced as the dominant way to map driving behavior to a user-specific embedding, from which many downstream tasks can also take advantage. However, none of the related proposals has adequately addressed this challenge because of the lack of generalizability in their structures. For example, Dong et al. (2016) proposed learning from a low-level statistical feature matrix using a convolutional neural network (CNN) and long short-term memory (LSTM), but movement statistics (MS) in the matrix ignored temporal dependencies that reflect vehicle state transition (ST) relationships. In contrast, the ST view was addressed by Wang et al. (2018), who proposed learning a latent driver representation from two points of view: transition duration and frequency. These two views depend on predefined driving states; however, they ignore the intensity that reflects the magnitude of neighboring state changes. As recognized, moderate and intense braking is treated as the same braking event without differentiation. In other words, the moving/driving patterns involved in the driver identification problem have not yet been fully considered. linklu@whut.edu.cn (L. Lu) ORCID (s): 0000-0002-2803-6297 (L. Lu) Lin Lu et al.: Preprint Page 1 of 19" 2401.06987v1,"Cramer-Rao bound and absolute sensitivity in chemical reaction networks Dimitri Loutchko ∗1 , Yuki Sughiyama 2 , and Tetsuya J. Kobayashi †1,3 1 Institute of Industrial Science, The University of Tokyo, 4-6-1, Komaba, Meguro-ku, Tokyo 153-8505 Japan. 2 Graduate School of Information Sciences, Tohoku University, Sendai 980-8579, Japan 3 Department of Mathematical Informatics, Graduate School of Information Science and Technology, The University of Tokyo, Tokyo 113-8654, Japan. 4 Universal Biology Institute, The University of Tokyo, 7-3-1, Hongo, Bunkyo-ku, 113-8654, Japan. Abstract Chemical reaction networks (CRN) comprise an important class of models to understand biological functions such as cellular information processing, the robustness and control of metabolic pathways, circadian rhythms, and many more. However, any CRN describing a certain function does not act in isolation but is a part of a much larger network and as such is constantly subject to external changes. In [Shinar, Alon, and Feinberg. ”Sensitivity and robustness in chemical reaction networks.” SIAM J App Math (2009): 977-998.], the responses of CRN to changes in the linear conserved quantities, called sensitivities, were studied in and the question of how to construct absolute, i.e., basis-independent, sensitivities was raised. In this article, by applying information geometric methods, such a construction is provided. The idea is to track how concentration changes in a particular chemical propagate to changes of all concentrations within a steady state. This is encoded in the matrix of absolute sensitivites. A linear algebraic characterization of the matrix of absolute sensitivities for quasi-thermostatic CRN is derived via a Cramer-Rao bound for CRN, which is based on the the analogy between quasi-thermostatic steady states and the exponential family of probability distributions. 1 Introduction The theory of chemical reaction networks (CRN) is an indispensable tool for the understanding of biochemical phenomena. Models based on CRN have successfully been employed to gain insights into various biological functions such as cell signaling pathways [15, 37], circadian clocks [13, 16], proofreading kinetics [20, 6], and many more [34, 2]. The CRN describing any given function, however, ∗ d.loutchko@edu.k.u-tokyo.ac.jp † http://research.crmind.net 1" 2401.06989v1,"Gradient Coreset for Federated Learning Durga Sivasubramanian † IIT Bombay Lokesh Nagalapatti † IIT Bombay Rishabh Iyer University of Texas at Dallas durgas@cse.iitb.ac.in nlokeshiisc@gmail.com Rishabh.Iyer@utdallas.edu Ganesh Ramakrishnan IIT Bombay ganesh@cse.iitb.ac.in Abstract dates with the central server across communication rounds until the model converges. Federated Learning (FL) is used to learn machine learning models with data that is partitioned across multiple clients, including resource-constrained edge devices. It is therefore important to devise solutions that are efficient in terms of compute, communication, and energy consumption, while ensuring compliance with the FL framework’s privacy requirements. Conventional approaches to these problems select a weighted subset of the training dataset, known as coreset, and learn by fitting models on it. Such coreset selection approaches are also known to be robust to data noise. However, these approaches rely on the overall statistics of the training data and are not easily extendable to the FL setup. In this paper, we propose an algorithm called Gradient based Coreset for Robust and Efficient Federated Learning (G CFL ) that selects a coreset at each client, only every K communication rounds and derives updates only from it, assuming the availability of a small validation dataset at the server. We demonstrate that our coreset selection technique is highly effective in accounting for noise in clients’ data. We conduct experiments using four real-world datasets and show that G CFL is (1) more compute and energy efficient than FL, (2) robust to various kinds of noise in both the feature space and labels, (3) preserves the privacy of the validation dataset, and (4) introduces a small communication overhead but achieves significant gains in performance, particularly in cases when the clients’ data is noisy. FL proves particularly valuable in situations where a central server lacks a sufficient amount of data for standalone model training but can leverage the collective data from multiple clients, including edge devices, sensors, or hospitals. For instance, a hospital aiming to develop a cancer prediction model can benefit from training their model using data from other hospitals, while maintaining the privacy of sensitive patient information. However, in scenarios where clients have limited computational resources or their data is noisy, it becomes imperative to design robust algorithms that enable their participation while minimizing computation and energy requirements. Our proposed solution addresses this challenge by identifying a subset of each client’s data, referred to as the ”coreset,” which reduces noise and facilitates effective training of the central server’s model. 1. Introduction Federated learning (FL) is an approach to machine learning in which clients collaborate to optimize a common objective without centralizing data [32]. The training dataset is distributed across a group of clients, and they contribute to the training process by sharing privacy-preserving up- † L.N. and D.S. contributed equally Conventional coreset selection methods such as Facility Location, CRUST, CRAIG, Glister, and Gradmatch [19, 33, 34, 38] have been developed to enhance the efficiency and robustness of machine learning model training. However, adapting these strategies to Federated Learning (FL) settings is challenging due to the non-i.i.d. nature of clients’ datasets. Traditional coreset algorithms aim to select a representative subset that ensures a model trained on it performs similarly to the entire dataset. In FL, each client’s data originates from diverse distributions and is influenced by noise. For example, in a hospital context, data distributions differ due to varying demographics across locations and may be subject to varying amounts of different types of noise. As a result, biased updates from clients hinder the learning progress of FL algorithms. We demonstrate this obstacle through a motivating experiment in Section 2. We introduce G CFL (as shown in Figure 1), an algorithm specifically designed to address the aforementioned challenges. Our approach involves selecting a coreset every" 2401.07013v1,"K NOWLEDGE D ISTILLATION L ANGUAGE M ODELS FOR C LOSED -S OURCE Hongzhan Chen 1 , Xiaojun Quan 1∗ , Hehong Chen 2 , Ming Yan 2 and Ji Zhang 2 School of Computer Science and Engineering, Sun Yat-sen University, China 2 Alibaba Group, China 1 chenhzh59@mail2.sysu.edu.cn, quanxj3@mail.sysu.edu.cn 2 {hehong.chh, ym119608, zj122146}@alibaba-inc.com 1 A BSTRACT Closed-source language models such as GPT-4 have achieved remarkable performance. Many recent studies focus on enhancing the capabilities of smaller models through knowledge distillation from closed-source language models. However, due to the incapability to directly access the weights, hidden states, and output distributions of these closed-source models, the distillation can only be performed by fine-tuning smaller models with data samples generated by closed-source language models, which constrains the effectiveness of knowledge distillation. In this paper, we propose to estimate the output distributions of closed-source language models within a Bayesian estimation framework, involving both prior and posterior estimation. The prior estimation aims to derive a prior distribution by utilizing the corpus generated by closed-source language models, while the posterior estimation employs a proxy model to update the prior distribution and derive a posterior distribution. By leveraging the estimated output distribution of closed-source language models, traditional knowledge distillation can be executed. Experimental results demonstrate that our method surpasses the performance of current models directly fine-tuned on data generated by closed-source language models. 1 I NTRODUCTION While closed-source large language models (LLMs) such as GPT-3.5 and GPT-4 have shown great superiority over open-source counterparts like LLaMA (Touvron et al., 2023) and Falcon (Penedo et al., 2023), they can only be accessed via API calls and allow limited customization and transparency. One way to address this problem is to transfer their capabilities to open-source language models, typically smaller in size, by prompting closed-source LLMs to generate samples that reflect their capabilities and fine-tuning open-source language models on these samples (Hsieh et al., 2023; Jiang et al., 2023; Ho et al., 2022). However, this approach only enables open-source language models to emulate the input-output behavior of closed-source LLMs without acquiring their intrinsic knowledge related to logits, weights, activations, and so forth. Knowledge distillation (KD) (Hinton et al., 2015) is a popular compression technology that aims to train a small but strong student model by distilling knowledge from a large teacher model. Among various sources of knowledge, the logits of the teacher model are typically utilized as an essential part of the objective function, implemented by minimizing the Kullback-Leibler (KL) divergence between the output distribution (soft labels) of the teacher model and the output distribution of the student model. This approach enables the student model to mimic the predictive behavior and acquire certain knowledge of the teacher model. However, such approaches are not readily applicable to closed-source LLMs as the soft labels are not available. To tackle this challenge, we propose to estimate the output distributions of closed-source LLMs within a Bayesian estimation framework, including both prior and posterior estimation. The aim of prior estimation is to derive a prior distribution by leveraging the corpus generated by closed-source language models. The rationale is that the corpus may contain coarse-grained information regarding ∗ Corresponding author. 1" 2401.07014v1,"WEAK LABELING FOR CROPLAND MAPPING IN AFRICA Gilles Quentin Hacheme ∗1 , Akram Zaytar 1 , Girmaw Abebe Tadesse 1 , Caleb Robinson 1 , Rahul Dodhia 1 Juan M. Lavista Ferres 1 , Stephen Wood 2 Microsoft AI for Good Research Lab 1 , The Nature Conservancy 2 ABSTRACT Cropland mapping can play a vital role in addressing environmental, agricultural, and food security challenges. However, in the context of Africa, practical applications are often hindered by the limited availability of high-resolution cropland maps. Such maps typically require extensive human labeling, thereby creating a scalability bottleneck. To address this, we propose an approach that utilizes unsupervised object clustering to refine existing weak labels, such as those obtained from global cropland maps. The refined labels, in conjunction with sparse human annotations, serve as training data for a semantic segmentation network designed to identify cropland areas. We conduct experiments to demonstrate the benefits of the improved weak labels generated by our method. In a scenario where we train our model with only 33 human-annotated labels, the F 1 score for the cropland category increases from 0.53 to 0.84 when we add the mined negative labels. Index Terms— Geospatial Data, Cropland Mapping, Africa, Machine Learning, Human-in-the-loop 1. INTRODUCTION Up-to-date and high-resolution data on the spatial distribution of crop fields is critical for environmental, agricultural, and food security policies, especially in Africa, as most of the countries’ economies heavily depend on agriculture [1]. Cropland mapping from satellite imagery has been an essential topic due to its importance to derive data-driven insights and address climate and sustainability related challenges [2, 3, 4, 5, 6, 7]. However, most existing datasets only map croplands with lowto medium-sized resolution (≥ 30m/pixel spatial resolution) from satellite imagery inputs such as Sentinel-2 or Landsat. Furthermore, it has been reported that existing land cover mapping solutions struggle to accurately map croplands in Africa [8]. Specifically, Kerner et al. compare 11 land cover datasets that cover Africa and contain a cropland class and found that these maps have generally low levels of agreement compared to reference datasets from 8 countries on the continent. Locations with the highest agreement between maps are Mali (69.9%) and Kenya (60.6%) and the ones with the lowest ∗ Corresponding author: ghacheme@microsoft.com agreement are Rwanda (15.8%) and Malawi (21.8%). If the goal is to achieve better results in specific regions, models that are tailored to those regions usually perform better than models that are designed for the whole world. To this end, we develop a modeling workflow for generating high-resolution cropland maps that are tailored toward a given area of interest (AOI), using Kenya as a use case. We use a deep learning based semantic segmentation workflow – an approach often employed for land-cover maps [9, 10, 11, 12, 13]. In order to train the models, we used a mixture of sparse human labels gathered in the AOI and weak labels from global cropland maps. Specifically we use the area of intersection between an unsupervised object based clustering of the input satellite imagery and the weak labels to mine stronger cropland (positive class) and non-cropland (negative class) samples (see Figure 1 for an overview of this approach). We show that adding these labels to the human labels improves the F 1 score from 0.53 to 0.84 for the cropland class and 0.96 to 0.99 for the non-cropland class. 2. PROBLEM STATEMENT Consider a cropland mapping, i.e. semantic segmentation, problem over a given area of interest (AOI). We assume that we are given a large multi-spectral satellite image, a k × k dimensional matrix A where a ij is the pixel from A located at coordinates (i, j). We also assume that we have a corresponding categorical mask M s with the same dimensions, derived from a human annotation of A, where each pixel, m s ij ∈ {0, 1, 2}, represents a class label, specifically 0 = unknown, 1 = non-cropland, 2 = cropland. Note that the human annotation is often sparse, with only a few pixels annotated as either cropland or non-cropland and the majority of pixels are unknown. Further, we have an identically sized categorical mask M w , derived from global cropland layers and/or from coarser resolution maps, where each each pixel, m w ij ∈ {1, 2}. However, M w is assumed to have a higher level of label noise compared to M s . In this work, we propose a data augmentation approach to generate an extended mask M e , where m e ij ∈ {0, 1, 2}, that overcome the lack of strong cropland and non-cropland labels in M s by utilizing M w . In such a case, we hypothesize the" 2401.07016v1,"Received: 7 October 2023 DOI: 10.14814/phy2.15908 | Revised: 2 December 2023 | Accepted: 14 December 2023 REVIEW Iron role paradox in nerve degeneration and regeneration Samira Bolandghamat Department of Biology, Faculty of Science, Ferdowsi University of Mashhad, Mashhad, Iran Correspondence Samira Bolandghamat, Department of Biology, Faculty of Science, Ferdowsi University of Mashhad, Mashhad, Iran. Email: samira.bolandghamat@mail. um.ac.ir | Morteza Behnam-­Rassouli Abstract Iron accumulates in the neural tissue during peripheral nerve degeneration. Some studies have already been suggested that iron facilitates Wallerian degeneration (WD) events such as Schwann cell de-­ differentiation. On the other hand, intracellular iron levels remain elevated during nerve regeneration and gradually decrease. Iron enhances Schwann cell differentiation and axonal outgrowth. Therefore, there seems to be a paradox in the role of iron during nerve degeneration and regeneration. We explain this contradiction by suggesting that the increase in intracellular iron concentration during peripheral nerve degeneration is likely to prepare neural cells for the initiation of regeneration. Changes in iron levels are the result of changes in the expression of iron homeostasis proteins. In this review, we will first discuss the changes in the iron/iron homeostasis protein levels during peripheral nerve degeneration and regeneration and then explain how iron is related to nerve regeneration. This data may help better understand the mechanisms of peripheral nerve repair and find a solution to prevent or slow the progression of peripheral neuropathies. KEYWORDS iron homeostasis, nerve degeneration, nerve regeneration, nerve repair, peripheral nerve, peripheral neuropathy 1 | I N T RO DU CT ION Peripheral nerve regeneration is a complex time and space-­ dependent cellular programming (Jessen & Mirsky, 2019). Identifying the mechanisms of nerve regeneration requires an examination of all cellular molecules and signaling pathways at different times and neural tissue locations (Li et al., 2020). The techniques of genetic modification (Raivich & Makwana, 2007; Schweizer et al., 2002), gene/protein expression assays (Funakoshi et al., 1993; Jiménez et al., 2005), administration of inhibitors or inducers (Chan et al., 2003; Kilmer & Carlsen, 1984), and concentration/activity assays of biomolecules and ions (Couraud et al., 1983; Yan et al., 2010) have increased our knowledge about cellular mechanisms of nerve regeneration. However, the multifunctionality and complex interaction of the cellular molecules and signaling pathways make it difficult to predict the output (Chang et al., 2013; van Niekerk et al., 2016). As a result, there is still ongoing research on the interactions of these components. Iron is an important cofactor for many intracellular enzymes such as DNA polymerases, DNA helicases, nitrogenases, catalases, and peroxidases (Prabhakar, 2022). In addition, it is a component of mitochondrial respiratory chain proteins, which are involved in ATP production. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. © 2024 The Authors. Physiological Reports published by Wiley Periodicals LLC on behalf of The Physiological Society and the American Physiological Society. Physiological Reports. 2024;12:e15908.  https://doi.org/10.14814/phy2.15908 wileyonlinelibrary.com/journal/phy2 | 1 of 13" 2401.07032v1,"This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics 1 Interaction of Vortex Ring with Perforated V-Wall Siddhant Jain, Saini Jatin Rao, and Saptarshi Basu† Department of Mechanical Engineering, Indian Institute of Science, Bengaluru, India (Received xx; revised xx; accepted xx) Experiments are performed to investigate the interaction of a vortex ring (Reynolds number based on circulation (Re Γ = 11500) with perforated surface (open area ratio, ϕ 1 = 0.24 and ϕ 2 = 0.44) with different included angles (θ = 60° - 180° ). The phenomenon is characterized using techniques like Planer Laser-Induced Fluorescence (PLIF) imaging and Particle Image Velocimetry (PIV). Lagrangian analysis using finitetime Lyapunov exponents (FTLE) and Γ 2 vortex identification methods are utilised to understand the flow physics. Early observations reveal the growth of induced mushroom structures through the holes as a consequence of placing the perforated surface in the path of the vortex ring. These structures along with Kelvin-Helmholtz (K-H) instability imparts the initial instability to the emerging jets. We discern a sequential emergence of the vortex ring in the form of jets at lower θ value that diminishes at higher values. Except for θ = 150° cases, where the flow from the two halves starts to talk resulting in a divergence in the circulation ratio, a reformed vortex ring is formed for all cases in the far downstream. A detailed discussion on the downstream vorticity dynamics has been been provided using vorticity contours, time-series variation of circulation and the FTLE fields. By varying the value of θ, we present a more generalised study of vortex ring interacting with perforated surfaces that finds application in multiple domains including flow control, manipulation and vortical cleaning. 1. Introduction Vortex rings are formed as a result of an impulsive motion of fluid mass leading to the rolling up of shear layers at the corner of the pipe/hole used to generate it. They are fluidic structure that are of industrial as well as fundamental importance. In nature, they can be observed in smoke rings, jellyfish locomotion (Dabiri et al. 2005), wakes of flying birds (Wolf et al. 2013), mushroom clouds during volcanic eruptions and explosion (Lim & Nickels 1995), micro-burst (Lundgren et al. 1992), cardiac relaxation of human heart (Per M. et al. 2016), and more. Application wise, they can be used for flow control purposes (Amitay et al. 2001; You & Moin 2008), heat transfer application of jets (Liu & Sullivan 1996; Hadziabdic & Hanjalic 2008), particle shaping technique (An et al. 2016), and cleaning purposes (Jain et al. 2023) to name a few. From a long time, physicists have been intrigued in understanding the fundamental behaviour of vortex ring and the interplay of its origin and decay with the surrounding. Works by Saffman (1970); Maxworthy (1972, 1977); Didden (1979); Glezer (1988); Glezer & Coles (1990) includes investigations on the fundamental aspects of vortex ring like the translation velocity, laminar and turbulent natures, their stability and formation. More recent works by Gharib et al. (1998); Mohseni & Gharib (1998); Shusser & Gharib (2000); Gan et al. (2012); Krieg & Mohseni (2013); Xiang et al. (2017) shows the existence of † Email address for correspondence: sbasu@iisc.ac.in" 2401.07042v1,"GEML: A Grammar-based Evolutionary Machine Learning Approach for Design-Pattern Detection Rafael Barbudo a, , Aurora Ramı́rez a, , Francisco Servant b, , José Raúl Romero a,∗ a Department of Computer Science and Numerical Analysis, University of Córdoba, 14071, Córdoba, Spain b Department of Computer Science, Virginia Tech, VA 24060, Blacksburg, USA Abstract Design patterns (DPs) are recognised as a good practice in software development. However, the lack of appropriate documentation often hampers traceability, and their benefits are blurred among thousands of lines of code. Automatic methods for DP detection have become relevant but are usually based on the rigid analysis of either software metrics or specific properties of the source code. We propose GEML, a novel detection approach based on evolutionary machine learning using software properties of diverse nature. Firstly, GEML makes use of an evolutionary algorithm to extract those characteristics that better describe the DP, formulated in terms of human-readable rules, whose syntax is conformant with a context-free grammar. Secondly, a rule-based classifier is built to predict whether new code contains a hidden DP implementation. GEML has been validated over five DPs taken from a public repository recurrently adopted by machine learning studies. Then, we increase this number up to 15 diverse DPs, showing its effectiveness and robustness in terms of detection capability. An initial parameter study served to tune a parameter setup whose performance guarantees the general applicability of this approach without the need to adjust complex parameters to a specific pattern. Finally, a demonstration tool is also provided. Keywords: design pattern detection, reverse engineering, machine learning, associative classification, grammar-guided genetic programming 1. Introduction Design patterns (DPs) are reusable template solutions that address recurrent software-design problems. The adoption of DPs is a best practice for programmers with the goal of improving the quality of software products — in terms of their maintainability, elegance, flexibility and understandability (Gamma et al., 1995). Given such benefits, and considering that manual inspection is an error-prone and time-consuming process, automatic Design Pattern Detection (DPD) has become a prominent area in the reverse-engineering research field (Bafandeh Mayvan et al., 2017). By automatically identifying the adoption of DPs, DPD techniques can improve the understanding of the design decisions in software systems, as well as the processes of redocumenting them, reimplementing them, and reusing them. Different techniques have been proposed in the research literature to automate DPD, most of which search for particular structures in static code (Mayvan and Rasoolzadegan, 2017). In this ∗ Corresponding author. Tel. +34 957 21 26 60 Email addresses: rbarbudo@uco.es (Rafael Barbudo), aramirez@uco.es (Aurora Ramı́rez), fservant@vt.edu (Francisco Servant), jrromero@uco.es (José Raúl Romero) Preprint submitted to Journal of Systems and Software case, the code structures defining DPs need to be predetermined by experts into a knowledge-base, as they usually are specific to the codebase of study. Having the expert defined these code structures may impose rigidity to the detection technique, and design patterns should be reinterpreted for particular contexts. To reduce this limitation, machine learning (ML) techniques were proposed for DPD, e.g., Ferenc et al. (2005). These techniques are more easily adapted to different codebases because they learn from a collection of representative examples — and thus can recognise diverse implementations by simply replacing or extending such analysed collection of examples. In particular, ML-based approaches provide mechanisms to learn the structural and behavioural properties of the source code, as well as software metrics, that best describe the DP. Even so, despite the fact that DPs can be described considering these multiple aspects, current ML approaches consider either software metrics or code properties — structural, behavioural or both. Unfortunately, the detection performance of existing ML-based approaches for DPD is affected by the design pattern under analysis, often requiring its specific parameter configuration. This characteristic makes them harder to adopt in practice: tuning parameters requires considerable effort by software engineers, since machine January 24, 2021" 2401.07052v1,"Modeling citation concentration through a mixture of Leimkuhler curves Emilio Gómez–Déniz, Pablo Dorta–González * , Department of Quantitative Methods in Economics and TIDES Institute, University of Las Palmas de Gran Canaria, Spain http://orcid.org/0000-0002-5072-7908 (EGD) http://orcid.org/0000-0003-0494-2903(PDG) Abstract When a graphical representation of the cumulative percentage of total citations to articles, ordered from most cited to least cited, is plotted against the cumulative percentage of articles, we obtain a Leimkuhler curve. In this study, we noticed that standard Leimkuhler functions may not be sufficient to provide accurate fits to various empirical informetrics data. Therefore, we introduce a new approach to Leimkuhler curves by fitting a known probability density function to the initial Leimkuhler curve, taking into account the presence of a heterogeneity factor. As a significant contribution to the existing literature, we introduce a pair of mixture distributions (called PG and PIG) to bibliometrics. In addition, we present closed-form expressions for Leimkuhler curves. Some measures of citation concentration are examined empirically for the basic models (based on the Power and Pareto distributions) and the mixed models derived from these. An application to two sources of informetric data was conducted to see how the mixing models outperform the standard basic models. The different models were fitted using non-linear least squares estimation. Keywords: Leimkuhler curve; Power distribution; Mixture; concentration measurement; inequality measurement. JEL Classification: C80, D30. Mathematics Subject Classification (2020): 62P25. Funding: Emilio Gómez-Déniz was partially funded by grant PID2021-127989OB-I00 (Ministerio de Economía y Competitividad, Spain). Acknowledgements We thank the two anonymous reviewers and the Associated Editor for their valuable comments and suggestions, which have greatly helped us improve the original manuscript. * P. Dorta–González, Department of Quantitative Methods in Economics, University of Las Palmas de Gran Ca- naria, 35017 Las Palmas de Gran Canaria, Spain. E-mail: pablo.dorta@ulpgc.es 1" 2401.07053v1,"Adaptoring: Adapter Generation to Provide an Alternative API for a Library Lars Reimann Günter Kniesel-Wünsche Institute of Computer Science III University of Bonn, Germany Email: reimann@cs.uni-bonn.de Institute of Computer Science III University of Bonn, Germany Email: gk@cs.uni-bonn.de Abstract—Third-party libraries are a cornerstone of fast application development. To enable efficient use, libraries must provide a well-designed API. An obscure API instead slows down the learning process and can lead to erroneous use. The usual approach to improve the API of a library is to edit its code directly, either keeping the old API but deprecating it (temporarily increasing the API size) or dropping it (introducing breaking changes). If maintainers are unwilling to make such changes, others need to create a hard fork, which they can refactor. But then it is difficult to incorporate changes to the original library, such as bug fixes or performance improvements. In this paper, we instead explore the use of the adapter pattern to provide a new API as a new library that calls the original library internally. This allows the new library to leverage all implementation changes to the original library, at no additional cost. We call this approach adaptoring. To make the approach practical, we identify API transformations for which adapter code can be generated automatically, and investigate which transformations can be inferred automatically, based on the documentation and usage patterns of the original library. For cases where automated inference is not possible, we present a tool that lets developers manually specify API transformations. Finally, we consider the issue of migrating the generated adapters if the original library introduces breaking changes. We implemented our approach for Python, demonstrating its effectiveness to quickly provide an alternative API even for large libraries. Index Terms—API design, API evolution, Adapter pattern, Wrapper library, Refactoring, Adaptoring I. T HE API E VOLUTION C HALLENGE Using third-party libraries allows application developers to focus on their core business logic. They no longer have to reinvent the wheel, to solve recurrent issues like the implementation of an encryption algorithm, but can instead rely on an existing and well-tested solution. To interact with a library, application developers need to understand its application programming interface (API), which places a particular emphasis on the learnability and usability of said API [1], [2], [3]. Often, however, the API is complex and suffers from design issues that crop up in software developed by many contributors over many years [4], [5]. The maintainers of the affected library can remedy these problems in different ways, summarized in Fig. 1 and discussed below. II. S TATE OF THE A RT API refactoring: The straightforward way of improving an API is to change the original library directly. The systematic way of direct change is via refactorings. In the second edition of his book, Fowler [6] devotes an entire chapter to API refactoring. Dig and Johnson [7] analyzed API changes and found that 80% of them were basic refactorings. Koçi et al. [8] similarly classified API changes. IDEs like Eclipse 1 or IntelliJ IDEA 2 offer various automated refactorings that can be used to alter an API. For broader coverage of the vast refactoring literature, we refer to prior surveys [9], [10], [11]. Automated migration of client code: After changing an API, client code might have to be adjusted. To avoid tedious and error-prone manual adjustment, Perkins [12] suggests that API developers provide code to replace calls to deprecated methods. Henkel and Diwan [13] capture refactorings during development of the API, which can then be replayed for the client code. Similarly, Hora et al. [14] monitor changes to the API of a library as its source code is altered. Xing and Stroulia [15] detect changes automatically without additional work from the API developers and derive plausible replacements for client code. In a case study on an Android API, Lamothe and Shange [16] explore the use of automated API migration techniques and report that determining the types of new parameters is still a challenge for the reviewed approaches. Keep deprecated API: Breaking changes and migration issues can be deferred, by temporarily keeping the old API as methods that forward calls to the new API. Typically, these forwarding methods are deprecated. The deprecation message lets users schedule migration and can include migration guidance. However, Kao et al. [17] point out that “API deprecation entails significant cost to API developers” including “code bloat [...] and serious threats to security, performance, or code quality [and] the cost of migration guide provision.” In addition, new clients need to deal with an unnecessarily large API, which impedes learning and correct use. Hard forking: If library maintainers are not willing to change the API in any of the ways above, other developers need to create a hard fork of the library that they can then 1 https://www.eclipse.org/ide/ 2 https://www.jetbrains.com/idea/ Accepted at the Int. Conf on Software Analysis, Evolution and Reengineering SANER 2024, March 12–15, 2024, Rovaniemi, Finland ©2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works." 2401.07055v1,"Diagrammatic Algebra of First Order Logic Filippo Bonchi Alessandro Di Giorgio Nathan Haydon Paweł Sobociński filippo.bonchi@unipi.it alessandro.digiorgio@phd.unipi.it University of Pisa Pisa, Italy nathan.haydon@taltech.ee pawel.sobocinski@taltech.ee Tallinn University of Technology Tallinn, Estonia ABSTRACT We introduce the calculus of neo-Peircean relations, a string diagrammatic extension of the calculus of binary relations that has the same expressivity as first order logic and comes with a complete axiomatisation. The axioms are obtained by combining two well known categorical structures: cartesian and linear bicategories. CCS CONCEPTS • Theory of computation → Logic; Categorical semantics. KEYWORDS calculus of relations, string diagrams, deep inference 1 INTRODUCTION The modern understanding of first order logic (FOL) is the result of an evolution with contributions from many philosophers and mathematicians. Amongst these, particularly relevant for our exposition is the calculus of relations (CR) by Charles S. Peirce [62]. Peirce, inspired by De Morgan [55], proposed a relational analogue of Boole’s algebra [12]: a rigorous mathematical language for combining relations with operations governed by algebraic laws. With the rise of first order logic, Peirce’s calculus was forgotten until Tarski, who in [80] recognised its algebraic flavour. In the introduction to [81], written shortly before his death, Tarski put much emphasis on two key features of CR: (a) its lack of quantifiers and (b) its sole deduction rule of substituting equals by equals. The calculus, however, comes with two great shortcomings: (c) it is strictly less expressive than FOL and (d) it is not axiomatisable. Despite these limitations, CR had —and continues to have— a great impact in computer science, e.g., in the theory of databases [20] and in the semantics of programming languages [2, 38, 45, 47, 74]. Indeed, the lack of quantifiers avoids the usual burden of bindings, scopes and capture-avoid substitutions (see [25, 30, 33, 40, 68, 70] for some theories developed to address specifically the issue of bindings). This feature, together with purely equational proofs, makes CR particularly suitable for proof assistants [43, 71, 72]. Less influential in computer science, there are two others quantifiersfree alternatives to FOL that are worth mentioning: first, predicate functor logic (PFL) [75] that was thought by Quine as the first order logic analogue of combinatory logic [22] for the 𝜆-calculus; second, Peirce’s existential graphs (EGs) [77] and, in particular, its fragment named system 𝛽. In this system FOL formulas are diagrams and the deduction system consists of rules for their manipulation. Peirce’s work on EGs remained unpublished during his lifetime. Diagrams have been used as formal entities since the dawn of computer science, e.g. in the Böhm-Jacopini theorem [3]. More recently, the spatial nature of mobile computations led Milner to move from the traditional term-based syntax of process calculi to bigraphs [53]. Similarly, the impossibility of copying quantum information and, more generally, the paradigm-shift of treating data as a physical resource (see e.g. [31, 59]), has led to the use [1, 5, 6, 10, 21, 26, 27, 32, 56, 69] of string diagrams [42, 79] as syntax. String diagrams, formally arrows of a freely generated symmetric (strict) monoidal category, combine the rigour of traditional terms with a visual and intuitive graphical representation. Like traditional terms, they can be equipped with a compositional semantics. In this paper, we introduce the calculus of neo-Peircean relations, a string diagrammatic account of FOL that has several key features: (1) Its diagrammatic syntax is closely related to Peirce’s EGs, but it can also be given through a context free grammar equipped with an elementary type system; (2) It is quantifier-free and, differently than FOL, its compositional semantics can be given by few simple rules: see (8); (3) Terms and predicates are not treated as separate syntactic and semantic entities; (4) Its sole deduction rule is substituting equals by equals, like CR, but differently, it features a complete axiomatisation; (5) The axioms are those of well-known algebraic structures, also occurring in different fields such as linear algebra [11] or quantum foundations [21]; (6) It allows for compositional encodings of FOL, CR and PFL; (7) String diagrams disambiguate interesting corner cases where traditional FOL encounters difficulties. One perk is that we allow empty models —forbidden in classical treatments— leading to (slightly) more general Gödel completeness; (8) The corner case of empty models coincides with propositional models and in that case our axiomatisation simplifies to the deep inference Calculus of Structures [15, 34]. By returning to the algebraic roots of logic we preserve CR’s benefits (a) and (b) while overcoming its limitations (c) and (d). Cartesian syntax. To ease the reader into this work, we show how traditional terms appear as string diagrams. Consider a signature Σ consisting of a unary symbol 𝑓 and two binary symbols 𝑔 and ℎ. The term ℎ( 𝑔(𝑓 (𝑥 3 ), 𝑓 (𝑥 3 )), 𝑥 1 ) corresponds to the string diagram on the left below. 𝑓 𝑔 𝑓 𝑓 ℎ 𝑓 𝑔 ℎ A difference wrt traditional syntax tree is the explicit treatment of copying and discarding. The discharger informs us that the" 2401.07058v1,"xxx Does More Advice Help? The Effects of Second Opinions in AI-Assisted Decision Making ZHUORAN LU, Purdue University, USA DAKUO WANG, Northeastern University, USA MING YIN, Purdue University, USA AI assistance in decision-making has become popular, yet people’s inappropriate reliance on AI often leads to unsatisfactory human-AI collaboration performance. In this paper, through three pre-registered, randomized human subject experiments, we explore whether and how the provision of second opinions may affect decisionmakers’ behavior and performance in AI-assisted decision-making. We find that if both the AI model’s decision recommendation and a second opinion are always presented together, decision-makers reduce their overreliance on AI while increase their under-reliance on AI, regardless whether the second opinion is generated by a peer or another AI model. However, if decision-makers have the control to decide when to solicit a peer’s second opinion, we find that their active solicitations of second opinions have the potential to mitigate over-reliance on AI without inducing increased under-reliance in some cases. We conclude by discussing the implications of our findings for promoting effective human-AI collaborations in decision-making. CCS Concepts: • Human-centered computing → Empirical studies in HCI; • Computing methodologies → Machine learning. Additional Key Words and Phrases: Machine learning, second opinions, appropriate reliance, human-AI interaction ACM Reference Format: Zhuoran Lu, Dakuo Wang, and Ming Yin. 2024. Does More Advice Help? The Effects of Second Opinions in AI-Assisted Decision Making. Proc. ACM Hum.-Comput. Interact. x, CSCW, Article xxx (November 2024), 31 pages. https://doi.org/xx.xxxx/xxxxxxx 1 INTRODUCTION With its rapid development in recent years, Artificial Intelligence (AI) technology has been integrated into many industries, such as business [39, 41, 78, 95, 97], healthcare [45, 46, 99, 114], education [116], transportation [64], and more. A common way for AI to augment human workflows in various domains is through AI-assisted decision-making, that is, an AI-based decision aid provides decision recommendations to humans while humans make the final decisions. As humans and AI may each possess unique intelligence that is complementary to each other, the human-AI collaboration [96] in this decision-making scenario has the potential to utilize the best of humans and AI and realizes a joint performance beyond what can be achieved by each party alone. In reality, however, the joint decision-making performance of the human-AI team is often not as good as expected. One primary reason underlying such unsatisfactory human-AI collaboration is that humans often rely on the AI recommendations inappropriately. Humans may not trust an AI Authors’ addresses: Zhuoran Lu, Purdue University, West Lafayette, USA, lu800@purdue.edu; Dakuo Wang, Northeastern University, Boston, USA, mingyin@purdue.edu; Ming Yin, Purdue University, West Lafayette, USA, mingyin@purdue.edu. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2018 Association for Computing Machinery. 2573-0142/2024/11-ARTxxx https://doi.org/xx.xxxx/xxxxxxx Proc. ACM Hum.-Comput. Interact., Vol. x, No. CSCW, Article xxx. Publication date: November 2024." 2401.07072v1,"IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 I NTER E VO -TR: Interactive Evolutionary Test Generation with Readability Assessment Pedro Delgado-Pérez, Aurora Ramı́rez, Kevin J. Valle-Gómez, Inmaculada Medina-Bulo, and José Raúl Romero Abstract—Automated test case generation has proven to be useful to reduce the usually high expenses of software testing. However, several studies have also noted the skepticism of testers regarding the comprehension of generated test suites when compared to manually designed ones. This fact suggests that involving testers in the test generation process could be helpful to increase their acceptance of automatically-produced test suites. In this paper, we propose incorporating interactive readability assessments made by a tester into EvoSuite, a widely-known evolutionary test generation tool. Our approach, I NTER E VO -TR, interacts with the tester at different moments during the search and shows different test cases covering the same coverage target for their subjective evaluation. The design of such an interactive approach involves a schedule of interaction, a method to diversify the selected targets, a plan to save and handle the readability values, and some mechanisms to customize the level of engagement in the revision, among other aspects. To analyze the potential and practicability of our proposal, we conduct a controlled experiment in which 39 participants, including academics, professional developers, and student collaborators, interact with I NTER E VO -TR. Our results show that the strategy to select and present intermediate results is effective for the purpose of readability assessment. Furthermore, the participants’ actions and responses to a questionnaire allowed us to analyze the aspects influencing test code readability and the benefits and limitations of an interactive approach in the context of test case generation, paving the way for future developments based on interactivity. Index Terms—testing tools, evolutionary computing and genetic algorithms, interactive search-based software engineering, readability ✦ 1 I NTRODUCTION T ESTING is a crucial activity in the lifecycle of any software project to increase its quality and ensure its maintainability. However, testing is a costly phase that requires a considerable amount of resources [1]. As the complexity of industrial systems grows, the design of effective test suites becomes a harder task and exhaustive manual testing is no longer possible. Current research in automated testing aims to overcome these limitations by developing efficient techniques [2], among which search-based algorithms have been extensively studied in the context of test generation [3]. In object-oriented systems, test case generation involves the design of test scenarios comprised of a sequence of method calls and the evaluation of the resulting execution (i.e., outputs and/or final object states) [4]. The generation of effective test suites often requires a deep understanding of the classes under test, since it implies choosing inputs able to reveal possible faults, setting initial states for the objects, defining the right order of invocations and adding proper assertions. Search-based test case generation automatizes this process, usually guided by coverage criteria. Evo- Suite [5], an open-source test generation tool, has become a reference in this area. In the unit testing competition at SBST 2021 [6], EvoSuite obtained the highest overall score among the five competing tools, a number of tools that in turn reveals the maturity achieved in this field. Indeed, many authors have built their proposals on top of EvoSuite [7] • • P. Delgado-Pérez, K.J. Valle-Gómez and I. Medina-Bulo are with University of Cádiz, Spain. E-mail: { pedro.delgado, kevin.valle, inmaculada.medina } @uca.es A. Ramı́rez and J.R. Romero are with University of Córdoba, Spain. E-mail: { aramirez, jrromero } @uco.es Manuscript published December 09, 2022 DOI: https://doi.org/10.1109/TSE.2022.3227418 or inspired by this tool (e.g., E VO M ASTER for REST API testing [8]), thus adapting the search to different testing scenarios and seeking to improve the process. Despite the great advances, some studies reveal that current automated tools still present some limitations that hamper their practicability [9], [10]. More specifically, existing tools still have difficulties detecting complex, real-world faults [11] and testers are often reluctant to adopt the generated tests due to their lack of readability when compared to manually-designed ones [12]. As a motivating example of the latter issue, consider the test cases internally generated by EvoSuite for class ArrayIntList 1 in Figure 1. All these three test cases cover the same test target: a line in the method removeAtElement. Both test0 and test1 have the same length (excluding assertions, generated in a postprocessing step). However, it might be difficult for a tester to understand at a first glance that test0 is actually traversing removeAtElement because clear indirectly invokes that method. Also, test2 is a bit longer than the other two test cases, but the argument values or the sequence of actions might be more meaningful than those in test1 (e.g., they use different versions of the method add). In this situation, some questions arise: what is the covered functionality by each test case? Which of the features in these tests are desirable for a tester? Which test looks more “human-written”? In summary, which test case is more readable? It seems that there is not an easy answer to these questions. It is not straightforward to map an automatically-generated test suite with the code covered by each test case, and no test readability standard applies to every tester equally due to 1. This class is part of the Commons Collections Primitives and implements an ordered collection of int values backed by an array." 2401.07092v1,"Flutter instability in solids and structures, with a view on biomechanics and metamaterials Davide Bigoni ∗1 , Francesco Dal Corso 1 , Oleg N. Kirillov 2 , Diego Misseroni 1 , Giovanni Noselli 3 , and Andrea Piccolroaz 1 1 2 DICAM, University of Trento, via Mesiano 77, I-38123 Trento, Italy Northumbria University, Newcastle upon Tyne NE1 8ST, United Kingdom 3 SISSA-International School for Advanced Studies, 34136 Trieste, Italy Abstract The phenomenon of oscillatory instability called ‘flutter’ was observed in aeroelasticity and rotor dynamics about a century ago. Driven by a series of applications involving nonconservative elasticity theory at different physical scales, ranging from nanomechanics to the mechanics of large space structures and including biomechanical problems of motility and growth, research on flutter is experiencing a new renaissance. A review is presented of the most notable applications and recent advances in fundamentals, both theoretical and experimental aspects, of flutter instability and Hopf bifurcation. Open problems, research gaps, and new perspectives for investigations are indicated. Keywords Hopf bifurcation · Elasticity · Non-holonomic constraints · Non-Hermitian mechanics · Non-conservative systems 1 Introduction Flutter instability, a peculiar dynamic behaviour consisting of a blowing-up oscillatory motion, is a phenomenon which was discovered in structural mechanics almost a century ago as a consequence of the application of non-conservative, follower forces, to structures. The many strongly counter-intuitive features, characteristic of this instability, were highlighted by famous scientists, for instance, Vladimir Bolotin and Warner Koiter, and inspired a strong research effort on this topic. The purpose of this review is to show how, although initially confined to slender rods, the heart of structural mechanics, the research on flutter instability has been spread through the years along various directions and across a broad range of physical scales. In the following sections, it is shown how this intriguing mechanical instability is displayed in several different scientific and technological fields. Indeed, in mechanobiology follower forces were found to act on the human spine, and flutter instability was shown to explain circumnutations during the growing of plant shoots, motility of cells through eukaryotic cilia, and vertebral segmentation in embryos. Moreover, flutter instability affects control problems, the design of soft robotic actuators, graphene peeling, wire drawing, plastic extrusion, sheet paper printing, hoist and elevator systems, and deployment and retrieval of space tether systems, and solar sails. These topics are briefly reviewed below, while the famous problem of aeroelastic flutter, which leads to the structural failure of flying vehicles (but also chimneys and bridges) and, accordingly, affects strongly their design requirements [1–5], is not included as it would require a separate treatment. Nevertheless, similarities between flutter in structural systems and in fluid-structure interaction problems are highlighted. In a detailed vein, new achievements are presented in the mechanics of flutter, including the experimental approach to follower forces, internal activity, effects related to non-smoothness of the equations of motion, non-holonomic constraint, and, finally, the extension from structural flutter to ∗ Corresponding author: e-mail: bigoni@unitn.it; phone: +39 0461 282507. 1" 2401.07102v1,"Evolving Code with A Large Language Model Erik Hemberg 1* , Stephen Moskal 1 and Una-May O’Reilly 1 1* EECS, MIT CSAIL, 32 Vassar St, Cambridge, 02139, MA, USA. *Corresponding author(s). E-mail(s): hembergerik@csail.mit.edu; Contributing authors: smoskal@mit.edu; unamay@csail.mit.edu; Abstract Algorithms that use Large Language Models (LLMs) to evolve code arrived on the Genetic Programming (GP) scene very recently. We present LLM GP, a formalized LLM-based evolutionary algorithm designed to evolve code. Like GP, it uses evolutionary operators, but its designs and implementations of those operators radically differ from GP’s because they enlist an LLM, using prompting and the LLM’s pre-trained pattern matching and sequence completion capability. We also present a demonstration-level variant of LLM GP and share its code. By addressing algorithms that range from the formal to hands-on, we cover design and LLM-usage considerations as well as the scientific challenges that arise when using an LLM for genetic programming. Keywords: Large Language Models, Genetic Programming, Evolutionary Algorithm, Operators 1 Introduction Large language models (LLMs), along with other Foundational Models, have disrupted conventional expectations of Artificial Intelligence systems. An LLM, with a chatbot or Natural Language API, typically works in the input-output space of natural language, i.e. unstructured text. In a question-answer style, it processes natural language prompts and responds in natural language. Technically speaking, it is a pre-trained transformer model 1 which has distilled statistical patterns from a massive training set within its massive quantity of numerical parameters and artificial neural architecture. Pre-training is a process which back-propagates errors arising from predictions that complete text sequences which come from massive training data. In many cases the 1 A type of deep neural network, see [1]. 1" 2401.07112v1,"Mass, charge, and distance to Reissner-Nordström black hole in terms of directly measurable quantities Gerardo Morales-Herrera, 1, a Pablo Ortega-Ruiz, 1, b Mehrab Momennia, 2, c and Alfredo Herrera-Aguilar 2, d 1 Facultad de Ciencias Fı́sico Matemáticas, Benemérita Universidad Autónoma de Puebla, Ciudad Universitaria, Puebla, CP 72570, Puebla, Mexico 2 Instituto de Fı́sica, Benemérita Universidad Autónoma de Puebla, Apartado Postal J-48, 72570, Puebla, Puebla, Mexico (Dated: January 17, 2024) In this paper, we employ a general relativistic formalism and develop new theoretical tools that allow us to analytically express the mass and electric charge of the Reissner-Nordström black hole as well as its distance to a distant observer in terms of few directly observable quantities, such as the total frequency shift, aperture angle of the telescope, and redshift rapidity. Our analytic and concise formulas are valid on the midline, and the redshift rapidity is a relativistic invariant observable that represents the evolution of the frequency shift with respect to the proper time in the Reissner-Nordström spacetime. This procedure is applicable for particles undergoing circular motion around a spherically symmetric and electrically charged black hole, which is the case for accretion disks orbiting supermassive black holes hosted at the core of active galactic nuclei. Our results provide a novel method to measure the electric charge of the Reissner-Nordström black hole and its distance from the Earth, and the general formulas can be employed in black hole parameter estimation studies. Keywords: Reissner-Nordström black hole, black hole rotation curve, frequency shift, redshift rapidity. PACS numbers: 04.70.Bw, 98.80.–k, 04.40.-b, 98.62.Gq contrast to the previous attempts based on the kinematic redshift that is not an observable quantity [15–18]. A proper attempt to comprehend the importance of the In recent years, black hole physics has become a very frequency shift can be achieved by studying the motion active research field, and robust theoretical predictions of test massive particles and light in order to understand [1] and observational evidence from gravitational waves the physical properties of the region hosting them. [2] as well as images of black holes’ shadows [3, 4] indicate In [10], the authors have developed a new general these remarkable supercompact bodies, predicted by relativistic method to analytically express the mass and Einstein’s General Relativity theory, do exist in the spin of Kerr black holes in terms of the total observational cosmos. frequency shift experienced by the photons emitted from Black holes are simple objects, completely described by massive geodesic particles as well as the radius of the only a handful of parameters, namely mass M , electric emitters’ orbits (for equatorial circular motion). The charge Q, and angular momentum J, known as the main contribution of this novel method is to decode No-hair theorem [5–7]. A black hole that contains all the information about the relativistic effects present in three parameters is called a Kerr-Newman black hole the black hole environment which is hidden in the total that reduces to a charged static Reissner-Nordström frequency shift experienced by the out-coming photons. (hereafter RN) black hole in the spin-zero limit J = 0. This innovative method aims to extend the physical Although the electric charge in static RN black holes is interpretation of the frequency shift to General Relativity often considered to be negligible [8], there is no conclusive and improve the Newtonian picture of gravitation which evidence to assert that these bodies are not present in is valid just when the test particle is orbiting far away nature, hence electrically charged black holes have been from the central source. extensively studied in the literature so far. More recently, it was shown that generalizing this Lately, the study of the observational frequency approach to the Kerr black hole in asymptotically de shift and its relation to black hole parameters and Sitter spacetime allows us to extract the Hubble constant cosmological constant has been investigated in [9–14], in from the total observational redshift [11], hence enabling us to measure the cosmological constant and black hole parameters, simultaneously (see also [19] for a a Electronic address: gerardo.moraleshe@alumno.buap.mx recent additional avenue for testing the cosmological b Electronic address: pablo.ortegar@alumno.buap.mx constant by using the Kerr-de Sitter black hole shadow). c Electronic address: mmomennia@ifuap.buap.mx, momennia1988@gmail.com In addition, this general relativistic method has been d Electronic address: aherrera@ifuap.buap.mx applied to polymerized black holes to express the black I. INTRODUCTION" 2401.07118v1,"Exploring of Discrete and Continuous Input Control for AI-enhanced Assistive Robotic Arms Max Pascher Kevin Zinta Jens Gerken max.pascher@udo.edu TU Dortmund University Dortmund, Germany University of Duisburg-Essen Essen, Germany kevin.zinta@studmail.w-hs.de Westphalian University of Applied Sciences Gelsenkirchen, Germany jens.gerken@udo.edu TU Dortmund University Dortmund, Germany ABSTRACT Robotic arms, integral in domestic care for individuals with motor impairments, enable them to perform Activities of Daily Living (ADLs) independently, reducing dependence on human caregivers. These collaborative robots require users to manage multiple Degrees-of-Freedom (DoFs) for tasks like grasping and manipulating objects. Conventional input devices, typically limited to two DoFs, necessitate frequent and complex mode switches to control individual DoFs. Modern adaptive controls with feed-forward multimodal feedback reduce the overall task completion time, number of mode switches, and cognitive load. Despite the variety of input devices available, their effectiveness in adaptive settings with assistive robotics has yet to be thoroughly assessed. This study explores three different input devices by integrating them into an established XR framework for assistive robotics, evaluating them and providing empirical insights through a preliminary study for future developments. CCS CONCEPTS • Computer systems organization → Robotic control; • Humancentered computing → Visualization techniques; Virtual reality. assembly lines [4] to personal mobility aids [7]. Among these collaborative technologies, assistive robotic arms emerge as a particularly valuable and versatile subset, finding applications across various domains (e.g., [3, 26]). Assistive robotic arms can enhance the independence of individuals with restricted mobility [15, 21]. These technologies – particularly when integrated with Artificial Intelligence (AI) – empower individuals to perform Activities of Daily Living (ADLs), which often entail tasks like gripping and manipulating objects in their surroundings, without reliance on human assistance [24]. However, current Human-Robot Interaction (HRI) research underscores a notable challenge faced by developers: optimizing the autonomy level of assistive robots [16]. Striking a balance is crucial, as purely autonomous systems may diminish user interaction and trust, while manual controls could prove impractical for users with specific impairments [12, 25, 31]. Shared control – combining manual input with algorithmic assistance – emerges as such a balanced approach and a promising research direction. In this work, we explore three different input devices for controlling an assistive robotic arms in shared control applications: • Joy-Con: A motion controller with continuous data input, suited for one-handed operation. • Head: User control input by head-based movements, using continuous data. • Button: A set of assistive buttons to control the robot in an accessible manner with discrete input data. KEYWORDS assistive robotics, human-robot interaction (HRI), shared user control, virtual reality, visual cues ACM Reference Format: Max Pascher, Kevin Zinta, and Jens Gerken. 2024. Exploring of Discrete and Continuous Input Control for AI-enhanced Assistive Robotic Arms. In Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction (HRI ’24 Companion), March 11–14, 2024, Boulder, CO, USA. ACM, New York, NY, USA, 5 pages. https://doi.org/10.1145/3610978.3640626 1 INTRODUCTION The progress in the development of (semi-)autonomous technologies compelled their incorporation into numerous sectors, reshaping how we live and work. This integration includes scenarios of close collaboration with robotic devices, ranging from industrial Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). HRI ’24 Companion, March 11–14, 2024, Boulder, CO, USA © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0323-2/24/03. https://doi.org/10.1145/3610978.3640626 2 RELATED WORK Standard control devices with a high Degree-of-Freedom (DoF), like gaming joysticks and keyboards, often pose challenges for users with severe motor impairments. Addressing these issues requires alternative solutions, such as specialized training or different interfaces [8, 28]. An approach proposed by Herlant et al. addresses these challenges by reducing the number of DoFs through mode switches. In their successful implementation, a joystick was used to control a Kinova Jaco assistive robotic arm [10]. Alternatively, Arévalo-Arboleda et al. introduced a hands-free multi-modal interaction by combining head movements, using a head-gaze based cursor to point, and speech commands to execute specific actions for tele-operating a robotic arm [2]. However, while speech commands provide enhanced accessibility, challenges like environmental noise or speech impairments encounter, impacting their effectiveness [18]. The control of assistive robotic arms involves a wide array of possible input devices, each targeted to suit the preferences and" 2401.07123v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 One Agent Too Many: User Perspectives on Approaches to Multi-agent Conversational AI Christopher Clarke 1 Karthik Krishnamurthy 2 Walter Talamonti 2 Yiping Kang 1 Lingjia Tang 1 Jason Mars 1 1 University of Michigan, Ann Arbor, MI 2 Ford Motor Company, Dearborn, MI { csclarke, ypkang, lingjia, profmars } @umich.edu { kkrish65, wtalamo1 } @ford.com Abstract—Conversational agents have been gaining increasing popularity in recent years. Influenced by the widespread adoption of task-oriented agents such as Apple Siri and Amazon Alexa, these agents are being deployed into various applications to enhance user experience. Although these agents promote “ask me anything” functionality, they are typically built to focus on a single or finite set of expertise. Given that complex tasks often require more than one expertise, this results in the users needing to learn and adopt multiple agents. One approach to alleviate this is to abstract the orchestration of agents in the background. However, this removes the option of choice and flexibility, potentially harming the ability to complete tasks. In this paper, we explore these different interaction experiences (one agent for all) vs (user choice of agents) for conversational AI. We design prototypes for each, systematically evaluating their ability to facilitate task completion. Through a series of conducted user studies, we show that users have a significant preference for abstracting agent orchestration in both system usability and system performance. Additionally, we demonstrate that this mode of interaction is able to provide quality responses that are rated within 1% of human-selected answers. I. I NTRODUCTION The conversational AI market is growing at an increasingly rapid pace and is projected to reach a valuation of US $13.9 billion by 2025 [1]. The growth of this market, largely influenced by the popularity of task-oriented agents such as Apple Siri, Google Assistant, and Amazon Alexa, has led to an increased interest in the use of these conversational agents in domain-specific areas such as driver assistance [2], home automation [3], and food ordering [4]. Companies are rapidly building conversational agents dedicated to their own product offerings, providing an entirely new form of interaction for their customers. Today, platforms such as Whatsapp and Facebook host more than 300,000 of these conversational agents [5], [6]. The majority of the commercially available agents today are designed to perform tasks in highly specialized domains [7], [8]. For example, a user may use an agent like Amazon Alexa for online shopping but engage with Google Assistant for daily news updates. Additionally, a given agent may be more proficient at a specific domain over another e.g A finance CA is better suited to answer finance questions. As a result, when navigating complex tasks, users are tasked with learning and adopting multiple agents [8]. An example of this multi-agent interaction mode in practice is demonstrated by the Amazon Voice Interoperability Initiative 1 . This agreement between agent vendors provides users with choice and flexibility through the utilization of multiple intelligent assistants on voice-enabled products such as smart speakers and smart displays [9]. Despite its potential benefits, prior work has presented challenges with the cognitive burden of comprehending each agent’s capability and navigating between agents. This coupled with the continuous growth of conversational agents leads to decision overload for users [8], [10]–[12]. However, other studies suggest this to be a nonissue and in some cases show enhancement of user experience [5], [9], [13]. Despite the employment of both of these interaction modes in practice, to the best of our knowledge, no prior work has explicitly investigated the impact of these multi-agent interaction modes on user decision-making and cognitive load. In addition, a study is also needed to identify the key constraints and challenges of designing and employing such interactions. Thus, it remains unclear which interaction mode is best suited to support user interaction and provide the best overall performance. Bridging the interaction gap of using multiple conversational agents spanning different domains presents several key challenges. • First is the assurance that the user is routed to the best available agent for their particular query. Expert users of multiple conversational agents over time build a mental model of each agent and its capabilities to facilitate their decision-making. Single-agent interfaces in contrast face the challenge of understanding which agent is best suited for a given task. • Second, these conversational agents are constantly improved upon and expanded with new capabilities. Any orchestration approach needs to be flexible and adaptive to these changes with relative ease. For individual users, this adaption is built through use over time. In contrast, any agent integration approach, given that these agents are black boxes, must operate without relying on the internals 1 https://developer.amazon.com/en-US/alexa/voice-interoperability" 2401.07139v1,"IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 1 Deep Blind Super-Resolution for Satellite Video Yi Xiao ID , Qiangqiang Yuan ID , Member, IEEE, Qiang Zhang ID , and Liangpei Zhang ID , Fellow, IEEE. Abstract—Recent efforts have witnessed remarkable progress in Satellite Video Super-Resolution (SVSR). However, most SVSR methods usually assume the degradation is fixed and known, e.g., bicubic downsampling, which makes them vulnerable in real-world scenes with multiple and unknown degradations. To alleviate this issue, blind SR has thus become a research hotspot. Nevertheless, existing approaches are mainly engaged in blur kernel estimation while losing sight of another critical aspect for VSR tasks: temporal compensation, especially compensating for blurry and smooth pixels with vital sharpness from severely degraded satellite videos. Therefore, this paper proposes a practical Blind SVSR algorithm (BSVSR) to explore more sharp cues by considering the pixel-wise blur levels in a coarse-to-fine manner. Specifically, we employed multi-scale deformable convolution to coarsely aggregate the temporal redundancy into adjacent frames by window-slid progressive fusion. Then the adjacent features are finely merged into mid-feature using deformable attention, which measures the blur levels of pixels and assigns more weights to the informative pixels, thus inspiring the representation of sharpness. Moreover, we devise a pyramid spatial transformation module to adjust the solution space of sharp mid-feature, resulting in flexible feature adaptation in multi-level domains. Quantitative and qualitative evaluations on both simulated and real-world satellite videos demonstrate that our BSVSR performs favorably against state-of-the-art non-blind and blind SR models. Code will be available at https://github.com/XY-boy/Blind-Satellite-VSR Index Terms—Satellite video, multiple degradations, blind super-resolution, deformable attention, remote sensing. I. I NTRODUCTION V IDEO satellite has recently received increasing attention due to its strength in dynamic observations. Nowadays, satellite video imagery is widely used in remote sensing tasks with high temporal variations [1], such as object tracking [2], anomaly detection [3], [4], classification [5]–[10], change detection [11], etc. However, the satellite platform tremors and atmosphere scatters in the remote imaging process often generate undesirable blurs in satellite videos. Additionally, the spatial resolution of satellite video is usually degraded to stabilize the remote transmission. As a result, the visual quality of satellite video is inevitably contaminated, which results in performance drops in subsequent applications. Therefore, it is of practical significance to improve the spatial resolution This work was supported in part by the National Natural Science Foundation of China under Grant 42230108 and Grant 61971319. (Corresponding author: Qiangqiang Yuan.) Yi Xiao is with the School of Geodesy and Geomatics, Wuhan University, Wuhan 430079, China (e-mail: xiao yi@whu.edu.cn). Qiangqiang Yuan is with the School of Geodesy and Geomatics, Wuhan University, Wuhan 430079, China (e-mail: yqiang86@gmail.com). Qiang Zhang is with the Information Science and Technology College, Dalian Maritime University, Dalian 116000, China (e-mail: qzhang95@dlmu.edu.cn). Liangpei Zhang is with the State Key Laboratory of Information Engineering in Surveying, Mapping, and Remote Sensing, Wuhan University, Wuhan 430079, China (e-mail: zlp62@whu.edu.cn). of satellite video for both human perception and downstream tasks. Compared to hardware upgrades, Super-Resolution (SR) technology provides an optimal solution for this highly illposed problem [12]–[16]. Traditional SR methods [17] often employ hand-crafted priors to make this problem well-posed. However, these methods are fragile to the laborious priors and may restore unsatisfactory results because the real constraint often deviates from the predefined priors. Besides, they also suffer from high computational complexity and can lead to sub-optimal performance. Benefit from the development of deep neural networks (DNNs) [18]–[20], especially the huge success in low-level vision tasks [21]–[25], the deep-learning-based SR approaches are booming. In spite of achieving decent results, most of them are specialized for single and known degradation, e.g., bicubic downsampling, and tend to collapse in real-scene. Therefore, more efforts have been paid to blind SR approaches, which address the SR problem under multiple and unknown degradations, e.g., unknown blur kernels, and downsamplings. Recently, numerous works have made promising progress on blind Single Image Super-Resolution (SISR). However, they are less applicable in satellite videos as the additional information in the temporal domain is not fully explored. More recently, some scholars have investigated blind Video Super-Resolution (VSR). Nevertheless, these methods focus solely on accurate blur kernel estimation while overlooking the significance of temporal compensation in VSR, especially precise compensation for blurry and smooth pixels in severely degraded frames. Generally, existing blind VSR approaches typically utilize optical flow warping for temporal compensation. However, they are laborious in large-scale satellite imagery and not robust in complex imaging scenarios with scale variations and sparse motions. What’s worse, in blind SR settings, the appearance of satellite video frames is severely blurred and downsampled, which poses more challenges for accurate flow estimation. Liu et al. [26] proposed a joint estimation network, which adopts patch matching to realize patch-by-patch alignment. However, the patch-wise alignment does not fully exploit the sub-pixel redundancy. Moreover, the high-similarity patch may also contain blurry pixels. Simply aggregating them to mid-feature is not sophisticated to consider the blur level of pixels, which may introduce and amplify the blurry information and restore unsatisfactory results. Overall, two issues hinder us from moving forward: 1) Existing temporal compensation strategies are timeconsuming and not robust in severely degraded satellite videos." 2401.07144v1,"High Q-factor Fano resonances in coupled wire arrays with bulk structural asymmetry David E. Fernandes 1* , Sylvain Lannebère 2 , Tiago A. Morgado 2 1 2 Instituto de Telecomunicações, Avenida Rovisco Pais, 1, 1049-001 Lisboa, Portugal Instituto de Telecomunicações and Department of Electrical Engineering, University of Coimbra, 3030-290 Coimbra, Portugal Abstract In this article we characterize the macroscopic electromagnetic response of a nested wire metamaterial with a high degree of bulk structural asymmetry. The unit cell of the considered metamaterial contains two sets of metallic wires, one set consisting of an array of straight wires and another formed by a racemic array of helical-shaped wires. We study the scattering of electromagnetic waves in a metamaterial slab and show that the electromagnetic coupling between both arrays of wires can originate Fano resonances with narrow lineshape. The origin of the resonances is rooted in the formation of a sub- radiant mode in the metamaterial wherein the net polarization vector vanishes. We envision that the proposed configuration, with sharp resonances whose quality factor can be greatly enhanced by tuning the structural parameters of the wires, may have promising applications in sensing and switching in a broad frequency range from the microwave regime up to THz frequencies. * 1 To whom correspondence should be addressed: E-mail: dfernandes@co.it.pt" 2401.07148v1,"Assessing the Effectiveness of Binary-Level CFI Techniques Ruturaj Vaidya Prasad Kulkarni ruturaj@ku.edu University of Kansas Lawrence, Kansas, USA prasadk@ku.edu University of Kansas Lawrence, Kansas, USA ABSTRACT Memory corruption is an important class of vulnerability that can be leveraged to craft control flow hijacking attacks. Control Flow Integrity (CFI) provides protection against such attacks. Application of type-based CFI policies requires information regarding the number and type of function arguments. Binary-level type recovery is inherently speculative, which motivates the need for an evaluation framework to assess the effectiveness of binary-level CFI techniques compared with their source-level counterparts, where such type information is fully and accurately accessible. In this work, we develop a novel, generalized and extensible framework to assess how the program analysis information we get from state-ofthe-art binary analysis tools affects the efficacy of type-based CFI techniques. We introduce new and insightful metrics to quantitatively compare source independent CFI policies with their ground truth source aware counterparts. We leverage our framework to evaluate binary-level CFI policies implemented using program analysis information extracted from the IDA Pro binary analyzer and compared with the ground truth information obtained from the LLVM compiler, and present our observations. 1 INTRODUCTION Software written in memory unsafe languages like C and C++ is vulnerable to memory attacks. The combination of OS and compiler techniques such as Stack Canaries — which catch some buffer overflow attacks by checking the sanity of a random value placed on the stack prior to return, ASLR (Address Layout Randomization) — which pseudo-randomizes the memory layout of the program and, DEP (Data Execution Prevention) — which prevents execution of certain memory regions, are currently deployed in prevent these attacks. However, Code-Reuse Attacks (CRA) such as return-into-libc (full function reuse attack) [11], ROP (Return Oriented Programming) [6, 33, 34] and COOP (Counterfeit Object-oriented Programming) [10, 18, 19, 32, 35] employ existing code segments to circumvent such defense mechanisms. These attacks abuse vulnerabilities like buffer overflows, take control of the program and leverage gadgets to craft the control flow hijacking exploits, resulting in changes in the control flow of the program to user unintended locations. Control flow integrity (CFI) [1] is a popular technique to prevent such control flow hijacking attacks. CFI aims to ensure that the control flow of the program stays within the legitimate targets desired by the programmer. Usually, this is achieved by computing the user intended control flow targets using a static analysis phase to insert security checks into the generated binary code. The inserted security checks monitor and enforce the control flow of the program to stay within the desired target locations at run-time. CFI implementations that balance security and performance have been integrated in popular compilers (e.g. LLVM [22] and GCC [15]), making CFI accessible to ordinary programmers. Even when CFI techniques fail to accurately determine programmer intended program control flow, they make the attackers’ life difficult by constraining the control flow of the program during execution. Various CFI techniques have been proposed after the introduction of an exemplary CFI model by Abadi et al. [1]. CFI techniques could be source-code aware — implemented at source or compilerlevel, or source-code independent — implemented at the binary level. Binary-level CFI techniques are necessary to secure unprotected and untrusted programs and third-party libraries that are typically shipped without their corresponding high-level source codes. CFI techniques typically require the accurate recovery of function call-site and function signature information, including argument counts and all argument types. Some advanced CFI policies also employ class and vtable hierarchy information. For many languages like C/C++, much of this information is embedded in the source code, and can be precisely recovered by source-level tools. Unfortunately, it becomes much harder to recover precise program structure, semantic, and other analysis information after compilation. Lack of accurate program analysis information at the binarylevel makes it extremely challenging to build a precise function call-graph for large binary software. In turn, the effectiveness of binary-level CFI techniques depend and suffer from the inaccuracies of the program information extracted by the adopted binary analysis framework. Over- or under-approximation by CFI techniques can result in false negatives (attacks go undetected) or false positives (correct control flow tagged), which can dent the usability of CFI. Our goal in this work is to investigate and quantify the correctness of binary-level CFI techniques and how they are impacted by the inaccuracies in program analysis information recovered by modern binary-level tools. We focus on type-based CFI techniques that use the number and type of arguments to match each call-site to the set of potential call-targets. Source-level CFI techniques have access to precise program information, and are therefore most likely to achieve their stated objective. Therefore, we argue that the output of each source-level CFI technique can be used as the ground truth to assess the accuracy of the corresponding binary-level CFI technique (that operate without access to similarly accurate program information). In this work, we develop a generalized, modular, and extensible framework, called Binary-CFI, to study and quantify the effectiveness of different binary-level CFI techniques. Our framework supports the integration of different source (compilers) based and binary-level analysis modules to gather program information required to model different CFI techniques, each at the source and binary levels. To validate our framework, we develop a source-level analysis module using the LLVM compiler [23] and a binary-level analysis module using the IDA Pro and Hex-Rays software reverse" 2401.07166v1,"Reliable operation of Cr 2 O 3 :Mg/ 𝛽-Ga 2 O 3 p-n heterojunction diodes at 600˚C William A. Callahan 1,2,* , Kingsley Egbo 1 , Cheng-Wei Lee 3 , David Ginley 1 , Ryan O’Hayre 3 , Andriy Zakutayev 1,† Materials Science Center, National Renewable Energy Laboratory, Golden, Colorado 80401, USA 2 Advanced Energy Systems Graduate Program, Colorado School of Mines, Golden, Colorado, 80401, USA 3 Department of Metallurgical and Materials Engineering, Colorado School of Mines, Golden, Colorado, 80401, USA 1 * Will.Callahan@nrel.gov † Andriy.Zakutayev@nrel.gov Abstract 𝛽-Ga 2 O 3 -based semiconductor heterojunctions have recently demonstrated improved performance at high voltages and elevated temperatures and are thus promising for applications in power electronic devices and harsh-environment sensors. However, the longterm reliability of these ultra-wide band gap (UWBG) semiconductor devices remains barely addressed and may be strongly influenced by chemical reactions at the p-n heterojunction interface. Here, we experimentally demonstrate operation and evaluate the reliability of Cr 2 O 3 :Mg/ β-Ga 2 O 3 p-n heterojunction diodes at during extended operation at 600˚C, as well as after 30 repeated cycles between 25-550˚C. The calculated pO 2 -temperature phase stability diagram of the Ga-Cr-O material system predicts that Ga 2 O 3 and Cr 2 O 3 should remain thermodynamically stable in contact with each other over a wide range of oxygen pressures and operating temperatures. The fabricated Cr 2 O 3 :Mg / 𝛽-Ga 2 O 3 p-n heterojunction diodes show room-temperature on/off ratios >10 4 at ±5V and a breakdown voltage (V Br ) of -390V. The leakage current increases with increasing temperature up to 600˚C, which is attributed to Poole-Frenkel emission with a trap barrier height of 0.19 eV. Over the course of a 140-hour thermal soak at 600˚C, both the device turn-on voltage and on-state resistance increase from 1.08V and 5.34 mΩ-cm 2 to 1.59V and 7.1 mΩ-cm 2 respectively. This increase is attributed to the accumulation of Mg and MgO at the Cr 2 O 3 /Ga 2 O 3 interface as observed from TOF-SIMS analysis. These findings inform future design strategies of UWBG semiconductor devices for harsh environment operation and underscore the need for further reliability assessments for 𝛽-Ga 2 O 3 based devices. 1" 2401.07181v1,"Reinforcement Learning from LLM Feedback to Counteract Goal Misgeneralization Houda Nait El Barj Stanford University hnait@stanford.edu Théophile Sautory UC Berkeley tsautory@berkeley.edu Abstract We introduce a method to address goal misgeneralization in reinforcement learning (RL), leveraging Large Language Model (LLM) feedback during training. Goal misgeneralization, a type of robustness failure in RL occurs when an agent retains its capabilities out-of-distribution yet pursues a proxy rather than the intended one. Our approach utilizes LLMs to analyze an RL agent’s policies during training and identify potential failure scenarios. The RL agent is then deployed in these scenarios, and a reward model is learnt through the LLM preferences and feedback. This LLM-informed reward model is used to further train the RL agent on the original dataset. We apply our method to a maze navigation task, and show marked improvements in goal generalization, especially in cases where true and proxy goals are somewhat distinguishable and behavioral biases are pronounced. This study demonstrates how the LLM, despite its lack of task proficiency, can efficiently supervise RL agents, providing scalable oversight and valuable insights for enhancing goal-directed learning in RL through the use of LLMs. 1 Introduction In recent years, there has been a growing concern about the possibility of a catastrophic future where humanity is disempowered by AI (Chan et al. [2023], Bostrom [2014], and Amodei et al. [2016]). Such a catastrophic scenario supposes that AI is misaligned, in the sense that it has the capacity to overtake humans while pursuing unintended and undesirable goals which do not match those humans originally aimed for it (Gabriel [2020], Hendrycks et al. [2023]). Over the past decades, the capabilities of AI systems have been expanding in virtually every domain: playing board games like Go (Silver et al. [2016]), video games (Vinyals et al. [2019]), skin cancer diagnosis (Esteva et al. [2017]) or protein structure prediction (Jumper et al. [2021]). Thus it could soon surpass human performance on a wide range of tasks. Consequently, tackling the challenge of alignment seems more pressing than ever. In the field, researchers distinguish between two modes of alignment: ’outer alignment,’ which involves creating a reward function that accurately reflects human preferences and goals, and ’inner alignment,’ which focuses on ensuring that a policy trained on such a function adheres to these preferences. Outer misalignment occurs due to inaccurately specified rewards, whereas inner misalignment typically stems from the model’s inductive biases. A large body of research documents outer misalignment, showing how AI systems can exploit misspecified reward functions (Pan et al. [2022]). This includes ’specification gaming,’ where AI manipulates the reward generation process (Krakovna et al. [Specification gaming: the flip side of AI ingenuity]), and ’reward hacking,’ involving exploiting loopholes in task specifications (Skalse et al. [2022], Leike et al. [2017], Everitt et al. [2017], Ibarz et al. [2018]). Solutions to address reward misspecifications have been discussed in the literature, with reinforcement learning with human feedback (RLHF) gaining large traction (Christiano et al. [2017], Ziegler et al. [2020], Schulman et al. [2017b]). This approach, which trains models using reward functions derived from human feedback, guides the agent’s behavior and reduces dependence" 2401.07198v1,"Waveguide optical parametric amplifiers in silicon nitride with 2D graphene oxide films Yang Qu 1,# , Jiayang Wu 1, #, * , Yuning Zhang 1 , Yunyi Yang 1 , Linnan Jia 1 , Houssein El Dirani 2, [+] , Sébastien Kerdiles 2 , Corrado Sciancalepore 2, [++] , Pierre Demongodin 3 , Christian Grillet 3 , Christelle Monat 3 , Baohua Jia 4, 5 * , and David J. Moss 1, * 1 Optical Sciences Centre, Swinburne University of Technology, Hawthorn, VIC 3122, Australia 2 Université Grenoble-Alpes, CEA-LETI, 17 Avenue des Martyrs, 38054 Grenoble, France [+] Current address: LIGENTEC SA, 224 Bd John Kennedy, 91100 Corbeil-Essonnes, France [++] 3 Current address: Soitec SA, 38190 Bernin, France Université de Lyon, Ecole Centrale de Lyon, INSA Lyon, Université Claude Bernard Lyon 1, CPE Lyon, CNRS, INL, UMR5270, 69130 Ecully, France 4 Centre for Atomaterials and Nanomanufacturing, School of Science, RMIT University, Melbourne, VIC 3000, Australia 5 Australian Research Council (ARC) Industrial Transformation Training, Centre in Surface Engineering for Advanced Materials (SEAM), RMIT University, Melbourne, Victoria 3000, Australia # These authors contribute equally. *E-mail: jiayangwu@swin.edu.au, baohua.jia@rmit.edu.au, dmoss@swin.edu.au Keywords: Integrated photonics, nonlinear optics, optical parametric process, 2D materials. 1" 2401.07216v1,"Walert: Putting Conversational Search Knowledge into Action by Building and Evaluating a Large Language Model-Powered Chatbot Sachin Pathiyan Cherumanal Lin Tian Futoon M. Abushaqra RMIT University Melbourne, Australia s3874326@student.rmit.edu.au RMIT University Melbourne, Australia lin.tian2@student.rmit.edu.au RMIT University Melbourne, Australia futoon.abu.shaqra@student.rmit.edu.au Angel Felipe Magnossão de Paula Universitat Politècnica de València Valencia, Spain adepau@doctor.upv.es Kaixin Ji Halil Ali RMIT University Melbourne, Australia kaixin.ji@student.rmit.edu.au RMIT University Melbourne, Australia halil.ali@rmit.edu.au Danula Hettiachchi Johanne R. Trippas Falk Scholer RMIT University Melbourne, Australia danula.hettiachchi@rmit.edu.au RMIT University Melbourne, Australia j.trippas@rmit.edu.au RMIT University Melbourne, Australia falk.scholer@rmit.edu.au Damiano Spina RMIT University Melbourne, Australia damiano.spina@rmit.edu.au ABSTRACT CCS CONCEPTS Creating and deploying customized applications is crucial for operational success and enriching user experiences in the rapidly evolving modern business world. A prominent facet of modern user experiences is the integration of chatbots or voice assistants. The rapid evolution of Large Language Models (LLMs) has provided a powerful tool to build conversational applications. We present Walert, a customized LLM-based conversational agent able to answer frequently asked questions about computer science degrees and programs at RMIT University. Our demo aims to showcase how conversational information-seeking researchers can effectively communicate the benefits of using best practices to stakeholders interested in developing and deploying LLM-based chatbots. These practices are well-known in our community but often overlooked by practitioners who may not have access to this knowledge. The methodology and resources used in this demo serve as a bridge to facilitate knowledge transfer from experts, address industry professionals’ practical needs, and foster a collaborative environment. The data and code of the demo are available at https://github.com/rmit-ir/walert. • Information systems → Evaluation of retrieval results; Search interfaces; • Human-centered computing → Natural language interfaces. KEYWORDS conversational information seeking, large language models, retrievalaugmented generation ACM Reference Format: Sachin Pathiyan Cherumanal, Lin Tian, Futoon M. Abushaqra, Angel Felipe Magnossão de Paula, Kaixin Ji, Halil Ali, Danula Hettiachchi, Johanne R. Trippas, Falk Scholer, and Damiano Spina. 2024. Walert: Putting Conversational Search Knowledge into Action by Building and Evaluating a Large Language Model-Powered Chatbot. In Proceedings of the 2024 ACM SIGIR Conference on Human Information Interaction and Retrieval (CHIIR ’24), March 10–14, 2024, Sheffield, United Kingdom. ACM, New York, NY, USA, 5 pages. https://doi.org/10.1145/3627508.3638309 1 Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). CHIIR ’24, March 10–14, 2024, Sheffield, United Kingdom © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0434-5/24/03. https://doi.org/10.1145/3627508.3638309 INTRODUCTION Conversational agents based on Large Language Models (LLMs) such as OpenAI’s ChatGPT 1 provide many benefits to stakeholders, reducing the cost of various tasks by saving time and resources, especially for closed-domain questions such as translating responses into different formats, retrieving policy documents, and preparing legal document drafts [5]. However, two major concerns arise in this 1 https://openai.com/" 2401.07236v1,"Under consideration for publication in J. Fluid Mech. 1 Banner appropriate to article type will appear here in typeset article An extension of the compound flow theory with shear and friction Jan Van den Berghe 1,2 †, Miguel A. Mendez 1 and Yann Bartosiewicz 2 1 von Karman Institute for Fluid Dynamics, Waterloosesteenweg 72, 1640 Sint-Genesius-Rode, Belgium 2 Institute of Mechanics, Materials, and Civil Engineering (iMMC), Université catholique de Louvain (UCLouvain), 1348 Louvain-la-Neuve, Belgium (Received xx; revised xx; accepted xx) Compound flows consist of two or more parallel compressible streams inside a duct. Its theoretical treatment has recently been applied to model ejectors, but also to post-process and to interpret CFD results. More precisely, it has been observed that compound flows can choke upstream of the geometrical throat. While it is widely known that friction can push the sonic section downstream, no mechanism has been identified to explain the movement in the opposite direction. In this work, we extend the existing compound flow theory with shear and friction. The resulting model captures the up- and downstream movement of the sonic section. We show analytically that shear between the streams is the driving force behind the upstream movement by analysing the singularity of the governing equations in the sonic section. Additionally, we provide a quasi-third order approximation of the governing equations in the vicinity of the sonic section to alleviate potential numerical issues. Finally, we compare the predictions of the model with post-processed CFD results of a compound nozzle. We study the individual effects of shear and friction through an inviscid simulation for the isentropic case and a viscid simulation with a slip or no-slip condition at the wall to include shear with or without friction. The proposed extension offers new possibilities in modelling and analysis of compound flows. Key words: Gas dynamics, choking, compressible parallel streams. 1. Introduction Parallel compressible streams are at the heart of many applications, the most classic example being jet engines with a high-speed core and a slower surrounding jet. We will refer to such heterogeneous flows as a single compound flow. In this paper, we are interested in internal compound flows, which appear for example in ejectors or (sc)ramjets. Recently, Lamberts et al. (2018) observed that compound flows can choke upstream of the geometrical throat, in contrast to the classic downstream movement of the sonic section due † Email address for correspondence: jan.vandenberghe@vki.ac.be Abstract must not spill onto p.2" 2401.07237v1,"Distilling Event Sequence Knowledge From Large Language Models Somin Wadhwa 1,2 , Oktie Hassanzadeh 1 , Debarun Bhattacharjya 1 , Ken Barker 1 and Jian Ni 1 1 IBM Research AI 2 Northeastern University wadhwa.s@northeastern.edu, {hassanzadeh, debarunb, kjbarker, nij}@us.ibm.com Abstract Event sequence models have been found to be highly effective in the analysis and prediction of events. Building such models requires availability of abundant high-quality event sequence data. In certain applications, however, clean structured event sequences are not available, and automated sequence extraction results in data that is too noisy and incomplete. In this work, we explore the use of Large Language Models (LLMs) to generate event sequences that can effectively be used for probabilistic event model construction. This can be viewed as a mechanism of distilling event sequence knowledge from LLMs. Our approach relies on a Knowledge Graph (KG) of event concepts with partial causal relations to guide the generative language model for causal event sequence generation. We show that our approach can generate high-quality event sequences, filling a knowledge gap in the input KG. Furthermore, we explore how the generated sequences can be leveraged to discover useful and more complex structured knowledge from pattern mining and probabilistic event models. We release our sequence generation code and evaluation framework, as well as corpus of event sequence data. 1 Introduction Building probabilistic models from event sequence data has numerous practical applications across different domains when plentiful high-quality event data is available. For example, in Finance, event models can be used to predict stock market trends and make informed investment decisions. In Healthcare, event models can help identify patterns and correlations in patient data to improve diagnoses and treatment plans. In the field of Cybersecurity, these models can be used to detect and prevent potential cyber attacks by analyzing the sequence of events leading up to a breach. A common characteristic of the data in these domains is that sequences are clearly associated with an entity (e.g., a company, a person, or a device). There are however other domains where such a clean association between events and entities may not be possible. One such application is news event analysis Radinsky et al. [2012]; Cekinel and Karagoz [2022]; Du et al. [2022]; Hassanzadeh (earthquake, tsunami, nuclear disaster) (sentence, execution, capital punishment) (famine, mass migration, refugee crisis) ( ethnic cleansing, posttraumatic stress disorder ) : 6 : 7 : 8 : 5 P(refugee crisis | mass migration, NOT famine) = 0.31 P(mass migration | refugee crisis, NOT famine) = 0.75 P(refugee crisis | famine, NOT mass migration) = 0.68 P(refugee crisis | mass migration, AND famine) = 0.91 P(mass migration | famine) = 0.21 Figure 1: Examples of frequent patterns mined from LLM-generated event sequence collections with their support (top); and some results from a simple probabilistic event model learned over the sequences that discovers influencing sets of event concepts and estimates probabilities based on historical occurrences (bottom). et al. [2022]. While various news sources record and describe newsworthy events, it is often not possible to automatically put together coherent sequences of events, because each event may involve multiple topics and actors, and many correlated and unrelated events may be occurring simultaneously or in close proximity Prior work has addressed this challenge by devising automated mechanisms for extracting narratives Norambuena et al. [2023]; Santana et al. [2023], topic detection and tracking Allan [2012], and timeline summarization Gholipour Ghalandari and Ifrim [2020]. While these different categories of solutions have been successful in a range of applications, the outcome is inherently noisy and not in the form of structured event sequences useful for the construction of event models. Prior work has shown little success in automatically turning narratives into structured sequences. In this paper, we explore a novel mechanism for creating structured event sequences in such domains, using generative language models. Large Language Models Brown et al. [2020]; Raffel et al. [2020]; Wei et al. [2022] have recently become the dominant paradigm in a range of natural language processing (NLP) tasks Chung et al. [2022] and often beat traditional approaches on a number of challenging tasks, including complex arithmetic reasoning Imani et al. [2023] and open-domain question answering Kamalloo et al. [2023]. In this paper, our goal is to examine the capability of LLMs to generate structured event sequences useful for event analysis. Our aim is to use LLMs directly for generation of event sequences, as opposed to improving prior extraction methods that would rely on high-" 2401.07243v1,"Robust Parahydrogen-Induced Polarization at High Concentrations L. Dagys, 1 M. C. Korzeczek, 2 A. J. Parker, 1 J. Eills, 3 J. W. Blanchard, 4 C. Bengs, 5 M. H. Levitt, 5 S. Knecht, 1 I. Schwartz, 1, ∗ and M. B. Plenio 2, † 2 1 NVision Imaging Technologies GmbH, Wolfgang-Paul Straße 2, 89081 Ulm, Germany Institut für Theoretische Physik & IQST, Albert-Einstein Allee 11, Universität Ulm, D-89081 Ulm, Germany 3 Institute of Bioengineering of Catalonia, 08028 Barcelona, Spain 4 Quantum Technology Center, University of Maryland, MD 20742, United States 5 University of Southampton, Southampton, United Kingdom, SO171BJ Parahydrogen-Induced Polarization (PHIP) is a potent technique for generating target molecules with high nuclear spin polarization. The PHIP process involves a chemical reaction between parahydrogen and a target molecule, followed by the transformation of nuclear singlet spin order into magnetization of a designated nucleus through magnetic field manipulations. Although the singletto-magnetization polarization transfer process works effectively at moderate concentrations, it is observed to become much less efficient at high molar polarization, defined as the product of polarization and concentration. This strong dependence on the molar polarization is attributed to interference from the field produced by the sample’s magnetization during polarization transfer, which leads to complex dynamics and can severely impact the scalability of the technique. We address this challenge with a pulse sequence that negates the influence of the distant dipolar field, while simultaneously achieving singlet-to-magnetization polarization transfer to the desired target spins, free from restrictions on the molar polarization. Introduction – Nuclear Magnetic Resonance (NMR), one of the most widespread spectroscopic techniques with a broad range of applications, extending from chemical analysis and drug discovery to medical imaging, is intrinsically limited by its low sensitivity. This limitation is rooted in the weak nuclear spin polarization in thermal equilibrium, typically amounting to a few parts per million. Thermal-equilibrium polarization and detection can be improved by increasing magnetic field strength which may not be easily achievable. A promising alternative to address the sensitivity challenge involves hyperpolarization methods, which can enhance nuclear spin polarization by orders of magnitude compared to the level at thermal equilibrium [1–18]. Parahydrogen-Induced Polarization (PHIP) [8–18] is a hyperpolarization method that offers a high level of polarization and fast throughput of polarized samples. PHIP involves an irreversible hydrogenation reaction between a substrate and para-enriched hydrogen (parahydrogen) gas which is used to embed the nuclear singlet order of parahydrogen in newly formed product molecules. Upon completion of the reaction, the singlet order is then transformed into observable magnetization using a variety of methods, e.g., coherence transfer by NMR pulse sequences or adiabatic transfer schemes [15–27]. Consequently, PHIP can generate samples with molar polarization, defined as the product of the spin polarization and the concentration of target nuclei, reaching reported values of around 50–100 mM molar polarization for 13 C in fumarate [13]. ∗ ilai@nvision-imaging.com † martin.plenio@uni-ulm.de The NMR signal is proportional to molar polarization, which is a better figure of merit than polarization alone for many applications such as metabolic imaging or fundamental physics experiments, for which high polarization alone is insufficient and high target concentrations are also desired [13, 14, 28]. Additionally, it may unlock applications that inherently benefit from high sample magnetization, such as microscale NMR [29, 30] or the nuclear Overhauser effect methods in liquid samples [4–6, 15]. Hence, it is pertinent to inquire to what extent achievable molar polarization can be increased. In this context it is important to note that high molar polarization can introduce adverse effects. For example, a sample of 1 H water only yields about 3 mM of 1 H molar polarization at 9 T magnetic field and room temperature (111 M 1 H concentration at 0.003% polarization), but this is sufficient intrinsic magnetization to act back on the sample itself. After rf excitation, such magnetization in a tuned rf coil induces a current that generates an additional transverse field that rotates sample magnetization out of phase and causes radiation damping [31, 32]. This typically leads to line broadening, phase distortions and other effects often associated with 1 H- and 19 F-rich samples. A less pronounced phenomenon does not require coupling to a tuned coil, and emerges from the (small) nuclear spin contribution to the magnetic flux density of the sample [33–37]. A cylindrical 100 mM sample of 1 H spins at 50% polarization (50 mM molar polarization) can generate a magnetic flux density of 180 nT corresponding to an 8 Hz resonance shift, while the previous example of water placed in a 9 T magnetic field would result in a 0.5 Hz shift [33–35]. The backaction of these internal fields is known to induce chaotic dynamics even" 2401.07252v1,"1 Nanoantennas and Nanoradars: The Future of Integrated Sensing and Communication at the Nanoscale M. Javad Fakhimi, Student Member, IEEE, Ozgur B. Akan, Fellow, IEEE Abstract—Nanoantennas, operating at optical frequencies, are a transformative technology with broad applications in 6G wireless communication, IoT, smart cities, healthcare, and medical imaging. This paper explores their fundamental aspects, applications, and advancements, aiming for a comprehensive understanding of their potential in various applications. It begins by investigating macroscopic and microscopic Maxwell’s equations governing electromagnetic wave propagation at different scales. The study emphasizes the critical role of Surface Plasmon Polariton (SPP) wave propagation in enhancing light-matter interactions, contributing to high data rates, and enabling miniaturization. Additionally, it explores using two-dimensional materials like graphene for enhanced control in terahertz communication and sensing. The paper also introduces the employment of nanoantennas as the main building blocks of Nano-scale Radar (NR) systems for the first time in the literature. NRs, integrated with communication signals, promise accurate radar sensing for nanoparticles inside a nano-channel, making them a potential future application in integrated sensing and communication (ISAC) systems. These nano-scale radar systems detect and extract physical or electrical properties of nanoparticles through transmitting, receiving, and processing electromagnetic waves at ultra-high frequencies in the optical range. This task requires nanoantennas as transmitters/receivers/transceivers, sharing the same frequency band and hardware for high-performance sensing and resolution. Index Terms—Nanoantennas, light-matter interaction, Maxwell’s equations, terahertz radiation, ultrafast data transmission, 6G wireless communications, biosensors, photodetection, integrated sensing and communication (ISAC). I. I NTRODUCTION R Apid advancement of wireless communication technologies has changed the way we access information in our increasingly connected world. As we approach the era of 6G wireless communication, the demand for higher data rates, lower latency, and enhanced connectivity continues to dominate. To address these challenges, researchers are exploring new technologies that can reveal the unique properties of terahertz frequencies (0.1 to 10 THz) [1]. Among these transformative The authors are with the Center for neXt-generation Communications (CXC), Department of Electrical and Electronics Engineering, Koç University, Istanbul 34450, Turkey (e-mail: {mfakhimi22, akan}@ku.edu.tr). O. B. Akan is also with the Internet of Everything (IoE) Group, Electrical Engineering Division, Department of Engineering, University of Cambridge, Cambridge CB3 0FA, UK (email: oba21@cam.ac.uk). This work was supported by the AXA Research Fund (AXA Chair for Internet of Everything at Koç University). technologies, nanoantennas are proposed as promising and practical structures with the potential to reshape wireless communication, revolutionize the Internet of Things (IoT) and healthcare, and advance medical imaging [2]. These nanoscale structures enable hyper data transmission rates and high capacity, making them ideal for addressing the burgeoning data demands of the 6G era [4]. Furthermore, the development of nanoantennas as a crucial building block of Nano-scale Radar systems (NRs) is critical. Nanoantennas play a significant role in signal transmission and reception, enabling the tracking of spatial and physical/electrical properties of nanoparticles (targets) in nano-channels. Moreover, the use of nanoantennas in the field of medicine has demonstrated exceptional potential in diverse medical applications including imaging, biosensing, disease detection, drug delivery, photodynamic therapy (PDT), real-time monitoring, and photothermal therapy [228]–[237]. The foundation of nanoantennas lies in the principles of electromagnetic theory, expressed through the macroscopic and microscopic Maxwell’s equations [14], [22], [25], [27]. These fundamental equations explain the propagation of electromagnetic waves, including those at terahertz frequencies and optical frequencies, providing insights into the intricate behavior of nanoantennas and their interactions with electromagnetic radiation [5], [23]. Surface Plasmon Polaritons (SPPs) emerge as a pivotal aspect of nanoantenna research, facilitating enhanced light-matter interactions and confinement of terahertz waves [107] [20], [21], [24]. SPP wave propagation enables significant control over electromagnetic fields, contributing to the high data rates and miniaturization capabilities of nanoantennas [90]. Furthermore, the quantum mechanical perspective of nanoantennas offers a unique insight into the behavior of these structures in the microscopic world [6], [19], [23], [33]–[36]. The coexistence of classical and quantum phenomena in nanoantennas manifest new paths for quantum communication and sensing, offering a paradigm shift in future applications [7]. Quantum mechanics provides a deeper understanding of the underlying mesoscopic and microscopic physics, and helps us to explain the fundamentals of the interaction between the light and the matter, which is considered to be the root of differences between the classical antenna theory, and the nanoantenna radiation rules. Researchers have harnessed these principles to fabricate nanoantennas that efficiently receive and transmit data while" 2401.07255v1,"Trust from Ethical Point of View: Exploring Dynamics Through Multiagent-Driven Cognitive Modeling Abbas Tariverdi Department of Physics University of Oslo Oslo, Norway abbast@uio.no Abstract—The paper begins by exploring the rationality of ethical trust as a foundational concept. This involves distinguishing between trust and trustworthiness and delving into scenarios where trust is both rational and moral. It lays the groundwork for understanding the complexities of trust dynamics in decision-making scenarios. Following this theoretical groundwork, we introduce an agent-based simulation framework that investigates these dynamics of ethical trust, specifically in the context of a disaster response scenario. These agents, utilizing emotional models like Plutchik’s Wheel of Emotions and memory learning mechanisms, are tasked with allocating limited resources in disaster-affected areas. The model, which embodies the principles discussed in the first section, integrates cognitive load management, Big Five personality traits, and structured interactions within networked or hierarchical settings. It also includes feedback loops and simulates external events to evaluate their impact on the formation and evolution of trust among agents. Through our simulations, we demonstrate the intricate interplay of cognitive, emotional, and social factors in ethical decision-making. These insights shed light on the behaviors and resilience of trust networks in crisis situations, emphasizing the role of rational and moral considerations in the development of trust among autonomous agents. This study contributes to the field by offering an understanding of trust dynamics in socio-technical systems and by providing a robust, adaptable framework capable of addressing ethical dilemmas in disaster response and beyond. The implementation of the algorithms presented in this paper is available at this GitHub repository: https://github.com/abbas-tari/ethical-trust-cognitive-modeling. Index Terms—Agent-based Modeling, Cognitive Modeling, Ethical Trust Dynamics, Plutchik’s Wheel of Emotions, Personality Traits, Interaction Norms, Socio-Technical Systems I. I NTRODUCTION The German-American philosopher Max Otto (1876–1968) made a significant statement about trust: ”The deepest source of a man’s philosophy, the one that shapes and nourishes it, is faith or lack of faith in mankind” [1]. Otto suggests that our philosophy is influenced by our level of faith or trust in others. This trust shapes our worldview and understanding of humanity. First we delves into the critical distinction between trust and trustworthiness, highlighting that while individuals have a moral duty to be trustworthy, exhibiting qualities like honesty and fairness, there isn’t a similar moral obligation to trust others. This section explores the nuanced relationship between these concepts, guided by philosophical literature. Works such as those by Simion and Willard-Kyle [2], D’Arms and Kerr [3], and Faulkner [4] discuss the moral imperatives surrounding trustworthiness. Hills [5] challenges the notion of trustworthiness as mere reliability, positioning it as a virtue. These perspectives collectively argue for the moral significance of embodying trustworthiness, a key aspect that facilitates positive social interactions and reciprocity. However, the act of trusting remains a nuanced, situation-dependent decision, not mandated by moral duty. Furthermore we elaborate on the concept of ’Trust Limits,’ emphasizing the multidimensional nature of trust, which includes self-trust and trust in external entities such as individuals, objects, and institutions. Each aspect of trust, whether it be honesty, competence, or modesty, possesses its own trustworthiness spectrum, necessitating discernment in what and to what extent trust is vested. This discussion leads to an exploration of ’General Trust,’ which examines trust based on the comparison of benefits and drawbacks, as suggested by Barbalet [6] and Bormann [7]. It also considers the three elements of trust: the trustor, the trustee, and the bounds of trust, and how some individuals may exhibit generalized trust, potentially leading to negative consequences. Empirical studies in various contexts, such as home-school relations and international alliances, have investigated these dynamics, highlighting the importance of consistency in behavior for trust development. The section concludes with an analysis of ’Trust Rationality,’ outlining scenarios where trust can be rational, and touches on the relationship between morality and rationality in trust, drawing insights from different philosophical viewpoints like those of Hobbes, Kant, Sidgwick, and Hume. The transitions from the theoretical underpinnings of trust to its computational modeling, it acknowledges the complex interplay of moral, psychological, and rational aspects in human relationships. Trust necessitates a balance between the trustor and trustee within specific bounds, highlighting the need for discerning and situational trust. Computational models offer a novel perspective in understanding these dynamics. Recent advancements, as pioneered by Marsh (1994) [8], have led to" 2401.07257v1,"Lightweight Modality Adaptation to Sequential Recommendation via Correlation Supervision Hengchang Hu 1 , Qijiong Liu 2 , Chuang Li 1 , and Min-Yen Kan 1 1 National University of Singapore {huhengc,lichuang,kanmy}@comp.nus.edu.sg 2 The Hong Kong Polytechnic University jyonn.liu@connect.polyu.hk Abstract. In Sequential Recommenders (SR), encoding and utilizing modalities in an end-to-end manner is costly in terms of modality encoder sizes. Two-stage approaches can mitigate such concerns, but they suffer from poor performance due to modality forgetting, where the sequential objective overshadows modality representation. We propose a lightweight knowledge distillation solution that preserves both merits: retaining modality information and maintaining high efficiency. Specifically, we introduce a novel method that enhances the learning of embeddings in SR through the supervision of modality correlations. The supervision signals are distilled from the original modality representations, including both (1) holistic correlations, which quantify their overall associations, and (2) dissected correlation types, which refine their relationship facets (honing in on specific aspects like color or shape consistency). To further address the issue of modality forgetting, we propose an asynchronous learning step, allowing the original information to be retained longer for training the representation learning module. Our approach is compatible with various backbone architectures and outperforms the top baselines by 6.8% on average. We empirically demonstrate that preserving original feature associations from modality encoders significantly boosts task-specific recommendation adaptation. Additionally, we find that larger modality encoders (e.g., Large Language Models) contain richer feature sets which necessitate more fine-grained modeling to reach their full performance potential. Keywords: Recommender System · Multimodal Recommendation · Knowledge Distillation. 1 Introduction Recommender systems reduce information overload by helping users select their preferred next items. The Sequential Recommender (SR) paradigm specifically focuses on learning sequential relationships among the user’s historical items, where the models range from GRU [13], Transformer [21] to Graph Neural Network [49] based methods. The paradigm of using unique identities (IDs for short) to represent distinct items has been well-studied [23,40]. Until recently, there has" 2401.07263v1,"BET: Explaining Deep Reinforcement Learning through The Error-Prone Decisions Xiao Liu 1 , Jie Zhao 1 , Wubing Chen 2 , Mao Tan 1 , Yongxing Su* 1 1 School of Automation and Electronic Information, Xiangtan University, China 2 State Key Laboratory for Novel Software Technology, Nanjing University, China. liuxiao730@outlook.com, 202121622919@smail.xtu.edu.cn, wuzbingchen@foxmail.com, mr.tanmao@gmail.com, suyongxin@xtu.edu.cn Abstract Despite the impressive capabilities of Deep Reinforcement Learning (DRL) agents in many challenging scenarios, their black-box decision-making process significantly limits their deployment in safety-sensitive domains. Several previous selfinterpretable works focus on revealing the critical states of the agent’s decision. However, they cannot pinpoint the error-prone states. To address this issue, we propose a novel self-interpretable structure, named Backbone Extract Tree (BET), to better explain the agent’s behavior by identify the error-prone states. At a high level, BET hypothesizes that states in which the agent consistently executes uniform decisions exhibit a reduced propensity for errors. To effectively model this phenomenon, BET expresses these states within neighborhoods, each defined by a curated set of representative states. Therefore, states positioned at a greater distance from these representative benchmarks are more prone to error. We evaluate BET in various popular RL environments and show its superiority over existing self-interpretable models in terms of explanation fidelity. Furthermore, we demonstrate a use case for providing explanations for the agents in StarCraft II, a sophisticated multiagent cooperative game. To the best of our knowledge, we are the first to explain such a complex scenarios using a fully transparent structure. 1 Introduction Deep Reinforcement Learning (DRL) has shown impressive capabilities in a variety of challenging scenarios, such as games [Lanctot et al., 2017; Vinyals et al., 2019; Lin et al., 2022] and robots[Ibarz et al., 2021; Brunke et al., 2022]. However, existing DRL algorithms exhibit a black-box nature. Specifically, these models typically operate in a manner that lacks transparency, thereby obscuring the decisionmaking process and impeding the establishment of trust among users. The black-box nature of these models significantly constrains their deployment in domains where security and reliability are of great concern. To address this challenge, it becomes imperative to enhance the transparency of DRL agents through explanatory mechanisms, thereby facilitating broader adoption and application of DRL methods. The mainstream of interpretability research targets deep learning, while we are devoted to explaining reinforcement learning models. Prior research has proposed methods to derive explanations for DRL. For example, saliency map-based methods [Paszke et al., 2019; Bertoin et al., 2022] are used to highlight the critical input features that an agent uses to make its decisions. Model approximation-based methods [Coppens et al., 2019; Liu et al., 2023; Loyola-González et al., 2023] reveal the decision-making process behind specific actions. Reward prediction-based methods [Guo et al., 2021; Cheng et al., 2023] identify important time steps in an episode of interaction. In the landscape of state space, it is evident that states sharing similarities often exhibit practical correlations. For example, a majority of decisions made by the agent are straightforward and apparent [Liu et al., 2023], with only a subset being critical and susceptible to errors [Coppens et al., 2019]. Despite this understanding, there remains a gap in research that delves into interpreting policies by integrating these critical states. Filling this gap could significantly indicate the likelihood of the model being in error-prone situations. We propose a novel self-interpretable model, named Backbone Extract Tree (BET) 1 , to pinpoint the decision risk of states. BET hypothesizes that states in which the agent consistently executes uniform decisions exhibit a reduced propensity for errors. To effectively model this phenomenon, BET express these states within neighborhoods, each defined by a curated set of representative states, which we call Bones. Therefore, states positioned at a greater distance from Bones are more prone to error. BET is distinguished by several key features: (i) Full transparency. BET is meticulously designed to be well-structured, ensuring clarity and the absence of any ambiguous intermediate variables. (ii) Scalable interpretability. The model maintains a consistent level of comprehensibility, irrespective of the complexity of the tasks it handles, thereby facilitating ease of understanding even in more intricate scenarios. In summary, this paper makes the following contributions. • Innovative self-interpretable model. We propose BET, 1 The source code of BET can be found at [Anonymity]" 2401.07277v1,"Andromeda Proceedings BSM 2023, Hurghada, Egypt Domain Walls in the A 4 flavored NMSSM Mohamed Amin Loualidi 1,* , and Salah Nasri 1,2,+ 1 Department of physics, United Arab Emirates University, Al-Ain, UAE 2 The Abdus Salam International Centre for Theoretical Physics, Strada Costiera 11, I-34014, Trieste, Italy Email addresses: * ma.loualidi@uaeu.ac.ae, + snasri@uaeu.ac.ae, salah.nasri@cern.ch Abstract In this work, we study the phenomenology of neutrinos and the formation of cosmic domain walls in the NMSSM extended by an A 4 × Z 3 flavor symmetry. Neutrino masses result from the type I seesaw mechanism using only two flavon fields and the NMSSM singlet S while their mixing is of Trimaximal mixing form. We perform our phenomenological study in the normal mass hierarchy where we find that observables like m ββ , m β , and ∑ m i can be tested by future experiments. Due to the difference between the A 4 subgroups that undergo spontaneous breaking in both the charged lepton and neutrino sectors, the resulting domain walls in each sector exhibit distinct structures. We delve into the details of the breaking patterns within these two sectors, and we introduce a nuanced geometric representation for them. To tackle the domain wall problem, we explore a well-established method involving the explicit breaking of the flavor symmetry. This is achieved through the introduction of Planck-suppressed operators induced by supergravity. Keywords: Domain walls, Non-Abelian Flavor symmetries, Neutrino phenomenolgy, NMSSM. DOI: 10.31526/ACP 1. INTRODUCTION The interplay between spontaneous symmetry breaking (SSB), discrete symmetries, and the flavor problem is a fascinating aspect of particle physics, where theoretical models seek to explain observed phenomena at the quantum level. In particular, addressing the hierarchical structure and mixing patterns in fermion masses beyond the Standard Model (SM) presents a prominent challenge in particle physics. Non-Abelian flavor symmetries play a crucial role in addressing the flavor problem, and their use in model building became common after the observation of large leptonic mixing angles by neutrino oscillation experiments [1–3]. The SSB of these discrete symmetries is the most important ingredient to achieve realistic fermion masses and mixing angles at low energies. It is achieved when gauge singlet flavon fields, which transform non-trivially under the flavor symmetry, acquire vacuum expectations values (VEVs) along specific directions in flavon space. On the other hand, the SSB of discrete symmetries leads to the formation of two-dimensional defects, called domain walls (DWs) with potential cosmological implications [4, 5]. These DWs form at the boundaries of distinct degenerate vacua created during the phase transition associated with SSB. In the context of non-Abelian discrete symmetries, SSB typically occurs partially, resulting in residual subgroups within different fermion sectors due to the VEV alignments of flavon fields. The number of degenerate vacua is determined by the order of the broken subgroups, while the regions between these vacua represent the DWs whose energy density may conflict with cosmological observations if it dominates the total energy density of the Universe. This happens in the so-called scaling regime in which the energy density of DWs scales in terms of the cosmological expansion factor a ( t ) as a − 1 [6–8], decreasing more slowly than radiation (scaling as a − 4 ) or matter (scaling as a − 3 ) [4, 5, 9]. Basically, if the flavor-breaking scale is comparable to the inflationary scale, it is reasonable to assume that the Universe has expanded enough for the walls to be inflated beyond the present horizon. However, if the flavor-breaking scale is lower than the inflationary scale, the energy density of the walls becomes the subdominant contribution to the total energy density of the Universe [10, 11]; this is known as the DW problem [4]. In this paper, based on our recent works [12, 13], we investigate the predictions of neutrino masses and mixing within the framework of a flavored next-to-minimal supersymmetric Standard Model (FNMSSM), where the flavor symmetry is given by G F = A 4 × Z 3 . The motivation behind the NMSSM comes from the consequences associated with its singlet superfield, see Refs. [14–16] for more details. In our scenario, to achieve realistic light neutrino masses through the type I seesaw mechanism, three right-handed neutrinos and two flavon fields are introduced. Meanwhile, the NMSSM singlet S plays a crucial role in achieving neutrino mixing that aligns with the Trimaximal mixing matrix [17–23]. We have studied numerically the phenomenology associated with neutrino sector in the normal mass hierarchy (NH) case. We found that upcoming experiments can test our predictions for the effective Majorana mass m ββ relevant for neutrinoless double beta decay experiments (0νββ), the effective mass of electron antineutrinos m β measured in beta decay experiments, and the total mass of the three active neutrinos constrained by cosmological observations. 1" 2401.07279v1,"Phenotypic switching mechanisms determine the structure of cell migration into extracellular matrix under the ‘go-or-grow’ hypothesis Rebecca M. Crossley a , Kevin J. Painter b , Tommaso Lorenzi c , Philip K. Maini a , Ruth E. Baker a a Mathematical Institute, University of Oxford, OX2 6GG, Oxford, United Kingdom b Dipartimento di Scienze, Progetto e Politiche del Territorio (DIST), Politecnico di Torino, 10129, Torino, Italy c Department of Mathematical Sciences “G. L. Lagrange”, Politecnico di Torino, 10129, Torino, Italy Abstract A fundamental feature of collective cell migration is phenotypic heterogeneity which, for example, influences tumour progression and relapse. While current mathematical models often consider discrete phenotypic structuring of the cell population, in-line with the ‘go-or-grow’ hypothesis [1, 2], they regularly overlook the role that the environment may play in determining the cells’ phenotype during migration. Comparing a previously studied volume-filling model for a homogeneous population of generalist cells that can proliferate, move and degrade extracellular matrix (ECM) [3] to a novel model for a heterogeneous population comprising two distinct sub-populations of specialist cells that can either move and degrade ECM or proliferate, this study explores how different hypothetical phenotypic switching mechanisms affect the speed and structure of the invading cell populations. Through a continuum model derived from its individual-based counterpart, insights into the influence of the ECM and the impact of phenotypic switching on migrating cell populations emerge. Notably, specialist cell populations that cannot switch phenotype show reduced invasiveness compared to generalist cell populations, while implementing different forms of switching significantly alters the structure of migrating cell fronts. This key result suggests that the structure of an invading cell population could be used to infer the underlying mechanisms governing phenotypic switching. Keywords: go-or-grow, travelling wave, mathematical modelling, collective cell migration, extracellular matrix, phenotypic switching 1. Introduction Phenotypic heterogeneity profoundly impacts tumour behaviour and is a hallmark feature driving post-treatment recurrence [4]. Collective cell migration, which can be crucial in understanding various stages of tumour progression, often involves distinct cell phenotypes with varying motility and proliferative capacities [5, 6]. Mathematical approaches to studying these processes often use models formulated as reaction-diffusion equations with phenotypic structuring [7, 8], where cells are assumed to undergo random, undirected movement and grow logistically to some maximum capacity, similar to the classical Fisher-KPP model [9, 10]. It is often observed experimentally that individual cells are either proliferative or motile [11], but not both [12], representing a trade-off known as the ‘go-or-grow’ hypothesis [13, 14]. Numerous mathematical models have ∗ Corresponding author. Email addresses: rebecca.crossley@maths.ox.ac.uk (Rebecca M. Crossley), kevin.painter@polito.it (Kevin J. Painter), tommaso.lorenzi@polito.it (Tommaso Lorenzi), philip.maini@maths.ox.ac.uk (Philip K. Maini), ruth.baker@maths.ox.ac.uk (Ruth E. Baker) Preprint submitted to Elsevier January 17, 2024" 2401.07287v1,"Generation of Flying Logical Qubits using Generalized Photon Subtraction with Adaptive Gaussian Operations Kan Takase, 1, 2 Fumiya Hanamura, 1 Hironari Nagayoshi, 1 J. Eli Bourassa, 3 Rafael N. Alexander, 3 Akito Kawasaki, 1 Warit Asavanant, 1, 2 Mamoru Endo, 1, 2 and Akira Furusawa 1, 2, ∗ 1 Department of Applied Physics, School of Engineering, The University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656, Japan 2 Optical Quantum Computing Research Team, RIKEN Center for Quantum Computing, 2-1, Hirosawa, Wako, 351-0198, Tokyo, Japan † 3 Xanadu, ON, M5G 2C8, Canada (Dated: January 17, 2024) The generation of a logical qubit called the Gottesman-Kitaev-Preskill qubit in an optical traveling wave is a major challenge for realizing large-scale universal fault-tolerant optical quantum computers. Recently, probabilistic generation of elementary GKP qubits has been demonstrated using photon number measurements and homodyne measurements. However, the generation rate is only a few Hz, and it will be difficult to generate faulttolerant GKP qubits at a practical rate unless success probability is significantly improved. Here, we propose a method to efficiently synthesize GKP qubits from several quantum states by adaptive Gaussian operations. In the initial state preparation that utilizes photon number measurements, an adaptive operation allows any measurement outcome above a certain threshold to be considered as a success. This threshold is lowered by utilizing the generalized photon subtraction method. The initial states are synthesized into a GKP qubit by homodyne measurements and a subsequent adaptive operation. As a result, the single-shot success probability of generating fault-tolerant GKP qubits in a realistic scale system exceeds 10%, which is one million times better than previous methods. This proposal will become a powerful tool for advancing optical quantum computers from the proof-of-principle stage to practical application. I. INTRODUCTION Quantum computers are expected to demonstrate superior information processing capabilities compared to conventional computers by incorporating quantum phenomena such as superposition and entanglement. Applications of quantum computers include factoring, discrete optimization, quantum simulation, machine learning, and are anticipated to be used in fields such as finance, drug discovery, materials, and logistics [1]. Quantum computers that use optical traveling waves [2, 3] can operate at room temperature and atmospheric pressure, achieving a clock frequency exceeding THz [4, 5]. In addition to the quantum applications mentioned above, quantum computers based on optical traveling waves are well-suited for communication technology [6, 7]. So, how far has the development of optical quantum computers progressed, and what are the challenges? Firstly, a scalable and programmable processor capable of performing measurement-based quantum gates has been experimentally demonstrated [8–10]. One advantage of the optical approach is its ability to address scalability, a major challenge in other physical systems. While the clock frequency of the processors demonstrated so far is at most on the order of 10 MHz [11], there is a prospect of improvement to the order of 10 GHz through noiseless optical amplification technology [12]. However, the quantum advantage in information processing using these processors has not yet been demonstrated. A promising way to achieve practical quantum computation with universality and fault-tolerance is via Gottesman-Kitaev-Preskill ∗ akiraf@ap.t.u-tokyo.ac.jp † takase@ap.t.u-tokyo.ac.jp (GKP) qubits [13]. Once GKP Pauli eigenstates and magic states are prepared, only passive linear optics and homodyne measurement are needed [13–17]. Making such advanced optical quantum states available is an urgent challenge for optical quantum computers. GKP qubits belong to a class of states called non-Gaussian states. There are two typical methods for generating non- Gaussian states in propagating light. One is a method that utilizes the nonlinear interaction of light with matter or with light. The other is a method that utilizes quantum entanglement and measurements, known as the heralding method. In particular, one can prepare multimode entangled Gaussian states deterministically and employ non-Gaussian measurements such as photon number measurements on a subset of modes to herald non-Gaussian states on the remaining modes. In the former method, there is a problem that the nonlinearity of the optical traveling wave is inherently weak. Although methods like cavity quantum electrodynamics (QED) and quantum dots have achieved the generation of single photons [18] or Schrödinger cat states [19], more advanced matterlight coupling and control are required for generating more complex states. Another challenging but interesting direction is converting non-Gaussian states generated in harmonic oscillators in other physical platforms such as trapped ions [20] and superconducting circuits [21], where strong nonlinearity is easy to use, into optical traveling waves [22, 23]. However, methods that use matter tend to slow down the generation protocol, and they are not suitable for the high clock frequencies of optical quantum computers. In this regard, methods using light-light coupling have an advantage [24, 25], but whether practical nonlinearities can be achieved awaits experimental demonstration. On the other hand, the heralding method is more feasible and widely used for generating" 2401.07295v1,"θ-Lebesgue spaces Shouvik Datta Choudhury ∗ Gapcrud Private Limited (Capsule Labs) HA 130, Saltlake, Sector III, Bidhannagar, Kolkata - 700097, India January 17, 2024 Abstract Traditional L p spaces are fundamental in functional analysis, demarcated by the relationship 1/p + 1/q = 1. This research pioneers the concept of θ-Lebesgue space, stemming from a simultaneous weakening of both the classical L p relation and its θ-variant, 1/(θ(p)) + 1/(θ(q)) = 1. This conceptual shift addresses a gap in existing mathematical frameworks, aiming to create a space that may encompasses a broader range of mathematical purpose. The primary objective is to rigorously demarcate the θ-Lebesgue space within this new context, explore its foundational properties, and articulate its theoretical significance in the realm of functional analysis. The focus is on establishing the theoretical underpinnings and potential implications of this generalized space. Adopting a detailed analytical methodology, this paper demarcates the θ-Lebesgue space under the relaxed conditions. It examines its normative and topological properties, and how these properties differentiate from and extend beyond traditional L p spaces. The study involves a deep dive into the space’s inherent theory and its implications for functional analysis.The paper reveals that the dual relaxation of L p space relations leads to a unique set of properties within the θ-Lebesgue space. Notably, it presents a generalized form of Hölder’s inequality and explores the nuanced aspects of duality and reflexivity in this new context. The space’s convergence and completeness properties are also investigated, revealing differences from classical norm. The introduction of θ-Lebesgue space, under these weakened conditions, may represent a significant theoretical advancement in functional analysis. It aims to extend the boundaries of what constitutes a functional space. The establishment of the θ-Lebesgue space under dual weakened conditions may offer a more inclusive and flexible framework for mathematical exploration. This theoretical advancement may enrich the discipline, paving the way for new mathematical theories and deepening our understanding of the complexities within functional spaces. MSC 2020: • 46Bxx - Normed linear spaces and Banach spaces • 46B20 - Geometry and structure of normed linear spaces • 46E30 - Spaces of measurable functions (Lp-spaces, Orlicz spaces, Kthe function spaces, Lorentz spaces, rearrangement invariant spaces, ideal spaces, etc.) • 26Dxx - Inequalities • 26D10 - Inequalities involving derivatives and differential and integral operators • 26D15 - Inequalities for sums, series and integrals ∗ shouvikdc8645@gmail.com, shouvik@capsulelabs.in 1" 2401.07296v1,"Alternative solvents for life: framework for evaluation, current status and future research William Bains 1,2,* , Janusz J. Petkowski 1,3,4 , Sara Seager 1,5,6 1 Department of Earth, Atmospheric and Planetary Sciences, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, MA, 02139, USA 2 School of Physics & Astronomy, Cardiff University, 4 The Parade, Cardiff CF24 3AA, UK. 3 Faculty of Environmental Engineering, Wroclaw University of Science and Technology, 50- 370 Wroclaw, Poland 4 JJ Scien�fic, Mazowieckie, 02-792 Warsaw, Poland 5 Department of Physics, Massachusetts Institute of Technology, 77 Massachusetts Avenue., Cambridge, MA 02139, USA 6 Department of Aeronautics and Astronautics, Massachusetts Institute of Technology, 77 Massachusetts Avenue., Cambridge, MA 02139, USA * correspondence: William Bains: bains@mit.edu Abstract Life is a complex, dynamic chemical system that requires a dense fluid solvent in which to take place. A common assumption is that the most likely solvent for life is liquid water, and some researchers argue that water is the only plausible solvent. However a persistent theme in astrobiological research postulates that other liquids might be cosmically common, and could be solvents for the chemistry of life. In this paper we present a new framework for the analysis of candidate solvents for life, and deploy this framework to review substances that have been suggested as solvent candidates. Our approach addresses all the requirements for a solvent, not just single chemical properties, and does so semiquantitatively. Only the protonating solvents fulfil all the chemical requirements to be a solvent for life, and of those only water and concentrated sulfuric acid are also likely to be abundant in a rocky planetary context. Among the non-protonating solvents liquid CO 2 stands out as a planetary solvent, and its potential as a solvent for life should be explored. We conclude with a discussion of whether it is possible for a biochemistry to change solvents, as an adaptation to radical changes in a planet’s environment. Our analysis provides the basis for prioritizing future experimental work exploring potential complex chemistry on other planets." 2401.07313v1,"Score-matching neural networks for improved multi-band source separation Matt L. Sampson a , Peter Melchior a,b , Charlotte Ward a , Sufia Birmingham a a Department of Astrophysical Sciences, Princeton University, Princeton, 08544, NJ, USA b Center for Statistics and Machine Learning, Princeton University, Princeton, 08544, NJ, USA Abstract We present the implementation of a score-matching neural network that represents a data-driven prior for nonparametric galaxy morphologies. The gradients of this prior can be included in the optimization routine of the recently developed multi-band modeling framework scarlet2, a redesign of the scarlet method currently employed as deblender in the pipelines of the HyperSuprimeCam survey and the Rubin Observatory. The addition of the prior avoids the requirement of non-differentiable constraints, which can lead to convergence failures we discovered in scarlet. We present the architecture and training details of our score-matching neural network and show with simulated Rubin-like observations that scarlet2 outperforms scarlet in accuracy of total flux and morphology estimates, while maintaining excellent performance for colors. We also demonstrate significant improvements in the robustness to inaccurate initializations. scarlet2 is written in python, extendend by jax and equinox, and is fully GPU compatible. The implementation and data package of the score model are publicly available at https://github.com/pmelchior/scarlet2. Keywords: methods: machine learning, data analysis, techniques: image processing 1. Introduction Upcoming astronomical surveys will produce huge amounts of data, with current estimates for the Rubin Observatory Legacy Survey of Space and Time (LSST; Ivezić et al., 2019) yielding on the order of 10 billion galaxies. This vast amount of data is meant to greatly reduce the statistical uncertainty of cosmological and astrophysical parameters. LSST specifically covers about half the sky to a limiting magnitude of i ≈ 27. While detecting and measuring more faint and distant galaxies than ever before, this sensitivity increase will also drastically increase the occurrence of overlap between neighboring sources, a systematic effect known as blending. Galaxy blending has already been shown to affect up to 60% of galaxies in the Hyper- Suprime Cam (HSC) wide survey (Bosch et al., 2018) that has a limiting magnitude of i ≈ 26. Blending thus constitutes a leading systematic issue in gravitational lensing and galaxy clustering studies (Mandelbaum, 2018; Melchior et al., 2021; Nourbakhsh et al., 2022). Therefore, accurate and computationally efficient deblending of galaxies, or an effective calibration Email addresses: matt.sampson@princeton.edu (Matt L. Sampson ), peter.melchior@princeton.edu (Peter Melchior ) Preprint submitted to Astronomy and Computing scheme that captures the effects of blending (MacCrann et al., 2022), is crucial to allow us to maximize the value of upcoming astronomical surveys. We pursue the former approach so as to minimize the efforts that may still be required for the latter. There are a variety of publicly available deblending codes, including SExtractor (Bertin and Arnouts, 1996), the SDSS deblender (Lupton, 2005) and muscadet (Joseph et al., 2016), and scarlet (Melchior et al., 2018). Methods based on neural network, usually trained on simulated or reliably unblended galaxies, have recently also shown good performance (e.g. Reiman and Göhre, 2019; Burke et al., 2019; Boucaud et al., 2020; Arcelin et al., 2021; Hemmati et al., 2022; Wang et al., 2022). In this work, we combine the strengths of the scarlet method, which is currently implemented in the pipelines for HSC and LSST, with the flexibility of neural networks. We describe the motivation for this change as well as the neural network architecture we choose in Section 2. In Section 3 we demonstrate the capability of the neural network to represent galaxy morphologies. We compare the performance of scarlet and with the neural-network enhanced scarlet2 on real and simulated data in Section 4, and summarize our findings in Section 5. January 17, 2024" 2401.07341v1,"Binary weights spanning trees and the k-red spanning tree problem in linear time Dorit S. Hochbaum ∗ Abstract We address here spanning tree problems on a graph with binary edge weights. For a general weighted graph the minimum spanning tree is solved in super-linear running time, even when the edges of the graph are pre-sorted. A related problem, of finding a spanning tree with a prespecified sum of weights, is NP-hard. In contrast, for a graph with binary weights associated with the edges, it is shown that the minimum spanning tree and finding a spanning tree with a given total sum, are solvable in linear time with simple algorithms. 1 Introduction We address here binary weights spanning tree problems. A given undirected graph has binary weights associated with the edges. One of the problems is to find a minimum or maximum weight spanning tree. For general weights, there are a number of minimum (or maximum) spanning tree algorithms, all of which have super-linear running times, even when the edges of the graph are pre-sorted. On the other hand, when all the edge weights are equal, to 1, then any search tree in the connected graph, a DFS or BFS trees, are found in linear time in the number of edges. We show here, that the binary weights spanning tree, as well as the k-red spanning tree are solved in the same complexity as a spanning trees in unweighted graphs. The study here is motivated by a simple problem I have recently included in a take-home final exam. Given a connected graph G = (V, E) and a partition of E into E r ∪ E b where E r are red edges and E b are blue edges. Let |V | = n, |E| = m, |E r | = m r , and |E b | = m b . The k-red spanning tree problem has two versions: One is to determine whether there exists a spanning tree in G that has exactly k red edges; the second version is to construct a k-red spanning tree if one exists. It appears that various writings, found online, on the k-red spanning tree problem confuse these two problems. Further, the typically offered solution, described below, requires the generation of minimum spanning trees for existence, and applying exchange operations to generate the k-red spanning tree. Without sophisticated data structures, the exchange operations require quadratic time O(n 2 ) and even with advanced data structures the known approaches require more than linear time. It is shown here that the existence and construction of k-red spanning tree are both solved in linear time, as well as the generation of minimum (or maximum) spanning tree. ∗ Department of Industrial Engineering and Operations Research, University of California, Berkeley, email: dhochbaum@berkeley.edu. Research supported in part by AI institute NSF award 2112533. 1" 2401.07353v1,"Towards Engineering Fair and Equitable Software Systems for Managing Low-Altitude Airspace Authorizations Usman Gohar Michael C. Hunter Agnieszka Marczak-Czajka Iowa State University Ames, Iowa, USA ugohar@iastate.edu Iowa State University Ames, Iowa, USA mchunter@iastate.edu University of Notre Dame South Bend, Indiana, USA amarczak@nd.edu Robyn R. Lutz Myra B. Cohen Jane Cleland-Huang Iowa State University Ames, Iowa, USA rlutz@iastate.edu Iowa State University Ames, Iowa, USA mcohen@iastate.edu University of Notre Dame South Bend, Indiana, USA janehuang@nd.edu ABSTRACT GENERAL ABSTRACT Small Unmanned Aircraft Systems (sUAS) have gained widespread adoption across a diverse range of applications. This has introduced operational complexities within shared airspaces and an increase in reported incidents, raising safety concerns. In response, the U.S. Federal Aviation Administration (FAA) is developing a UAS Traffic Management (UTM) system to control access to airspace based on an sUAS’s predicted ability to safely complete its mission. However, a fully automated system capable of swiftly approving or denying flight requests can be prone to bias and must consider safety, transparency, and fairness to diverse stakeholders. In this paper, we present an initial study that explores stakeholders’ perspectives on factors that should be considered in an automated system. Results indicate flight characteristics and environmental conditions were perceived as most important but pilot and drone capabilities should also be considered. Further, several respondents indicated an aversion to any AI-supported automation, highlighting the need for full transparency in automated decision-making. Results provide a societal perspective on the challenges of automating UTM flight authorization decisions and help frame the ongoing design of a solution acceptable to the broader sUAS community. Small Unmanned Aircraft Systems (sUAS), also called drones, are becoming increasingly popular due to their usefulness in applications such as emergency response, remote sensing, agriculture, and package delivery, as well as with hobbyists. With the rise of sUAS operations, there has been an inevitable corresponding rise in the number of incidents, such as crashes or airspace infringements with other aircraft or in no-fly zones. For example, a package delivery drone should not interfere with airplanes or first-responder drones. Developing, validating, and deploying an automated system to approve or reject such sUAS flight requests is a complex, multifaceted process that ultimately must balance competing concerns, including safety, transparency, and fairness to diverse stakeholders. This paper reports results from an initial survey we conducted with remote sUAS pilots, emergency responders, and members of the general public. The survey elicited their opinions about factors they perceive to be important in an automated authorization decision process. Survey results show that flight characteristics and environmental conditions were perceived as most important and that pilot and drone capabilities should also be considered. These results open up communication and help inform the human aspects inherent in the design and acceptance of such an automated system. CCS CONCEPTS • Software and its engineering → Requirements analysis. KEYWORDS Drones, sUAS, fairness, machine learning, software engineering ACM Reference Format: Usman Gohar, Michael C. Hunter, Agnieszka Marczak-Czajka, Robyn R. Lutz, Myra B. Cohen, and Jane Cleland-Huang. 2024. Towards Engineering Fair and Equitable Software Systems for Managing Low-Altitude Airspace Authorizations. In Software Engineering in Society (ICSE-SEIS’24), April 14– 20, 2024, Lisbon, Portugal. ACM, New York, NY, USA, 12 pages. https://doi. org/10.1145/3639475.3640103 Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). ICSE-SEIS’24, April 14–20, 2024, Lisbon, Portugal © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0499-4/24/04. https://doi.org/10.1145/3639475.3640103 1 INTRODUCTION The deployment of small Unmanned Aircraft Systems (sUAS) within the US National Airspace has seen dramatic growth with applications such as remote sensing, package delivery, and emergency response [4, 27, 56]. These operations are conducted in airspace shared with other sUASs’ and constrained by no-fly zones such as airports, national parks, and schools. The rapid escalation in sUAS numbers has been accompanied by a corresponding surge in reported incidents, often attributed to issues such as hardware or software malfunctions, human errors, including reckless disregard for rules and regulations, or external factors such as radio interference and adverse weather conditions [4, 28]. Consequently, sUAS operators must seek permission to fly in all controlled airspace. For example, in the USA, Remote Pilots In Command (RPICs) must currently request flight permission through the Low Altitude Authorization and Notification Capability (LAANC), which grants access to airspace below 400 feet AGL (above ground level), provides awareness for where RPICs can and cannot fly, and provides" 2401.07358v1,"Harnessing Machine Learning for Discerning AI-Generated Synthetic Images Final Project - CS 5785 Applied Machine Learning (2023FA) Yuyang Wang Yizhi Hao Amando Xu Cong Cornell University, USA {yw2545}@cornell.edu Cornell University, USA {yz2222}@cornell.edu Cornell University, USA {ax45}@cornell.edu Abstract—In the realm of digital media, the advent of AI- generated synthetic images has introduced significant challenges in distinguishing between real and fabricated visual content. These images, often indistinguishable from authentic ones, pose a threat to the credibility of digital media, with potential implications for disinformation and fraud. Our research addresses this challenge by employing machine learning techniques to discern between AI-generated and genuine images. Central to our approach is the CIFAKE dataset, a comprehensive collection of images labeled as “Real” and “Fake”. We refine and adapt advanced deep learning architectures like ResNet, VGGNet, and DenseNet, utilizing transfer learning to enhance their precision in identifying synthetic images. We also compare these with a baseline model comprising a vanilla Support Vector Machine (SVM) and a custom Convolutional Neural Network (CNN). The experimental results were significant, demonstrating that our optimized deep learning models outperform traditional methods, with DenseNet achieving an accuracy of 97.74%. Our application study contributes by applying and optimizing these advanced models for synthetic image detection, conducting a comparative analysis using various metrics, and demonstrating their superior capability in identifying AI-generated images over traditional machine learning techniques. This research not only advances the field of digital media integrity but also sets a foundation for future explorations into the ethical and technical dimensions of AI-generated content in digital media. I. I NTRODUCTION AND M OTIVATION The proliferation of AI-generated synthetic images poses a significant challenge, blurring the lines between reality and digital fabrication. These images, such as the one shown in Figure 1, often indistinguishable from authentic ones, threaten the credibility of digital content and could potentially be exploited for disinformation and fraud. Addressing this issue is not just a technological challenge but a critical step towards preserving the integrity of digital media. Our study is an application project aiming to employ machine learning techniques to efficiently differentiate between AI-generated and genuine images. Central to our methodology is the CIFAKE dataset [1], exemplified in Figure 2, a comprehensive collection of images categorized as “Real” and “Fake”. This dataset is used for training and testing our models. Our approach includes refining advanced deep learning architectures such as ResNet, VGGNet, and DenseNet through transfer learning. Each of these models, renowned for their effectiveness in image classification tasks, is adapted through transfer learning to suit our specific challenge. This process allows us to capitalize on the strengths of these Figure 1. AI-generated Image of Pope Francis pre-trained models, enhancing their precision and efficiency in identifying synthetic images. Additionally, we trained a vanilla method of Support Vector Machine (SVM) and designed a custom Convolutional Neural Network (CNN) to serve as baseline comparisons. These methods allow us to benchmark the efficiency and accuracy of our models in distinguishing synthetic images. Our study is distinguished by several key contributions: • Application and optimization of advanced deep learning architectures (ResNet, VGGNet, DenseNet) for synthetic image detection. • Development and training of a vanilla SVM and a custom CNN model as baseline methodologies. • Conducting a comparative analysis of our models against existing methods using metrics such as accuracy, precision, recall, and F1-score. • Demonstrating the enhanced capability of our optimized models in identifying AI-generated images, surpassing traditional machine learning techniques. II. B ACKGROUND A. Importance of Distinguishing Real from Fake The ability to discern real images from AI-generated ones is not just a technical challenge; it has broader implications for society[2]. In an era where visual content plays a crucial role in shaping public opinion and personal beliefs, the reliability" 2401.07367v1,"Active Learning for NLP with Large Language Models Xuesong Wang Department of Electrical and Computer Engineering Wayne State University Detroit, MI, USA xswang@wayne.edu Abstract—Human annotation of training samples is expensive, laborious, and sometimes challenging, especially for Natural Language Processing (NLP) tasks. To reduce the labeling cost and enhance the sample efficiency, Active Learning (AL) technique can be used to label as few samples as possible to reach a reasonable or similar results. To reduce even more costs and with the significant advances of Large Language Models (LLMs), LLMs can be a good candidate to annotate samples. This work investigates the accuracy and cost of using LLMs (GPT-3.5 and GPT-4) to label samples on 3 different datasets. A consistencybased strategy is proposed to select samples that are potentially incorrectly labeled so that human annotations can be used for those samples in AL settings, and we call it mixed annotation strategy. Then we test performance of AL under two different settings: (1) using human annotations only; (2) using the proposed mixed annotation strategy. The accuracy of AL models under 3 AL query strategies are reported on 3 text classification datasets, i.e., AG’s News, TREC-6, and Rotten Tomatoes. On AG’s News and Rotten Tomatoes, the models trained with the mixed annotation strategy achieves similar or better results compared to that with human annotations. The method reveals great potentials of LLMs as annotators in terms of accuracy and cost efficiency in active learning settings. Index Terms—natural language processing, large language model, active learning, annotation I. I NTRODUCTION Supervised deep learning requires a large amount of ground truth labels. Usually the samples are labeled by humans. However, annotation by human annotators is expensive, laborious, and sometimes challenging, which is especially true in Natural Language Processing (NLP) systems [1]–[3]. On Google Cloud Platform 1 , the text classification labeling costs for 1000 units (50 words per unit) $129 in Tier 1 and $90 for Tier 2. In [3], the authors assumes $0.11 per 50 tokens, and I will follow the same estimates in this work. To reduce the labeling cost and enhance the sample efficiency, Active Learning (AL) technique can be utilized, assuming not all samples are equal [1]. AL algorithms start the model training using a few initially labeled samples, iteratively select most representative and(or) informative samples to be labeled by annotator, add the newly-labeled samples into the This is the project report for ECE 7500 at Wayne State University for Fall 2023 semester. 1 https://cloud.google.com/ai-platform/data-labeling/pricing training set to continue training or train from scratch, and stop until stopping criteria is met. It can achieve similar or even better results compared to passive training which trains the model using the entire training set [2], but the labeling cost is much lower. To reduce the annotation cost, some researchers have proposed to use Large Language Models (LLMs), e.g., GPT-3, to label the instances thanks to the few-shot (in-context) learning capability of LLMs [3]. It costs 50% to 96% less to use labels from GPT-3 than using labels from humans to reach the same performance on multiple NLU and NLG tasks [3]. It is found that data labeled by GPT-3 is usually more noisy than human-labeled data, and the authors in [3] use the confidence score of GPT-3 API to measure the uncertainty of the model output. If the output confidence score is low, the sample will be labeled by human instead. As a result, the samples that labeled by GPT-3 and humans are combined to train the model to achieve a better performance with the limited labeling budget. When using LLMs to label the instances, the demonstration in the prompt plays an important role in the accuracy of the annotation. Authors of [4] investigated effects of the number of examples in the demonstration and the strategies to select examples. In order to explore the performance of using latest LLMs to label instances for AL in order to reduce even more costs of labeling, this paper utilizes GPT-3.5 and GPT-4 to label training samples. Two sets of experiments are designed. First, GPT-3.5 and GPT-4 are utilized to label samples in 3 datasets using different number of examples in the demonstration and different demonstration example selection strategies. Because the GPT-3.5 and GPT-4 APIs do not have the confidence score output parameter anymore, a consistency-based strategy is proposed to find the samples that the GPT-3.5 or GPT-4 is not confident in. The annotation accuracy, actual cost and the inconsistency rate are reported. The second set of experiments are using GPT-3.5 in AL experiments. For those samples that GPT-3.5 are uncertain, we use human annotations; the GPT-3.5 annotations are used for the rest of the samples. We report the accuracy of AL experiments and compare the model performance between the models using human annotations only and mixed annotations. The paper is organized as follows: the related literature is" 2401.07378v2,"Guangyu Meng * 1 , Ruyu Zhou * 2 , Liu Liu 1 , Peixian Liang 1 , Fang Liu 2 , Danny Chen 1 , Michael Niemier 1 , X. Sharon Hu 1 1 Department of Computer Science and Engineering, University of Notre Dame, 2 Department of Applied and Computational Mathematics and Statistics, University of Notre Dame {gmeng, rzhou2, lliu24, pliang, fang.liu.131, dchen, shu}@nd.edu Abstract 110 Exact EMD [12] 105 25 Execution Time (s) Efficient approximation of Earth Mover’s Distance Based on Nearest Neighbor Search Earth Mover’s Distance (EMD) is an important similarity measure between two distributions, used in computer vision and many other application domains. However, its exact calculation is computationally and memory intensive, which hinders its scalability and applicability for largescale problems. Various approximate EMD algorithms have been proposed to reduce computational costs, but they suffer lower accuracy and may require additional memory usage or manual parameter tuning. In this paper, we present a novel approach, NNS-EMD, to approximate EMD using Nearest Neighbor Search (NNS), in order to achieve high accuracy, low time complexity, and high memory efficiency. The NNS operation reduces the number of data points compared in each NNS iteration and offers opportunities for parallel processing. We further accelerate NNS-EMD via vectorization on GPU, which is especially beneficial for large datasets. We compare NNS-EMD with both the exact EMD and state-of-the-art approximate EMD algorithms on image classification and retrieval tasks. We also apply NNS-EMD to calculate transport mapping and realize color transfer between images. NNS-EMD can be 44× to 135× faster than the exact EMD implementation, and achieves superior accuracy, speedup, and memory efficiency over existing approximate EMD methods. ACT [3] 20 M3S [8] 15 10 5 0 65 Flowtree [4] 70 Diffusion [37] 80 H-SWD [26] 85 90 NNS-EMD (Proposed) 95 100 Accuracy (%) Figure 1. Execution time versus classification accuracy among exact EMD and SOTA approximate EMD algorithms for the MNIST dataset [19]. processing [16, 42]. It has been widely adopted for formulating distances due to its flexibility in measuring similarities, even between two datasets of different sizes [16, 23]. Although EMD offers highly accurate similarity measurements, computing the exact EMD relies on linear programming (LP)-based algorithms, such as the Hungarian method [15], the auction algorithm [1], and network simplex [41]. These LP methods are numerically robust but still face significant challenges: (i) computationally intensive LP-based implementations [16], which can incur O(n 3 log n) time complexity [36]; (ii) the need to store the results of exhaustive comparisons between data points, which can incur high memory footprints [24]. Both challenges constrain the exact EMD from being applicable to many applications that require fast response for large-scale data (e.g., visual tracking [47], online image retrieval [44]). A variety of approximate algorithms for EMD have been proposed to address the high computational overhead of computing the exact EMD [3, 4, 16–18, 26, 27, 37]. Some algorithms employ pre-defined data structures (e.g., trees or graphs) to store entire datasets offline [4, 17, 18, 37]. Leveraging auxiliary data structures, these algorithms can achieve linear time complexity at the expense of additional memory space and lower accuracy. Other types of EMD approxi- 1. Introduction Earth Mover’s Distance (EMD) was first proposed to quantify the similarity of images [33]. In the theory of Optimal Transport (OT) [40], EMD is also known as the Kantorovich or Wasserstein-1 distance, and has gained increasing attention in various domains, such as generative modeling of images [2, 32], the representation of 3D point clouds [39, 48], and document retrieval in natural language * Equal contribution. 1" 2401.07391v1,"Ultra-broadband Optical Diffraction Tomography Martin Hörmann 1 , Franco V.A. Camargo 2 , Niek F. van Hulst 3,4 , Giulio Cerullo 1,2 , and Matz Liebel 3,5* 1 Dipartimento di Fisica, Politecnico di Milano, Piazza L. da Vinci 32, 20133 Milano, Italy 2 Istituto di Fotonica e Nanotecnologie-CNR, Piazza L. da Vinci 32, 20133 Milano, Italy 3 ICFO – Institut de Ciencies Fotoniques, The Barcelona Institute of Science and Technology, Av. Carl Friedrich Gauss, 3, 08860 Castelldefels, Barcelona, Spain 4 ICREA – Institució Catalana de Recerca i Estudis Avançats, Passeig Lluís Companys 23, 08010 Barcelona 5 Department of Physics and Astronomy, Vrije Universiteit Amsterdam, De Boelelaan 1081, Amsterdam, 1081 HV, The Netherlands *mail: m.liebel@vu.nl Abstract Optical diffraction tomography (ODT) is a powerful non-invasive 3D imaging technique, but its combination with broadband light sources is difficult. In this study, we introduce ultrabroadband ODT, covering over 150 nm of visible spectral bandwidth with a lateral spatial resolution of 150 nm. Our work addresses a critical experimental gap by enabling the measurement of broadband refractive index changes in 3D samples, a crucial information that is difficult to assess with existing methodologies. We present spectrally resolved ODT images of HeLa cells, obtained via pulse-shaping based Fourier transform spectroscopy. We, further, conduct comparative experiments using gold-nanoparticle incubated as well as non-incubated cells. The spectral observations enabled by ultrabroadband ODT, combined with material-dependent refractive index responses, allow for precise three-dimensional identification of the nanoparticles within cellular structures. Our work represents a crucial step towards spectrally and time-resolved tomography of complex 3D structures with implications for life and materials science applications." 2401.07395v1,"Harnessing the Power of Beta Scoring in Deep Active Learning for Multi-Label Text Classification Wei Tan 1 , Ngoc Dang Nguyen 1 , Lan Du 1 * , Wray Buntine 2 1 Faculty of IT, Monash University 2 VinUniversity wei.tan2@monash.edu, dan.nguyen2@monash.edu, lan.du@monash.edu, wray.buntine@vinuni.edu.vn Abstract Within the scope of natural language processing, the domain of multi-label text classification is uniquely challenging due to its expansive and uneven label distribution. The complexity deepens due to the demand for an extensive set of annotated data for training an advanced deep learning model, especially in specialized fields where the labeling task can be laborintensive and often requires domain-specific knowledge. Addressing these challenges, our study introduces a novel deep active learning strategy, capitalizing on the Beta family of proper scoring rules within the Expected Loss Reduction framework. It computes the expected increase in scores using the Beta Scoring Rules, which are then transformed into sample vector representations. These vector representations guide the diverse selection of informative samples, directly linking this process to the model’s expected proper score. Comprehensive evaluations across both synthetic and real datasets reveal our method’s capability to often outperform established acquisition techniques in multi-label text classification, presenting encouraging outcomes across various architectural and dataset scenarios. Introduction Text classification is an essential task in natural language processing (NLP) with various applications, including sentiment analysis and topic classification (Allaouzi and Ben Ahmed 2019; Koßmann, Wilhelm, and Fink 2021). While deep learning has significantly improved multi-class text classification, yet its sub-task, multi-label text classification (MLTC), presents unique challenges. In MLTC, samples can be assigned multiple labels, navigating a vast, sparse label space with unresolved complexities (Liu et al. 2017; Wei and Li 2020). For every multi-label instance, the determination of appropriate labels adds to the intricacies and costs of annotation, making it even more resourceintensive than single-label learning. The increased demand for data becomes especially evident in specialized sectors, like the medical field, where domain-specific expertise and privacy considerations are crucial (Bustos et al. 2020). Recently, active learning (AL) has been explored as a promising solution to MLTC’s data scarcity issue, focusing on the * Corresponding author. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. annotation of the most informative instances. However, a comprehensive AL framework for MLTC, which robustly tackles imbalanced label distributions, has yet to be fully realized (Cherman et al. 2019; Wu et al. 2020). In spite of these challenges, MLTC remains a critical task in NLP with diverse practical applications. AL can alleviated the complexities MLTC, primarily due to its capacity to identify high-information samples, which subsequently optimizes human annotation and enhances model performance (Reyes, Morell, and Ventura 2018; Wu et al. 2020). Binary Relevance (BR) plays a key role in MLTC for its ability to segment multi-label tasks into individual binary classifications, facilitating the inclusion of advanced classifiers like deep neural networks and support vector machines (SVMs) (Zhang et al. 2018). Inspired by BR’s framework, earlier work in multi-label active learning (MLAL) adopted standard SVMs to establish binary classifiers tailored to individual labels (Yang et al. 2009; Li and Guo 2013; Cherman et al. 2019). Contrary to the notion that BR overlooks label correlation, when paired with deep neural networks, label correlations are implicitly handled, addressing a critical aspect of multi-label classification (Su et al. 2021). However, this focus on label correlation should not overshadow another crucial aspect of MLTC: data imbalance. The skewed distribution of labels in many real-world datasets affects instance selection strategies, potentially biasing models towards frequent labels (Wu, Lyu, and Ghanem 2016). Therefore, recent studies, emphasize the need to explore the inherent properties of MLTC, especially label imbalance, as a pathway to enhance generalization performance, making it imperative to address this issue precisely (Zhang et al. 2018). In this paper, we propose a hybrid approach, named Beta Scoring Rules for Deep Active Learning (BESRA 1 ) that incorporates the Beta family of proper scoring rules within the Expected Loss Reduction (ELR) framework, applied to MLTC. Unlike expected loss used in other MLAL methods, BESRA pinpoints informative samples involving both uncertainty and diversity, drawing on expected score changes within a predictive model governed by the Beta scoring function. Through extensive experimentation on diverse ar- 1 Our implementation of BESRA can be downloaded from https://github.com/davidtw999/BESRA." 2401.07401v1,"Design-Based Estimation and Central Limit Theorems for Local Average Treatment Effects for RCTs November 2023 Peter Z. Schochet, Ph.D. (Corresponding Author) Senior Fellow, Associate Director Mathematica P.O. Box 2393 Princeton, NJ 08543-2393 USA Phone: (609) 936-2783 pschochet@mathematica-mpr.com" 2401.07422v1,"1 Multiperson Detection and Vital-Sign Sensing Empowered by Space-Time-Coding RISs Xinyu Li, Member, IEEE, Jian Wei You, Senior Member, IEEE, Ze Gu, Qian Ma, Member, IEEE, Jingyuan Zhang, Long Chen, and Tie Jun Cui, Fellow, IEEE Abstract—Passive human sensing using wireless signals has attracted increasing attention due to its superiorities of non-contact and robustness in various lighting conditions. However, when multiple human individuals are present, their reflected signals could be intertwined in the time, frequency and spatial domains, making it challenging to separate them. To address this issue, this paper proposes a novel system for multiperson detection and monitoring of vital signs (i.e., respiration and heartbeat) with the assistance of space-time-coding (STC) reconfigurable intelligent metasurfaces (RISs). Specifically, the proposed system scans the area of interest (AoI) for human detection by using the harmonic beams generated by the STC RIS. Simultaneously, frequencyorthogonal beams are assigned to each detected person for accurate estimation of their respiration rate (RR) and heartbeat rate (HR). Furthermore, to efficiently extract the respiration signal and the much weaker heartbeat signal, we propose an improved variational mode decomposition (VMD) algorithm to accurately decompose the complex reflected signals into a smaller number of intrinsic mode functions (IMFs). We build a prototype to validate the proposed multiperson detection and vital-sign monitoring system. Experimental results demonstrate that the proposed system can simultaneously monitor the vital signs of up to four persons. The errors of RR and HR estimation using the improved VMD algorithm are below 1 RPM (respiration per minute) and 5 BPM (beats per minute), respectively. Further analysis reveals that the flexible beam controlling mechanism empowered by the STC RIS can reduce the noise reflected from other irrelative objects on the physical layer, and improve the signal-to-noise ratio of echoes from the human chest. Index Terms—Radio-frequency-based multiperson sensing, contactless physiological sensing, space-time-coding, reconfigurable intelligent surface (RIS), variational mode decomposition (VMD). I. I NTRODUCTION Vital signs are critical indicators for assessing an individual’s general health state and identifying various diseases. Xinyu Li, Jian Wei You, Ze Gu, Qian Ma, Jingyuan Zhang, Long Chen, and Tie Jun Cui are with the State Key Laboratory of Millimeter Wave, Southeast University, Nanjing 210096, China (E-mail: {xinyuli, jvyou, guze, maqian, zhangjingyuan, 220220703, tjcui}@seu.edu.cn). (Corresponding author: Jian Wei You). This work was supported in part by the National Key Research and Development Program of China under Grant 2023YFB3813100, in part by the Postdoctoral Innovation Talents Support Program under Grant BX20230066, in part by the Jiangsu Planned Projects for Postdoctoral Research Fund under Grant 2023ZB318, in part by the National Natural Science Foundation of China under Grant 62288101, 6504009769, 62101124, 62371131, and 62371132, in part by the Natural Science Foundation of Jiangsu Province under Grant BK20230820 and BK20210209, in part by Fundamental Research Funds for the Central Universities under Grant 2242023K5002, in part by the China Postdoctoral Science Foundation under Grant 2021M700761 and 2022T150112, and in part by the Start-up Research Fund of Southeast University under Grant RF1028623244. For instance, vital signs could be employed for sleep quality estimation and further diagnosing sleep apnea [1], [2]. The monitoring of respiration aids in the initial diagnosis of asthma [3]. Traditional vital-sign monitoring utilizes Photoplethysmography (PPG) and Electrocardiogram (ECG) sensors to measure human respiration rate (RR) and heartbeat rate (HR) [4]. Nevertheless, these sensors need to be worn and may impose a burden on the subjects. Alternatively, wireless signals offer a contact-free and cost-effective solution for vital-sign monitoring, garnering significant interest recently [5]–[7]. vital-sign monitoring using wireless signals is realized by capturing the tiny variations in reflected signals (e.g., radio absorption, scattering, and polarization) caused by the chest movements of human individuals. Commonly employed mediums for wireless human sensing include WiFi and portable radar [8]. For instance, Ali et al. [9] quantified the dynamics of respiration and body motions on WiFi channel state information (CSI) data, and then proposed the respiration and bodymotion tracking algorithm to monitor sleeping vital signs. Liu et al. [10] adopted a frequency-modulated continuouswave (FMCW) millimeter-wave (mm-wave) radar for vitalsign monitoring. They introduced a zero-attracting sign exponentially forgetting least mean square (ZA-SEFLMS) algorithm to construct a high-resolution sparse spectrum, enabling accurate and reliable estimation of RR and HR. While current wireless signal-based vital-sign monitoring approaches have made significant strides, they are primarily suitable for single-person sensing. The extension of these methods to multi-person sensing presents notable challenges. Specifically, when there are multiple persons in the area of interest (AoI), there would be numerous multi-path components, introducing considerable interference to the echoes from the target individual. Furthermore, the signals reflected by different persons may be entangled together in the time, frequency and spatial domains, making it challenging to separate them. To deal with these challenges, Chian et al. [6] proposed a successive signal cancellation algorithm and employed a single-antenna, narrow-band Doppler radar to monitor the vial signs of multiple persons. Mercuri et al. [11] introduced the time-range-speed map to distinguish between different individuals, and extracted phase information in the corresponding range bins to separate the physiological signals of the detected persons. Meanwhile, Zheng et al. [12] leveraged the high temporal resolution of ultra-wideband impulse radio to effectively differentiate between multiple persons based on their relative distances. In this paper, we employ the space-time-coding (STC)" 2401.07432v1,"Parallel mechanical computing: Metamaterials that can multitask Mohamed Mousa 1 and Mostafa Nouh 1,2,* Decades after being replaced with digital platforms, analogue computing has experienced a surging interest following developments in metamaterials and intricate fabrication techniques. Specifically, wave-based analogue computers which impart spatial transformations on an incident wavefront, commensurate with a desired mathematical operation, have gained traction owing to their ability to directly encode the input in its unprocessed form, bypassing analogueto-digital conversion. While promising, these systems are inherently limited to single-task configurations. Their inability to concurrently perform multiple tasks, or compute in parallel, represents a major hindrance to advancing conceptual mechanical devices with broader computational capabilities. In here, we present a first attempt to simultaneously process independent computational tasks within the same architected structure. By breaking time invariance in a set of metasurface building blocks, multiple frequency-shifted beams are self-generated which absorb notable energy amounts from the fundamental signal. The onset of these tunable harmonics, enables distinct computational tasks to be assigned to different independent “channels”, effectively allowing an analogue mechanical computer to multitask. mechanical computing | metamaterial | acoustics | wave scattering M echanical computing refers to a form of computing where well-established mechanical mechanisms such as levers or fluidics carry out an intended operation (1). This form, which relies on both analogue (e.g., sliders, curved surfaces) and discrete mechanisms (e.g., gears, pinwheels), historically predates digital computing, and was used to conduct astronomical calculations (2), estimate tide heights (3), and even model the economy (4), long before digital computers appeared on the scene (5). Analogue computers in particular are those which exploit a continuous variation in a physical parameter (e.g., voltage or mechanical deformation) to perform a computation (6). In the modern era, they were effectively replaced by their digital counterparts which addressed the limitations of analogue computers, providing compact, noise-free and and high-speed computations. Over the past decade, however, analogue computing research regained impetus owing to recent advances in smart materials and engineered structures (i.e., metamaterials), combined with additive manufacturing and novel fabrication techniques (7, 8). Today’s generation of mechanical computers (MCs) propose novel ways to process bit abstraction and mechanical logic (9), and span a wide portfolio of mechanisms, including rotary joints (10), conductive polymers (11), bistable lattices (12), origami systems (13, 14), and various micro-mechanical elements (15). Tuned wave scattering in dispersive media, especially with the advent of engineered materials and waveguides, provides a rich platform for analogue computing (16). Understandably, the spurt of activity in wave-based computational metamaterials originated in photonic media, owing to ultrafast propagation speeds, potentially allowing analogue photonic computers to outpace digital electronics (17–23). In addition to operating at subwavelength scales due to small optical wavelengths, the analogue nature of these computers enables them to bypass analogue-to-digital conversion requirements which tend to consume significant energy (24). On the other hand, despite the inherently lower speeds of elastoacoustic waves, the value of integrating computational (25) and neuromorphic (26) functionality within a self-contained mechanical system has triggered a stream of new paradigms in the domain of wave-based analogue mechanical computers (AMCs), i.e., those which employ targetted scattering of elastic and acoustic waves to carry out a prescribed mathematical operation (27, 28). In remote or low access conditions, the ability to sustain a bare minimum of computational readiness is invaluable, especially for inputs which already exist in mechanical or vibroacoustic waveform. Example circumstances include elevated temperatures which are detrimental to electronic parts, ionizing radiation which trigger leakage currents, and 1 1 Author affiliations: Department. of Mechanical and Aerospace Engineering, University at Buffalo (SUNY), Buffalo, NY 14260-4400, USA; 2 Department. of Civil, Structural and Environmental Engineering, University at Buffalo (SUNY), Buffalo, NY 14260-4300, USA The authors declare no competing interest. * To whom correspondence should be addressed. E-mail: mnouh@buffalo.edu" 2401.07437v1,"ACCEPTTED BY IEEE TRANSACTIONS ON MEDICAL IMAGING 1 Yi Lin, Zeyu Wang, Dong Zhang, Member, IEEE, Kwang-Ting Cheng, Fellow, IEEE, and Hao Chen, Senior Foreground Pixels Member, IEEE Background Pixels e Ignor Index Terms—Weakly-supervised segmentation; nuclei image; partial point label; boundary mining; pixel affinity. I. I NTRODUCTION Histopathology slides contain a wealth of phenotypic information and play a vital role in cancer diagnosis, prognosis, and treatment [1]. Through the staining of agents such as hematoxylin and eosin, the tissue structure and nuclei morphology can be visualized and analyzed by pathologists, which is important or even sufficient for the diagnosis of many cancers. With the development of computational pathology, automatic analysis of H&E stained histopathology slides has become a hot topic in the field of medical image analysis, which can help pathologists reduce the workload and improve the efficiency of diagnosis. Nuclei segmentation is a critical step in the analysis of histopathology slides, and it serves as the basis for the subsequent analysis and management of the Y. Lin, Z. Wang, D. Zhang, and K.-T. Cheng are with the Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China. E-mail: {yi.lin, zwangek}@connect.ust.hk; {dongz, timcheng}@ust.hk; H. Chen is with the Department of Computer Science and Engineering and Department of Chemical and Biological Engineering, Hong Kong University of Science and Technology, Hong Kong, China. H. Chen is also affiliated with HKUST Shenzhen-Hong Kong Collaborative Innovation Research Institute, Futian, Shenzhen, China. E-mail: E-mail: jhc@cse.ust.hk Y. Lin and Z. Wang contribute equally; Corresponding author: H. Chen. nd rou g re re Fo Igno Positive Line Negative Line Ignored Line Foreground Pixels Background Pixels Ignored Pixels Ba ckg rou n Ign ore d Fo reg rou nd nd grou Fore Abstract—Nuclei segmentation is a fundamental prerequisite in the digital pathology workflow. The development of automated methods for nuclei segmentation enables quantitative analysis of the wide existence and large variances in nuclei morphometry in histopathology images. However, manual annotation of tens of thousands of nuclei is tedious and time-consuming, which requires significant amount of human effort and domain-specific expertise. To alleviate this problem, in this paper, we propose a weakly-supervised nuclei segmentation method that only requires partial point labels of nuclei. Specifically, we propose a novel boundary mining framework for nuclei segmentation, named BoNuS, which simultaneously learns nuclei interior and boundary information from the point labels. To achieve this goal, we propose a novel boundary mining loss, which guides the model to learn the boundary information by exploring the pairwise pixel affinity in a multiple-instance learning manner. Then, we consider a more challenging problem, i.e., partial point label, where we propose a nuclei detection module with curriculum learning to detect the missing nuclei with prior morphological knowledge. The proposed method is validated on three public datasets, MoNuSeg, CPM, and CoNIC datasets. Experimental results demonstrate the superior performance of our method to the state-of-the-art weakly-supervised nuclei segmentation methods. Code: https://github.com/hust-linyi/bonus. nd grou Back Ignored Pixels Fore grou nd Back grou nd Ignor e BoNuS: Boundary Mining for Nuclei Segmentation with Partial Point Labels Fig. 1: Illustration for boundary loss, where the boundary prediction can be supervised by pixel-affinity via multiple instance learning. tissue specimens and whole slide images [2]. For example, the nuclei segmentation results can be used to estimate the tumor cellularity, which is an important indicator for the prognosis of cancer patients [3]. Therefore, automatic nuclei segmentation methods have been widely studied and play an important role in the analysis of histopathology slides. Recent years have witnessed the tremendous success of deep learning in medical image segmentation [4-6]. However, as a data-hungry method, state-of-the-art deep learning methods for nuclei segmentation usually require a large number of annotated nuclei images. Manual annotation of nuclei images is time-consuming and labor-intensive, making it expensive and impractical for histopathology slide analysis. Further, with the annotation process continuing, manual annotation accuracy and speed will gradually decrease, due to the attention span and eye fatigue of the pathologists [7]. Weak annotations, such as bounding boxes or point annotations, are more practical and efficient, which could save the annotation time by 42% and 88% [8], respectively. Therefore, intensive research has been conducted on weakly supervised nuclei segmentation methods with point annotation to balance the model performance and annotation efficiency. One of the main challenges of this task is how to effectively utilize the point annotation information to improve the segmentation performance. Existing methods typically inject the domain knowledge of nuclei into the segmentation model. For example, using the shape and size prior of nuclei to generate supervision signals, such as Gaussian heatmaps [9], Voronoi diagrams [10], and distance maps [11]. Although these methods can effectively ease the" 2401.07441v1,"Stability Analysis of ChatGPT-based Sentiment Analysis in AI Quality Assurance Tinghui Ouyang 1 , AprilPyone MaungMaung 1 , Koichi Konishi 2 , Yoshiki Seo 2 , and Isao Echizen 1 1 National Institute of Informatics National Institute of Advanced Industrial Science and Technology, Japan E-mail: {thouyang, pyone, iechizen}@nii.ac.jp; {k.konishi, y.seo}@aist.go.jp 2 Abstract—In the era of large AI models, the complex architecture and vast parameters present substantial challenges for effective AI quality management (AIQM), e.g. large language model (LLM). This paper focuses on investigating the quality assurance of a specific LLM-based AI product—a ChatGPT- based sentiment analysis system. The study delves into stability issues related to both the operation and robustness of the expansive AI model on which ChatGPT is based. Experimental analysis is conducted using benchmark datasets for sentiment analysis. The results reveal that the constructed ChatGPT- based sentiment analysis system exhibits uncertainty, which is attributed to various operational factors. It demonstrated that the system also exhibits stability issues in handling conventional small text attacks involving robustness. Index Terms—AI quality management, large language model (LLM), ChatGPT-based sentiment analysis, stability analysis, I. I NTRODUCTION Advances in machine learning, especially in deep learning (DL), have led to the application of artificial intelligence (AI) to a broad range of areas, e.g., autonomous driving, ecommerce, and robotics [1]- [3]. However, due to the blackbox property of DL models and the lack of effective evaluation and testing techniques, it is difficult to identify the cause of malfunctions in AI-based products. The study of AI quality management (AIQM) [4] is aimed at providing useful techniques for AI-based product evaluation, testing, and improvement. It typically encompasses various aspects related to internal and external qualities, such as data- and modelrelated qualities. Therefore, AIQM is critical for ensuring the effectiveness and reliability of AI-based products. The increasing power of computer devices has made possible the development of complex AI architectures with a great number of parameters. Thus, many large models have been developed in the fields of computer vision [5] and natural language processing (NLP) [6]. The most well-known example is ChatGPT [7], which was released by OpenAI in 2023. It can generate human-like text with context and coherence. Its ability to understand natural language, even the nuances of language, and to generate highly accurate responses is the result of pretraining on a massive amount of text data using an advanced neural architecture (i.e., a Generative-Pretrained– Transformer (GPT) [8]) with a great number of parameters. As an advanced cutting-edge AI product currently in the limelight, ChatGPT has attracted much attention due to its superiority in addressing various traditional NLP tasks as well as its generation ability. For example, ChatGPT can deal with various languages besides English, so it was used as a translator in [9]. By making use of its ability for semantic understanding, ChatGPT was also used as a grammatical checker [10]. Its most widely used ability is conversation ability, enabling it to be used as a chatbot for question answering, or as a tool to guide educational exams [11], and to assist diagnosis in medical counseling [12]. Moreover, by making use of ChatGPT’s generation ability, cheating in writing is a serious problem in education [13]. In [14], ChatGPT was also used as a tool to augment text data for other research. Along with the convenience and benefits of ChatGPT, it also poses significant challenges to our society, including not only the agnosticism and concerns to everyday people but also the difficulties and complexities presented to researchers and developers. Especially, researchers in software engineering and quality management in particular need to understand how ChatGPT works, how to evaluate it, and how to maintain it. Even though it has been accessible to users for only a short while, much research has been conducted on the quality management of ChatGPT due to its prominence and wide usage. For example, in terms of the correctness study, ChatGPT’s performances have been evaluated on several traditional NLP tasks, like translation, grammar checking, text animation, and classification, and compared with that of conventional products. Moreover, Other studies have evaluated its performance on novel tasks like mathematical capabilities [15] and logical reasoning in coding [16]. For the robustness study, some adversarial text data in various NLP tasks were used to evaluate ChatGPT’s performance [17]- [18]. Some researchers also tried to attack LLM for robustness analysis, for example, using the gradient-based method for a prompt attack on Llama and other open-sourced LLMs [19], but it is hard to perform such analysis on ChatGPT because of its black-box property. In [20], an interesting idea was proposed to utilize LLM to generate attacks and then test its robustness on these attacks. Moreover, some other quality studies have also been performed. For example, the reliability of ChatGPT on text classification was studied in [21]. The limitations and weaknesses of ChatGPT faced with some questions were also reported, like political questions [22], failure cases [23], and so on [24]- [25]." 2401.07459v1,"Semantic Segmentation in Multiple Adverse Weather Conditions with Domain Knowledge Retention Xin Yang 1 , Wending Yan 2 , Yuan Yuan 2 , Michael Bi Mi 2 , Robby T. Tan 1 1 National University of Singapore 2 Huawei International Pte Ltd e0674612@u.nus.edu, {yan.wending,yuanyuan10@huawei}.com, michaelbimi@yahoo.com, robby.tan@nus.edu.sg Abstract Semantic segmentation’s performance is often compromised when applied to unlabeled adverse weather conditions. Unsupervised domain adaptation is a potential approach to enhancing the model’s adaptability and robustness to adverse weather. However, existing methods encounter difficulties when sequentially adapting the model to multiple unlabeled adverse weather conditions. They struggle to acquire new knowledge while also retaining previously learned knowledge. To address these problems, we propose a semantic segmentation method for multiple adverse weather conditions that incorporates adaptive knowledge acquisition, pseudolabel blending, and weather composition replay. Our adaptive knowledge acquisition enables the model to avoid learning from extreme images that could potentially cause the model to forget. In our approach of blending pseudo-labels, we not only utilize the current model but also integrate the previously learned model into the ongoing learning process. This collaboration between the current teacher and the previous model enhances the robustness of the pseudo-labels for the current target. Our weather composition replay mechanism allows the model to continuously refine its previously learned weather information while simultaneously learning from the new target domain. Our method consistently outperforms the stateof-the-art methods, and obtains the best performance with averaged mIoU (%) of 65.7 and the lowest forgetting (%) of 3.6 against 60.1 and 11.3 (Hoyer et al. 2023), on the ACDC datsets for a four-target continual multi-target domain adaptation. Introduction Semantic segmentation methods face challenges in adverse weather conditions, as these conditions significantly degrade images. Adapting models to multiple adverse weather conditions in an unsupervised and successive manner causes additional difficulties due to substantial domain gaps among various weather conditions, and potentially leads to forgetting previously learned knowledge. Continual unsupervised domain adaptation emerges as a potential solution to address these challenges by adapting the model from the labeled source domain to the unlabeled target domains in a sequential manner, e.g., ((Lin et al. 2022; Saporta et al. 2022)). However, these methods are designed Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Image MIC on T1 → T1 after T2 → T1 after T3 Ground Truth Ours on T1 → T1 after T2 → T1 after T3 Figure 1: The illustration of our method, where the model adapts to each target domain sequentially. MIC (Hoyer et al. 2023) fails to retain previously learned knowledge, as its performance on the first target gradually deteriorates, e.g., the sky and the side walk in Target 1 are disappearing after the method learns Targets 2 and 3. Our method retain previously learned knowledge while adapting to new targets. to acquire all information from the new target, without considering whether this information might lead to a forgetting of previously learned knowledge. Moreover, as mentioned in (Kalb and Beyerer 2023), domain shifts across distinct adverse weather conditions are primarily induced by the deteriorated information within low-level features extracted from the early convolutional layers. Consequently, there is a necessity to develop a method that takes this factor into consideration to effectively address the challenges posed by adverse weather conditions in domain adaptation. In this paper, we present a semantic segmentation method that sequentially adapts the model to multiple unlabeled adverse weather domains, by progressively learning a new domain at a time while retaining the previous learned knowledge. Our method conceives three novel concepts: adaptive knowledge acquisition, pseudo-label blending, and weather composition replay. In contrast to single-target unsupervised domain adaptation, our sequential domain adaptation aims to both learn from the new target and retain previously acquired knowledge simultaneously. Because of this, our model needs to identify potentially detrimental input regions that could introduce significant domain gaps and lead to forgetting of previously learned knowledge (Yang et al. 2022a; Kalb and Beyerer 2023). To achieve this, we introduce adaptive" 2401.07493v1,"GENERALIZED PATCH DYNAMICS SCHEME IN EQUATION-FREE MULTISCALE MODELLING ∗ T. K. KARMAKAR † AND D. C. DALAL † Abstract. There is a class of problems that exhibit smooth behavior on macroscopic scales, where only a microscopic evolution law is known. Patch dynamics scheme of ‘equation-free multiscale modelling’ is one of the techniques, which aims to extract the macroscopic information using such known time-dependent microscopic model simulation in patches (which is a fraction of the spacetime domain) that reduces the computational complexity. Here, extrapolation time step has an important role to reduce the error at macroscopic level. In this study, a generalized patch dynamics (GPD) scheme is proposed by distributing the gap-tooth timesteppers (GTTs) within each long (macroscopic) time step. This distribution is done in two ways, namely, GPD schemes of type-I and type-II. The proposed GPD scheme is based on three different time scales namely, micro, meso and macro to predict the system level behaviours. The GPD scheme of both types are capable of providing better accuracy with less computation time compared to the usual patch dynamics (UPD) scheme. The physical behaviours of the problems can be more appropriately addressed by the GPD scheme as one may use a non-uniform (variable) distribution of gap-tooth timesteppers (GTTs), as well as the extrapolation times based on the physics of the problem. Where the UPD scheme fails to converge for a long extrapolation time, both types of GPD schemes can be successfully applied. The whole method has been analyzed successfully for the one-dimensional reaction-diffusion problem. Key words. multiscale modeling, equation-free framework, coarse integration, gap-tooth scheme, patch dynamics MSC codes. 34E13, 35K57, 65LXX, 65MXX 1. Introduction. The behaviour of a system on a large domain can be understood through a fine-level simulation over the entire physical domain, which is a classical numerical concept. But computation time and memory constraints make such simulation futile. A balanced model should be computationally feasible without losing much information; such a model can be obtained through multiscale modelling. In science and engineering, the governing microscopic mechanisms are usually known, but translation of microscopic description to system level macroscopic description is rarely available. For a class of multiscale problems, separation of scales appear between the microscopic model and the macroscopic model. Main challenge of multiscale modelling is to form scale bridging to transform and transfer the information between the different scales. In equation-free multiscale modelling, the available microscopic model must be closed in the whole domain, but macroscopic model need not be closed. Equation-free computation aims to extract the macroscopic information using the given microscopic model simulation in a fraction of the space-time domain that reduces the computational complexity. This paper sheds light on the generalization of the patch dynamics scheme in equation-free multiscale modelling. Equation-free framework [17] is built on coarse time-stepper, which is a small macroscopic time mapping from coarse variables to coarse variables. Coarse timestepper consists of three steps: (i) lifting, i.e., transforming the macroscopic initial data into an appropriate initial condition for the microscopic model; (ii) evolution, i.e., evolving the system for short macroscopic time with the help of microscopic simulator; (iii) restriction, i.e., use of restriction operator on the microscopic variables to get back ∗ Submitted to the editors January 1, 2024. Funding: Current research did not receive any fund from any external source. † Department of Mathematics, Indian Institute of Technology Guwahati, Guwahati, Assam 781039, India (tanay.kumar@iitg.ac.in; durga@iitg.ac.in). 1 This manuscript is for review purposes only." 2401.07494v2,"1 Input Convex Lipschitz RNN: A Fast and Robust Approach for Engineering Tasks Zihao Wang, P S Pravin, Zhe Wu Abstract—Computational efficiency and adversarial robustness are critical factors in real-world engineering applications. Yet, conventional neural networks often fall short in addressing both simultaneously, or even separately. Drawing insights from natural physical systems and existing literature, it is known that an input convex architecture enhances computational efficiency, while a Lipschitz-constrained architecture bolsters adversarial robustness. By leveraging the strengths of convexity and Lipschitz continuity, we develop a novel network architecture, termed Input Convex Lipschitz Recurrent Neural Networks. This model outperforms existing recurrent units across a spectrum of engineering tasks in terms of computational efficiency and adversarial robustness. These tasks encompass a benchmark MNIST image classification, real-world solar irradiance prediction for Solar PV system planning at LHT Holdings in Singapore, and real-time Model Predictive Control optimization for a chemical reactor. Index Terms—Deep Learning, Lipschitz Neural Networks, Input Convex Neural Networks, Computational Efficiency, Adversarial Robustness, Model Predictive Control, Solar Irradiance Forecasting I. I NTRODUCTION Two crucial criteria for the resolution of real-world engineering challenges are computational efficiency and adversarial robustness. This big-data era has empowered the capabilities of neural networks and transformed them into an incredibly powerful tool, offering comprehensive solutions to numerous engineering problems such as image classification and process modeling. This work draws inspiration from nature-inspired design to develop a fast and robust solution to model nonlinear systems in various engineering disciplines. Model Predictive Control (MPC) represents an advanced control technique applied to manage a process while complying with a set of constraints, akin to an optimization challenge. Traditional MPC based on first-principles models encounters limitations, particularly in scenarios with intricate dynamics, where deriving these models proves infeasible. Consequently, researchers proposed neural network-based MPC (NN-MPC) as a viable alternative to model system dynamics [1]–[8]. However, MPC built on conventional neural networks often falls short in meeting the aforementioned critical criteria. Nonetheless, efforts have been made to mitigate these limitations. For example, the computational efficiency of NN-MPC is enhanced by implementing an input convex architecture in neural networks [9]. Additionally, adversarial robustness Zihao Wang and Zhe Wu are with the Department of Chemical & Biomolecular Engineering, National University of Singapore, Singapore. E- mail: wuzhe@nus.edu.sg P S Pravin is with the Department of Electronics & Instrumentation Engineering, National Institute of Technology Silchar, India. Source code is available at https://github.com/killingbear999/ICLRNN of NN-MPC is improved by developing Lipschitz-constrained neural networks (LNNs) [10]. In real-world applications, computational efficiency plays a pivotal role due to the imperative need for real-time decisionmaking, especially in critical engineering processes such as chemical process operations [9]. We define computational efficiency as the speed at which computational tasks are completed within a given execution timeframe. An effective approach to achieve this efficiency is through the transformation from non-convex to convex structures. Convexity is an ubiquitous characteristic observed in various physical systems. In energy potentials, the potential energy function of certain systems, such as simple harmonic oscillators, can exhibit a convex behavior. For example, the potential energy function of a mass on a spring is a classic example of a convex function in physics [11], [12]. In the context of magnetic fields, the region around a single magnetic pole, where another magnetic pole encounters an attractive force, is considered convex [13], [14]. In the theory of general relativity, the curvature of space-time around massive objects like stars or black holes can be described as convex in certain regions. This curvature influences the paths of objects and light rays near these massive bodies [15]. Building upon nature-inspired design and extending its application to neural networks, Input Convex Neural Networks (ICNNs) is a class of neural network architectures intentionally crafted to maintain convexity in their output with respect to the input. Leveraging these models could be particularly advantageous in various engineering problems, notably in applications such as MPC, due to their inherent benefits especially in optimization. This concept was first introduced by [16] as Feedforward Neural Networks (FNN), and subsequently extended to Recurrent Neural Networks (RNN) by [17], and Long Short-Term Memory (LSTM) by [9]. Additionally, in real-world engineering applications, adversarial robustness plays a critical role due to the prevalent noise present in most real-world data, which significantly hampers neural network performance. Our definition of robustness aligns closely with the principles outlined by [10]. Given the inherent noise in real-world process data, our goal is to improve neural networks by effectively learning from noisy training data for comprehensive end-to-end applications. Leveraging LNNs offers a potential solution to the robustness challenge. This concept was first introduced by [18] as FNN, and subsequently extended to RNN by [19], and Convolutional Neural Networks (CNN) by [20]. Motivated by the above considerations, in this work, we introduce an Input Convex Lipschitz RNN (ICLRNN) that" 2401.07495v1,"Trajectories of photons around a rotating black hole with unusual asymptotics Yong-Zhuang Li 1∗ and Xiao-Mei Kuang 2† 1 Research center for theoretical physics, School of Science, Jiangsu University of Science and Technology, Zhenjiang, China. and 2 Center for Gravitation and Cosmology, College of Physical Science and Technology, Yangzhou University, Yangzhou, 225009, China (Dated: January 17, 2024) Most black hole solutions are characterized with asymptotically flat, or asymptotically (anti) de-Sitter behaviors, but some black holes with unusual asymptotics have also been constructed, which is believed to provide remarkable insights into our understanding of the nature of gravity. In this paper, focusing on a rotating black hole with unusual asymptotics in Einstein-Maxwell-dilaton (EMD) theory, we innovatively analyze the photons’ trajectories around this black hole background, showing that the unusual asymptotics has significant influences on the photons’ trajectories. We expect that our analysis could give more insights in the scenario of black holes’ shadow and image. I. INTRODUCTION At present, string theory and loop quantum theory appear as two most promising candidates to unify gravity with the other fundamental interactions in nature [1– 3]. However, due to technical difficulties and conceptual ambiguities, the problem of reconciling quantum theory and general relativity remains open. A complete quantum gravity by one common representation still fascinates the theoretical physics communities. Nevertheless, as the predictions of general relativity, black holes provide natural laboratories for testing different approaches and shedding new light on quantum gravity in the strong field regime. Benefiting from the advances in observational techniques, the more we learn about black holes, the closer we get to a comprehensive theory of quantum gravity. Over the past few decades, searching the black hole configurations in string and supergravity theory has attracted the attention of many physicists, see [4–18] and many other important references. Especially, dilaton black holes have always been a major focus of these investigations, which arise in the low-energy string theory and couple in a nontrivial way to other fields such as gauge fields. Einstein-Maxwell-dilaton (EMD) gravity, where the dilaton is non-minimally coupled to the Maxwell field, then provides a natural theoretical model to investigate the effects of the dilaton on the properties of the black hole spacetime [7, 19–49]. Especially, Poletti and Wiltshire derived the global properties of static spherically symmetric solutions to the EMD system in the presence of a Liouville-type dilaton potential, showing that with the exception of a pure cosmological constant ‘potential’, no asymptotically flat, asymptotically de Sitter (dS) or asymptotically anti-de Sitter (AdS) solutions exist in these models [23]. Chan et al. then presented a new class of such black hole solu- ∗ Electronic address: liyongzhuang@just.edu.cn † Electronic address: xmeikuang@yzu.edu.cn tions in n ≥ 4-dim EMD gravity [24]. Some exact topological black hole solutions in the EMD theory with a Liouville-type dilaton potential were generalized by Cai et al. in Ref. [26], also see Ref. [33]. For the case of rotating black holes, Clément and Leygnac generated two classes of rotating dyonic black hole solutions with a specialized dilaton coupling parameter α 2 = 3 from the non-asymptotically flat magnetostatic or electrostatic black holes in Ref. [30]. With one or two Liouville-type dilaton potential(s) in an arbitrary dimension, Cai and Wang looked for and analyzed in details some (static, electrically or magnetically charged) exact solutions of EMD gravity, showing that some of these neither asymptotically flat nor AdS/dS solutions have higher dimensional origins which have well-behaved asymptotics [31]. New 5-dim, non-asymptotically flat black holes with rotation in one plane were derived by Yazadjiev as a limiting case of new rotating, non-asymptotically flat black ring solutions in a 5-dim EMd theory arising from a sixdimensional Kaluza-Klein theory [32]. Later, Fabris and Marques exploited the method of gravitational anomaly to compute the temperature of non-asymptotically flat dilatonic black holes [50], and the thermodynamics in the canonical and grand canonical ensembles of a class of non-asymptotically flat black holes of the 4D EMD theory with spherical symmetry were analysed in Ref. [51]. Although such black hole solutions are not as physically well-established as asymptotically flat or AdS/dS solutions, there are still sufficient motivations to conduct detailed investigation and discussion on them as the suggestions in previously mentioned references. On the one hand, it has shown that the methods originally developed for asymptotically flat or AdS/dS black holes, such as the quasi-local energy approach and gravitational anomaly, could be applied to compute the mass, angular momentum or Hawking radiation of non-asymptotically flat rotating black holes [30, 50], see also Ref. [52] where Zhang et al. checked the mass bound conjecture in de Sitter space with the topological de Sitter solution and its dilatonic deformation, which provides the evidence in favor of the conjecture. On the other hand, it has been widely believed that any consistent theory of quantum" 2401.07503v1,"1 PolMERLIN: Self-Supervised Polarimetric Complex SAR Image Despeckling with Masked Networks Shunya Kato, Masaki Saito, Katsuhiko Ishiguro, and Sol Cummings Abstract—Despeckling is a crucial noise reduction task in improving the quality of synthetic aperture radar (SAR) images. Directly obtaining noise-free SAR images is a challenging task that has hindered the development of accurate despeckling algorithms. The advent of deep learning has facilitated the study of denoising models that learn from only noisy SAR images. However, existing methods deal solely with single-polarization images and cannot handle the multi-polarization images captured by modern satellites. In this work, we present an extension of the existing model for generating single-polarization SAR images to handle multipolarization SAR images. Specifically, we propose a novel selfsupervised despeckling approach called channel masking, which exploits the relationship between polarizations. Additionally, we utilize a spatial masking method that addresses pixel-to-pixel correlations to further enhance the performance of our approach. By effectively incorporating multiple polarization information, our method surpasses current state-of-the-art methods in quantitative evaluation in both synthetic and real-world scenarios. Target HH, Im Prediction Amplitude Input HH, Re (a) Speckle2Void (b) MERLIN HH, Im VV, Im HH, Re VV, Re Index Terms—Polarimetric SAR image, despeckling (c) PolMERLIN I. I NTRODUCTION SAR images suffer from signal-dependent and spatially Fig. 1: Comparison of self-supervised despeckling methods. Blue pixels indicate the range of receptive fields. (a) Speckle2Void correlated noise, which is commonly referred to as speckle uses blind-spotting (spatial information). (b) MERLIN predicts noise. This noise arises due to the interference of scattered a Re/Im component from the counterpart component in a waves, which are randomly phased, from numerous scattering single polarization signal. (c) The proposed PolMERLIN surfaces. Due to the pronounced degradation of image quality predicts Re/Im components from the counterpart components of multi-polarization signals. To use spatial information as by the speckle noise, despeckling of SAR images is crucial to well, PolMERLIN intentionally removes some pixels from preserve image fidelity and prevent performance degradation the receptive field. in downstream tasks, such as semantic segmentation [4]. The tremendous strides made in deep learning have spurred the development of numerous despeckling techniques. These images using a self-supervised denoising method [6]. Addiapproaches generally fall into two categories of training tionally, MERLIN [3] presents a self-supervised despeckling methods: supervised and self-supervised. In the former [2], technique designed for two channels, based on the statistical [14], [13], a network is trained from a set of paired noisy property that the real and imaginary components of a complex and noise-free images of the same subject, with the benefit SAR image are uncorrelated. However, this method is still of leveraging well-established denoising networks like CNN limited to single polarization SAR images, thus constraining and Transformer. However, obtaining noise-free SAR images the available speckle noise data. In this study, we present PolMERLIN, a novel self-supervised directly from satellites or aircraft remains a challenge [11], despeckling method that leverages “multi-polarization complex [12]. These studies circumvent this by calculating the mean SAR images” to achieve superior performance. As depicted in of multi-temporal SAR images, which requires avoiding areas Figure 1, PolMERLIN exploits the spatial correlation among that have undergone changes, or by adding pseudo-speckle multiple polarization complex images, in contrast to MERLIN, noise in non-remote sensing optical images, which creates a which can only handle single polarization complex SAR gap between training and testing conditions. [14], [13]. images. Specifically, we extend the statistical model of speckle On the other hand, self-supervised training can bypass noise from single-polarization complex SAR images to multithis challenge, as it does not require noise-free SAR images. polarization complex SAR images. Speckle2Void [9] addresses despeckling of SAR amplitude According to this model, we reveal that the same components Shunya Kato is with the Graduate School of Informatics, Kyoto University, between different polarizations are correlated, while different Kyoto 606-8501, Japan (e-mail: s-kato@nlp.ist.i.kyoto-u.ac.jp). components are independent. Based on these findings concern- Masaki Saito, Katsuhiko Ishiguro, and Sol Cummings are with Preferred Networks Inc., Tokyo 100-0004, Japan (e-mail: msaito@preferred.jp; ishig- ing the (in)dependencies, we propose a novel self-supervised uro@preferred.jp; scummings@preferred.jp). learning method, called channel masking, which masks the" 2401.07512v1,"Gravitational Collapse via Wheeler-DeWitt Equation Davide Batic 1, ∗ and M. Nowakowski 2, † 1 Department of Mathematics, Khalifa University of Science and Technology, Main Campus, Abu Dhabi, United Arab Emirates 2 ICTP-South American Institute for Fundamental Research, Rua Dr. Bento Teobaldo Ferraz 271, 01140-070 São Paulo, SP Brazil (Dated: January 17, 2024) We analyze the Wheeler-DeWitt (WDW) equation in the context of a gravitational collapse. The physics of an expanding/collapsing universe and many details of a collapsing star can classically be described by the Roberston-Walker metric in which the WDW equation takes the form of a times-less Schrödinger equation. We set up the corresponding WDW potential for the collapse and study the solutions of the wave function. The results show that the central singularity appearing in classical general relativity is avoided, the density is quantized in terms of the Planck density and the expectation value of the scale factor exhibits a discrete behavior. PACS numbers: I. INTRODUCTION Apart from the established semi-classical results like the Hawking radiation [1] and the Unruh effect [2], we are still not sure how the full fledged quantum gravity will look like. Practically, all candidates ranging from loop quantum gravity [3] over the dynamical triangulation [4], causal set theory [5], the path intergral approach [6], non-commutative geometry [7] up to string theory [8], to mention a few, exhibit certain problems and obstacles. An important step towards a theory of quantum gravity has been and continues to be till today the WDW equation [9] based on the canonical quantization scheme of gravity. Since its discovery in the sixties up to now, it is widely used to study quantum phenomena in gravity. Its popularity is due to the fact that it is a genuine result of a canonical formalism which makes us supect that in one way or the other it also plays a role in other theories of quantum gravity. Indeed, it is closely connected to path integral [10] and loop quantum gravity [11–13]. In the eighties, the WDW equation was a standard tool to probe into the early quantum universe [14–18] based on the Robertson-Walker metric. This line of investigation has been carried on up to now [19–21, 23, 24]. Since the same metric is used for the gravitational collapse [25], in this work, we set up the WDW equation for this scenario with the hope to get a glimpse how quantum mechanics affects dense collapsing matter. The gravitational collapse itself is an active area of inspection and speculations of different classical and quantum effects [26, 27]. Since the Robertson-Walker metric does not posses any horizon singularity, we can safely assume that we are indeed examining the quantum spacetime inside a black hole (BH). Of course, we will not be able to compare our results with any observation but the expectation of quantum gravity with respect to the BH is the avoidance of the classical central singularity. This approach, as many in the realm of quantum gravity, is not without challenges. The WDW equation ’timeless’ nature poses a left out significant hurdle in describing the evolution of a system that is inherently time-dependent in classical terms. But this ’time-problem’ is an expected outcome of quantum gravity [28, 29], and appears also in quantum cosmology. Our study addresses this by interpreting the changes in the wave function, dependent on configuration space variables, as a proxy for dynamical evolution. This method allows us to explore the quantum mechanics of collapsing systems within the existing framework of quantum gravity, despite the absence of a traditional time variable. More precisely, we apply the WDW equation in the late gravitational collapse to study quantum effects in a black hole after all matter has entered the horizon. The paper is structured as follows: Section I offers an overview of the relevant literature on the development of quantum gravity theories and their application to astrophysical phenomena. It particularly focuses on explaining why the WDW equation can be applied to study quantum effects in black holes, specifically during the late stage of gravitational collapse after all matter has entered the horizon. Section II focuses on the construction of the point- ∗ Electronic address: davide.batic@ku.ac.ae † Electronic address: marek.nowakowski@ictp-saifr.org" 2401.07517v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Multi-Protocol Location Forwarding (MPLF) for Space Routing Xiangtong Wang, Zhiyun Jiang, Menglong Yang, Songchen Han, and Wei Li Abstract—The structure and routing architecture design is critical for achieving low latency and high capacity in future LEO space networks (SNs). Existing studies mainly focus on topologies of space networks, but there is a lack of analysis on constellation structures, which can greatly affect network performance. In addition, some routing architectures are designed for networks with a small number of network nodes such as Iridium while they introduce significant network overhead for high-density networks (i.e., mega-constellation networks containing thousands of satellites). In this paper, we conduct the quantitatively study on the design of network structure and routing architecture in space. The high density, high dynamics, and large scale nature of emerging Space Networks (SNs) pose significant challenges, such as unstable routing paths, low network reachability, high latency, and large jitter. To alleviate the above challenges, we design the structure of space network to maximum the connectivity through wisely adjusting the inter-plane inter satellite link. we further propose Multi-Protocol Location Forwarding (MPLF), a distributed routing architecture, targeting at minimizing the propagation latency with a distributed, convergence-free routing paradigm, while keeping routing stable and maximum the path diversity. Comprehensive experiments are conducted on a customized platform Space Networking Kits (SNK) which demonstrate that our solution can outperform existing related schemes by about 14% reduction of propagation latency and 66% reduction of hops-count on average, while sustaining a high path diversity with only O(1) time complexity. Index Terms—Space networks, Networking structure design, Multi-Protocol Location Forwarding, Routing Scheme. I. I NTRODUCTION OW Earth orbit (LEO) mega-constellations, comprising thousands of satellites, have been proposed to offer global broadband service and have attracted much attention in recent years. “NewSpace” companies plan to launch megaconstellations of hundreds to thousands of communication satellites into LEO in the coming years. Their proposals have already received the first stage of regulatory approval: SpaceX[1], [2], OneWeb[3], and Telesat[4] have obtained RF spectrum from the FCC for their constellations. Fig.1 shows the quintessential scenarios and use cases of future Space Network (SN). Such system could have a deep and lasting impact on the current Internet by extending its coverage to under-served communities, and providing lower latency over longer distances than present-day fiber. The SN could potentially serve as a core network and integrate into current terrestrial networks (TNs), and supporting the data transmission from functional satellite such as remote sensing satellite, weather observation satellites, etc. L Wei Li was with the School of Aeronautics and Astronautics, Sichuan University, Chengdu, China, e-mail: (see li.wei@scu.edu.cn). Fig. 1. Space Network Architecture. However, realizing the full potential of these systems requires addressing new challenges posed by high-density largescale and highly dynamics in the network, which bring a significant obstacle for datagram forwarding at the network layer. Network layer protocols in TNs such as IP and ATM have a basic premise: datagrams can be forwarded according to statically addressed nodes for end-to-end reachability. Even in wireless sensor networks (WSNs) such as Ad Hoc, nodes move around each other but still maintain a static topology, generating significant overhead to update the network information in each node[5], [6], which is difficult to apply in SNs due to their density and scale. More importantly, there are significant obstacles for addressing these challenges: the lack of network analysis tools that incorporate the dynamic behavior of LEO SNs[7]. This creates a substantial risk that research in this area may not keep peace with the rapid advances being made in the industry. To address the above challenges, we explore how different configurations can affect the structure of the SN. Based on the analysis, we propose the Multi-Protocol Location Forwarding (MPLF) architecture which employs a geographic based forwarding policy to enable end-to-end transmission between arbitrary terminals worldwide in a distributed and convergence-free manner over a dense constellation network. Considering the unique dynamics of LEO SN, we developed a flexible and scalable simulator SNK with the goal of quickly designing constellations and its network structure, obtaining reliable node information in dynamic networks, and visualizing routing paths. Comprehensive experiments under Ground-Stations and Mobile Stations (MS) in various constellations conducted on" 2401.07534v1,"Exploring the Potential of Large Language Models in Self-adaptive Systems Jialong Li Waseda University Tokyo, Japan lijialong@fuji.waseda.jp Danny Weyns KU Leuven Leuven, Belgium danny.weyns@kuleuven.be Mingyue Zhang Southwest University Chongqing, China myzhangswu@swu.edu.cn Zhi Jin Peking University Beijing, China zhijin@pku.edu.cn ABSTRACT Large Language Models (LLMs), with their abilities in knowledge acquisition and reasoning, can potentially enhance the various aspects of Self-adaptive Systems (SAS). Yet, the potential of LLMs in SAS remains largely unexplored and ambiguous, due to the lack of literature from flagship conferences or journals in the field, such as SEAMS and TAAS. The interdisciplinary nature of SAS suggests that drawing and integrating ideas from related fields, such as software engineering and autonomous agents, could unveil innovative research directions for LLMs within SAS. To this end, this paper reports the results of a literature review of studies in relevant fields, summarizes and classifies the studies relevant to SAS, and outlines their potential to specific aspects of SAS. KEYWORDS Large Language Model, Self-adaptive Systems, Survey ACM Reference Format: Jialong Li, Mingyue Zhang, Nianyu Li, Danny Weyns, Zhi Jin, and Kenji Tei. 2024. Exploring the Potential of Large Language Models in Self-adaptive Systems. In Proceedings of 19th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS’24). ACM, New York, NY, USA, 9 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION A language model is, in essence, a computational artifact that allows predicting the next word in a sentence based on the probability distribution over sequences of words [38]. Empowered by modern AI techniques such as the Transformer [52], pre-trained language models (PLM) [11] have demonstrated increasing performance in specific tasks following the ’pre-train and fine-tune’ paradigm. Furthermore, with the increasing scale of the model size ∗ Corresponding author: Nianyu Li, li_nianyu@pku.edu.cn Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. SEAMS’24, April 15–16, 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX Nianyu Li ∗ ZGC National Laboratory Beijing, China li_nianyu@pku.edu.cn Kenji Tei Tokyo Institute of Technology Tokyo, Japan tei@c.titech.ac.jp and the amount of data used for pre-training and fine-tuning, PLMs show emergent and remarkable capabilities in various tasks [55]. Such large-scale PLMs are commonly referred to as ‘large language models (LLM)’. As discussed in the fields of ‘Cognitive Linguistics’ and ‘Philosophy of Language’, language not only serves as an intermediary that enables the building of humans’ complex systems of knowledge but also defines a deeper logical structure, reflecting the logic of human thought. Similarly, LLMs, trained on vast textual corpora, have shown their capabilities in knowledge acquisition as well as in logical reasoning and planning. Leveraging these abilities, LLMs have demonstrated strong capabilities in solving diverse problems, leading to a rapid expansion of research and applications. Self-adaptive Systems (SAS) are engineered to autonomously adapt to their dynamics in their environment or internal changes without manual interventions, a capability essential for tackling real-world challenges [7, 15, 27, 57, 58]. LLMs, as demonstrated in other studies, have significantly enhanced the system’s capabilities, including context awareness and decision-making, which are essential for handling self-adaptation. However, there is a notable scarcity of literature on the use of LLM within the field of SAS, particularly from flagship conferences or journals in the field like SEAMS, ACSOS, and TAAS. This lack of research makes the potential of LLMs in SAS remain unexplored and ambiguous. As SAS is a cross-disciplinary research field that intersects with software engineering, autonomous agents, human-computer interaction, among others, we believe that a cross-pollination from these relevant fields, could lead to innovative insights, helping to identify potential research directions of LLMs in the context and perspective of SAS. To this end, this paper aims to explore the potential of LLMs in SAS by targeting the following two research questions: • RQ1: What are the key areas of research that explore the application of LLMs relevant to SAS? • RQ2: How do the existing studies on LLMs contribute to specific aspects of SAS, and what future research challenges do they suggest for the SAS research community? To answer RQ1, we review LLM studies from four different research fields relevant to SAS and summarize key research areas on LLM within these fields. To answer RQ2, we further filter and categorize the above studies, discussing LLMs’ potential and challenges in various aspects of SAS. We start with a brief introduction of LLM (Section 2) and explain the study design (Section 3). Then, we" 2401.07541v1,"DynaHull: Density-centric Dynamic Point Filtering in Point Clouds Pejman Habibiroudkenar 1* , Risto Ojala 2 and Kari Tammi 3 1,2,3 Mechanical Engineering, Aalto University, , Espoo, 02150, Uusimaa, Finland. *Corresponding author(s). E-mail(s): pejman.habibiroudkenar@aalto.fi; Contributing authors: risto.j.ojala@aalto.fi; kari.tammi@aalto.fi; Abstract In the field of indoor robotics, accurately navigating and mapping in dynamic environments using point clouds can be a challenging task due to the presence of dynamic points. These dynamic points are often represented by people in indoor environments, but in industrial settings with moving machinery, there can be various types of dynamic points. This study introduces DynaHull, a novel technique designed to enhance indoor mapping accuracy by effectively removing dynamic points from point clouds. DynaHull works by leveraging the observation that, over multiple scans, stationary points have a higher density compared to dynamic ones. Furthermore, DynaHull addresses mapping challenges related to unevenly distributed points by clustering the map into smaller sections. In each section, the density factor of each point is determined by dividing the number of neighbors by the volume these neighboring points occupy using a convex hull method. The algorithm removes the dynamic points using an adaptive threshold based on the point count of each cluster, thus reducing the false positives. The performance of DynaHull was compared to state-of-the-art techniques, such as ERASOR, Removert, OctoMap, and a baseline statistical outlier removal from Open3D, by comparing each method to the ground truth map created during a low activity period in which only a few dynamic points were present. The results indicated that DynaHull outperformed these techniques in various metrics, noticeably in the Earth Mover’s Distance. This research contributes to indoor robotics by providing efficient methods for dynamic point removal, essential for accurate mapping and localization in dynamic environments. Keywords: Dynamic Points Removal, Point Cloud, SLAM, ConvexHull 1" 2401.07565v1,"C ALL GRAPH DISCOVERY IN BINARY PROGRAMS FROM UNKNOWN INSTRUCTION SET ARCHITECTURES A P REPRINT Håvard Pettersen Department of Computer Science Norwegian University of Science and Technology Trondheim, Norway haavapet@stud.ntnu.no Donn Morrison Department of Computer Science Norwegian University of Science and Technology Trondheim, Norway donn.morrison@ntnu.no 17th January 2024 A BSTRACT This study addresses the challenge of reverse engineering binaries from unknown instruction set architectures, a complex task with potential implications for software maintenance and cyber-security. We focus on the tasks of detecting candidate call and return opcodes for automatic extraction of call graphs in order to simplify the reverse engineering process. Empirical testing on a small dataset of binary files from different architectures demonstrates that the approach can accurately detect specific opcodes under conditions of noisy data. The method lays the groundwork for a valuable tool for reverse engineering where the reverse engineer has minimal a priori knowledge of the underlying instruction set architecture. Keywords Reverse engineering · unknown CPU architecture · program call graph · binary analysis 1 Introduction In an era defined by rapid technological advancements and a vast amount of different systems, further amplified by the rise of the Internet of Things, the importance of understanding and decoding the inner workings of software cannot be understated. At the heart of this is the process of reverse engineering. Reverse engineering in the context of software, is the practice of inspecting, deconstructing, and analysing the structure and operation of a binary file in order to understand its architecture, design, and functionality. This is often done without access to source code or design documentation, making it a painstaking, yet critical, part of software analysis and security. The reverse engineering process is notably important in areas such as cyber-security, where detecting and understanding malware is key to developing and maintaining robust security. It also plays a vital role in maintaining and debugging legacy software and firmware, where the original documentation or developers may not be available. For these reasons, reverse engineering is a critical skill in the digital age and an important area in need of further research and development efforts. In the broader context, several tools and methods have been developed over time to aid the reverse engineering process. Most of these tools require a priori knowledge about the instruction set architectures of the binary being analysed, which poses limitations and challenges when dealing with unknown or undocumented instruction set architectures. The current methods for reverse engineering binaries from unknown instruction set architectures are limited and often involve invasive procedures such as hardware decapsulation, which can be costly, slow, and potentially damaging to the hardware [7]. Additionally, obfuscation measures are often used to deliberately make the process even more challenging and time-consuming. Examples of such techniques are custom virtual machines used to execute the binary file [14, 9]. When looking at the process of reverse engineering from a methodological perspective, a common practice is detecting important functions and focusing the reverse engineering efforts on them, so-called sub-routine scanning [13]. Hence," 2401.07572v1,"Work in Progress E XPLOITING GPT-4 V ISION FOR Z ERO - SHOT P OINT C LOUD U NDERSTANDING Qi Sun ∗ , Xiao Cui ∗ , Wengang Zhou † , Houqiang Li † Department of EEIS, University of Science and Technology of China {qisun, cuixiao2001}@mail.ustc.edu.cn,{zhwg, lihq}@ustc.edu.cn A BSTRACT In this study, we tackle the challenge of classifying the object category in point clouds, which previous works like PointCLIP struggle to address due to the inherent limitations of the CLIP architecture. Our approach leverages GPT-4 Vision (GPT-4V) to overcome these challenges by employing its advanced generative abilities, enabling a more adaptive and robust classification process. We adapt the application of GPT-4V to process complex 3D data, enabling it to achieve zero-shot recognition capabilities without altering the underlying model architecture. Our methodology also includes a systematic strategy for point cloud image visualization, mitigating domain gap and enhancing GPT-4V’s efficiency. Experimental validation demonstrates our approach’s superiority in diverse scenarios, setting a new benchmark in zero-shot point cloud classification. 1 I NTRODUCTION 3D point cloud understanding has many applications in autonomous driving, robotics and scene understanding. Point-based methods (Qi et al., 2017a;b; Liu et al., 2019; Zhang et al., 2023; Yu et al., 2022; Qi et al., 2023; Cheraghian et al., 2022) learn features directly from raw point cloud, while projection-based methods (Goyal et al., 2021; Sarkar et al., 2018; Roveri et al., 2018) learn the projected 2D image features. Recent research efforts have been directed towards zero-shot understanding of point clouds (Zhu et al., 2023; Zhang et al., 2022; Huang et al., 2023), employing models pretrained exclusively on 2D images. Nevertheless, the effectiveness of these approaches is inherently limited by the characteristics of CLIP, due to its contrastive training strategy and the domain discrepancy between the visualizations of point clouds and the associated textual labels. Our methodology addresses this challenge by leveraging GPT-4 Vision (OpenAI, 2023) Utilizing GPT-4V’s advanced generative power our approach transcends the constraints of similarity-based * Equal contribution. † Corresponding Authors. Front Front User Side Side Top Top “I will show you point cloud visualization from three-view (front/side/top), can you help me recognize the category? ” The provided images depict an object from three different viewpoints. It seems the object does not conclusively match most of the furniture categories like a bed, chair, desk, dresser, night_stand, sofa, or table due to the lack of typical structural features…The closest match could be a radio, given the elongated shape and what appears to be an antenna-like protrusion in the images. Question Answer GPT-4V Figure 1: Illustration for our method. Using three-view point cloud rendered images and a predefined text template as input, GPT-4V will analyse the visual clue like human then point out the category. 1" 2401.07586v1,"Curriculum for Crowd Counting - Is it Worthy? Muhammad Asif Khan 1 a , Hamid Menouar 1 b and Ridha Hamila 2 c 1 Qatar Mobility Innovations Center, Qatar University, Doha, Qatar 2 Department of Electrical Engineering, Qatar University, Doha, Qatar mkhan@qu.edu.qa, hamidm@qmic.com, hamila@qu.edu.qa Keywords: Crowd counting, curriculum learning, CNN, density estimation. Abstract: Recent advances in deep learning techniques have achieved remarkable performance in several computer vision problems. A notably intuitive technique called Curriculum Learning (CL) has been introduced recently for training deep learning models. Surprisingly, curriculum learning achieves significantly improved results in some tasks but marginal or no improvement in others. Hence, there is still a debate about its adoption as a standard method to train supervised learning models. In this work, we investigate the impact of curriculum learning in crowd counting using the density estimation method. We performed detailed investigations by conducting 112 experiments using six different CL settings using eight different crowd models. Our experiments show that curriculum learning improves the model learning performance and shortens the convergence time. 1 Introduction Crowd counting is an interesting problem in computer vision research [Khan et al., 2022, Fan et al., 2022, Gouiaa et al., 2021]. Though several methods [Li et al., 2008, Topkaya et al., 2014, Chen et al., 2012, Chan and Vasconcelos, 2009] have been proposed earlier to estimate crowd in an image, the defacto state-of-the-art approach for crowd counting is using density estimation. Density estimation employs a deep learning model such as a convolution neural network (CNN) to estimate the crowd density in an image. The ground truths to train the model are density maps of crowd images. A density map is generated from the dot annotation map where each dot (representing the head position of a person) is convolved with a Gaussian function. Over the years, several models have been proposed to improve the accuracy performance over benchmark datasets. Notably, CrowdCNN was the first CNN-based model proposed in [Zhang et al., 2015]. CrowdCNN is a single-column 6-layer CNN network using density map prediction. Due to the single column, CrowdCNN does not capture the scale variations present in head sizes in crowd images. CrowdNet [Boominathan et al., 2016] and MCNN a b c https://orcid.org/0000-0003-2925-8841 https://orcid.org/0000-0002-4854-909X https://orcid.org/0000-0002-6920-7371 [Zhang et al., 2016] propose multi-column architectures to cope with the scale variations. The CrowdNet model uses a shallow and a deep network to predict different crowd densities. The MCNN model used three columns of CNN layers with different sizes of convolution kernels in each layer to efficiently capture the scale variations. Though, these multi-column networks achieve better accuracy, their performance is poor on highly congested scenes mainly due to two reasons. First, the model’s ability to capture scale variations is limited by the number of columns. Second, these shallow models become quickly saturated due to the small number of neurons. To solve the scale variation problem, improved model architectures such as encoder-decoder e.g., TEDnet [Jiang et al., 2019], SASNet [Song et al., 2021], and pyramid structure using multi-scale modules e.g., MSCNN [Zeng et al., 2017], SANet [Cao et al., 2018] are proposed. For crowd estimation in highly congested scenes, models using transfer learning from pre-trained models such as VGG-16 [Simonyan and Zisserman, 2015], ResNet [He et al., 2016], MobileNet [Sandler et al., 2018], and Inception [Szegedy et al., 2015] achieved best results. Few notable models using transfer learning include CSRNet [Li et al., 2018], C-CNN [Shi et al., 2020], BL [Ma et al., 2019] (VGG), MobileCount [Gao et al., 2019] (MobileNet), MMCNN [Peng et al., 2020], MFCC [Gu and Lian, 2022] (ResNet), SGANet [Wang and Breckon, 2022] (Inception) etc." 2401.07589v1,"Semantic Scene Segmentation for Robotics Juana Valeria Hurtado and Abhinav Valada 1 ABSTRACT Comprehensive scene understanding is a critical enabler of robot autonomy. Semantic segmentation is one of the key scene understanding tasks which is pivotal for several robotics applications including autonomous driving, domestic service robotics, last mile delivery, amongst many others. Semantic segmentation is a dense prediction task that aims to provide a scene representation in which each pixel of an image is assigned a semantic class label. Therefore, semantic segmentation considers the full scene context, incorporating the object category, location, and shape of all the scene elements, including the background. Numerous algorithms have been proposed for semantic segmentation over the years. However, the recent advances in deep learning combined with the boost in the computational capacity and the availability of large-scale labeled datasets have led to significant advances in semantic segmentation. In this chapter, we introduce the task of semantic segmentation and present the deep learning techniques that have been proposed to address this task over the years. We first define the task of semantic segmentation and contrast it with other closely related scene understanding problems. We detail different algorithms and architectures for semantic segmentation and the commonly employed loss functions. Furthermore, we present an overview of datasets, benchmarks, and metrics that are used in semantic segmentation. We conclude the chapter with a discussion of challenges and opportunities for further research in this area. KEYWORDS Semantic Segmentation, Scene Understanding, Visual Learning, Deep Learning 1.1 INTRODUCTION In order for robots to interact with the world, they should first have the ability to comprehensively understand the scene around them. The efficiency with which a robot performs a task, navigates, or interacts, strongly depends on how accurately it can comprehend its surroundings. Furthermore, the ability to understand context is crucial for safe operation in diverse environments [1]. However, accurate interpretation of the environment is extremely challenging, especially in real-world urban scenarios that are complex and dynamic. In these environments, robots are expected to perform their tasks precisely while they encounter diverse 1. Department of Computer Science, University of Freiburg, Germany, Emails: hurtadoj@cs.unifreiburg.de, valada@cs.uni-freiburg.de 1" 2401.07591v1,"Multimodal Crowd Counting with Pix2Pix GANs Muhammad Asif Khan 1 a , Hamid Menouar 1 b and Ridha Hamila 2 c 1 Qatar Mobility Innovations Center, Qatar University, Doha, Qatar 2 Department of Electrical Engineering, Qatar University, Doha, Qatar mkhan@qu.edu.qa, hamidm@qmic.com, hamila@qu.edu.qa Keywords: Crowd counting, CNN, density estimation, multimodal, RGB, Thermal. Abstract: Most state-of-the-art crowd counting methods use color (RGB) images to learn the density map of the crowd. However, these methods often struggle to achieve higher accuracy in densely crowded scenes with poor illumination. Recently, some studies have reported improvement in the accuracy of crowd counting models using a combination of RGB and thermal images. Although multimodal data can lead to better predictions, multimodal data might not be always available beforehand. In this paper, we propose the use of generative adversarial networks (GANs) to automatically generate thermal infrared (TIR) images from color (RGB) images and use both to train crowd counting models to achieve higher accuracy. We use a Pix2Pix GAN network first to translate RGB images to TIR images. Our experiments on several state-of-the-art crowd counting models and benchmark crowd datasets report significant improvement in accuracy. 1 Introduction Crowd counting has gained significant attention in recent years due to its diverse applications across various domains, including crowd management, urban planning, security surveillance, event management, and public safety. The ability to accurately estimate crowd density and count individuals in congested areas holds immense practical significance, enabling better resource allocation, improved crowd control strategies, and enhanced decision-making processes. The advent of deep learning (DL) has led to a paradigm shift in crowd counting techniques, achieving higher accuracy and scalability in diverse realworld applications. Most state-of-the-art works on crowd counting use the density estimation approach [Khan et al., 2022, Khan et al., 2023c]. In density estimation, a deep learning model (typically a convolution neural network (CNN) or a vision transformer (ViT)) is trained using annotated crowd images to learn the crowd density. The annotations come in the form of sparse localization maps that indicate the head positions of individuals present in each scene or region of interest. The localization maps are converted into continuous density maps for each image by applying a b c https://orcid.org/0000-0003-2925-8841 https://orcid.org/0000-0002-4854-909X https://orcid.org/0000-0002-6920-7371 a Gaussian kernel centered at each head location. The intensity of the map thus represents the crowd density at different spatial locations. The density maps serve as the ground truth for the crowd images to train the crowd counting model. A number of different models have been proposed in the last few years using the density estimation approach. These models apply various model architectural innovations and novel learning functions to improve the accuracy performance. However, most of these works use optical color images mainly with reasonable lighting conditions. However, in many surveillance scenarios images captured using optical cameras will have poor lighting conditions resulting in poor performance of the counting models. To improve the accuracy, thermal infrared (TIR) cameras are used along with the optical camera to capture both color RGB images and thermal images. Then a crowd counting model may use one (monomodal) or both (multimodal) RGB and TIR images to learn the crowd density in low-light conditions. Multimodal learning using both optical (RGB) and thermal (TIR) images for crowd counting has been proposed in recent works [Wu et al., 2022, Liu et al., 2023, Thißen and Hergenröther, 2023]. The simultaneous use of both RGB and TIR images provides more information to extract enriched features from the crowd scene leading to better predictions. Nevertheless, the interest in multimodal crowd count-" 2401.07597v1,"Photofragmentation of cyclobutanone at 200 nm: TD-DFT vs CASSCF electron diffraction Alberto Martín Santa Daría, 1 Javier Hernández-Rodríguez, 1 Lea M. Ibele, 2 and Sandra Gómez 1, ∗ 1 Departamento de Química Física, Universidad de Salamanca https://ror.org/02f40zc51, 37008, Spain 2 Université Paris-Saclay, CNRS, Institut de Chimie Physique UMR8000, 91405 Orsay, France (Dated: January 17, 2024) To simulate a 200 nm photoexcitation in cyclobutanone to the n-3s Rydberg state, classical trajectories were excited from a Wigner distribution to the singlet state manifold based on excitation energies and oscillator strenghts. Twelve singlet and twelve triplet states are treated using TD-B3LYP-D3/6-31+G ∗∗ for the electronic structure and the nuclei are propagated with the Tully Surface Hopping method. Using TD-DFT, we are able to predict the bond cleavage that takes place on the S 1 surface as well as the ultrafast deactivation from the Rydberg n-3s state to the nπ ∗ . After showing that triplet states and higher-lying singlet states do not play any crucial role during the early dynamics (i.e., the first 300 fs), the SA(6)-CASSCF(8,11)/aug-cc-pvDZ method is used as an electronic structure and the outcome of the non-adiabatic dynamic simulations is recomputed. Gas-phase ultrafast electron diffraction (GUED) spectra are computed for both electronic structure methods, showing significantly different results. ∗ sandra.gomez@usal.es" 2401.07605v1,"Gradient conformal stationarity and the CMC condition in LRS spacetimes Gareth Amery ∗ Astrophysics Research Center, School of Mathematics, Statistics and Computer Science, University of KwaZulu-Natal, Private Bag X54001, Durban 4000, South Africa Peter K S Dunsby † Cosmology and Gravity Group, Department of Mathematics and Applied Mathematics, University of Cape Town, Rondebosch 7701, Cape Town, South Africa South African Astronomical Observatory, Observatory 7925, Cape Town, South Africa and Center for Space Research, North-West University, Mahikeng 2745, South Africa Abbas M Sherif ‡ Department of Science Education, Jeju National University, Jeju, 63243, South Korea We study the existence of gradient conformal Killing vectors (CKVs) in LRS spacetimes, and investigate some implications for the evolutionary character of marginally outer trapped surfaces. We first study existence of gradient CKVs via the obtention of a relationship between the Ricci curvature and the gradient of the divergence of the CKV. This provides an alternative set of equations, for which the integrability condition is obtained, to analyze the existence of gradient CKVs. A uniqueness result is obtained in the case of perfect fluids, where it is demonstrated that the Robertson-Walker solution is the unique perfect fluid solution with a nonvanishing pressure, admitting a timelike gradient CKV. The constant mean curvature condition for LRS spacetimes is also obtained, characterized by three distinct conditions which are specified by a set of three scalars. Linear combinations of these scalars, whose vanishing define the constant mean curvature condition, turn out to be related to the evolutions of null expansions of 2-sphere along their null normal directions. As such, some implications for the existence of black holes and the character of the associated horizons are obtained. It is further shown that dynamical black holes of increasing area, with a nonvanishing heat flux across the horizon, will be in equilibrium, with respect to the frame of the conformal observers. I. INTRODUCTION Understanding the role of symmetries in general relativity dates back to the 1920’s when Brinkmann examined the usefulness of such transformations to obtain new exact solutions to the field equations [1, 2]. Since then a wealth of literature has been gathered on this subject (see the references [3–12] and associated references). Killing and conformal Killing (infinitesimal) symmetries, the action for which the metric is left either unchanged, or simply scaled, are usually assumed. For the conformal Killing case, if the vector field generating the symmetry is timelike, one has a choice of observers, and in which case it is known that the spacetime admitting the symmetry is conformal to a stationary one, i.e. it scales a stationary spacetime by some factor. These spacetimes are termed conformal stationary (or CS for short) spacetimes [13, 14]. In the case that the timelike conformal Killing vector field is gradient, these spacetimes are called gradient CS (GCS) spacetimes. In order for such spacetimes to be stably causal, it is required that the gradient condition on the vector field is a global one. There have been several studies addressing various properties of the spacelike hypersurfaces of the foliation induced by the splitting along the ∗ ameryg1@ukzn.ac.za peter.dunsby@uct.ac.za ‡ abbasmsherif25@gmail.com †" 2401.07608v1,"Stability constraint for spin equation of state Asaad Daher a , Wojciech Florkowski b , Radoslaw Ryblewski a a Institute of Nuclear Physics Polish Academy of Sciences PL-31-342 Krakow Poland b Institute of Theoretical Physics Jagiellonian University PL-30-348 Krakow Poland Abstract A generalized Frenkel condition is proposed for use in spin hydrodynamics to relate the spin density and spin polarization (or spin chemical potential) tensors. It allows for independent treatment of electric- and magnetic-like components of the spin density tensor, which helps to fulfill the stability conditions recently derived in the literature. The generalized Frenkel condition extrapolates between the original Frenkel condition, where only the magnetic-like part of the spin tensor is present, and the case where the spin density tensor is directly proportional to the spin polarization tensor. We also demonstrate that our approach is supported by the result of a microscopic calculation. Keywords: spin tensor, spin hydrodynamics, Frenkel condition, spin chemical potential, spin equation of state, spin polarization 1. Introduction One of the popular assumptions about the form of the spin tensor S λ, µν used in spin hydrodynamics is that S λ, µν can be entirely expressed by the flow vector u λ and the spin density tensor S µν [1, 2], namely S λ, µν = u λ S µν . (1) This ansatz can be traced back to the seminal papers by Weyssenhoff and Rabbe [3, 4], where the first version of spin hydrodynamics was formulated. Nowadays, the form (1) is often called the phenomenological expression for the spin tensor, to contrast it with other more complex forms resulting from microscopic classical and quantum calculations [5, 6]. Recent studies of stability and causality properties of spin hydrodynamics [7–20] have led to a somewhat disturbing conclusion that the electric-like components of the spin density tensor, S 0i , and its magnetic-like components, S i j , should differently depend on the corresponding components of the spin polarization tensor ω µν 1 . To be more specific, following Ref. [7], we consider the two susceptibilities χ s = ∂S i j , ∂ω i j χ b = ∂S 0i . ∂ω 0i (2) Email addresses: asaad.daher@ifj.edu.pl (Asaad Daher), wojciech.florkowski@uj.edu.pl (Wojciech Florkowski), radoslaw.ryblewski@ifj.edu.pl (Radoslaw Ryblewski) 1 The tensor ω µν is sometimes called the spin chemical potential – we prefer to use the name of the chemical potential for the product Ω µν = T ω µν , where T is the system’s temperature. Preprint submitted to Physics Letters B January 17, 2024" 2401.07624v1,"Stabilities for non-uniform t-intersecting families ∗ Yongtao Li † , Biao Wu ‡ † HNP-LAMA, School of Mathematics and Statistics, Central South University Changsha, Hunan, 410083, P.R. China ‡ CHP-LCOCS, School of Mathematics and Statistics, Hunan Normal University Changsha, Hunan, 410081, P.R. China January 17, 2024 Abstract The study of intersection problems on families of sets is one of the most important topics in extremal combinatorics. As we all know, the extremal problems involving certain intersection constraints are equivalent to that with the union properties by taking complement of sets. A family of sets is called s-union if the union of any two sets in this family has size at most s. Katona [Acta Math. Hungar. 15 (1964)] provided the maximum size of an s-union family of sets of [n], and he also determined the extremal families up to isomorphism. Recently, Frankl [J. Combin. Theory Ser. B 122 (2017) 869–876] sharpened this result by establishing the maximum size of an s-union family that is not a subfamily of the so-called Katona family. In this paper, we determine the maximum size of an s-union family that is neither contained in the Katona family nor in the Frankl family. Moreover, we characterize all extremal families achieving the upper bounds. Key words. Erdős–Ko–Rado’s theorem; Katona’s theorem; t-intersecting; Cross intersecting. AMS subject classification. 05C65, 05D50. 1 Introduction Let [n] = {1, 2, . . . , n}. The power set 2 [n] consists of the 2 n subsets of [n]. For every subset F ⊆ [n], we  denote by F c the complement set of F in [n]. We write [n] for the collection of all k-element subsets k  [n] of [n], and ≤k for the collections of all subsets of [n] with size at most k. Let F be a family of subsets of [n]. We say that F is k-uniform if all sets of F have size k. If F is non-uniform, we usually denote  F i = {F ∈ F : |F | = i} = F ∩ [n] i . Given a set G ⊆ [n] and a permutation σ ∈ S n , we denote σ(G) = {σ(g) : g ∈ G}. We say that G and H are isomorphic if there is a permutation σ ∈ S n such that {σ(G) : G ∈ G} = H. For two families G and H, we say that G is a subfamily of H, denoted by G ⊆ H, if there is a permutation σ ∈ S n such that σ(G) ∈ H for every G ∈ G. 1.1 Uniform intersecting families A family F of sets is called t-intersecting if |A ∩ B| ≥ t for all A, B ∈ F . For t = 1, we just say ‘intersecting’ instead of ‘1-intersecting’. A full star is a family that consists of all the k-subsets of [n] that contains a fixed element. The celebrated Erdős–Ko–Rado theorem [5] states that when n ≥ 2k, a full star is the unique intersecting k-uniform family attaining the maximum size. ∗ E-mail addresses: ytli0921@hnu.edu.cn (Y. Li), wu@hunnu.edu.cn (B. Wu) 1" 2401.07628v1,"Fusion of 7 Li with 205 Tl at near barrier energies V. V. Parkar 1,2∗ , Prasanna M. 3 , Ruchi Rathod 4† , V. Jha 1,2 , S. K. Pandit 1,2 , A. Shrivastava 1,2 , K. Mahata 1,2 , K. Ramachandran 1 , R. Palit 6 , Md. S. R. Laskar 6 , B. J. Roy 1,2 , Bhushan Kanagalekar 3 , and B. G. Hegde 3 1 Nuclear Physics Division, Bhabha Atomic Research Centre, Mumbai - 400085, India 2 Homi Bhabha National Institute, Anushaktinagar, Mumbai - 400094, India 3 Department of Physics, Rani Channamma University, Belagavi - 591156, India 4 Sardar Vallabhbhai National Institute of Technology, Surat - 395007, India and 6 Department of Nuclear and Atomic Physics, Tata Institute of Fundamental Research, Mumbai - 400005, India The complete and incomplete fusion cross sections for the 7 Li+ 205 Tl reaction were measured at near barrier energies by online characteristic γ ray detection technique. The complete fusion (CF) cross sections at energies above the Coulomb barrier were found to be suppressed by ∼ 26 % compared to the coupled channel calculations. Reduced fusion cross sections for the present system at energies normalised to the Coulomb barrier were also found to be systematically lower than those with strongly bound projectiles forming a similar compound nucleus. The suppression observed in CF cross sections is found to be commensurate with the measured total incomplete fusion (ICF) cross sections. In the ICF cross sections, t capture is found to be dominant than α capture at all the measured energies. The systematic study of available CF, ICF and total fusion (TF) data with 7 Li projectile is performed. PACS numbers: I. INTRODUCTION In the last several decades heavy ion fusion reactions have been studied to understand the interplay between nuclear structure and dynamics in colliding partners [1– 8]. Cluster transfer is also reported to play a key role in understanding the reaction mechanisms [9]. Heavy ion fusion reactions are important to extend the nuclear chart and for the synthesis of heavy elements. These reactions are also important for the understanding of the energy production and elemental synthesis in the stellar environments. With the advent of radioactive ion beams (RIBs), several novel exotic structures and phenomena like halo and Borromean nuclei have been discovered experimentally. Moreover, the experimental measurements performed with RIBs so far have shown that the fusion behaviour is uncertain and not so well understood. It is expected that the extended structure of these weakly bound nuclei may in principle lead a large enhancement of fusion. However, it can also be argued that due to their low binding energy, these nuclei may break up easily while approaching the fusion barrier, which may effectively reduce the complete fusion (CF) cross sections [10, 11]. Fusion with weakly bound stable projectiles such as 6,7 Li and 9 Be having cluster structures provide a good experimental ground to evaluate these contrasting propositions. It is now fairly well established that in the fusion reactions with weakly bound stable projectiles ( 6,7 Li and 9 Be) on different targets the complete fusion, where the ∗ vparkar@barc.gov.in † Present address :Physics Department, University of Notre Dame, Notre Dame, Indiana 46556, USA entire projectile or all its fragments are captured in the target, is suppressed when compared to predictions based on coupled channels calculations at energies above the Coulomb barrier [7, 12]. Similarly, the reduction of CF cross sections has also been observed when the CF cross sections measured in reactions with weakly bound stable projectiles are compared with that measured with strongly bound projectiles forming similar compound nucleus. The suppression of CF cross sections is often quantified through the CF suppression factor which has been deduced in several experiments with 6,7 Li and 9 Be projectiles on medium and heavy mass targets showing a systematic behaviour [7], which is found to be independent of target mass in many studies [13–16]. In general, the amount of suppression observed in CF cross sections is almost completely compensated by the incomplete fusion (ICF) cross sections, where part of the projectile is captured by the target. Although there is a large amount of CF data with weakly bound projectiles [7], simultaneous measurement of CF and ICF data is available for only few systems. Recently, the damping of the nuclear shell effect with excitation energy has been studied by measuring neutron spectra following the triton transfer in 205 Tl( 7 Li,α) 208 Pb reaction [17]. However the CF and ICF cross sections were not measured so far for this system. In general, the suppression effects are expected to be dependent on the variation due to Coulomb and nuclear breakup and cluster transfer depending on the Z of the target. However, the CF suppression with weakly bound projectiles 6,7 Li and 9 Be is found to be target independent. In the present work, we have measured the CF and ICF cross sections for 7 Li+ 205 Tl system and compared them with the similar existing data with 7 Li projectile on several targets to understand the systematic behaviour. In this paper, we report the measurement of CF and" 2401.07644v1,"1 Multi-Objective Optimization in STAR-RIS-Aided SWIPT with RSMA via Meta-Learning Mojtaba Amiri, Elaheh Vaezpour, Sepideh Javadi, Mohammad Robat Mili, Halim Yanikomeroglu, Fellow, IEEE, and Mehdi Bennis, Fellow, IEEE Abstract—Simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) is a cutting-edge concept for the sixth-generation (6G) wireless networks. In this letter, we propose a novel system that incorporates STAR-RIS with simultaneous wireless information and power transfer (SWIPT) using rate splitting multiple access (RSMA). The proposed system facilitates communication from a multi-antenna base station (BS) to single-antenna users in a downlink transmission. The BS concurrently sends energy and information signals to multiple energy harvesting receivers (EHRs) and information data receivers (IDRs) with the support of a deployed STAR- RIS. Furthermore, a multi-objective optimization is introduced to strike a balance between users’ sum rate and the total harvested energy. To achieve this, an optimization problem is formulated to optimize the energy/information beamforming vectors at the BS, the phase shifts at the STAR-RIS, and the common message rate. Subsequently, we employ a meta deep deterministic policy gradient (Meta-DDPG) approach to solve the complex problem. Simulation results validate that the proposed algorithm significantly enhances both data rate and harvested energy in comparison to conventional DDPG. Index Terms—Meta-learning, RSMA, SWIPT, STAR-RIS. I. I NTRODUCTION The concept of reconfigurable intelligent surface (RIS) is a key sixth-generation (6G) technology, attracting noteworthy attention. More specifically, each RIS consists of plenty of reflection units capable of adjusting amplitude and phase shift independently using a smart controller [1]. Typically, RISs can only reflect the received incident signal and thus working in one half-plane. Therefore, a new advanced type of RIS, simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS), is recommended to overcome this limitation by enabling the full-space coverage [2]. More specifically, authors in [3] considered the deployment of STAR-RIS in a full-duplex system aiming to maximize the average weighted sum rate. Moreover, a joint deployment and beamforming design algorithm was proposed in [4] to address the sum rate maximization problem in a downlink STAR-RIS- assisted communication system. Mojtaba Amiri is with the School of Electrical and Computer Engineering, University of Tehran, Tehran, Iran (e-mail: mojtaba.amiri@ut.ac.ir). Elaheh Vaezpour is with the Communication Department, ICT Research Institute, Tehran, Iran (e-mail: e.vaezpour@itrc.ac.ir). Sepideh Javadi and Mohammad Robat Mili are with the Pasargad Institute for Advanced Innovative Solutions (PIAIS), Tehran 1991633361, Iran (e-mails:sepideh.javadi@piais.ir, mohammad.robatmili@gmail.com). Halim Yanikomeroglu is with the Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada, (e-mail: halim@sce.carleton.ca). Mehdi Bennis is with the Centre for Wireless Communications, University of Oulu, 90570 Oulu, Finland (email: mehdi.bennis@oulu.fi). On the other hand, rate-splitting multiple access (RSMA) is a novel framework, offering substantial gains in spectral and energy efficiency. Motivated by the advantages of the integration of RIS/STAR-RIS with RSMA, a few existing works have explored the performance of this integration [5, 6, 7]. More specifically, the authors in [5] focus on maximizing the energy efficiency (EE) in a downlink RIS- aided communication system with RSMA. In [6], a proximal policy optimization method is introduced to address the sumrate maximization problem in a downlink STAR-RIS-assisted network with RSMA. Additionally, the authors in [7] explore a two-user RIS-aided RSMA system in the context of uplink transmission, with the goal of maximizing the achievable rate. Simultaneous wireless information and power transfer (SWIPT) is a cutting-edge technology addressing energy limitations in battery-powered devices [8]. Furthermore, optimizing both wireless communication performance and energy transfer is crucial, leading to multi-objective optimization approaches [9]. For instance, the sum rate maximization problem of multi-user SWIPT system with the deployment of an intelligent reflecting surface (IRS) is studied in [10], while the authors in [11] aim to maximize the weighted sum rate of the information users in an active IRS-assisted SWIPT system. It should be noted that this is the first work investigating a multi-user STAR-RIS-assisted SWIPT system with RSMA. In this setup, users are divided into two main groups, i.e., information decoding receivers (IDRs) and energy harvesting receivers (EHRs), to receive the signals reflected by a deployed STAR-RIS. The system performance is evaluated by jointly maximizing the total sum rate of IDRs and harvested energy by EHRs. Additionally, different from the conventional DDPG, a Meta-learning-based DDPG algorithm is formulated to solve the non-convex NP-hard problem. II. S YSTEM M ODEL In this section, we consider a downlink STAR-RIS-assisted multi-user SWIPT system with RSMA, where an STAR- RIS composed of M elements is implemented to assist the transmission between an N -antenna base station (BS) and K single-antenna mobile users. The K receivers are separated into two groups, i.e., U IDRs and V EHRs, such that U ∪ V = K and U ∩ V = ∅. The sets of RIS elements, BS antennas, IDRs and EHRs are represented by M = {1, 2, ..., M }, N = {1, 2, ..., N }, U = {1, 2, ..., U }, and V = {1, 2, ..., V }, respectively. The signal is divided into the refracted and reflected components by each element of a configurable and programmable STAR-RIS. The transmitted" 2401.07664v1,"Scalar modes of polarization and speed of gravitational waves in f (R) gravity Utkal Keshari Dash, ∗ Bal Krishna Yadav, † and Murli Manohar Verma ‡ Department of Physics, University of Lucknow, Lucknow 226 007, India We explore the gravitational waves (GWs) within the framework of the f (R) gravity model represented by f (R) = R 1+δ /R c δ in the weak field approximation. In this scenario, gravitational waves exhibit an additional polarization mode beyond the standard transverse-traceless (TT) tensor modes. We show that the polarization characteristics of these waves are connected to the scalaron mass and the effective potential derived from the function f (R). Furthermore, the study of the speed of gravitational waves (c g ) within the Horndeski theory, particularly using the f (R) model, reveals an intriguing feature about the equality of the speed of gravitational waves to that that of electromagnetic waves. This equivalence arises due to the modification introduced in the Ricci scalar within the f (R) model. I. INTRODUCTION Einstein’s General Relativity (GR) has evidently stood as an invaluable tool for addressing a wide range of cosmological issues related to gravitation. We have amassed a wealth of observational evidence supporting the existence of dark energy, such as data from sources like Supernovae type Ia, Baryon Acoustic Oscillation (BAO), Cosmic Microwave Background (CMB) anisotropies, and weak gravitational lensing, among others [1–4]. Dark energy, though not yet well known, is largely understood to be responsible for the ongoing accelerated expansion of the universe. Efforts to modify GR can be broadly categorized into two classes: (i) modified gravity models and (ii) modified matter models. In modified gravity models [5–9], the gravitational aspect of the Einstein-Hilbert action is altered in various ways. Numerous modified gravity models, such as f (R) theory, Scalar-Tensor theories, Braneworld models, and Gauss-Bonnet dark energy models, have been proposed and explored. Conversely, modified matter models [10–13] introduce an additional component of matter into the energy-momentum tensor of GR. Quintessence [14], k-essence, and phantom dark energy models are some examples of modified matter models. The standard model of cosmology, often referred to as the Lambda Cold Dark Matter (ΛCDM) model, provides a robust framework for explaining the late-time cosmic acceleration [15–17]. However, it faces challenges related to the cosmological constant Λ. Modified gravity models, particularly f (R) gravity models, have emerged as successful alternatives for addressing both the dark matter and dark energy problems by leveraging the concept of the scalaron mass. This mass exhibits dark matterlike effects on local scales and behaves as dark energy on cosmological scales[18]. Among the various f (R) models, the present paper ∗ cosmoskunal94@gmail.com † balkrishnalko@gmail.com ‡ sunilmmv@yahoo.com focuses on our previous model f (R) = R 1+δ /R c δ as discussed in detail in our work at small and large scales [19–21]. This model provides a sophisticated explanation of the two distinct phases of the universe. Specifically, it delves into how the mass of the scalaron depends on the δ parameter at galactic scales, revealing a sharp decrease for smaller values of δ and a subsequent increase for larger values. This insight enhances our understanding of the dynamical behaviour of the universe at both, local and cosmological, scales. The significant progress in addressing cosmological challenges owes much to the introduction of gravitational waves (GWs), a ground breaking discovery made in 2023 when the NANOGrav Collaboration [22] successfully detected gravitational waves through variations in Pulsar timing arrays [23]. Several findings suggest that these waves hold tremendous potential for shedding light on various cosmological questions, including the early inflationary epoch, where we have already shown the scalar spectral index and tensor-to-scalar ratio being very close to the recent observational data [20], age of the universe, the Hubble parameter, dark matter and dark energy. This also proves to be an asset for detection of black holes (BHs), Super Massive Black Holes(SMBHs) and their dynamical evolution such as spin etc [24]. In the framework of Einstein’s General Relativity (GR), the plane wave solution for gravitational waves encompasses two distinct polarization modes as plus (+) mode polarization and cross(×) mode polarizations, which shows the behaviour of gravitational waves in weak field limit in GR. This paper aims to focus on the gravitational waves in the weak field approximation limit in the modified f (R) gravity model and investigate the modes of polarisation that exist due to the effective generalisation of the Ricci scalar. It has been argued that the energy carried by these additional modes would cause perturbation in the angular momentum of the inspiralling compact binary system and change the phase evolution of tensor modes. We hope that if the phase correction due to scalar modes can be measured through their distinct waveforms, that would indicate the existence of these modes and would be able to constrain f (R) model parameters. The ob-" 2401.07671v2,"PREPRINT - Accepted at Design, Automation, and Test in Europe (DATE) Conference 2024 CLSA-CIM: A Cross-Layer Scheduling Approach for Computing-in-Memory Architectures Rebecca Pelke , Jose Cubero-Cascante , Nils Bosbach , Felix Staudigl , Rainer Leupers , Jan Moritz Joseph Institute for Communication Technologies and Embedded Systems RWTH Aachen University, Germany {pelke, cubero, bosbach, staudigl, leupers, joseph}@ice.rwth-aachen.de Abstract—The demand for efficient machine learning (ML) accelerators is growing rapidly, driving the development of novel computing concepts such as resistive random access memory (RRAM)-based tiled computing-in-memory (CIM) architectures. CIM allows to compute within the memory unit, resulting in faster data processing and reduced power consumption. Efficient compiler algorithms are essential to exploit the potential of tiled CIM architectures. While conventional ML compilers focus on code generation for CPUs, GPUs, and other von Neumann architectures, adaptations are needed to cover CIM architectures. Cross-layer scheduling is a promising approach, as it enhances the utilization of CIM cores, thereby accelerating computations. Although similar concepts are implicitly used in previous work, there is a lack of clear and quantifiable algorithmic definitions for cross-layer scheduling for tiled CIM architectures. To close this gap, we present CLSA-CIM, a cross-layer scheduling algorithm for tiled CIM architectures. We integrate CLSA- CIM with existing weight-mapping strategies and compare performance against state-of-the-art (SOTA) scheduling algorithms. CLSA-CIM improves the utilization by up to 17.9 × , resulting in an overall speedup increase of up to 29.2 × compared to SOTA. Index Terms—RRAM, CIM, compiler, cross-layer scheduling I. I NTRODUCTION The increasing demand for efficient computation of dataintensive machine learning (ML) applications has led to specialized architectures such as graphics processing units (GPUs) and tensor processing units (TPUs). However, a major performance limitation is the data movement between main memory and compute units, known as the von Neumann bottleneck [1]. Novel computing-in-memory (CIM) technologies, such as resistive random access memory (RRAM), tackle this bottleneck by unifying memory and computation unit [2]. These designs outperform their CMOS-based counterparts in memory capacity, device density, and power consumption [3]. In recent years, several CIM architectures have been introduced [4], [5], [6], [7]. These architectures adopt a tiled structure, as shown in Figure 1(a), wherein tiles are interconnected via a network on chip (NoC). To achieve high energy efficiency and inference performance, maximizing the utilization of the processing elements (PEs), located inside the tiles, is essential. This imposes a special challenge for CIM architectures since the neural network (NN)’s weights are statically assigned to the PEs and remain there during inference. To increase the PEs’s utilization, the compiler needs to exploit This work was funded by the Federal Ministry of Education and Research (BMBF, Germany) in the project NeuroSys (Project Nos. 03ZU1106CA). Fig. 1: NN inference on (a) tiled CIM architectures: (b) Layerby-layer scheduling, (c) weight duplication mapping, and (d) cross-layer scheduling both intra- and cross-layer scheduling of the workload [8]. Previous research has mainly focused on intra-layer scheduling techniques [9], [10], [11], [12], which only consider parallel execution of individual layers. Weight duplication, a mapping method proposed in [13], [14], [15], involves assigning the same weights to multiple PEs to divide input data between them. This approach is restricted by the limited number of PEs and can only accelerate individual layers. It does not increase the utilization of the PEs. In contrast, cross-layer scheduling accomplishes this by considering optimizations across layer boundaries [16]. Cross-layer scheduling forwards parts of a layer’s output feature map (OFM) to subsequent layers before the entire OFM has been computed (Figure 1(d)). While previous research has addressed the development of tiled CIM architectures that enable cross-layer scheduling in hardware [6], [13], [17], there is a lack of a software methodology to fully exploit this feature. We want to close this gap by presenting the following contributions: We extend the existing weight duplication approaches by developing an algorithm that decides which parts of the NN are duplicated to achieve minimum inference latency. Details of the TensorFlow implementation are provided. • We introduce CLSA-CIM, a novel approach for crosslayer scheduling on tiled CIM architectures. CLSA-CIM seamlessly integrates with existing mapping strategies, such as weight duplication, while leveraging established intra-layer scheduling techniques. • In a case study, we show that CLSA-CIM has the potential to achieve up to 29.2 × speedup by massively improving the PE utilization. •" 2401.07674v1,"Performance Evaluation of Kubernetes Networking Approaches across Constraint Edge Environments Georgios Koukis ‡† , Sotiris Skaperas ∗† , Ioanna Angeliki Kapetanidou ‡† , Lefteris Mamatas ∗† , Vassilis Tsaoussidis ‡† † Athena Research and Innovation Center, Greece ‡ Department of Electrical and Computer Engineering, Democritus University of Thrace, Xanthi, Greece ∗ Department of Applied Informatics, University of Macedonia, Thessaloniki Greece Emails: {gkoukis, ikapetan, vtsaousi}@ee.duth.gr, {sotskap, emamatas}@uom.edu.gr Abstract—Kubernetes (K8s) serves as a mature orchestration system for the seamless deployment and management of containerized applications spanning across cloud and edge environments. Since high-performance connectivity and minimal resource utilization become critical factors as we approach the edge, evaluating the performance of K8s networking in this context is essential. This paper contributes to this effort, by conducting a qualitative and quantitative performance evaluation of diverse Container Network Interface (CNI) plugins within different K8s environments, incorporating lightweight implementations designed for the Edge. Our experimental assessment was conducted in two distinct (intra- and inter-host) scenarios, revealing interesting insights for both researchers and practitioners. For example, the deployment of plugins across lightweight distributions does not necessarily lead to resource utilization improvements, e.g., in terms of CPU/memory or throughput. Index Terms—Edge/Fog Computing, Kubernetes, CNI plugins I. I NTRODUCTION Edge and Fog computing architectures aim to bring computational resources closer to the user, enabling real-time processing and reducing latency. In this regard, Kubernetes (K8s) has emerged as a prominent solution for automated and scalable orchestration/management of containerized workloads and services. However, due to the resource constraints of Edge and Fog environments, a number of lightweight K8s implementations have been proposed, such as K0s, K3s, and MicroK8s, that focus on reduced disk space, CPU and memory consumption [1]. In a similar vein, the ongoing project Cognitive Decentralised Edge Cloud Orchestration (CODECO, https://he-codeco.eu) investigates a K8s framework to enhance the flexibility of services across the edge-cloud continuum. CODECO pays particular attention on the identification of suitable toolkits for intelligent management of highly distributed environments with resource constraints. Furthermore, the Edge holds immense significance in enhancing the networking communication of applications and devices that have stringent communication requirements, e.g., delay-sensitive IoT devices. In this context, plugins are responsible for the networking communication among the different K8s components, enabling their connectivity with overlay/underlay networks, e.g., through the Border Gateway Protocol (BGP), Virtual Extensible LAN (VxLAN), IP in IP, etc. A widely adopted plugin specification has been proposed by the Container Network Interface (CNI) project, which also comprises libraries for the configuration of networking interfaces. Although several works study the effect of CNI plugins e.g., [1], [2] or lightweight K8s implementations e.g., [3] on the resource utilization of clusters, the impact of networking plugins on resource-restricted environments, e.g., in the Edge, is still under-investigated. We address this gap by conducting a qualitative and quantitative comparative analysis between various plugins across different K8s distributions, aiming to answer the following research questions: • RQ1: What is the impact of the interplay between the considered K8s distributions and CNI plugins in terms of resource utilization and network performance? • RQ2: Can we associate the performance and functional characteristics of CNI plugins with particular edge application requirements? Along these lines, we assess 5 representative CNI plugins across 4 different distributions (3 lightweight and vanilla K8s) over two distinct testbeds. In particular, we measure the CPU and RAM utilization, and also the throughput gains of the compared CNI plugins across different resource-restricted environments and various connectivity conditions. These include idle, pod-to-pod, and pod-to-service conditions for both TCP and UDP communication protocols. Furthermore, we consider intra-host and inter-host communication scenarios, where hosts are located either on the same or on different machines. Our results reveal interesting insights regarding the two identified research questions. The remainder of this paper is organized as follows. In Section II, we discuss recent related works that evaluate CNI plugins and lightweight K8s distributions. In Section III we approach the considered CNI plugins and distributions qualitatively. In Section IV we outline our experimentation setup and methodology, while in Section V we focus on the quantitative results of the experiments. Finally, Sections VI and VII detail the insights gained by our analysis along with our concluding remarks and future plans, respectively. II. R ELATED WORK Recent literature mainly considers the networking impact of CNI plugins on the conventional vanilla K8s distribution." 2401.07696v1,"Towards Automatic Translation of Machine Learning Visual Insights to Analytical Assertions Arumoy Shome a.shome@tudelft.nl Delft University of Technology Netherlands Luìs Cruz l.cruz@tudelft.nl Delft University of Technology Netherlands Visualisations are employed at various stages of a Machine Learning (ML) pipeline. They are used to understand and verify data properties during the early stages, summarise metrics and finetune models during development, and monitor performance postdeployment. The iterative and experimental nature of building ML systems heavily relies on insights from visualisations to guide design and implementation decisions [2–4, 8–10]. However, real-world data that ML systems encounter post- deployment seldom remain static. They often change as a reflection of the world, potentially violating initial assumptions made during development [1, 7]. Every subsequent iteration of the ML development cycle used to retrain and update the ML model, therefore demands manual validation of the visualisations that were used to test ML system properties. Assertions or analytical tests derived from ML visualisations can significantly reduce manual verification efforts. Such formal assertions record the AI practitioner’s observations about the model or data at a specific moment. They also serve as a reference point for future AI practitioners to understand the interpretations made from earlier visualisations. In a prior study currently under review, we investigate how frequently analytical tests are formulated from visualisations in ML systems and analysed the effectiveness of these tests. We mined 54, 070 Jupyter notebooks from GitHub that contain assertions written in Python and developed a novel methodology to identify 1, 764 notebooks which contain an assertion below a visualisation. We manually analysed the 1, 764 notebooks and catalogued 269 semantically related visualisation-assertion (VA) pairs (to be released publicly with the camera-ready version of the paper). Further in-depth analysis of the VA pairs revealed that assertions often fail to capture all the information obtained from the corresponding visualisations. Our results indicate that formulating analytical assertions from visualisations is an emerging testing technique in ML. However, it also highlights the limitations of current practices, demonstrating a need for automated tools that can assist ML practitioners in validating visualisations and formulating more comprehensive analytical assertions. In this paper, we propose our research vision to develop an automated tool to generate analytical assertions from ML visualisations. The research questions we plan to address along with the contributions we envision to make are presented below. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE 2024, April 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX RQ1. How are VA pairs used to perform ML verification tasks? We begin by creating a taxonomy that clusters the existing 269 VA pairs by specific ML verification tasks. This taxonomy not only enables us to fine-tune the data and model for the automated tool, but also serves as valuable reference for future ML practitioners. ABSTRACT Arie van Deursen arie.vandeursen@tudelft.nl Delft University of Technology Netherlands We present our vision for developing an automated tool capable of translating visual properties observed in Machine Learning (ML) visualisations into Python assertions. The tool aims to streamline the process of manually verifying these visualisations in the ML development cycle, which is critical as real-world data and assumptions often change post-deployment. In a prior study, we mined 54, 070 Jupyter notebooks from Github and created a catalogue of 269 semantically related visualisation-assertion (VA) pairs. Building on this catalogue, we propose to build a taxonomy that organises the VA pairs based on ML verification tasks. The input feature space comprises of a rich source of information mined from the Jupyter notebooks—visualisations, Python source code, and associated markdown text. The effectiveness of various AI models, including traditional NLP4Code models and modern Large Language Models, will be compared using established machine translation metrics and evaluated through a qualitative study with human participants. The paper also plans to address the challenge of extending the existing VA pair dataset with additional pairs from Kaggle and to compare the tool’s effectiveness with commercial generative AI models like ChatGPT. This research not only contributes to the field of ML system validation but also explores novel ways to leverage AI for automating and enhancing software engineering practices in ML. KEYWORDS SE4AI, NLP4Code, ML Testing, Visualisations, Assertions, Computational Notebooks, Automated Tool ACM Reference Format: Arumoy Shome, Luìs Cruz, and Arie van Deursen. 2024. Towards Automatic Translation of Machine Learning Visual Insights to Analytical Assertions. In Proceedings of 46th International Conference on Software Engineering (ICSE 2024). ACM, New York, NY, USA, 4 pages. https://doi.org/XXXXXXX. XXXXXXX 1 INTRODUCTION" 2401.07697v1,"Data vs. Model Machine Learning Fairness Testing: An Empirical Study Arumoy Shome Luís Cruz Arie van Deursen Delft University of Technology Delft, Netherlands a.shome@tudelft.nl Delft University of Technology Delft, Netherlands l.cruz@tudelft.nl Delft University of Technology Delft, Netherlands arie.vandeursen@tudelft.nl ABSTRACT Although several fairness definitions and bias mitigation techniques exist in the literature, all existing solutions evaluate fairness of Machine Learning (ML) systems after the training stage. In this paper, we take the first steps towards evaluating a more holistic approach by testing for fairness both before and after model training. We evaluate the effectiveness of the proposed approach and position it within the ML development lifecycle, using an empirical analysis of the relationship between model dependent and independent fairness metrics. The study uses 2 fairness metrics, 4 ML algorithms, 5 real-world datasets and 1600 fairness evaluation cycles. We find a linear relationship between data and model fairness metrics when the distribution and the size of the training data changes. Our results indicate that testing for fairness prior to training can be a “cheap” and effective means of catching a biased data collection process early; detecting data drifts in production systems and minimising execution of full training cycles thus reducing development time and costs. KEYWORDS SE4ML, ML Fairness Testing, Empirical Software Engineering, Datacentric AI ACM Reference Format: Arumoy Shome, Luís Cruz, and Arie van Deursen. 2024. Data vs. Model Machine Learning Fairness Testing: An Empirical Study. In Proceedings of 46th International Conference on Software Engineering (ICSE 2024). ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION While several contributions toward testing ML systems have been made in recent years, preference has primarily been given to robustness and correctness while other non-functional properties such as security, privacy, efficiency, interpretability and fairness have been ignored [22, 29, 32, 33]. Testing for fairness in ML systems however, is a multi-faceted problem and involves both technological and social factors. Although an abundance of definitions for fairness and consequently techniques to mitigate said bias exists in Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE 2024, April 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn the scientific literature, all existing solutions evaluate fairness after the training stage, using the predictions of the ML model. In contrast to prior work, we take a more holistic approach by testing for fairness at two distinct locations of the ML development lifecycle. First, prior to model training using fairness metrics that can quantify the bias in the training data (henceforth Data Fairness Metric or DFM). And second, after model training using fairness metrics that quantify the bias in the predictions of the trained model (henceforth Model Fairness Metric or MFM). While MFM has been widely adopted in practice and well researched in academia, we do not yet know the role of DFM when testing for fairness in ML systems. The research goal of this study is to evaluate the effectiveness of DFM for catching fairness bugs. We do this by analysing the relationship between DFM and MFM through an extensive empirical study. The analysis is conducted using 2 fairness metrics, 4 ML algorithms, 5 real-world tabular datasets and 1600 fairness evaluation cycles. To the best of our knowledge, this is the first study which attempts to bridge this gap in scientific knowledge. Our results are exploratory and open several intriguing avenues of research. The research questions along with the contributions of this paper are as follows. RQ1. What is the relationship between DFM and MFM as the fairness properties of the underlying training dataset change? DFM and MFM convey the same information when the distribution of the underlying training dataset changes. This implies that DFM can be used as early warning systems to catch data drifts in production ML systems that may affect its fairness. RQ2. How does the training sample size affect the relationship between DFM and MFM? Our analysis of the training sample size and how it influences the relationship between DFM and MFM reveals the presence of a trade-off between fairness, efficiency and correctness. In Section 5.2 we provide some practical guidelines on how to best navigate this trade-off. RQ3. What is the relationship between DFM and MFM across various training and feature sample sizes? DFM and MFM convey the same information when the training sample size changes. This implies that DFM can help practitioners catch fairness issues upstream and avoid execution costs of a full training cycle. All source code and results of the study are publicly accessible under the CC-BY 4.0 license 1 . 1 The replication package of this https://figshare.com/s/67206f7c219b12885a6f study is available here:" 2401.07698v1,"Online Learning of Piecewise Polynomial Signed Distance Fields for Manipulation Tasks Ante Marić, Yiming Li, and Sylvain Calinon Abstract— Reasoning about distance is indispensable for establishing or avoiding contact in manipulation tasks. To this end, we present an online method for learning implicit representations of signed distance using piecewise polynomial basis functions. Starting from an arbitrary prior shape, our approach incrementally constructs a continuous representation from incoming point cloud data. It offers fast access to distance and analytical gradients without the need to store training data. We assess the accuracy of our model on a diverse set of household objects and compare it to neural network and Gaussian process counterparts. Distance reconstruction and real-time updates are further evaluated in a physical experiment by simultaneously collecting sparse point cloud data and using the evolving model to control a manipulator. Index Terms— Signed Distance Fields; Representation Learning; Incremental Learning; Machine Learning for Robot Control I. I NTRODUCTION Scene representation is a naturally emerging topic in robotics as a basis for physical interaction. In recent years, implicit modeling methods have been used as compact representations of environment properties such as distance, occupancy, and color. Signed distance functions (SDFs) model distances to closest occupied points by assigning zero values to surfaces, negative values to surface interiors, and positive values elsewhere. Previously used in environment mapping and collision avoidance settings [1], they have recently seen use in robotic manipulation as the field moves towards exploring contact-rich behaviors [2]. In such scenarios, distance representations can be exploited to quickly and robustly retrieve gradients for a variety of tasks. Furthermore, modeling the full range of distances, as opposed to only the zero level-set, can be beneficial for reasoning about making or breaking contact, deformation, or penetration, with possible extensions for representing active agents such as users or robots. Commonly used implicit SDF models in robotics rely mainly on neural architectures or Gaussian process models, while alternative formulations remain less explored. Earlier computer graphics work implicitly encodes SDFs using basis functions, with recent extensions showing promising results aimed at simulation environments using This work was supported by the State Secretariat for Education, Research and Innovation in Switzerland and the European Commission’s Horizon Europe Program through the INTELLIMAN project (https://intellimanproject.eu/, HORIZON-CL4-Digital-Emerging Grant 101070136) and the SESTOSENSO project (http://sestosenso.eu/, HORIZON-CL4-Digital- Emerging Grant 101070310). The authors are with the Idiap Research Institute, CH-1920 Martigny, Switzerland and also with the EPFL, 1015 Lausanne, Switzerland. ante.maric@idiap.ch; yiming.li@idiap.ch; sylvain.calinon@idiap.ch Fig. 1: Mesh and distance level-sets of the Stanford Bunny reconstructed from piecewise polynomial basis functions. The model is learned incrementally from 1283 randomly sampled surface points and corresponding normal vectors. piecewise polynomial representations [3]. In robotics, basis functions have been used to encode movements as superpositions of primitives [4]. Building on this viewpoint, basis function representations of implicit distance can be seen as a step toward combining movement with shape primitives of robot environments or objects of interest. In many robotics settings, quickly building an environment model from sparse incoming data takes priority over achieving highly accurate representations. Doing so in an online manner additionally enables the integration of feedback for adaptive behavior in previously unseen environments. We formulate an online method for learning implicit signed distance fields represented as piecewise polynomial basis functions. Our method uses a simple incremental least squares approach and regularization scheme in order to approximate distance fields from incoming surface points and normals. Accuracy and performance of the piecewise polynomial representation can be balanced through interpretable hyperparameters like polynomial degree and number of segments. Model behavior can also easily be influenced by imposing priors. Our representation does not require storage of training data and can be run in real-time on both GPU and CPU. We evaluate its accuracy on a set of diverse household objects, with comparisons to Gaussian process and neural network counterparts. The smoothness and continuity of our representation are highlighted by using an evolving model to guide the movement of a physical manipulator." 2401.07716v1,"Layerwise Quantum Convolutional Neural Networks Provide a Unified Way for Estimating Fundamental Properties of Quantum Information Theory Myeongjin Shin, 1, ∗ Seungwoo Lee, 1 Mingyu Lee, 2 Donghwa Ji, 3 Hyeonjun Yeo, 4 Harrison J. Lee, 5, 6, † and Kabgyun Jeong 7, 8, ‡ 1 2 School of Computing, KAIST, Daejeon 34141, Korea Department of Computer Science and Engineering, Seoul National University, Seoul 08826, Korea 3 College of Liberal Studies, Seoul National University, Seoul 08826, Korea 4 Department of physics and astronomy, Seoul National University, Seoul 08826, Korea 5 School of Electrical and Electronic Engineering, Yonsei University, Seoul 03722, Korea 6 Quantum Computing R&D, Norma Inc., Seoul 04799, Korea 7 Research Institute of Mathematics, Seoul National University, Seoul 08826, Korea 8 School of Computational Sciences, Korea Institute for Advanced Study, Seoul 02455, Korea (Dated: January 17, 2024) The estimation of fundamental properties in quantum information theory, including von Neumann entropy, Rényi entropy, Tsallis entropy, quantum relative entropy, trace distance, and fidelity, has received significant attention. While various algorithms exist for individual property estimation, a unified approach is lacking. This paper proposes a unified methodology using Layerwise Quantum Convolutional Neural Networks (LQCNN). Recent studies exploring parameterized quantum circuits for property estimation face challenges such as barren plateaus and complexity issues in large qubit states. In contrast, our work overcomes these challenges, avoiding barren plateaus and providing a practical solution for large qubit states. Our first contribution offers a mathematical proof that the LQCNN structure preserves fundamental properties. Furthermore, our second contribution analyzes the algorithm’s complexity, demonstrating its avoidance of barren plateaus through a structured local cost function. I. INTRODUCTION In this paper, our objective is to estimate fundamental properties within quantum information theory, encompassing 1 log(Tr(ρ α ))), Tsallis entropy (S q (ρ) = von Neumann entropy (S(ρ) = −Tr(ρ log ρ)), Rényi entropy (S α (ρ) = 1−α 1 1 q 1−q (Tr(ρ ) − 1)), quantum relative entropy (S(ρ||σ) = Tr(ρ log ρ − ρ log σ)), trace distance (T (ρ, σ) = 2 Tr|ρ − σ|), p √ √  2 and fidelity (F (ρ, σ) = Tr ρσ ρ ). The estimation of these quantities has garnered significant interest, resulting in numerous papers [1–10]. However, a unified approach to estimate all these quantities has not been proposed. As a consequence, different algorithm implementations are necessary to estimate each quantity, leading to an increase in the required copies of the quantum state with the growing number of fundamental properties. Regarding algorithm implementation details, quantum neural estimation of entropies (QNEE) [9] stands out as a highly unified approach. QNEE utilizes variational formulas, where the lower or upper bounds of each formula correspond to fundamental properties. To optimize the variational formula and determine the lower or upper bounds, parameterized quantum circuits are employed. The advantage lies in the ease of implementing this algorithm in software, as only the variational formula needs to be altered to estimate other quantities. However, in terms of hardware cost and copy complexity, QNEE falls short of providing a unified solution. The ansatz and parameters in parameterized quantum circuits must be adjusted for each property, preventing the reuse of optimized parameters. Consequently, the number of training instances is proportional to the number of quantities to be estimated, leading to an increase in copy complexity. Additionally, both QNEE and other methods employing parameterized quantum circuits face a critical issue known as barren plateaus [11, 12]. This paper introduces an algorithm that employs a parameterized quantum circuit to estimate fundamental properties in a unified manner, addressing both implementation and complexity concerns. The proposed quantum circuit is trained layer-wise, with each layer utilizing a local cost function during optimization. Each layer’s objective is to diminish the dimension of the quantum state while preserving all fundamental properties with minimal error. Once a ∗ Electronic address: hanwoolmj@kaist.ac.kr † Electronic address: homology.manifold@gmail.com ‡ Electronic address: kgjeong6@snu.ac.kr" 2401.07717v1,"A Pragmatical Approach to Anomaly Detection Evaluation in Edge Cloud Systems Sotiris Skaperas ∗† , Georgios Koukis ‡† , Ioanna Angeliki Kapetanidou ‡† , Vassilis Tsaoussidis ‡† , Lefteris Mamatas ∗† ∗ Department of Applied Informatics, University of Macedonia, Thessaloniki Greece † Athena Research and Innovation Center, Greece ‡ Department of Electrical and Computer Engineering, Democritus University of Thrace, Greece Emails: {sotskap, emamatas}@uom.edu.gr, {gkoukis, ikapetan, vtsaousi}@ee.duth.gr Abstract—Anomaly detection (AD) has been recently employed in the context of edge cloud computing, e.g., for intrusion detection and identification of performance issues. However, stateof-the-art anomaly detection procedures do not systematically consider restrictions and performance requirements inherent to the edge, such as system responsiveness and resource consumption. In this paper, we attempt to investigate the performance of change-point based detectors, i.e., a class of lightweight and accurate AD methods, in relation to the requirements of edge cloud systems. Firstly, we review the theoretical properties of two major categories of change point approaches, i.e., Bayesian and cumulative sum (CUSUM), also discussing their suitability for edge systems. Secondly, we introduce a novel experimental methodology and apply it over two distinct edge cloud test-beds to evaluate the performance of such mechanisms in real-world edge environments. Our experimental results reveal important insights and trade-offs for the applicability and the online performance of the selected change point detectors. Index Terms—change point analysis, sequential analysis, edge cloud computing, anomaly detection I. I NTRODUCTION Edge networks have emerged as an ideal paradigm to support services that require minimal latency and high bandwidth, including the ever-growing Internet-of-Things (IoT) applications [1]. However, they often exhibit inherent resource constraints and resource optimization is essential to reap the benefits of the operation of machine learning (ML) solutions. Anomaly detection (AD) is a broad category of ML techniques aiming on identifying patterns that significantly deviate from the “normal” (i.e., expected) behavior, currently used in various network-related problems, e.g., intrusion detection [2]. In this context, change point (CP) analysis [3] is a suitable candidate for AD in resource constrained environments, since it is aligned to the ”quickest” detection of an abrupt change, also ensuring low computational complexity. Moreover, stemming from the class of sequential statistical analysis [4], these approaches bypass the need for exhaustive feature mining and labeling to achieve adequate performance. This framework has been efficiently incorporated in the cloud or wireless side of the edge, for instance we utilize them: (i) to trigger elasticity in unikernel-based edge clouds [5]; (ii) to detect denial of service attacks in software-defined wireless sensors networks [6]; and (iii) as a link reliability detector in software-defined smart-city networks [7]. However, most existing works evaluate the performance of the CP detectors based on the typical trade-off between detection delay in data instances and false alarm rate. Therefore, important aspects related to the computational demands, e.g., resource utilization, actual detection delay and scalability properties, remain under-discussed, with only a few exceptions delving into the theoretical computational complexity [8] or energy consumption [9]. Nevertheless, when dealing with edge devices, computational cost plays a crucial role and may influence the detection efficiency. For instance, a computationally complex algorithm may perform poorly under limited resources, while a less accurate but lightweight algorithm may lead to quicker responses. To address this research gap, we propose an experimentation methodology and corresponding facility built on top of real edge cloud test-beds, that pragmatically assesses the online performance of alternative CP procedures. Moreover, we provide support for crucial performance metrics related to resource utilization, i.e., CPU and memory consumption, and detection delay (DD), including actual DD and average response time. Note that our experimentation facility is fully configurable and extensible, e.g., it can be expanded with additional CP mechanisms. For example, it seamlessly incorporates a containerized implementation of MATLAB functions within our novel cloud-native AD evaluation framework. In this context, we investigate the applicability of two major CP detection approaches, i.e., Bayesian and cumulative sum (CUSUM), in edge environments. Also, we assess their various performance trade-offs in terms of actual DD (i.e., experimentally measured) and DD in data instances (i.e., theoretical), as well as edge cloud resource utilization. Lastly, we examine their behavior across two test-beds with different configurations to ensure that our insights do not depend on server hardware. The major contributions of this work are enlisted below: 1) We discuss key aspects of selected CP detectors with respect to their employment in edge environments. 2) We introduce a novel experimentation methodology and facility for assessing CP procedures, based on kubernetes workflows and containerized MATLAB functions. 3) We present valuable insights for the performance of the considered procedures in real-world Kubernetes-based" 2401.07727v1,"HexaGen3D: StableDiffusion is just one step away from Fast and Diverse Text-to-3D Generation Antoine Mercier Ramin Nakhli * Mahesh Reddy Rajeev Yasarla Hong Cai Fatih Porikli Guillaume Berger Qualcomm AI Research † {amercier, mahkri, ryasarla, hongcai, fporikli, guilberg}@qti.qualcomm.com Figure 1. HexaGen3D leverages pretrained text-to-image models to generate high-quality textured meshes in 7 seconds. Our approach works well with a broad range of text prompts and generalize to new objects or object compositions not encountered during finetuning. Abstract nesses the power of large, pretrained 2D diffusion models. More specifically, our approach, HexaGen3D, finetunes a pretrained text-to-image model to jointly predict 6 orthographic projections and the corresponding latent triplane. We then decode these latents to generate a textured mesh. HexaGen3D does not require per-sample optimization, and can infer high-quality and diverse objects from textual prompts in 7 seconds, offering significantly better quality-to-latency trade-offs when comparing to existing approaches. Furthermore, HexaGen3D demonstrates strong generalization to new objects or compositions. Despite the latest remarkable advances in generative modeling, efficient generation of high-quality 3D assets from textual prompts remains a difficult task. A key challenge lies in data scarcity: the most extensive 3D datasets encompass merely millions of assets, while their 2D counterparts contain billions of text-image pairs. To address this, we propose a novel approach which har- * Work done at Qualcomm AI Research during an internship. † Qualcomm AI Research is an initiative of Qualcomm Technologies, Inc. 1" 2401.07729v1,"SSL-Interactions: Pretext Tasks for Interactive Trajectory Prediction Prarthana Bhattacharyya 1 , Chengjie Huang 2 and Krzysztof Czarnecki 3 Abstract— This paper addresses motion forecasting in multiagent environments, pivotal for ensuring safety of autonomous vehicles. Traditional as well as recent data-driven marginal trajectory prediction methods struggle to properly learn nonlinear agent-to-agent interactions. We present SSL-Interactions that proposes pretext tasks to enhance interaction modeling for trajectory prediction. We introduce four interaction-aware pretext tasks to encapsulate various aspects of agent interactions: range gap prediction, closest distance prediction, direction of movement prediction, and type of interaction prediction. We further propose an approach to curate interaction-heavy scenarios from datasets. This curated data has two advantages: it provides a stronger learning signal to the interaction model, and facilitates generation of pseudo-labels for interaction-centric pretext tasks. We also propose three new metrics specifically designed to evaluate predictions in interactive scenes. Our empirical evaluations indicate SSL-Interactions outperforms state-of-the-art motion forecasting methods quantitatively with up to 8% improvement, and qualitatively, for interaction-heavy scenarios. Index Terms: trajectory forecasting, automated driving, selfsupervised learning, interaction modeling I. I NTRODUCTION Anticipating future behavior of surrounding agents is crucial for safety of autonomous vehicles. By accurately predicting the future trajectories of dynamic traffic agents, autonomous vehicles can strategically plan and execute maneuvers avoiding collisions. However, in a multi-agent environment, numerous entities simultaneously interact and influence each other’s behaviors. The main challenge lies in developing models that accurately captures these complex interactions between agents. Early trajectory prediction methods utilized techniques such as the Kalman filter and model-based approaches [1]. These methods focused on learning the dynamic actions of individual agents. Additionally, models like Social Forces [2] were used to capture human-like behaviors for goal navigation. However, these hand-crafted methods cannot handle complex interactions among multiple agents in real-world scenarios. Data-driven methods have significantly advanced the field of multi-agent prediction, leveraging large datasets to generate more accurate and contextually aware predictions [3]. However, when it comes to highly interactive scenarios, these marginal predictions can sometimes produce unrealistic results [4]. This is because the interactions between agents, which can significantly influence their future trajectories, are not adequately considered in marginal prediction models. On the other hand, we can use a joint predictor [4] to predict 1 Prarthana Bhattacharyya, 2 Chengjie Huang and 3 Krzysztof Czarnecki are with the Faculty of Engineering, University of Waterloo, 200 University Avenue, Waterloo, ON, Canada. Email: ( p6bhatta@uwaterloo.ca , c.huang@uwaterloo.ca , k2czarne@uwaterloo.ca ) trajectories in a joint space over multiple agents to generate trajectories that are more compliant with the actual scene. A joint predictor captures the interactions between agents more accurately by jointly considering their states in the prediction process. However the prediction space increases exponentially with the number of agents, resulting in a high computational cost that can make this approach impractical for real-time applications. This underlines the need for a compromise between marginal predictions and joint predictions - an approach that can capture the interactions between agents without incurring the high computational cost of joint prediction. In this paper, we propose to utilize pretext tasks for interaction modeling in motion forecasting. This offers several advantages. First, pretext tasks offer a way to decompose the joint distribution into a conditional and a marginal, presenting a computationally feasible yet effective solution, as shown in Fig. 1. Second, pretext tasks enable the incorporation of interaction-specific domain knowledge during the learning process. By designing tasks that reflect meaningful aspects of agent interaction, we can guide the model to capture relevant patterns in the data, which acts as an effective regularization technique. Third, pretext tasks can be designed in a manner that allows pseudo-labels to be generated from the available data itself. This enables us to leverage large amounts of un-annotated data. We introduce four interaction-aware pretext tasks for motion forecasting: range gap prediction, closest distance prediction, direction of movement prediction, and type of interaction prediction. In addition, we propose an approach to curate interactive scenarios from a large dataset and explicitly label interaction pairs. This curation process not only provides stronger training signal for the interaction model, it also generates effective pseudo-labels that facilitates pretext task learning. To evaluate the effectiveness of our proposal, we introduce three metrics that provide a better assessment of predictions in interactive scenarios. These metrics include interactive min-FDE(i-min-FDE), non-interactive min-FDE(nimin-FDE), and collision awareness metric(CAM). We also demonstrate the benefits of SSL-Interactions over the stateof-the-art, in terms of quantitative metrics and qualitative analysis. Our contributions are threefold: • We propose a framework called SSL-Interactions, that leverages pretext tasks to improve interaction modeling for motion forecasting. Specifically, we develop four pretext tasks, designed to capture various aspects of interaction based on domain-specific knowledge. • We propose a simple way to curate interaction-specific" 2401.07764v1,"1 When Large Language Model Agents Meet 6G Networks: Perception, Grounding, and Alignment Minrui Xu, Niyato Dusit, Fellow, IEEE, Jiawen Kang, Zehui Xiong, Shiwen Mao, Fellow, IEEE, Zhu Han, Fellow, IEEE, Dong In Kim, Fellow, IEEE, and Khaled B. Letaief, Fellow, IEEE Abstract—AI agents based on multimodal large language models (LLMs) are expected to revolutionize human-computer interaction and offer more personalized assistant services across various domains like healthcare, education, manufacturing, and entertainment. Deploying LLM agents in 6G networks enables users to access previously expensive AI assistant services via mobile devices democratically, thereby reducing interaction latency and better preserving user privacy. Nevertheless, the limited capacity of mobile devices constrains the effectiveness of deploying and executing local LLMs, which necessitates offloading complex tasks to global LLMs running on edge servers during long-horizon interactions. In this article, we propose a split learning system for LLM agents in 6G networks leveraging the collaboration between mobile devices and edge servers, where multiple LLMs with different roles are distributed across mobile devices and edge servers to perform user-agent interactive tasks collaboratively. In the proposed system, LLM agents are split into perception, grounding, and alignment modules, facilitating intermodule communications to meet extended user requirements on 6G network functions, including integrated sensing and communication, digital twins, and task-oriented communications. Furthermore, we introduce a novel model caching algorithm for LLMs within the proposed system to improve model utilization in context, thus reducing network costs of the collaborative mobile and edge LLM agents. Index Terms—6G networks, AI agents, integrated sensing and communication, digital twins, task-oriented communications I. I NTRODUCTION AI agents, designed to integrate AI models into everyday services as personal assistants to humans, have become a pivotal element in advancing towards artificial general intelligence (AGI) [1], [2]. AI agents powered by large language models (LLMs), i.e., LLM agents, possess the capability to follow user instructions, observe environments, make decisions, and execute actions at a human-equivalent level. Therefore, Minrui Xu and Dusit Niyato are with the School of Computer Science and Engineering, Nanyang Technological University, Singapore 639798, Singapore (e-mails: minrui001@e.ntu.edu.sg; dniyato@ntu.edu.sg). Jiawen Kang is with the School of Automation, Guangdong University of Technology, China (email: kavinkang@gdut.edu.cn). Zehui Xiong is with the Pillar of Information Systems Technology and Design, Singapore University of Technology and Design, Singapore 487372, Singapore (e-mail: zehui xiong@sutd.edu.sg). Shiwen Mao is with the Department of Electrical and Computer Engineering, Auburn University, Auburn, AL 36849-5201 USA (smao@ieee.org). Zhu Han is with the Department of Electrical and Computer Engineering, University of Houston, Houston, TX 77004 USA, and also with the Department of Computer Science and Engineering, Kyung Hee University, Seoul 446-701, South Korea (zhuhan22@gmail.com). Dong In Kim is with the Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon 16419, South Korea (e-mail: dikim@skku.ac.kr). Khaled B. Letaief is with the Department of Electrical and Computer Engineering, Hong Kong University of Science and Technology (HKUST), Hong Kong (e-mail: eekhaled@ust.hk). LLM agents can proactively provide users with recommendations for final decisions by understanding and remembering cross-application user intentions and behaviors. Particularly, AI agents observe surrounding environments by processing information in various modalities from sensors, leveraging the versatility of multimodal LLMs [3]. In addition, LLM agents can solve complex tasks by grounding the plan of action to achieve their missions through reasoning, memory, and verification. After the alignment between LLM agents and humans, agents can attain human-like intelligence to provide recommendations to users with text, tools, and embodied actions that are consistent with human values. Although the deployment of LLM agents on mobile devices in 6G networks allows democratizing access to services currently considered prohibitively expensive at cloud data centers, several issues remain in implementing the LLM agents for complex, multi-round interaction agent services [4], [5]. For mobile devices with limited capacities, running AI models of agents, which is both computation- and memory-intensive, is challenging for supporting the long-term execution of LLMs. In addition, these limitations are further exacerbated by the restricted context windows of LLMs, hindering LLM agents from performing long-term and complex interactions, such as perception, reasoning, and coding, which consume considerable available context resources [6]. To address these challenges, a split learning system based on collaborative endedge-cloud computing, which aims at partitioning LLM agents into mobile and edge agents, emerges as a viable solution. In this system, mobile LLM agents, operating local LLMs (0-10B parameters, e.g., LLAMA-7B) on mobile devices, can handle real-time, direct perception and alignment tasks. Meanwhile, edge LLM agents, hosting global LLMs, (>10B parameters, e.g., GPT-3) on edge servers, can utilize global information and historical memory to help mobile LLM agents perform complex tasks. There are several advantages to partitioning LLM agents into mobile and edge agents in 6G networks. First, flexible deployment of LLM agents can be supported by heterogeneous devices with different locations, capabilities, and contextual adaptability. Specifically, mobile LLM agents with proper local LLMs can operate effectively with their computing capabilities regardless of their locations and user scenarios. Second, long-horizon collaboration can be enabled across multiple mobile devices by bridging the integration between lowlevel operational plans of local LLMs and high-level strategic plans of global LLMs. Third, mobile LLM agents exhibit enhanced adaptability in dynamic open-ended environments." 2401.07773v1,"Article Towards Uncovering Dark Matter Effects on Neutron Star Properties: A Machine Learning Approach Prashant Thakur 1 , Tuhin Malik 2, ∗ and T. K. Jha 1 1 2 * Citation: Thakur, P.; Malik, T.; Jha, T.K. Towards Uncovering Dark Matter Effects on Neutron Star Properties: A Department of Physics, BITS-Pilani, K. K. Birla Goa Campus, Goa 403726, India CFisUC, Department of Physics, University of Coimbra, P-3004-516 Coimbra, Portugal Correspondence: tuhin.malik@uc.pt Abstract: Over the last few years, researchers have become increasingly interested in understanding how dark matter affects neutron stars, helping them to better understand complex astrophysical phenomena. In this paper, we delve deeper into this problem by using advanced machine learning techniques to find potential connections between dark matter and various neutron star characteristics. We employ Random Forest classifiers to analyze neutron star (NS) properties and investigate whether these stars exhibit characteristics indicative of dark matter admixture. Our dataset includes 32,000 sequences of simulated NS properties, each described by mass, radius, and tidal deformability, inferred using recent observations and theoretical models. We explore a two-fluid model for the NS, incorporating separate equations of state for nucleonic and dark matter, with the latter considering a fermionic dark matter scenario. Our classifiers are trained and validated in a variety of feature sets, including the tidal deformability for various masses. The performance of these classifiers is rigorously assessed using confusion matrices, which reveal that NS with admixed dark matter can be identified with approximately 17% probability of misclassification as nuclear matter NS. In particular, we find that additional tidal deformability data do not significantly improve the precision of our predictions. This article also delves into the potential of specific NS properties as indicators of the presence of dark matter. Radius measurements, especially at extreme mass values, emerge as particularly promising features. The insights gained from our study are pivotal for guiding future observational strategies and enhancing the detection capabilities of dark matter in NS. This study is the first to show that the radii of neutron stars at 1.4 and 2.07 solar masses, measured using NICER data from pulsars PSR J0030+0451 and PSR J0740+6620, strongly suggest that the presence of dark matter in a neutron star is more likely than only hadronic composition. Keywords: dark matter in NS; machine learning Machine Learning Approach. Particles 2024, 1, 1–16. https://doi.org/ Academic Editor: Armen Sedrakian 1. Introduction Received: 1 December 2023 Neutron stars (NS), because of their dense nature, are of great interest in the universe. Despite their importance in astrophysics, the insides of neutron stars remain a mystery. Neutron stars serve as natural laboratories for studying matter under extreme densities and pressures [1–3]. Neutron star cores can reach densities approximately 4–5 times greater than normal nuclear saturation density, posing an intriguing astrophysical puzzle. The internal structure of neutron stars, particularly their cores, is one of the most mysterious topics in astrophysics. Despite advances in observational astronomy, current measurements of neutron star properties have not been able to definitively rule out the presence of exotic forms of matter, such as a deconfined quark phase or admixed dark matter. The extreme conditions within these stars make it possible for states of matter to exist that are not yet fully understood or observed under terrestrial conditions [4]. Theoretical models suggest a range of scenarios for the core composition, from conventional nucleonic matter to more exotic forms, such as quark matter and strange matter, as discussed by Glendenning [1]. Revised: 23 December 2023 Accepted: 8 January 2024 Published: Copyright: © 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). Particles 2024, 1, 1–16. https://doi.org/10.3390/particles1010000 https://www.mdpi.com/journal/particles" 2401.07782v1,"1 Exploring Masked Autoencoders for Sensor-Agnostic Image Retrieval in Remote Sensing Jakob Hackstein, Gencer Sumbul, Member, IEEE, Kai Norman Clasen, Member, IEEE, and Begüm Demir, Senior Member, IEEE Abstract—Self-supervised learning through masked autoencoders (MAEs) has recently attracted great attention for remote sensing (RS) image representation learning, and thus embodies a significant potential for content-based image retrieval (CBIR) from ever-growing RS image archives. However, the existing studies on MAEs in RS assume that the considered RS images are acquired by a single image sensor, and thus are only suitable for uni-modal CBIR problems. The effectiveness of MAEs for crosssensor CBIR, which aims to search semantically similar images across different image modalities, has not been explored yet. In this paper, we take the first step to explore the effectiveness of MAEs for sensor-agnostic CBIR in RS. To this end, we present a systematic overview on the possible adaptations of the vanilla MAE to exploit masked image modeling on multi-sensor RS image archives (denoted as cross-sensor masked autoencoders [CSMAEs]). Based on different adjustments applied to the vanilla MAE, we introduce different CSMAE models. We also provide an extensive experimental analysis of these CSMAE models. We finally derive a guideline to exploit masked image modeling for unimodal and cross-modal CBIR problems in RS. The code of this work is publicly available at https://github.com/jakhac/CSMAE. Index Terms—Cross-modal retrieval, self-supervised learning, masked image modeling, vision transformer, remote sensing. I. I NTRODUCTION Content-based image retrieval (CBIR) from large-scale remote sensing (RS) image archives is one of the most important research topics in RS. CBIR aims to search for images similar to a given query image based on their semantic content. Thus, the accurate characterization of RS image representations is of great importance for CBIR [1]. To this end, deep learning (DL) based image representation learning (IRL) has been found successful for CBIR problems in RS. For a detailed review of DL-based CBIR studies in RS, we refer readers to [1], [2]. Compared to supervised DL-based IRL methods, selfsupervised IRL has recently attracted great attention for remote sensing (RS) images. Since it does not require the availability of training images annotated by land-use land-cover class labels (which can be time-consuming and expensive due to labeling costs), it allows to leverage ever-growing RS image archives for learning the parameters of DL models on a vast amount of RS images. Contrastive learning-based methods Jakob Hackstein, Kai Norman Clasen and Begüm Demir are with the Faculty of Electrical Engineering and Computer Science, Technische Universität Berlin, 10623 Berlin, Germany, also with the BIFOLD - Berlin Institute for the Foundations of Learning and Data, 10623 Berlin, Germany (e-mail: hackstein@campus.tu-berlin.de; k.clasen@tu-berlin.de; demir@tu-berlin.de). Gencer Sumbul is with the Environmental Computational Science and Earth Observation Laboratory (ECEO), École Polytechnique Fédérale de Lausanne (EPFL), 1950 Sion, Switzerland (e-mail: gencer.sumbul@epfl.ch). have initially paved the way for employing self-supervised IRL on RS images (e.g., [3], [4]). Recently, masked image modeling (MIM) [5], [6] (i.e., self-supervised learning through masked autoencoders [MAEs]) has been also found successful in RS [7]–[12] (see Section II) for self-supervised IRL. MAEs characterize image representations based on the pretext task of reconstructing images from their masked patches by dynamizing vision transformers (ViTs) [13]. Their success on IRL relies on two main reasons. First, in contrast to contrastive selfsupervised learning, MAEs are capable of accurately learning image representations without the application of any data augmentation strategies. This is of particular importance for RS images since most of the data augmentation strategies are designed for natural images and their direct adaptation to RS images may not be always feasible. Second, it has been shown that MAEs in combination with ViTs can be effectively scaled into larger DL models in proportion to the amount of training data [6], [14]. Although the existing studies have proven the success of MAEs for accurately learning RS image representations (see Section II), existing MIM approaches in RS are based on RS images acquired by a single image sensor. Thus, they are suitable to be utilized for only uni-modal CBIR problems. However, in RS, a CBIR task can be formulated as searching for semantically similar images across different image modalities that is known as cross-sensor CBIR [3], [15]–[19] (see Section II). When IRL is employed for cross-sensor CBIR, it is crucial to model not only intra-modal similarities, but also inter-modal similarities. This requires to learn RS image representations from multi-modal RS image archives. However, the existing MAEs in RS are not capable of employing the available multisensor (i.e., multi-modal) RS image archives for RS image representation learning. Despite the proven success of the existing MAEs in RS, the effectiveness of MAEs for sensoragnostic RS image retrieval has not been explored yet. In greater details, the direct adaptation of MAEs to model intermodal similarities across multi-modal RS image archives is challenging, since MAEs are originally designed to reconstruct uni-modal images. To address this issue, as a first time in RS, we explore the effectiveness of MAEs for sensor-agnostic image retrieval in RS. The main contributions of this paper are summarized as follows: • We present a systematic overview on the possible adaptations of the vanilla MAE [6] to exploit MIM on multisensor RS image archives that allows us to present crosssensor masked autoencoders (CSMAEs)." 2401.07793v1,"Flexibly Scaling Large Language Models’ Contexts Through Extensible Tokenization Ninglu Shao 1,2∗ Shitao Xiao 1 Zheng Liu 1† Peitian Zhang 1,2 1: Beijing Academy of Artificial Intelligence, 2: Gaoling School of Artificial Intelligence, Renmin University Abstract Large language models (LLMs) are in need of sufficient contexts to handle many critical applications, such as retrieval-augmented generation and few-shot learning. However, due to the constrained window size, the LLMs can only access to the information within a limited context. Although the size of context window can be extended by fine-tuning, it will result in a substantial cost in both training and inference stage. In this paper, we present Extensible Tokenization as an alternative method which realizes the flexible scaling of LLMs’ context. Extensible Tokenization stands as a midware in between of the tokenized context and the LLM, which transforms the raw token embeddings into the extensible embeddings. Such embeddings provide a more compact representation for the long context, on top of which the LLM is able to perceive more information with the same context window. Extensible Tokenization is also featured by its flexibility: the scaling factor can be flexibly determined within a feasible scope, leading to the extension of an arbitrary context length at the inference time. Besides, Extensible Tokenization is introduced as a drop-in component, which can be seamlessly plugged into not only the LLM itself and but also its fine-tuned derivatives, bringing in the extended contextual information while fully preserving the LLM’s existing capabilities. We perform comprehensive experiments on long-context language modeling and understanding tasks, which verify Extensible Tokenization as an effective, efficient, flexible, and compatible method to extend LLM’s context. Our model and source code will be made publicly available at https://github.com/FlagOpen/FlagEmbedding. 1 Introduction Large language models (LLMs) need to process long-sequence data in order to accomplish many critical tasks, like retrieval augmented generation and in-context learning. Unfortunately, the existing LLMs are constrained by the sizes of their context windows, which are far from enough to fully cover the input data in the corresponding scenarios. Although the LLM’s context window can be extended by fine-tuning [6; 11; 25], it will lead to a considerable cost at both training and inference time. Besides, the continual fine-tuning over long-sequence data is likely to impair the LLM’s original capability on shorter contexts, which is unfavorable to its practical usage. Alternatively, the LLMs can be also modified by many other techniques to establish longer context windows, such as sparse attention [9; 3; 36; 15], stream processing [33; 18], compressed memory [4; 8; 24; 27; 20], etc. However, the existing methods are still limited by manifold problems. For example, the sparse attention calls for customized GPU kernels which are not supported by the standard infrastructures; the stream processing ignores the information beyond the context window instead of making effective ∗ † Ninglu Shao (ninglu_shao@ruc.edu.cn), Shitao Xiao, and Zheng Liu are the co-first authors. Zheng Liu (zhengliu1026@gmail.com) is the correponding author. Preprint. Under review." 2401.07801v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Pedestrian Detection in Low-Light Conditions: A Comprehensive Survey Bahareh Ghari, Ali Tourani, Asadollah Shahbahrami, and Georgi Gaydadjiev Abstract—Pedestrian detection remains a critical problem in various domains, such as computer vision, surveillance, and autonomous driving. In particular, accurate and instant detection of pedestrians in low-light conditions and reduced visibility is of utmost importance for autonomous vehicles to prevent accidents and save lives. This paper aims to comprehensively survey various pedestrian detection approaches, baselines, and datasets that specifically target low-light conditions. The survey discusses the challenges faced in detecting pedestrians at night and explores state-of-the-art methodologies proposed in recent years to address this issue. These methodologies encompass a diverse range, including deep learning-based, feature-based, and hybrid approaches, which have shown promising results in enhancing pedestrian detection performance under challenging lighting conditions. Furthermore, the paper highlights current research directions in the field and identifies potential solutions that merit further investigation by researchers. By thoroughly examining pedestrian detection techniques in low-light conditions, this survey seeks to contribute to the advancement of safer and more reliable autonomous driving systems and other applications related to pedestrian safety. Accordingly, most of the current approaches in the field use deep learning-based image fusion methodologies (i.e., early, halfway, and late fusion) for accurate and reliable pedestrian detection. Moreover, the majority of the works in the field (approximately 48%) have been evaluated on the KAIST dataset, while the real-world video feeds recorded by authors have been used in less than six percent of the works. Index Terms—Pedestrian Detection, Object Detection, Computer Vision, Autonomous Vehicles I. I NTRODUCTION UTOMATIC identification and localization of pedestrians in images or video frames captured by visual sensors have become increasingly vital in the computer vision domain. Pedestrian detection has use cases in various fields, such as autonomous vehicles [1], [2], surveillance systems [3]–[5], and robotics [6]–[8]. This task can be challenging to resolve in real-world scenarios, as there are different factors to consider for accurate performance. Accordingly, various illumination conditions, dissimilar pedestrian appearances and poses, occlusion, camouflage, and cluttered backgrounds can bring about issues for pedestrian detection systems [9]. Regarding the introduced challenges, low illumination is the leading problem A Bahareh Ghari the Department Guilan, Iran. and of Asadollah Shahbahrami are with Computer Engineering, University of baharehghari@msc.guilan.ac.ir, shahbahrami@guilan.ac.ir Ali Tourani is with the Automation and Robotics Research Group, Interdisciplinary Centre for Security, Reliability, and Trust (SnT), University of Luxembourg, Luxembourg. ali.tourani@uni.lu . Georgi Gaydadjiev is with the Computer Engineering Laboratory, Delft University of Technology, The Netherlands. g.n.gaydadjiev@tudelft.nl . compared to others, as it has a natural or environment-related cause and cannot be prevented or naturally handled. It can be due to the time of the day, geographical location of where the scene is captured, weather conditions, etc. For instance, in some Scandinavian countries, especially during winter, the sunrise to sunset time can be less than ten hours and the pedestrian detection systems need to be adapted to the challenging scenarios. Although some approaches have used Light Detection And Ranging (LiDAR) sensors, which are accurate remote sensing technologies that use laser light for distance measurement and obstacle avoidance, such sensors do not provide rich information from the surroundings [10]. There are many recently introduced pedestrian detection approaches such as [11]–[16] that cover the task in a wide range of scenarios. However, few recent works focus on detecting pedestrians at night and in low visibility conditions. In low-illumination scenarios, it is much more difficult for autonomous vehicles equipped only with vision sensors to detect moving objects on the road and prevent incidents. Fig 1 depicts how challenging the pedestrian detection task is compared to the same ordinary task during the daytime. The mentioned fact has resulted in an increase in demand for developing computer vision algorithms that can work under various illumination conditions. Accordingly, this survey gives a deep review of 118 stateof-the-art low-light condition pedestrian detection algorithms. The research questions that the present work has aimed to answer are: RQ1 Which datasets and baselines are mainly employed in low-light pedestrian detection tasks? • RQ2 What are the current deep learning-based algorithmic trends in low-illumination pedestrian detection? • RQ3 Regarding the state-of-the-art solutions, what are the currently existing and unresolved challenges in practical large-scale applications, such as fully autonomous vehicles? • To answer these questions, the paper in hand contributes to the body of knowledge in the field by providing contributions listed below: A survey of more than a hundred papers in the field of nighttime pedestrian detection, • Review and classification of well-known baselines and datasets used for this purpose, • Categorization of the state-of-the-art approaches in nighttime pedestrian detection regarding their architectural variations, •" 2401.07812v1,"Wikidata as a seed for Web Extraction Kunpeng GUO ∗ Dennis Diefenbach The QA Company SAS Université Jean Monnet Saint Etienne, France kunpeng.guo@univ-st-etienne.fr The QA Company SAS Université Jean Monnet Saint Etienne, France dennis.diefenbach@the-qa-company.com Antoine Gourru Christophe Gravier Université Jean Monnet Saint Etienne, France antoine.gourru@univ-st-etienne.fr Université Jean Monnet Saint Etienne, France christophe.gravier@univ-st-etienne.fr ABSTRACT KEYWORDS Wikidata has grown to a knowledge graph with an impressive size. To date, it contains more than 17 billion triples collecting information about people, places, films, stars, publications, proteins, and many more. On the other side, most of the information on the Web is not published in highly structured data repositories like Wikidata, but rather as unstructured and semi-structured content, more concretely in HTML pages containing text and tables. Finding, monitoring, and organizing this data in a knowledge graph is requiring considerable work from human editors. The volume and complexity of the data make this task difficult and time-consuming. In this work, we present a framework that is able to identify and extract new facts that are published under multiple Web domains so that they can be proposed for validation by Wikidata editors. The framework is relying on question-answering technologies. We take inspiration from ideas that are used to extract facts from textual collections and adapt them to extract facts from Web pages. For achieving this, we demonstrate that language models can be adapted to extract facts not only from textual collections but also from Web pages. By exploiting the information already contained in Wikidata the proposed framework can be trained without the need for any additional learning signals and can extract new facts for a wide range of properties and domains. Following this path, Wikidata can be used as a seed to extract facts on the Web. Our experiments show that we can achieve a mean performance of 84.07 at F1-score. Moreover, our estimations show that we can potentially extract millions of facts that can be proposed for human validation. The goal is to help editors in their daily tasks and contribute to the completion of the Wikidata knowledge graph. Knowledge Graph Completion, Wikidata, Question Answering, Web Extraction, Linking, Web Crawling, Web Scraping CCS CONCEPTS • Information systems → Data extraction and integration. ∗ Corresponding Author Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. WWW ’23, May 1–5, 2023, Austin, TX, USA © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-1-4503-9416-1/23/04. . . $15.00 https://doi.org/10.1145/3543507.3583236 ACM Reference Format: Kunpeng GUO, Dennis Diefenbach, Antoine Gourru, and Christophe Gravier. 2023. Wikidata as a seed for Web Extraction. In Proceedings of the ACM Web Conference 2023 (WWW ’23), May 1–5, 2023, Austin, TX, USA. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/3543507.3583236 1 INTRODUCTION Knowledge Graphs (KGs) are data structures that allow us to organize and aggregate structured information about heterogeneous entities. Known examples of such knowledge graphs are Freebase [2], NELL [3], DBpedia [1], Yago [14] and more recently Wikidata [20]. While knowledge graphs like Wikidata contain an incredible amount of information, most of the knowledge on the Web is published on HTML websites in structured, semi-structured, and unstructured content. Aggregating this information in knowledge graphs is beneficial since one can interlink Web resources, and further allow the machine to exploit them for Natural Language Processing (NLP) tasks such as entity linking [15], query expansion [5], co-reference resolution [17], and question answering [6]. This work builds upon Wikidata, a public and open source knowledge graph currently relying on 23, 362 active users 1 to ingest and maintain its knowledge. Wikidata has grown to a knowledge graph with an impressive size with 17 billion triples with 10, 329 properties, collecting structured information about people, places, films, stars, publications, proteins, and many more. Finding, modeling, monitoring, and organizing this data in a knowledge graph requires considerable work from human editors as a whole. For a single editor, it is certainly difficult to keep track of the knowledge that is published on the Web and to follow the information that could be changing over time. The sheer volume and complexity of the data make it a demanding and time-consuming task. For instance, Evzen Amler is a researcher who corresponds to the Wikidata item Q48428974 2 . At the same time, this researcher has the ORCID 0000-0002-0977-8922 3 . There might be information published on https://orcid.org/ by the researcher that is not on Wikidata, like the affiliation or information about the education. 1 https://www.wikidata.org/wiki/Wikidata:Statistics 2 https://www.wikidata.org/wiki/Q994013 3 https://orcid.org/0000-0002-0977-8922" 2401.07822v1,"Original F 1 in emergent spacetime Seyed Khaki ∗ Abstract The existence of a quantum field theory over the “field with one element” was first addressed in 2012 by Bejleri and Marcolli, where it was shown that wonderful compactifications of the graph configuration spaces that appear in the calculation of Feynman integrals, as well as the moduli spaces of curves, admit a F 1 structure. Recently, we also examined some advantages of studying finite fields F q , wherein F 1 represents the fundamental string with the Planck length which plays a fundamental role in the model. Such a role was briefly described, by comparing the similarity between the collapse of the spacetime concept probing the scales below the Planck length and the mathematical collapse of the ’field’ concept at q = 1. In this letter, we elaborate more on this role by explaining how Kapranov and Smirnov’s perspective based on the Iwasawa theory is a perfect mathematical fit for the string theory. Particularly, their work suggests that the existence of F 1 alone is sufficient to create other fields F q emergent as its extensions, which exactly reflects the postulate of the string theory (where various vibrational modes of the fundamental string manifest as other fields). As support, a couple of evidence are provided that illustrate the physical importance of the Weyl group (known to be a reductive group over F 1 ), and explain why the calculation of the amplitudes in the ""amplitudes=combinatorial geometry"" program (initiated by Arkani-Hamed et al. in 2013) exhibits a combinatorial nature and simplifies the exponentially growing (O(4 n )) calculations of the Feynmann diagrams to a polynomially growing order (O(n 2 )) in the kinematic space of scattering data for the scalar theory with cubic interactions. 1 Introduction Inspired by [1], the existence of a quantum field theory (QFT) over F 1 , the “field with one element”, was first studied in 2012 by Bejleri and Marcolli [2], where they explored the potential presence of an additional F 1 structure for particular classes of algebraic varieties which innately emerge within the perturbative QFT. In particular, they showed that wonderful compactifications of the graph configuration spaces, that appear in the calculation of Feynman integrals in position space, as well as the moduli spaces of curves, admit a F 1 structure. Unfortunately, such a bright idea was not adequately tracked. The second outstanding research avenue addressing a likely connection of F 1 with physics is the studies of endomotive, presented in [3] as a means of representing the formation of quantum statistical mechanical systems (QSMS) tied to number theory through arithmetic data, which began with the introduction of Bost-Connes (BC) system in [4]. Remarkably, Connes, ∗ Academy of Fundamental Studies, Munich 80637, Germany Email: s.khaki@afundas.com 1" 2401.07828v1,"Transient Magnetoelastic Coupling in CrSBr Youn Jue Bae, 1,*,† Taketo Handa, 1 Yanan Dai, 1 Jue Wang, 1 Huicong Liu, 2 Allen Scheie, 3 Daniel G. Chica, 1 Michael E. Ziebel, 1 Andrew D. Kent, 4 Xiaodong Xu, 5 Ka Shen, 2 Xavier Roy, 1 Xiaoyang Zhu 1,* 1 Department of Chemistry, Columbia University, New York, NY 10027, USA The Center of Advanced Quantum Studies and Department of Physics, Beijing Normal University, Beijing 100875, China 3 MPA-Q, Los Alamos National Laboratory, Los Alamos, NM 87545, USA 4 Department of Physics, New York University, New York, NY 10003, USA 5 Department of Physics, University of Washington, Seattle, WA 98195, USA 2 ABSTRACT Recent research has revealed remarkable properties of the two-dimensional (2D) van der Waals layered crystal CrSBr, which is both a semiconductor and an A-type antiferromagnet. Here we show the role of strong magnetoelastic coupling in the generation and propagation of coherent magnons in CrSBr. Time and spatially resolved magneto-optical Kerr effect (tr- MOKE) microscopy reveals two time-varying transient strain fields induced by out-of-plane transverse and in-plane longitudinal lattice displacements. These transient strain fields launch coherent wavepackets of magnons, optical and acoustic at 24.6 ± 0.8 GHz and 33.4 ± 0.5 GHz, respectively. These findings suggest mechanisms for controlling and manipulating coherent magnons from distinct magnetoelastic couplings in this 2D van der Waals magnetic semiconductor. * † To whom correspondence should be addressed. Emails: YB: yb293@cornell.edu; XYZ: xyzhu@columbia.edu Current address: Department of Chemistry and Chemical Biology, Cornell University, Ithaca, NY 14853, USA 1" 2401.07829v1,"Cooling the Earth with CO 2 filled containers in space Orfeu Bertolami 1,2 , and Clovis Jacinto de Matos 3 1 Departamento de Fı́sica e Astronomia, Faculdade de Ciências, Universidade do Porto, Rua do Campo Alegre s/n, 4169-007 Porto, Portugal 2 Centro de Fı́sica das Universidades do Minho e do Porto, Rua do Campo Alegre s/n, 4169-007 Porto, Portugal 3 European Space Agency - ESA Headquarters, 75007 Paris, France Abstract We argue that geostationary (GEO) reflective containers filled with CO 2 could be used as shading devices to selectively cool areas on Earth’s surface. This proposal would be an interesting addition to the recently discussed suggestion of dumping CO 2 to space through the well of a space lift [1]. We also explore the possibility of producing propellants in GEO out of greenhouse gases expelled from the space lift. Finally, we discuss the much less effective idea of filtering the most prominent infrared bands of the incoming solar radiation using the CO 2 wrapped in transparent vessels. E-mail addresses: orfeu.bertolami@fc.up.pt; clovis.de.matos@esa.int 1" 2401.07862v1,"Adaptive Neural-Operator Backstepping Control of a Benchmark Hyperbolic PDE Maxence Lamarque a , Luke Bhan b , Yuanyuan Shi b , Miroslav Krstic b a École des Mines de Paris, France, b University of California, San Diego, USA Abstract To stabilize PDEs, feedback controllers require gain kernel functions, which are themselves governed by PDEs. Furthermore, these gainkernel PDEs depend on the PDE plants’ functional coefficients. The functional coefficients in PDE plants are often unknown. This requires an adaptive approach to PDE control, i.e., an estimation of the plant coefficients conducted concurrently with control, where a separate PDE for the gain kernel must be solved at each timestep upon the update in the plant coefficient function estimate. Solving a PDE at each timestep is computationally expensive and a barrier to the implementation of real-time adaptive control of PDEs. Recently, results in neural operator (NO) approximations of functional mappings have been introduced into PDE control, for replacing the computation of the gain kernel with a neural network that is trained, once offline, and reused in real-time for rapid solution of the PDEs. In this paper, we present the first result on applying NOs in adaptive PDE control, presented for a benchmark 1-D hyperbolic PDE with recirculation. We establish global stabilization via Lyapunov analysis, in the plant and parameter error states, and also present an alternative approach, via passive identifiers, which avoids the strong assumptions on kernel differentiability. We then present numerical simulations demonstrating stability and observe speedups up to three orders of magnitude, highlighting the real-time efficacy of neural operators in adaptive control. Our code (Github) is made publicly available for future researchers. This work was the subject of the 2023 Bode Prize Lecture by the last coauthor. 1 Introduction Following several papers in which PDE backstepping controllers were shown robust to the implementation of the gain kernels by replacing the solution of kernel PDEs by an offline-computed neural operator (NO) approximation of the kernel [5, 12, 19, 27, 28, 31], in this paper we introduce the first adaptive backstepping controller where the gain kernels are computed via NOs in real time, from online parameter estimates. We do so for a hyperbolic PDE with linear recirculation, the most accessible but nevertheless nontrivial (unstable) PDE system, with a functional coefficient that is unknown, and with boundary actuation. We employ an (indirect) adaptive version of a standard PDE backstepping controller for a 1-D hyperbolic PDEs but with the analytical gain kernel replaced with the operator approximated equivalent. We then show, under the kernel operator approximation, global stability of the resulting closedloop system via Lyapunov analysis and neural operator approximation theorems [8], [15]. Furthermore, we present an Email addresses: maxence.lamarque@etu.minesparis.psl.eu (Maxence Lamarque), lbhan@ucsd.edu (Luke Bhan), yus047@ucsd.edu (Yuanyuan Shi), krstic@ucsd.edu (Miroslav Krstic). Preprint submitted to Automatica alternative approach based on passive identifiers simplifying the assumptions on the gain-kernel derivatives at a cost of an increased dynamic order of the parameter estimator. This is the first result in which offline learning and online learning are both employed, working in tandem. Hence, it is important to explain these two distinct learning tasks. The operator from the plant coefficient to the kernel is learned offline — once and for all. The unknown plant coefficient is learned online, continually, using a parameter estimator. The offline and online learners are combined through the adaptive gain, where the NO is evaluated, at each time step, for the new plant coefficient estimate. The NO speeds up the evaluation of the adaptive gain by about 10 3 ×, relative to the hypothetical online solving of the gain kernel equation, and thus enables the real-time adaptive control of the PDE. Given the value of the 10 3 × speedup in computing the adaptive gain, the code for all the computational tasks performed in relation to this adaptive design are made publicly available on Github. Stabilization of PDEs using backstepping-based adaptive control. The first investigations into backsteppingbased adaptive control of PDEs were introduced for reactiondiffusion PDEs. Initially, a set of three approaches extending 17 January 2024" 2401.07865v1,"BOATS: Bayesian Optimization for Active Control of ThermoacousticS Bayu Dharmaputra ∗ , Pit Reckinger, Bruno Schuermans, Nicolas Noiray ∗ CAPS Laboratory, Department of Mechanical and Process Engineering, ETH Zürich, 8092, Zürich, Switzerland Abstract This investigation presents novel adaptive control algorithms specifically designed to address and mitigate thermoacoustic instabilities. Gas turbines are limited in their operational range due to thermoacoustic instability. Two control strategies are available to alleviate this issue: active and passive. Active control strategies have a wider flexibility than passive control strate- gies because they can adapt to the operating conditions of the gas turbine. However, optimizing the control parameters remains a challenge, especially if additional constraints have to be fulfilled, such as e.g. pollutant emission levels. To address this issue, we propose three adaptive control strategies based on Bayesian optimization. The first and foundational algorithm is the safeOpt algorithm, and the two adaptations that have been made are stageOpt and shrinkAlgo. The algorithms facilitate safe exploration within the control parameter space, ensuring compliance with the constraint func- tion, while simultaneously optimizing the objective function. The Gaussian ∗ Corresponding authors Email addresses: bayud@ethz.ch (Bayu Dharmaputra), noirayn@ethz.ch (Nicolas Noiray) Preprint submitted to Elsevier November 2023" 2401.07869v1,"Evolutionary dynamics of organised crime and terrorist networks Luis A. Martinez-Vaquero 1,2 , Valerio Dolci 3,4 and Vito Trianni 1 1 Institute of Cognitive Sciences and Technologies, National Research Council of Italy, via San Martino della Battaglia 44, 00185 Rome, Italy 2 Current address: Lab of Socioecology and Social Evolution, Department of Biology, KU Leuven, Naamsestraat 59, 3000 Leuven, Belgium 3 4 INFN Roma1, Rome, Italy Physics Department, Sapienza University of Rome, Italy Corresponding author Dr. Luis A. Martinez-Vaquero Department of Biology, KU Leuven Naamsestraat 59 3000 Leuven, Belgium email: l.martinez.vaquero@gmail.com Abstract Crime is pervasive into modern societies, although with different levels of diffusion across regions. Its dynamics are dependent on various socio-economic factors that make the overall picture particularly complex. While several theories have been proposed to account for the establishment of criminal behaviour, from a modelling perspective organised crime and terrorist networks received much less attention. In particular, the dynamics of recruitment into such organisations deserve specific considerations, as recruitment is the mechanism that makes crime and terror proliferate. We propose a framework able to model such processes in both organised crime and terrorist networks from an evolutionary game theoretical perspective. By means of a stylised model, we are able to study a variety of different circumstances and factors influencing the growth or decline of criminal organisations and terrorist networks, and observe the convoluted interplay between agents that decide to get associated to illicit groups, criminals that prefer to act on their own, and the rest of the civil society. 1 Introduction Criminal organisations (COs) and terrorist networks (TNs) represent different outcomes of a similar process, whereby individuals join together into illicit groups to bring forth criminal activities at the expenses of the civil society that they want to exploit or intimidate [1, 2]. Despite being inspired by different objectives and modus operandi, theories have been advanced about organised crime and terrorism laying at the two extremes of a continuum, in which differences get blurred in a mix of illegal and violent activities aimed at gaining both economical power and supremacy over the states [3, 4]. It is not uncommon to see criminal organisations 1" 2401.07873v1,"This article may be downloaded for personal use only. Any other use requires prior permission of the author and AIP Publishing. This article appeared in L. A. Martinez-Vaquero, ”Inequality leads to the evolution of intolerance in reputation-based populations”, Chaos 33 (3), 033119 (2023) (doi.org/10.1063/5.0135376) and may be found at https://pubs.aip.org/aip/cha/articleabstract/33/3/033119/2881304/Inequality-leads-to-the-evolutionof-intolerance. Copyright 2014 Luis A. Martı́nez-Vaquero. This article is distributed under a Creative Commons Attribution License. Inequality leads to the evolution of intolerance in reputation-based populations Luis A. Martinez-Vaquero 1, 2, 3, a) 1) Grupo de Sistemas Complejos, Universidad Politécnica de Madrid, 28040 Madrid, Spain 2) DEFE, Escuela Técnica Superior de Arquitectura, Universidad Politécnica de Madrid, 28040 Madrid, Spain 3) Grupo Interdisciplinar de Sistemas Complejos, Universidad Carlos III de Madrid, 28911 Leganés, Madrid, Spain This work studies the impact of economic inequality on the evolution of intolerance through a reputation-based model of indirect reciprocity. Results show that economic inequality is a powerful enhancer of intolerance, inducing the escalation of out-group discrimination even without the presence of new intolerant mutants. It also generates behavior modifications within tolerant disfavored minorities: their members either relax punishments against the uncooperative or prioritize helping the wealthy, even suffering discrimination in return. On the other hand, the redistribution of wealth is proved as a viable solution to avoid the spread of intolerance as long as it increases equality and is implemented before intolerance permeates part of the population. Economic inequality has been rising in modern societies during the last years and, according to evidence, it could be a key factor behind intolerance outbreaks. As our societies become more dependent on public reputation systems, a deeper understanding of the relationship between inequality, intolerance, and reputation is required. Evolutionary game theory has been proved as a suitable methodology to study the emergence and evolution of cooperation in populations. One of the main mechanisms proposed to explain cooperative behaviors in this framework is indirect reciprocity, which relies on the assignment of reputations to decide whether to cooperate with the other. Adapting an indirect reciprocity model to incorporate economic inequality and intolerance, this work studies the impact of the former on the emergence of the latter. It is analyzed under what circumstances intolerant strategies could invade tolerant groups in different scenarios and what is required for tolerance to be restored. Results show that inequality triggers the escalation of discriminatory attitudes at different levels. However, it is also responsible of counterintuitive behaviors within tolerant groups. One of the most significant is that tolerant disfavoured minorities may prioritize helping wealthy individuals who discriminate against over their own kind. The model is also applied to study the conditions un- a) l.martinez.vaquero@upm.es der which the redistribution of wealth may become a feasible solution to avoid intolerance. Results show that this policy should guarantee the reduction of inequality and be implemented before intolerant individuals invade any group of the population. I. INTRODUCTION The evolution of inequality from small-scale egalitarian societies was a major transition in human social organization. It emerged in Holocene, when resources became predictable and followed gradient or patching distributions 1 . During the last decades, economic inequality has been decreasing among nations through the improvement of low-income countries’ economies. However, the picture within nations is pretty different: the gaps between higher and lower income economic classes have been continuously growing 2 . Some authors argued that globalization has been one of the main catalysers of inequality 3 . Modern democracies have seen how their income inequality has skyrocketed in recent decades 4–7 . Even European countries, which have developed policies orientated to ensure a fairer share of the economic growth among the low level income groups, have failed to achieve the inequality reduction United Nations Sustainable Development Goal 8 . Moreover, national average income levels have shown not to be good proxies of inequality for most countries since some high- or middle-income countries display extreme inequality levels, such as Brazil, India and China 9 ." 2401.07875v1,"1 Safely and Autonomously Cutting Meat with a Collaborative Robot Arm Ryan Wright ∗ , Sagar Parekh ∗ , Robin White, and Dylan P. Losey Abstract—Labor shortages in the United States are impacting a number of industries including the meat processing sector. Collaborative technologies that work alongside humans while increasing production abilities may support the industry by enhancing automation and improving job quality. However, existing automation technologies used in the meat industry have limited collaboration potential, low flexibility, and high cost. The objective of this work was to explore the use of a robot arm to collaboratively work alongside a human and complete tasks performed in a meat processing facility. Toward this objective, we demonstrated proofof-concept approaches to ensure human safety while exploring the capacity of the robot arm to perform example meat processing tasks. In support of human safety, we developed a knife instrumentation system to detect when the cutting implement comes into contact with meat within the collaborative space. To demonstrate the capability of the system to flexibly conduct a variety of basic meat processing tasks, we developed vision and control protocols to execute slicing, trimming, and cubing of pork loins. We also collected a subjective evaluation of the actions from experts within the U.S. meat processing industry. On average the experts rated the robot’s performance as adequate. Moreover, the experts generally preferred the cuts performed in collaboration with a human worker to cuts completed autonomously, highlighting the benefits of robotic technologies that assist human workers rather than replace them. Video demonstrations of our proposed framework can be found here: https://youtu.be/56mdHjjYMVc Index Terms—Robotics, Meat Processing, Human- Robot Interaction, Autonomous Technology I. I NTRODUCTION Meat processing is a critical worldwide industry that has made great strides in safety and productivity over the last few decades. However, meat processing facilities across the United States are currently facing labor shortages that negatively impact facility owners, livestock producers, and food consumers. This labor shortage was exacerbated by the COVID-19 pandemic: livestock processing plants were among the top industries affected, comprising 6 to 8% of total cases and 3 to 4% of total deaths by mid July 2020 [46, 4]. The labor shortages experienced in the meat industry can Sagar Parekh and Ryan Wright contributed equally to this work. Ryan Wright and Robin White are with the Dept. of Animal and Poultry Science, Virginia Tech, Blacksburg, VA, USA. Sagar Parekh and Dylan Losey are with the Dept. of Mechanical Engineering, Virginia Tech, Blacksburg, VA, USA. Corresponding author can be contacted at: Dylan Losey, Goodwin Hall, 635 Prices Fork Road, Blacksburg, VA 24061, USA. Email: losey@vt.edu also be attributed to the public perception that meat industry jobs are often low-satisfaction careers [12] with increased risks of physical injury or post-traumatic stress disorder [50]. Today’s meat industry needs safe, skilled, and precise workers that can maintain the rigorous standards necessary for animal welfare and food safety [20]. Overall, improving the availability of labor would support more streamlined and reliable supply chains, ensure consistent and rigorous animal welfare standards, and maintain reliability in meat product availability, quality, and price [39, 52, 15]. Progress toward a more consistent and reliable workforce would not only enable the industry to better meet public needs, but will also increase competitiveness in the face of international meat price volatility [42]. Collectively, these labor supply challenges present an emerging opportunity for augmenting the workforce with robotic agents that assist human workers [1, 27]. We recognize that there are already specialized machines that automate specific parts of the meat processing workflow (e.g., forming machines that shape 200, 000 nuggets per hour) [14], however these technologies are not flexible or collaborative. For example, [54, 24] use 2D cameras for image segmentation and planning cuts, while [51] uses contact force feedback to adjust the cutting speed and cutting tool angle. These methods automate specific parts of the process where the robot operates in an isolated space. Similarly, the majority of existing technologies are built for a single purpose [41] and traditionally replace human labor without opportunities for collaboration [3]. To encourage widespread usage of automation in the meat industry, particularly for small and midsized plants, we must be able to account for carcass variability and dynamic workflows [45]. Looking beyond the meat industry, recent research in robotics has developed learning and control algorithms for multipurpose, collaborative robot arms. This includes control schemes to ensure robots are safe around humans [19, 13, 25], as well as vision and learning tools that enable robots to adapt to new tasks [36, 31, 37]. Recent growth of precision agricultural technologies and agricultural human-robot interactions is apparent in crop harvesting, fruit picking, and grading and sorting [23, 17, 30]. The application of these same advances would directly address the needs for flexible and collaborative autonomous technologies within the U.S. meat industry; however, autonomous, collabora-" 2401.07932v1,"Six-Dimenional Correlators From a Five-Dimensional Operator Product Expansion N. Lambert, a∗ A. Lipstein, b† and R. Mouland c‡ a b c Department of Mathematics King’s College London London, WC2R 2LS, UK Department of Mathematical Sciences Durham University Durham, DH1 3LE, UK Department of Applied Mathematics and Theoretical Physics University of Cambridge Cambridge, CB3 0WA, UK Abstract In this letter we discuss the operator product expansion of scalar operators in five-dimensional field theories with an SU(1, 3)×U(1) spacetime symmetry. Such theories arise by a novel conformal null reduction of six-dimensional Lorentzian conformal field theories. Unlike Lorentzian conformal field theories, three-point functions of generic operators in such theories are not completely fixed by SU(1, 3) × U(1) symmetry. However, we show that in a special case the functional form of the OPE coefficients can be fully determined, and we use them to fix the form of the three-point function. The result is shown to agree with correlation functions obtained by reduction of six-dimensional conformal field theories. ∗ E-mail address: neil.lambert@kcl.ac.uk E-mail address: arthur.lipstein@durham.ac.uk ‡ E-mail address: r.mouland@damtp.cam.ac.uk †" 2401.07935v1,"6-DoF Grasp Pose Evaluation and Optimization via Transfer Learning from NeRFs Gergely Sóti 1,2 , Xi Huang 2 , Christian Wurll 1 and Björn Hein 1,2 Abstract— We address the problem of robotic grasping of known and unknown objects using implicit behavior cloning. We train a grasp evaluation model from a small number of demonstrations that outputs higher values for grasp candidates that are more likely to succeed in grasping. This evaluation model serves as an objective function, that we maximize to identify successful grasps. Key to our approach is the utilization of learned implicit representations of visual and geometric features derived from a pre-trained NeRF. Though trained exclusively in a simulated environment with simplified objects and 4-DoF topdown grasps, our evaluation model and optimization procedure demonstrate generalization to 6-DoF grasps and novel objects both in simulation and in real-world settings, without the need for additional data. Supplementary material is available at: https://gergely-soti.github.io/grasp I. I NTRODUCTION Robots are increasingly being deployed in less controlled environments, from domestic settings with vacuuming robots to medical facilities with surgical robots, and even in industrial and surveillance contexts. Despite significant research efforts in the field of robotic manipulation, robots that can handle everyday objects are still missing from real-world environments. This gap is particularly notable given the wide range of potential applications in logistics, retail, and home automation. One fundamental task that stands as a bottleneck to these applications is grasping, which is essential for activities ranging from simple pick-and-place tasks in packaging and sorting to fulfilling orders in warehouses, restocking shelves in stores, and even loading dishwashers at home. Addressing the challenge of grasping in less controlled, real-world environments is far from trivial. Several factors contribute to this challenge: the need to generalize to unknown objects, achieving reliable performance under realworld conditions, and scaling to handle the diversity and uncertainties inherent in real-world settings. Although some existing approaches perform well in the real-world, they rely on real-world data or heavily augmented and fine-tuned simulated data [1]–[5]. These methods would still struggle with mismatches in data distribution, a likely occurrence in real-world applications, and would require a vast amount of data to overcome this limitation. The authors are with 1 Institute of Robotics and Autonomous Systems, Karlsruhe University of Applied Sciences, 76133 Karlsruhe, Germany, and 2 Institute for Anthropomatics and Robotics, Karlsruhe Institute of Technology, 76131 Karlsruhe, Germany. We would like to thank Prof. Andreas Wagner of the Karlsruhe University of Applied Sciences for providing computational resources for this research. This research is being conducted as part of the KI5GRob project funded by the German Federal Ministry of Education and Research (BMBF) under project number 13FH579KX9. gergely.soti@h-ka-w.de Fig. 1. Two grasp candidates after optimization for grasping a boot in the real world. The left images display the model’s input, the middle images depict how the model ’imagines’ the scene from a different perspective, and the right image shows the executed grasp, indicated by the green marker. Note that the markers depicting the gripper pose are overlays and do not get occluded by objects in the scene. The model was only trained in simulation using monochromatic prismatic objects and top-down grasps; it has never been seen boots, real-world images, or non-top-down grasps. In this work, we introduce a method that leverages Neural Radiance Fields (NeRF) for robotic grasping. We transfer the learned implicit representations of visual and geometric features from a trained NeRF model to evaluate grasp candidates, where higher values indicate a more likely successful grasp. Using the output of this function as an objective for optimization enables the identification of successful 6- degrees-of-freedom (DoF) grasp poses based on RGB camera images with known intrinsics and extrinsics. Although our model was trained on simple 4-DoF grasps in simulation, it generalizes to 6-DoF grasps both in simulation and in the real world (Fig. 1) without additional modules like segmentation or pose estimation. Generalization to the realworld is achieved without adaptation or using real-world training data. II. R ELATED W ORK Common approaches to skill acquisition in robotics from low-level sensor data include imitation learning [6], [7] and reinforcement learning [8], [9]. Imitation learning leverages human demonstrations for supervised learning of a policy. Reinforcement learning operates autonomously but requires extensive data and environmental interactions, making it less" 2401.07955v1,"A Study on Large Language Models’ Limitations in Multiple-Choice Question Answering Aisha Khatun , Daniel G. Brown David R. Cheriton School of Computer Science University of Waterloo, Canada {aisha.khatun, dan.brown}@uwaterloo.ca, Abstract The widespread adoption of Large Language Models (LLMs) has become commonplace, particularly with the emergence of open-source models. More importantly, smaller models are well-suited for integration into consumer devices and are frequently employed either as standalone solutions or as subroutines in various AI tasks. Despite their ubiquitous use, there is no systematic analysis of their specific capabilities and limitations. In this study, we tackle one of the most widely used tasks - answering Multiple Choice Question (MCQ). We analyze 26 small open-source models and find that 65% of the models do not understand the task, only 4 models properly select an answer from the given choices, and only 5 of these models are choice order independent. These results are rather alarming given the extensive use of MCQ tests with these models. We recommend exercising caution and testing task understanding before using MCQ to evaluate LLMs in any field whatsoever. 1 Introduction Large Language Models (LLMs) - although primarily trained for next-token prediction - have taken the world by storm with their versatile use cases. The recent success of LLMs with chat interface has prompted its wide use across all groups of users for casual chatting, research, as part of products, and so on. Models are condensed into small sizes and used in laptops, phones, and even Raspberry PIs [MLC LLM, 2023; Gerganov, 2023]. There has been a push to reduce model size as well as improve performance thus producing smaller models that outperform larger models [Jiang et al., 2023a; Zhou et al., 2023]. In light of these developments, we focus our study on one of the simplest forms of tasks – Multiple Choice Questions (MCQ). MCQs are used in conjunction with LLMs quite often, to extract a model’s personality [Huang et al., 2023; Jiang et al., 2023b] or political standing [Feng et al., 2023], make it write grade school tests [FitzGerald et al., 2022] or standardized tests like MCAT, USMLE [Bommineni et al., 2023; Brin et al., 2023], and so on. There are many ways a question can be framed and many ways to devise a metric to evaluate models [Robinson and Wingate, 2023; Fourrier et al., 2023; NLPurr, 2023]. Although simple, MCQs are more difficult for models to solve than they appear at first glance. An important ability required to answer MCQs is to be able to narrow down the response to one of the given options. In this work, we analyze the responses from 26 small open-source models and find that 65% of the models are in fact not good at solving MCQ problems and have difficulty understanding the task at hand. More than 70% of the models’ responses depend on the order of the choices, instead of the choices themselves, making their responses unacceptable. Only 2 models, out of 26, successfully answer MCQs and do not depend on choice order. This work aims to bring awareness to the casual and widespread use of MCQ tests to assess LLMs in various fields like political bias and identification of misinformation. We hope our work can shed more light on the use of LLMs in downstream tasks as well as the metrics used to assess and choose models. 2 Related Work One of the most prominent uses of MCQ is in LLM evaluation benchmarks. Benchmarks are used as fodder for leaderboards to rank LLMs. The Open LLM leaderboard from HuggingFace 1 , for example, uses Eleuther AI Language Model Evaluation Harness [Gao et al., 2023] to evaluate LLMs on 7 datasets, of which 6 use MCQ. BIG bench benchmark [Srivastava et al., 2023] has 214 tasks, 165 of which are marked with the “multiple-choice” tag. MCQ can be used to determine models’ political positioning [Feng et al., 2023], to simulate and evaluate models with standardized tests [Bommineni et al., 2023; Brin et al., 2023; OpenAI, 2023], in medicine [Wu et al., 2023], in law [Lai et al., 2023], and in many other fields. Unfortunately, the MCQ format, as is used typically, does not always elicit the correct type of response from LLMs. Gupta et al. [2023] investigate the applicability of personality tests for LLMs and conclude that these tests are not appropriate for LLMs due to lack of robustness to prompt template and choices order. Khatun and Brown [2023] find that subtle changes in prompt wording change a model’s response. 1 https://huggingface.co./spaces/HuggingFaceH4/open llm leaderboard" 2401.07956v1,"VANISHING COEFFICIENTS IN TWO q-SERIES RELATED TO LEGENDRE-SIGNED PARTITIONS TAYLOR DANIELS Abstract. We demonstrate some 10-periodic properties of the coefficients of two qseries related to partition numbers signed by the Legendre symbol ( a 5 ) and to the Rogers-Ramanujan continued fraction R(q). 1 Introduction The past two decades have seen a boom of work on periodic vanishings coefficients in various q-series; we note [1,2,4–6] as only a small portion of the extant literature. In this paper we consider two q-series arising naturally from the notion of partitions “signed” by the Legendre symbol χ 5 (n) := ( n 5 ) associated to 5; namely χ 5 (n) is 1 (or −1) when n is (or is not) a quadratic residue modulo 5, and χ 5 (n) is 0 when 5 | n. For n ∈ N and any partition π = (a 1 , a 2 , . . . , a k ) of n, let χ 5 (π) := χ 5 (a 1 )χ 5 (a 2 ) · · · χ 5 (a k ), [−χ 5 ](π) := (−1) k χ 5 (a 1 )χ 5 (a 2 ) · · · χ 5 (a k ). With this notation we define the integers p 5 (n) and p † 5 (n) via X X p 5 (n) = χ 5 (π) and p † 5 (n) = [−χ 5 ](π), π∈Π[n] (1.1) π∈Π[n] where Π[n] is the set of all (ordinary) partitions of n; the quantities p 5 (n) are the aforementioned Legendre-signed partition numbers. Our primary result is the following 10-periodic vanishings in the sequences (p 5 (n)) N and (p † 5 (n)) N . Theorem 1.1. One has p 5 (10j + 2) = 0 and p † 5 (10j + 6) = 0 for all j ≥ 0. In addition to the vanishings of Theorem 1.1, we establish two further relations between the quantities p 5 (n) and p † 5 (n). Theorem 1.2. One has p † 5 (10j) = p 5 (10j) and p † 5 (10j + 8) = −p 5 (10j + 8) for all j ≥ 0. We consider (p 5 (n)) N and (p † 5 (n)) N primarily through the lens of q-series, that is, series P ∞ of the form n=0 a n q n defined for |q| < 1. Using the notations ∞ Y (z; q) = (z; q) ∞ = (1 − zq n ) and (z 1 , . . . , z m ; q) = (z 1 ; q) · · · (z m ; q), n=0 Dept. of Mathematics, Purdue Univ., 150 N University St, W Lafayette, IN 47907 E-mail address: daniel84@purdue.edu. 2020 Mathematics Subject Classification. Primary: 11B65, 11P83. Keywords and phrases: q-Series, vanishing coefficients, partitions, Legendre symbol. 1" 2401.07958v1,"GD-CAF: Graph Dual-stream Convolutional Attention Fusion for Precipitation Nowcasting Lóránd Vatamány, Siamak Mehrkanoon ∗ Department of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands Abstract Accurate precipitation nowcasting is essential for various purposes, including flood prediction, disaster management, optimizing agricultural activities, managing transportation routes and renewable energy. While several studies have addressed this challenging task from a sequence-to-sequence perspective, most of them have focused on a single area without considering the existing correlation between multiple disjoint regions. In this paper, we formulate precipitation nowcasting as a spatiotemporal graph sequence nowcasting problem. In particular, we introduce Graph Dual-stream Convolutional Attention Fusion (GD-CAF), a novel approach designed to learn from historical spatiotemporal graph of precipitation maps and nowcast future time step ahead precipitation at different spatial locations. GD-CAF consists of spatio-temporal convolutional attention as well as gated fusion modules which are equipped with depthwise-separable convolutional operations. This enhancement enables the model to directly process the highdimensional spatiotemporal graph of precipitation maps and exploits higher-order correlations between the data dimensions. We evaluate our model on seven years of precipitation maps across Europe and its neighboring areas collected from the ERA5 dataset, provided by Copernicus. The model receives a fully connected graph in which each node represents historical observations from a specific region on the map. Consequently, each node contains a 3D tensor with time, height, and width dimensions. Experimental results demonstrate that the proposed GD-CAF model outperforms the other examined models. Furthermore, the averaged seasonal spatial and temporal attention scores over the test set are visualized to provide additional insights about the strongest connections between different regions or time steps. These visualizations shed light on the decision-making process of our model. Keywords: Precipitation nowcasting, High dimensional graph precipitation data, Graph Attention Networks, Deep Learning 1. Introduction Precipitation nowcasting involves forecasting the forthcoming intensity of rainfall typically on a timescale ranging from minutes to a few hours. Nowcasting can help the operations of several weather dependent sectors including energy management, retail, flood, traffic control and emergency services [1]. To serve these sectors effectively, the accuracy of nowcasting must extend across a range of spatial and temporal scales. Two primary approaches are commonly employed for precipitation nowcasting. The first one involves ensemble numerical weather prediction (NWP) systems, which rely on the physical properties of the atmosphere to generate multiple realistic precipitation forecasts. However, these methods are not suitable for short-term predictions due to their high computational expense, sensitivity to noise, and dependence on the initial conditions of the event [2]. The second approach is optical flow, a technique for deriving a velocity field from consecutive images. This method typically involves two steps: feature tracking and extrapolation [3]. Unlike supervised deep learning approaches, optical flow methods are unsupervised algorithms and often serve as baseline predictions [4]. ∗ Corresponding author Email address: s.mehrkanoon@uu.nl (Siamak Mehrkanoon) Preprint submitted to arXiv In contrast to NWP models, data-driven approaches do not rely on the physical properties of the atmosphere. Instead, they utilize historical weather observations to train models capable of mapping input data to target outputs [5]. Among these data-driven models, deep neural network architectures stand out, as they are trained in an end-to-end fashion and possess the ability to extract complex underlying patterns from data by incorporating multiple nonlinear layers. Recent advances in deep learning have showcased remarkable progress in the fields of weather element forecasting and related nowcasting tasks [6, 7, 8, 9, 10, 11, 12]. In particular, Convolutional Neural Networks (CNNs) based models have already demonstrated success in addressing the weather forecasting challenge [13, 14]. However, it’s worth noting that CNN-based methods typically do not account for the spatial relationships between weather stations. In a prior study [5], the approach involved transforming historical data into a tensor format (comprising weather stations, weather variables, and time steps), which was subsequently fed into the model, with convolution operations applied across the data volume. Consequently, the neighborhood relationships between weather stations were primarily determined by their order in the dataset rather than explicitly considering their spatial proximity. Weather patterns are inherently spatial, with various meteorological factors interacting across geographical regions. January 17, 2024" 2401.07976v1,"High-precision mass measurements of neutron deficient silver isotopes probe the robustness of the N = 50 shell closure Z. Ge, 1, 2, * M. Reponen, 1, † T. Eronen, 1 B. S. Hu, 3, 4, 5 M. Kortelainen, 1 A. Kankainen, 1 I. D. Moore, 1 D. A. Nesterenko, 1 C. X. Yuan, 6 O. Beliuskina, 1 L. Cañete, 1, ‡ R. de Groote, 1, 7 C. Delafosse, 1, 8 P. Delahaye, 9 T. Dickel, 2, 10 A. de Roubin, 1, § S. Geldhof, 1, ¶ W. Gins, 1 J. D. Holt, 3, 11 M. Hukkanen, 1, 8 A. Jaries, 1 A. Jokinen, 1 Á. Koszorús, 12, 13, 7 G. Kripko-Koncz, 10 S. Kujanpää, 1 Y. H. Lam, 14 S. Nikas, 1 A. Ortiz-Cortes, 1, 9 H. Penttilä, 1 D. Pitman-Weymouth, 1 W. Plaß, 2, 10 A. Raggio, 1 S. Rinta-Antila, 1 J. Romero, 1, 12 M. Stryjczyk, 1 M. Vilen, 1, 13 V. Virtanen, 1 and A. Zadvornaya 1, || 1 Department of Physics, University of Jyväskylä, P.O. Box 35, FI-40014, Jyväskylä, Finland 2 GSI Helmholtzzentrum für Schwerionenforschung GmbH, 64291 Darmstadt, Germany 3 TRIUMF, 4004 Wesbrook Mall, Vancouver, BC V6T 2A3, Canada 4 National Center for Computational Sciences, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831, USA 5 Physics Division, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831, USA 6 Sino-French Institute of Nuclear Engineering and Technology, Sun Yat-Sen University, Zhuhai, 519082, Guangdong, China 7 KU Leuven, Instituut voor Kern- en Stralingsfysica, B-3001 Leuven, Belgium 8 Centre d’Etudes Nucléaires de Bordeaux Gradignan, UMR 5797 CNRS/IN2P3 - Université de Bordeaux, 19 Chemin du Solarium, CS 10120, F-33175 Gradignan Cedex, France 9 GANIL, CEA/DSM-CNRS/IN2P3, Bd Henri Becquerel, 14000 Caen, France 10 II. Physikalisches Institut, Justus-Liebig-Universität Gießen, 35392 Gießen, Germany 11 Department of Physics, McGill University, Montréal, QC H3A 2T8, Canada 12 Department of Physics, University of Liverpool, Liverpool, L69 7ZE, United Kingdom 13 Experimental Physics Department, CERN, CH-1211 Geneva 23, Switzerland 14 Institute of Modern Physics, Chinese Academy of Sciences, Lanzhou 730000, People’s Republic of China (Dated: January 17, 2024) High-precision mass measurements of exotic 95−97 Ag isotopes close to the N = Z line have been conducted with the JYFLTRAP double Penning trap mass spectrometer, with the silver ions produced using the recently commissioned inductively-heated hot cavity catcher laser ion source at the Ion Guide Isotope Separator On-Line facility. The atomic mass of 95 Ag was directly determined for the first time. In addition, the atomic masses of β -decaying 2 + and 8 + states in 96 Ag have been identified and measured for the first time, and the precision of the 97 Ag mass has been improved. The newly measured masses, with a precision of ≈ 1 keV/c 2 , have been used to investigate the N = 50 neutron shell closure confirming it to be robust. Precise empirical shell-gap and pairing energies determined with the new ground-state mass data are used to benchmark state-of-the-art ab initio calculations with various chiral effective field theory Hamiltonians. In addition, density functional theory (DFT) calculations and configuration-interaction shell-model (CISM) calculations are compared with the experimental results. All theoretical approaches face challenges to reproduce the trend of nuclear ground-state properties in the silver isotopic chain across the N =50 neutron shell and toward the proton drip-line. Furthermore, the precise determination of the isomeric excitation energy of 96m Ag serves as a benchmark for ab initio predictions of nuclear properties beyond the ground state, specifically for odd-odd nuclei situated in proximity to the proton dripline below 100 Sn. The nuclear landscape around the heaviest known doublymagic self-conjugate nucleus 100 Sn exhibits a rich variety of nuclear structure phenomena [1]. Fundamental nuclear properties of nuclei in this region, such as their binding energies, are essential to probe the robustness of the N = Z = 50 shell closure and the evolution of single-particle energies [2]. These properties additionally support the investigation of the protonneutron interaction on long-lived isomers [3–5], and the prox- * Corresponding author: z.ge@gsi.de † Corresponding author: mikael.h.t.reponen@jyu.fi ‡ Northeastern University London, Devon House, 58 St Katharine’s Way, E1W 1LP, London, United Kingdom § LPC Caen, Université de Caen Normandie, 14050 Caen Cedex, France ¶ KU Leuven, Instituut voor Kern- en Stralingsfysica, B-3001 Leuven, Bel- gium || Present address: University of Edinburgh, Edinburgh, EH9 3FD, United Kingdom imity of the proton drip line [6]. Furthermore, the binding energies serve as important input for an accurate description of the rapid proton capture (rp) process occurring in extreme astrophysical environments [7]. The robustness of the established magic numbers far from stability can be evaluated both with experimentally measured and theoretically estimated atomic masses [8, 9]. Masses of 95-97 Ag (N = 48 - 50) provide information on the evolution of the N = 50 shell gap near the proton dripline, where the magic numbers possibly vanish and new ones may appear. The atomic masses near the N = Z line also provide information concerning the proton-neutron interaction and Wigner energy [10]. Computationally costly theoretical approaches to calculate the properties of neutron-deficient nuclei near the N = Z region have been intensively used to predict the binding energy, decay rates, excitation energies, quadrupole collectivity and the enhanced magicity [2, 9–19]. Accurate experimental mass data are highly desired to validate the predictions of" 2401.07994v1,"A Novel Approach for Automated Program Repair using Round-Trip Translation with Large Language Models FERNANDO VALLECILLOS RUIZ, Simula Research Laboratory, Norway ANASTASIIA GRISHINA, Simula Research Laboratory, Norway MAX HORT, Simula Research Laboratory, Norway LEON MOONEN, Simula Research Laboratory, Norway and BI Norwegian Business School, Norway Research shows that grammatical mistakes in a sentence can be corrected by translating it to another language and back using neural machine translation with language models. We investigate whether this correction capability of Large Language Models (LLMs) extends to Automated Program Repair (APR). Current generative models for APR are pre-trained on source code and fine-tuned for repair. This paper proposes bypassing the fine-tuning step and using Round-Trip Translation (RTT): translation of code from one programming language to another programming or natural language, and back. We hypothesize that RTT with LLMs restores the most commonly seen patterns in code during pre-training, i.e., performs a regression toward the mean, which removes bugs as they are a form of noise w.r.t. the more frequent, natural, bug-free code in the training data. To test this hypothesis, we employ eight recent LLMs pre-trained on code, including the latest GPT versions, and four common program repair benchmarks in Java. We find that RTT with English as an intermediate language repaired 101 of 164 bugs with GPT-4 on the HumanEval-Java dataset. Moreover, 46 of these are unique bugs that are not repaired by other LLMs fine-tuned for APR. Our findings highlight the viability of round-trip translation with LLMs as a technique for automated program repair and its potential for research in software engineering. CCS Concepts: • Software and its engineering → Correctness; Automatic programming; Software testing and debugging. Additional Key Words and Phrases: automated program repair, large language models, machine translation 1 INTRODUCTION As software becomes ubiquitous and more people engage in software engineering (SE) tasks, the need to ensure its reliability and integrity increases. Automated program repair (APR) aims to fix errors in source code with minimal human involvement, thus reducing code maintenance needs and releasing resources for creative code writing. With the advent of language models trained on source code, learning-based methods that use generative and translation models to fix bugs have started to compete with traditional heuristic and constraint-based approaches for APR [22, 28]. Despite all progress, it remains a challenge for both learning-based and other repair methods to correctly address all bugs in APR benchmarks. A particular challenging class of bugs are those that require the model to understand complex contexts and logic. To overcome this situation, alternative techniques for APR must be investigated. The starting point for this paper is the observation that grammatical errors in natural language can be fixed by translating sentences to another intermediate language and then back, a process known as round-trip translation (RTT) [14]. Inspired by how RTT can correct errors in natural language, we set out to investigate to what extent it can fix bugs in code in a similar fashion. Authors’ addresses: Fernando Vallecillos Ruiz, fernando@simula.no, Simula Research Laboratory, Oslo, Norway; Anastasiia Grishina, anastasiia@simula.no, Simula Research Laboratory, Oslo, Norway; Max Hort, maxh@simula.no, Simula Research Laboratory, Oslo, Norway; Leon Moonen, leon.moonen@ computer.org, Simula Research Laboratory, Oslo, Norway and BI Norwegian Business School, Oslo, Norway. This work is licensed under a Creative Commons Attribution 4.0 International License." 2401.08003v1,"Jewelry Recognition via Encoder-Decoder Models José M. Alcalde-Llergo Enrique Yeguas-Bolı́var Andrea Zingoni Dept. of Economics, Engineering, Computing and Numerical Analysis Dept. of Economics, Engineering, Society and Business Organization (DEIM) University of Córdoba Society and Business Organization (DEIM) University of Tuscia Córdoba, Spain University of Tuscia Viterbo, Italy eyeguas@uco.es Viterbo, Italy andrea.zingoni@unitus.it jose.alcalde@unitus.it Alejandro Fuerte-Jurado Backend Developer GAC Travel Córdoba, Spain alejfuejur@gmail.com Abstract—Jewelry recognition is a complex task due to the different styles and designs of accessories. Precise descriptions of the various accessories is something that today can only be achieved by experts in the field of jewelry. In this work, we propose an approach for jewelry recognition using computer vision techniques and image captioning, trying to simulate this expert human behavior of analyzing accessories. The proposed methodology consist on using different image captioning models to detect the jewels from an image and generate a natural language description of the accessory. Then, this description is also utilized to classify the accessories at different levels of detail. The generated caption includes details such as the type of jewel, color, material, and design. To demonstrate the effectiveness of the proposed method in accurately recognizing different types of jewels, a dataset consisting of images of accessories belonging to jewelry stores in Córdoba (Spain) has been created. After testing the different image captioning architectures designed, the final model achieves a captioning accuracy of 95%. The proposed methodology has the potential to be used in various applications such as jewelry e-commerce, inventory management or automatic jewels recognition to analyze people’s tastes and social status. Index Terms—Image Captioning, Classification, Object Detection, Jewelry, Deep Learning, Human Behavior to perform this task an encoder-decoder structure is commonly used. Specifically, convolutional neural networks (CNNs) are typically the encoders due to their ability to process the input image and extract a set of high-level feature representations. On the other hand, recurrent neural networks (RNNs) are commonly used as decoder to generate a sequence of words to describe the image defined by the features extracted by the encoder. For this reason, these two techniques working together have significantly improved the performance of image captioning systems, achieving an almost human-level performance on some benchmark datasets [3]. Nevertheless, there are still many challenges and open problems that need to be addressed to further improve the accuracy and robustness of image captioning systems. An artificial intelligence tool capable of automatically identifying and describing jewelry can simulate human intuitive behavior, leading to an increased connection between individuals from diverse cultures and customs: Overcoming language and cultural barriers: by providing accurate and detailed descriptions of jewelry in various languages, an AI tool for jewelry recognition can overcome language and cultural barriers. This enables people to understand and appreciate the characteristics and cultural value of jewelry from other cultures. • Encouraging curiosity and cultural exchange: by offering information about the history, symbolism, and craftsmanship of jewelry, a jewelry recognition AI tool can spark curiosity and foster deeper cultural exchange. This can lead to meaningful conversations and dialogues between individuals of different backgrounds. • Promoting appreciation and respect for diversity: understanding and appreciating jewelry from different cultures can foster greater appreciation and respect for cultural diversity. This can promote tolerance, inclusivity, and harmony among individuals and communities with different traditions and customs. • I. I NTRODUCTION Image captioning is a challenging task in the field of computer vision and natural language processing, which involves generating a textual description for a given input image [1]. The goal of image captioning is to enable machines to understand visual content in a similar way as humans and generate captions that accurately describe the content of the image. This task has gained significant attention in recent years due to its potential applications in various domains, such as assistive technology for visually impaired individuals, automatic image tagging and retrieval, or social media content analysis. In the last years, deep learning based approaches have emerged as a promising solution to the problem of image captioning, leveraging the power of deep neural networks to learn complex mappings between images and text [2]. In order" 2401.08008v1,"Analysing the Needs of Homeless People Using Feature Selection and Mining Association Rules José M. Alcalde-Llergo Carlos Garcı́a-Martı́nez Manuel Vaquero-Abellán Artificial Vision Applications (AVA) University of Córdoba Córdoba, Spain i72alllj@uco.es Computing and Numerical Analysis University of Córdoba Córdoba, Spain cgarcia@uco.es Nursing, Physiotherapy and Pharmacology University of Córdoba Córdoba, Spain en1vaabm@uco.es Pilar Aparicio-Martı́nez Enrique Yeguas-Bolı́var Nursing, Physiotherapy and Pharmacology University of Córdoba Córdoba, Spain n32apmap@uco.es Computing and Numerical Analysis University of Córdoba Córdoba, Spain eyeguas@uco.es Abstract—Homelessness is a social and health problem with great repercussions in Europe. Many non-governmental organisations help homeless people by collecting and analysing large amounts of information about them. However, these tasks are not always easy to perform, and hinder other of the organisations duties. The SINTECH project was created to tackle this issue proposing two different tools: a mobile application to quickly and easily collect data; and a software based on artificial intelligence which obtains interesting information from the collected data. The first one has been distributed to some Spanish organisations which are using it to conduct surveys of homeless people. The second tool implements different feature selection and association rules mining methods. These artificial intelligence techniques have allowed us to identify the most relevant features and some interesting association rules from previously collected homeless data. Index Terms—AI for inclusivity, Feature selection, Association rules, Homelessness, Data collection I. I NTRODUCTION According to the European Commission [1], in 2019, more than 700,000 people were sleeping rough in the European Union, approximately 70% more than in 2009. Homeless people are one of the most vulnerable groups in society, continuously exposed to accidents, diseases, violence, precarious nutrition and other factors that compromise their life. This problem tends to affect more to adult men [2], but in recent years we are seeing a growth in homelessness among people between 15 and 29 in Europe [1]. Homeless people rely on non-governmental organisations (NGOs) to obtain essential supplies such as food, clothes, blankets or hygiene materials. In order to provide these supplies, NGOs need to collect information about the main homeless people requirements, so they have to hire people or look for volunteers to conduct surveys of this social group. However, some previous data collections contain information about homeless people. For example, the Spanish National Statistic Institute (INE) conducted different types of surveys on sociodemographic characteristics, housing, work activity, health, economic situation, studies, social services, and relationship with the judicial system of 3,433 homeless people [3]. In recent years, the evolution of computer systems and artificial intelligence (AI) algorithms has made possible to develop instruments that could help to perform these data collection and analysis tasks. However, there are no methods in the literature that attempt to find interesting relationships between attributes of homeless people, nor do they attempt to predict the health status of a homeless person. The SINTECH project aims to develop a set of tools to address these tasks and facilitate the work of NGOs in helping homeless people. We briefly summarise our contributions as follows: We propose a mobile application to collect data on the homeless. This application provides other functionalities such as dissemination of NGOs information, locating homeless help centres, or contacting help services. • We provide some data analysis AI tools to obtain interesting information about homeless people. These tools are divided in two modules: a feature selection module and an association rules generation module. • We evaluate the results obtained by the different AI modules applied over the INE homeless people dataset [3]. The final results are composed of: a set of relevant features to predict the health condition of a homeless person, some classifiers to predict this health condition and a set of association rules which describe interesting relationships between some of the data attributes. • The rest of the paper is organised as follows. Section II surveys some related work. In Section III we present a description of the mobile application and the applied AI methods. The experimental design and the results obtained by the different tools are analysed in Sections IV and V, respectively. Finally, we expose our final conclusions in Section VI." 2401.08014v1,"1 Convolutional Neural Network Compression via Dynamic Parameter Rank Pruning Manish Sharma, Student Member, IEEE, Jamison Heard, Member, IEEE, Eli Saber, Senior Member, IEEE, Panos P. Markopoulos, Senior Member, IEEE Abstract—While Convolutional Neural Networks (CNNs) excel at learning complex latent-space representations, their overparameterization can lead to overfitting and reduced performance, particularly with limited data. This, alongside their high computational and memory demands, limits the applicability of CNNs for edge deployment. Low-rank matrix approximation has emerged as a promising approach to reduce CNN parameters, but its application presents challenges including rank selection and performance loss. To address these issues, we propose an efficient training method for CNN compression via dynamic parameter rank pruning. Our approach integrates efficient matrix factorization and novel regularization techniques, forming a robust framework for dynamic rank reduction and model compression. We use Singular Value Decomposition (SVD) to model lowrank convolutional filters and dense weight matrices and we achieve model compression by training the SVD factors with back-propagation in an end-to-end way. We evaluate our method on an array of modern CNNs, including ResNet-18, ResNet- 20, and ResNet-32, and datasets like CIFAR-10, CIFAR-100, and ImageNet (2012), showcasing its applicability in computer vision. Our experiments show that the proposed method can yield substantial storage savings while maintaining or even enhancing classification performance. Impact Statement—The rapid proliferation of edge computing and Internet of Things devices demands lightweight yet efficient machine learning models. Current Convolutional Neural Networks (CNNs), while powerful, are often too resource-intensive for these applications. Our proposed Dynamic Parameter Rank Pruning method automates the compression of CNNs during training without compromising performance. Specifically, our approach dynamically adapts the rank of layers during training based on data and task complexity, thereby eliminating the need for meticulous rank selection and manual adjustments either before or after training. This research is crucial for enabling smarter, more resource-efficient applications in diverse This research was supported by an academic grant from the National Geospatial-Intelligence Agency Award No. HM0476-19-1-2014, Project Title: Target Detection/Tracking and Activity Recognition from Multimodal Data. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of NGA, DoD, or the US government. Approved for public release, NGA-U- 2023-01817. This research was also supported in part by the Air Force Office of Scientific Research (AFOSR) under award FA9550-20-1-0039. M. Sharma is with the Chester F. Carlson Center for Imaging Science, Rochester Institute of Technology, Rochester, NY 14623 USA (e-mail: ms8515@rit.edu). J. Heard is with the Department of Electrical and Microelectronic Engineering, Rochester Institute of Technology, Rochester, NY 14623 USA (e-mail: jrheee@rit.edu). E. Saber is with the Department of Electrical and Microelectronic Engineering and with the Chester F. Carlson Center for Imaging Science, Rochester Institute of Technology, Rochester, NY 14623 USA (e-mail: esseee@rit.edu). P. P. Markopoulos is with the Department of Electrical and Computer Engineering and Department of Computer Science, The University of Texas at San Antonio, San Antonio, TX 78204 USA (e-mail: panagiotis.markopoulos@utsa.edu). fields such as healthcare diagnostics, autonomous driving, and remote sensing. Our approach democratizes access to advanced networks, making them feasible for deployment in resourceconstrained environments. Both practitioners and researchers will find this advancement useful in accelerating the widespread adoption of machine learning solutions in real-world scenarios. Index Terms—Convolutional neural network, dynamic rank selection, image classification, low-rank factorization, model compression, model pruning. I. I NTRODUCTION T HE versatility of deep Convolutional Neural Networks (CNNs) is well-documented, finding applications in various areas, such as computer vision [1–3], remote sensing [4– 7], medical diagnosis [8], and autonomous driving [9], among others. CNNs are favored due to their ability to automatically extract features, promote sparsity and weight sharing, and for their end-to-end trainability. As CNNs are increasingly utilized to tackle complex problems, their underlying models have become more sophisticated, employing a large number of trainable parameters in the form of convolutional filters and fully-connected weight matrices [2]. Although these largescale models are viable in computer vision applications with abundant training data and resources, they pose challenges in environments with limited training examples or computational resources such as remote sensing and edge computing [10]. Several model compression techniques have been proposed to address this issue, including knowledge distillation [11– 15], quantization [16–20], pruning [17, 21, 22], and special convolution operations [23–25]. The majority of these methods target pretrained models, and often do not prioritize compression during training. This can lead to a degradation in model performance after compression and typically necessitates retraining. In contrast, low-rank factorization methods offer a promising model compression approach [6, 26, 27] as they approximate weight matrices/convolutional filters with low-rank matrix/tensor factors, yielding efficient model compression [10, 28–31]. Nonetheless, the successful deployment such a low-rank factorized model necessitates meticulous rank selection that is tailored to the baseline model architecture and the complexity of the data or task at hand. Certainly, it is a hard or infeasible task to successfully select rank before training. Low-rank matrix factorization approaches can, in general, be divided into three categories: (i) post-training low-rank factorization followed by pruning and fine-tuning [28–31]; (ii) low-rank factorization prior to training with a fixed architecture [6, 32]; and (iii) models factorized prior to training" 2401.08025v1,"S ELF -I MAGINE S ELF -I MAGINE : E FFECTIVE U NIMODAL R EASONING WITH M ULTIMODAL M ODELS USING S ELF -I MAGINATION Syeda Nahida Akter 1 , Aman Madaan 1 , Sangwu Lee 2 , Yiming Yang 1 , Eric Nyberg 1 Language Technologies Institute, Carnegie Mellon University, Pittsburgh, PA, United States 1 Department of Computer Science, University of Rochester, Rochester, NY, United States 2 {sakter,amadaan}@cs.cmu.edu A BSTRACT The potential of Vision-Language Models ( VLM s) often remains underutilized in handling complex text-based problems, particularly when these problems could benefit from visual representation. Resonating with humans’ ability to solve complex text-based problems by (1) creating a visual diagram from the problem and (2) deducing what steps they need to take to solve it, we propose S ELF -I MAGINE . We leverage a single Vision-Language Model ( VLM ) to generate a structured representation of the question using HTML, then render the HTML as an image, and finally use the same VLM to answer the question using both the question and the image. Our approach does not require any additional training data or training. We evaluate our approach in three mathematics tasks and nine general-purpose reasoning tasks using state-of-the-art VLM . Our approach boosts the performance of VLM on all math tasks ( GSM 8 K : +4.62%; ASDIV : +4.49%; SVAMP : +9.30%) and the majority of the general-purpose reasoning tasks by 0.4% to 13.20% while achieving comparable performance in other tasks 1 . 1 I NTRODUCTION H TM L VL M Qu estion James decides to run 3 sprints 3 times a week. He runs 60 meters each sprint. How many total meters does he run a week? H TM L G eneration P rompt Q: Howdy wants to buy cupcakes ... # HTML code: .... Q: James decides to run 3 sprints 3 times a week. He runs 60 meters each sprint. How many total meters does he run a week? # HTML code: ...

Sprints per week

3
×

Sprints per day

3
×

Meters per Sprint

60
=

Total meters per week

?
Summ a r i ze que s t i o n in HTML u sin g VLM p rom p t in g Step 1 I ma g e Sprints per week 3 × Sprints per day 3 + Meters per Spring 60 = Total meters per week ??? Re nd er HTML as an i m a ge Step 2 Figure 1: Generating an image from a question via a single VLM through HTML. Vision Language Models ( VLM ) are getting increasingly adept at solving a wide range of reasoning tasks (Liu et al., 2023a;b; You et al., 2023; Ye et al., 2023; Chen et al., 2023b; Zhang et al., 2023; Chen et al., 2023a; Dai et al., 2023; Lu et al., 2023). As these capabilities advance, VLM s are set to 1 Code and data at https://github.com/snat1505027/self-imagine 1" 2401.08027v1,"Under consideration for publication in J. Fluid Mech. 1 Banner appropriate to article type will appear here in typeset article Necessary conditions for stability of alternating jets: Hurdle theorem K. Deguchi 1 †, M. Hirota 2 and T. Dowling 3 1 School of Mathematics, Monash University, VIC 3800, Australia Institute of Fluid Science, Tohoku University, Sendai, 980-8577, Japan 3 Department of Physics & Astronomy, University of Louisville, KY 40299 USA 2 (Received xx; revised xx; accepted xx) We propose a simple method to identify unstable parameter regions in general inviscid unidirectional shear flow stability problems. The theory is applicable to a wide range of basic flows, including those that are non-monotonic. We illustrate the method using a model of Jupiter’s alternating jet streams based on the quasi-geostrophic equation. The main result is that the flow is unstable if there is an interval in the flow domain for which the reciprocal Rossby Mach number, calculated from the zonal flow and potential vorticity, surpasses a certain threshold (or ‘hurdle’). The hurdle height approaches unity when the domain size greatly exceeds the atmosphere’s intrinsic deformation length, as it does on gas giants. In this case, the Kelvin-Arnold sufficient condition of stability allows the instability to be detected sharply, providing long-awaited theoretical support for the hypothesis used to explain why Jupiter and Saturn jets are stably maintained on the decadal timescale. 1. Introduction The stability of inviscid, parallel shear flows has applications in geophysical fluid dynamics, astrophysics, plasma physics, and engineering thermofluid sciences. For the purely hydrodynamic cases, sufficient conditions for stability can be traced back to the Rayleigh (1880) inflection-point theorem, the refinement of which by Fjørtoft (1950) is one of the two conditions derived using Arnold’s method (Arnol’d 1966). The existence of two distinct sufficient conditions were anticipated by Kelvin on energetic grounds (Thomson 1880), the same year as Rayleigh’s inflection point theorem. Today they are called the Kelvin-Arnol’d 1 st and 2 nd shear-stability theorems (KA-I and KA-II). KA-I corresponds to the Rayleigh- Fjørtoft condition, while KA-II is relevant in planetary physics. A breach of sufficient conditions for stability does not necessarily imply instability. However, in applied fields, these conditions are sometimes treated as if they were sharp stability criteria, contributing to potential confusion. The reason for this may be that the known derived necessary conditions for stability, i.e., conditions guaranteeing the existence of instability, require rather complex † Email address for correspondence: kengo.deguchi@monash.edu Abstract must not spill onto p.2" 2401.08046v1,"Enhancing Robustness of LLM-Synthetic Text Detectors for Academic Writing: A Comprehensive Analysis Zhicheng Dou 1,2∗ , Yuchen Guo 1,2∗ , Ching-Chun Chang 1 , Huy H. Nguyen 1 , and Isao Echizen 1,2 1 National Institute of Informatics, Japan 2 The University of Tokyo, Japan ∗ These authors contributed equally E-mail: {dou, guoyuchen, ccchang, nhhuy, iechizen}@nii.ac.jp Abstract The emergence of large language models (LLMs), such as Generative Pre-trained Transformer 4 (GPT-4) used by ChatGPT, has profoundly impacted the academic and broader community. While these models offer numerous advantages in terms of revolutionizing work and study methods, they have also garnered significant attention due to their potential negative consequences. One example is generating academic reports or papers with little to no human contribution. Consequently, researchers have focused on developing detectors to address the misuse of LLMs. However, most existing methods prioritize achieving higher accuracy on restricted datasets, neglecting the crucial aspect of generalizability. This limitation hinders their practical application in real-life scenarios where reliability is paramount. In this paper, we present a comprehensive analysis of the impact of prompts on the text generated by LLMs and highlight the potential lack of robustness in one of the current state-of-the-art GPT detectors. To mitigate these issues concerning the misuse of LLMs in academic writing, we propose a reference-based Siamese detector named Synthetic-Siamese which takes a pair of texts, one as the inquiry and the other as the reference. Our method effectively addresses the lack of robustness of previous detectors (OpenAI detector and DetectGPT) and significantly improves the baseline performances in realistic academic writing scenarios by approximately 67% to 95%. 1 Introduction Large-scale language models (LLMs), such as OpenAI’s GPT-4 [8], and Google’s Pathways Language Model 2 [1], have become an integral part of our lives and jobs and are often utilized unknowingly. However, while LLMs greatly facilitate daily activities, they also pose significant security risks if maliciously exploited for attacks or deception. Consequently, with the growing popularity of LLMs, the importance of AI security has come to the forefront of people’s attention [3, 11, 4]. Among the various security concerns, academic cheating stands out as a particularly grave issue. 1" 2401.08056v1,"Robust Tiny Object Detection in Aerial Images amidst Label Noise Haoran Zhu a,∗ , Chang Xu a,∗ , Wen Yang a,∗∗ , Ruixiang Zhang a , Yan Zhang a and Gui-Song Xia b a School of Electronic Information, Wuhan University, Wuhan 430072, China ARTICLE INFO ABSTRACT Keywords: Aerial images Tiny object detection Label noise Precise detection of tiny objects in remote sensing imagery remains a significant challenge due to their limited visual information and frequent occurrence within scenes. This challenge is further exacerbated by the practical burden and inherent errors associated with manual annotation—annotating tiny objects is laborious and prone to errors (i.e., label noise). Training detectors for such objects using noisy labels often leads to suboptimal performance, with networks tending to overfit on noisy labels. In this study, we address the intricate issue of tiny object detection under noisy label supervision. We systematically investigate the impact of various types of noise on network training, revealing the vulnerability of object detectors to class shifts and inaccurate bounding boxes for tiny objects. To mitigate these challenges, we propose a DeNoising Tiny Object Detector (DN-TOD), which incorporates a Class-aware Label Correction (CLC) scheme to address class shifts and a Trend-guided Learning Strategy (TLS) to handle bounding box noise. CLC mitigates inaccurate class supervision by identifying and filtering out class-shifted positive samples, while TLS reduces noisy box-induced erroneous supervision through sample reweighting and bounding box regeneration. Additionally, Our method can be seamlessly integrated into both one-stage and two-stage object detection pipelines. Comprehensive experiments conducted on synthetic (i.e., noisy AI-TOD-v2.0 and DOTA-v2.0) and real-world (i.e., AI-TOD) noisy datasets demonstrate the robustness of DN-TOD under various types of label noise. Notably, when applied to the strong baseline RFLA, DN-TOD exhibits a noteworthy performance improvement of 4.9 points under 40% mixed noise. Datasets, codes, and models will be made publicly available. Class Shifts 1. Introduction Tiny objects, characterized by their extremely limited appearance information (less than 16×16 pixels), are scattered across aerial images captured from different heights and locations. The accurate detection of tiny objects is always one of the primary challenges on the way towards automatic interpretation of aerial images, drawing increasing attention in both computer vision and remote sensing communities (Xu et al., 2022b,a; Ding et al., 2022; Cheng et al., 2023; Xu et al., 2023; Yu et al., 2020; Pang et al., 2019). In response, much effort has been devoted to the establishment of Tiny Object Detection (TOD) datasets (Yu et al., 2020; Wang et al., 2021; Xu et al., 2022a; Ding et al., 2022; Cheng et al., 2023; Akshatha et al., 2023) and customized object detectors (Xu et al., 2022b,a; Yang et al., 2022). In the data-driven deep learning era, TOD presents unique difficulties not only for existing detectors but also for the construction of datasets. Tiny objects’ lack of appearance makes the labeling process quite laborious and easy to introduce label noise. While prior research, exemplified by AI-TOD-v2.0 (Xu et al., 2022a), has shed light on challenges such as missing labels, it has not directly addressed these issues. In this work, we delve deeper into label noise in tiny object detection and take a step forward to handle this issue by first analyzing the impact of various kinds of label noise ∗ Equal contributions ∗∗ Corresponding author zhuhaoran@whu.edu.cn (H. Zhu); xuchangeis@whu.edu.cn (C. Xu); yangwen@whu.edu.cn (W. Yang); zhangruixiang@whu.edu.cn (R. Zhang); zhangyan@whu.edu.cn (Y. Zhang); guisong.xia@whu.edu.cn (G. Xia) ORCID (s): 0000-0002-3078-0496 (C. Xu); 0000-0002-3263-8768 (W. Yang); 0000-0003-0704-2484 (R. Zhang); 0000-0003-4794-6082 (Y. Zhang); 0000-0001-7660-6090 (G. Xia) H. Zhu, et al.: Preprint submitted to Elsevier Ship Inaccurate Bounding Box Backbone Ship Cls Reg Class-aware Label Correction Ship or or Ship Plane Backbone Vehicle 𝑝 1 𝑝 2 … 𝑝 𝐶 Cls Reg Trend-guided Learning Trend-guided Reweighting Noisy Samples Filtering Recurrent Box Regeneration Noisy Samples: for i in range(C): DCM b School of Computer Science and the State Key Lab. LIESMARS, Wuhan University, Wuhan, 430072, China 𝑝 𝑖 > 𝑝 𝑦 𝑝 𝑖 > DCM 𝑦𝑖 𝑝 𝑖 > DCM 𝑖𝑖 Figure 1: An overview of our method. Observing that the model is quite sensitive to class shifts and inaccurate bounding box noises when training tiny object detectors, we propose to tackle them by Class-aware Label Correction and Trend-guided Learning, respectively. Orange points denote positive samples. and then proposing a robust detector capable of mitigating the impact of label noise. Compared to image classification, label noise types in object detection are more diverse and complex. They can be classified into four types, namely missing labels, extra labels, class shifts, and inaccurate bounding boxes. Some previous studies (Bernhard and Schubert, 2021; Chadwick and Newman, 2019; Li et al., 2020a; Xu et al., 2021b) assume all types of noise occur and try to tackle all types of noise simultaneously, while others (Zhang et al., 2019b; Liu et al., 2022; Wu et al., 2023) focus on handling a specific type of noise (e.g. inaccurate bounding box) (Liu et al., 2022; Wu et al., 2023). Considering that tiny objects exhibit unique characteristics different from generic objects (Wang et al., 2021), we focus on addressing label noise in tiny Page 1 of 13" 2401.08061v1,"Augmenting Ground-Level PM2.5 Prediction via Kriging-Based Pseudo-Label Generation Lei Duan ∗ Department of Civil and Environmental Engineering Duke University Durham, NC 27705 lei.duan@duke.edu Ziyang Jiang ∗ Department of Civil and Environmental Engineering Duke University Durham, NC 27705 ziyang.jiang@duke.edu David Carlson Department of Civil and Environmental Engineering Duke University Durham, NC 27705 david.carlson@duke.edu Abstract Fusing abundant satellite data with sparse ground measurements constitutes a major challenge in climate modeling. To address this, we propose a strategy to augment the training dataset by introducing unlabeled satellite images paired with pseudo-labels generated through a spatial interpolation technique known as ordinary kriging, thereby making full use of the available satellite data resources. We show that the proposed data augmentation strategy helps enhance the performance of the state-of-the-art convolutional neural network-random forest (CNN-RF) model by a reasonable amount, resulting in a noteworthy improvement in spatial correlation and a reduction in prediction error. 1 Introduction Long-term exposure to fine particulate matter with an aerodynamic diameter of 2.5 µm or smaller (PM 2.5 ) is is extensively recognized for increasing the risk of a variety of health problems such as stroke [1, 2], respiratory diseases [3], and ischemic heart disease [1, 4]. Accurate estimation and prediction of ground-level PM 2.5 concentrations are critical initial steps for subsequent epidemiological investigations into its health impacts. In recent years, advancements in satellite sensing techniques have enabled researchers to construct a high-resolution spatial mapping of PM 2.5 using machine learning models, in conjunction with ground measurements (e.g. PM 2.5 , PM 10 , temperature, humidity, etc.) acquired from air quality monitoring (AQM) stations [5–7]. However, in most cases, the satellite-based data is much more abundant compared to ground measurements, resulting in a large amount of unlabeled satellite data (i.e., satellite images at locations without a paired ground measurement). To elaborate, satellites have the capacity to cover entire urban areas and a majority of suburban regions of a city within a 24-hour window. In contrast, measurements from ground stations are only representative within their immediate vicinity, which we refer to as the “area of interest"" (AOI). In most cases, the combined AOI of all ground stations is sparse compared to area covered by the satellite. To address the aforementioned limitation, we come up with an approach to make full use of the unlabeled satellite data and effectively integrate them with ground measurements. Specifically, we propose to pair the unlabeled satellite data with pseudo-labels of ground measurements generated by a spatial interpolation method known as ordinary kriging and then augment the labeled dataset using these paired instances. In this study, we adopt the convolutional neural network-random forest (CNN-RF) model from Zheng et al. [6]. Our experimental results demonstrate the substantial advantages gained from this kriging-based augmentation, including decent reduction in errors and improvement in spatial correlation. ∗ Equal contribution Tackling Climate Change with Machine Learning: workshop at NeurIPS 2023." 2401.08091v1,"‘One Style Does Not Regulate All’: Moderation Practices in Public and Private WhatsApp Groups FARHANA SHAHID, Cornell University, United States DHRUV AGARWAL, Cornell University, United States ADITYA VASHISTHA, Cornell University, United States WhatsApp is the largest social media platform in the Global South and is a virulent force in global misinformation and political propaganda. Due to end-to-end encryption WhatsApp can barely review any content and this often pushes the responsibility of moderation towards group admins. Yet, little is known about how WhatsApp group admins manage their groups, what factors and values influence moderation decisions, and what challenges they face in moderating their groups. To fill this gap, we interviewed admins of 32 diverse groups and reviewed content from 30 public groups in India and Bangladesh. We observed notable differences in the formation, members’ behavior, and moderation of public versus private groups, as well as in how WhatsApp admins operate compared to those on other platforms. We used Baumrind’s typology of ‘parenting styles’ as a lens to explore moderation practices in WhatsApp groups and identified four moderation styles based on how responsive and controlling the admins were and discuss design recommendations to help them better manage problematic content in WhatsApp groups. CCS Concepts: • Human-centered computing → Empirical studies in HCI. Additional Key Words and Phrases: WhatsApp, content moderation, encryption, Global South ACM Reference Format: Farhana Shahid, Dhruv Agarwal, and Aditya Vashistha. 2024. ‘One Style Does Not Regulate All’: Moderation Practices in Public and Private WhatsApp Groups. 1, 1 (January 2024), 29 pages. https://doi.org/10.1145/ nnnnnnn.nnnnnnn 1 INTRODUCTION WhatsApp is the most popular instant messaging platform with the third largest active userbase, majority of whom are from the Global South [12, 57]. WhatsApp promotes its ‘groups’ as an effortless way to bring together one’s closest people. Indeed, most private WhatsApp groups consist of family, friends, or neighbors, while public groups usually involve strangers [18, 36]. Although all groups start private, when the admin shares the invite link online for anyone to join, the group is considered public. As end-to-end encryption limits WhatsApp’s oversight on group activities, misinformation, propaganda, targeted polarization, and hate speech [22, 26, 31, 39, 59] run rampant, fueling riots, mob lynching, and communal violence in the Global South [3, 48]. WhatsApp claims to use unencrypted user metadata, low-paid human moderators, and AI algorithms to detect abusive behavior and disable suspected accounts [25]. However, these measures are often sporadic and insufficient to prevent the spread of harmful content [16]. For example, given Authors’ addresses: Farhana Shahid, Cornell University, Ithaca, United States, fs468@cornell.edu; Dhruv Agarwal, Cornell University, Ithaca, United States, da399@cornell.edu; Aditya Vashistha, Cornell University, Ithaca, United States, adityav@ cornell.edu. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Association for Computing Machinery. XXXX-XXXX/2024/1-ART $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn , Vol. 1, No. 1, Article . Publication date: January 2024." 2401.08092v1,"A S URVEY OF R ESOURCE - EFFICIENT LLM AND M ULTIMODAL F OUNDATION M ODELS Mengwei Xu ♣ , Wangsong Yin ♦ , Dongqi Cai ♣ , Rongjie Yi ♣ , Daliang Xu ♦ , Qipeng Wang ♦ , Bingyang Wu ♦ , Yihao Zhao ♦ , Chen Yang ♣ , Shihe Wang ♣ , Qiyang Zhang ♣ , Zhenyan Lu ♣ , Li Zhang ♣ , Shangguang Wang ♣ , Yuanchun Li ♥ , Yunxin Liu ♥ , Xin Jin ♦ , Xuanzhe Liu ♦ ♣ Beijing University of Posts and Telecommunications (BUPT) ♦ Peking University (PKU) ♥ Tsinghua University (THU) Contact: mwx@bupt.edu.cn Website: https:github.com/UbiquitousLearning/Efficient_Foundation_Model_Survey A BSTRACT Large foundation models, including large language models (LLMs), vision transformers (ViTs), diffusion, and LLM-based multimodal models, are revolutionizing the entire machine learning lifecycle, from training to deployment. However, the substantial advancements in versatility and performance these models offer come at a significant cost in terms of hardware resources. To support the growth of these large models in a scalable and environmentally sustainable way, there has been a considerable focus on developing resource-efficient strategies. This survey delves into the critical importance of such research, examining both algorithmic and systemic aspects. It offers a comprehensive analysis and valuable insights gleaned from existing literature, encompassing a broad array of topics from cutting-edge model architectures and training/serving algorithms to practical system designs and implementations. The goal of this survey is to provide an overarching understanding of how current approaches are tackling the resource challenges posed by large foundation models and to potentially inspire future breakthroughs in this field. Keywords Foundation Model · Large Language Model · Vision Transformer · Diffusion Model · Multimodal LLM · Model Compression · Machine Learning System · Serving System · Pre-training · Fine-tuning · Edge Intelligence 1 INTRODUCTION In the rapidly evolving field of artificial intelligence (AI), a paradigm shift is underway. We are witnessing the transition from specialized, fragmented deep learning models to versatile, one-size-fits-all foundation models. These advanced AI systems are capable of operating in an open-world context, interacting with open vocabularies and image pixels for unseen AI tasks, i.e., zero-shot abilities. They are exemplified by (1) Large Language Models (LLMs) such as GPTs [39] that can ingest almost every NLP task in the form as a prompt; (2) Vision Transformers Models (ViTs) such as Masked Autoencoder [133] that can handle various downstream vision tasks; (3) Latent Diffusion Models (LDMs) such as Stable Diffusion [310] that generate high-quality images with arbitrary text-based prompts; (4) Multimodal models such as CLIP [296] and ImageBind [116] that map different modal data into the same latent space and are widely used as backbone for cross-modality tasks like image retrieval/search and visual-question answering. Such flexibility and generality marks a significant departure from the earlier era of AI, setting a new standard for how AI interfaces with the world. The success of these foundation models is deeply rooted in their scalability: unlike their predecessors, these models’ accuracy and generalization ability can continuously expand with more data or parameters, without altering the underlying simple algorithms and architectures. An impressive evidence is the scaling law [166]: it describes how the performance of transformer-based models can predictably improve with more model size and data volume; until" 2401.08097v1,"IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 A Study of Fairness Concerns in AI-based Mobile App Reviews Ali Rezaei Nasab, Maedeh Dashti, Mojtaba Shahin, Mansooreh Zahedi Hourieh Khalajzadeh, Chetan Arora, Peng Liang Abstract—With the growing application of AI-based systems in our lives and society, there is a rising need to ensure that AI-based systems are developed and used in a responsible way. Fairness is one of the socio-technical concerns that must be addressed in AI-based systems for this purpose. Unfair AI-based systems, particularly, unfair AI-based mobile apps, can pose difficulties for a significant proportion of the global populace. This paper aims to deeply analyze fairness concerns in AI-based app reviews. We first manually constructed a ground-truth dataset including a statistical sample of fairness and non-fairness reviews. Leveraging the ground-truth dataset, we then developed and evaluated a set of machine learning and deep learning classifiers that distinguish fairness reviews from non-fairness reviews. Our experiments show that our best-performing classifier can detect fairness reviews with a precision of 94%. We then applied the best-performing classifier on approximately 9.5M reviews collected from 108 AI-based apps and identified around 92K fairness reviews. While the fairness reviews appear in 23 app categories, we found that the ‘communication’ and ‘social’ app categories have the highest percentage of fairness reviews. Next, applying the K-means clustering technique to the 92K fairness reviews, followed by manual analysis, led to the identification of six distinct types of fairness concerns (e.g., ‘receiving different quality of features and services in different platforms and devices’ and ‘lack of transparency and fairness in dealing with user-generated content’). Finally, the manual analysis of 2,248 app owners’ responses to the fairness reviews identified six root causes (e.g., ‘copyright issues’, ‘external factors’, ‘development cost’) that app owners report to justify fairness concerns. Index Terms—Fairness, AI-based Mobile Apps, App Reviews, Machine Learning, Deep Learning ✦ 1 I NTRODUCTION The global AI market size, particularly in the form of Machine Learning (ML) and Deep Learning (DL), is predicted to exceed USD 1.6 trillion by 2030 [1]. The applications of AI technologies in our modern life and society vary, ranging from detecting diseases to predicting traffic jams, from enabling personalized shopping to identifying important targets in combat environments [2]. Despite the wide adoption of AI solutions, a growing concern is to ensure responsible behaviour of AI solutions [3]. The increasing need for responsible AI systems arises from the possibility that they could produce biased results, have errors, or lack sufficient transparency [4]. Hence, organizations and governments worldwide have started developing principles and guidelines on the responsible use and adoption of AI [5]. Fairness is a key element of responsible AI [6]. There is no single definition of fairness in AI systems, and varies in different domains [7]. In AI-based algorithmic decision- • • • • • Ali Rezaei Nasab, Maedeh Dashti, and Peng Liang are with the School of Computer Science, Wuhan University, Wuhan, China. E-mail: rezaei.ali.nasab@gmail.com, maedeh.dashti.research@gmail.com, liangp@whu.edu.cn Mojtaba Shahin is with the School of Computing Technologies, RMIT University, Melbourne, Australia. E-mail: mojtaba.shahin@rmit.edu.au Mansooreh Zahedi is with the School of Computing and Information Systems, University of Melbourne, Australia. E-mail: mansooreh.zahedi@unimelb.edu.au Hourieh Khalajzadeh is with the School of Information Technology, Deakin University, Melbourne, Australia. E-mail: hkhalajzadeh@deakin.edu.au Chetan Arora is with the Faculty of Information Technology, Monash University, Melbourne, Australia. E-mail: chetan.arora@monash.edu Manuscript received; revised. (Corresponding author: Peng Liang) making, fairness is defined as “the absence of any prejudice or favouritism toward an individual or group based on their inherent or acquired characteristics” [2]. Others have a broader view and see achieving fairness in AI systems as a socio-technical challenge [7], [8], [9], [10]. This means that fairness concerns in AI systems cannot only stem from technical components and data but can also be attributed to the process of building AI systems, humans, and governance (e.g., decisions made by developers or policies adopted by providers). However, a growing number of software systems leveraging AI solutions (AI-based software systems) have been accused of being unfair and producing biased and discriminatory outcomes, causing some (major) difficulties for individuals, society, and businesses [2], [11]. The growth and popularity of AI have also triggered a wave of mobile software applications utilizing AI technologies (e.g., ML/DL technologies). Such a wave has been further energized by the emergence of mobile AI frameworks and libraries such as TensorFlow Lite that enable executing AI tasks solely on smartphones [12]. We refer to mobile software applications utilizing AI technologies as AI-based mobile applications (apps). With 6.64 billion smartphone users worldwide (83.32% of the current world population) [13], mobile software apps are the most prevailing type of software system used by a wide range of individuals and groups with different characteristics (e.g., age, education level, cultural background, race, and gender) [14], [15], [16]. While unfair behaviours and outcomes may occur in any type of mobile app (such as non-AI-based apps), we argue that the chance of unfair behaviours and outcomes in AI-based mobile apps may be higher than in" 2401.08106v1,"Teleparallel Gravity, Covariance and Their Geometrical Meaning Martin Krššák ∗ Department of Theoretical Physics, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava, 84248, Slovak Republic Department of Astronomy, School of Astronomy and Space Science, University of Science and Technology of China, Hefei, Anhui 230026, China January 17, 2024 Abstract We explore the geometrical meaning of teleparallel geometries and the role of covariance in their definition. We argue that pure gauge connections are a necessary ingredient for describing geometry and gravity in terms of torsion and non-metricity. We show the other viable alternative is using the Einstein and Møller Lagrangians, but these are defined through the Riemannian connection coefficients and hence do not involve torsion nor non-metricity. We argue that the teleparallel geometries can be defined on the manifold without introducing any additional structures and that they naturally provide the covariant framework for the Einstein and Møller Lagrangians. We explore some consequences of this viewpoint for the modified theories of gravity as well. 1 Introduction Teleparallel theories of gravity were originally proposed by Einstein in the late 1920s as an attempt for the unified field theory of gravity and electromagnetism [1–3]. Since 1960s the idea of teleparallelism was revived as an alternative approach to gravity, which found many applications addressing various issues in gravity and cosmology. Among these were the improvements in definitions of gravitational energy-momentum [4–7], formulation of general relativity as a gauge theory [8–10], and more recently a plethora of modified gravity theories with the aim to address dark energy and other problems in cosmology [11–17]. Nevertheless, we face a rather curious situation that even after almost 100 years since the initial formulation, debates persist regarding the very foundations of teleparallel theories of gravity, which primarily revolves around the pure gauge nature of teleparallel ∗ Electronic address: martin.krssak@gmail.com, martin.krssak@fmph.uniba.sk 1" 2401.08114v2,"Molecular Chirality Quantification: Tools and Benchmarks Ethan Abraham 1, a) and Abraham Nitzan 2, 3 1) Department of Physics and Astronomy, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA 2) Department of Chemistry, University of Pennsylvania, Philadelphia, Pennsylvania 19104, USA 3) School of Chemistry, Tel Aviv University, Tel Aviv 69978, Israel (Dated: 18 January 2024) Molecular chirality has traditionally been viewed as a binary property where a molecule is classified as either chiral or achiral, yet in the recent decades mathematical methods for quantifying chirality have been explored. Here we use toy molecular systems to systematically compare the performance of two state of the art chirality measures (1) the Continuous Chirality Measure (CCM) and (2) the Chirality Characteristic (χ). We find that both methods exhibit qualitatively similar behavior when applied to simple molecular systems such as a four-site molecule or the polymer double-helix, but we show that the CCM may be more suitable for evaluating the chirality of arbitrary molecules or abstract structures such as normal vibrational modes. We discuss a range of considerations for applying these methods to molecular systems in general, and we provide links to user-friendly codes for both methods. We aim this paper to serve as a concise resource for scientists attempting to familiarize themselves with these chirality measures or attempting to implement chirality measures in their own work. I. INTRODUCTION Chirality is defined as the absence of mirror symmetry. Since symmetry properties are binary in the sense that an object either possesses or does not possess a particular symmetry element, molecular chirality has historically been a qualitative subject. But with molecular chirality playing a central role in a variety of optical, biological, and chemical phenomenal, methods for quantifying chirality could have great utility for research that attempts to treat chirality as a physical variable. Renewed interest in molecular chirality and its quantification has grown with the surge of observations associated with the chiral induced spin selectivity phenomenon. 1,2 An example of the utility of chirality measurement a recent study by Piaggi et al. 3 used molecular dynamics simulations of a liquid composed of a simple four-site molecular model to demonstrate the existence of symmetry-breaking phase transitions from a supercritical racemic liquid, into subcritical D- rich and L-rich liquids. These phases were observed via the distribution of chirality values of the liquid’s molecular constituents, each of which could assume an arbitrary conformation (and thus chirality) at any point throughout the simulation. As such, the success of this study depended on the quality and implementation of a chirality measurement tool. Chirality measures have recently been applied in a wide variety of contexts such as the analysis of protein structure in biology, 4–6 the implication of chiral fermions in topological condensed matter phenomena, 7,8 and the role of chirality in photoelectron spectroscopy. 9 In our own work, chirality measurement has been used to explore the role of mechanical twist on the thermal conductivity of polymer wires, 10 and to study the correlation of chiral normal vibrational modes to the chirality of the underlying molecular structure. 11 a) Electronic mail: abrahame@sas.upenn.edu Approaches to chirality quantification have fallen into two general categories. The first is based on geometric overlap between a structure and its enantiomer, where high overlap is indicative of low chirality, and larger difference is indicative of higher chirality. This idea was first explored several decades ago when Gilat and Schulman defined a dimensionless chirality measure as one minus the fractional volume overlap of the two enantiomers. 12 This method has since been refined and generalized by Avnir et al., 13,14 using the Continuous Symmetry Measure (CSM) which relies on vector inner products instead of volume overlap. 15 This is the basis of the Continuous Chirality Measure (CCM), the first tool addressed in this paper. 13,14 An alternative approach to chirality quantification is based on the scalar triple product of sequential vectors, utilizing the fact that an ordered set of three vectors is achiral if and only if they lie in the same plane, in which case the scalar triple product measures zero volume. In all other cases the magnitude of the scalar triple product is nonzero, achieving a maximum when the three vectors are mutually orthogonal. Like the overlap-based method, the idea of using the scalar triple product to measure chirality can be traced back several decades, 16 but has been more recently refined by Sidorova et al. in their application to biological proteins. 4,5 A strength of this measure is that the anti-commutativity of the scalar triple product means that opposite enantiomers will have opposite signs. This is the basis of the Chirality Characteristic (χ), the second tool addressed in this paper. Though incredibly useful for certain simple systems as well as systems with linear connectivity (e.g. polymers), a weakness of the scalar triple product approach is that it is in general difficult to assign a definite order of sequential vectors rendering the measure illdefined. With greater mathematical sophistication, Harris et al. presented a more general way of defining the scalar triple product based on multipole moments of the molecule’s density function, 17 but here we address simpler choices for the" 2401.08117v1,"E2HQV: High-Quality Video Generation from Event Camera via Theory-Inspired Model-Aided Deep Learning Qiang Qu 1 , Yiran Shen 2 * , Xiaoming Chen 3 * , Yuk Ying Chung 1 , Tongliang Liu 1 1 School of Computer Science, The University of Sydney. 2 School of Software, Shandong University. 3 School of Computer Science and Engineering, Beijing Technology and Business University. {vincent.qu, vera.chung, tongliang.liu}@sydney.edu.au; yiran.shen@sdu.edu; xiaoming.chen@btbu.edu.cn Abstract The bio-inspired event cameras or dynamic vision sensors are capable of asynchronously capturing per-pixel brightness changes (called event-streams) in high temporal resolution and high dynamic range. However, the non-structural spatialtemporal event-streams make it challenging for providing intuitive visualization with rich semantic information for human vision. It calls for events-to-video (E2V) solutions which take event-streams as input and generate high quality video frames for intuitive visualization. However, current solutions are predominantly data-driven without considering the prior knowledge of the underlying statistics relating event-streams and video frames. It highly relies on the non-linearity and generalization capability of the deep neural networks, thus, is struggling on reconstructing detailed textures when the scenes are complex. In this work, we propose E2HQV, a novel E2V paradigm designed to produce high-quality video frames from events. This approach leverages a model-aided deep learning framework, underpinned by a theory-inspired E2V model, which is meticulously derived from the fundamental imaging principles of event cameras. To deal with the issue of state-reset in the recurrent components of E2HQV, we also design a temporal shift embedding module to further improve the quality of the video frames. Comprehensive evaluations on the real world event camera datasets validate our approach, with E2HQV, notably outperforming state-of-theart approaches, e.g., surpassing the second best by over 40% for some evaluation metrics. including high temporal resolution, high dynamic range of up to 140dB (Lichtsteiner, Posch, and Delbruck 2008), and low resource consumption due to the sparse nature of eventstreams. For example, the DVS128 sensor platform consumes 150 times less energy than a conventional CMOS camera (Lichtsteiner, Posch, and Delbruck 2008). Despite the appealing advantages of event cameras, the non-structural event-streams are not inherently compatible with traditional computer vision methodologies (Scheerlinck et al. 2020) and the visualization is not intuitive for human users to understand. To address the above issue, the research on events-to-video (E2V), which aims to generate video frames from pure event-streams, has been raised to provide convenient and intuitive access to the rich information encapsulated in the sparse and non-structure event-streams. There have been a number of successful approaches for E2V task, such as E2VID (Rebecq et al. 2019), FireNet (Scheerlinck et al. 2020), SPADE-E2VID (Cadena et al. 2021), and ET-Net (Weng, Zhang, and Xiong 2021). Introduction Inspired by the human visual system, Silicon Retina (Mahowald 1991) has pioneered an approach to perceptual sensing with event cameras or Dynamic Vision Sensors (DVS) (Lichtsteiner, Posch, and Delbruck 2008; Posch, Matolin, and Wohlgenannt 2010; Berner et al. 2013) and gained significant interests from both academia and industry. Unlike traditional cameras, event cameras detect microsecondlevel intensity changes, generating an asynchronous stream of ‘events’, termed as event-stream. Event cameras offer several advantages over conventional CCD/CMOS cameras, * Corresponding author. The implementation of our work is publicly available at https://github.com/VincentQQu/E2HQV. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: Conceptual Overview of the Proposed Model- Aided Learning Framework. However, the quality of the video frames generated by the existing E2V approaches is still not satisfactory and fail to recover detailed texture for the complex scenes (Ercan et al. 2023). This issue is predominantly attributed to the fact that many of these approaches, such as E2VID and ET- Net, primarily adopt a purely data-driven approach to learn the mapping from event-streams to video frames directly." 2401.08122v1,"The diabatic valence-hole concept Jun Jiang ∗ Center for Accelerator Mass Spectrometry, Lawrence Livermore National Laboratory, Livermore, California 94550, USA E-mail: jiang12@llnl.gov Phone: 925-424-4296 1" 2401.08132v1,"Object-Oriented Semantic Mapping for Reliable UAVs Navigation Thanh Nguyen Canh 1,2 , Armagan Elibol 2 , Nak Young Chong 2 and ∗ Xiem HoangVan 1 1 University of Engineering and Technology, Vietnam National University Hanoi, Vietnam ({canhthanh, xiemhoang}@vnu.edu.vn) 2 School of Information Science, Japan Advanced Institute of Science and Technology Nomi, Ishikawa 923-1292, Japan ({aelibol, nakyoung}@jaist.ac.jp) ∗ Corresponding authors Abstract—To autonomously navigate in real-world environments, special in search and rescue operations, Unmanned Aerial Vehicles (UAVs) necessitate comprehensive maps to ensure safety. However, the prevalent metric map often lacks semantic information crucial for holistic scene comprehension. In this paper, we proposed a system to construct a probabilistic metric map enriched with object information extracted from the environment from RGB-D images. Our approach combines a state-of-theart YOLOv8-based object detection framework at the front end and a 2D SLAM method - CartoGrapher at the back end. To effectively track and position semantic object classes extracted from the front-end interface, we employ the innovative BoT- SORT methodology. A novel association method is introduced to extract the position of objects and then project it with the metric map. Unlike previous research, our approach takes into reliable navigating in the environment with various hollow bottom objects. The output of our system is a probabilistic map, which significantly enhances the map’s representation by incorporating object-specific attributes, encompassing class distinctions, accurate positioning, and object heights. A number of experiments have been conducted to evaluate our proposed approach. The results show that the robot can effectively produce augmented semantic maps containing several objects (notably chairs and desks). Furthermore, our system is evaluated within an embedded computer - Jetson Xavier AGX unit to demonstrate the use case in real-world applications. Index Terms—Semantic mapping, UAVs, ROS, Metric map. I. I NTRODUCTION One of the primary goals in the realm of intelligent robotics control is to enable robots to comprehend their surroundings to assist us in different activities [1]. Particularly, the context of indoor search and rescue operations underscores the critical importance of Unmanned Aerial Vehicles (UAVs) in rapidly surveying hazardous environments and furnishing real-time insights to support emergency responders. The efficacy of such missions relies on the UAV’s autonomous navigation capability in navigating intricate and cluttered real-world settings while ensuring safety. While the problem of geometrical mapping and localization is traditionally solved through SLAM (Simultaneous Localization and Mapping) seeking a given type of object requires scene knowledge. In addition, autonomous navigation is more challenging in complex environments. Normally, UAVs might encounter diverse obstacles and need to identify victims or hazardous areas, which right away avoid the obstacle. Therefore, UAVs to able to recognize what and where obstacles and navigate through them. Semantic mapping is integrated within the framework of SLAM, which has emerged as a potential solution to address the challenges of scene understanding in robotics by incorporating the prior or expert information of the environment. Recent research endeavors have predominantly centered around constructing 3D semantic maps utilizing technologies such as depth cameras [1], [2], stereo cameras [3], 3D Li- DAR [4], or fusion sensors [5]. However, these approaches often demand substantial computational resources and storage, making them less suitable for UAVs with stringent weight and computation constraints and challenging to use and exploit during UAV navigation. Several kinds of research have also implemented semantic mapping for applications such as room categorization [6], and detection dynamic object [7]. However, major real-world robots are implemented based on 2D metric maps because of ease of use and low resource consumption. Furthermore, the mapping of hollow bottom objects like tables, desks, and chairs are usually mapped on the map as points or paths leading to wrong navigation decisions. On the other side, recent advancements in deep learning have facilitated the development of robust object detection methods like YOLOv5 [8], YOLOv7 [9], YOLOv8 [10], Fast R-CNN [11], and Mask R-CNN [12]. Hence, our research aims to create an object-oriented semantic mapping for enabling UAVs to perform safe navigation tasks in complex environments. In this paper, we proposed a system that encompasses a semantic map, forged through the fusion of metric environment structure and semantic object information. We propose an association method that seamlessly integrates object data to create a probabilistic map, thereby enhancing navigation and obstacle avoidance. Remarkably, our system is designed to harness the capabilities of an RGB-D camera, effectively circumventing cost and weight constraints prevalent in UAV applications. Our contributions in this study include: • A semantic SLAM system that combines localization and metric mapping with object tracking to obtain the ability to scene understanding. • A method to extract object information and fusion into to create a probability map for navigation and obstacle avoidance." 2401.08134v1,"S3M: Semantic Segmentation Sparse Mapping for UAVs with RGB-D Camera Thanh Nguyen Canh 1,3 , Van-Truong Nguyen 2 , Xiem HoangVan 1 , Armagan Elibol 3 , Nak Young Chong 3 1 University of Engineering and Technology, Vietnam National University Hanoi, Vietnam ({canhthanh, xiemhoang}@vnu.edu.vn) 2 Department of Mechatronics Engineering, Hanoi University of Industry Hanoi 159999, Vietnam (nguyenvantruong@haui.edu.vn) 3 School of Information Science, Japan Advanced Institute of Science and Technology Nomi, Ishikawa 923-1292, Japan ({aelibol, nakyoung}@jaist.ac.jp) Abstract—Unmanned Aerial Vehicles (UAVs) hold immense potential for critical applications, such as search and rescue operations, where accurate perception of indoor environments is paramount. However, the concurrent amalgamation of localization, 3D reconstruction, and semantic segmentation presents a notable hurdle, especially in the context of UAVs equipped with constrained power and computational resources. This paper presents a novel approach to address challenges in semantic information extraction and utilization within UAV operations. Our system integrates state-of-the-art visual SLAM to estimate a comprehensive 6-DoF pose and advanced object segmentation methods at the back end. To improve the computational and storage efficiency of the framework, we adopt a streamlined voxel-based 3D map representation - OctoMap to build a working system. Furthermore, the fusion algorithm is incorporated to obtain the semantic information of each frame from the front-end SLAM task, and the corresponding point. By leveraging semantic information, our framework enhances the UAV’s ability to perceive and navigate through indoor spaces, addressing challenges in pose estimation accuracy and uncertainty reduction. Through Gazebo simulations, we validate the efficacy of our proposed system and successfully embed our approach into a Jetson Xavier AGX unit for real-world applications. Index Terms—Semantic Mapping, S3M, UAVs, ROS, SLAM. I. I NTRODUCTION Over the past decades, UAVs have significantly impacted geoinformation acquisition in areas like firefight rescue, inspection, and agriculture. Understanding the environment is crucial for advancing autonomous capabilities, including the UAV’s self-location awareness and semantic 3D map creation. Semantic mapping, which combines environmental geometry estimation with semantic labeling, goes beyond traditional geometric mapping, enhancing UAVs’ situational understanding and interactions. For instance, in the rescue mission, a robot relying solely on a traditional SLAM- generated map encounters challenges in performing complex tasks, such as: ”maneuvering around the desk to locate a victim beside the bed”. Besides that, this task is still challenging due to: (1) the inaccuracy of GPS indoors, (2) the cluttered environments, (3) the real-time process demands, and (4) the complexity of semantic maps. To address the aforementioned challenges, the adoption of Simultaneous Localization and Mapping (SLAM) techniques, especially Visual SLAM [1]–[3] emerges as a compelling solution in the realm of drone applications, which is characterized by its compact design and cost-effectiveness, offering a wealth of information to comprehend the field of view. Various algorithms have been developed for this task such as KinectFusion [4], RGBD SLAM [5], ORB- SLAM [6], PTAM [7], DSO SLAM [3], LSD SLAM [2], and SVO SLAM [8]. Their effectiveness however varies depending on each scenario and the environments in which the robot operates such as localization, mapping, and realtime processes. Additionally, the research on the fusion of the semantic segmentation CNNs with the visual SLAM has been investigated with some notable works, including Semantic Fusion [9], Mask Fusion [10], SCFusion [11], Co- Fusion [12], and DS-SLAM [13]. Despite these advancements, achieving semantic reconstruction for UAVs remains challenging. Hence, our research aims to establish mapping with semantic data, vital for enabling UAVs to perform advanced autonomous tasks. In this paper, we proposed an efficient Semantic Segmentation Sparse Mapping (S3M) SLAM system for incrementally constructing an objectlevel map using a localized RGB-D camera. The proposed system is organized into two main components: an RGB- D SLAM framework based on propagation utilizing Visual Odometry (VO) estimation and object instance segmentationbased semantic sparse map creation. To summarize, the main contributions of this work can be summarized as follows: • A S3M SLAM system that has faster fully 6-DoF pose tracking and the capability to construct a semantic sparse map based on object segmentation information. • A semantic fusion strategy based on geometric and semantic descriptions to incrementally update objects. • An efficient representation and storage method using OctoMap of the front-end system, a memory-efficient alternative to point cloud data. • The demonstrated capability of constructing semantically sparse maps in real-time on a compact, computation-limited platform via experiments on the" 2401.08138v1,"LLMs for Test Input Generation for Semantic Caches Zafaryab Rasool, Scott Barnett, David Willie, Stefanus Kurniawan, Sherwin Balugo, Srikanth Thudumu, Mohamed Abdelrazek {zafaryab.rasool,scott.barnett,david.willie,stefanus.kurniawan,s.balugo}@deakin.edu.au {srikanth.thudumu,mohamed.abdelrazek}@deakin.edu.au Applied Artificial Intelligence Institute, Deakin University Geelong, Australia ABSTRACT Large language models (LLMs) enable state-of-the-art semantic capabilities to be added to software systems such as semantic search of unstructured documents and text generation. However, these models are computationally expensive. At scale, the cost of serving thousands of users increases massively affecting also user experience. To address this problem, semantic caches are used to check for answers to similar queries (that may have been phrased differently) without hitting the LLM service. Due to the nature of these semantic cache techniques that rely on query embeddings, there is a high chance of errors impacting user confidence in the system. Adopting semantic cache techniques usually requires testing the effectiveness of a semantic cache (accurate cache hits and misses) which requires a labelled test set of similar queries and responses which is often unavailable. In this paper, we present VaryGen, an approach for using LLMs for test input generation that produces similar questions from unstructured text documents. Our novel approach uses the reasoning capabilities of LLMs to 1) adapt queries to the domain, 2) synthesise subtle variations to queries, and 3) evaluate the synthesised test dataset. We evaluated our approach in the domain of a student question and answer system by qualitatively analysing 100 generated queries and result pairs, and conducting an empirical case study with an open source semantic cache. Our results show that query pairs satisfy human expectations of similarity and our generated data demonstrates failure cases of a semantic cache. Additionally, we also evaluate our approach on Qasper dataset. This work is an important first step into test input generation for semantic applications and presents considerations for practitioners when calibrating a semantic cache. CCS CONCEPTS • Software and its engineering → Empirical software validation. KEYWORDS Large Language Model, Query Evaluation, Question Answering, Semantic Cache, Test Input Generation Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CAIN 2024, April 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn ACM Reference Format: Zafaryab Rasool, Scott Barnett, David Willie, Stefanus Kurniawan, Sherwin Balugo, Srikanth Thudumu, Mohamed Abdelrazek. 2024. LLMs for Test Input Generation for Semantic Caches. In Proceedings of 3rd International Conference on AI Engineering — Software Engineering for AI (CAIN 2024). ACM, New York, NY, USA, 6 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Software development kits for creating applications that use large language models (LLMs) are starting to emerge i.e Microsoft’s Semantic Kernel 1 and Langchain 2 . These SDKs are growing in popularity as LLMs are able to 1) resolve ambiguities in natural language queries, 2) reason over unstructured documents, and 3) synthesise a human like responses to prompts [5]. Semantic caches are becoming an important aspect of these SDKs as developers seek to create applications with a) lower latency, b) lower costs, and c) reduced environmental impact from using less compute resources (i.e. no repeat calls to LLMs with billions of parameters). A semantic cache enables similar queries (as defined by a similarity measure rather than an exact match) to match cached responses. However, testing the robustness of a semantic cache is challenging due to a) application specific calibration to balance the cache hits/misses ratio, b) domain specific query/response pairs, and c) a suitable similarity measure that handles the nuance in natural language (see Table 1). Ensuring the robustness of an application with a semantic cache relies on a representative sample of query/response pairs for calibration and testing. Query Cached Query Do I have to reference in my Assignment 2? In Assignment 2, how many university references should I use? Table 1: An example of an incorrect cache hit using the semantic cache GPTCache 3 . LLMs have been used to generate data for software applications [4, 9–12, 14] and for testing information retrieval based applications [3]. They base their work on the assumption of pre-existing questions which for new applications is not available. Recent work has also explored the use of LLMs for generating data for training Q&A systems. However, their work focuses on the volume of questions from documents rather than subtle variations that would expose the limits of a semantic caching strategy. In summary, prior work has not considered the problem of test input generation for 1 https://learn.microsoft.com/en-us/semantic-kernel/overview/ 2 https://python.langchain.com/docs/get_started/introduction 3 https://github.com/zilliztech/GPTCache" 2401.08141v1,"IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks Md Morshed Alam 1 , Israt Jahan 2 , and Weichao Wang 1 1 Department of Software and Information Systems, University of North Carolina at Charlotte, Charlotte, USA 2 Department of Computer Science, University of Memphis, Memphis, USA {malam3, wwang22}@uncc.edu, ijahan1@memphis.edu Abstract—In trigger-action IoT platforms, IoT devices report event conditions to IoT hubs notifying their cyber states and let the hubs invoke actions in other IoT devices based on functional dependencies defined as rules in a rule engine. These functional dependencies create a chain of interactions that help automate network tasks. Adversaries exploit this chain to report fake event conditions to IoT hubs and perform remote injection attacks upon a smart environment to indirectly control targeted IoT devices. Existing defense efforts usually depend on static analysis over IoT apps to develop rule-based anomaly detection mechanisms. We also see ML-based defense mechanisms in the literature that harness physical event fingerprints to determine anomalies in an IoT network. However, these methods often demonstrate long response time and lack of adaptability when facing complicated attacks. In this paper, we propose to build a deep reinforcement learning based real-time defense system for injection attacks. We define the reward functions for defenders and implement a deep Q-network based approach to identify the optimal defense policy. Our experiments show that the proposed mechanism can effectively and accurately identify and defend against injection attacks with reasonable computation overhead. Index Terms—Internet of Things, Remote Injection Attack, Deep Reinforcement Learning, Markov Decision Process, Triggeraction Platform, Deep Q-Network I. I NTRODUCTION Emerging Internet of Things (IoT) platforms support trigger-action functionality that enables IoT hubs in smart homes instructing IoT devices to perform predefined actions (e.g., turning on smart light) based on specific event conditions reported by other IoT devices (e.g., the door is unlocked) [1]. Hence, event conditions act as triggers, which activate corresponding actions associated with rules set in a rule engine defined by users in the IoT hubs. These rules represent functional dependencies between various IoT event conditions and actions. In a smart home network, these functional dependencies create a chain of interactions among IoT devices to automate network tasks. IoT devices report event conditions to the hub informing the cyber states of the devices themselves, and the hub leverages physical evidence captured by some deployed sensors in the network to verify the physical states of those devices. The trigger-action functionality also allows the hub to communicate with users with important notifications and alerts about the physical developments (e.g., when the fire alarm sounds) in a smart home environment [2]. SmartThings [3] and IFTTT [4] are two prominent examples of such platforms. Although the chain of interactions generated in a smart home enables network automation, it creates security vulnerabilities in the environment [5]. Attackers can exploit this chain to manipulate IoT devices to trigger sensitive actions in the network, such as setting up thermostat at 120°F. Attackers can also collect seamless sensitive user data without raising suspicion to the defense system, or cause unsafe state transitions in the environment violating rule execution integrity [6]. In this paper, we focus on the remote injection attack [5] that allows attackers to inject fake event conditions into the hub and trick it to command target IoT devices to perform some actions that help attackers achieve certain attack goals. For instance, given that there is a functional dependency between fire alarm and smart lock, an attacker can inject a fake fire alarm event condition to the IoT hub representing a false fire hazard situation and let the hub instruct the lock to automatically open the front door. This attack is also called event spoofing attack since attackers deceive the hub with malicious reporting of spoofed event conditions [1]. Thus, it is possible for attackers to exploit functional dependencies present in the chain of interactions to implement safety-critical attacks in smart environments [7]. In the literature, we see great efforts to address this security vulnerability. For example, we see rule-based and ML-based IoT anomaly detection systems (also called event verification systems) that use physical event fingerprints of IoT devices to verify whether the reported events to the hub occurred physically [8] [9]. Sensors deployed in the environment to continuously measure physical channels of devices (e.g., light intensity) help determine these unique fingerprints. We also see approaches that diagnose unsafe and insecure state transitions between IoT devices in the network to ensure that each event reporting to the hub complies with the defined security policy of the network [10] [11]. However, most of the existing security approaches either require active intervention on the IoT app source code, or do not provide realtime security © 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works." 2401.08148v1,"Metal-organic Frameworks in Semiconductor Devices: A revised Version Ranjeev Kumar Parashar 1≠ , Priyajit Jash 1≠ , Michael Zharnikov 2, * and Prakash Chandra Mondal 1, * 1 Department of Chemistry, Indian Institute of Technology, Kanpur, Uttar Pradesh-208016, India 2 Angewandte Physikalische Chemie, Universität Heidelberg, Im Neuenheimer Feld 253, 69120 Heidelberg, Germany E-mail: Michael.Zharnikov@urz.uni-heidelberg.de (MZ); pcmondal@iitk.ac.in (PCM) ≠ These two authors equally contributed to this work. Abstract Metal-organic frameworks (MOFs) are a specific class of hybrid, crystalline, nano-porous materials made of metal-ion-based ‘nodes’ and organic linkers. Most of the studies on MOFs largely focused on porosity, chemical and structural diversity, gas sorption, sensing, drug delivery, catalysis, and separation applications. In contrast, much less reports paid attention to understanding and tuning the electrical properties of MOFs. Poor electrical conductivity of MOFs (~10 -7 – 10 -10 Scm -1 ), reported in earlier studies, impeded their applications in electronics, optoelectronics, and renewable energy storage. To overcome this drawback, the MOF community has adopted several intriguing strategies for electronic applications. The present review focuses on creatively designed bulk MOFs and surface-anchored MOFs (SURMOFs) with different metal nodes (from transition metals to lanthanides), ligand functionalities, and doping entities, allowing tuning and enhancement of electrical conductivity. Diverse platforms for MOFs-based electronic device fabrications, conductivity measurements, and underlying charge transport mechanisms are also addressed. Overall, the review highlights the pros and cons of MOFs-based electronics (MOFtronics), followed by an analysis of the future directions of research, including optimization of the MOF compositions, heterostructures, electrical contacts, device stacking, and further relevant options which can be of interest for MOF researchers and result in improved devices performance. Keywords: metal-organic frameworks, SURMOFs, electronic devices, electrical conductivity, charge transport 1" 2401.08151v1,"Agile Meets Quantum: A Novel Genetic Algorithm Model for Predicting the Success of Quantum Software Development Project Arif Ali Khan 1 , Muhammad Azeem Akbar 2 , Valtteri Lahtinen 3 , Marko Paavola 4 1 M3S Empirical Software Engineering Research Unit, University of Oulu, 90014 Oulu, Finland 2 Software Engineering Department, Lappeenranta-Lahti University of Technology, 53851 Lappeenranta, Finland 3 Quanscient Oy, Tampere, Finland 4 VTT Technical Research Ctr of Finland Ltd, Oulu, Finland arif.khan@oulu.fi, azeem.akbar@lut.fi, valtteri.lahtinen@quanscient.com, marko.paavola@vtt.fi Abstract Context: Quantum software systems represent a new realm in software engineering, utilizing quantum bits (Qubits) and quantum gates (Qgates) to solve the complex problems more efficiently than classical counterparts. Agile software development approaches are considered to address many inherent challenges in quantum software development, but their effective integration remains unexplored. Objective: This study investigates key causes of challenges that could hinders the adoption of traditional agile approaches in quantum software projects and develop an Agile-Quantum Software Project Success Prediction Model (AQSSPM). Methodology: Firstly, we identified 19 causes of challenging factors discussed in our previous study, which are potentially impacting agile-quantum project success. Secondly, a survey was conducted to collect expert opinions on these causes and applied Genetic Algorithm (GA) with Naive Bayes Classifier (NBC) and Logistic Regression (LR) to develop the AQSSPM. Results: Utilizing GA with NBC, project success probability improved from 53.17% to 99.68%, with cost reductions from 0.463% to 0.403%. Similarly, GA with LR increased success rates from 55.52% to 98.99%, and costs decreased from 0.496% to 0.409% after 100 iterations. Both methods result showed a strong positive correlation (rs=0.955) in causes ranking, with no significant difference between them (t=1.195, p=0.240>0.05). Conclusion: The AQSSPM highlights critical focus areas for efficiently and successfully implementing agile-quantum projects considering the cost factor of a particular project. Keywords: Agile approaches, quantum software development, prediction model 1. Introduction Quantum Computing (QC) has emerged as a significant area of interest for industrial practitioners and academic researchers worldwide. Its potential to bring transformative changes across various industries is undeniable [1]. This potential is evident in the investments and efforts of technology leaders such as IBM [2], Google [3], and Microsoft [4], who are actively working to harness QC for solving complex computational challenges. However, as QC machines operate on the principles of quantum mechanics, the development of software applications for them presents unique challenges [5]. Literature suggests that the development process for QC applications closely mirrors traditional software development [1], underscoring the importance of a well-structured engineering process to address the complexities of QC [1]. Therefore, refined Software Engineering (SE) methodologies are necessary to fully realize the benefits of QC [1, 5, 6]." 2401.08153v1,"Learning Stable Koopman Embeddings for Identification and Control ⋆ Fletcher Fan a , Bowen Yi b , David Rye a , Guodong Shi a , Ian R. Manchester a a Australian Centre for Robotics and School of Aerospace, Mechanical and Mechatronic Engineering, The University of Sydney, NSW 2006, Australia b Department of Electrical Engineering, Polytechnique Montreal, Montreal, QC H3T 1J4, Canada Abstract This paper introduces new model parameterizations for learning dynamical systems from data via the Koopman operator, and studies their properties. Whereas most existing works on Koopman learning do not take into account the stability or stabilizability of the model – two fundamental pieces of prior knowledge about a given system to be identified – in this paper, we propose new classes of Koopman models that have built-in guarantees of these properties. These models are guaranteed to be stable or stabilizable via a novel direct parameterization approach that leads to unconstrained optimization problems with respect to their parameter sets. To explore the representational flexibility of these model sets, we establish novel theoretical connections between the stability of discrete-time Koopman embedding and contraction-based forms of nonlinear stability and stabilizability. The proposed approach is illustrated in applications to stable nonlinear system identification and imitation learning via stabilizable models. Simulation results empirically show that the learning approaches based on the proposed models outperform prior methods lacking stability guarantees. Key words: Nonlinear systems; Koopman operator; contraction analysis; system identification; data-driven control 1 Introduction Many fundamental phenomena in engineering and science can be described by dynamical systems, making the modeling of dynamical systems a ubiquitous problem across various domains. These models can not only be used to predict future behavior but have also proven effective in planning, estimation, and designing a controller to interact with the real physical world. In general, deriving a model of a dynamical system from first principles may be challenging or even intractable for cases involving complex tasks, such as imitating human behavior. This is where system identification approaches that learn a model from data become useful. A central consideration for learning algorithms is the model structure. For identifying memoryless input- ⋆ A perliminary version was presented in the 2022 American Control Conference [8]. Email addresses: f.fan@acfr.usyd.edu.au (Fletcher Fan), b.yi@outlook.com (Bowen Yi), david.rye@sydney.edu.au (David Rye), guodong.shi@sydney.edu.au (Guodong Shi), ian.manchester@sydney.edu.au (Ian R. Manchester). Preprint submitted to Automatica output mappings, deep neural networks have achieved state-of-the-art results in many domains, such as image classification [19] and playing strategy games [32]. In contrast, learning dynamical models introduces additional challenges due to the presence of internal memory and feedback. In particular, ensuring the behavioural properties of dynamical models during learning, including stability and stabilizability, is an important aspect that is non-trivial even for linear systems. For example, if a physical system is known to be stable, a model learned from data might exhibit instability and produce unbounded outputs, due to the unavoidable effects such as measurement noise, under-modelling, and the challenges of optimization. To address this, some recent works aim to impose constraints in terms of prior physical knowledge [10,12,15,16,24,29,30,34,36,38,39], in which stability constraints have been used as a control-theoretic regularizer for model learning. In recent years, there has been a growing interest in the Koopman operator for the analysis, control, and learning of nonlinear systems [26,34]. It is a composition operator that characterizes the evolution of scalar observables from a spectral decomposition perspective [17]. Despite its infinite-dimensional nature, the Koopman operator 17 January 2024" 2401.08156v1,"GMLake: Efficient and Transparent GPU Memory Defragmentation for Large-scale DNN Training with Virtual Memory Stitching Cong Guo ∗ Rui Zhang ∗ Jiale Xu Shanghai Jiao Tong University Shanghai Qi Zhi Institute Ant Group Shanghai Jiao Tong University Shanghai Qi Zhi Institute Jingwen Leng † Zihan Liu Ziyu Huang Shanghai Jiao Tong University Shanghai Qi Zhi Institute Shanghai Jiao Tong University Shanghai Qi Zhi Institute Shanghai Jiao Tong University Shanghai Qi Zhi Institute Minyi Guo † Hao Wu Shouren Zhao Shanghai Jiao Tong University Shanghai Qi Zhi Institute Ant Group Ant Group Junping Zhao † Ke Zhang Ant Group Ant Group Abstract Large-scale deep neural networks (DNNs), such as large language models (LLMs), have revolutionized the artificial intelligence (AI) field and become increasingly popular. However, training or fine-tuning such models requires substantial computational power and resources, where the memory capacity of a single acceleration device like a GPU is one of the most important bottlenecks. Owing to the prohibitively large overhead (e.g., 10×) of GPUs’ native memory allocator, DNN frameworks like PyTorch and TensorFlow adopt a caching allocator that maintains a memory pool with a splitting mechanism for fast memory (de)allocation. Unfortunately, the caching allocator’s efficiency degrades quickly for popular memory reduction techniques such as recomputation, offloading, distributed training, and low-rank adaptation. The primary reason is that those memory reduction techniques introduce frequent and irregular memory ∗ Equal contribution † Corresponding authors Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ASPLOS ’24, April 27-May 1, 2024, La Jolla, CA, USA © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0385-0/24/04. . . $15.00 https://doi.org/10.1145/3620665.3640423 (de)allocation requests, leading to severe fragmentation problems for the splitting-based caching allocator. To mitigate this fragmentation problem, we propose a novel memory allocation framework based on low-level GPU virtual memory management called GPU memory lake (GMLake). GMLake employs a novel virtual memory stitching (VMS) mechanism, which can fuse or combine non-contiguous memory blocks with a virtual memory address mapping. GMLake can reduce average of 9.2 GB (up to 25 GB) GPU memory usage and 15% (up to 33% ) fragmentation among eight LLM models on GPU A100 with 80 GB memory. GMLake is completely transparent to the DNN models and memory reduction techniques and ensures the seamless execution of resource-intensive deep-learning tasks. We have opensourced GMLake at https://github.com/intelligent-machinelearning/glake/tree/main/GMLake. CCS Concepts: • Computing methodologies → Machine learning; • Software and its engineering → Virtual memory management schemes. Keywords: Memory Defragmentation, GPU, Deep Learning, Virtual Memory Stitching ACM Reference Format: Cong Guo, Rui Zhang, Jiale Xu, Jingwen Leng, Zihan Liu, Ziyu Huang, Minyi Guo, Hao Wu, Shouren Zhao, Junping Zhao, and Ke Zhang. 2024. GMLake: Efficient and Transparent GPU Memory Defragmentation for Large-scale DNN Training with Virtual Memory Stitching. In 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2 (ASPLOS ’24), April 27-May 1, 2024, La Jolla, CA, USA. ACM, New York, NY, USA, 17 pages. https://doi.org/10.1145/3620665.3640423" 2401.08189v1,"PRewrite: Prompt Rewriting with Reinforcement Learning Weize Kong 1 1 1 Spurthi Amba Hombaiah 1 Mingyang Zhang 1 2 Qiaozhu Mei Michael Bendersky 1 Google Research Prompt engineering is critical for the development of LLM-based applications. However, it is usually done manually in a “trial and error” fashion. This manual procedure can be time consuming, ineffective, and the generated prompts are, in a lot of cases, sub-optimal. Even for the prompts which seemingly work well, there is always a lingering question: can the prompts be made better with further modifications? University of Michigan {weize,spurthiah,mingyang,bemike}@google.com Abstract To address these questions, in this paper, we investigate prompt engineering automation. We consider a specific use case scenario in which developers/users have drafted initial prompts, but lack the time/expertise to optimize them. We propose PRewrite, an automated tool to rewrite these drafts and to generate highly effective new prompts. PRewrite is based on the Reinforcement Learning (RL) framework which allows for end-to-end optimization and our design allows the RL search to happen in a large action space. The automated tool leverages manually crafted prompts as starting points which makes the rewriting procedure more guided and efficient. The generated prompts are human readable, and selfexplanatory, unlike some of those in previous works. We conducted extensive experiments on diverse datasets and found that the prompts generated with this new method not only outperform professionally crafted prompts, but also prompts generated with other previously proposed methods. 1 2 Introduction With the wide-scale proliferation of LLMs, prompting LLMs has become critical to achieving desired results on various downstream tasks. With the right prompts, LLMs can show impressive performance on various downstream tasks in zero-shot or fewshot settings. Currently, most prompt engineering is done on an ad-hoc basis and there are no clear universal 2 qmei@umich.edu guidelines on writing good prompts for various downstream tasks. This approach is prone to various problems. Writing good prompts is timeconsuming and requires some amount of prior experience of working with LLMs to understand their performance and reasoning capabilities. It can also be ineffective as end-users who call the LLMs through APIs and even engineers might face difficulties in getting the LLMs to behave as intended through their hand-crafted prompts. Moreover, they might be sub-optimal as the manual prompts might not be optimized for the task at hand. To address the limitations above, we propose to automate the process of prompt engineering. This can be helpful for both end-users as well as engineers who work with LLMs to build applications. The prompt rewriting/reformulation can be implicit or explicit as prompt suggestions to the user. Automated prompt engineering is important due to various reasons (a) the wide and fast adoption of LLM applications, and (b) LLMs themselves are evolving, and as a result, we’ll need effective methods to update prompts to adapt to new models. Instruction tuned models are better at understanding prompts and the prompts do not require a lot of tweaking to get the desired behavior from the models. However, non-instruction tuned models are not always good at following instructions and their corresponding prompts need to be formulated with greater care. Some previous works have explored automated prompt engineering. AutoPrompt (Shin et al., 2020) uses a search method that iteratively edits prompts with guidance from model gradients whereas RLPrompt (Deng et al., 2022) optimizes prompts using reinforcement learning. Another work, TEMPERA (Zhang et al., 2022) allows editing of the initial prompts using instructions, fewshot examples, verbalizers etc at test-time using reinforcement learning. While prior works showed promising results, they are not yet adopted in prac-" 2401.08198v1,"A model for cosmological perturbations in affine gravity Oscar Castillo-Felisola, 1, ∗ Radouane Gannouji, 2, † Manuel Morocho-López, 1, 2, 3, ‡ and Marcelo Rozas-Rojas 1, 2, § 1 Departamento de Fı́sica, Universidad Técnica Federico Santa Marı́a Casilla 110-V, Valparaı́so, Chile 2 Instituto de Fı́sica, Pontificia Universidad Católica de Valparaı́so Av. Brasil 2950, Valparaı́so, Chile 3 Facultad de Ciencias Naturales y Matemáticas, Escuela Superior Politécnica del Litoral Km. 30.5 Vı́a Perimetral, Guayaquil, Ecuador (Dated: January 17, 2024) In this paper, we present the cosmological perturbation formalism for theories within the framework of affine gravity. These theories are distinguished by their connection, devoid of any metric. Our approach involves segregating perturbations into symmetric and antisymmetric components (related to torsion), each further decomposed into irreducible elements, namely scalars, pseudoscalars, vectors, pseudovectors, 2-tensors, and 3-tensors. Finally, we have fully addressed the gauge freedom in this context. Keywords: Affine gravity; Perturbation theory; Cosmology; I. INTRODUCTION The cosmological model of the Universe is built up under the precept of isotropy and homogeneity, and assumes that the theory that explains the gravitational interactions is General Relativity. Such premise is often called the cosmological principle, and it is understood as valid in terms of averages over large portions of the space. It was soon understood that keeping these condition would not explain the structure formation on the observable Universe. The structure formation then requires to departure from the cosmological principle. Given the complexity of the Einstein equations, even in the simpler scenarios, the strategy is to consider perturbations around an isotropic and homogeneous background, and find the conditions imposed by the field equations on the perturbations (up to a certain order). In General Relativity the metric is the field responsible of mediating the gravitational interaction, hence one considers that the physical metric, g µν , is a sum of an isotropic and homogeneous background metric ḡ µν plus a (small) symmetric tensor field h µν , g µν = ḡ µν + ǫh µν , (1) where ǫ is an expansion parameter that allows to control the order of the perturbation. Moreover, within the framework of the ΛCDM model (Λ cold dark matter, where the Λ stands for the existence of a cosmological constant) the observed Universe is composed mainly by dark energy (69%) and dark matter (26%) [1], which together constitute the so called dark sector of the Universe, two forms of matter whose origin ∗ Corresponding author: o.castillo.felisola:at:proton.me † radouane.gannouji@pucv.cl ‡ manuel.morocho@usm.cl § marcelo.rozas@pucv.cl and nature is still not well understood, nor have been observed directly. Indeed, we have been able to observe the effects produced by their possible existence, but without encountering a direct detection such as in a particle accelerator. The necessity of a huge dark sector to comprehend the Universe within the foundations of the ΛCDM model has posed the question of whether our theories of gravity and particles are fundamental or just effective manifestations of yet-to-be-discovered fundamental ones. This has driven the formulation of uncountable generalisations of our standard models, with the addition of exotic types of matter and interactions from the particle physics point of view, and the extension of the gravitational sector from the gravitational counterpart. Focusing on the branch of extensions of the gravitational sector, one encounters for example metric models of gravity which consider higher order in curvature (e.g. Lanczos–Lovelock gravities [2–5]), but there are also metric-affine models of gravity (see Refs. [6–8] for detailed reviews), in which the metric and the affine connection are considered as independent fields. A modern review of many generalised gravitational sector can be found in [9] (see also [10] for a student friendly introduction). In addition, there exist purely affine models of gravity [11–24], in which the mediator of the gravitational interaction comes from the affine connection, and the metric tensor field is not required to build up the action functional of the model. In this later construction of gravity, cosmological solutions have been studied in [25–31]. Nonetheless, the analysis of perturbations around an exact solution requires to consider perturbations of the affine connection. However, to the extent of our knowledge the perturbative analysis of an affine connection has not been reported in the literature." 2401.08227v1,"1 Core-periphery Detection Based on Masked Bayesian Non-negative Matrix Factorization Zhonghao Wang, Ru Yuan, Jiaye Fu, Ka-Chun Wong, Chengbin Peng Abstract—Core-periphery structure is an essential mesoscale feature in complex networks. Previous researches mostly focus on discriminative approaches while in this work, we propose a generative model called masked Bayesian non-negative matrix factorization. We build the model using two pair affiliation matrices to indicate core-periphery pair associattions and using a mask matrix to highlight connections to core nodes. We propose an approach to infer the model parameters, and prove the convergence of variables with our approach. Besides the abilities as traditional approaches, it is able to identify core scores with overlapping core-periphery pairs. We verify the effectiveness of our method using randomly generated networks and real-world networks. Experimental results demonstrate that the proposed method outperforms traditional approaches. Index Terms—core-periphery detection, non-negative matrix factorization, complex networks I. I NTRODUCTION Omplex networks are frequently utilized to represent real-world systems in various fields, including social relations [1], biological interactions [2], and brain networks [3], can be modeled as complex networks. The investigation of complex network topology mainly focused on the global, mesoscale, and local structure of the network. Community structure [4], core-periphery structure [5], and hierarchical structure [6] are typical types of mesoscale structures. The core-periphery structure is a distinct form of community structure in which there are two partitions: the core nodes and the periphery nodes. In a same core-periphery pair, core nodes are densely connected while the connection between periphery nodes are sparse. Figure.1 illustrates the coreperiphery structure, where yellow and blue nodes denote core and periphery nodes, respectively. As shown in the figure, each network may have several core-periphery pairs, and each pair may containing multiple core nodes. The concept of the coreperiphery structure was first proposed by Krugman et al. for economic analysis [7], and then formalized by Borgatti and Everett [5]. Recent studies have revealed many applications in analyzing collaboration networks [8], economic networks [9], traffic networks [10], word networks [11], and trading networks [12]. Some recent methods distinguish the core C Zhonghao Wang, Ru Yuan and Chengbin Peng are with College of Information Science and Engineering, Ningbo University, Ningbo 315200, China, and also with the Key Laboratory of Mobile Network Application Technology of Zhejiang Province, Ningbo 315200, China (e-mail: wongzhonghao123@gmail.com; shanshuiqiankun@gmail.com; pengchengbin@nbu.edu.cn). Ka-Chun Wong is with Department of Computer Science, City University of Hong Kong, Hong Kong 999077, China (email: kc.w@cityu.edu.hk). Jiaye Fu is with School of Management, Xi’an Polytechnic University, Xi’an 710048, China (email: 3220529324@qq.com). and periphery nodes by binary classification [13]–[15]. Some others measure a quantitative likelihood that each node is a core node [5], [16]–[18]. Many approaches have been devised for core-periphery detection. For example, Shen et al. [19] consider the core–periphery detection as a likelihood maximization problem, and proposed the C–P score maximization algorithm to detect core-periphery pairs. Jia et al. [20] proposed a core score inference algorithm via likelihood maximization. Zhang et al. [15] proposed a expectation–maximization algorithm to infer the parameter of stochastic block model of core–periphery structure. These approaches generally estimate model parameters by maximizing a conditional probabilities based on given networks. Nevertheless, these approaches suffer from some limitations particularly in addressing overlapping coreperiphery pairs and in providing a comprehensive generative understanding of network with core-periphery structures. Different from these approaches, in this work, we propose a generative model [21] that can approximately identify how a given network is generated with a few basic parameters and assumptions. The solution to this model can distinguish not only traditional core-periphery pairs, but also overlapping ones, with relatively high accuracy. Our contributions can be summarized as follows: • We propose a novel generative model of masked Bayesian non-negative matrix factorization, which is able to predict the likelihood of core scores and core-periphery pair affiliations. • We theoretically prove that our approach can converge and demonstrate that it is applicable to overlapping coreperiphery pairs. • We verify the effectiveness of our method on synthetic networks and real-world networks, and demonstrate that it can be accelerated easily with GPUs to achieve a remarkable speedup. II. RELATED WORK A. Core-periphery detection Core-periphery detection has been investigated for decades, and two kinds of approaches have been developed. One kind of approach is based on binary classification. Kojaku et al. [13] propose a scalable algorithm to detect multiple nonoverlapping core-periphery pairs in a network, which extends the idea of core-periphery structure [5]. It can also identify the number and size of core-periphery structures automatically. Zhang et al. [15] propose a statistical inference method using expectation maximization and belief programs to fit a generative" 2401.08238v1,"1 Phase-free Dynamic Movement Primitives Applied to Kinesthetic Guidance in Robotic Co-manipulation Tasks Giovanni Braglia , Davide Tebaldi , and Luigi Biagiotti Abstract—When there is a need to define and adapt a robotic task based on a reference motion, Dynamic Movement Primitives (DMP) is a standard and efficient method for encoding it. The nominal trajectory is typically obtained through a Programming by Demonstration (PbD) approach, where the robot is taught a specific task through kinesthetic guidance. Subsequently, the motion is reproduced by the manipulator in terms of both geometric path and timing law. The basic approach for modifying the duration of the execution involves adjusting a time constant characterizing the model. On the contrary, the goal of this paper is to achieve complete decoupling between the geometric information of the task, encoded into the DMP, and the phase law governing the execution, allowing them to be chosen independently. This enables the optimization of the task duration to satisfy constraints such as velocity or acceleration or even to define a phase law dependent on external inputs, such as the force applied by a user in a co-manipulation task. As an example, this mechanism will be exploited to define a rehabilitation activity where the cobot assists humans in performing various pre-planned exercises. Index Terms—Physical Human-Robot Interaction, Motion and Path Planning, Rehabilitation Robotics, Dynamic Movement Primitives. I. Introduction N recent years, the interest in collaborative robotics has been significantly rising, as robots are starting to work with humans rather than performing separate tasks [1], [2]. In this case, we usually refer to Human-Robot Interaction (HRI) every time we address novel algorithms and techniques to enhance human-robot communication, coexistence and collaboration in various settings [3]–[6]. While robots are recently gaining high popularity, a way to bridge the required technical knowledge for robotic programming and its access to non-expert users is still missing [7], [8]. Possible solutions are given by techniques such as Imitation Learning [9], which learn by observing I The work was partly supported by the University of Modena and Reggio Emilia through the action FARD (Finanziamento Ateneo Ricerca Dipartimentale) 2022 and 2023, and funded under the National Recovery and Resilience Plan (NRRP), Mission 04 Component 2 Investment 1.5 – NextGenerationEU, Call for tender n. 3277 dated 30/12/2021 Award Number: 0001052 dated 23/06/2022. The authors are with the Engineering Department Enzo Ferrari of the University of Modena and Reggio Emilia (Unimore), Via Pietro Vivarelli 10, 41125, Modena, Italy. Contacts: {giovanni.braglia, davide.tebaldi, luigi.biagiotti}@unimore.it and mimicking human or expert behavior. Often referred to as Programming by Demonstration (PbD) [8], these methods involve a demonstration phase and rely on encoding, planning and control strategies to correctly reproduce the desired task [10]–[12]. One of the most widespread encoding/planning techniques in the literature is Dynamic Movement Primitives (DMP) [13], which was first introduced in [14] as a way to encode motor movement with convenient stability properties. DMP consists of a mass-spring-damper system with the addition of a forcing term, allowing to shape the attractor landscape according to the desired dynamics [15], and can be classified into rhythmic or discrete DMP, depending on whether the attractor system is a limit cycle or a point [13], respectively. In this paper, we deal with the discrete version of DMP which, in its basic formulation, can be expressed as follows [13], [15]: τ ż(t) = α[β(g − y(t)) − z(t)] + f (s(t)), (1) τ ẏ(t) = z(t), (2) τ ṡ(t) = −δs(t). (3) Equations (1)-(2) are referred to as the Transformation System (TS), whereas Eq. (3) is referred to as the Canonical System (CS). Parameter τ is a time constant, α and β are positive parameters chosen such that the TS is critically damped (i.e. β = α/4), g is the target goal and the forcing term f (s(t)) shapes the generated trajectory y(t) according to the dynamics of the TS. Whenever f (s(t)) = 0, the TS of Eqs. (1)-(2) represents a globally stable second-order linear system, that can be rewritten as: τ 2 ÿ(t) + ατ ẏ(t) + αβ(y(t) − g) = f (s(t)), (4) with a unique equilibrium point located in (z(t), y(t)) = (0, g). Note that Eq. (4) models a mass-spring-damper mechanical system with unitary mass, friction coefficient α and spring stiffness α β. The Canonical System is generally a first-order system representing the evolution of the phase variable s(t), with δ being a positive constant [15]. The forcing term f (s(t)) in (1) is typically expressed as the linear combination of radial basis functions [14]: f (s(t)) = N X i=1 ω i φ i (s(t)) · s(t) · (g − y 0 ), (5)" 2401.08247v1,"Bayesian Modeling of Demographic Data in Many Subpopulations ∗ GREGOR ZENS International Institute for Applied Systems Analysis (IIASA) Wittgenstein Centre for Demography and Global Human Capital (WIC) January 17, 2024 Abstract Analyzing age-specific mortality, fertility, and migration in subpopulations is a crucial task in demo- graphy, with significant policy relevance. In practice, such analysis is challenging when studying numer- ous subpopulations, due to small sample sizes and demographic heterogeneity. To address this issue, a Bayesian model for the joint analysis of many, potentially small, demographic subgroups is proposed. The model combines three common assumptions about demographic processes in a unified probabilistic framework. The approach provides robust estimates of the demographic process in each subpopulation, allows testing for heterogeneity between subpopulations, and can be used to assess the impact of cov- ariates on the demographic process. This makes the model suitable for probabilistic projection exercises and scenario analysis. An in-depth analysis of age-specific immigration flows to Austria, disaggregated by sex and 155 countries of origin, is used to illustrate the framework. Comparative analysis shows that the model outperforms commonly used benchmark frameworks in both in-sample imputation and out-of-sample prediction exercises. Keywords: Multidimensional Demography, Multipopulation Model, Hierarchical Model, Probabil- istic PCA, Functional Data Analysis. ∗ Correspondence to Gregor Zens, International Institute for Applied Systems Analysis. Austria. E-mail: zens@iias.ac.at. 1 Schlossplatz 1, 2361 Laxenburg," 2401.08277v1,"An Inexact Restoration Direct Multisearch Filter Approach to Multiobjective Constrained Derivative-free Optimization Everton J. Silva ∗ Ana Luı́sa Custódio † January 17, 2024 Abstract Direct Multisearch (DMS) is a well-established class of methods for multiobjective derivative-free optimization, where constraints are addressed by an extreme barrier approach, only evaluating feasible points. In this work, we propose a filter approach, combined with an inexact feasibility restoration step, to address constraints in the DMS framework. The filter approach treats feasibility as an additional component of the objective function, avoiding the computation of penalty parameters or Lagrange multipliers. The inexact restoration step attempts to generate new feasible points, contributing to prioritize feasibility, a requirement for the good performance of any filter approach. Theoretical results are provided, analyzing the different types of sequences of points generated by the new algorithm, and numerical experiments on a set of nonlinearly constrained biobjective problems are reported, stating the good algorithmic performance of the proposed approach. Keywords: Derivative-free Optimization; Black-box optimization; Multiobjective Optimization; Constrained Optimization; Direct Multisearch; Filter methods; Inexact Restoration. AMS Classification: 90C29, 90C30, 90C56, 65K05, 49J52. ∗ Ph.D Program in Mathematics, NOVA School of Science and Technology (NOVA FCT), Center for Mathematics and Applications (NOVA Math), Campus de Caparica, 2829-516 Caparica, Portugal (ejo.silva@campus.fct.unl.pt). Support for this author was provided by Fundação para a Ciência e a Tecnologia (Portuguese Foundation for Science and Technology) under the projects UI/BD/151246/2021, UIDP/00297/2020, and UIDB/00297/2020. † Department of Mathematics, NOVA School of Science and Technology (NOVA FCT), Center for Mathematics and Applications (NOVA Math), Campus de Caparica, 2829-516 Caparica, Portugal (alcustodio@fct.unl.pt). Support for this author was provided by Fundação para a Ciência e a Tecnologia (Portuguese Foundation for Science and Technology) under the projects UIDP/00297/2020 and UIDB/00297/2020. 1" 2401.08341v1,"Direct-Conflict Resolution in Intent-Driven Autonomous Networks 1 st Idris Cinemre 2 nd Kashif Mehmood Dept. of Engineering King’s College London London, UK idris.1.cinemre@kcl.ac.uk Dept. of Information Security and Communication Technology Norwegian University of Science and Technology (NTNU) Trondheim, Norway kashif.mehmood@ntnu.no 3 rd Katina Kralevska 4 th Toktam Mahmoodi Dept. of Information Security and Communication Technology Norwegian University of Science and Technology (NTNU) Trondheim, Norway katinak@ntnu.no Dept. of Engineering King’s College London London, UK toktam.mahmoodi@kcl.ac.uk Abstract—As network systems evolve, there is an escalating demand for automated tools to facilitate efficient management and configuration. This paper explores conflict resolution in Intent- Based Network (IBN) management, an innovative approach that holds promise for effective network administration, especially within radio access domain. Nevertheless, when multiple intents are in operation concurrently, conflicts may emerge, presenting a significant issue that remains under-addressed in the current literature. In response to this challenge, our research expands the range of conflict resolution strategies beyond the established Nash Bargaining Solution (NBS), to incorporate the Weighted Nash Bargaining Solution (WNBS), the Kalai-Smorodinsky Bargaining Solution (KSBS), and the Shannon Entropy Bargaining Solution (SEBS). These methods are employed with the objective to identify optimal parameter values, aiming to ensure fairness in conflict resolution. Through simulations, it is demonstrated that distinct antenna tilt values are yielded as the respective solutions for each method. Ultimately, based on Jain’s Fairness Index, the KSBS is identified as the most equitable method under the given conditions. Index Terms—Intent-based networking (IBN), Cooperative Bargaining Problem, Nash Bargaining Solution (NBS) rule-based SON systems. With the introduction of artificial intelligence (AI), AI-based approaches have replaced rule-based SONs with more advanced cognitive autonomous networks (CAN) [6]. CANs leverage machine learning algorithms to optimize network performance, efficiently allocate resources, and respond adaptively to dynamic network conditions by changing radio parameters. Building on the evolving landscape of network management, the implementation of intent-driven autonomous networks promises to simplify even further the RAN management for Mobile Network Operators (MNOs) [7]. By employing highlevel abstractions of intent, network administrators can focus on what needs to be achieved, rather than the complexities of how to achieve it [1]. This approach not only enhances the effectiveness of network management but also alleviates the need for low-level device configurations and implementation details, and reduces potential errors or misconfigurations. In the context of network management utilizing IBN, situations may arise where multiple intents are received simultaneously, leading to potential conflicts [8]. A notable form of such a conflict is referred to as a direct target conflict [9]. This reveals when multiple intents, in their pursuit of achieving distinct outcomes, impose contradictory requirements on a specific network control parameter. Such a scenario manifests when one intent may necessitate a reduction in the value of a particular network control parameter, whilst a concurrent intent demands an increase of the same parameter’s value. Baktir et al. [10] address conflicts in intent-based systems characterized by multiple closed-loop control processes. In this framework, each intent initiates closed-loop management to achieve its predefined Key Performance Indicators (KPIs). Conflicts arise when the actions of one closed loop negatively impact another loop’s ability to meet its KPIs. To resolve these conflicts, the proposed method employs fitness values or penalties associated with each intent, representing the cost of failing to fulfill or partially fulfilling their KPIs. An I. I NTRODUCTION Intent-based networking (IBN) has emerged as a promising enabler of autonomous network management [1], [2]. It focuses on desired outcomes rather than specific configurations; thus, representing a paradigm shift towards more flexible, agile, and simplified network management [3]. Given the inefficiencies and high costs associated with the manual management of wireless networks, especially in Radio Access Networks (RAN), a transition towards automated network management is essential. The concept of Self-Organizing Networks (SON), endorsed by the wireless operator consortium NGMN [4] and the 3GPP [5], has been proposed as a solution to significantly reduce operational costs. Traditionally, the management of radio parameters has been conducted through these Author Idris Cinmere is funded for his Ph.D. by the Ministry of National Education in Turkiye." 2401.08351v1,"P ERSONALIZED F EDERATED L EARNING OF P ROBA - BILISTIC M ODELS : A PAC-B AYESIAN A PPROACH Mahrokh Ghoddousi Boroujeni 1 , Andreas Krause 2 , and Giancarlo Ferrari Trecate 1 Institute of Mechanical Engineering, EPFL, Switzerland {mahrokh.ghoddousiboroujeni, giancarlo.ferraritrecate}@epfl.ch 2 Department of Computer Science, ETH Zürich, Switzerland krausea@ethz.ch 1 A BSTRACT Federated learning aims to infer a shared model from private and decentralized data stored locally by multiple clients. Personalized federated learning (PFL) goes one step further by adapting the global model to each client, enhancing the model’s fit for different clients. A significant level of personalization is required for highly heterogeneous clients, but can be challenging to achieve especially when they have small datasets. To address this problem, we propose a PFL algorithm named PAC-PFL for learning probabilistic models within a PAC-Bayesian framework that utilizes differential privacy to handle data-dependent priors. Our algorithm collaboratively learns a shared hyper-posterior and regards each client’s posterior inference as the personalization step. By establishing and minimizing a generalization bound on the average true risk of clients, PAC-PFL effectively combats over-fitting. PAC- PFL achieves accurate and well-calibrated predictions, supported by experiments on a dataset of photovoltaic panel power generation, FEMNIST dataset (Caldas et al., 2019), and Dirichlet-partitioned EMNIST dataset (Cohen et al., 2017). 1 I NTRODUCTION Federated Learning (FL) aims at collaboratively learning from multiple private datasets stored by end-devices, called clients (Konečný et al., 2015). The main line of FL iteratively trains a global model that performs well for all clients. A trusted server orchestrates the training by sending the model to a subset of the clients at each iteration and collecting model updates from them. The server prepares the model for the next iteration by aggregating these local updates. The server only accesses the communicated model updates and not the clients’ datasets. Thus, FL offers better data privacy and lowers communication than a data-centric approach, where all clients’ datasets are sent to the server. A defining characteristic of FL is that the clients’ data are potentially heterogeneous (Kairouz et al., 2021; Li et al., 2020a). This violates the critical i.i.d samples assumption in training a single global model, leading to convergence issues or poor performance (Li et al., 2020b). Personalized FL (PFL) addresses this challenge by incorporating a further personalization step of adapting the global model to each client’s data. While PFL has been extensively studied, the following challenges (c1-c4) remain less explored. First, (c1) the majority of PFL approaches yield point estimates of the models, limiting their ability to quantify epistemic uncertainty, which is problematic in safety-critical applications (Guo et al., 2017; Achituve et al., 2021). Second, (c2) the resulting personalized models remain closely tied and are not fully capable of capturing highly heterogeneous, multimodal scenarios. Third, (c3) many proposed methods suffer from performance degradation when clients’ datasets are small. Finally, (c4) most approaches do not take into account the collection of new data over time. In this paper, we propose a PFL algorithm, called PAC-PFL, for tackling the challenges outlined above, (c1-c4). A natural PFL method for probabilistic models is to collaboratively learn a shared prior and regard the posterior inference as the personalization step. However, in this setting, the learned prior depends on each client’s data, conflicting with the Bayesian framework (Box and Tiao, 1992). To overcome this, we leverage a PAC-Bayesian technique capable of handling data-dependent priors (Rivasplata et al., 2020) for inferring the posterior and providing uncertainty quantification, hence addressing (c1). However, the clients’ posterior distributions tend to resemble each other due to their connection with 1" 2401.08352v1,"A UTOMATED SOLVER SELECTION FOR SIMULATION OF MULTIPHYSICS PROCESSES IN POROUS MEDIA A P REPRINT Yury Zabegaev ∗ Department of Mathematics University of Bergen Bergen, Norway Eirik Keilegavlen Department of Mathematics University of Bergen Bergen, Norway Einar Iversen Department of Earth Science University of Bergen Bergen, Norway Inga Berre Department of Mathematics University of Bergen Bergen, Norway A BSTRACT Porous media processes involve various physical phenomena such as mechanical deformation, transport, and fluid flow. Accurate simulations must capture the strong couplings between these phenomena. Choosing an efficient solver for the multiphysics problem usually entails the decoupling into subproblems related to separate physical phenomena. Then, the suitable solvers for each subproblem and the iteration scheme must be chosen. The wide range of options for the solver components makes finding the optimum difficult and time-consuming; moreover, solvers come with numerical parameters that need to be optimized. As a further complication, the solver performance may depend on the physical regime of the simulation model, which may vary with time. Switching a solver with respect to the dominant process can be beneficial, but the threshold of when to switch solver is unclear and complicated to analyze. We address this challenge by developing a machine learning framework that automatically searches for the optimal solver for a given multiphysics simulation setup, based on statistical data from previously solved problems. For a series of problems, exemplified by successive time steps in a time-dependent simulation, the framework updates and improves its decision model online during the simulation. We describe the solver selection algorithm, present examples of how the solver selector tunes the solver during the simulation, and show how it outperforms preselected state-of-the-art solvers for test problem setups. The examples are based on simulations of poromechanics and simulations of flow and transport. For the quasi-static linear Biot model, we demonstrate automated tuning of numerical solver parameters by showing how the L-parameter of the so-called Fixed-Stress preconditioner can be optimized. Motivated by a test example where the main heat transfer mechanism changes between convection and diffusion, we also discuss how the solver selector can dynamically switch solvers when the dominant physical phenomenon changes with time. 1 Introduction Processes in porous media involve strong multiphysics couplings, such as between (subsets of) mechanical deformation, fluid flow, and transport. For such multiphysics simulations, a large part of the computational cost is associated with solving systems of linear equations. Popular linear solvers for multiphysics problems apply preconditioners that split the linear system into subproblems related to separate physical phenomena. This allows for tailoring of the linear solver, as illustrated below for our model problems of poromechanics and coupled flow and transport, both of which are highly relevant for porous media applications. ∗ Corresponding author. Email: yury.zabegaev@uib.no" 2401.08368v1,"How cytoskeletal crosstalk makes cells move: bridging cell-free and cell studies James P. Conboy, 1, a) Irene Istúriz Petitjean, 1, a) Anouk van der Net, 1, a) and Gijsje H. Koenderink 1, a) Department of Bionanoscience, Kavli Institute of Nanoscience Delft, Delft University of Technology, 2629 HZ Delft, The Netherlands (*Electronic mail: G.H.Koenderink@tudelft.nl) (Dated: 17 January 2024) Cell migration is a fundamental process for life and is highly dependent on the dynamical and mechanical properties of the cytoskeleton. Intensive physical and biochemical crosstalk between actin, microtubules, and intermediate filaments ensures their coordination to facilitate and enable migration. In this review we discuss the different mechanical aspects that govern cell migration and provide, for each mechanical aspect, a novel perspective by juxtaposing two complementary approaches to the biophysical study of cytoskeletal crosstalk: live-cell studies (often referred to as top-down studies) and cell-free studies (often referred to as bottom-up studies). We summarize the main findings from both experimental approaches, and we provide our perspective on bridging the two perspectives to address the open questions of how cytoskeletal crosstalk governs cell migration and makes cells move. I. INTRODUCTION Cell migration is a process that is fundamental for life. It is a major contributor to tissue morphogenesis in developing embryos 1 and drives angiogenesis 2 , bone formation 3 , tissue repair 4 and immune surveillance 5 . On the flip side, however, cell migration is also responsible for pathological cell migration during chronic inflammation 6 and cancer metastasis 7 . Cell migration depends on the mechanical and dynamical properties of the cytoskeleton, a network of dynamic biopolymers that self-assemble from small protein building blocks. There are three main cytoskeletal biopolymers: actin filaments, microtubules, and intermediate filaments (Figure 1A). They have markedly different structural, mechanical and dynamical properties. Actin filaments are double helices with a diameter of ∼ 7 nm, made of two strands of globular monomers 8 . The filaments are semiflexible since their thermal persistence length l p = κ/k B T (where κ is the bending rigidity and k B T thermal energy) is ∼ 10µm, of the same order as the filament contour length 9 . Actin filaments have an intrinsic structural polarity with a “barbed end” and a “pointed end”. Polymerizationlinked ATP hydrolysis causes treadmilling, where the filaments grow at the barbed end and disassemble from the pointed end 10 . Filaments reconstituted from purified actin turn over slowly (one subunit every 3–4 s), but actin turnover in the cell is catalyzed by actin-binding proteins. Typical actin network turnover times are of order seconds in the leading edge of motile cells 11 to minutes in the actin cortex 12 . Together with myosin motor proteins, actin filaments form networks and bundles that generate contractile forces 13 . Microtubules form hollow tubes of 13 protofilaments that are much wider (∼ 25 nm) 14 and hence substantially stiffer (l p ∼ mm) 15 than actin filaments. Like actin filaments, microtubules have an intrinsic structural polarity with distinct plus a) These authors contributed equally to this work. and minus ends. GTP hydrolysis results in dynamic instability, characterized by alternating phases of microtubule growth and shrinkage 16 . In the cell, this process is tightly regulated by accessory proteins that bind at the microtubule tip or lattice. Intermediate filaments are homo-/heteropolymers made of rod-shaped proteins that are encoded by more than 70 genes in humans 17 . Intermediate filament proteins are expressed in a cell-type-specific manner. Mesenchymal cells for instance express vimentin, whereas epithelial cells express keratins. The IF proteins share a common secondary structure consisting of an alpha-helical rod domain flanked by intrinsically disordered head and tail domains. Intermediate filaments are somewhat thicker (∼ 10 nm) 18 than actin filaments, but they are nevertheless much more flexible (l p ∼ 0.5 - 2 µm, depending on intermediate filament composition and ionic strength 19–23 ) because of their hierarchical rope-like structure. Intermediate filaments are much more stable than actin filaments and microtubules, with slow subunit exchange along their length and annealing and fragmentation on hour time scales in reconstituted systems 24,25 and in cells 26,27 . The physical properties of the cytoskeletal filaments are directly connected to their functions in cell migration. Actin, with its ability to generate protrusive and contractile forces, provides the main driving forces for polymerization-driven mesenchymal migration and bleb-based amoeboid migration 28,29 . Meanwhile microtubules play a key role in establishing front-rear polarity and promoting persistent migration, aided by their large persistence length that is much longer than the size of the cell 30 . Finally, intermediate filaments, with their mechanical resilience, protect the migrating cell and its nucleus from mechanical damage, which is especially important when cells squeeze through confined environments 31,32 . There is growing evidence that cell migration requires a dynamic interplay between the three cytoskeletal filament systems that depends on mechanical and signaling crosstalk. In mesenchymal migration, coupling of actin to microtubules and intermediate filaments is for instance essential to polarize the actin cytoskeleton and control force generation 33 . Here we review recent insights in the role of cytoskeletal crosstalk in" 2401.08376v1,"KADEL: Knowledge-Aware Denoising Learning for Commit Message Generation WEI TAO, Fudan University, China YUCHENG ZHOU, University of Macau, China YANLIN WANG, Sun Yat-sen University, China HONGYU ZHANG, Chongqing University, China HAOFEN WANG, Tongji University, China WENQIANG ZHANG, Fudan University, China Commit messages are natural language descriptions of code changes, which are important for software evolution such as code understanding and maintenance. However, previous methods are trained on the entire dataset without considering the fact that a portion of commit messages adhere to good practice (i.e., good-practice commits), while the rest do not. On the basis of our empirical study, we discover that training on good-practice commits significantly contributes to the commit message generation. Motivated by this finding, we propose a novel knowledge-aware denoising learning method called KADEL. Considering that goodpractice commits constitute only a small proportion of the dataset, we align the remaining training samples with these good-practice commits. To achieve this, we propose a model that learns the commit knowledge by training on good-practice commits. This knowledge model enables supplementing more information for training samples that do not conform to good practice. However, since the supplementary information may contain noise or prediction errors, we propose a dynamic denoising training method. This method composes a distribution-aware confidence function and a dynamic distribution list, which enhances the effectiveness of the training process. Experimental results on the whole MCMD dataset demonstrate that our method overall achieves state-of-the-art performance compared with previous methods. CCS Concepts: • Software and its engineering → Software configuration management and version control systems. Additional Key Words and Phrases: commit message generation, knowledge introducing, denoising training 1 INTRODUCTION A large amount of code is frequently updated, and the code changes drive software development. To better manage software evolution, version control systems such as Git require developers to describe the changes in natural language (i.e., commit messages) each time they update the code. Commit messages enable developers to better understand, manage, and analyze software evolution [27]. For example, they provide additional explanatory power in code reviewer recommendation [65], commit classification [7], maintenance activity classification [19], refactoring recommendation [47], and just-in-time defect prediction [3]. Over the past years, a number of approaches have been proposed to generate commit messages automatically. Early works explored rule-based methods, utilizing predefined rules to generate This work was supported by National Natural Science Foundation of China (No.62072112), Scientific and Technological innovation action plan of Shanghai Science and Technology Committee (No.22511102202). Authors’ addresses: Wei Tao, wtao18@fudan.edu.cn, Shanghai Engineering Research Center of AI and Robotics, Academy for Engineering and Technology, Fudan University, Shanghai, China; Yucheng Zhou, yucheng.zhou@connect.um.edu.mo, State Key Laboratory of Internet of Things for Smart City, Department of Computer and Information Science, University of Macau, Macau, China; Yanlin Wang, wangylin36@mail.sysu.edu.cn, School of Software Engineering, Sun Yat-sen University, Zhuhai, Guangdong, China, 519082; Hongyu Zhang, hyzhang@cqu.edu.cn, School of Big Data and Software Engineering, Chongqing University, Chongqing, China; Haofen Wang, carter.whfcarter@gmail.com, College of Design and Innovation, Tongji University, Shanghai, China; Wenqiang Zhang, wqzhang@fudan.edu.cn, Engineering Research Center of AI and Robotics, Ministry of Education, Academy for Engineering and Technology; Shanghai Key Lab of Intelligent Information Processing, School of Computer Science, Fudan University, 220 Handan Road, Shanghai, China, 200433." 2401.08381v1,"Robotic Imitation of Human Actions 1 st Josua Spisak 2 nd Matthias Kerzel 3 rd Stefan Wermter Knowledge Technology Group University of Hamburg Hamburg, Germany josua.spisak@uni-hamburg.de Hamburger Informatik Technologie-Center Hamburg, Germany matthias.kerzel@uni-hamburg.de Knowledge Technology Group University of Hamburg Hamburg, Germany stefan.wermter@uni-hamburg.de Abstract—Imitation can allow us to quickly gain an understanding of a new task. Through a demonstration, we can gain direct knowledge about which actions need to be performed and which goals they have. In this paper, we introduce a new approach to imitation learning that tackles the challenges of a robot imitating a human, such as the change in perspective and body schema. Our approach can use a single human demonstration to abstract information about the demonstrated task, and use that information to generalise and replicate it. We facilitate this ability by a new integration of two state-of-the-art methods: a diffusion action segmentation model to abstract temporal information from the demonstration and an open vocabulary object detector for spatial information. Furthermore, we refine the abstracted information and use symbolic reasoning to create an action plan utilising inverse kinematics, to allow the robot to imitate the demonstrated action. Index Terms—Imitation, Learning, Robotics I. I NTRODUCTION Imitation learning allows us to directly learn from the demonstrations of an expert to quickly adapt to new tasks and carry out complex chains of action. How exactly imitation learning works, or even what imitation is, can at times be hard to define. To gain a better understanding of how imitation learning works, Tomasello et al. [1] observe naturally occurring instances. Seemingly important for imitation learning in apes is to learn the specific sequence of actions to reach a desired goal, while the exact way in which, for example, the fingers are moving is less important [2], [3]. Following the exact motions of an expert can be almost impossible just because of how each individual differs. When it comes to humanoid robots, this can be further exaggerated. Our robot NICOL (Neuro-Inspired COLlaborator) [4], for example, has more joints in its arm than a human. Therefore, following an example from a human demonstration by directly copying the joint movements would not make sense. However, following the same actions that led to the desired result is still very feasible. Closely connected to imitation learning is the famous mirror neuron concept [5], where Gallese et al. found out that seeing certain actions can have very similar neuron activations as doing these actions. They specifically mention The authors gratefully acknowledge support from the DFG (CML, MoReS- pace, LeCAREbot), BMWK (SIDIMO, VERIKAS), and the European Commission (TRAIL, TERAIS). Fig. 1. The top three images are taken from one of the human demonstrations at three timesteps: when the object is first grasped, during the movement, and after it is released. In the bottom three images, we can see three timesteps taken from the imitation of said demonstration. Again we show the moment when the object is first grasped, being moved, and after it is released. While the demonstration was given by a human sitting across from the robot, the model is able to perform the action from the robot’s perspective. four actions where this pattern can be found: grasping an object, releasing an object, manipulating an object and tearing an object. These fundamental actions can be combined into more complex higher-level actions. Playing basketball is a sequence of grasping the ball, moving it and releasing it. So, if we are able to use a given body scheme to perform these actions and combine it with imitation learning to learn the sequence and goals of the action, it can allow us to imitate high-level actions [3]. For these reasons, imitation learning has been a field of study in computer science for a long time [6]. However, while having the potential to solve many problems, imitation learning also comes with difficulties. To imitate someone, the ability to perceive and understand the actions done by the target of the imitation is necessary. One of the difficulties stems from the differences between the bodies of the imitator and demonstrator. One way to address this problem is to control the robot and use it as its own demonstrator [7], [8]. Another approach to simplify the action perception is to do the action from the perspective of the robot; since human data is easier to collect than data from a controlled robot [9]. Imitation learning can also be accomplished by making the" 2401.08386v1,"Deep Learning-based Group Causal Inference in Multivariate Time-series Wasim Ahmad, Maha Shadaydeh, Joachim Denzler Computer Vision Group, Faculty of Mathematics and Computer Science, Friedrich Schiller University Jena, Germany {wasim.ahmad, maha.shadaydeh, joachim.denzler}@uni-jena.de Abstract Causal inference in a nonlinear system of multivariate time series is instrumental in disentangling the intricate web of relationships among variables, enabling us to make more accurate predictions and gain deeper insights into real-world complex systems. Causality methods typically identify the causal structure of a multivariate system by considering the causeeffect relationship of each pair of variables while ignoring the collective effect of a group of variables or interactions involving more than two-time series variables. In this work, we test model invariance by group-level interventions on the trained deep networks to infer causal direction in groups of variables, such as climate and ecosystem, brain networks, etc. Extensive testing with synthetic and real-world time series data shows a significant improvement of our method over other applied group causality methods and provides us insights into realworld time series. The code for our method can be found at: https://github.com/wasimahmadpk/gCause. Introduction Group-based causal inference investigates causal relationships within specific groups of individuals, entities, or units. It is particularly relevant when studying complex systems with interconnected components such as in climate (Molotoks et al. 2020) and brain networks (Faes et al. 2022), allowing researchers to investigate how variables within distinct groups contribute to observed outcomes or behaviors. In this paper, we explore the fundamental concept behind group-based causal inference in multivariate time series and its growing significance in diverse disciplines. To this end, we present our approach to testing the causal link in groups of time series, see Figure 1, which provides a comprehensive understanding of how these groups interact. The proposed method allows the testing of bi-directional causal links. Our method builds on our previous work (Ahmad, Shadaydeh, and Denzler 2022), which exploits the model invariance property through Knockoffs (Barber and Candès 2015, 2019; Barber, Candès, and Samworth 2020) interventions for pairs of variables in deep networks for causal estimation. However, here we emphasises the identification of causal interaction in groups of variables and is the first group Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: Interactions among groups of multivariate time series data of various dimensions. causality method to the best of our knowledge which utilize deep learning to learn complex nonlinear relation. The model invariance property refers to the invariant behavior of the model in different settings when its causal predictors are observed (Peters, Bühlmann, and Meinshausen 2016). We use DeepAR (Salinas et al. 2020) to model multivariate time series which has the potential to learn complex interactions in nonlinear data. Since deep networks cannot handle missing variables or adjust to out-of-distribution data, we use Knockoff variables for interventions on the trained deep networks. Knockoffs are in-distribution, uncorrelated copies of the original data with similar covariance structure. To demonstrate the robustness and practical utility of our approach, we evaluate its performance on synthetically generated time series and real-world datasets. We compare our method with other group causality methods, i.e., Vanilla- PC (Janzing, Hoyer, and Schölkopf 2009), Trace method (Zscheischler, Janzing, and Zhang 2012) and 2GVecCI (Wahl, Ninad, and Runge 2023). As a real-world application, we mainly focus on the climate system and assessing the direction of connections in brain networks. This involves considering the internal processes over a period of time involving interactions within and between different climate subsystems, i.e., ocean, land, ecosystem, atmosphere, etc. (Latif and Keenlyside 2009). For example, how climate and ecosystem interact (Malhi et al. 2020; Sefidmazgi and Sefidmazgi 2020; Korell et al. 2020), or how major climate phenomena such as the El Niño Southern Oscilla-" 2401.08407v1,"Cross-Domain Few-Shot Segmentation via Iterative Support-Query Correspondence Mining Jiahao Nie 1 * Yun Xing 1 * Gongjie Zhang 2 Pei Yan 3,1 Aoran Xiao 1 Yap-Peng Tan 1 Alex C. Kot 1 Shijian Lu 1† 1 Nanyang Technological University 2 Black Sesame Technologies 3 Huazhong University of Science and Technology jiahao007@e.ntu.edu.sg Abstract Cross-Domain Few-Shot Segmentation (CD-FSS) poses the challenge of segmenting novel categories from a distinct domain using only limited exemplars. In this paper, we undertake a comprehensive study of CD-FSS and uncover two crucial insights: (i) the necessity of a fine-tuning stage to effectively transfer the learned meta-knowledge across domains, and (ii) the overfitting risk during the naı̈ve fine-tuning due to the scarcity of novel category examples. With these insights, we propose a novel cross-domain fine-tuning strategy that addresses the challenging CD-FSS tasks. We first design Bi-directional Few-shot Prediction (BFP), which establishes support-query correspondence in a bi-directional manner, crafting augmented supervision to reduce the overfitting risk. Then we further extend BFP into Iterative Few-shot Adaptor (IFA), which is a recursive framework to capture the support-query correspondence iteratively, targeting maximal exploitation of supervisory signals from the sparse novel category samples. Extensive empirical evaluations show that our method significantly outperforms the state-of-the-arts (+7.8%), which verifies that IFA tackles the cross-domain challenges and mitigates the overfitting simultaneously. Code will be made available. Figure 1. We investigate two types of category correspondence, left: Support-to-Query (S2Q) and right: Support-to-Query-to- Support (S2Q2S) under four experimental setups (a-d). (a) Indomain performances without fine-tuning (FT) set oracle baselines for Cross-Domain Few-Shot Segmentation (CD-FSS). (b) Crossdomain results without fine-tuning suffer from severe performance drops, which verifies the necessity of bridging domain gap for CD- FSS. (c) Cross-domain setups with naı̈ve fine-tuning only bring small performance gains, which is attributed to the overfitting risk of CD-FSS fine-tuning. Notably, there also underlies rich unexplored category correspondence in S2Q2S. (d) Cross-domain setup with our proposed Iterative Few-Shot Adaptor (IFA) achieve significant performance gains. IFA comprehensively exploits data potential by capturing both S2Q and S2Q2S category correspondence during fine-tuning. 1. Introduction Current state-of-the-art FSS approaches [11, 36] have demonstrated impressive performance when novel categories fall in the same domain with base categories, yet still suffer from severe performance drop when a clear domain gap is present [28] (e.g., base categories from Pascal VOC [10], and novel categories from Deepglobe [7]). To bridge this gap, the task of Cross-Domain Few-Shot Segmentation (CD-FSS) has been explored for generalizing the ability of FSS beyond its own domain [28, 47]. Nevertheless, directly applying a meta-learned model to target domain is incapable of mitigating this challenge [28], largely because the category correspondence learned under meta- Few-Shot Segmentation (FSS) aims to segment novel categories based on very limited support exemplars, typically by transferring category-agnostic knowledge learned from abundant base categories to novel categories [9, 11, 33, 36, 39, 40]. Similar to other few-shot learning tasks [5, 20, 22, 23, 49, 56], FSS is generally addressed with metalearning [1, 5, 31, 43, 47] and learns generalizable category correspondence from constructed support-query pairs. * Equal contribution † Corresponding author 1" 2401.08413v1,"Relativistic isotropic stellar model with Durgapal-V metric in f (R, T ) gravity Nayan Sarkar, 1,a Susmita Sarkar, 2,b Banashree Sen 3,c Moumita Sarkar, 4,d and Farook Rahaman 4,∗ 1 Department of Mathematics, Karimpur Pannadevi College, Karimpur-741152, Nadia, West Bengal, India 2 Department of Applied Science and Humanities, Haldia Institute of Technology, Haldia-721606, West Bengal, India 3 Department of Commerce and Management, St. Xavier’s University, Kolkata-700160, India 4 Department of Mathematics, Jadavpur University, Kolkata-700 032, India 1 Abstract The main aim of this paper is to obtain a completely new relativistic nonsingular model for static, spherically symmetric isotropic celestial compact stars in the f (R, T ) gravity scenario. In this regard, we have considered the isotropic Durgapal-V metric ansatz [75] to find the solutions of Einstein’s field equations in the framework of f (R, T ) gravity. The obtained solutions are analyzed graphically for the compact star Cen X-3 with mass M = 1.49±0.08 M ⊙ and radius R = 9.178 ± 0.13 km [92] and numerically for ten well-known different compact stars along with Cen X-3 corresponding to the different values of coupling constant χ. The reported solutions are singularity-free at the center of the stars, physically well-behaved, and hold the physically stable matter configurations by satisfying all the energy conditions and EoS parameter ω(r) ∈ (0, 1), causality condition, adiabatic index Γ(r) > 4/3. We have also discussed hydrostatic equilibrium through the modified TOV equation to ensure the equilibrium position of the solutions representing matter distributions. Considering the several values of χ we have examined the impact of this parameter on the proposed solutions that help to make a fruitful comparison of modified f (R, T ) gravity to the standard general relativity, and interestingly, we have found that the modified f (R, T ) gravity holds long-term stable compact objects than the standard Einstein gravity. All the graphical and numerical results ensure that our reported model is under the physically admissible regime that indicates the acceptability of the model. a b Email addresses: nayan.mathju@gmail.com, susmita.mathju@gmail.com, d banashreesen7@gmail.com , moumita.sarkar1594@gmail.com , ∗ rahaman@associates.iucaa.in, 1 c 1" 2401.08425v1,"Springer Nature 2021 L A TEX template U-DIADS-Bib: a full and few-shot pixel-precise dataset for document layout analysis of ancient manuscripts Silvia Zottin 1* , Axel De Nardin 1,2 , Emanuela Colombi 3 , Claudio Piciarelli 1 , Filippo Pavan 3 and Gian Luca Foresti 1 1 Department of Mathematics, Computer Science and Physics, University of Udine, Udine, Italy. 2 Department of Engineering and Architecture, University of Trieste, Trieste, Italy. 3 Department of Humanities and Cultural Heritage, University of Udine, Udine, Italy. *Corresponding author(s). E-mail(s): zottin.silvia@spes.uniud.it; Contributing authors: denardin.axel@spes.uniud.it; emanuela.colombi@uniud.it; claudio.piciarelli@uniud.it; pavan.filippo@spes.uniud.it; gianluca.foresti@uniud.it; Abstract Document Layout Analysis, which is the task of identifying different semantic regions inside of a document page, is a subject of great interest for both computer scientists and humanities scholars as it represents a fundamental step towards further analysis tasks for the former and a powerful tool to improve and facilitate the study of the documents for the latter. However, many of the works currently present in the literature, especially when it comes to the available datasets, fail to meet the needs of both worlds and, in particular, tend to lean towards the needs and common practices of the computer science side, leading to resources that are not representative of the humanities real needs. For this reason, the present paper introduces U-DIADS-Bib, a novel, pixel-precise, non-overlapping and noiseless document layout analysis dataset developed in close collaboration between specialists in the fields of computer vision and humanities. Furthermore, we propose a novel, computer-aided, segmentation pipeline in order to alleviate the burden represented by the time-consuming process of manual annotation, necessary for the generation of the ground truth segmentation maps. Finally, we present a standardized few-shot version of the dataset (U-DIADS-BibFS), with the aim of encouraging the development of models and solutions able to address this task with as few samples as possible, which would allow for more effective use in a real-world scenario, where collecting a large number of segmentations is not always feasible. Keywords: Document Segmentation, Document Layout Analysis, Document Image Analysis, Document Image Dataset, Pixel-level Annotation, Few-Shot Learning 1 Introduction In recent years, interest in cultural heritage is also spreading within the IT community. The cooperation between computer scientists and humanists is becoming more and more prominent, steadily 1 leading to a better understanding of this type of data for the former and a simplification in the work of the latter. One of the activities that humanists are particularly interested in, and usually" 2401.08428v1,"Herd Behaviour in Public Goods Games Marı́a Pereda Grupo de Investigación Ingenierı́a de Organización y Logı́stica (IOL), Departamento Ingenierı́a de Organización, Administración de empresas y Estadı́stica, Escuela Técnica Superior de Ingenieros Industriales, Universidad Politécnica de Madrid, 28006 Madrid, Spain. Grupo Interdisciplinar de Sistemas Complejos (GISC), 28911 Leganés, Madrid, Spain ∗ (Dated: January 17, 2024) The problem of free-riding arises when individuals benefit from a shared resource, service, or public good without proportionately contributing to its provision. This conduct often leads to a collective action problem, as individuals pursue personal gains while relying on the contributions of others. In this study, we present a Bayesian inference model to elucidate the behaviour of participants in a Public Goods Game, a conceptual framework that captures the essence of the free-riding problem. Here, individuals possess information on the distribution of group donations to the public good. Our model is grounded in the premise that individuals strive to harmonise their actions with the group’s donation patterns. By successfully replicating the behavioural patterns observed in experiments, our model provides a straightforward mechanism for understanding individual contributions to public goods. These insights contribute to the understanding of how cooperation is achieved through alignment with group behaviour. I. INTRODUCTION In delving into the intricate dynamics of human cooperation and decision-making, the provision of public goods has garnered extensive attention in recent decades. At the core of this research lies the profound dilemma between individually rational decisions and the collective optimal outcome. The extensively researched paradigm for this issue is the Public Goods Game (PGG) [1], where N ≥ 2 agents can voluntarily contribute to a common pool. The pool is then multiplied or enhanced by a factor 1 < r < N , and the resulting value is shared among all participants, regardless of their individual contributions. The Nash equilibrium of the game suggests a tendency towards non-contribution to the common good, while the collective optimal outcome demands maximal contributions from all participants. Beyond its theoretical intrigue, this dilemma is of vital importance in addressing real-world challenges such as climate change mitigation, public infrastructure management, ecosystem protection, and sustainable exploitation, where solutions hinge on voluntary contributions from many. Despite game theory predictions, experimental findings, both in controlled laboratory settings and online, consistently show that participants contribute approximately half of their endowment in one-shot games; and in iterated games, contributions decline but persist, with a general pattern of gradual decrease as players learn the consequences of their actions. The observed results are influenced by the information the participants receive about the actions of other players [2–7]. Much research has explored individual contributions in traditional Public Goods Games, where decisions hinge on the average contributions of the group members. ∗ maria.pereda@upm.es Studies conducted by [8–10] convincingly showcase the widespread occurrence of conditional cooperation in the Public Goods game. Utilising the strategy method, participants were categorised into two predominant groups: conditional cooperators, who are inclined to contribute more as others contribute, and free-riders, who abstain from contributions regardless of others’ behaviour. In conditions where individuals cannot base their decisions on others’ behaviour, conditional cooperators, as demonstrated by [8, 9], determine their contributions relying on diverse beliefs about the contributions of other group members. As far as we are aware, only one study [7] has delved into comprehending human decisions when presented with the distribution of decisions (not solely the average contribution of the group), and to date, no models have explained the behaviour observed in such a setup. Most of the modelling efforts have focused on understanding the group dynamics based on the average contribution to the group. Our model diverges from those standard cooperation models (see [11, 12] for two recent reviews on cooperation), from theoretical modelling approaches [13–16], and models using the conditional cooperation mechanism [8, 17, 18]. In our proposal, agents base their decisions on the distribution of decisions of the group, employing Bayesian inference to converge toward the group’s patterns of contribution behaviour, as individuals possess pronounced inclinations to conform and mimic the group [19, 20]. Regarding the use of Bayesian inference to explain game-theoretical dilemmas, a large number of articles are devoted to the study of Bayesian games, i.e., games with incomplete information [21–23] and extensive research is focused on the field of decision-making under uncertainty. In [24], the authors built a model based on the psychological dual-process theories of intuition decision-making; combining two decision processes, a controlled one using Bayesian inference and an intuitive one based on rein-" 2401.08434v1,"1 Distributed IRSs Always Benefit Every Mobile Operator L. Yashvanth and Chandra R. Murthy, Fellow, IEEE Abstract—We investigate the impact of multiple distributed intelligent reflecting surfaces (IRSs), which are deployed and optimized by a mobile operator (MO), on the performance of user equipments (UEs) served by other co-existing out-of-band (OOB) MOs that do not control the IRSs. We show that, under round-robin scheduling, in mmWave frequencies, the ergodic sum spectral efficiency (SE) of an OOB MO is monotonic in the total number of IRS elements with a pre-log factor that depends on the channel properties of the OOB UE. We further show that the maximum achievable SE of OOB MO scales log-linearly in IRS elements. Then, by specifying the minimum number of IRSs as a function of the channel parameters, we design a distributed IRS system in which an OOB MO almost surely obtains the maximum SE. Finally, we prove that the outage probability at an OOB UE decreases exponentially in the number of IRSs, even though they are randomly configured from the UE’s viewpoint. We numerically verify our theory and conclude that distributed IRSs always help every MO, but the MO controlling the IRSs benefits the most. Index Terms—Intelligent reflecting surfaces, out-of-band performance, mmWave frequency bands, distributed systems. I. I NTRODUCTION ntelligent reflecting surfaces (IRSs) have been envisioned to meet the high data requirements for next-generation wireless systems [1]–[3]. They are made up of several passive elements that can be independently tuned to reflect signals in desired directions. Further, in a distributed version of it, multiple IRSs are uniformly spread out in the environment, which provides additional diversity benefits to the system. Also, in practice, multiple mobile operators (MOs) coexist in a geographical area and independently serve multiple user equipments (UEs) over different frequency bands. Then, an important problem within the paradigm of IRSs is how a distributed IRS, deployed and optimized by only one of the MOs on a given frequency band, affects the performance of other out-of-band (OOB) MOs. This aspect is pertinent because an IRS does not have a band-pass filter and reflects every signal that impinges it over a wide bandwidth. This paper addresses this problem wherein every MO uses a different mmWave frequency band for communication. A few works in the literature have illustrated that distributed IRSs improve the multiplexing gains in multiple antenna systems [2], [3]. Similarly, multiple IRSs are leveraged to reduce link blockages for URLLC applications [4]. In another work, the authors demonstrate the use of multiple IRSs to improve coverage in cellular systems [5]. Also, distributed IRSs have been leveraged to efficiently mitigate multi-user interference in multi-user scenarios [6]. Further, all of these merits can be obtained with minimal channel estimation overheads that do not scale with the number of IRSs and their elements [7]. The above-existing works implicitly assume that a single MO controls the IRSs. However, if multiple MOs co-exist and I The authors are with the Dept. of ECE, Indian Institute of Science, Bengaluru, India 560 012. (e-mails: {yashvanthl, cmurthy}@iisc.ac.in). only one of them deploys multiple IRSs to optimally serve its UEs, then the impact of the IRSs on the performances of the OOB MOs (which do not control the IRSs) is unexplored, but is an important aspect to be understood in real-world deployment scenarios. Although our prior work studies this aspect in single IRS cases [8], the overall channel properties change in distributed IRS settings due to multiple independent links offered by the IRSs. This potentially leads to different results and insights, and hence, it merits an independent study in the multiple IRS scenario. To set the context, we consider two MOs, X and Y, operating over non-overlapping mmWave bands. The (in-band) MO X deploys and optimizes multiple distributed IRSs to serve a UE scheduled by it in every time slot. Contrarily, the (OOB) MO Y does not deploy any IRS and is oblivious to MO X’s IRSs. 1 Our key contributions are as follows. 1) Under round-robin (RR) scheduling of UEs, we derive the ergodic sum spectral efficiencies (SE) of the MOs as a function of the number of IRS elements, N . We show that the SE of MO X uniformly grows asO(2 log 2 (N )), and the SE of MO Y scales as O(τ log 2 (N )), where the pre-log factor τ ∈ [0, 1] depends on the number of IRSs and the channel properties of OOB UE. (See Theorem 1.) 2) We next design a distributed IRS system by specifying the minimum number of IRSs so that the MO Y almost surely achieves the maximum SE (i.e., τ = 1.) (See Prop. 1.) 3) Finally, we evaluate the outage probability at an arbitrary OOB UE and show that it exponentially decreases in the number of IRSs deployed by MO X. (See Theorem 2.) Through numerical simulations, we affirm that distributed IRSs enhance the performance of not only the UEs for which it is optimized but also of other OOB UEs, at no additional signal processing costs, both instantaneously and on average. Notation: CN (0, σ 2 ), Ber(p), Bin(n, p) are circular symmetric Gaussian, Bernoulli, and Binomial distributions with parameters σ 2 , p, and n, p, respectively. ⊙ is the Hadamard product. Pr(·) and E[·] stand for probability and expectation, O is the Landau’s Big-O notation, x!, ⌈·⌉, 1 {·} , and ∪ refer to the factorial of x, ceil and indicator functions, and set unions. II. S YSTEM M ODEL AND P ROBLEM S TATEMENT We consider a wireless system where two MOs, X and Y, provide services to K and Q UEs on non-overlapping mmWave frequency bands using their respective base stations (BS-X and BS-Y). For the sake of exposition, the BSs are equipped with a single antenna [9], and we emphasize that all the results in this paper directly extend to multiple antenna BSs without changing the main conclusions. MO X deploys and optimizes S > 1 distributed IRSs with M elements each (so, 1 The broad conclusions of this paper can be shown to hold for any number of OOB MOs and also when every MO has its own set of IRSs." 2401.08451v2,"First measurements of radon-220 diffusion in mice tumors, towards treatment planning in diffusing alpha-emitters radiation therapy Guy Heger 1,∗ , Mirta Dumančić 1,∗,† , Ishai Luz 2 , Maayan Vatarescu 2 , Noam Weizman 1,3 , Brian W. Miller 4 , Tomer Cooks 2,‡ , Lior Arazi 1,‡ 1 Unit of Nuclear Engineering, Faculty of Engineering Sciences, Ben-Gurion University of the Negev, P.O.B. 653 Be’er-Sheva 8410501, Israel 2 The Shraga Segal Department of Microbiology, Immunology, and Genetics, Ben-Gurion University of the Negev, Be’er Sheva, Israel 3 Oncology Department, Radiation Therapy Unit, Hadassah – Hebrew University Medical Center, Israel 4 College of Medicine, Department of Radiation Oncology, Department of Medical Imaging, The University of Arizona, Tucson, AZ 85724 USA ∗ These authors contributed equally † Current address: Gerald Bronfman Department of Oncology, Faculty of Medicine and Health Sciences, McGill University, Montreal, Quebec, Canada ‡ Authors to whom correspondence should be addressed. Lior Arazi: larazi@bgu.ac.il, Tomer Cooks: cooks@bgu.ac.il Abstract Background: Diffusing alpha-emitters radiation therapy (“Alpha-DaRT”) is a new method for treating solid tumors with alpha particles, relying on the release of the short-lived alpha-emitting daughter atoms of radium-224 from interstitial sources inserted into the tumor. Alpha-DaRT tumor dosimetry is governed by the spread of radium’s progeny around the source, as described by an approximate framework called the “diffusion-leakage model”. The most important model parameters are the diffusion lengths of radon-220 and lead-212, and their estimation is therefore essential for treatment planning. Purpose: Previous works have provided initial estimates for the dominant diffusion length, by measuring the activity spread inside mice-borne tumors several days after the insertion of an Alpha-DaRT source. The measurements, taken when lead-212 was in secular equilibrium with radium-224, were interpreted as representing the lead-212 diffusion length. The aim of this work is to provide first experimental estimates for the diffusion length of radon-220, using a new methodology. Methods: The diffusion length of radon-220 was estimated from autoradiography measurements of histological sections taken from 24 mice-borne subcutaneous tumors 1" 2401.08474v1,"1 TUMTraf Event: Calibration and Fusion Resulting in a Dataset for Roadside Event-Based and RGB Cameras Christian Creß ⋆ ID Walter Zimmer ID Nils Purschke Venkatnarayanan Lakshminarasimhan Leah Strand Abstract—Event-based cameras are predestined for Intelligent Transportation Systems (ITS). They provide very high temporal resolution and dynamic range, which can eliminate motion blur and make objects easier to recognize at night. However, event-based images lack color and texture compared to images from a conventional rgb camera. Considering that, data fusion between event-based and conventional cameras can combine the strengths of both modalities. For this purpose, extrinsic calibration is necessary. To the best of our knowledge, no targetless calibration between event-based and rgb cameras can handle multiple moving objects, nor data fusion optimized for the domain of roadside ITS exists, nor synchronized event-based and rgb camera datasets in the field of ITS are known. To fill these research gaps, based on our previous work, we extend our targetless calibration approach with clustering methods to handle multiple moving objects. Furthermore, we develop an early fusion, simple late fusion, and a novel spatiotemporal late fusion method. Lastly, we publish the TUMTraf Event Dataset, which contains more than 4k synchronized event-based and rgb images with 21.9k labeled 2D boxes. During our extensive experiments, we verified the effectiveness of our calibration method with multiple moving objects. Furthermore, compared to a single rgb camera, we increased the detection performance of up to +16% mAP in the day and up to +12% mAP in the challenging night with our presented event-based sensor fusion methods. The TUMTraf Event Dataset is available at https://innovationmobility.com/tumtraf-dataset. Index Terms—Event-Based Cameras, RGB Cameras, Sensor Fusion, Targetless Calibration, Multi-modal Dataset, Intelligent Transportation Systems I. I NTRODUCTION The principle of event-based cameras is the recognition of changes in the brightness of each pixel asynchronously. This technique results in a very high temporal resolution and a very high dynamic range [1], [2]. Therefore, an event-based camera is predestined for Intelligent Transportation Systems (ITS). Even in difficult visibility conditions, these systems require robust and accurate perception of traffic participants. Here, event-based cameras can achieve significant improvements, e.g., at night, with unclear visibility or even fast-moving objects, leading to motion blur when using conventional cameras. However, the disadvantages of these novel sensors are the lack All authors are with the Chair of Robotics, Artificial Intelligence and Realtime Systems, TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany. E-mail: christian.cress@tum.de, knoll@in.tum.de ⋆ Corresponding author. Bach Ngoc Doan Alois C. Knoll ID Event-based camera RGB camera Sensor fusion Sensor source: eb and rgb eb rgb Fig. 1: This figure shows the sensor fusion between eventbased and rgb cameras and its impact during a sunny day and a night in slet. The blue bounding boxes in the event-based respectively rgb camera represent detections in the sensor. In the sensor fusion component, a green bounding box indicates that the object was detected in the event-based and the rgb camera. However, a blue bounding box indicates an object detection exclusively in the rgb camera, and a red bounding box exclusively in the event-based camera (not available here). As soon as objects have been detected in several frames, a unique track ID is assigned. of color and texture information compared to conventional cameras and the fact that the event-based camera only detects moving objects. An optimized combination of roadside eventbased and conventional rgb cameras offers advantages from both modalities. So far, ITS perception mainly relies on conventional cameras, Radars, and Lidars. Event-based cameras are yet to be widespread but are slowly being established there [3]. For this reason, an investigation into calibration, detection, and data fusion between roadside event-based and conventional cameras is necessary. Detection and tracking with a stationary event-based camera mounted on roadside ITS was performed for the first time we know by [4]. Here, clustering and tracking methods achieved sufficient performance. In addition, [5] used a stationary eventbased camera for pedestrian detection with a convolutional" 2401.08496v1,"On the efficiency of an autonomous dynamic Szilard engine operating on a single active particle Luca Cocconi 1, ∗ and Letian Chen 2 1 Max Planck Institute for Dynamics and Self-Organization, Göttingen 37073, Germany 2 Department of Mathematics and Centre of Complexity Science, Imperial College London, South Kensington, London SW7 2BZ, United Kingdom (Dated: January 17, 2024) The Szilard engine stands as a compelling illustration of the intricate interplay between information and thermodynamics. While at thermodynamic equilibrium, the apparent breach of the second law of thermodynamics was reconciled by Landauer and Bennett’s insights into memory writing and erasure, recent extensions of these concepts into regimes featuring active fluctuations have unveiled the prospect of exceeding Landauer’s bound, capitalizing on information to divert free energy from dissipation towards useful work. To explore this question further, we investigate an autonomous dynamic Szilard engine, addressing the thermodynamic consistency of work extraction and measurement costs by extending the phase space to incorporate an auxiliary system, which plays the role of an explicit measurement device. The nonreciprocal coupling between active particle and measurement device introduces a feedback control loop, and the cost of measurement is quantified through excess entropy production. The study considers different measurement scenarios, highlighting the role of measurement precision in determining engine efficiency. I. INTRODUCTION Starting with Maxwell’s seminal Gedankenexperiment, in which the existence of an entity capable of sorting individual molecules according to their velocity would seemingly lead to a violation of the second law of thermodynamics [1], the physical nature of information and its interplay with thermodynamics has undergone much scrutiny. This interplay finds its most vivid illustration in another thought experiment, this time concocted by Szilard [2]. In Szilard’s engine, a partition is inserted at the mid-plane of a box containing a single gas particle upon a binary measurement of the position of the particle relative to the midplane. The volume of the empty half of the box is then reduced at no energetic cost, resulting, once the partition is removed, in an increase in free energy of the one-particle gas which is subsequently converted into up to k B T ln 2 Joules of useful work via isothermal expansion. Later work by Landauer and Bennet [3, 4] offered a resolution to the seeming paradox by noting that, particularly when operated cyclically, all such information engines rely on the writing onto, storing in and eventual erasure from physical memory, thus demanding irreversible manipulations which are bound to generate entropy as a by-product. In short, thermodynamic consistency is recovered upon expanding the phase space to include the daemon itself [5–10]. Theoretical efforts to clarify where precisely dissipation occurs continue to this day [11–14], in part stimulated by experimental work [15–18]. The traditional Szilard engine, in its various implementations, is assumed to operate on systems coupled to an equilibrium thermal reservoir and it is indeed the ∗ luca.cocconi@ds.mpg.de measurement-mediated rectification of thermal fluctuations induced by this coupling that renders work extraction possible. It is thus natural to wonder how such an engine would perform when allowed to operate on out-of-equilibrium processes, e.g. active particles, which are subject to non-negligible active fluctuations with macroscopic persistence times. Remarkably, as demonstrated in recent theoretical [19] and experimental [16] works, such activity allows for the violation of Landauer’s bound, potentially granting access to efficiencies far exceeding the equilibrium limit. Qualitatively, this can be understood as a consequence of information being used in this case to redirect part of the free energy that would otherwise be dissipated as heat (i.e. entropy production) into useful work, rather than to extract the latter directly from the heat bath. In particular, the authors of Ref. [19] introduced a hypothetical dynamic Szilard engine which, rather than operating in a quasi-static regime, exploits the finite correlation time of the velocity of an active Brownian particle (ABP). Their protocol consists of repeatedly measuring the particle’s position and direction of motion, subsequently placing a piston that will exert a force opposite to the active self-propulsion, eventually resulting in positive work against the former. The cost of measurement is estimated as M ≃ −k B T ln(δ/2) by analogy with the thermal case, with δ the precision error of the position measurement normalized by the system size. A unified stochastic thermodynamic treatment encompassing the quantification of both work extraction and measurement costs in such active information engines in the spirit of Refs. [5–10], however, is yet to be established. Here, we develop such a treatment by studying a minimal Szilard engine operating autonomously on a single run-and-tumble (RnT) particle in one dimension, as" 2401.08508v1,"EmoLLMs: A Series of Emotional Large Language Models and Annotation Tools for Comprehensive Affective Analysis Zhiwei Liu 1 , Kailai Yang 1 , Tianlin Zhang 1 , Qianqian Xie 1∗ , Zeping Yu 1 , Sophia Ananiadou 1 1 The University of Manchester {zhiwei.liu-2, kailai.yang, tianlin.zhang, zeping.yu}@postgrad.manchester.ac.uk, xqq.sincere@gmail.com, sophia.ananiadou@manchester.ac.uk Abstract Sentiment analysis and emotion detection are important research topics in natural language processing (NLP) and benefit many downstream tasks. With the widespread application of large language models (LLMs), researchers have started exploring the application of LLMs based on instructiontuning in the field of sentiment analysis. However, these models only focus on single aspects of affective classification tasks (e.g. sentimental polarity or categorical emotions), and overlook the regression tasks (e.g. sentiment strength or emotion intensity), which leads to poor performance in downstream tasks. The main reason is the lack of comprehensive affective instruction tuning datasets and evaluation benchmarks, which cover various affective classification and regression tasks. Moreover, although emotional information is useful for downstream tasks, existing downstream datasets lack high-quality and comprehensive affective annotations. In this paper, we propose EmoLLMs, the first series of open-sourced instruction-following LLMs for comprehensive affective analysis based on finetuning various LLMs with instruction data, the first multi-task affective analysis instruction dataset (AAID) with 234K data samples based on 3 classification tasks and 2 regression tasks to support LLM instruction tuning, and a comprehensive affective evaluation benchmark (AEB) with 8 regression tasks and 6 classification tasks from various sources and domains to test the generalization ability of LLMs. We propose a series of EmoLLMs by fine-tuning LLMs with AAID to solve various affective instruction tasks. We compare our model with a variety of LLMs and sentiment analysis tools on AEB, where our models outperform all other open-sourced LLMs and sentiment analysis tools, and surpass ChatGPT and GPT-4 in most tasks, which shows that the series of EmoLLMs achieve the ChatGPT-level and GPT-4-level gen- ∗ Corresponding author. Qianqian is now affiliated with Yale University. The work was done while she was at The University of Manchester. eralization capabilities on affective analysis tasks, and demonstrates our models can be used as affective annotation tools. The project will be available at https://github.com/lzw108/EmoLLMs/. 1 Introduction Emotions and sentiments play a crucial role in shaping our lives. Our words and actions serve as indicators of our emotional states [Liu, 2020]. Leveraging natural language processing (NLP) techniques such as Emotion Detection (ED) and Sentiment Analysis (SA), we can delve into the analysis of human interactions, enabling us to comprehend people’s emotional responses toward particular subjects [Hakak et al., 2017]. Specifically, SA tasks typically involve predicting the polarity (usually positive, negative, or neutral), along with the strength of this tone [Thelwall et al., 2010], and emotion detection tasks often involve classifying data into fine-grained emotion categories (e.g. Ekman [Ekman, 1992], Plutchik [Plutchik, 1980]) or predicting the intensity of emotions [Xie et al., 2018]. These affective information are proven as useful features for many downstream tasks, including mental health analysis [Zhang et al., 2023b], misinformation detection [Liu et al., 2023], and empathetic dialogue systems [Ma et al., 2020]. Pre-trained language models (PLMs) such as BERT [Devlin et al., 2018] and RoBERTa [Liu et al., 2019], have shown excellent performance in classification tasks. Many studies have applied them to sentiment analysis or emotion detection tasks [Bello et al., 2023; Liao et al., 2021; Yin et al., 2020]. However, these PLMs are limited by the scale of model parameters and the training corpus, resulting in a lack of comprehensive understanding and generalization ability for complex tasks [Zhang et al., 2023a], which restricts the effectiveness of affective analysis, especially in affective regression tasks [Zhang et al., 2020]. Compared to PLMs, LLMs have the characteristic of having an enormous parameter size, typically reaching hundreds of billions or more, which gives them stronger generalization abilities in downstream tasks and enables them to handle tasks with intricate complexities [Zhang et al., 2023c]. Many researchers have started exploring the application of LLMs in the field of sentiment analysis, which achieved excellent performance by fine-tuning open-source LLMs on sentiment" 2401.08522v1,"Video Quality Assessment Based on Swin TransformerV2 and Coarse to Fine Strategy Zihao Yu ∗ , Fengbin Guan ∗ , Yiting Lu ∗ , Xin Li ∗ , and Zhibo Chen ∗ ∗ University of Science and Technology of China Hefei, Anhui, China {yuzihao,guanfb,luyt31415,lixin666}@mail.ustc.edu.cn, chenzhibo@ustc.edu.cn Abstract The objective of non-reference video quality assessment is to evaluate the quality of distorted video without access to reference high-definition references. In this study, we introduce an enhanced spatial perception module, pre-trained on multiple image quality assessment datasets, and a lightweight temporal fusion module to address the no-reference visual quality assessment (NR-VQA) task. This model implements Swin Transformer V2 as a local-level spatial feature extractor and fuses these multi-stage representations through a series of transformer layers. Furthermore, a temporal transformer is utilized for spatiotemporal feature fusion across the video. To accommodate compressed videos of varying bitrates, we incorporate a coarse-to-fine contrastive strategy to enrich the model’s capability to discriminate features from videos of different bitrates. This is an expanded version of the one-page abstract. Introduction With the increase in video resolution, the necessity to process high-resolution video has become paramount. To address this issue, we employ Swin TransformerV2[1] for spatial perception. The advantage of Swin TransformerV2 lies in its ability to efficiently process large-scale data while maintaining computational efficiency. However, videos with different compression bitrates may pose challenges to the model’s distinguishable capabilities. For compression distortion, we propose a coarse-to-fine contrastive strategy to equip the model with the ability to handle compressed videos of varying bitrates. From the global perspective, we introduce a group contrastive loss[2]. This loss function empowers the model to coarsely discern differences in videos when processing different bitrates. However, group contrast loss may cause the model to lack sufficient discriminative ability when processing videos with the same bitrate. To mitigate this issue, from the local perspective, we introduce rank loss. By employing rank loss, we can ensure that the model retains good discriminative ability when processing videos within the same bitrate. Methodology In this section, we delineate our proposed model as illustrated in Fig. 1, a Nonreference Video Quality Assessment (NR-VQA) method comprising an enhanced spatial perception module and a lightweight temporal fusion module, equipped with coarse-to-fine contrastive strategy. © 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works." 2401.08544v1,"N-Adaptive Ritz Method: A Neural Network Enriched Partition of Unity for Boundary Value Problems Jonghyuk Baek 1,2 , Yanran Wang 1 , and J. S. Chen 1* 1 Department of Structural Engineering, University of California, San Diego, La Jolla, CA 92093, USA 2 Coreform, LLC, Orem, UT 84097, USA Abstract Conventional finite element methods are known to be tedious in adaptive refinements due to their conformal regularity requirements. Further, the enrichment functions for adaptive refinements are often not readily available in general applications. This work introduces a novel neural network-enriched Partition of Unity (NN-PU) approach for solving boundary value problems via artificial neural networks with a potential energy-based loss function minimization. The flexibility and adaptivity of the NN function space are utilized to capture complex solution patterns that the conventional Galerkin methods fail to capture. The NN enrichment is constructed by combining pre-trained feature-encoded NN blocks with an additional untrained NN block. The pre-trained NN blocks learn specific local features during the offline stage, enabling efficient enrichment of the approximation space during the online stage through the Ritz-type energy minimization. The NN enrichment is introduced under the Partition of Unity (PU) framework, ensuring convergence of the proposed method. The proposed NN-PU approximation and feature-encoded transfer learning forms an adaptive approximation framework, termed the neural-refinement (n- refinement), for solving boundary value problems. Demonstrated by solving various elasticity problems, the proposed method offers accurate solutions while notably reducing the computational cost compared to the conventional adaptive refinement in the mesh- based methods. * Corresponding author. E-mail address: jsc137@ucsd.edu (J.S. Chen)." 2401.08553v1,"January 2024 FMB: a Functional Manipulation Benchmark for Generalizable Robotic Learning Jianlan Luo 1* , Charles Xu 1* , Fangchen Liu 1 , Liam Tan 1 , Zipeng Lin 1 , Jeffrey Wu 1 , Pieter Abbeel 1 and Sergey Levine 1 * Equal Contribution, 1 Department of Electric Engineering and Computer Science, University of California, Berkeley, USA In this paper, we propose a real-world benchmark for studying robotic learning in the context of functional manipulation: a robot needs to accomplish complex long-horizon behaviors by composing individual manipulation skills in functionally relevant ways. The core design principles of our Functional Manipulation Benchmark (FMB) emphasize a harmonious balance between complexity and accessibility. Tasks are deliberately scoped to be narrow, ensuring that models and datasets of manageable scale can be utilized effectively to track progress. Simultaneously, they are diverse enough to pose a significant generalization challenge. Furthermore, the benchmark is designed to be easily replicable, encompassing all essential hardware and software components. To achieve this goal, FMB consists of a variety of 3D-printed objects designed for easy and accurate replication by other researchers. The objects are procedurally generated, providing a principled framework to study generalization in a controlled fashion. We focus on fundamental manipulation skills, including grasping, repositioning, and a range of assembly behaviors. The FMB can be used to evaluate methods for acquiring individual skills, as well as methods for effectively combining and ordering such skills in order to solve complex, multi-stage manipulation tasks. We also offer an imitation learning framework that includes a suite of policies trained to solve the proposed tasks. This enables researchers to utilize our tasks as a versatile toolkit for examining various parts of the pipeline. For example, researchers could propose a better design for a grasping controller and evaluate it in combination with our baseline reorientation and assembly policies as part of a pipeline for solving multi-stage tasks. Our dataset, object CAD files, code, and evaluation videos can be found on our project website: https://functional-manipulation-benchmark.github.io. Keywords: manipulation, imitation learning, benchmarking 1. Introduction Manipulation is one of the foundational problems in robotics research, but enabling robots to perform dexterous manipulation skills that reflect the capabilities of humans is still out of reach. In fact, even matching the performance of human teleoperation remains a major challenge, particularly in environments that require generalization and are not constrained to a specific fixed set of well-characterized objects. As Cui and Trinkle (2021) point out, two primary difficulties in robotic manipulation lie in intelligently handling complex contact dynamics and the variability in the environment and objects. Robotic learning techniques hold the potential to address these challenges. However, making effective and measurable progress will require a comprehensive and accessible framework to offer essential components: sufficiently challenging tasks of practical relevance, reasonable amounts of high-quality data, an easy-to-reproduce setup, a collection of relevant methods providing baseline results, and thorough analysis of the experimental findings on the proposed tasks. While significant recent research in robotic learning has made progress on various aspects of the manipulation problem (Levine et al., 2016; Kalashnikov et al., 2018; Brohan et al., 2023; Zeng et al., 2021; Xu et al., 2022; Hopcroft et al., 1991; Gu et al., 2017; Peters and Schaal, 2008; Buchli et al., 2011; Abbeel et al., 2006; Salehian and Billard, 2018; Mahler et al., 2017), much of the emphasis in recent works have either been on broad generalization with relatively simple tasks, which often do not capture the many physical challenges of manipulation (e.g., focusing on picking or imprecise pick-and-place tasks) (Pinto and Gupta, 2016; Levine et al., 2018; Ebert et al., 2022), or else training policies for narrow tasks that are physically more complex but do not require extensive generalization (OpenAI et al., 2019; Kimble et al., 2020a; Vecerik et al., 2019; Hu et al., 2023). This is not unreasonable: it is very difficult to simultaneously make progress on broad generalization (which often requires huge datasets) and tackle the Corresponding author(s): Jianlan Luo, Berkeley AI Research Lab (BAIR), University of California, Berkeley, 2121 Berkeley Way West, Berkeley, CA, 94704, USA jianlanluo@eecs.berkeley.edu" 2401.08557v2,"THE BROWNIAN SPATIAL COALESCENT PETER KOEPERNIK 1,2 1 Department of Statistics, University of Oxford, 24–29 St Giles’, Oxford, OX1 3LB, United Kingdom Abstract. We introduce the Brownian spatial coalescent, a class of Markov spatial coalescent processes on the d-dimensional torus in continuous space, that is axiomatically defined by the following property: conditional on the times and locations of all coalescence events, lineages follow independent Brownian bridges backwards in time along the branches of the coalescence tree. We prove that a Brownian spatial coalescent is characterised by a set of finite transition measures on the torus, in analogy to the transition rates that characterise a non-spatial coalescent. We prove that a Brownian spatial coalescent is sampling consistent, in a novel sense, if and only if all transition measures are constant multiples of Lebesgue measure, and the multiples are the transition rates of a Ξ-coalescent, or a Λ-coalescent if simultaneous mergers are not allowed. This defines the Brownian spatial Ξ-coalescent, which we prove describes the genealogies of the Ξ-Fleming-Viot process—a generalisation of the well known Fleming-Viot process—at stationarity, and in fact describes its full time reversal if augmented with “resampling” steps at the times of coalescence events. An important consequence of our results is that all spatial population models in which individuals follow independent Brownian motions and the branching mechanism depends non-trivially on the spatial distribution, for example through local regulation, have non-Markovian genealogies. Byproducts of our results include explicit formulas for samples from the stationary distribution of a Ξ-Fleming-Viot process, Wright-Malecot type formulas, and a representation of the backward dynamics of lineages in terms of Brownian motions with coupled drift. This includes calculations of the drift that leads to multiple or even simultaneous mergers in any dimension. 1. Introduction Coalescent processes arise when describing the genealogies (family relations) of a biological population model by tracing the ancestries of a sample from the population backwards in time. If the population is haploid, which means that every individual has exactly one parent, then every individual has a single ancestral lineage going backwards in time, and the lineages associated with a set of individuals coalesce when their common ancestor is E-mail address: peter.koepernik@stats.ox.ac.uk. Date: 16 January 2024. 2010 Mathematics Subject Classification. Primary 60J90, 60J25, 92D25; Secondary 60K35, 60J80, 60J68. Key words and phrases. Structured coalescent, genealogical process, spatial population models, Fleming- Viot process, Brownian motion, Ξ-coalescent, superprocess. 2 The author has benefitted while working on this article from an EPSRC grant EP/W523781/1. 1" 2401.08564v1,"ADVENT: Attack/Anomaly Detection in VANETs Hamideh Baharlouei 1,* , Tokunbo Makanju 2 , and Nur Zincir-Heywood 1 1 Computer Science, Dalhousie University, Halifax, NS, Canada. 2 New York Institute of Technology - Vancouver Campus, Vancouver, BC, Canada. * Corresponding author(s). E-mail(s): hm729953@dal.ca Contributing author(s): amakanju@nyit.edu; zincir@dal.ca January 17, 2024 Abstract In the domain of Vehicular Ad hoc Networks (VANETs), where the imperative of having a real-world malicious detector capable of detecting attacks in real-time and unveiling their perpetrators is crucial, our study introduces a system with this goal. This system is designed for real-time detection of malicious behavior, addressing the critical need to first identify the onset of attacks and subsequently the responsible actors. Prior work in this area have never addressed both requirements, which we believe are necessary for real world deployment, simultaneously. By seamlessly integrating statistical and machine learning techniques, the proposed system prioritizes simplicity and efficiency. It excels in swiftly detecting attack onsets with a remarkable F1-score of 99.66%, subsequently identifying malicious vehicles with an average F1-score of approximately 97.85%. Incorporating federated learning in both stages enhances privacy and improves the efficiency of malicious node detection, effectively reducing the false negative rate. Keywords:VANET, Anomaly Detection, Malicious Behaviour Detection, Machine Learning, Federated Learning, and Privacy. 1 Introduction Vehicular Ad hoc Networks (VANETs) as a specific type of mobile ad-hoc networks (MANET) are commonly associated with transportation systems with three main channels: vehicle-to-vehicle (V2V), vehicle-to-roadside (V2R), and 1" 2401.08567v1,"Published as a conference paper at ICLR 2024 Connect, Collapse, Corrupt: L EARNING C ROSS -M ODAL T ASKS WITH U NI -M ODAL D ATA Yuhui Zhang ∗ , Elaine Sui ∗ , Serena Yeung-Levy Stanford University {yuhuiz, esui, syyeung}@cs.stanford.edu A BSTRACT Building cross-modal applications is challenging due to limited paired multimodal data. Recent works have shown that leveraging a pre-trained multi-modal contrastive representation space enables cross-modal tasks to be learned from unimodal data. This is based on the assumption that contrastive optimization makes embeddings from different modalities interchangeable. However, this assumption is under-explored due to the poorly understood geometry of the multi-modal contrastive space, where a modality gap exists. In our study, we provide a theoretical explanation of this space’s geometry and introduce a three-step method, C 3 (Connect, Collapse, Corrupt), to bridge the modality gap, enhancing the interchangeability of embeddings. Our C 3 method significantly improves cross-modal learning from uni-modal data, achieving state-of-the-art results on zero-shot image / audio / video captioning and text-to-image generation. 1 I NTRODUCTION Building cross-modal applications often face a critical challenge: the scarcity of paired multi-modal data. Largex scale multi-modal contrastive learning has emerged as a ② f 𝒳 ② e x promising approach to address this gap. Pioneering works ② ② like CLIP (Radford et al., 2021) and ImageBind (Girdhar cute g cat y ̂ et al., 2023) offer publicly available representation spaces ① ① learned from contrasting millions of web-based images cute f 𝒴 ① e y cat ① and texts. These spaces that align embeddings of cony cepts across different modalities pave the way for leveraging abundant uni-modal data in cross-modal tasks. For ① Uni-modal Training instance, instead of training an image captioning system on ② Cross-modal Evaluation image embeddings, one could train it on caption embeddings. Likewise, text-to-image generation models can uti- Figure 1: Interchangeable use of emlize image embeddings as opposed to text. During cross- beddings enables learning cross-modal modal inference, embeddings from the other modality are tasks with uni-modal data. simply input into the model (Figure 1). Notably, this approach has achieved impressive results in image captioning (Li et al., 2023; Tam et al., 2023; Nukrai et al., 2022) and text-to-image generation (Zhou et al., 2022c;a;b), eliminating the need for multimodal paired data. This aforementioned process is based on the hypothesis that image embeddings and text embeddings can be used interchangeably in the multi-modal representation space. However, the validity of this assumption is not well understood. Recent works reveal that the resulting geometry from multi-modal contrastive learning is nontrivial — corresponding image and text embeddings do not necessarily collapse to the same points in the space. Instead, there is a significant gap between embeddings from different modalities, potentially hindering the direct interchangeable use of image and text embeddings (Liang et al., 2022; Zhang et al., 2023). The lack of comprehension of the resulting geometry from contrastive learning makes it challenging to design methods to leverage this representation space and learn cross-modal tasks from uni-modal data. ∗ Equal contribution. Project page available at https://yuhui-zh15.github.io/C3-Website/. 1 Modality 1 Embedding e x − e y = c ⊥ + ϵ Modality 2 Embedding cu ca e y 1" 2401.08573v2,"Benchmarking the Robustness of Image Watermarks Bang An ∗1 , Mucong Ding ∗1 , Tahseen Rabbani ∗1 , Aakriti Agrawal 1 , Yuancheng Xu 1 , Chenghao Deng 1 , Sicheng Zhu 1 , Abdirisak Mohamed 1,2 , Yuxin Wen 1 , Tom Goldstein 1 , Furong Huang 1 1 University of Maryland, 2 SAP Labs, LLC. {bangan,mcding,trabbani,agrawal5,ycxu,dengch16,sczhu,amoham70,ywen,tomg,furongh}@umd.edu Abstract This paper investigates the weaknesses of image watermarking techniques. We present WAVES (Watermark Analysis via Enhanced Stress-testing), a novel benchmark for assessing watermark robustness, overcoming the limitations of current evaluation methods. WAVES integrates detection and identification tasks and establishes a standardized evaluation protocol comprised of a diverse range of stress tests. The attacks in WAVES range from traditional image distortions to advanced and novel variations of diffusive, and adversarial attacks. Our evaluation examines two pivotal dimensions: the degree of image quality degradation and the efficacy of watermark detection after attacks. We develop a series of Performance vs. Quality 2D plots, varying over several prominent image similarity metrics, which are then aggregated in a heuristically novel manner to paint an overall picture of watermark robustness and attack potency. Our comprehensive evaluation reveals previously undetected vulnerabilities of several modern watermarking algorithms. We envision WAVES as a toolkit for the future development of robust watermarking systems. The project is available at https://wavesbench.github.io/. 1 Introduction Recent and pivotal advancements in text-to-image diffusion models (Dhariwal and Nichol, 2021, Ho et al., 2020, Rombach et al., 2022) have garnered the attention of the AI community and the general public. Open-source models such as Stable Diffusion and proprietary models such as the Dall·E family and Midjourney have enabled users to produce images that are of human-produced quality. Consequently, there has been a strong push in AI/ML community to develop reliable algorithms for detecting AI-generated content and determining its source (Executive Office of the President, 2023). One avenue for maintaining the provenance of generative content is by embedding watermarks. A watermark is a signal encoded onto an image to signify its source or ownership (Al-Haj, 2007, Fernandez et al., 2023, Tancik et al., 2020, Wen et al., 2023, Zhang et al., 2019, Zhu et al., 2018). To avoid degradation of image quality, an invisible watermark is desired. Many such watermarks are robust to common image manipulations (Fernandez et al., 2023, Lukas et al., 2023, Wen et al., 2023, Zhao et al., 2023a), and adversarial efforts to remove the watermark are complicated by the difficulty of decoding/extracting the message without private knowledge of the watermarking scheme (Fernandez et al., 2023, Tancik et al., 2020). Despite this difficulty, various watermark removal schemes can still be effective (Saberi et al., 2023, Zhao et al., 2023a). However, a lack of standardized evaluations in existing literature (i.e., inconsistent image quality measures, statistical parameters, and types of attacks) has resulted in an incomplete picture of the vulnerabilities and robustness of these algorithms in the real world. In this work, we present WAVES (Watermark Analysis via Enhanced Stress-testing), a novel benchmark for assessing watermark robustness, overcoming the limitations of current evaluation methods. ∗ Co-first-authors with equal contribution. First authors are ordered alphabetically. 1" 2401.08588v1,"Improved Pothole Detection Using YOLOv7 and ESRGAN Nirmal Kumar Rout, Gyanateet Dutta, Varun Sinha, Arghadeep Dey, Subhrangshu Mukherjee, Gopal Gupta Abstract— Potholes are common road hazards that is causing damage to vehicles and posing a safety risk to drivers. The introduction of Convolutional Neural Networks (CNNs) is widely used in the industry for object detection based on Deep Learning methods and has achieved significant progress in hardware improvement and software implementations. In this paper, a unique better algorithm is proposed to warrant the use of low-resolution cameras or low-resolution images and video feed for automatic pothole detection using Super Resolution (SR) through Super Resolution Generative Adversarial Networks (SRGANs). Then we have proceeded to establish a baseline pothole detection performance on low quality and high quality dashcam images using a You Only Look Once (YOLO) network, namely the YOLOv7 network. We then have illustrated and examined the speed and accuracy gained above the benchmark after having upscaling implementation on the low quality images. Index Terms- CNN, Deep Learning, Pothole Detection, YOLOv7, ESRGAN, Transfer Learning.  1 I NTRODUCTION P OTHOLES are a major issue on roads worldwide, causing damage to vehicles and posing a safety risk to drivers. Automated pothole detection systems can help to identify and repair potholes more efficiently, but the use of low-resolution cameras or low-quality video feed can be a challenge. In this paper, we propose a novel approach for improving the performance of pothole detection using low-resolution cameras or low-quality images and video feed. Our approach involves using an Enhanced Super Resolution Generative Adversarial Networks (ESRGAN) [1] to enhance the resolution of lowquality images and video feed, and then applying the You Only Look Once(YOLOv7) [2] object detection algorithm to detect potholes in the enhanced images. We compare the speed and accuracy of our approach to a baseline pothole detection system using YOLOv7 on high-quality images and show that it provides a significant improvement in both areas. We also demonstrate that our approach can be applied to a range of different road conditions and pothole types. One of the major advantages of our approach is its cost-effectiveness. ESRGAN can be used to improve the resolution of low-quality images and video feed from low-cost cameras, rather than requiring the use of high-resolution cameras with expensive sensors. This can greatly reduce the cost of implementing pothole detection systems, especially in resource-constrained settings. To validate the effectiveness of our approach, we conduct a series of experiments on a medium sized dataset of dash-cam images and video feed from a variety of international locations which indicate real life scenarios. Our results show that use of ESRGAN and YOLOv7 can significantly improve the performance of pothole detection systems and provide a reliable solution for detecting potholes in low-resolution images and video feed. This has the potential to greatly enhance the efficiency and effectiveness of pothole repair efforts and improve road safety for drivers worldwide.   Nirmal Kumar Rout is with School of Electronics Engineering, KIIT University, Bhubaneswar, India. Email: nkrout@kiit.ac.in. Gyanateet Dutta, Varun Sinha, Subhrangshu Mukherjee, Arghadeep Dey, Gopal Gupta are with School of Electronics Engineering, KIIT University, Bhubaneswar, India. E-mail: {1930198, 1930055, 1930053, 1930069, 1930020} @kiit.ac.in. 2 R ELATED W ORKS A number of approaches have been proposed in the literature for automated pothole detection. The earlier approaches [3] required 3-D equipment which can be very expensive and not suitable for use for all purposes. These techniques frequently use image data taken by digital cameras [4, 5] and depth cameras, thermal technology, and lasers. Recent approaches rely on machine learning algorithms and deep learning algorithms for image processing and detect potholes. Techniques based on Convolutional-neural-networks (CNN) are widely used for feature extraction of potholes from images because they can accurately model the non-linear patterns and perform automatic feature extraction and their robustness in separating unecessary noise and other image conditions in road images [6]. Even though, CNNs have been used in many approaches [7, 8, 9] they are ineffective in certain scenarios like while detecting objects which are smaller relative to the image. This can be solved by using high resolution images for detection but then the computational cost required for processing is too high, reason being CNNs are very memory consuming and they also require significantly high computation time. For addressing this issue, Chen et al. [10] suggested to using smaller input images or image patches from HR images for training the network. The first method is a two-phase system where a localization network (LCNN) is employed initially for locating frame segment of pothole in the image and then using a network for classification developed on part (PCNN) to calculate the classes. A recent study by Salcedo et al. [11] developed a road maintenance prioritization system for India using deep learning models such as UNet, which incorporates ResNet34 as the encoder, EfficientNet, and YOLOv5 on the Indian driving dataset(IDD). The study by Silva et al. [11], employed the YOLOv4 to detect damage on roads on a dataset of images taken from overhead view of an airborne drone. The study experimentally evaluated the accuracy and applicability of YOLOv4 in subject to recognizing highway road damages, and found an accuracy of 95%. The work proposed by Mohammad et al. [12] comprised of a system of using an edge platform using the AI kit(OAK-D) on frameworks such as the YOLOv1, YOLOv2, YOLOv3, YOLOv4, Tiny-YOLOv5, and SSD - mobilenet V2. In the work Anup et al. [13] proposed a 1D Convolutional Neural" 2401.08629v1,"Arxiv preprint Immature Green Apple Detection and Sizing in Commercial Orchards using YOLOv8 and Shape Fitting Techniques Ranjan Sapkota 1 , Dawood Ahmed 1 , Martin Churuvija 1 and Manoj Karkee 1 1 Center for Precision and Automated Agricultural Systems, Washington State University, 24106 N Bunn Rd, Prosser, 99350, Washington, USA ABSTRACT Detecting and estimating size of apples during the early stages of growth is crucial for predicting yield, pest management, and making informed decisions related to crop-load management, harvest and post-harvest logistics, and marketing. Traditional fruit size measurement methods are laborious and timeconsuming. This study employs the state-of-the-art YOLOv8 object detection and instance segmentation algorithm in conjunction with geometric shape fitting techniques on 3D point cloud data to accurately determine the size of immature green apples (or fruitlet) in a commercial orchard environment. The methodology utilized two RGB-D sensors: the Intel RealSense D435i and the Microsoft Azure Kinect DK. Notably, the YOLOv8 instance segmentation models exhibited proficiency in immature green apple detection, with the YOLOv8m-seg model clinching the highest AP@0.5 and AP@0.75 scores of 0.94 and 0.91, respectively. Leveraging the ellipsoid fitting technique on images from the Azure Kinect, we observed remarkable metrics, including an RMSE of 2.35, MAE of 1.66, MAPE of 6.15, and an R-squared value of 0.9. Challenges such as partial occlusion, where YOLOv8 sometimes misinterpreted immature green apple clusters, were recognized. In a comparison of 102 outdoor samples, the Microsoft Azure Kinect showed better performance than the Intel Realsense D435i, as supported by the MAE data. This study emphasizes the combined effectiveness of shape-fitting methods and 3D sensors in improving fruitlet sizing for precision agriculture. Keywords: YOLOv8, deep learning, machine vision, automation, agriculture, fruit thinning I. INTRODUCTION Detecting and estimating size of apples during the early stages of growth is crucial for predicting yield and market, pest management, harvest and post-harvest logistics, and making informed decisions related to crop-load management [1]. Accurate size and number information during this stage enables farmers to strategize and prepare for harvest and post-harvest logistics including the workforce, equipment, and storage requirements [2]. Additionally, green fruit size serves as an indicator of tree health and vigor [3]. If the fruit does not attain its expected size during the growth stage, it could signify insufficient nutrients or pest infestation [4], [5]. By monitoring apple size and growth pattern, farmers can address these issues and improve crop production and quality to the desired level. Furthermore, accurate green fruit size estimates can help farmers predict future market reception of their crop. For instance, optimal size apples may go for higher prices than small or large apples. By knowing the size of green fruits, farmers can assess the tree's capacity to support the number of fruits and identify any potential problems that may be affecting the tree's ability to produce the desired yield of high-quality fruit [6] [7][8][9]. In the commercial production of tree fruit crops such as apples, farmers generally use hand tools such as measuring tape and specifically designed fruit sizer to measure fruit size [7]. However, these techniques are labor-intensive and timeconsuming, necessitating a considerable workforce in the orchard. Concurrently, commercial tree fruit growers have been grappling with labor shortages for the past two decades [8]. The COVID-19 pandemic has further exacerbated the labor shortage situation, posing a significant threat to global food security [9], [10]. Furthermore, hiring and training a seasonal or temporary workforce can be costly. Consequently, the tree fruit industry urgently requires alternatives to human labor [15]. The advancement in precision agriculture technologies, such as remote sensing, machine vision, and machine learning, opens the potential for development of non-destructive, rapid methods to detect fruitlet, estimate their size and predict crop yields [16]. 1" 2401.08631v1,"The Conquest of Quantum Genetic Algorithms: The Adventure to Cross the Valley of Death Rafael Lahoz-Beltra 1,2 1 Department of Biodiversity, Ecology and Evolution (Biomathematics), Faculty of Biological Sciences, Complutense University of Madrid, 28040 Madrid, Spain 2 Modeling, Data Analysis and Computational Tools for Biology Research Group, Complutense University of Madrid, 28040 Madrid, Spain * Address correspondence to: lahozraf@ucm.es Abstract In recent years, the emergence of the first quantum computers at a time when AI is undergoing a fruitful era has led many AI researchers to be tempted into adapting their algorithms to run on a quantum computer. However, in many cases the initial enthusiasm has ended in frustration, since the features and principles underlying quantum computing are very different from traditional computers. In this paper, we present a discussion of the difficulties arising when designing a quantum version of an evolutionary algorithm based on Darwin's evolutionary mechanism, the so-called genetic algorithms. The paper includes the code in both Python and QISKIT of the quantum version of one of these evolutionary algorithms allowing the reader to experience the setbacks arising when translating a classical algorithm to its quantum version. The algorithm studied in this paper, termed RQGA (Reduced Quantum Genetic Algorithm), has been chosen as an example that clearly shows these difficulties, which are common to other AI algorithms. Keywords IBM Quantum Computing, Quantum Artificial Intelligence, Quantum Computer, Quantum Genetic Algorithm, Qiskit, RQGA. 1. Introduction In recent years, the concurrence of the first quantum computers and the current advances in AI has led to many researchers to attempt the migration of these AI algorithms to a quantum computer. Since their early days, AI algorithms have been inspired by Nature, using principles both from human and animal learning and from the evolution of living beings. However, many of these bio-inspired principles that have been successfully emulated in classical computers, i.e. digital computers, are facing serious difficulties [1] when we try to deploy their counterparts in a quantum computer. During the 1940s and 1950s the concepts of intelligence and evolution were used interchangeably by scientists such as John von Neumann or Alan Turing. Over time, disciplines such as Artificial Intelligence, or later Artificial Life, adopted such concepts in a similar way as these scientists did after World War II. Moreover, today, the procedure Page 1 of 26" 2401.08634v1,"The final version of this paper has been accepted in IEEE Transactions on Information Forensics and Security, DOI:10.1109/TIFS.2023.3266699 Resilient Path Planning for UAVs in Data Collection under Adversarial Attacks Xueyuan Wang and M. Cenk Gursoy make the UAV path planning hard to perform: i) multiple practical constraints should be jointly considered; ii) there exists uncertainty in the information on the jammer; and iii) malicious jamming makes the environment time-varying and non-stationary, especially when intelligent and mobile jammers are considered. Motivated by these observations, this paper investigates the effective jamming-resilient policies to safeguard UAV-enabled data collection networks by designing the UAV trajectory under multiple practical constraints in adversarial settings. Abstract—In this paper, we investigate jamming-resilient UAV path planning strategies for data collection in Internet of Things (IoT) networks, in which the typical UAV can learn the optimal trajectory to elude such jamming attacks. Specifically, the typical UAV is required to collect data from multiple distributed IoT nodes under collision avoidance, mission completion deadline, and kinematic constraints in the presence of jamming attacks. We first design a fixed ground jammer with continuous jamming attack and periodical jamming attack strategies to jam the link between the typical UAV and IoT nodes. Defensive strategies involving a reinforcement learning (RL) based virtual jammer and the adoption of higher SINR thresholds are proposed to counteract against such attacks. Secondly, we design an intelligent UAV jammer, which utilizes the RL algorithm to choose actions based on its observation. Then, an intelligent UAV anti-jamming strategy is constructed to deal with such attacks, and the optimal trajectory of the typical UAV is obtained via dueling double deep Q-network (D3QN). Simulation results show that both non-intelligent and intelligent jamming attacks have significant influence on the UAV’s performance, and the proposed defense strategies can recover the performance close to that in no-jammer scenarios. A. Related Works Several studies have recently addressed ground jamming attacks in UAV-enabled networks. Particularly, in [9], a received signal strength based jammer localization algorithm is proposed to help the UAV plan its path. In [10], by exploiting the block coordinate descent (BCD) and successive convex approximation (SCA) techniques, an iterative algorithm was proposed to solve the anti-jamming three-dimensional UAV trajectory design problem. In [12], the authors considered multiple ground jammers in a multi-UAV path planning problem, and proposed two BCD based algorithms to obtain sub-optimal solutions with the aid of slack variables, SCA technique and S-procedure. In addition, the same method was constructed to solve the UAV path planning in a uplink communication system with turning and climbing angle constraints in [13]. The authors in [14] considered a UAV-enable relay network under malicious ground jamming attacks, BCD and SCA techniques were utilized to optimize the UAV trajectory and the transmit powers of both the UAV and the source node. In [15], by introducing the slack variables and leveraging the SCA technique, the authors designed a trajectory planning method to optimize the UAV’s 3D position, and cases with a single jammer and also with multiple jammers were discussed. The authors in [16] investigated UAV swarm communication in the presence of jammers, an iterative algorithm was constructed based on BCD and SCA technique to optimize the UAVs’ trajectories. Above mentioned works all considered ground jammers and mainly utilized traditional optimization techniques to solve the UAV path planning problem. These optimization-based methods typically require prior knowledge of the jammer, and lack the ability to adapt to different jamming environments, e.g., in which the jammer’s location is changed, or jamming is performed in a time-varying fashion. To tackle this challenge, the authors in [17] developed a reinforcement learning (RL) based automatic flight control algorithm to perform UAV Index Terms—UAV path planning, IoT networks, jamming attack, reinforcement learning. I. I NTRODUCTION Unmanned aerial vehicles (UAVs) or drones are aircrafts piloted by remote control or embedded computer programs without human onboard. Owing to their mobility, autonomy, and flexibility, UAVs are expected to be utilized extensively in different use cases in the next decade [1]. For example, they are considered as critical components in Internet of Things (IoT) scenarios [2], in which devices often have small transmit power and may not be able to communicate over a long range [3]. In such cases, UAVs can be used to assist IoT applications on e.g., data gathering [4], disaster mitigation and recovery [5]. Efficient trajectory control enables the UAV to achieve higher network performance with limited terrestrial infrastructure [6], [7]. However, the broadcast nature of wireless transmissions makes the UAV-enabled wireless communication systems vulnerable to jamming attacks [1], [8]–[10], leading to one of the major and serious threats to UAV-aided communications, especially when the jammer is mobile [11]. In addition, the trajectory control problem in hostile environments faces the following challenges, which Xueyuan Wang is with School of Computer Science and Artificial Intelligence, Changzhou University, Changzhou 213164, China (e-mail: xywang@cczu.edu.cn). M. Cenk Gursoy is with the Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY, 13244 USA (e-mail: mcgursoy@syr.edu). 1" 2401.08636v1,"MLCommons Cloud Masking Benchmark with Early Stopping Version 1.0 ∗ Varshitha Chennamsetti Gregor von Laszewski † Ruochen Gu New York University New York, NY, USA laszewski@gmail.com University of Virginia Charlottesville, VA, USA New York University New York, NY, USA Laiba Mehnaz Juri Papay Samuel Jackson New York University New York, NY, USA juri.papay@stfc.ac.uk Rutherford Appleton Laboratory Didcot, UK samuel.jackson@stfc.ac.uk Rutherford Appleton Laboratory Didcot, UK Jeyan Thiyagalingam Sergey V. Samsonau Geoffrey C. Fox t.jeyan@stfc.ac.uk Rutherford Appleton Laboratory Didcot, UK New York University New York, NY, USA gcfexchange@gmail.com University of Virginia Charlottesville, VA, USA Abstract can be found in a Globus repository that is accessible to MLCommons Science Working Group. In this paper, we report on work performed for the ML- Commons Science Working Group on the cloud masking benchmark. MLCommons is a consortium that develops and maintains several scientific benchmarks that aim to benefit developments in AI. The benchmarks are conducted on the High Performance Computing (HPC) Clusters of New York University and University of Virginia, as well as a commodity desktop. We provide a description of the cloud masking benchmark, as well as a summary of our submission to ML- Commons on the benchmark experiment we conducted. It includes a modification to the reference implementation of the cloud masking benchmark enabling early stopping. This benchmark is executed on the NYU HPC through a custom batch script that runs the various experiments through the batch queuing system while allowing for variation on the number of epochs trained. Our submission includes the modified code, a custom batch script to modify epochs, documentation 1 , and the benchmark results. We report the highest accuracy (scientific metric) and the average time taken (performance metric) for training and inference that was achieved on NYU HPC Greene. We also provide a comparison of the compute capabilities between different systems by running the benchmark for one epoch. Our submission CCS Concepts: • Applied computing → Earth and atmospheric sciences; • Computing methodologies → Image representations; • Information systems → Test collections; • Hardware → Testing with distributed and parallel systems. Keywords: cloud masking, cloudmesh, datasets, MLCommons, benchmark 1 Introduction Although artificial intelligence (AI) emerges as a powerful technology capable of transforming many aspects of life, several scientific niches/fields have yet to fully benefit from the advances in AI. Hence, there is a need for an initiative to increase awareness and push forward innovation in scientific fields where the potential for AI is huge but underexplored. MLCommons [11] is one such community effort that promotes AI for Science via benchmarking. MLCommons Science Working Group [20] has so far developed four scientific benchmarks in four varying fields: atmospheric sciences, solid-state physics, healthcare, and earthquake forecasting. In this paper, we present our submission to the cloud masking science benchmark in the atmospheric sciences domain. The objective of this benchmark [20] is to identify cloud pixels in satellite images (image segmentation). European Space Agency (ESA) [19] has deployed a series of satellites to monitor the global environment. Amongst these satellites, Sentinel-3 has been made operational to focus on, among other missions, ocean surface topography and sea and land surface temperature (SST/LST). The process of the ∗ https://github.com/laszewski/papers/raw/master/vonLaszewski- cloudmask-nyu.pdf † MLCommons authorized submitting author 1 Disclaimer: the documentation from NYU no longer works due to a system upgrade at NYU. A transition to Singularity was recommended by the NYU system staff. This has been independently worked on by Ruochen Gu. However, as the accounts on Greene expired, this work could not be completed and was therefore not documented in this paper. For availability of portable code, please contact G. von Laszewski. 1" 2401.08649v1,"1 Deep Pulse-Coupled Neural Networks Zexiang Yi, Jing Lian, Yunliang Qi, Zhaofei Yu, Huajin Tang, Yide Ma and Jizhao Liu Abstract—Spiking Neural Networks (SNNs) capture the information processing mechanism of the brain by taking advantage of spiking neurons, such as the Leaky Integrate-and- Fire (LIF) model neuron, which incorporates temporal dynamics and transmits information via discrete and asynchronous spikes. However, the simplified biological properties of LIF ignore the neuronal coupling and dendritic structure of real neurons, which limits the spatio-temporal dynamics of neurons and thus reduce the expressive power of the resulting SNNs. In this work, we leverage a more biologically plausible neural model with complex dynamics, i.e., a pulse-coupled neural network (PCNN), to improve the expressiveness and recognition performance of SNNs for vision tasks. The PCNN is a type of cortical model capable of emulating the complex neuronal activities in the primary visual cortex. We construct deep pulse-coupled neural networks (DPCNNs) by replacing commonly used LIF neurons in SNNs with PCNN neurons. The intra-coupling in existing PCNN models limits the coupling between neurons only within channels. To address this limitation, we propose inter-channel coupling, which allows neurons in different feature maps to interact with each other. Experimental results show that interchannel coupling can efficiently boost performance with fewer neurons, synapses, and less training time compared to widening the networks. For instance, compared to the LIF-based SNN with wide VGG9, DPCNN with VGG9 uses only 50%, 53%, and 73% of neurons, synapses, and training time, respectively. Furthermore, we propose receptive field and time dependent batch normalization (RFTD-BN) to speed up the convergence and performance of DPCNNs. We evaluate DPCNNs on four mainstream datasets, including static datasets such as MNIST, Fashion-MNIST, CIFAR-10, and the neuromorphic dataset N- MNIST. DPCNNs consistently outperform LIF-based SNNs, with notable performance achieved by the VGG9-based DPCNN, which achieves an accuracy of 94.2% in the CIFAR-10 dataset, setting the state-of-the-art performance under this architecture. Index Terms—Spiking neural networks, Pulse-coupled neural networks, Brain-like intelligence, Neuromorphic computing, Image recognition. I. I NTRODUCTION Spiking neural networks (SNNs) have emerged as a promising approach for developing bio-plausible and energy-efficient artificial intelligence (AI) systems [1]. Unlike traditional ANNs, SNNs represent the dynamic properties of neural systems and employ discrete spikes to encode, transmit, and This work is supported by the Regional Project of the National Natural Science Foundation of China (Grant 82260364) and Natural Science Foundation of Gansu Province (Grants 21JR7RA510, 21JR7RA345). (Corresponding author: Jizhao Liu.) Zexiang Yi, Yunliang Qi, Yide Ma, and Jizhao Liu are with the School of Information Science and Engineering, Lanzhou University, Lanzhou 730000, China (e-mail: liujz@lzu.edu.cn). Jing Lian is with the School of Electronics and Information Engineering, Lanzhou Jiaotong University, Lanzhou 730070, China. Zhaofei Yu is with the Institute for Artificial Intelligence, Peking University, Beijing 100871, China. Huajin Tang is with the College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China. process information. However, the majority of existing SNNs are based on the leaky integrate-and-fire (LIF) models [2], [3], which only capture a subset of the essential biological properties of real neurons, such as membrane potential integration and leakage. In fact, biological plausibility is a crucial consideration when creating brain-like intelligence, which is typically characterized by neuronal dynamics [2]. On the one hand, the rich neural dynamics of biological neurons have great potential to advance the development of more general AI. On the other hand, utilizing bio-plausible mechanisms is beneficial in enhancing our understanding of the brain. Driven by the significance of bio-plausibility, a question arises: can the performance of SNNs be efficiently improved by introducing bio-plausible mechanisms? Several attempts have been made to answer this question. For example, inspired by the neural heterogeneity in the brain, Fang et al. [4] incorporated learnable time constants to improve the performance and convergence of SNNs. Sun et al. [5] and Wang et al. [6] introduced learnable thresholding to endow LIF neurons with the ability to optimize their threshold values. Rathi and Roy [7] finetuned ANN-converted SNNs with a learnable membrane leak and firing threshold. Inspired by the lateral connections in biological neural networks, Cheng et al. [8] proposed a neural network with lateral connections, obtaining stronger noise-robustness. These works focus on introducing bio-plausible mechanisms by modifying the LIF model. However, heuristic modifications of LIF may diverge from the dynamics of biological neural networks. We address this problem by utilizing direct biological experiment-derived models, namely pulse-coupled neural networks (PCNNs) [9], [10]. Fig. 1 illustrates the structures and dynamics of LIF and PCNN neurons. Unlike LIF neurons, PCNN neurons consider the coupling between neighboring neurons from linking input and modulation from dendritic computational dynamics [10]. The above observation motivated us to investigate deep pulse-coupled neural networks (DPCNNs), which are more biologically plausible and have more complex dynamic properties than existing SNNs. To introduce PCNN neurons into SNN architectures, we altered the feeding of PCNNs with learnable matrix-vector input. Besides, we found that the intrachannel coupling of PCNNs, which was also exploited by a previous SNN work [8], cannot improve the performance of DPCNNs (Tab. VII). Therefore, we introduced inter-channel coupling into DPCNNs, where neurons in different channels can communicate and coordinate with each other. Interchannel coupling can enhance the network’s expressive power, thus effectively improving the DPCNNs’ performance. Additionally, to enable deeper architectures and further improve performance, we proposed receptive field and time-dependent batch normalization (RFTD-BN), which utilizes space- and" 2401.08654v1,"1 Smart Mobility Digital Twin for Automated Driving: Design and Proof-of-Concept Kui Wang, Zongdian Li, Tao Yu, Kei Sakaguchi Tokyo Institute of Technology, Tokyo, Japan Email: wang.k.ag@m.titech.ac.jp, { yutao, lizd, sakaguchi } @mobile.ee.titech.ac.jp Abstract—During the past decade, smart mobility and intelligent vehicles have attracted increasing attention, because they promise to create a highly efficient and safe transportation system in the future. Meanwhile, digital twin, as an emerging technology, will play an important role in automated driving and intelligent transportation systems. This technology is applied in this paper to design a platform for smart mobility, providing large-scale route planning services. Utilizing sensing technologies and cloud/edge computing, we build a digital twin system model that reflects the static and dynamic objects from the real world in real time. With the smart mobility platform, we realize traffic monitoring and route planning through cooperative environment perception to help automated vehicles circumvent jams. A proof-of-concept test with a real vehicle in real traffic is conducted to validate the functions and the delay performance of the proposed platform. Index Terms—digital twin, V2X, route planning, automated vehicle, cloud computing, edge computing, cooperative perception I. I NTRODUCTION Thanks to the rapid development of communication technology and substantial capacity improvement, we can envision a future where data, knowledge, and resources can be seamlessly shared among automated vehicles and intelligent transportation systems (ITS) [1]. This leads to research interest in building a new system or platform to manage and process such huge volumes of traffic, sensing, and control data. In particular, from the perspective of traffic efficiency and driving safety, introducing the concept of a digital twin with centralized system architecture and distributed edge processing capability becomes essential. A digital twin platform enables instant local information processing and exchange at the edges, and a periodic global information update and aggregation in the cloud. Thus, while making decisions, the accuracy and completeness of the information can be guaranteed. The advancements in vehicle-to-everything (V2X) communication and sensing technologies provide real-time information acquisition capabilities to establish digital twin systems. Today’s V2X incorporates four types of interfaces: vehicleto-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-topedestrian (V2P) and vehicle-to-network (V2N) [2]. Via V2X, not only perception information but also the driving intentions of vehicles can be shared to improve traffic efficiency. On the other hand, an integrated sensing system composed of cameras, radars, and light detection and rangings (LiDARs) makes environmental perception more reliable and precise. Roadside units (RSUs) equipped with such sensing systems can monitor and collect traffic information at each intersection. Therefore, studies related to mobility digital twin systems came forth recently. Authors in [3] summarized digital twins and their applications in connected and automated vehicles. Preliminary works in [4]–[9] discussed the digital twin at architectural and theoretical levels. The authors in [4]–[6] made a step forward by implementing digital twin systems reliant upon the collection of real-life and real-time traffic information to support cloud-based advanced driver-assistance systems (ADAS) functions, predict traffic speed and analyze highway driving safety, respectively. A holistic mobility digital twin framework was presented in [7], which consisted of three building blocks: the human digital twin for drivertype classification, the vehicle digital twin for cloud-based advanced ADAS, and the traffic digital twin for traffic flow monitoring. However, few studies explicitly explain how the cloud and edges in a mobility digital twin cooperate to improve traffic efficiency and driving safety. There are pros and cons to utilizing computing and communication resources in the cloud and edges. The former provides stronger data processing capability with higher latency, which is suitable to handle large-scale and computation-intensive tasks such as dynamic traffic signal timing and long-term path planning; the edge indicates the RSUs and onboard units (OBUs), has better realtime performance to address delay-sensitive tasks such as risk alerting and vehicle maneuvering. Considering the importance of cloud and edge cooperation, it is necessary to design a novel digital twin architecture that mostly leverages communication and computing capabilities for smart mobility. In addition, the implementation of the digital twin architecture is also critical, through which the performances can be demonstrated and evaluated. To deal with this challenge, a novel real-time digital twin platform is proposed to realize automated driving with good safety and high commuting efficiency by distributing different functional modules (i.e., navigation, environment perception, path planning, and control) of the single vehicular operating system to the cloud and the edges. Specifically, we present a digital twin model that reflects static and dynamic information from the physical space to the digital space and simultaneously visualizes 3D models of all objects in the sensors’ fields of view. The contributions of this paper lie in: 1) A real-time digital twin model integrates and visualizes static objects (e.g., buildings, infrastructures, and roads) and dynamic objects of interest (e.g., traffic participants including vehicles and pedestrians);" 2401.08658v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 1 End-To-End Planning of Autonomous Driving in Industry and Academia: 2022-2023 Gongjin Lan ∗ ID , Member, IEEE, Qi Hao ∗ ID , Member, IEEE Abstract—This paper aims to provide a quick review of the methods including the technologies in detail that are currently reported in industry and academia. Specifically, this paper reviews the end-to-end planning, including Tesla FSD V12, Momenta 2023, Horizon Robotics 2023, Motional RoboTaxi 2022, Woven Planet (Toyota): Urban Driver, and Nvidia. In addition, we review the state-of-the-art academic studies that investigate end-to-end planning of autonomous driving. This paper provides readers with a concise structure and fast learning of state-of-the-art endto-end planning for 2022-2023. This article provides a meaningful overview as introductory material for beginners to follow the state-of-the-art end-to-end planning of autonomous driving in industry and academia, as well as supplementary material for advanced researchers. Index Terms—Autonomous driving, End-to-End, Motion planning. I. I NTRODUCTION The World Health Organization claims that the lives of approximately 1.3 million people and an economic cost of 277 billion are cut short due to road traffic crashes every year 1 . The National Highway Transportation Safety Administration (NHTSA) found that the critical reason for 94% (±2.2%) of these crashes was assigned to human error [1]. Autonomous vehicles have the potential to significantly mitigate human errors by eliminating many of the mistakes that human drivers routinely make [2], [3]. By eliminating human errors, autonomous driving can improve driver safety, and reduce economic and congestion problems. Autonomous driving refers to the ability of a vehicle to operate itself without human intervention. Autonomous driving is a technology that controls the vehicle to reach the destination by recognizing the external environment without driver intervention. Trajectory planning is an essential task of autonomous driving, which serves as a target value to be tracked by a controller. Predicting the behavior of road users is a challenging task for a long planning time horizon [4]. The majority of trajectory planning algorithms are based on the assumption that other road users behave independently of the generated trajectory. The predicted trajectories are assumed to be fixed during the planning process. This motivates interactive trajectory planning, where the reaction of other road users is taken into account already during the planning phase. Current challenges are the computational effort and the consideration of uncertainties in Gongjin Lan and Qi Hao are with the Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, 518055, China (e-mail: langj@sustech.edu.cn) 1 https://www.who.int/news-room/fact-sheets/detail/road-traffic-injuries complex driving scenarios. Furthermore, learning approaches such as reinforcement learning and classification algorithms that can adapt to the variability of road users are investigated. This paper aims to provide a quick review of the methods including the technologies in detail that are currently reported in industry and academia. Specifically, this paper reviews the end-to-end planning, including Tesla FSD V12, Momenta 2023, Horizon Robotics 2023, Motional RoboTaxi 2022, Woven Planet (Toyota): Urban Driver, and Nvidia. In addition, we review the state-of-the-art academic studies that investigate end-to-end planning of autonomous driving. The end-to-end planning of autonomous driving in industry and academia 2022-2023 is summarized in Table I 2 3 4 5 6 7 8 9 10 . This paper provides readers with a concise structure and fast learning of state-of-the-art end-to-end planning for 2022- 2023, which is a meaningful overview as introductory material for beginners to follow the state-of-the-art end-to-end planning of autonomous driving in industry and academia, as well as supplementary material for advanced researchers. II. I NDUSTRY In this section, we introduce the current mainstream endto-end planning of autonomous driving in the industry 2022- 2023, including Tesla, Momenta, and Nvidia. These end-toend planning generally have not been publicly introduced in detail, we aim to summarize their solutions by combining the available information including oral presentations, videos, and news. A. Tesla FSD V12 2023 Although Tesla has not published any official research documents on its motion planning technology, the recent works were presented at workshops and conferences such as CVPR 2023 Workshop on End-to-End autonomous driving 11 . A presentation video about the is available at the page 12 that is the latest report. While there is limited information about the whole pipeline in detail, it can be speculated that Tesla 2 https://opendrivelab.com/e2ead/cvpr23 3 https://youtu.be/OKDRsVXv49A?si=Y7dYYFXLqPorcxQL 4 https://www.youtube.com/watch?v=hFQLJIvdQNU 5 https://youtu.be/ZwhXilQKULY?si=nQjgx96PCiXld-uJ 6 https://planning.l5kit.org/ 7 https://github.com/georgeliu233/OPGP 8 https://github.com/autonomousvision/tuplan_garage 9 https://youtu.be/OKDRsVXv49A?si=Y7dYYFXLqPorcxQL 10 https://github.com/autonomousvision/tuplan_garage 11 https://opendrivelab.com/e2ead/cvpr23 12 https://youtu.be/OKDRsVXv49A?si=Y7dYYFXLqPorcxQL" 2401.08663v1,"An Integrated Imitation and Reinforcement Learning Methodology for Robust Agile Aircraft Control with Limited Pilot Demonstration Data Gulay Goktas Sever a,∗∗ , Umut Demir a,∗∗ , A. Sadik Satir a,∗∗ , Mustafa Cagatay Sahin b , Nazım Kemal Ure a a Istanbul Technical University, Artificial Intelligence and Data Science Application and Research Center, Istanbul, 34467, Turkey b Turkish Aerospace Industries, Inc., Ankara, 06980, Turkey Abstract In this paper, we present a methodology for constructing data-driven maneuver generation models for agile aircraft that can generalize across a wide range of trim conditions and aircraft model parameters. Maneuver generation models play a crucial role in the testing and evaluation of aircraft prototypes, providing insights into the maneuverability and agility of the aircraft. However, constructing the models typically requires extensive amounts of real pilot data, which can be time-consuming and costly to obtain. Moreover, models built with limited data often struggle to generalize beyond the specific flight conditions covered in the original dataset. To address these challenges, we propose a hybrid architecture that leverages a simulation model, referred to as the source model. This open-source agile aircraft simulator shares similar dynamics with the target aircraft and allows us to generate unlimited data for building a proxy maneuver generation model. We then fine-tune this model to the target aircraft using a limited amount of real pilot data. Our approach combines techniques from imitation learning, transfer learning, and reinforcement learning to achieve this objective. To validate our methodology, we utilize real agile pilot data provided by Turkish Aerospace Industries (TAI). By employing the F-16 as the source model, we demonstrate that it is possible to construct a maneuver generation model that generalizes across various trim conditions and aircraft parameters without requiring any additional real pilot data. Our results showcase the effectiveness of our approach in developing robust and adaptable models for agile aircraft. Keywords: Maneuver Generation Models, Machine Learning, Reinforcement Learning, Imitation Learning, Aircraft Control 1. Introduction ”Pilot-in-the-Loop” simulation studies are a vital part of aircraft design and development process [1]. High-thrust agile aircraft are evaluated according to their maneuverability and agility metrics [2], which can be obtained via flight simulators in earlier stages of aircraft design [3]. The high-fidelity ”pilotin-the-loop” simulators offer a controlled environment in which scenarios and algorithms can be tested without the risks associated with full-scale manned aircraft flight testing. That being said, analyzing these capabilities requires highly skilled pilots due to the extreme flight conditions that push the maneuverability limits of the aircraft. Scheduling simulator time for such highly qualified pilots is a time and cost critical problem, since a wide range of scenarios under various trim conditions needs to be tested [1, 4], and pilots with such skill set are both few in numbers and high in demand. An alternative solution is replacing the human pilot with a model built by using a combination of flight data and domain knowledge, so that the model can be used in cases where a human pilot is either not available or flying a human pilot would be high cost. ∗ Corresponding author The primary objective of the maneuver generation model is to generate trajectories that closely align with the demonstrations of an expert pilot for a specific aircraft model. Additionally, the model should exhibit robustness against slight deviations from the desired course. As an inherent part of the aircraft design process, the parameters of the simulated aircraft model are subject to change. These changes encompass various aspects, including weight distribution, actuator models, low-level control parameters, and design parameters. Consequently, the model needs to possess the capability to adapt to these changes in the existing aircraft model without necessitating the acquisition of new demonstrations. Moreover, the model should exhibit transferability to similar aircraft, enabling its application across a range of aircraft models without the need for extensive re-engineering. The main objective of this paper is to propose a methodology for designing a high-performance maneuver generation model that can effectively adapt to changes in aircraft parameters and be readily applied to new aircraft models. To achieve this goal, we leverage various tools from modern machine learning, including imitation learning, transfer learning, and reinforcement learning, in combination with existing domain knowledge on flight mechanics and aircraft dynamics. ∗∗ Equal contribution Email addresses: sever17@itu.edu.tr (Gulay Goktas Sever), demiru@itu.edu.tr (Umut Demir ), sadiksatir@gmail.com (A. Sadik Satir), mustafacagatay.sahin@tai.com.tr (Mustafa Cagatay Sahin), ure@itu.edu.tr (Nazım Kemal Ure) Preprint submitted to Aerospace Science and Technology 1.1. Previous Work Broadly speaking, methods for maneuver generation modeling can be categorized into two main approaches: traditional January 18, 2024" 2401.08668v2,"Thermodynamic Perspectives on Computational Complexity: Exploring the P vs. NP Problem FLORIAN NEUKART, Leiden Institute of Advanced Computer Science, Netherlands The resolution of the P vs. NP problem, a cornerstone in computational theory, remains elusive despite extensive exploration through mathematical logic and algorithmic theory. This paper takes a novel approach by integrating information theory, thermodynam- ics, and computational complexity, offering a comprehensive landscape of interdisciplinary study. We focus on entropy, a concept traditionally linked with uncertainty and disorder, and reinterpret it to assess the complexity of computational problems. Our re- search presents a structured framework for establishing entropy profiles within computational tasks, enabling a clear distinction between P and NP-classified problems. This framework quantifies the ’information cost’ associated with these problem categories, highlighting their intrinsic computational complexity. We introduce Entropy-Driven Annealing (EDA) as a new method to decipher the energy landscapes of computational problems, focusing on the unique characteristics of NP problems. This method proposes a differential thermodynamic profile for NP problems in contrast to P problems and explores potential thermodynamic routes for find- ing polynomial-time solutions to NP challenges. Our introduction of Entropy-Driven Annealing (EDA) and its application to complex computational problems like the Boolean satisfiability problem (SAT) and protein-DNA complexes suggests a potential pathway toward unraveling the intricacies of the P vs. NP problem. Additional Key Words and Phrases: P vs. NP, Information Theory, Thermodynamics, Computational Complexity, Entropy, Non- equilibrium Thermodynamics, Quantum Information, Biological Computation, Energy Landscapes, Interdisciplinary Approach, Com- putational Hardness, Landauer’s Principle 1 INTRODUCTION Computational complexity theory, a subdomain of theoretical computer science, seeks to understand the inherent difficulty of computational problems and categorize them based on their complexity. One of the most profound and longstanding open problems in this domain is the P vs. NP problem. 1.1 Background on the P vs. NP Problem The classes P and NP, introduced by Stephen Cook and later expanded upon by Richard Karp [12, 20], distinguish between problems for which solutions can be found quickly (in polynomial time) and those for which solutions can be merely verified quickly. Formally, P is the class of decision problems for which a solution can be found in polynomial time. In contrast, NP consists of decision problems for which a solution can be verified in polynomial time. The essence of the P vs. NP question is whether every problem for which a solution can be quickly verified (NP) can also have its solution found quickly (P) [1]. 1.2 Importance of the Problem in Computational Theory The P vs. NP problem holds tremendous significance for computer scientists and physicists, mathematicians, and economists, among other disciplines. If 𝑃 = 𝑁 𝑃, many problems considered computationally hard (and often labeled as NP-complete) would suddenly become tractable. This shift would have profound implications across diverse fields, from cryptography to operations research [25]. Conversely, if 𝑃 ≠ 𝑁 𝑃, it would reinforce the notion of intrinsic com- putational difficulty and provide a foundational understanding of the limits of algorithmic efficiency. Author’s address: Florian Neukart, f.neukart@liacs.leidenuniv.nl, Leiden Institute of Advanced Computer Science, Niels Bohrweg 1, Leiden, South Holland, Netherlands, 2333 CA. 1" 2401.08675v1,"Orthonormal Strichartz estimate for dispersive equations with potentials Akitoshi Hoshiya ∗ January 18, 2024 Abstract In this paper we prove the orthonormal Strichartz estimates for the higher order and fractional Schrödinger, wave, Klein-Gordon and Dirac equations with potentials. As in the case of the Schrödinger operator, the proofs are based on the smooth perturbation theory by T. Kato. However, for the Klein-Gordon and Dirac equations, we also use a method of the microlocal analysis in order to prove the estimates for wider range of admissible pairs. As applications we prove the global existence of a solution to the higher order or fractional Hartree equation with potentials which describes the dynamics of infinitely many particles. We also give a local existence result for the semirelativistic Hartree equation with electromagnetic potentials. As another application, the refined Strichartz estimates are proved for higher order and fractional Schrödinger, wave and Klein-Gordon equations. 1 Introduction In this paper we give some continuation results of the author’s previous research [Ho]. We prove the orthonormal Strichartz estimates for the higher order and fractional Schrödinger, wave, Klein-Gordon and Dirac equations with potentials. The orthonormal Strichartz estimates were first proved by Frank-Lewin-Lieb-Seiringer [FLLS] for the free Schrödinger equation and they were generalized by [FS], [BHLNS], [BKS2] and [BLN2]. They are the following inequalities: ∞ X n=0 ν n |e it∆ f n | 2 L pt L qx . kν n k ℓ α . (1.1) Graduate School of Mathematical Sciences, The University of Tokyo, 3-8-1 Komaba, Meguro-ku, Tokyo 153-8914, Japan Email address: hoshiya@ms.u-tokyo.ac.jp ∗ 1" 2401.08696v1,"Hierarchical Source-to-Post-Route QoR Prediction in High-Level Synthesis with GNNs Mingzhe Gao 1 , Jieru Zhao 1∗ , Zhe Lin 2∗ , Minyi Guo 1 Shanghai Jiao Tong University, 2 Sun Yat-sen University {a823337391z,zhao-jieru}@sjtu.edu.cn, linzh235@mail.sysu.edu.cn, guo-my@cs.sjtu.edu.cn 1 Abstract—High-level synthesis (HLS) notably speeds up the hardware design process by avoiding RTL programming. However, the turnaround time of HLS increases significantly when post-route quality of results (QoR) are considered during optimization. To tackle this issue, we propose a hierarchical postroute QoR prediction approach for FPGA HLS, which features: (1) a modeling flow that directly estimates latency and post-route resource usage from C/C++ programs; (2) a graph construction method that effectively represents the control and data flow graph of source code and effects of HLS pragmas; and (3) a hierarchical GNN training and prediction method capable of capturing the impact of loop hierarchies. Experimental results show that our method presents a prediction error of less than 10% for different types of QoR metrics, which gains tremendous improvement compared with the state-of-the-art GNN methods. By adopting our proposed methodology, the runtime for design space exploration in HLS is shortened to tens of minutes and the achieved ADRS is reduced to 6.91% on average. Code and models are available at https://github.com/sjtu-zhao-lab/hierarchical-gnn-for-hls. I. I NTRODUCTION High-level synthesis (HLS) enables users to create hardware designs at a high level of abstraction using programming languages like C/C++, and provides a series of pragmas, to tune hardware micro-architectures. Due to its superior productivity, HLS is becoming a popular solution for next-generation hardware development, especially for FPGAs. However, the turnaround time for HLS design is significantly increased when post-route quality of results (QoR), such as latency and resource utilization, are considered during optimization. To obtain an accurate assessment of post-route QoR metrics, a complete C-to-bitstream design flow should be invoked each time the HLS code is modified. This runtime overhead undermines the benefits brought by HLS, especially when it comes to choosing the solution with optimal QoRs from an extremely large design space. Therefore, it is essential to provide a fast and accurate QoR prediction framework at an early design stage like HLS to improve design efficiency. Existing prediction methods can be classified into analytical and learning-based models. Analytical models are constructed based on domain expertise and achieve high accuracy in latency prediction [1], [2]. However, they are tailored for a specific subset of pragmas, resulting in limited scalability. Learning-based models adopt machine learning techniques [3]–[5] and graph neural networks (GNNs) [6]–[8] to predict latency and resource usage in HLS. We compare representative methods in Table I. Zhong et al. [3] extract features via source code profiling and use the gradient-boosted machine (GBM) to predict post-HLS metrics that can be obtained from HLS * Jieru Zhao and Zhe Lin are the corresponding authors. TABLE I: Comparison between representative methods. [3] [4] [6] [8] Ours Model Input GBM XGB GNN GNN GNN Source code HLS reports Source code HLS IR Source code Prediction Targets Post-HLS Post-Route Post-HLS Post-Route Post-Route Pragmas Involved ✓ ✗ ✓ ✗ ✓ HLS Exec. Free ✓ ✗ ✓ ✗ ✓ reports after synthesis. Then they conduct efficient DSE guided by their model. However, the labels in their dataset, i.e., post- HLS metrics, may deviate significantly from actual post-route QoR values. Hence, predicting post-HLS metrics may mislead the DSE process and get sub-optimal designs. Dai et al. [4] and Pyramid [5] also utilize ML models while predicting postroute QoR metrics directly. However, their features come from HLS reports and necessitate the execution of the HLS flow, incurring a higher time cost. Recent advances introduce GNN models for QoR prediction due to their representation power of C/C++ programs. GNN-DSE [6] and Ferretti et al. [7] represent source code as graphs and predict post-HLS metrics, which induce the same issue as [3]. Wu et al. [8] start from the HLS intermediate representation (IR) and predict postroute QoRs. They first predict resource types of operations and then incorporate the predicted resource types as node features to further estimate post-route resource usage. However, their input graphs are constructed on top of HLS IR, requiring running the HLS flow to generate related information. More importantly, the samples in their dataset exhibit relatively simple code structures, including randomly generated DFGs and loops without pragmas applied. The missing pragma modeling makes it less suitable for DSE tasks. To summarize, few of the previous methods achieve accurate source-to-post-route QoR prediction. The problem is even more challenging if the code structure is complicated and multiple HLS pragmas are considered. Different from directly predicting QoR with the whole graph in previous methods, our insight is that we can reserve the structural information of loops/functions and predict post-route QoR metrics gradually from inner to outer hierarchies. This will reduce the estimation difficulty and potentially improve the prediction accuracy. To this end, we propose a hierarchical prediction method using GNNs, which distinguishes itself from prior arts with the following key features: 1) efficiency: our method directly takes C/C++ source code as input and gives a fast post-route QoR estimation without invoking any EDA design flow, inlcuding HLS, during inference; 2) pragma embedding: we introduce an effective graph construction approach that jointly represents" 2401.08707v1,"Editorial The Revised Third Cambridge Catalogue at 60: To Jet or Not to Jet … Peter Barthel 1, * and Paolo Padovani 2 Kapteyn Institute, University of Groningen, 9747AD Groningen, The Netherlands European Southern Observatory, D-85748 Garching bei München, Germany; ppadovan@eso.org * Correspondence: pdb@astro.rug.nl 1 2 Citation: Barthel, P.; Padovani, P. 3CR at 60: “To Jet or Not to Jet …”. Galaxies 2024, 12, x. https://doi.org/10.3390/xxxxx Received: 24 November 2023 Revised: 8 December 2023 Accepted: 29 December 2023 Published: date Copyright: © 2023 by the authors. Submitted for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/license s/by/4.0/). The Revised Third Cambridge Catalogue of Radio Sources (in the northern sky), or 3CR, published sixty years ago by Bennett (1962) [1,2], has been of crucial importance in the study of active galaxies and active galactic nuclei, or AGN, near and far. Few astronomers knew what a radio galaxy was before the publication of the milestone 3CR catalogue. The discovery of the enigmatic quasars goes back to the optical identification and subsequent study of 3CR sources. Generations of astronomers have studied samples of 3CR radio galaxies and quasars and individual 3CR objects. They know the numbers of their 3CR favourites by heart, and some have specialized in the study of one or a few 3CR sources over decades. In particular, 3CR405—Cygnus A—and 3CR274—Virgo A—became the Rosetta Stone radio galaxies. A most useful compilation of the extragalactic 3CR radio sources and their optical properties was published by Spinrad et al. in 1985 [3]. All these 3CR studies shaped our knowledge of extragalactic radio sources: their morphologies with radio lobes, hotspots, compact nuclei, and extended jets; their occurrences; their energy sources; their host galaxies and environments; their interrelations; etc. The desire to understand these black-hole-accretion-driven powerful objects has been the primary driver in the development of radio interferometry from the 1960s to now, including intercontinental very-long-baseline interferometry and culminating in today’s worldwide Event Horizon Telescope. Globally speaking, extragalactic 3CR sources are either high-radio-power, efficiently accreting radio galaxies and quasars with edge-brightened double-radio morphologies, or low-power, inefficiently accreting radio galaxies, with edge-darkened morphologies. The former, mostly of the so-called FR2 class (Fanaroff and Riley, 1974 [4]), have a much smaller space density than the latter (the FR1 class), but much larger radio luminosities, and, thus, can be observed over large distances or look-back times. Radiatively efficient accretion, whereby the black hole mass consumption expressed in energy is a few per cent of the object’s maximum radiation (this ratio is defined as the Eddington ratio, where the Eddington power is 1.3 × 10 38 erg s −1 for one solar mass), occurs in massive host galaxies with dust and young stars. In contrast, inefficient accretion, at Eddington ratios of less than about one per cent, occurs in ultra-massive hosts without dust and young stars. The difference relates to the black hole fuel supply, that is to say, the mass to be accreted, and the radio jet formation mechanism. As reviewed, for instance, by Heckman and Best (2014) [5], the properties of the radio source host galaxies, as well as their environments, are important in determining the so-called ‘mode of accretion’. Jets (foremost traced in the radio) can have a profound impact on the surrounding host interstellar medium, influencing star formation rates, gas dynamics, and the overall host galaxy structure. The feedback from AGN jets—both positive and negative—is believed to regulate star formation and control the growth of galaxies, impacting their evolution over cosmic time (Fabian, 2012 [6]). Ultra-massive FR1 host galaxies are Galaxies 2024, 12, x. https://doi.org/10.3390/xxxxx www.mdpi.com/journal/galaxies" 2401.08717v1,"ROBUST DOA ESTIMATION FROM DEEP ACOUSTIC IMAGING Adrian S. Roman 1∗ 1 Iran R. Roman 2 Juan P. Bello 2 Viterbi School of Engineering, University of Southern California, California, USA 2 Music and Audio Research Laboratory, New York University, New York, USA ABSTRACT Direction of arrival estimation (DoAE) aims at tracking a sound in azimuth and elevation. Recent advancements include data-driven models with inputs derived from ambisonics intensity vectors or correlations between channels in a microphone array. A spherical intensity map (SIM), or acoustic image, is an alternative input representation that remains underexplored. SIMs benefit from high-resolution microphone arrays, yet most DoAE datasets use low-resolution ones. Therefore, we first propose a super-resolution method to upsample low-resolution microphones. Next, we benchmark DoAE models that use SIMs as input. We arrive to a model that uses SIMs for DoAE estimation and outperforms a baseline and a state-of-the-art model. Our study highlights the relevance of acoustic imaging for DoAE tasks. Index Terms— spherical intensity maps, acoustic imaging, sound event localization, super-resolution. 1. INTRODUCTION The release of large-scale sound event localization and detection (SELD) datasets [1, 2, 3] allowed for deep learning approaches for direction of arrival estimation (DoAE) in favor of traditional beamforming [4]. Today, the best-performing models use a combination of two inputs: 1) the intensity vectors of first order ambisonics (FOA) and 2) the correlations between channels in a tetrahedral microphone (4 channels) [5, 6]. However, a spherical intensity map (SIM) is an alternative input representation that remains unexplored. A SIM is computed using delay-and-sum beamforming (DASB) [7]. DeepWave, an acoustic imaging model [8], builds upon DASB by applying sparse coding [9] to deblur a cleaner representation of spatial sound activity (see Figure 1). We evaluated whether we could use DeepWave’s SIM to localize sound on the entire LOCATA dataset [2], and we found that it is possible to achieve great localization performance (see Table 1, top row). However, DeepWave assumes highresolution inputs, such as those captured by the EigenMike (32 channels) [10] or Pyramic (48 channels) [11] arrays. In this study we investigate whether high-resolution SIMs can be used to carry out DoAE. Since most SELD datasets ∗ corresponding author email: romanguz@usc.edu Fig. 1. The acoustic image by DeepWave (top) and DASB (bottom) for two sound sources. Dots denote ground truth. use low-resolution arrays, we first demonstrate it is possible to upsample them using a super-resolution model. Next, we benchmark models that use SIMs as input to carry out DoAE, and compare against a baseline and open-source state-of-theart (SoTA) model. Our code and data are openly-available. 1 In summary, our contributions are: 1. A method to upsample the covariance between channels in a low-resolution microphone to high-resolution. 2. A benchmark of models that use SIMs for DoAE, evaluated on the LOCATA [2] and STARSS23 [1] datasets. 2. RELATED WORK Current DoAE models process the intensity vectors of FOA and correlations between channels in a tetrahedral microphone [5, 6]. Significant ones include the “Sound event localization and detection network” (SELDnet) [12], considered to be a baseline for the task, as well as SoTA models that use multi-head self-attention [5] and multi-task outputs [6]. A SIM is an acoustic image indicating the location of a sound source [13]. SIMs have not been assessed quantitatively as input for DoAE deep-learning models. The DASB algorithm [7] is the most commonly-used method to compute SIMs, but resulting images exhibit poor angular resolution [8]. DeepWave achieves an equivalent SIM using a backprojection operation, and further denoises it using deblurring,   x (ℓ) = tanh [ B̄ ◦ B] H vec(Σ) + P θ (L)x (ℓ−1) −τ , (1) {z } | {z } | backprojection deblurring 1 https://github.com/adrianSRoman/DeepWaveDOA" 2401.08718v1,"Investigating Fouling Efficiency in Football Using Expected Booking (xB) Model Adnan Azmat School of Computer Science and Engineering Nanyang Technological University, Singapore adnan002@e.ntu.edu.sg Su Su Yi School of Computer Science and Engineering Nanyang Technological University, Singapore susu001@e.ntu.edu.sg ABSTRACT ior. We believe that non-dangerous fouls, excluding those resulting from bad behavior, truly represent the tactical aspect of fouls and do not involve impulsive decisions by players that easily lead to bookings. This paper introduces the Expected Booking (xB) model, a novel metric designed to estimate the likelihood of a foul resulting in a yellow card in football. Through three iterative experiments, employing ensemble methods, the model demonstrates improved performance with additional features and an expanded dataset. Analysis of FIFA World Cup 2022 data validates the model’s efficacy in providing insights into team and player fouling tactics, aligning with actual defensive performance. The xB model addresses a gap in fouling efficiency examination, emphasizing defensive strategies which often overlooked. Further enhancements are suggested through the incorporation of comprehensive data and spatial features. 1. INTRODUCTION In the realm of football, every decision made on the field can significantly influence the game’s outcome. Among these decisions, fouls and their subsequent consequences are often overlooked, despite their pivotal role in the game. Current methodologies primarily focus on offensive actions leading to goals, leaving the subtler yet equally crucial defensive aspect under-emphasized. Analyzing defensive play poses inherent challenges, and football discussions often prioritize offensive actions, thereby overshadowing the importance of defensive contributions. We anticipate that the cumulative Expected Booking probability can be used to rate the fouling ability of teams and players over individual matches or seasons, similar to how expected goals are used to rate scoring abilities. This approach offers a comprehensive view of the game, highlighting both offensive and defensive contributions. It also provides an opportunity to study the differences in refereeing decisions across various leagues and combinations. 1.2. Motivation Most efforts in football analysis have been predominantly focused on aspects such as attacking, scoring, and passing. While statistics for offensive plays like goals scored, expected goals, assists, expected assists, dribbles, key passes, pass accuracy, and chances created are readily available and comprehensive, the metrics for defensive actions often lack depth and detail. Defensive actions are typically represented by basic statistics like fouls, bookings (yellow cards, red cards), tackles, interceptions, and clearances. However, these metrics do not fully capture the complexity and strategic importance of defensive plays in a football match. This is the motivation behind the Expected Booking (xB) model. 1.1. Problem Statement In this paper, we introduce a new metric, the Expected Booking (xB) model. This model is designed to estimate the likelihood of a player receiving a yellow card if/for a foul committed at a specific moment during a match. Our focus is primarily on yellow cards due to their relative ambiguity and higher frequency of issuance compared to red cards. Red cards, which are issued less frequently, have clear rules for issuance. On average, yellow cards are issued 18 times more frequently than red cards [4]. Inspired by the Expected Goals model, which provides a measure of a striker’s performance relative to the opportunities they had, we aim to develop a similar model for defensive actions. To the best of our knowledge, there has been no prior research or study conducted on or related to the Expected Booking model. We believe that our research has the potential to offer valuable insights and contributions to the subject matter. Our attention is more specifically directed towards nondangerous fouls, excluding those resulting from bad behav- Expected Goals (xG) Model. Rathke, A. 2017 examined goal scoring in European football leagues and factors which 1.3. Related Work" 2401.08732v1,"Published as a conference paper at ICLR 2024 B AYES C ONDITIONAL D ISTRIBUTION E STIMATION FOR K NOWLEDGE D ISTILLATION B ASED ON C ONDITIONAL M UTUAL I NFORMATION Linfeng Ye ∗ , Shayan Mohajer Hamidi ∗ , Renhao Tan ∗ & En-Hui Yang Department of Electrical and Computer Engineering, University of Waterloo {l44ye,smohajer,cameron.tan,ehyang}@uwaterloo.ca A BSTRACT It is believed that in knowledge distillation (KD), the role of the teacher is to provide an estimate for the unknown Bayes conditional probability distribution (BCPD) to be used in the student training process. Conventionally, this estimate is obtained by training the teacher using maximum log-likelihood (MLL) method. To improve this estimate for KD, in this paper we introduce the concept of conditional mutual information (CMI) into the estimation of BCPD and propose a novel estimator called the maximum CMI (MCMI) method. Specifically, in MCMI estimation, both the log-likelihood and CMI of the teacher are simultaneously maximized when the teacher is trained. Through Eigen-CAM, it is further shown that maximizing the teacher’s CMI value allows the teacher to capture more contextual information in an image cluster. Via conducting a thorough set of experiments, we show that by employing a teacher trained via MCMI estimation rather than one trained via MLL estimation in various state-of-the-art KD frameworks, the student’s classification accuracy consistently increases, with the gain of up to 3.32%. This suggests that the teacher’s BCPD estimate provided by MCMI method is more accurate than that provided by MLL method. In addition, we show that such improvements in the student’s accuracy are more drastic in zero-shot and few-shot settings. Notably, the student’s accuracy increases with the gain of up to 5.72% when 5% of the training samples are available to the student (few-shot), and increases from 0% to as high as 84% for an omitted class (zero-shot). The code is available at https://github.com/iclr2024mcmi/ICLRMCMI. 1 I NTRODUCTION Knowledge distillation (Buciluǎ et al., 2006; Hinton et al., 2015) (KD) has received tremendous attention from both academia and industry in recent years as a highly effective model compression technique, and has been deployed in different settings (Radosavovic et al., 2018; Furlanello et al., 2018; Xie et al., 2020). The crux of KD is to distill the knowledge of a cumbersome model (teacher) into a lightweight model (student). Followed by Hinton et al. (2015), many researchers tried to improve the performance of KD (Romero et al., 2014; Anil et al., 2018; Park et al., 2019b), and to understand why distillation works (Phuong & Lampert, 2019; Mobahi et al., 2020; Allen-Zhu & Li, 2020; Menon et al., 2021; Dao et al., 2020). One critical component of KD that has received relatively little attention is the training of the teacher model. In fact, in most of the existing KD methods, the teacher is trained to maximize its own performance, even though this does not necessarily lead to an improvement in the student’s performance (Cho & Hariharan, 2019; Mirzadeh et al., 2020). Therefore, to effectively train a student to achieve high performance, it is essential to train the teacher accordingly. Recently, Menon et al. (2021) observed that the teacher’s soft prediction can serve as a proxy for the true Bayes conditional probability distribution (BCPD) of label y given an input x, and that the closer the teacher’s prediction to BCPD, the lower the variance of the student objective function. On the other hand, (Dao et al., 2020) showed that the accuracy of the student is directly bounded ∗ Authors contributed equally. 1" 2401.08735v1,"A Framework for Scalable Ambient Air Pollution Concentration Estimation Liam J. Berrisford 1,2,3,∗ l.berrisford@exeter.ac.uk Lucy S. Neal 4 lucy.neal@metoffice.gov.uk Helen J. Buttery 4 helen.buttery@metoffice.gov.uk Benjamin R. Evans 4 benjamin.evans@metoffice.gov.uk Ronaldo Menezes 1,5 r.menezes@exeter.ac.uk rmenezes@biocomplexlab.org 1 BioComplex Laboratory, Department of Computer Science, University of Exeter, England 2 Department of Mathematics, University of Exeter, England 3 UKRI Centre for Doctoral Training in Environmental Intelligence, University of Exeter, England 4 Met Office, FitzRoy Road, Exeter, EX1 3PB, U.K. 5 Department of Computer Science, Federal University of Ceará, Fortaleza, Brazil ∗ Corresponding Author January 18, 2024 Abstract Ambient air pollution remains a critical issue in the United Kingdom, where data on air pollution concentrations form the foundation for interventions aimed at improving air quality. However, the current air pollution monitoring station network in the UK is characterized by spatial sparsity, heterogeneous placement, and frequent temporal data gaps, often due to issues such as power outages. We introduce a scalable data-driven supervised machine learning model framework designed to address temporal and spatial data gaps by filling missing measurements. This approach provides a comprehensive dataset for England throughout 2018 at a 1km 2 hourly resolution. Leveraging machine learning techniques and real-world data from the sparsely distributed monitoring stations, we generate 355,827 synthetic monitoring stations across the study area, yielding data valued at approximately £70 billion. Validation was conducted to assess the model’s performance in forecasting, estimating missing locations, and capturing peak concentrations. The resulting dataset is of particular interest to a diverse range of stakeholders engaged in downstream assessments supported by outdoor air pollution concentration data for NO 2 , O 3 , PM 10 , PM 2.5 , and SO 2 . This resource empowers stakeholders to conduct studies at a higher resolution than was previously possible. Impact Statement: The current high-quality air pollution monitoring station network in the UK is spatially sparse with heterogeneous placement and commonly suffers from missing data temporally from issues such as power outages. We present a scalable data-driven supervised machine learning model framework to fill missing measurements temporally and spatially, providing a complete dataset for England during 2018 at a 1kmx1km hourly resolution. The approach leverages machine learning and data from the sparse real-world monitoring stations to create 355,827 synthetic monitoring stations across the study area to acquire data worth approximately £70 billion. Validation was conducted regarding the model’s performance in forecasting, estimating missing locations and capturing peak concentrations. The dataset provided is of interest to a range of stakeholders conducting downstream assessments underpinned by outdoor air pollution concentration data for NO2, O3, PM10, PM25, and SO2, empowering stakeholders to perform studies at a higher resolution than previously possible. 1" 2401.08742v1,"Fast Dynamic 3D Object Generation from a Single-view Video Zijie Pan 1 Zeyu Yang 1 1 Fudan University Xiatian Zhu 2 Li Zhang 1B 2 University of Surrey https://fudan-zvg.github.io/Efficient4D Abstract limited due to the need for fine-grained meshes as well as rigid restrictions. Generating dynamic three-dimensional (3D) object from a single-view video is challenging due to the lack of 4D labeled data. Existing methods extend text-to-3D pipelines by transferring off-the-shelf image generation models such as score distillation sampling, but they are slow and expensive to scale (e.g., 150 minutes per object) due to the need for back-propagating the information-limited supervision signals through a large pretrained model. To address this limitation, we propose an efficient video-to-4D object generation framework called Efficient4D. It generates highquality spacetime-consistent images under different camera views, and then uses them as labeled data to directly train a novel 4D Gaussian splatting model with explicit point cloud geometry, enabling real-time rendering under continuous camera trajectories. Extensive experiments on synthetic and real videos show that Efficient4D offers a remarkable 10-fold increase in speed when compared to prior art alternatives while preserving the same level of innovative view synthesis quality. For example, Efficient4D takes only 14 minutes to model a dynamic object. Input Generated dynamic objects Figure 1. Examples of video-to-4D generation. Input: A brief video of a dynamic object, as represented by 3 frames per case; Output: Generated novel views at different timestamps. Directly generating 4D object/scene content from text description has been recently attempted [36]. To bypass the need of exhaustively labeled training data pairs in form of (text, 4D), it trains a Neural Radiance Fields (NeRF)- like representation [25] via score distillation sampling [28] and separates the modeling of static scene and its dynamics. Not only is this method computationally inefficient caused by heavy supervision back-propagation through a large pretrained model, but also its textual condition is highly ambiguous in expressing the intended visual content. In quest of the aforementioned human’s capability, a recent work [10] proposed to generate dynamic 3D object images from a single-view video (statically captured monocular video from a fixed view), namely as video-to-4D object generation. However, similar as [36] this method is also slow to train (e.g., 150 minutes to model a single dynamic object) in addition to complex design, hence unscalable in practice. To address identified limitations, we formulate an efficient video-to-4D object generation method in a two-staged pipeline called Efficient4D. In the first stage, we generate spacetime-consistent images across different camera views as synthetic training data. This is realized by imposing 1. Introduction Humans possess a remarkable capacity to comprehensively comprehend the spatial and temporal characteristics of a dynamic object in a brief video, even with a limited perspective, enabling them to predict its appearance in unseen viewpoints over time. Despite the significant advancement of three-dimensional (3D) object generation, existing works [4, 17, 28, 41] mostly consider static scenes or objects. With the availability of large-scale 3D datasets [5, 6], training generalizable models capable of directly generating multi-view images becomes possible [20–22]. These generated images can be turned into a 3D object through reconstruction techniques [25, 39]. By further augmenting these generated static objects with predefined animations [1], dynamic 3D content can be generated. However, this is highly B Corresponding to lizhangfd@fudan.edu.cn 1" 2401.08743v1,"MMToM-QA: Multimodal Theory of Mind Question Answering Chuanyang Jin 1,2 Yutong Wu 3 Jing Cao 2 Jiannan Xiang 4 Yen-Ling Kuo 2,5 Zhiting Hu 4 Tomer Ullman 3 Antonio Torralba 2 Joshua B. Tenenbaum 2 Tianmin Shu 6 1 New York University 2 Massachusetts Institute of Technology 3 Harvard University 4 UC San Diego 5 University of Virginia 6 Johns Hopkins University Abstract Theory of Mind (ToM), the ability to understand people’s minds, is an essential ingredient for developing machines with human-level social intelligence. Recent machine learning models, particularly large language models, seem to show some aspects of ToM understanding. However, existing ToM benchmarks use unimodal datasets – either video or text. Human ToM, on the other hand, is more than video or text understanding. People can flexibly reason about another person’s mind based on conceptual representations (e.g., goals, beliefs, plans) extracted from any available data, which can include visual cues, linguistic narratives, or both. To address this, we introduce a multimodal Theory of Mind question answering (MMToM- QA) benchmark. MMToM-QA comprehensively evaluates machine ToM both on multimodal data and on different kinds of unimodal data about a person’s activity in a household environment. To engineer multimodal ToM capacity, we propose a novel method, BIP-ALM (Bayesian Inverse Planning Accelerated by Language Models). BIP-ALM extracts unified representations from multimodal data and utilizes language models for scalable Bayesian inverse planning. We conducted a systematic comparison of human performance, BIP-ALM, and state-of-the-art models, including GPT-4. The experiments demonstrate that large language models and large multimodal models still lack robust ToM capacity. BIP-ALM, on the other hand, shows promising results, by leveraging the power of both model-based mental inference and language models. 1 Introduction Theory of Mind (ToM) is the cognitive ability to ascribe hidden mental states (e.g. goals, beliefs, and desires) to other individuals based on their observed behavior. A hallmark of human social intelligence, ToM serves as the foundation for a wide range of social interactions and a pillar of commonsense reasoning (Lake et al., 2017). Systems designed to safely and productively interact with humans in an open-ended manner, such as assistive robots (e.g., Dautenhahn, 2007; Hadfield- Menell et al., 2016; Patel & Chernova, 2022; Puig et al., 2023), AI teachers (e.g., Wang et al., 2021), autonomous vehicles (e.g., Chandra et al., 2020), and cooperative embodied agents (e.g., Bara et al., 2021; Sclar et al., 2022a), would greatly benefit from incorporating ToM reasoning capabilities, either through learning or based on built-in features. The recent advancements in machine learning, especially in the realm of Large Language Models (LLMs), have spurred increased interest in assessing these models’ aptitude for ToM reasoning (e.g., Rabinowitz et al., 2018; Kosinski, 2023; Code and data are available on the project website: https://chuanyangjin.com/mmtom-qa Correspondence to: Chuanyang Jin , Tianmin Shu Preprint. Under review." 2401.08756v1,"UMN-TH-4309/24 Higgs Width and Couplings at High Energy Muon Colliders with Forward Muon Detection Peiran Li, 1, ∗ Zhen Liu, 1, † and Kun-Feng Lyu 1, ‡ 1 School of Physics and Astronomy, University of Minnesota, Minneapolis, MN 55455, USA We propose a novel method using the ZZ-fusion channel and forward muon de- tection at high-energy muon colliders to address the challenge of the Higgs coupling- width degeneracy. Our approach enables inclusive Higgs rate measurement to 0.75% at 10 TeV muon collider, breaking the coupling-width degeneracy. Results indicate the potential to refine Higgs coupling to sub-percent levels and estimate its total width within (-0.41%, +2.1%). Key insights include the effectiveness of forward muon tagging in signal-background separation despite broad recoil mass distribution due to muon energy reconstruction and beam energy spread. The study emphasizes the significance of muon rapidity coverage up to |η(µ)| < 6, enhancing measurement precision. Our findings highlight the unique capabilities of high-energy lepton collid- ers for model-independent Higgs coupling determination and lay the groundwork for future advancements in muon collider technology and Higgs physics research. ∗ li001800@umn.edu, 0009-0005-7748-7085 zliuphys@umn.edu, 0000-0002-3143-1976 ‡ lyu00145@umn.edu, 0000-0002-3291-1701 †" 2401.08834v1,"Structure and lattice excitations of the copper substituted lead oxyapatite Pb 9.06(7) Cu 0.94(6) (PO 3.92(4) ) 6 O 0.96(3) ∗ Qiang Zhang, 1, † Yingdong Guan, 2 Yongqiang Cheng, 1 Lujin Min, 2 Jong K. Keum, 1, 3 Zhiqiang Mao, 2 and Matthew B. Stone 1, ‡ 1 Neutron Scattering Division, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831, USA Department of Physics, Pennsylvania State University, University Park, Pennsylvania 16802, USA 3 Center for Nanophase Materials Sciences, Oak Ridge national Laboratory, Oak Ridge, Tennessee 37831, USA (Dated: January 18, 2024) 2 The copper substituted lead oxyapatite, Pb 10−x Cu x (PO 3.92(4) ) 6 O 0.96(3) (x=0.94(6)) was studied using neutron and x-ray diffraction and neutron spectroscopy techniques. The crystal structure of the main phase of our sample, which has come to be colloquially known as LK-99, is verified to possess a hexagonal structure with space group P 6 3 /m, alongside the presence of impurity phases Cu and Cu 2 S. We determine the primary substitution location of the Cu as the Pb1 (6h) site, with a small substitution at the Pb2 (4f ) site. Consequently, no clear Cu-doping-induced structural distortion was observed in the investigated temperature region between 10 K and 300 K. Specially, we did not observe a reduction of coordinate number at the Pb2 site or a clear tilting of PO 4 tetrahedron. Magnetic characterization reveals a diamagnetic signal in the specimen, accompanied by a very weak ferromagnetic component at 2 K. No long-range magnetic order down to 10 K was detected by the neutron diffraction. Inelastic neutron scattering measurements did not show magnetic excitations for energies up to 350 meV. There is no sign of a superconducting resonance in the excitation spectrum of this material. The measured phonon density of states compares well with density functional theory calculations performed for the main LK-99 phase and its impurity phases. Our study may shed some insight into the role of the favored substitution site of copper in the absence of structural distortion and superconductivity in LK-99. I. INTRODUCTION Since claims of the observation of room temperature superconductivity in a copper-substituted lead apatite compound emerged in 2023 [1], there was a rapid growth of interest in this compound. The parent compound, lead apatite Pb 10 (PO 4 ) 6 O was proposed to become a superconductor with the substitution of copper as Cu 2+ on the Pb 2+ sites in the structure [2]. Spurred by this announcement, other researchers quickly attempted to reproduce the results. Synthesis of the compound, which has come to be colloquially known as LK-99, was found to be accompanied by an impurity phase of Cu 2 S although no superconductivity was observed in subsequent magnetization measurements [3]. We note that this impurity phase was observed by the original group proposing superconductivity in this compound. Additional synthesis by other groups also observed the Cu 2 S impurity phase ∗ This manuscript has been authored by UT-Battelle, LLC under Contract No. DE-AC05-00OR22725 with the U.S. Department of Energy. The United States Government retains and the publisher, by accepting the article for publication, acknowledges that the United States Government retains a non-exclusive, paidup, irrevocable, world-wide license to publish or reproduce the published form of this manuscript, or allow others to do so, for United States Government purposes. The Department of Energy will provide public access to these results of federally sponsored research in accordance with the DOE Public Access Plan (http://energy.gov/downloads/doe-public-access-plan). † zhangq6@ornl.gov ‡ stonemb@ornl.gov along with electrical transport and magnetization measurements that are consistent with LK-99 being a semiconductor and not a superconductor [4]. It was argued that the first-order structural phase transition in Cu 2 S is responsible for the signal in the magnetization, which was misinterpreted as superconductivity [5]. Growths of LK-99 with improved purity of precursor materials or single crystals were likewise unable to reproduce the proposed high-temperature superconducting phase [6, 7]. Prompted by these experimental results, density functional theory (DFT) calculations of the parent compound and the copper substituted LK-99 have been performed by several groups [8–15]. Si and Held predicted an insulating electronic structure in the parent compound with a reduction in unit cell volume and flat bands near the Fermi energy appearing upon substituting Cu for Pb [8]. These flat bands imply a large electronic density of states near the Fermi level such that correlated electron behavior may be present in the material. Nonmagnetic DFT predicts the flat bands to have both hole and electron pockets while spin-polarized DFT calculations find that Cu substitution results in a ferromagnetic metal with 0.57 µ B on the Cu site and a small hybridized moment of 0.06 µ B on the nearest neighbor O site [9]. DFT calculations examining the lattice excitations of the Cu substituted compound have found that in a hexagonal structure, bands of phonons occur in the ranges 0 to 7, 11 to 13, 15 to 17 and 27 to 30 THz accompanied by an imaginary phonon mode, while in a triclinic lattice, the phonons have similar banding but without any imaginary modes [11]. Although room-temperature superconductivity in LK-" 2401.08841v1,"Exploring Content-Based and Meta-Data Analysis for Detecting Fake News Infodemic: A case study on COVID-19 Oluwaseun Ajao, Ashish Garg and Márjory Da Costa-Abreu Department of Computing Sheffield Hallam University s.ajao@shu.ac.uk; m.da-costa-abreu@shu.ac.uk Abstract—The coronavirus pandemic (COVID-19) is probably the most disruptive global health disaster in recent history. It negatively impacted the whole world and virtually brought the global economy to a standstill. However, as the virus was spreading, infecting people and claiming thousands of lives so was the spread and propagation of fake news, misinformation and disinformation about the event. These included the spread of unconfirmed health advice and remedies on social media. In this paper, false information about the pandemic is identified using a content-based approach and metadata curated from messages posted to online social networks. A content-based approach combined with metadata as well as an initial feature analysis is used and then several supervised learning models are tested for identifying and predicting misleading posts. Our approach shows up to 93% accuracy in the detection of fake news related posts about the COVID-19 pandemic. Index Terms—Coronavirus, COVID-19, Misinformation, Disinformation, Malinformation, Fake News. I. I NTRODUCTION On 11th March 2020, the world health organisation (WHO) declared COVID-19 a pandemic. At the time of writing this article, there have been almost 500 million confirmed cases worldwide, and more than 6 million people have now died after they were infected by the disease [1]. An event of this scale has been widely discussed on TV media as well as online social networks due to the global impact [2]. The increased activity witnessed on social media platforms was further driven by ‘social distancing’ measures being put in place by most affected countries to limit face-toface contact and aim to prevent further spread of the disease. Figure 1 shows that social media platforms such as Facebook, YouTube, Twitter and WhatsApp have the highest monthly average users at the end of July 2021 [3], with over 6 billion users combined and the increased usage of these information sharing mediums also brought along with it a challenging surge of false information being circulated amongst users. There has been a wide range of ’fake news’ related with the coronavirus pandemic, ranging from ’miracle cures’, blamegame and 5G implications. Moreover, the impact in each country, even though the disease is the same, the population behaviour related to the ’fake news’ has been very different. Fig. 1. Social media monthly average users (millions) [3] The platform Twitter has played an important role on this dissemination [4]. Twitter updates its rules and enforcement policy in an attempt to curtail the spread of misleading health messages messages by increasing control and making additional checks of tweets that gave potentially unfounded, harmful health advice or promoted online hate amongst users regarding the pandemic [5]. However, the dissemination of fake news regarding COVID- 19 has never been higher and there is an urgent need to explore the possibilities on how to build a reliable solution. Thus, this paper aims to explore the possible content-based feature extraction as well as the metadata and which machine learning models of supervised learning can indicate which families of solutions might have a bigger impact on this task. The rest of this paper is structured as follows: Section II explains the main differences on the terminology and how we will proceed in this investigation. Section III presents the most common features and classifiers that are currently being used for COVID-19 related fake news detection. Section IV presents our approach to this work regarding data source and" 2401.08846v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 Iterative Planning for Multi-agent Systems: An Application in Energy-Aware UAV-UGV Cooperative Task Site Assignments Neelanga Thelasingha, Agung Julius, James Humann, Jean-Paul Reddinger, James Dotterweich, Marshal Childers Abstract—This paper presents an iterative planning framework for multi-agent systems with hybrid state spaces. The framework uses transition systems to mathematically represent planning tasks and employs multiple solvers to iteratively improve the plan until computation resources are exhausted. When integrating different solvers for iterative planning, we establish theoretical guarantees on the mathematical framework to ensure recursive feasibility. The proposed framework enables continual improvement of solution optimality, efficiently using allocated computation resources. The proposed method is validated by applying it to an energy-aware UGV-UAV cooperative task site assignment. The results demonstrate the continual solution improvement while preserving real-time implementation ability compared to algorithms proposed in the literature. Note to Practitioners—This paper presents an iterative planning solution for cooperative planning problems in multi-agent systems. The proposed solution can integrate multiple solvers together to create a solution framework such that faster yet suboptimal solvers are integrated with slower but optimal solvers. The computation time can be efficiently allocated for each solver and the plan can be executed on a shrinking horizon to ensure real-time implementability. The necessary conditions to apply the proposed framework and ensure recursive feasibility have been derived as theoretical results of this work. An application of the proposed planning framework has been demonstrated in an energy-aware cooperative planning scenario for multi-vehicle task site assignments. Two constraint-based satisfiability solvers have been formulated and used in the example problem. The proposed theoretical framework has the ability to be applied to plan for any generalized task site assignment using multiple solvers iteratively. Currently, the solution framework does not take the dynamic goal scenarios and uncertainty in plan execution that might exist in certain planning problems. The future extensions of this work are intended to address these practical concerns. Index Terms—Iterative planning, Transition systems, Multiagent planning, Energy-aware routing Submission Type—Regular paper I. I NTRODUCTION This work was supported by DEVCOM Army Research Laboratory under the Cooperative Research Agreement W911NF-21-2-0283 79054-CI-ARL Neelanga Thelasingha and Agung Julius are with the Center for Mobility with Vertical Lift (MOVE), Rensselaer Polytechnic Institute, 2303 Jonsson Engineering Center, 110 8th Street, Troy, NY 12180, USA. (email: thelan@rpi.edu, agung@ecse.rpi.edu) James Humann, Jean-Paul Reddinger, James Dotterweich and Marshal Childers are with DEVCOM Army Research Laboratory, Aberdeen Proving Ground, MD 21005, USA. (email: james.d.humann.civ@army.mil, jean-paul.f.reddinger.civ@army.mil, james.m.dotterweich.civ@army.mil, marshal.a.childers.civ@army.mil) R ECENT research advances in robotics and control have led to the construction of multi-agent systems that operate in complex real-world environments. Operating such systems often involves solving complex planning problems in multi-dimensional state spaces. Real-world implementations of such solutions have a wide spectrum of application areas. For example, multi-agent motion planning problems have been explored in the areas of Unmanned Aerial/Ground Vehicle (UAV/UGV) systems [1], [2], underwater vehicles [3], route planning for a multi-robot station in a manufacturing cell [4], station inventory management systems [5] and automated material handling systems [6]. Many of these applications involve planning trajectories in complex high-dimensional state spaces. Among them, route planning tasks for UAV-UGV teams [7]–[11] involve specific challenges. The heterogeneous dynamics within a UAV-UGV team require proper formulation of the system models and the planning task. Further, agents’ operations are limited by several constraints, including energy usage [12], [13] and the assigned task, e.g., package delivery [14]. A. Motivation In general, most cooperative planning tasks can be formulated as a variant of the well-known NP-hard vehicle routing problem [15], [16], but the complexity increases when energy dynamics must also be considered [4], [8], [13], [17]. The planned routes must be feasible under the energy availability constraint for each vehicle. Moreover, when vehicle recharge capabilities are integrated into the model, additional constraints are imposed on the planning task [18]. In any solution, each agent must operate within the bounds of the energy capacity and follow the defined discharge / recharge dynamics [19], [20]. Therefore, including the energy dimension in energy-aware planning tasks further increases the complexity [6], [9]. The state spaces in such problems are hybrid state spaces with multiple continuous and discrete dimensions. Therefore, searching for a feasible or optimal plan requires significant computational resources and time. When the applications include persistent or periodic delivery tasks that require receding horizon planning, such as the cases in [4], [11] and [21], the allowed computation resources per planning step are bounded. In the literature, many approaches include discretizing the state space to enable reformulation of the planning tasks for faster computation. Such approaches include graph-based state" 2401.08861v1,"1 Semi-Supervised Learning Approach for Efficient Resource Allocation with Network Slicing in O-RAN Salar Nouri † Mojdeh Karbalaee Motalleb † Vahid Shah-Mansouri † Seyed Pooya Shariatpanahi † † School of Electrical and Computer Engineering, College of Engineering, University of Tehran, Tehran, Iran { salar.nouri, mojdeh.karbalaee, vmansouri, p.shariatpanahi } @ut.ac.ir Abstract—The Open Radio Access Network (O-RAN) technology has emerged as a promising solution for network operators, providing them with an open and favorable environment. Ensuring effective coordination of x-applications (xAPPs) is crucial to enhance flexibility and optimize network performance within the O-RAN. In this paper, we introduce an innovative approach to the resource allocation problem, aiming to coordinate multiple independent xAPPs for network slicing and resource allocation in O-RAN. Our proposed method focuses on maximizing the weighted throughput among user equipments (UE), as well as allocating physical resource blocks (PRBs). We prioritize two service types, namely enhanced Mobile Broadband and Ultra Reliable Low Latency Communication. To achieve this, we have designed two xAPPs: a power control xAPP for each UE and a PRB allocation xAPP. The proposed method consists of a twopart training phase, where the first part uses supervised learning with a Variational Autoencoder trained to regress the power transmission as well as the user association and PRB allocation decisions, and the second part uses unsupervised learning with a contrastive loss approach to improve the generalization and robustness of the model. We evaluate the performance of our proposed method by comparing its results to those obtained from an exhaustive search algorithm, deep Q-network algorithm, and by reporting performance metrics for the regression task. We also evaluate the proposed model’s performance in different scenarios among the service types. The results show that the proposed method is a more efficient and effective solution for network slicing problems compared to state-of-the-art methods. Index Terms—Resource allocation, Network slicing, O-RAN, Variational Autoencoder, Contrastive Learning I. INTRODUCTION W Ireless communication has evolved from a mere convenience to an absolute necessity, driven by an insatiable demand for faster and more dependable connectivity between various quality of service (QoS) requirements [1]. The emergence of fifth generation (5G) technology represents a significant leap, offering the potential to support a wide range of applications, including augmented reality and autonomous vehicles [2]. However, the pursuit of wireless excellence does not conclude with 5G; it merely marks a stepping stone towards the next frontier—sixth generation (6G), the sixth generation of wireless technology. Poised on the horizon, 6G holds the promise to once again redefine the boundaries of connectivity. Emerging concepts within 6G, such as extreme Multiple- Input Multiple-Output and deep Receiver, promise to propel us further into uncharted technological realms, offering unprecedented data rates and levels of connectivity [3]. These advancements have the potential to not only revolutionize our modes of communication but also reshape the very fabric of our interconnected world. Furthermore, the application of various machine learning (ML) techniques to automate resource allocation within the medium access control (MAC) layer and scheduler represents a burgeoning area of research within the 6G landscape [4]. These techniques aim to inject an unparalleled level of intelligence into network management and optimization, laying the foundation for networks capable of dynamically adapting to user demands and environmental conditions. In this constantly evolving landscape, the roles of Open Radio Access Network (O-RAN) [5] and network slicing [6], which have reached remarkable milestones in 5G, continue to be pivotal. As we explore the possibilities offered by 6G and its transformative capabilities, it becomes increasingly evident that the evolution of wireless communication is an unceasing journey. Each generation builds upon the accomplishments of its forerunners, establishing a robust foundation for the next phase of wireless excellence. Resource allocation involves the meticulous distribution of finite network resources among numerous users, applications, or services [7]. In 5G, the primary objective is to support a wide spectrum of services, including Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and massive Machine Type Communications (mMTC) [8]. Each of these services necessitates distinct resource sets encompassing bandwidth, data rate, latency, power consumption, complexity, and reliability. As such, resource allocation within the 5G landscape must exhibit the flexibility to cater to these diverse demands while ensuring the efficient utilization of network resources. Network slicing is an innovative concept that tailors virtual networks (slices) within a unified physical infrastructure, addressing specific service types and use cases [9]. In the context of 5G, it efficiently allocates resources for eMBB and URLLC [10] services. This significance extends into the anticipated 6G era, where network slicing remains instrumental, facilitating resource allocation for diverse applications, including holographic communication and tactile internet [11], [12]. Its inherent scalability ensures adaptability to evolving workloads and user expectations, solidifying its role as a key technology" 2401.08865v2,"Accepted as a conference paper at ICLR 2024 T HE E FFECT OF I NTRINSIC D ATASET P ROPERTIES ON G ENERALIZATION : U NRAVELING L EARNING D IFFER - ENCES B ETWEEN N ATURAL AND M EDICAL I MAGES Nicholas Konz 1 , Maciej A. Mazurowski 1,2,3,4 Department of Electrical and Computer Engineering, 2 Department of Radiology, 3 Department of Computer Science, 4 Department of Biostatistics & Bioinformatics Duke University, NC, USA {nicholas.konz, maciej.mazurowski}@duke.edu 1 A BSTRACT This paper investigates discrepancies in how neural networks learn from different imaging domains, which are commonly overlooked when adopting computer vision techniques from the domain of natural images to other specialized domains such as medical images. Recent works have found that the generalization error of a trained network typically increases with the intrinsic dimension (d data ) of its training set. Yet, the steepness of this relationship varies significantly between medical (radiological) and natural imaging domains, with no existing theoretical explanation. We address this gap in knowledge by establishing and empirically validating a generalization scaling law with respect to d data , and propose that the substantial scaling discrepancy between the two considered domains may be at least partially attributed to the higher intrinsic “label sharpness” (K F ) of medical imaging datasets, a metric which we propose. Next, we demonstrate an additional benefit of measuring the label sharpness of a training set: it is negatively correlated with the trained model’s adversarial robustness, which notably leads to models for medical images having a substantially higher vulnerability to adversarial attack. Finally, we extend our d data formalism to the related metric of learned representation intrinsic dimension (d repr ), derive a generalization scaling law with respect to d repr , and show that d data serves as an upper bound for d repr . Our theoretical results are supported by thorough experiments with six models and eleven natural and medical imaging datasets over a range of training set sizes. Our findings offer insights into the influence of intrinsic dataset properties on generalization, representation learning, and robustness in deep neural networks. 1 1 I NTRODUCTION There has been recent attention towards how a neural network’s ability to generalize to test data relates to the intrinsic dimension d data of its training dataset, i.e., the dataset’s inherent “complexity” or the minimum degrees of freedom needed to represent it without substantial information loss (Gong et al., 2019). Recent works have found that generalization error typically increases with d data , empirically (Pope et al., 2020) or theoretically (Bahri et al., 2021). Such “scaling laws” with respect to intrinsic dataset properties are attractive because they may describe neural network behavior in generality, for different models and/or datasets, allowing for better understanding and predictability of the behavior, capabilities, and challenges of deep learning. However, a recent study (Konz et al., 2022) showed that generalization scaling behavior differs drastically depending on the input image type, e.g., natural or medical images, showing the non-universality of the scaling law and motivating us to consider its relationship to properties of the dataset and imaging domain. 2 In this work, we provide theoretical and empirical findings on how measurable intrinsic properties of an image dataset can affect the behavior of a neural network trained on it. We show that certain 1 2 Code link: https://github.com/mazurowski-lab/intrinsic-properties. Here we take “medical” images to refer to radiology images (e.g., x-ray, MRI), the most common type. 1" 2401.08887v1,"NOTSOFAR-1 Challenge: New Datasets, Baseline, and Tasks for Distant Meeting Transcription Alon Vinnikov, Amir Ivry, Aviv Hurvitz, Igor Abramovski, Sharon Koubi, Ilya Gurvich, Shai Pe‘er, Xiong Xiao, Benjamin Martinez Elizalde, Naoyuki Kanda, Xiaofei Wang, Shalev Shaer, Stav Yagev, Yossi Asher, Sunit Sivasankaran, Yifan Gong, Min Tang, Huaming Wang, Eyal Krupka Microsoft notsofar challenge@microsoft.com Abstract We introduce the first Natural Office Talkers in Settings of Farfield Audio Recordings (“NOTSOFAR-1”) Challenge 1 alongside datasets and baseline system 2 . The challenge focuses on distant speaker diarization and automatic speech recognition (DASR) in far-field meeting scenarios, with single-channel and known-geometry multi-channel tracks, and serves as a launch platform for two new datasets: First, a benchmarking dataset of 315 meetings, averaging 6 minutes each, capturing a broad spectrum of real-world acoustic conditions and conversational dynamics. It is recorded across 30 conference rooms, featuring 4-8 attendees and a total of 35 unique speakers. Second, a 1000-hour simulated training dataset, synthesized with enhanced authenticity for real-world generalization, incorporating 15,000 real acoustic transfer functions. The tasks focus on single-device DASR, where multi-channel devices always share the same known geometry. This is aligned with common setups in actual conference rooms, and avoids technical complexities associated with multi-device tasks. It also allows for the development of geometry-specific solutions. The NOTSOFAR-1 Challenge aims to advance research in the field of distant conversational speech recognition, providing key resources to unlock the potential of data-driven methods, which we believe are currently constrained by the absence of comprehensive highquality training and benchmarking datasets. Index Terms: Speech recognition, speaker diarization, speech separation, far-field, close-talk annotation, NOTSOFAR. 1. Introduction Conversational speech recognition remains a formidable challenge, particularly in meeting scenarios where distant array devices are commonly employed for capturing speech. The distance between speakers and the microphones brings about substantial acoustic complexities including reverberation, variations in speaker distances and volumes, and background noises. These complexities are further amplified by the ever-changing positions of speakers and environmental conditions, altering the acoustic transfer functions (ATFs) [1] between speakers and microphones. Compounding these acoustic challenges are the dynamic aspects of conversations, which include speech overlap, interruptions, rapid changes in speakers, and non-verbal vocalizations [2]. With the emergence of Large Language Models (LLMs), conversational speech recognition has been infused with unprecedented practical importance. LLMs fed by speech recognition engines are redefining user-experience with capabilities 1 https://www.chimechallenge.org/current/ task2/index. 2 A GitHub link will be shared by Feb. 1 st . ranging from meeting summary, note taking and sentiment analysis, to personalized and context-aware responses to user queries. The foundation of these innovative features, particularly in meeting scenarios, lies in distant speaker diarization and automatic speech recognition (DASR) [3]. The field of conversational speech recognition has seen significant advancements thanks to numerous datasets such as AMI [4], ICSI [5], Sheffield Wargames [6], ASpiRE [7], DIRHA [8], VOiCES [9], DiPCo [10], Ego4D [11], AliMeeting [12], LibriCSS [13], and challenges such as CHiME [14, 15, 16, 17, 18, 19, 20]. However, they suffer from various limitations, particularly with respect to advancing DASR. The three most-similar corpora to our work, targeting general meeting scenarios with unsegmented recordings from a single device, are LibriCSS, AMI, and AliMeetings. LibriCSS makes a significant step forward by including unsegmented semi-real meetings and proposing to measure word error rate (WER) directly rather than signal-based metrics. They also provide matching fully simulated training data for speech separation. However, since their evaluation data has been obtained by playing LibriSpeech utterances via loudspeakers, it does not account for natural conversational dynamics or real-world acoustic complexities, such as time-varying ATFs. AMI makes an impressive contribution collecting 100 hours of real meeting recordings with close-talk annotations. However, its capacity to fully represent real-world complexities is hampered by several limitations. The recordings, confined to just three rooms and no more than four attendees, offer limited acoustic variety. Additionally, the development and evaluation sets consist of only 18 and 16 sessions, respectively. Such a small sample size introduces uncertainty in predicting realworld performance. For instance, a severe diarization error in just one session could significantly impact the overall score. AliMeetings collects a substantial number of real meeting recordings involving a large number of unique speakers. Yet, its focus on Mandarin recordings shifts the challenge more towards language and automatic speech recognition (ASR) aspects, rather than far-field acoustics and conversational dynamics. Furthermore, their test set consists of only 20 sessions, facing the same small-sample issue as AMI. Notably, neither AMI nor AliMeetings include a matching simulated training set, which hinders the application of data-driven front-ends. Addressing these gaps and several others, our main contributions are as follows: • A meeting dataset for benchmarking and training: Consisting of roughly 315 distinct meetings and carefully designed for benchmarking purposes. Meetings were recorded across a variety of rooms, while capturing a wide spectrum of real-world scenarios, covering both typical and rare ones, with up to 8 attendees per meeting. Advancing beyond past" 2401.08897v2,"CFASL: Composite Factor-Aligned Symmetry Learning for Disentanglement in Variational AutoEncoder Hee-Jun Jung 1 , Jaehyoung Jeong 1 and Kangil Kim 1∗ 1 Gwangju Institute of Science and Technology {jungheejun93, jaehyoung98}@gm.gist.ac.kr, kikim01@gist.ac.kr, Abstract Symmetries of input and latent vectors have provided valuable insights for disentanglement learning in VAEs. However, only a few works were proposed as an unsupervised method, and even these works require known factor information in training data. We propose a novel method, Composite Factor- Aligned Symmetry Learning (CFASL), which is integrated into VAEs for learning symmetry-based disentanglement in unsupervised learning without any knowledge of the dataset factor information. CFASL incorporates three novel features for learning symmetry-based disentanglement: 1) Injecting inductive bias to align latent vector dimensions to factor-aligned symmetries within an explicit learnable symmetry codebook 2) Learning a composite symmetry to express unknown factors change between two random samples by learning factoraligned symmetries within the codebook 3) Inducing group equivariant encoder and decoder in training VAEs with the two conditions. In addition, we propose an extended evaluation metric for multi-factor changes in comparison to disentanglement evaluation in VAEs. In quantitative and in-depth qualitative analysis, CFASL demonstrates a significant improvement of disentanglement in single-factor change, and multi-factor change conditions compared to state-of-the-art methods. 1 Introduction Disentangling representations by intrinsic factors of datasets is a crucial issue in machine learning literature [Bengio et al., 2013]. In Variational Autoencoder (VAE) frameworks, a prevalent method to handle the issue is to factorize latent vector dimensions to encapsulate specific factor information [Kingma and Welling, 2013; Higgins et al., 2017; Chen et al., 2018; Kim and Mnih, 2018; Jeong and Song, 2019; Shao et al., 2020; Shao et al., 2022]. Although their effective disentanglement learning methods, [Locatello et al., 2019] raises the serious difficulty of disentanglement without sufficient inductive bias. ∗ corresponding author In VAE literature, recent works using group theory offer a possible solution to inject such inductive bias by decomposing group symmetries [Higgins et al., 2018] in the latent vector space. To implement group equivariant VAE, [Winter et al., 2022a; Nasiri and Bepler, 2022] achieve the translation and rotation equivariant VAE. The other branch implements the group equivariant function [Yang et al., 2022; Keller and Welling, 2021a] over the pre-defined group elements. All of the methods effectively improve disentanglement by adjusting symmetries, but they focused on learning symmetries among observations to inject inductive bias rather than factorizing group elements to align them on a single factor and a single dimension changes, as introduced in the definition provided in [Higgins et al., 2018]. In current works, unsupervised learning approaches of group equivariant models are introduced. [Miyato et al., 2022; Quessard et al., 2020] represent the symmetries on the latent vector space, which correspond to the symmetries on the input space, by considering the sequential observations. Also, [Winter et al., 2022b] proposes the group invariant and equivariant representations with different modules to learn the different groups of dataset structure. However, these approaches, despite being unsupervised learning, require the factor information of the dataset to construct the sequential input and to set different modules for learning symmetries. This paper introduces a novel disentanglement method for Composite Factor-Aligned Symmetry Learning (CFASL) within VAE frameworks, aimed at addressing the challenges encountered in unsupervised learning scenarios, particularly the absence of explicit knowledge about the factor structure in datasets. Our methodology follow as 1) a network architecture to learn an explicit codebook of symmetries, responsible for each single factor change, called factor-aligned symmetries, 2) training losses to inject inductive bias to be an explicit codebook where each factor-aligned symmetry only impacts to a single dimension value of latent vectors for disentangled representations, 3) learning composite symmetries by prediction of single factor changes itself without information of factor labels for unsupervised learning, 4) implementing group equivariant encoder and decoder functions that factor-aligned symmetry affects latent vector space, 5) an extended metric (m-FVM k ) to evaluate disentanglement in the multi-factor change condition. We conduct quantitative and qualitative analyses of our method onn common benchmarks of disentanglement in" 2401.08898v1,"Published as a conference paper at ICLR 2024 B RIDGING S TATE AND H ISTORY R EPRESENTATIONS : U NDERSTANDING S ELF -P REDICTIVE RL Tianwei Ni ♣ , Benjamin Eysenbach ♠ , Erfan Seyedsalehi ♢∗ , Michel Ma ♣ , Clement Gehring ♣ , Aditya Mahajan ♢ , Pierre-Luc Bacon ♣ ♣ Mila, Université de Montréal, ♠ Princeton University, ♢ Mila, McGill University {tianwei.ni, michel.ma, clement.gehring, pierre-luc.bacon}@mila.quebec, eysenbach@princeton.edu, erfan.seyedsalehi@mail.mcgill.ca, aditya.mahajan@mcgill.ca A BSTRACT Representations are at the core of all deep reinforcement learning (RL) methods for both Markov decision processes (MDPs) and partially observable Markov decision processes (POMDPs). Many representation learning methods and theoretical frameworks have been developed to understand what constitutes an effective representation. However, the relationships between these methods and the shared properties among them remain unclear. In this paper, we show that many of these seemingly distinct methods and frameworks for state and history abstractions are, in fact, based on a common idea of self-predictive abstraction. Furthermore, we provide theoretical insights into the widely adopted objectives and optimization, such as the stop-gradient technique, in learning self-predictive representations. These findings together yield a minimalist algorithm to learn self-predictive representations for states and histories. We validate our theories by applying our algorithm to standard MDPs, MDPs with distractors, and POMDPs with sparse rewards. These findings culminate in a set of practical guidelines for RL practitioners. 1 1 I NTRODUCTION Reinforcement learning holds great potential to automatically learn optimal policies, mapping observations to return-maximizing actions. However, the application of RL in the real world encounters challenges when observations are high-dimensional and/or noisy. These challenges become even more severe in partially observable environments, where the observation (history) dimension grows over time. In fact, current RL algorithms are often brittle and sample inefficient in these settings (Wang et al., 2019; Stone et al., 2021; Tomar et al., 2021; Morad et al., 2023). To address the curse of dimensionality, a substantial body of work has focused on compressing observations into a latent state space, known as state abstraction in MDPs (Dayan, 1993; Dean & Givan, 1997; Li et al., 2006), history abstraction in POMDPs (Littman et al., 2001; Castro et al., 2009), and sufficient statistics or information states in stochastic control (Striebel, 1965; Kwakernaak, 1965; Bohlin, 1970; Kumar & Varaiya, 1986). Traditionally, this compression has been achieved through hand-crafted feature extractors (Sutton, 1995; Konidaris et al., 2011) or with the discovery of a set of core tests sufficient for predicting future observations (Littman et al., 2001; Singh et al., 2003). Modern approaches learn the latent state space using an encoder to automatically filter out irrelevant parts of observations (Lange & Riedmiller, 2010; Watter et al., 2015; Munk et al., 2016). Furthermore, deep RL enables end-to-end and online learning of compact state or history representations alongside policy training. As a result, numerous representation learning techniques for RL have surfaced (refer to Table 1), drawing inspiration from diverse fields within ML and RL. However, this abundance of methods may have inadvertently presented practitioners with a “paradox of choice”, hindering their ability to identify the best approach for their specific RL problem. This paper aims to offer systematic guidance regarding the essential characteristics that good representations should possess in RL (the “what”) and effective strategies for learning such representations (the “how”). We begin our analysis from first principles by comparing and connecting various representations proposed in prior works for MDPs and POMDPs, resulting in a unified view. Remarkably, ∗ 1 Work done while ES was at McGill University. Code is available at https://github.com/twni2016/self-predictive-rl. 1" 2401.08899v1,"Landscape of Generative AI in Global News: Topics, Sentiments, and Spatiotemporal Analysis Lu Xian 1 * , Lingyao Li 1 * , Yiwei Xu 2 , Ben Zefeng Zhang 1 , Libby Hemphill 1 1 School of Information, University of Michigan Information School, University of Washington xianl@umich.edu, lingyaol@umich.edu, yiweixu@uw.edu, bzfzhang@umich.edu, libbyh@umich.edu 2 Abstract Generative AI has exhibited considerable potential to transform various industries and public life. The role of news media coverage of generative AI is pivotal in shaping public perceptions and judgments about this significant technological innovation. This paper provides in-depth analysis and rich insights into the temporal and spatial distribution of topics, sentiment, and substantive themes within global news coverage focusing on the latest emerging technology –generative AI. We collected a comprehensive dataset of news articles (January 2018 to November 2023, N = 24,827). For topic modeling, we employed the BERTopic technique and combined it with qualitative coding to identify semantic themes. Subsequently, sentiment analysis was conducted using the RoBERTa-base model. Analysis of temporal patterns in the data reveals notable variability in coverage across key topics–business, corporate technological development, regulation and security, and education–with spikes in articles coinciding with major AI developments and policy discussions. Sentiment analysis shows a predominantly neutral to positive media stance, with the business-related articles exhibiting more positive sentiment, while regulation and security articles receive a reserved, neutral to negative sentiment. Our study offers a valuable framework to investigate global news discourse and evaluate news attitudes and themes related to emerging technologies. Introduction Media plays an important role in disseminating information to the public and shaping their perceptions of emerging technologies (Brossard 2013). News reporting on artificial intelligence (AI)-related content can help foster essential technology literacy among the general public (Nguyen and Hekman 2022). Studying generative AI is crucial, not only for its advanced capabilities and applications beyond traditional machine learning technologies but also due to the emerging challenges and societal implications, which require specialized understanding and careful scrutiny. Despite the significant potential of Generative AI to transform various of industries and aspects of public life(Marr 2023), public understanding of this emerging technology remains nascent. By analyzing news media coverage of generative AI, researchers can understand how the public is exposed to media * These authors contributed equally. interpretations of data and events related to this innovative technology, and how this may form public opinions or judgments about generative AI. In the realm of AI-related news, prior research has investigated the broader context of AI news, often emphasizing Western mainstream media outlets. However, the investigation into the reporting of Generative AI news remains understudied, particularly from a global perspective (Sun et al. 2020; Chuan, Tsai, and Cho 2019). As a result, the global media’s response to the rapidly evolving generative AI industry remains unclear. Our work aims to bridge these gaps by analyzing a large corpus of global AI-related news coverage. This study also seeks to illuminate the general public’s exposure, sentiment, and perceptions toward the latest advancements in innovative technology. Our analysis is based on a large-scale dataset consisting of English-language news articles about large language models (LLMs) published by a total of 703 US national, US local, and international news outlets. This dataset includes over 24,827 articles collected over a period of 70 months, from January 2018 to November 2023, allowing for a comprehensive analysis of the evolution and impact of LLMs since their conception. To the best of our knowledge, our data represents the most comprehensive and current news resource available, capturing the global discourse surrounding LLMs. In this paper, we address the following research questions: RQ1: After the emergence of Generative AI, what topics do news articles about it focus on, and how does the quantity of news articles on these topics vary temporally and spatially? RQ2: How does the sentiment of news articles about Generative AI vary across topics and the different categories of news outlets? RQ3: What are the most popular topics covered by Generative AI news with positive sentiment? We found that after the introduction of ChatGPT in late 2022, news coverage of generative AI has been marked by temporal and spatial variabilities in the number of news articles. Those trends coincide with major events regarding technological development and specific interests. Our sentiment analysis reveals that generative AI is predominantly portrayed in a neutral to positive light, echoing the optimistic tone towards emerging technologies consistently documented in prior research (Garvey and Maskal 2020; Fast" 2401.08901v1,"HasTEE + : Confidential Cloud Computing and Analytics with Haskell Abhiroop Sarkar [0000−0002−8991−9472] and Alejandro Russo [0000−0002−4338−6316] Chalmers University, Gothenburg, Sweden {sarkara,russo}@chalmers.se Abstract. Confidential computing is a security paradigm that enables the protection of confidential code and data in a co-tenanted cloud deployment using specialized hardware isolation units called Trusted Execution Environments (TEEs). By integrating TEEs with a Remote Attestation protocol, confidential computing allows a third party to establish the integrity of an enclave hosted within an untrusted cloud. However, TEE solutions, such as Intel SGX and ARM TrustZone, offer low-level C/C++-based toolchains that are susceptible to inherent memory safety vulnerabilities and lack language constructs to monitor explicit and implicit information-flow leaks. Moreover, the toolchains involve complex multi-project hierarchies and the deployment of hand-written attestation protocols for verifying enclave integrity. We address the above with HasTEE + , a domain-specific language (DSL) embedded in Haskell that enables programming TEEs in a high-level language with strong type-safety. HasTEE + assists in multi-tier cloud application development by (1) introducing a tierless programming model for expressing distributed client-server interactions as a single program, (2) integrating a general remote-attestation architecture that removes the necessity to write application-specific cross-cutting attestation code, and (3) employing a dynamic information flow control mechanism to prevent explicit as well as implicit data leaks. We demonstrate the practicality of HasTEE + through a case study on confidential data analytics, presenting a data-sharing pattern applicable to mutually distrustful participants and providing overall performance metrics. Keywords: Confidential Computing · Trusted Computing · Trusted Execution Environments · Information Flow Control · Attestation · Haskell. 1 Introduction Confidential computing [28] is an emerging security paradigm that ensures the isolation of sensitive computations and data during processing, shielding them from potential threats within the underlying infrastructure. It accomplishes this by employing specialised hardware isolation units known as Trusted Execution Environments (TEEs). A TEE unit, such as the Intel SGX [24] or ARM Trust- Zone [1], provides a disjoint region of code and data memory that allows for" 2401.08921v1,"1 Electromagnetic Information Theory: Fundamentals and Applications for 6G Wireless Communication Systems Cheng-Xiang Wang, Fellow, IEEE, Yue Yang, Jie Huang, Member, IEEE, Xiqi Gao, Fellow, IEEE, Tie Jun Cui, Fellow, IEEE, and Lajos Hanzo, Life Fellow, IEEE Abstract—In wireless communications, electromagnetic theory and information theory constitute a pair of fundamental theories, bridged by antenna theory and wireless propagation channel modeling theory. Up to the fifth generation (5G) wireless communication networks, these four theories have been developing relatively independently. However, in sixth generation (6G) spaceair-ground-sea wireless communication networks, seamless coverage is expected in the three-dimensional (3D) space, potentially necessitating the acquisition of channel state information (CSI) and channel capacity calculation at anywhere and any time. Additionally, the key 6G technologies such as ultra-massive multipleinput multiple-output (MIMO) and holographic MIMO achieves intricate interaction of the antennas and wireless propagation environments, which necessitates the joint modeling of antennas and wireless propagation channels. To address the challenges in 6G, the integration of the above four theories becomes inevitable, leading to the concept of the so-called electromagnetic information theory (EIT). In this article, a suite of 6G key technologies is highlighted. Then, the concepts and relationships of the four theories are unveiled. Finally, the necessity and benefits of integrating them into the EIT are revealed. Index Terms—Electromagnetic information theory, Maxwell’s equations, radio channel models, channel capacity, 6G wireless communications. I. I NTRODUCTION The sixth generation (6G) technologies are in the preliminary stages of exploration. The research, development, and standardization of 6G technologies require major theoretical breakthroughs. Electromagnetic theory and information theory constitute a pair of pivotal theories in wireless communications. They are intricately interlinked by wireless propagation channel modeling theory and antenna theory. Electromagnetic theory describes the generation and propagation of electromagnetic waves, while information theory quantifies the amount of information transmitted. Wireless propagation channel modeling theory characterizes the wireless propagation channels between the transmitter (Tx) and receiver (Rx), excluding C.-X. Wang (corresponding author), Y. Yang, J. Huang, and X. Q. Gao are with the National Mobile Communications Research Laboratory, School of Information Science and Engineering, Southeast University, Nanjing 210096, China, and also with the Purple Mountain Laboratories, Nanjing 211111, China (email: {chxwang, yueyang, j huang, xqgao}@seu.edu.cn). T. J. Cui is with the State Key Laboratory of Millimeter Wave, School of Information Science and Engineering, Southeast University, Nanjing 210096, China (e-mail: tjcui@seu.edu.cn). L. Hanzo is with the School of Electronics and Computer Science, University of Southampton, Southampton, U.K. (e-mail: lh@ecs.soton.ac.uk). the Tx and Rx antennas. As a further pivotal component, antenna theory considers the design, analysis, and characterization of antennas. Finally, the wireless propagation channel links the Tx and Rx antennas and carries information via electromagnetic waves, acting as the bridge connecting the four theories. The integration of the four theories is termed as electromagnetic information theory (EIT), which was first proposed in [1] and [2] with the objective of analyzing the constraints and limitations of information transmission caused by electromagnetism. Then, harnessing hitherto unexploited dimensions of electromagnetic waves, such as orbital angular momentum (OAM), constitutes a compelling application of EIT. Furthermore, the employment of metamaterials relying on the marriage of physical and mathematical principles promotes the further development of EIT [3]. The EIT-based system model for multiple-input multiple-output (MIMO) systems may, however, fail to obey some conventional assumptions of wireless communications [4]. In summary, EIT attempts to model general channels in a comprehensive manner. Some recent advances and open problems of EIT were shown in [5]. Up to the fifth generation (5G) wireless communication networks, these four theories have been developing relatively independently. However, 6G aims for supporting the intelligent Internet of everything. Furthermore, 6G will fully utilize all the frequency bands, spanning from sub-6 GHz to optical wireless bands. In terms of coverage, 6G will be extended from local terrestrial coverage to space-air-ground-sea global coverage. Furthermore, 6G will intrinsically amalgamate technologies such as integrated sensing and communication (ISAC), ultramassive MIMO, holographic MIMO schemes, and reconfigurable intelligent surfaces (RISs), aiming for the provision in support of intelligent and secure networks. In short, the 6G visions can be summarized as global coverage, all spectra, full applications, and strong security [6]. Correspondingly, 6G channels can be summarized as all frequency band channels, global coverage scenario channels, and full application scenario channels [7]. In 6G space-air-ground-sea wireless communication networks, the base stations (BSs) may be mobile in low-earth orbit (LEO) satellite and vehicular communications. Hence, the underlying wireless channels tend to be of three-dimensional (3D) mature in space, potentially necessitating the acquisition of the channel state information (CSI) and channel capacity calculation at any location in the 3D space. The underlying electromagnetic theory relies on continuous time and space," 2401.08922v1,"Post-Pandemic Hybrid Work in So�ware Companies: Findings from an Industrial Case Study University of Calgary & CESAR Calgary, AB, Canada ronnie.desouzasantos@ucalgary.com Ronnie de Souza Santos Willian Grillo CESAR Recife, PE, Brazil wng@cesar.org.br Djafran Cabral Catarina de Castro Nicole Albuquerque Cesar França CESAR Recife, PE, Brazil ccmk@cesar.org.br CESAR Recife, PE, Brazil nicole.pereira@cesar.org.br CESAR Recife, PE, Brazil dac@cesar.org.br CESAR Recife, PE, Brazil franssa@cesar.org.br ABSTRACT 1 Context. Software professionals learned from their experience during the pandemic that most of their work can be done remotely, and now software companies are expected to adopt hybrid work models to avoid the resignation of talented professionals who require more �exibility and work-life balance. However, hybrid work is a spectrum of �exible work arrangements, and currently, there are no well-established hybrid work con�gurations to be followed in the post-pandemic period. Goal. We investigated how software engineers are experiencing the post-pandemic hybrid work landscape, aiming to understand the factors that in�uence their choices between remote and in-o�ce work. Method. We explored a large South American company by collecting quantitative and qualitative data from 545 software professionals who are currently navigating diverse hybrid work arrangements tailored to their individual and team requirements. Findings. Our study revealed an array of factors that signi�cantly impact hybrid work within the software industry, including individual preferences, work-life balance, commute time, social interactions, productivity, and more. Team dynamics, project demands, client expectations, and organizational strategies also play an important role in shaping the complex landscape of hybrid work con�gurations in software engineering. Conclusions. In summary, the success of hybrid work models depends on balancing individual preferences, team dynamics, and organizational strategies. Our study demonstrated that, at present, there is no onesize-�ts-all individuals approach to hybrid work in the software industry. The COVID-19 pandemic became one of the most devastating events in the history of humankind. As the virus spread across the globe, it forced society to �nd alternative ways to keep functioning [42]. In particular, remote work became one of the only alternatives for organizations. In this process, many professionals had to deal with working challenges when adjusting their homes to unconventional daily routines, e.g., working in improvised home o�ces, sharing the space with family members, or juggling work with childcare. [4, 6, 9, 29]. After months of restrictions, when the pandemic was under control, many companies started asking employees to return to their o�ces; however, professionals adapted to the challenges experienced at the beginning of the pandemic, and the idea of returning to an o�ce routine was no longer attractive [5]. In the software industry, the plans to return to the o�ce triggered di�erent feelings among software engineers. Some were keen; others were trepidatious, but most were convinced by personal experience that their work could be done remotely. Therefore, they expect to continue working from home some or all the time [30, 35]. Software professionals have several reasons to maintain remote work structures, including more time for personal responsibilities (e.g., parenting), no commuting [18, 33], and more opportunities for people from underrepresented groups [12, 13]. Thus, many of them, when pressed to return to the o�ce, have quit in favor of more �exible jobs [1]. Consequently, many software companies are adopting hybrid work to allow employees to work partly remotely and avoid the resignation of talented professionals[23]. The software industry has a history of geographically distributed teams and appears to be more accepting of new work arrangements [14, 33]. However, hybrid work di�ers from global software development, which is mainly focused on an onshore organization outsourcing to o�shore partners [11]. Hybrid work is a spectrum of �exible work arrangements [37], in which employees usually belong to the same organization and mostly live in the same region where the o�ce is (i.e., no outsourcing); they simply choose not to work in the o�ce every day [11, 14]. In this study, we investigated how software professionals are experiencing post-pandemic hybrid work by exploring the case of a large South American software company that adopted a hybridwork model, i.e., professionals can decide if and when they are going KEYWORDS software professionals, hybrid work, post-pandemic, case study ACM Reference Format: Ronnie de Souza Santos, Willian Grillo, Djafran Cabral, Catarina de Castro, Nicole Albuquerque, and Cesar França. 2024. Post-Pandemic Hybrid Work in Software Companies: Findings from an Industrial Case Study. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn Conference’17, July 2017, Washington, DC, USA 2024. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn INTRODUCTION" 2401.08943v1,"Fluid Dynamic DNNs for Reliable and Adaptive Distributed Inference on Edge Devices Lei Xun* † , Mingyu Hu* † , Hengrui Zhao † , Amit Kumar Singh ‡ , Jonathon Hare † , Geoff V. Merrett † † School of Electronics and Computer Science, University of Southampton, UK ‡ School of Computer Science and Electronic Engineering, University of Essex, UK Email: {l.xun, mh1u20, hz20u22}@soton.ac.uk, a.k.singh@essex.ac.uk, {jsh2, gvm}@ecs.soton.ac.uk * Equal Contributions Abstract—Distributed inference is a popular approach for efficient DNN inference at the edge. However, traditional Static and Dynamic DNNs are not distribution-friendly, causing system reliability and adaptability issues. In this paper, we introduce Fluid Dynamic DNNs (Fluid DyDNNs), tailored for distributed inference. Distinct from Static and Dynamic DNNs, Fluid DyDNNs utilize a novel nested incremental training algorithm to enable independent and combined operation of its sub-networks, enhancing system reliability and adaptability. Evaluation on embedded Arm CPUs with a DNN model and the MNIST dataset, shows that in scenarios of single device failure, Fluid DyDNNs ensure continued inference, whereas Static and Dynamic DNNs fail. When devices are fully operational, Fluid DyDNNs can operate in either a High-Accuracy mode and achieve comparable accuracy with Static DNNs, or in a High-Throughput mode and achieve 2.5x and 2x throughput compared with Static and Dynamic DNNs, respectively. Index Terms—Fluid Dynamic DNNs, Distributed Inference I. I NTRODUCTION DNN inference is increasingly being executed on edge devices due to advantages of latency, privacy and alwayson availability. However, DNNs are computationally intensive, which makes efficient edge deployments a challenge [1]. Previous works have addressed this challenge through static model compression to fit DNNs into available hardware resources [2], and Dynamic DNNs [3]–[6] (Fig. 1a) which contain multiple switchable sub-networks with different widths and latency/accuracy trade-offs. They can adapt to dynamically changing available hardware resources at runtime. Distributed inference is an orthogonal approach, which partitions a DNN into sub-tasks and deploys them on multiple devices for parallel computing. Existing works mostly follow a distributed framework in which one device is selected as the Master for making decisions of partitioning and distribution, while other devices used as Worker for receiving and executing the workloads [7], [8]. However, existing Static and Dynamic DNNs (Fig. 1a) are not distribution-friendly in this framework due to the high dependencies between their sub-networks to get correct inference, leading to low adaptability on device usage. Meanwhile, physical devices in a distributed system could completely fail due to factors such as power outages and hardware/software failures, leading to reliability issues [9]. When the Worker fails (Fig. 1b), the Static DNNs on the Master also fail because it doesn’t have enough resources on its own. In contrast, the Dynamic DNNs can adapt by switching to a smaller sub-network (e.g. 50% model) on the Master. This allows it to keep the expected performance with a temporary accuracy loss. However, when the Master fails (Fig. 1c), the Dynamic DNN A B A Static DNN Fluid Dynamic DNN A B C A B C D C* 75% 100% Upper 25% C* D* (a) 25% 50% (c) Master (left) device fails (b) Worker (right) device fails Static A B C D Dynamic A B Upper 50% C* D* Fluid Work independently A B Static C D Dynamic A B Fluid C* D* Can’t work Fig. 1. (a) Overview of three types of DNN model (b) under worker device failure and (c) master device failure scenarios of distributed DNN inference. Static and Dynamic DNNs on the Worker fail too because these model weights cannot be used independently. To further address the system reliability and adaptability issues, we introduce Fluid DyDNNs, and the main contributions of this paper are: • A Fluid DyDNN model trained by a novel nested incremental training algorithm, reducing dependencies between sub-networks and enhancing reliability and adaptability. • Experimental results show it can maintain inference during single-device failures. With both devices online, it can adapt to either match Static DNNs’ accuracy or improve throughput by up to 2.5x with temporary accuracy loss. II. F LUID D YNAMIC N EURAL N ETWORKS Fluid DyDNNs (Fig. 1a) reduce the dependencies between their sub-networks. Unlike traditional Dynamic DNNs, where larger sub-networks contain and depend on the weights of smaller ones, Fluid DyDNNs operate with a modular design. This design has discrete sub-networks, in an example of 4 subnetworks, the additional upper 25% and 50% model derive their weights from the 50-75% and 50-100% model, respectively. These sub-networks can function autonomously or be integrated with the lower 50% model to enhance accuracy, forming more accurate 75% and 100% models. A. Nested Incremental Training To train a Fluid DyDNN model, we introduce a novel nested incremental training method outlined in Algorithm 1, with an example of 4 sub-networks but it is applicable to any number. Initially, A Dynamic DNN with 4 sub-networks (i.e. [25%, 50%, 75%, 100%] models) is first trained incrementally as the base model (line 2-5), then a nested Dynamic DNN (upper 25% and upper 50% models) is trained incrementally so they can be used independently (line 6-10). Reusing the weights from the" 2401.08947v2,"Article AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URL Detection Saba Aslam 1,2 , Hafsa Aslam 3 , Arslan Manzoor , Chen Hui 4 5, *, Abdur Rasool 1, * Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China Shenzhen College of Advanced Technology, University of Chinese Academy of Sciences, Shenzhen 518055, China 3 Dibris Polytechnic Interschool Section, University of Genoa, Genoa, Italy 4 Department of Mathematics and Informatics, University of Catania, Catania, Italy 5 Shenzhen Polytechnic University, Shenzhen, 518055, Guangdong, China * Correspondence: hui.chen1@siat.ac.cn (C.H.), rasool@siat.ac.cn (A.R.) 1 2 Citation: Lastname, F.; Lastname, F.; Lastname, F. Title. Symmetry 2023, Abstract: The escalating reliance on revolutionary online web services has introduced heightened security risks, with persistent challenges posed by phishing despite extensive security measures. Traditional phishing systems, reliant on machine learning and manual features, struggle with evolving tactics. Recent advances in deep learning offer promising avenues for tackling novel phishing challenges and malicious URL. This paper introduces a two-phase stack generalized model named AntiPhishStack, designed to detect phishing sites. The model leverages the learning of URL and character-level TF-IDF features symmetrically, enhancing its ability to combat emerging phishing threats. In Phase I, features are trained on a base machine learning classifier, employing K-fold crossvalidation for robust mean prediction. Phase II employs a two-layered stacked-based LSTM network with five adaptive optimizers for dynamic compilation, ensuring premier prediction on these features. Additionally, the symmetrical predictions from both phases are optimized and integrated to train a meta-XGBoost classifier, contributing to a final robust prediction. The significance of this work lies in advancing phishing detection with AntiPhishStack, operating without prior phishingspecific feature knowledge. Experimental validation on two benchmark datasets, comprising benign and phishing or malicious URL, demonstrates the model's exceptional performance, achieving a notable 96.04% accuracy compared to existing studies. This research adds value to the ongoing discourse on symmetry and asymmetry in information security and provides a forward-thinking solution for enhancing network security in the face of evolving cyber threats. 10, x. https://doi.org/10.3390/xxxxx Academic Editor: Firstname Last- name Keywords: Phishing Detection, Stack Generalization, LSTM Networks, Anti-Phishing, Malicious URL Received: date Accepted: date Published: date 1. Introduction Publisher's Note: MDPI stays neutral Phishing, a deceptive method through social and technical engineering, poses a severe threat to online security, aiming to obtain illicit user identities, personal account details, and bank credentials [1]. It's a primary concern within criminal activity, with phishers pursuing objectives such as selling stolen identities, extracting cash, exploiting vulnerabilities, or deriving financial gains [2, 3]. The nuanced landscape of phishing techniques showcasing symmetry and asymmetry includes algorithms, domain spoofing, HTTPS phishing, SMS phishing, link handling, email phishing, and pop-ups. Attributes such as prefixes, suffixes, subdomain, IP address, URL length, '@' symbol, spear phishing, dualslash attributes, port, HTTPS token, request URL, URL-anchor, tag-links, and domain age contribute to the multifaceted nature of phishing attacks [4]. Phishing perpetrators adeptly mimic legitimate websites, particularly those related to online banking and e- with regard to jurisdictional claims in published maps and institutional af- filiations. Copyright: © 2022 by the authors. Submitted for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/license s/by/4.0/). Mathematics 2022, 10, x. https://doi.org/10.3390/xxxxx www.mdpi.com/journal/mathematics" 2401.08964v1,"E VIDENCE - CENTERED A SSESSMENT FOR W RITING WITH G ENERATIVE AI Yixin Cheng Monash University yixin.cheng@monash.edu Guanliang Chen Monash University guanliang.chen@monash.edu Kayley Lyons University of Melbourne kayley.lyons@unimelb.edu.au Dragan Gašević Monash University dragan.gasevic@monash.edu Zachari Swiecki Monash University zach.swiecki@monash.edu A BSTRACT We propose a learning analytics-based methodology for assessing the collaborative writing of humans and generative artificial intelligence. Framed by the evidence-centered design, we used elements of knowledge-telling, knowledge transformation, and cognitive presence to identify assessment claims; we used data collected from the CoAuthor writing tool as potential evidence for these claims; and we used epistemic network analysis to make inferences from the data about the claims. Our findings revealed significant differences in the writing processes of different groups of CoAuthor users, suggesting that our method is a plausible approach to assessing human-AI collaborative writing. Keywords Generative Artificial Intelligence · Assessment · Evidence-centered Design · Epistemic Network Analysis 1 Introduction Effectively communicating ideas via writing is a critical human skill. Every day, many of us send text messages, draft emails, and make notes; in many specialised domains, such as research, writing is a core form of discourse. The process of writing has, of course, changed over time; writing tools have transformed from mere storage receptacles to tools that help us craft more effective writing, such as word processors, spellcheckers, and grammar checkers [1]. Recently, however, there has been a step-change in tools for writing. Whereas prior tools helped us to save and process our own writing, tools-based on generative artificial intelligence (GAI) can now compose writing for us. This technological advance has already had far reaching implications for society. Arguably, these implications have been—and will continue to be—the most profound for education. Education relies, in part, on assessment. Broadly speaking, we want students to learn skills that will be valuable to their well-being and the well-being of society. But to know and communicate whether learning has occurred, we need to be able to evidence that learning. Assessments are the structures that make such inferences about learning possible [2]. A key feature of assessments is that they assign credit to both pragmatic actions—actions that advance toward a goal state—and epistemic actions—actions that reduce cognitive effort [3]. However, when students use tools like ChatGPT [4] to help them write, these actions are mixed between the human and the tool [5], making the assignment of credit difficult. How, for example, should a teacher assess writing crafted partly by a human and partly by AI? In the last year, educational institutions across the world have scrambled to put policies in place that seek to address questions like the one above. For example, the Tertiary Education Quality and Standards Agency (TEQSA), responsible for regulating and the quality of all providers of higher education in Australia, recently convened a panel of experts to produce a whitepaper on “assessment reform in the age of artificial intelligence” that outlines broad changes institutes of higher education will be expected to make in response to AI [6]. Rather than cut students off from AI, its authors argue that assessments should prepare students for a world where collaboration with AI is commonplace by redesigning assessments to emphasize: (a) appropriate and authentic engagement with AI; (b) the process of learning; and (c) opportunities for students to work with each other and AI." 2401.08965v1,"Dynamic DNNs and Runtime Management for Efficient Inference on Mobile/Embedded Devices Lei Xun Advisor: Jonathon Hare, Geoff V. Merrett School of Electronics & Computer Science University of Southampton, UK l.xun@soton.ac.uk School of Electronics & Computer Science University of Southampton, UK {jsh2, gvm}@ecs.soton.ac.uk Runtime Hardware Availability: Modern System-on- Chips (SoCs), comprising CPUs, GPUs, and NPUs, face challenges due to the varying availability of hardware resources at runtime. This fluctuation arises from different core combinations and changes in voltage and clock frequencies. While static model compression can initially optimize DNN models to fit on targeted hardware and meet performance goals, the issue is the unpredictable availability of these resources during runtime. Different and dynamic workloads on SoCs make it hard to consistently meet performance targets, as the hardware resources available to DNN models change and are unknown during the initial compression [33, 12, 2, 3]. • Runtime Application Variability: A single DNN model, such as large language models (LLMs), can serve as the backbone for various applications like translation, text generation, and ChatBot, each requiring different performance trade-offs. For example, a ChatBot needs LLMs to have low latency for quick responses, whereas translation and text generation need LLMs to focus on accuracy. These performance targets can also change through user settings/preferences at runtime, posing a significant challenge in the design stage. The current solution of using multiple static models with different performance trade-offs is not feasible for mobile and embedded platforms due to limited memory resources. An ideal approach would be a single, adaptable DNN model that dynamically adjusts its performance trade-offs to meet the specific requirements of each application and user at runtime. Application layer Dynamic DNN Model 1 Sub-network configurations Dynamic DNN Model 2 Application monitor Accuracy, Latency Runtime management layer Hierarchical RTM DVFS, Task mapping Multi-DNN RTM Device monitor Deep neural network (DNN) inference is increasingly being executed on mobile and embedded platforms [6, 40] due to several key advantages in latency [26, 36], privacy [9] and always-on availability [26, 24]. However, efficient DNN deployment on mobile and embedded platforms is challenging due to limited computing resources [21, 1]. Although many hardware accelerators [10, 8, 18, 17, 14] and static model compression methods [35, 11] were proposed by previous works, at system runtime, multiple applications are typically executed concurrently and compete for hardware resources. This raises two main challenges: II. R UNTIME S YSTEM - LEVEL P ERFORMANCE T RADE - OFF M ANAGEMENT Application knob I. I NTRODUCTION Device knob DATE PhD Forum 2024 • Temperature, Power Device layer CPU GPU Fig. 1. The high-level diagram of the proposed runtime system, which contains three abstract layers that are connected through knobs and monitors. Previous works have addressed aforementioned challenges through dynamic neural networks that contain sub-networks with different performance trade-offs [22, 28, 39, 38, 37, 34] or runtime hardware resource management [16, 4, 20, 19, 27]. We proposed a combined method [32, 33], a system was developed for DNN performance trade-off management, combining the runtime trade-off opportunities in both algorithms and hardware (Fig 1). The runtime system contains three abstract layers which are connected through knobs and monitors. Application layers contain multiple concurrent dynamic neural networks. The device layer is mobile and embedded heterogeneous SoCs. The runtime management layer is the highest-level layer with central control algorithms for tuning both application knobs (i.e. dynamic DNN sub-networks), and device knobs (e.g. DVFS and task mapping) to meet dynamically changing application performance targets and hardware constraints which are both monitored in real-time. The key contribution of our works [32, 33, 30, 31, 29] is systemlevel performance trade-off management, the application layer and runtime management layer are co-designed based on the characterisation of the underlay hardware platforms to boost the space and granularity of performance trade-offs. This is different to the previous works which only focus on standalone system components while isolating others." 2401.08967v1,"R E FT: Reasoning with R E inforced Fine-Tuning Trung Quoc Luong ∗ , Xinbo Zhang ∗ , Zhanming Jie * , Peng Sun † , Xiaoran Jin, Hang Li ByteDance Research {trung.luong, zhangxinbo.freya, allan}@bytedance.com {wanhesong, xiaoran.jin, lihang.lh}@bytedance.com Abstract One way to enhance the reasoning capability of Large Language Models (LLMs) is to conduct Supervised Fine-Tuning (SFT) using Chain-of- Thought (CoT) annotations. This approach does not show sufficiently strong generalization ability, however, because the training only relies on the given CoT data. In math problemsolving, for example, there is usually only one annotated reasoning path for each question in the training data. Intuitively, it would be better for the algorithm to learn from multiple annotated reasoning paths given a question. To address this issue, we propose a simple yet effective approach called Reinforced Fine-Tuning (ReFT) to enhance the generalizability of learning LLMs for reasoning, with math problemsolving as an example. ReFT first warmups the model with SFT, and then employs on-line reinforcement learning, specifically the PPO algorithm in this paper, to further fine-tune the model, where an abundance of reasoning paths are automatically sampled given the question and the rewards are naturally derived from the ground-truth answers. Extensive experiments on GSM8K, MathQA, and SVAMP datasets show that ReFT significantly outperforms SFT, and the performance can be potentially further boosted by combining inference-time strategies such as majority voting and re-ranking. Note that ReFT obtains the improvement by learning from the same training questions as SFT, without relying on extra or augmented training questions. This indicates a superior generalization ability for ReFT. The code of this work is publicly available 1 . 1 Introduction The state-of-the-art approaches to solving math problems (Uesato et al., 2022; Luo et al., 2023; Wang et al., 2023a) employ Supervised Fine- * indicates equal contribution, † indicates corresponding author 1 https://github.com/lqtrung1998/mwp_ReFT Question (x): Weng earns $12 an hour for babysitting. Yesterday, she just did 50 minutes of babysitting. How much did she earn? Chain-of-Thought (e): We need to calculate her hourly rate and then multiply it by the amount of time she worked. First, we need to convert 50 minutes to hours. There are 60 minutes in an hour, so 50 minutes is equal to 50/60 = 5/6 hours. Next, we can calculate Weng's earnings by multiplying her hourly rate by the amount of time she worked: $12/hour x 5/6 hour = $10. Therefore, Weng earned $10 for 50 minutes of babysitting. The answer is 10. Answer (y): 10 Model Supervised Fine-Tuning {(x, e, y)} , y)} {(x, e SFT Epochs chs FT Epo S {(x, SFT Warm-up Reinforced Fine-Tuning y == y' ? question On-Policy Sampling (x, e', y') Reinforcement Learning e, y )} Epoc hs Final Policy Golden Reward Figure 1: An example of question (x), CoT (e), and answer (y) in GSM8K (Cobbe et al., 2021a). The SFT process iterates several epochs on the training data. The proposed ReFT warm-up from SFT and performs RL training on the same data. Tuning (SFT) to train the models using Chain-of- Thought (CoT) annotations (Wei et al., 2022). As shown in Figure 1, a CoT annotation outlines the intermediate reasoning steps toward solving a math problem. Usually there is one CoT annotation for each question in the training data, i.e., one correct reasoning path, which is utilized in SFT. We observe that this may result in relatively weak generalization abilities of the SFT models. It is often the case that multiple valid CoT annotations exist for the same question (Cobbe et al., 2021a; Zhang et al., 2023), underscoring the need for a more powerful fine-tuning approach. To address this problem, we propose a simple yet effective approach called Reinforced Fine-Tuning (ReFT), depicted in the lower part of Figure 1. ReFT commences with a warm-up stage involving Supervised Fine-Tuning (SFT) in one or two epochs (Figure 1, shaded box). This initial stage" 2401.08976v1,"ACT-GAN: Radio map construction based on generative adversarial networks with ACT blocks 1 Qi Chen a , Jingjing Yang a, b, * , Ming Huang a, b,* , and Qiang Zhou a a School of Information, Yunnan University, Kunming, PR China Key Laboratory of Spectral Sensing and Radio Monitoring, Yunnan University, Kunming, PR China b Abstract. The radio map, serving as a visual representation of electromagnetic spatial characteristics, plays a pivotal role in assessment of wireless communication networks and radio monitoring coverage. Addressing the issue of low accuracy existing in the current radio map construction, this paper presents a novel radio map construction method based on generative adversarial network (GAN) in which the Aggregated Contextual-Transformation (AOT) block, Convolutional Block Attention Module (CBAM), and Transposed Convolution (T-Conv) block are applied to the generator, and we name it as ACT-GAN. It significantly improves the reconstruction accuracy and local texture of the radio maps. The performance of ACT-GAN across three different scenarios is demonstrated. Experiment results reveal that in the scenario without sparse discrete observations, the proposed method reduces the root mean square error (RMSE) by 14.6% in comparison to the state-of-the-art models. In the scenario with sparse discrete observations, the RMSE is diminished by 13.2%. Furthermore, the predictive results of the proposed model show a more lucid representation of electromagnetic spatial field distribution. To verify the universality of this model in radio map construction tasks, the scenario of unknown radio emission source is investigated. The results indicate that the proposed model is robust radio map construction and accurate in predicting the location of the emission source. Keywords: Radio map construction, generative adversarial network, sparse sampling, robustness 1. Introduction Radio map characterizes the field distribution information of electric waves in electromagnetic space, which can be expressed in terms of electric field distribution, power spectral density (PSD) distribution, and path loss (PL). It is a quantitative description of electromagnetic wave propagation from multiple dimensions such as time, spectrum, space, and power. In the field of wireless communications, the construction of radio maps is closely related to wireless communication network planning and radio management [5-8; 17; 19]. Additionally, radio map finds applications in the fields of wireless localization [3], unmanned aerial vehicle (UAV) path planning [4; 18; 20; 28], and 1 autonomous driving [10; 14]. Therefore, the pursuit of constructing a high-precision radio map construction is currently a research hotspot. The common radio map construction approach is to use the PSD values of the known locations to interpolate the PSD values of the unknown location. These methods include Inverse Distance Weighted (IDW) interpolation [12], Kriging interpolation [1], Radial Basis Function (RBF) interpolation [11], and Model- Based Interpolation (MBI) [27]. Since these algorithms are primarily based on sampling, they often neglect the underlying principles of radio wave propagation. Consequently, they do not require the prior knowledge of physical parameters, such as the location, number and power of emission sources, making This research was funded by the National Natural Science Foundation of China (62361055, 61963037, 62261059) and the Fifteenth Graduate Student Research and Innovation Program of Yunnan University (KC-23234401) * Corresponding author. Jingjing Yang, E-mail: yangjingjing@ynu.edu.cn.; Ming Huang, E-mail: Huang Ming huangming@ynu.edu.cn." 2401.08988v1,"D ECENT -BRM: D ECENTRALIZATION THROUGH B LOCK R EWARD M ECHANISMS A P REPRINT Varul Srivastava Machine Learning Lab IIIT Hyderabad varul.srivastava@research.iiit.ac.in Dr. Sujit Gujar Machine Learning Lab IIIT Hyderabad sujit.gujar@iiit.ac.in January 18, 2024 A BSTRACT Proof-of-Work is a consensus algorithm where miners solve cryptographic puzzles to mine blocks and obtain a reward through some Block Reward Mechanism (BRM). PoW blockchain faces the problem of centralization due to the formation of mining pools, where miners mine blocks as a group and distribute rewards. The rationale is to reduce the risk (variance) in reward while obtaining the same expected block reward. In this work, we address the problem of centralization due to mining pools in PoW blockchain. We propose a two-player game between the new miner joining the system and the PoW blockchain system. We model the utility for the incoming miner as a combination of (i) expected block reward, (ii) risk, and (iii) cost of switching between different mining pools. With this utility structure, we analyze the equilibrium strategy of the incoming miner for different BRMs: (a) memoryless – block reward is history independent (e.g., Bitcoin) (b) retentive: block reward is history-dependent (e.g., Fruitchains). For memoryless BRMs, we show that depending on the coefficient of switching cost c, the protocol is decentralized when c = 0 and centralized when c > c. In addition, we show the impossibility of constructing a memoryless BRM where solo mining gives a higher payoff than forming/joining mining pools. While retentive BRM in Fruitchains reduces risk in solo mining, the equilibrium strategy for incoming miners is still to join mining pools, leading to centralization. We then propose our novel retentive BRM – Decent-BRM. We show that under Decent-BRM, incoming miners obtain higher utility in solo mining than joining mining pools. Therefore, no mining pools are formed, and the Pow blockchain using Decent-BRM is decentralized. 1 Introduction With the increased popularity of peer-to-peer, decentralized cryptocurrencies such as Bitcoin and Ethereum, more and more users are interested in possessing those coins/tokens. Users obtain cryptocurrency tokens by purchasing from those who mint or themself mint the tokens. The cryptocurrencies keep transaction records through a distributed ledger, and a distributed consensus protocol is required to maintain a consistent ledger across all users. Nakamoto [2009] proposed a blockchain technology via a Proof-of-Work (PoW) consensus protocol for the same. In PoW, the interested parties can join the network and need to solve some cryptographic puzzle to mine the next block, thereby appending a set of transactions (contained in the block) to the ledger. In return, the first node, miner, to solve the puzzle is rewarded with newly minted coins according to some Block Reward Mechanism (BRM). Mining Pools. Due to the increasing popularity of cryptocurrencies, there has been 10x growth in computing power used for mining Bitcoins in the last five years Asmakov [2023], as evident from Figure 1. The mining of a block is a random event, and solo miners with limited computing power face risk due to the uncertainty about mining any blocks for a prolonged duration. To minimize the risk, miners come together and form mining pools and distribute rewards when the pool mines a block. The formation of mining pools leads to the same expected rewards but much more frequent payment, reducing the risk. Due to this, few mining pools have grown disproportionately large. E.g., the top" 2401.08993v1,"Estimating Gender Completeness in Wikipedia Hrishikesh Patel, Tianwa Chen, Ivano Bongiovanni, Gianluca Demartini The University of Queensland, Brisbane, Australia {hrishikeshm.patel, tianwa.chen, i.bongiovanni, g.demartini}@uq.edu.au Abstract Gender imbalance in Wikipedia content is a known challenge which the editor community is actively addressing. The aim of this paper is to provide the Wikipedia community with instruments to estimate the magnitude of the problem for different entity types (also known as classes) in Wikipedia. To this end, we apply class completeness estimation methods based on the gender attribute. Our results show not only which gender for different sub-classes of Person is more prevalent in Wikipedia, but also an idea of how complete the coverage is for difference genders and sub-classes of Person. Introduction Successful crowdsourcing projects like Wikipedia and Wikidata naturally grow and evolve over time. This happens while having human editors focussing on certain parts of the project instead of others. While the ability for editors to decide what to contribute comes with the advantage of flexibility, it may result in biased content where, for example, one gender is better represented than others. An example of this is the number of male astronauts as compared to the number of female astronauts (76 female out of 630 astronauts in Wikipedia, as of the submission of this paper). The editor community is actively addressing this (Langrock and González-Bailón 2022). Previous studies have shown how the editor population is also unbalanced from a gender point of view. Antin et al. (2011) shows how the majority of editors, about 80%, are male. Another important aspect to understand gender representation is that of measuring how many persons of a certain gender are represented by an article in Wikipedia. To this end, we look at instances of subclasses of the class Person (e.g., astronauts). Such instances are represented by a single Wikipedia article (e.g, https://en. wikipedia.org/wiki/Samantha Cristoforetti). The first step is that of counting how many instances (i.e., person) of a certain gender there are in such a class (e.g., astronaut) and make observations (e.g., 554 male astronauts and 76 female astronauts). The more interesting step after counting entities is that of understanding how well represented each of the genders are in Wikipedia. To do this we would need to measure how Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. many male/female astronauts there should be in Wikipedia, assuming that the class is not yet completely represented in Wikipedia (e.g., because of a focus of the editor community on different parts of Wikipedia). To close the gender gap in Wikimedia content it is first critical to be able to measure it. To this end, in this paper we estimate the cardinality of sub-classes of Person based on gender. Similar to our approach, previous work by (Luggen et al. 2019) has used statistical estimators for class cardinality using Wikidata edit history in a capture/recapture setup. In a similar fashion, in our work we apply such estimators but using the Wikipedia edit history and also taking a gender-based approach to it. This allows us to not only estimate the cardinality of a class (e.g., female astronauts), but also, by comparing the estimated size with the number of male/female instances currently present in Wikipedia, to measure the completeness of each class for different genders (e.g., male astronauts are 95% complete while female astronauts are 94% complete), which is our research question. Related Work Gender in Wikipedia Previous research has already looked at the gender gap (Farzan, Savage, and Saviaga 2016), which is a particularly important issue across Wikimedia projects (Redi et al. 2020). For example, Abián, Meroño-Peñuela, and Simperl (2022) proposed methods to identify content gaps in crowdsourced knowledge graphs and found that Wikidata editors usually tend not to work on under-represented entities. While many attempts to address this issue exist, the key difference in the approach we propose to take is that we do not attempt to address the issue, but rather, to apply effective methods and develop accurate instruments for the different Wikipedia user groups to be empowered in making data-driven editorial decisions and able to address the issue by themselves. Class Cardinality Estimation Previous research (Luggen et al. 2019) has looked at how to use statistical estimators to estimate class cardinality in Wikidata. They used the knowledge graph edit history as evidence for the estimators. In this paper we extend this approach by looking at attribute-specific cardinality estima-" 2401.08994v1,"Understanding and Facilitating Mental Health Help-Seeking of Young Adults: A Socio-technical Ecosystem Framework JIAYING LIU, The University of Texas at Austin, USA YAN ZHANG, The University of Texas at Austin, USA Prior research on young adults’ mental health help-seeking mostly focuses on one particular resource such as a mobile app or digital platform, paying less attention to their lived experiences interacting with the ecosystem of resources. We conducted in-depth interviews with 18 participants about their help-seeking and non-help-seeking experiences. Guided by Social Ecological Theory, we proposed a Socio-technical Ecosystem Framework for mental health care, consisting of four levels of resources, including technological-, interpersonal- , community-, and societal level resources. Using this framework, we identified two types of support systems for help-seeking, single-resource support system and multi-resource support system. These resources support young adults’ help-seeking via three mechanisms, care-giving, care-mediating, and care-outreaching, forming various pathways to care. We then pointed out the barriers to resource use at each level and the general challenges in finding a support system. Our findings contributed to a conceptual framework to categorize mental health care. It also serves as a practical framework to identify challenges in the pathways to care and discover design implications. Additional Key Words and Phrases: Social Ecological Theory, Socio-technical system, Qualitative, Pathway to Care, Community Health ACM Reference Format: Jiaying Liu and Yan Zhang. 2024. Understanding and Facilitating Mental Health Help-Seeking of Young Adults: A Socio-technical Ecosystem Framework. 1, 1 (January 2024), 26 pages. https://doi.org/10.1145/nnnnnnn. nnnnnnn 1 INTRODUCTION The Mental Health crisis in the United States is on the rise, especially after the Covid-19 pandemic. According to the National Institute of Mental Health (2023) [58], around 57.8 million U.S. adults live with a mental illness in 2021, taking up 22.8% of all U.S. adults. Young adults between 18-25 have the highest prevalence of mental health concerns (33.7%) compared with other age groups (e.g., 26-49 (28.1%) and >50 (15%)), but have the lowest rate of receiving outpatient mental health treatments. Exploring effective strategies for promoting help-seeking behaviors is essential to enhance the well-being of young adults and other populations [32]. A significant portion of existing research in HCI and CSCW related to mental health adopts a technological perspective, focusing on designing mobile apps [2, 83], digital platforms [84], and wearable sensors [31] to facilitate self-management [63] and online group interactions [86]. However, the real-world adoption rate of these tools remains relatively low. For example, a study surveyed 662 students from two U.S. Midwestern colleges, indicating that only 10.1–13.8% had experience with such digital technologies [79]. The engagement with such online resources is also Authors’ addresses: Jiaying Liu, The University of Texas at Austin, USA, jiayingliu@utexas.edu; Yan Zhang, The University of Texas at Austin, Austin, USA, yanz@utexas.edu. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Association for Computing Machinery. XXXX-XXXX/2024/1-ART $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn , Vol. 1, No. 1, Article . Publication date: January 2024." 2401.09002v1,"AttackEval: How to Evaluate the Effectiveness of Jailbreak Attacking on Large Language Models Dong shu 1* , Mingyu Jin 1* , Suiyuan Zhu 2* , Beichen Wang 2 , Zihao Zhou 3 , Chong Zhang 3 , Yongfeng Zhang 4 1 Northwestern University 2 New York University 3 University of Liverpool 4 Rutgers University {u9o2n2, dongshu2024}@u.northwestern.edu, {yongfeng.zhang}@rutgers.edu Abstract Content warning: This paper contains unfiltered content generated by LLMs that may be offensive to readers. In our research, we pioneer a novel approach to evaluate the effectiveness of jailbreak attacks on Large Language Models (LLMs), such as GPT-4 and LLaMa2, diverging from traditional robustness-focused binary evaluations. Our study introduces two distinct evaluation frameworks: a coarse-grained evaluation and a fine-grained evaluation. Each framework, using a scoring range from 0 to 1, offers a unique perspective, enabling a more comprehensive and nuanced evaluation of attack effectiveness and empowering attackers to refine their attack prompts with greater understanding. Furthermore, we have developed a comprehensive ground truth dataset specifically tailored for jailbreak tasks. This dataset not only serves as a crucial benchmark for our current study but also establishes a foundational resource for future research, enabling consistent and comparative analyses in this evolving field. Upon meticulous comparison with traditional evaluation methods, we discovered that our evaluation aligns with the baseline’s trend while offering a more profound and detailed assessment. We believe that by accurately evaluating the effectiveness of attack prompts in the Jailbreak task, our work lays a solid foundation for assessing a wider array of similar or even more complex tasks in the realm of prompt injection, potentially revolutionizing this field. 1 Introduction In this research paper, we delve into innovative methods for evaluating the effectiveness of attack prompts in jailbreak strategies against Large Language Models (LLMs) like GPT-4 OpenAI (2023) and LLaMa Facebook (2022). This area of study gains urgency as the complexity and prevalence of LLMs expand in our rapidly evolving digital landscape Robey et al. (2023); Liu et al. (2023b). The increase in sophisticated attacks, particularly jailbreak attacks that aim to coerce LLMs into generating prohibited content such as instructions for illegal activities, underscores the importance of our investigation. Historically, research has predominantly focused on the robustness of LLMs Yu et al. (2023), often overlooking the critical aspect of the effectiveness of attack prompts. Some studies have touched on this effectiveness Chao et al. (2023), but their evaluations have been largely coarse-grained, relying on binary metrics that simply categorize outcomes as either successful or unsuccessful, based on the presence or absence of illicit outputs Yao et al. (2023). This approach, while straightforward, falls short of addressing the increasing complexity and subtlety of these attacks. Preprint. Under review." 2401.09029v1,"1 Cross-modality Guidance-aided Multi-modal Learning with Dual Attention for MRI Brain Tumor Grading Dunyuan Xu, Xi Wang*, Jinyue Cai and Pheng-Ann Heng, Senior Member, IEEE Abstract—Brain tumor represents one of the most fatal cancers around the world, and is very common in children and the elderly. Accurate identification of the type and grade of tumor in the early stages plays an important role in choosing a precise treatment plan. The Magnetic Resonance Imaging (MRI) protocols of different sequences provide clinicians with important contradictory information to identify tumor regions. However, manual assessment is time-consuming and error-prone due to big amount of data and the diversity of brain tumor types. Hence, there is an unmet need for MRI automated brain tumor diagnosis. We observe that the predictive capability of uni-modality models is limited and their performance varies widely across modalities, and the commonly used modality fusion methods would introduce potential noise, which results in significant performance degradation. To overcome these challenges, we propose a novel cross-modality guidance-aided multi-modal learning with dual attention for addressing the task of MRI brain tumor grading. To balance the tradeoff between model efficiency and efficacy, we employ ResNet Mix Convolution as the backbone network for feature extraction. Besides, dual attention is applied to capture the semantic interdependencies in spatial and slice dimensions respectively. To facilitate information interaction among modalities, we design a cross-modality guidance-aided module where the primary modality guides the other secondary modalities during the process of training, which can effectively leverage the complementary information of different MRI modalities and meanwhile alleviate the impact of the possible noise. Experimental results on the BraTS2018 and BraTS2019 datasets demonstrate the effectiveness of the proposed method, outperforming the single modality-based approaches and several state-of-the-art multi-modal methods by a large margin, with an AUC of 0.985±0.019 and 0.966±0.021 on the two datasets, respectively. Index Terms—Brain tumor classification, Guided feature extraction, Multi-modality MRI, Dual attention I. I NTRODUCTION The brain tumor is one of the deadliest cancers due to its aggressive nature, heterogeneous characteristics, and low relative survival rate (According to statistics from the American Cancer Society, the survival rate of elderly patients with glioblastoma is only 6%, and the expected overall survival period is 14.4 months [1]). Among the primary brain tumors, gliomas are considered the most aggressive. As suggested by D. Xu, X. Wang, J. Cai and P. Heng are with the Department of Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong (email: dunyuanxu@cuhk.edu.hk, xiwang@cse.cuhk.edu.hk, jycai@cuhk.edu.hk, pheng@cse.cuhk.edu.hk) X. Wang is also with Zhejiang Lab, Hangzhou, China and Department of Radiation Oncology, Stanford University School of Medicine, Palo Alto, CA, USA. Asterisk indicates corresponding author. LGG: T1ce T1 T2 Flair HGG: Fig. 1: Examples of low-grade and high-grade cases in the T1ce, T1, T2, and Flair MRI images. These two cases are selected from BraTS2019. The whole tumor is enclosed in the red polygons. [2], the World Health Organization divides brain tumors into the following 4 different grades according to the increasing degree of malignancy: pilocytic astrocytoma (grade I), fibrillary astrocytoma (grade II), anaplastic astrocytoma (grade III), and glioblastoma multiforme (grade IV). Scientists further classify these 4 types of brain tumor into two categories, Low Grade Glioma (LGG), which contains grade I and II brain tumors, and High Grade Glioma (HGG), which contains grade III and IV brain tumor [3]. In general, high-grade gliomas proliferate and infiltrate the surrounding tissues at a great speed, and could carry a worse prognosis even if under proper treatment. Low-grade gliomas are less aggressive and tend to exhibit benign tendencies, but have a uniform recurrence rate and could progress to a high grade over time [4]. Early and accurate assessment of the brain tumor grade is crucial not only for estimating the prognoses of the patients but also for treatment planning and tumor growth evaluation. For HGG patients, adjuvant radiation therapy and chemotherapy after surgery have become the accepted routine practice that could improve the survival rate [5]. On the contrary, as for LGG patient who is low-risk, radiation and chemotherapy are not necessary after surgery [6] [7]. Therefore, it is important to classify the tumor grade in advance. Histopathological diagnosis of biopsy specimens is the gold standard for glioma grading [8]. However, it is timeconsuming, invasive, and prone to sampling error. The sam-" 2401.09039v1,"Hairy Reissner-Nordstrom Black Holes with Asymmetric Vacua Xiao Yan Chew 1, i and Dong-han Yeom 2, 3, 4, l 2 1 School of Science, Jiangsu University of Science and Technology, 212100, Zhenjiang, China Department of Physics Education, Pusan National University, Busan 46241, Republic of Korea 3 Research Center for Dielectric and Advanced Matter Physics, Pusan National University, Busan 46241, Republic of Korea 4 Leung Center for Cosmology and Particle Astrophysics, National Taiwan University, Taipei 10617, Taiwan We minimally coupled a scalar potential V (ϕ) with asymmetric vacua to the Einstein gravity to numerically construct the hairy Reissner-Nordstrom black hole (RNBH) as a direct generalization of RNBHs to possess scalar hair. By fixing the electric charge to mass ratio q, a branch of hairy RNBHs bifurcates from the RNBH when the scalar field ϕ H is non-trivial at the horizon. The values of q are bounded for 0 ≤ q ≤ 1, which contrast to a class of hairy black holes with q > 1 in the Einstein-Maxwell-scalar theory. We find that the profiles of solutions affected by the competition between the strength of ϕ H and q, for instance, the gradient of scalar field at the horizon can increase very sharply when q → 1 and ϕ H is small but its gradient can be very small which independent of q when ϕ H is large. Furthermore, the weak energy condition of hairy RNBHs, particularly at the horizon can be satisfied when q > 0. I. INTRODUCTION According to the no-hair theorem [1–3], the state of black holes in general relativity (GR) can only be described by the three global charges which are the mass, electrical charge, and angular momentum. The Reissner-Nordstrom black hole (RNBH) [4, 5] is the solution to the Einstein-Maxwell (EM) theory and satisfies the no-hair theorem. Nevertheless, a black hole is known as a hairy black hole when it is supported by a matter field outside the event horizon and may possess additional global charge (refers to “hair”) which is associated with the matter field. Hairy black holes can exhibit a deviation of their properties from the electrovacuum black holes in the strong gravity regime but are indistinguishable in the weak gravity regime. A mechanism which is known as the spontaneous scalarization (SS) to allow black holes can evade the no-hair theorem to possess a non-trivial scalar field ϕ outside the horizon, hence the RN black hole can be extended to a broader class of charged hairy black holes, for instance, a various form of scalar function f (ϕ) non-minimally couples with the Maxwell field [6–32] in the Einstein-Maxwell-scalar (EMs) theory can give rise to the tachyonic instabilities so that charged hairy black holes can be spontaneously scalarized from the RNBH. Few decades ago T. Damour and G. Esposito-Farèse [33] have proposed the concept of SS to predict the deviation of properties for the neutron stars from GR in the strong gravity regime but becomes indistinguishable in the weak gravity regime within the framework of the scalar-tensor theory, which non-minimally couples a scalar function with the Ricci scalar. However, one may overlook that an RNBH can also be extended to another class of charged hairy black holes in the simplest and direct manner, i.e., one can minimally couple the Einstein gravity and Maxwell field with a scalar potential V (ϕ). By properly introducing the form of V (ϕ) which is associated with the profile of V (ϕ) to evade the no-hair theorem, the solutions of hairy black holes can be bifurcated from the electrovacuum black holes and they are regular everywhere in the spacetime. Recently, the authors have employed two different profiles of V (ϕ) to construct the neutral hairy black holes without the anticipation of other extended objects, for instance the Gauss-Bonnet term or matter fields and study their properties in detail [34–36]. The first profile of V (ϕ) with asymmetric vacua which contain a local maximum, a local minimum, and a global minimum to describe the phase transition of vacuum bubbles from the false vacuum (local minimum) to the true vacuum (global minimum) [37]. The second profile of V (ϕ) with the shape of the inverted Mexican hat contains two degenerate maxima and a local minimum [36]. Therefore, we generalize those neutral hairy black holes in [35] to possess an electric charge and study their properties in this paper. Other choices of V (ϕ) or similar construction can refer to [38–46]. On the other hand, the RNBH possesses an inner horizon, instead of the outer horizon. The inner horizon is known i Electronic address: xiao.yan.chew@just.edu.cn l Electronic address: innocent.yeom@gmail.com" 2401.09043v1,"ON PROPOSITIONAL LOGIC SEMIRINGS Wenxi LI 1 Zhongzhi WANG 2 ( School of Microelectronics and Data Science, AnHui University of Technology, Ma’anshan, 243002, China) Abstract: Propositional logic serves as a fundamental cornerstone in mathematical logic. This paper delves into a semiring characterization of propositional logic, employing the Gröebner-Shirshov basis theory to furnish an algebraic framework for deduction and proof grounded in atoms of propositional logic. The result is an algebraic approach to proving propositions in propositional logic. To illustrate the effectiveness and constraints of this method, we conclude with several specific examples. Key words: Propositional logic, Gröebner-Shirshov bases, semirings Mathematics Subject Classification (2020): 03B05, 13P10, 16Y60. 1. Introduction In a letter to Nicolas Remnond[5], Leibniz expressed, ’· · · if I had been less distracted or if I were younger or had talented young men to help me, I should still hope to create a kind of universal symbolistic in which all truths of reason would be reduced to a kind of calculus. · · · this could be a kind of universal language or writing for the characters and the words themselves would give directions to reason, and the errors -except those of fact- would be only mistakes in calculation.’ This statement is a key component of what is known as Leibniz’s Program - a comprehensive initiative aimed at promoting peace and justice through the formalization or mechanization of reason[1]. Propositional calculus and predicate calculus are two fundamental formal systems that constitute this exciting program, serving as mathematical models for the study of reasoning. However, the conjunction and disjunction operations of propositions satisfy the requirements of a semiring operation. Therefore, the propositional logic system with the conjunction and disjunction operations forms a semiring, where each element in this semiring has a complement. In our previous paper, we introduced idempotent complement semirings. In this paper, we attempt to represent the propositional logic system using an idempotent complement semiring generated by countable elements. Our goal is to obtain an algebraic representation for proofs and deductions, and we employ the Gröbner-Shirshov basis theory to provide an algebraic characterization of propositions provable within a propositional system. We have developed a method for proving propositions through set calculations. In conclusion, we present several simple examples to illustrate and explain this 1 E-mail address: wxli@ahut.edu.cn. E-mail address: zhongzhiw@126.com. 2 1" 2401.09045v1,"Prog. Theor. Exp. Phys. 2015, 00000 (3 pages) DOI: 10.1093/ptep/0000000000 Eigenphase distributions of unimodular circular ensembles [comment on “On thermal transition in QCD” by M. Hanada and H. Watanabe (2023)] Shinsuke Nishigaki ∗ Graduate School of Natural Science and Engineering, Shimane University, Matsue 690-8504, Japan ∗ E-mail: mochizuki@riko.shimane-u.ac.jp ............................................................................... Motivated by the study of Polyakov lines in gauge theories, Hanada and Watanabe [1] recently presented a conjectured formula for the distribution of eigenphases of Haardistributed random SU(N ) matrices (β = 2), supported by explicit examples at small N and by numerical samplings at larger N . In this note, I spell out a concise proof of their formula, and present its symplectic and orthogonal counterparts, i.e. the eigenphase distributions of Haar-random unimodular symmetric (β = 1) and selfdual (β = 4) unitary matrices parametrizing SU(N )/SO(N ) and SU(2N )/Sp(2N ), respectively. .............................................................................................. Subject Index B83, B86, A10, A13 1. Foreword and motivation This note is motivated by a conjectured formula (117) in Ref. [1], presented without a proof. A main goal of that paper is to quantify the partial deconfinement of lattice gauge theories at finite temperature in terms of the statistical distribution of the eigenphases of the Polyakov line P (~n ) = U 0 (0, ~n )U 0 (1, ~n ) · · · U 0 (L t − 1, ~n ), treated as random SU(N ) matrices. From the gauge-theory point of view, it is crucial to consider a simple group SU(N ) rather than semisimple U(N ), obviously because the running of the coupling constant for each simple or Abelian factor of a gauge group is different. This naturally led the authors of Ref. [1] to conjecture the eigenphase distribution of Haar-distributed random SU(N ) matrices, i.e. the circular unitary ensemble (CUE) with a unimodular constraint det U = 1. Their formula is based upon explicit examples at N = 2, 3 and numerical samplings at larger N [2]. In the study of so-called fixed trace random matrix ensembles [3], typically, the sum of the P 2 squared eigenvalues tr H 2 = N j=1 λ j of random N × N Hermitian matrices H is constrained to a specific value. Although this type, or more generic type (tr V (H) = const. [4]) of constraints respects the U(N ) invariance of the unconstrained ensemble, additional interactions among multiple eigenvalues induced by the trace constraint destroy the determinantal property of their correlation functions. Due to this difficulty, one often had to be content with, either a macroscopic large-N limit by the Coulomb-gas method [4] or asymptotic universality at N ≫ 1 [5], while subtleties in the local correlations of eigenvalues still remain elusive. In this note, I dedicate my tiny contribution to the field of constrained random matrices, namely a proof of the aforementioned conjecture on the density of the eigenphases of Haar-random SU(N ) matrices. My proof encompasses the Threefold Way [6] at once, as it also provides the densities of the eigenphases of Haar-random symmetric SU(N ) matrices © The Author(s) 2012. Published by Oxford University Press on behalf of the Physical Society of Japan. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by-nc/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited." 2401.09051v1,"Canvil: Designerly Adaptation for LLM-Powered User Experiences K. J. KEVIN FENG ∗ , University of Washington, USA Q. VERA LIAO, Microsoft Research, Canada ZIANG XIAO ∗ , Johns Hopkins University, USA JENNIFER WORTMAN VAUGHAN, Microsoft Research, USA AMY X. ZHANG, University of Washington, USA DAVID W. MCDONALD, University of Washington, USA Advancements in large language models (LLMs) are poised to spark a proliferation of LLM-powered user experiences. In product teams, designers are often tasked with crafting user experiences that align with user needs. To involve designers and leverage their user-centered perspectives to create effective and responsible LLM-powered products, we introduce the practice of designerly adaptation for engaging with LLMs as an adaptable design material. We first identify key characteristics of designerly adaptation through a formative study with designers experienced in designing for LLM-powered products (𝑁 = 12). These characteristics are to 1) have a low technical barrier to entry, 2) leverage designers’ unique perspectives bridging users and technology, and 3) encourage model tinkering. Based on this characterization, we build Canvil 1 , a Figma widget that operationalizes designerly adaptation. Canvil supports structured authoring of system prompts to adapt LLM behavior, testing of adapted models on diverse user inputs, and integration of model outputs into interface designs. We use Canvil as a technology probe in a group-based design study (6 groups, 𝑁 = 17) to investigate the implications of integrating designerly adaptation into design workflows. We find that designers are able to iteratively tinker with different adaptation approaches and reason about interface affordances to enhance end-user interaction with LLMs. Furthermore, designers identified promising collaborative workflows for designerly adaptation. Our work opens new avenues for collaborative processes and tools that foreground designers’ user-centered expertise in the crafting and deployment of LLM-powered user experiences. CCS Concepts: • Human-centered computing → Interaction design process and methods; Empirical studies in collaborative and social computing. Additional Key Words and Phrases: large language models, user experience, design practice ACM Reference Format: K. J. Kevin Feng, Q. Vera Liao, Ziang Xiao, Jennifer Wortman Vaughan, Amy X. Zhang, and David W. McDonald. 2024. Canvil: Designerly Adaptation for LLM-Powered User Experiences. In . ACM, New York, NY, USA, 33 pages. https://doi.org/xxxxxxx.xxxxxxx 1 INTRODUCTION A paradigm shift is underway for integrating artificial intelligence (AI) capabilities into everyday user-facing technologies. Large pre-trained AI models, most notably large language models (LLMs), have versatile natural language capabilities that unlock novel interactive techniques and interfaces ∗ Work done while at Microsoft Research. 1 Canvil is available for public use at https://www.figma.com/community/widget/1277396720888327660. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. arXiv, January, 2024 © 2024 Association for Computing Machinery. ACM ISBN xx-x-xxx-xxxx-xxxxx. . . $15.00 https://doi.org/xxxxxxx.xxxxxxx 1" 2401.09054v1,"On continuity of state-dependent utilities Edoardo Berton a,∗ , Alessandro Doldi b , Marco Maggis c a b Università Cattolica del Sacro Cuore, Largo Gemelli 1, Milano, 20123, Italy Università degli Studi di Firenze, Via delle Pandette 9, Firenze, 50127, Italy c Università degli Studi di Milano, Via Saldini 50, Milano, 20127, Italy Abstract State-dependent preferences for a general Savage’s state space were shown in Wakker and Zank (1999) to admit a numerical representation in the form of the integral of a state-dependent utility, as soon as pointwise continuity of the preference ordering is assumed. In this paper we prove that such a state-dependent function inherits pointwise continuity from the preference ordering, providing in this way a positive answer to a conjecture posed in the aforementioned seminal work. We further apply this result to obtain an explicit representation of conditional Chisini means in the form of a conditional certainty equivalent. Keywords: pointwise continuity, state-dependent expected utility, conditional certainty equivalent, nonlinear expectation 2020 MSC: 91B06, 91B08, 60A05 1. Introduction For a general state space (Ω, F ), Wakker and Zank [16] provide a characterization of those preference relations  on the space of bounded random acts which admit a numerical representation through an additively decomposable functional ([16], Theorem 11). This result extends to an infinite dimensional setup the theory developed by Debreu [8]. By adopting the stronger notion of pointwise continuity of , Theorem 11 in [16] can be specialized to the following integral representation form. ∗ Corresponding author Email address: edoardo.berton@unicatt.it (Edoardo Berton)" 2401.09055v1,"Controlling ultrafast laser writing in silica glass by pulse temporal contrast Yuhao Lei, 1,a) Huijun Wang, 1 Gholamreza Shayeganrad, 1 Yuri Svirko, 2 and Peter G. Kazansky 1,a) 1 Optoelectronics Research Centre, University of Southampton, Southampton, SO17 1BJ, United Kingdom 2 Center for Photonics Sciences, University of Eastern Finland, FI-80100 Joensuu, Finland a) Authors to whom correspondence should be addressed: yuhao.lei@soton.ac.uk and pgk@soton.ac.uk Abstract: Control of laser writing in transparent dielectrics using temporal contrast of light pulses is demonstrated. Anisotropic nanopores in silica glass are produced by high-contrast of 10 7 femtosecond Yb: KGW laser pulses rather than low-contrast of 10 3 Yb fiber laser pulses. Low-contrast pulses are useful for creating lamellar birefringent structures, possibly driven by quadrupole nonlinear current. The difference originates in the fiber laser storing third of its energy in a post-pulse of 200 ps duration. The absorption of this low-intensity fraction of the pulse by laser-induced transient defects with relatively long lifetime and low excitation energy, such as self-trapped holes, drastically changes the kinetics of energy deposition and type of material modification. The interaction of intense ultrashort light pulses with transparent materials has attracted considerable interest due to its strong application potential. Since the first demonstration three decades ago, 1 the femtosecond micromachining had found a wide range of applications spanning from eye surgery 2 to fabrication of photonic components 3-5 and optical data storage. 6 Rapid deposition of energy carried by sub-picosecond light pulses into transparent dielectric involves a complex physical phenomena, 7-10 driven by the generation of free electrons in the irradiated volume via multiphoton, tunneling and avalanche ionization. 11 The free electron may also occur due to multiphoton ionization of self-trapped excitons and other defects, which are formed within the silica glass bandgap 12 and can be detected by using fluorescence, electron spin resonance, and other techniques. 13,14 Inverse Bremsstrahlung absorption in free electron ensemble leads to irreversible permanent modification of the material 2 due to the energy transfer to the lattice within the electron-phonon relaxation time. 15 Depending on the conditions, permanent modification of the silica glass under irradiation with femtosecond optical pulses manifests itself as the refractive index increase (often referred as type 1 modification), 3 form birefringence created subwavelength spaces nanoplatelets or nanogratings (type 2), 16 flattened nanopores (type X) 17 and voids (type 3). 6 Nanostructured silica glass has been used for selective etching, 4 polarization beam shaping 5 and five-dimensional (5D) optical data storage. 18 However, it is worth noting that interpretation and explanation of the physical mechanisms underlying the observed phenomena is rather difficult task because the resulting modification of silica glass may depend not only on the peak intensity of the laser pulses, but also on the type of laser used in the experiment. Specifically, at the same peak intensity, the femtosecond pulses generated by fiber lasers increase the refraction index of silicon in the irradiated volume, 19,20 while pulses from an optical parametric amplifier (OPA) pumped by a Ti: Sapphire" 2401.09064v1,"1 Performance Bounds and Optimization for CSI-Ratio based Bi-static Doppler Sensing in ISAC Systems Yanmo Hu, Student Member, IEEE, Kai Wu, Member, IEEE, J. Andrew Zhang, Senior Member, IEEE, Weibo Deng, Y. Jay Guo, Fellow, IEEE Abstract—Bi-static sensing is crucial for exploring the potential of networked sensing capabilities in integrated sensing and communications (ISAC). However, it suffers from the challenging clock asynchronism issue. CSI ratio-based sensing is an effective means to address the issue. Its performance bounds, particular for Doppler sensing, have not been fully understood yet. This work endeavors to fill the research gap. Focusing on a single dynamic path in high-SNR scenarios, we derive the closed-form CRB. Then, through analyzing the mutual interference between dynamic and static paths, we simplify the CRB results by deriving close approximations, further unveiling new insights of the impact of numerous physical parameters on Doppler sensing. Moreover, utilizing the new CRB and analyses, we propose novel waveform optimization strategies for noise- and interference-limited sensing scenarios, which are also empowered by closed-form and efficient solutions. Extensive simulation results are provided to validate the preciseness of the derived CRB results and analyses, with the aid of the maximum-likelihood estimator. The results also demonstrate the substantial enhanced Doppler sensing accuracy and the sensing capabilities for low-speed target achieved by the proposed waveform design. Index Terms—Integrated sensing and communication (ISAC), Perceptive mobile networks, uplink sensing, CSI-ratio model, Cramér-Rao bounds, OFDM symbol optimization. I. I NTRODUCTION I NTEGRATED sensing and communications (ISAC) has established its critical role in numerous next-generation communication networks, such as mobile networks, WiFi networks and vehicular networks etc [1]–[6]. Major sensing types extensively discussed in ISAC include single-node sensing with sensing transceivers co-located and bi-static sensing with sensing transmitters far separated from receivers. While single-node sensing enjoy clock coherence between transceiver channels, it requires full-duplex technique, which is not mature yet [7]. Bi-static sensing can eliminate the requirement of full-duplexing techniques and has the potential to utilize the networked sensing capability to deliver enhanced sensing performances [8], [9]. Take the emerging perceptive mobile networks (PMNs) [10] for an example. Bi-static sensing at a Yanmo Hu and Weibo Deng are with the Key Laboratory of Marine Environmental Monitoring and Information Processing, Ministry of Industry and Information Technology, and also with the School of Electronic and Information Engineering, Harbin Institute of Technology. Email: 19B905008@stu.hit.edu.cn; dengweibo@hit.edu.cn. (Corresponding author: Weibo Deng.) Kai Wu, J. A. Zhang and Y. J. Guo are with Global Big Data Technologies Centre, the University of Technology Sydney. Email: {Kai.Wu; Andrew.Zhang; Jay.Guo}@uts.edu.au. base station using the link signals from almost ubiquitous user ends can enjoy unprecedented spatial diversity and information fusion gain for sensing. However, such bi-static sensing is not without challenges. Due to different clock oscillators, between transmitter and receiver, bi-static sensing suffers from the clock asynchronism issue [7], [11], [12]. It can lead to sensing ambiguities and must be solved for fully enjoying the potential networked sensing ISAC. Several types of methods have been proposed to solve the clock asynchronism issue in ISAC. Since the antennas at a communication receiver typically share a common clock source, the signals received by each antenna have the same timing and phase nuisances caused by clock asynchronism. Leveraging this characteristic, the cross-antenna cross-correlation (CACC) methods were proposed in [13], [14], which compensate clock asynchronism errors by taking the cross-correlations of the received signals over different antenna pairs. However, the CACC method doubles the sensing parameters that need to be estimated and increases the probability of detecting false dynamic targets (also known as ghost targets). Moreover, the CACC method requires a line-of-sight (LOS) path to ensure unambiguous sensing. In practical scenarios, the LOS requirement may not be easy to be satisfied. The CSI-ratio model [15]–[17], a counterpart of CACC, has the ability to alleviate the LOS requirement. Different from CACC, the CSI-ratio model calculates the ratio of signals among different antennas to eliminate common errors caused by clock asynchronism. In [16], the Doppler frequency of a single dynamic target is estimated by employing the Mobius transformation, which constructs a periodic conformal map between CSI ratio and Doppler frequency. The Doppler frequency can be estimated by calculating the period of the CSI ratio. Furthermore, [17] introduces the MUSIC algorithm to the CSI-ratio-based sensing. Compared with the CACC- based MUSIC method, the CSI-ratio-based MUSIC has better performance in estimating delay and Doppler in both LOS and NLOS scenarios [7], [15]. Therefore, as an elegant formulation, the CSI ratio model allows simple and efficient parameter estimation. It also has the capability of removing additional common signal distortions across antennas such as varying receiver gains [15], remarkably standing out from algorithms for solving the clock asynchronism issue. Despite advancements of the CSI-ratio model, assessing its optimality remains unsolved and signal optimization lacks of reliable performance metrics. In parameter estimation, the" 2401.09077v1,"Hands-On Robotics: Enabling Communication Through Direct Gesture Control Max Pascher Alia Saad Jonathan Liebers max.pascher@udo.edu TU Dortmund University Dortmund, Germany alia.saad@uni-due.de University of Duisburg-Essen Essen, Germany jonathan.liebers@uni-due.de University of Duisburg-Essen Essen, Germany Roman Heger Jens Gerken Stefan Schneegass roman.heger@uni-due.de University of Duisburg-Essen Essen, Germany jens.gerken@udo.edu TU Dortmund University Dortmund, Germany stefan.schneegass@uni-due.de University of Duisburg-Essen Essen, Germany Uwe Gruenefeld uwe.gruenefeld@uni-due.de University of Duisburg-Essen Essen, Germany Knob End Effector Letter “W“ Hand End Effector Letter “S“ Handshake “Formal“ Handshake “Informal“ Figure 1: We investigated four different user performed gestures by directly manipulating a robot; two letter-based gestures using a knob as an end effector; and two handshake gestures with a hand as an end effector. ABSTRACT CCS CONCEPTS Effective Human-Robot Interaction (HRI) is fundamental to seamlessly integrating robotic systems into our daily lives. However, current communication modes require additional technological interfaces, which can be cumbersome and indirect. This paper presents a novel approach, using direct motion-based communication by moving a robot’s end effector. Our strategy enables users to communicate with a robot by using four distinct gestures – two handshakes (’formal’ and ’informal’) and two letters (’W’ and ’S’). As a proof-of-concept, we conducted a user study with 16 participants, capturing subjective experience ratings and objective data for training machine learning classifiers. Our findings show that the four different gestures performed by moving the robot’s end effector can be distinguished with close to 100% accuracy. Our research offers implications for the design of future HRI interfaces, suggesting that motion-based interaction can empower human operators to communicate directly with robots, removing the necessity for additional hardware. • Human-centered computing → Gestural input; • Computer systems organization → Robotics. This work is licensed under a Creative Commons Attribution International 4.0 License. HRI ’24 Companion, March 11–14, 2024, Boulder, CO, USA © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0323-2/24/03. https://doi.org/10.1145/3610978.3640635 KEYWORDS embodied interaction, gesture recognition, human-robot interaction, motion-based communication ACM Reference Format: Max Pascher, Alia Saad, Jonathan Liebers, Roman Heger, Jens Gerken, Stefan Schneegass, and Uwe Gruenefeld. 2024. Hands-On Robotics: Enabling Communication Through Direct Gesture Control. In Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction (HRI ’24 Companion), March 11–14, 2024, Boulder, CO, USA. ACM, New York, NY, USA, 6 pages. https://doi.org/10.1145/3610978.3640635 1 INTRODUCTION In recent years, rapid advancements in robotic technologies have led to their growing integration in our daily lives, acting as versatile assistants in workplaces and homes [2, 28, 34]. These robotic companions enhance human capabilities and efficiency and, as such, substantially change how we interact with the world [19]. As robotic solutions evolve and diversify, their capacity of autonomous actions increases – with seamless close-contact interactions between humans and robots becoming a reality [15]." 2401.09084v1,"U NI VG: T OWARDS UNI FIED - MODAL V IDEO G ENERATION Ludan Ruan, Lei Tian, Chuanwei Huang, Xu Zhang, Xinyan Xiao Baidu Inc. Beijing, China {ruanludan, tianlei09}@baidu.com huangcw21@gmail.com {zhangxu44, xiaoxinyan}@baidu.com A cat is eating carrot. A cat is eating carrot. A girl is floating with fish around. A girl is floating with fish around. Figure 1: UniVG is a unified video generation framework that supports various video generation tasks, such as Text-to- Video, Image-to-Video, and Text&Image-to-Video. Here displays two sets of examples. Row 1: Input text to generate semantically consistent videos; Row 2: Input image to produce pixel-aligned videos; Row 3: Combine the semantic of input text and image to create semantically aligned videos. All videos are shown on https://univg-baidu.github. io. A BSTRACT Diffusion based video generation has received extensive attention and achieved considerable success within both the academic and industrial communities. However, current efforts are mainly concentrated on single-objective or single-task video generation, such as generation driven by text, by image, or by a combination of text and image. This cannot fully meet the needs of real-world application scenarios, as users are likely to input images and text conditions in a flexible manner, either individually or in combination. To address this, we propose a Unified-modal Video Genearation system that is capable of handling multiple video generation tasks across text and image modalities. To this end, we revisit the various video generation tasks within our system from the perspective of generative" 2401.09085v2,"3D orientation super-resolution spatial-frequency-shift microscopy Xiaowei Liu, a, † Mingwei Tang, b, † Ning Zhou, c Chenlei Pang, a Zhong Wen, b Xu Liu, b, d, e and Qing Yang a, b, d, e, * Research Center for Humanoid Sensing, Zhejiang Lab, Hangzhou 311121, China State Key Laboratory of Extreme Photonics and Instrumentation, College of Optical Science and Engineering, Zhejiang University, Hangzhou 310027, China c School of Physics and Optoelectronic Engineering, Hangzhou Institute for Advanced Study, University of Chinese Academy of Sciences, Hangzhou 310024, China d ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou 311215, China e Collaborative Innovation Center of Extreme Optics, Shanxi University, Taiyuan, China † These authors contributed equally to this work. a b Abstract: Super-resolution mapping of the 3D orientation of fluorophores reveals the alignment of biological structures where the fluorophores are tightly attached, and thus plays a vital role in studying the organization and dynamics of bio-complexes. However, current super-resolution imaging techniques are either limited to 2D orientation mapping or suffer from slow speed and the requirement of special labels in 3D orientation mapping. Here, we propose a novel polarized virtual spatial-frequency-shift effect to overcome these restrictions to achieve a universal 3D orientation super-resolution mapping capability. To demonstrate the mechanism, we simulate the imaging process and reconstruct the spatial-angular information for sparsely distributed dipoles with random 3D orientations and microfilament-like structures decorated with fluorophores oriented parallel to them. The 3D orientation distribution can be recovered with a doubled spatial resolution and an average angular precision of up to 2.39 degrees. The performance of the approach with noise has also been analyzed considering real implementation. Keywords: 3D orientation, super-resolution microscopy, spatial-frequency-shift, polarization modulation * Address all correspondence to Qing Yang, qingyang@zju.edu.cn 1. Introduction The extraction of 3D orientation angular information of the alignment and rotational movements of molecules plays a vital role in studying the organization and dynamics of bio-complexes, and thus can push forward the progress of life science, cytology, etc. (Fig. 1a). For example, by directly measuring the tilt and wobble of individual fluorescent probes, researchers have gained an understanding of the conformations of DNA 1-3 , the motions of molecular motors 4 , the organization of molecular assemblies in cell membranes 5, 6 , as well as the structure of biological filaments 2, 7, 8 . Consequently, the study on orientation mapping microscopy has attracted interest worldwide." 2401.09119v1,"1 Anchor-points Assisted Uplink Sensing in Perceptive Mobile Networks Yanmo Hu, Student Member, IEEE, J. Andrew Zhang, Senior Member, IEEE, Weibo Deng, Y. Jay Guo, Fellow, IEEE technique is initially introduced for passive WiFi sensing [11]. Exploiting the fact that all antennas in an array share the same clock oscillator, CACC calculates the conjugate multiplication between signals from different receiving antennas, successfully removing TMO and CFO. However, the presence of multiple cross-product terms in CACC doubles the parameters to be estimated. To address this problem, a mirrored-MUSIC algorithm is proposed in [12] to handle the basis vectors with mirror symmetry character. It was shown that the mirrored-MUSIC algorithm can accurately detect multiple targets under the ISAC framework with relatively low computation complexity. Another class of techniques, similarly exploiting the characteristic that the clock is identical across all the antennas in the BS, is the channel state information (CSI) ratio method [13], [14]. However, two fundamental assumptions used in these methods restrict their applications: the position of UE is known, and Index Terms—Integrated sensing and communication (ISAC), Perceptive mobile networks, uplink sensing, clock asynchronism, there exists a dominating line-of-sight (LOS) path between UE and BS. static anchor points, parameter estimation. A limited number of techniques have been reported to relax these requirements. Without requiring the knowledge I. I NTRODUCTION of the UE’s position, recently, [15] locates dynamic targets by A. Motivations and Backgrounds assuming that the TMO and CFO are noise-like and follow SAC [1]–[4] enables to share a majority of hardware zero-mean Gaussian distribution. By employing the Kalman and network infrastructure to integrate communication filter (KF), [15] proposes a KF-based CSI enhancer to suppress and sensing into one system, which currently serves as the noise-like TMO. Since the LOS from UE to BS is the a candidate technology of 6G mobile networks. With the shortest, [15] treats the smallest range value as the LOS path application of ISAC in mobile networks, the perceptive mobile range and then locates the UE. However, the performance of networks (PMNs) [1] can be achieved using either uplink [5], the scheme depends on the actual distribution of the TMO [6] or downlink signals [7]. The user equipment (UE) and and CFO. Regarding the requirement for LOS path, [16] base station (BS) in uplink sensing can be regarded as the analytically shows that non-LOS (NLOS) paths alone can also transmitter and receiver in a bistatic sensing [1], respectively. provide sufficient information for locating UE if and only if The major challenge in such a bistatic uplink sensing is that the estimates for angle-of-arrival (AOA), angle-of-departure the UE and BS typically use their local oscillators, leading (AOD), and range are sufficiently accurate. Specifically, three to clock asynchronism. Clock asynchronism may generate or more NLOS paths are ‘possible’ for generating unambiguous time-varying timing offset (TMO) and carrier frequency offset estimation for UE’s position and orientation. Nevertheless, [17] (CFO), causing ambiguity in delay and Doppler estimation and proves that the localizability of using NLOS paths is low under preventing from coherent processing of multiple discontinuous under the Boolean model in 5G mm-wave systems. Another potential method is to use anchor points, strong signals [1], [8]–[10]. Several techniques have been introduced to resolve the reflectors with known positions to the sensing receiver. For impact of clock asynchronism on uplink sensing [8], [11], wireless localization, which involves the localization of signal- [12]. Among them, the cross-antenna cross-correlation (CACC) emitting transmitters, it has been demonstrated that anchor points can efficiently reduce the system cost and provide Yanmo Hu and Weibo Deng are with the Key Laboratory of Marine Envi- a solution for target localization [17]–[19], particularly in ronmental Monitoring and Information Processing, Ministry of Industry and Information Technology, and also with the School of Electronic and Information scenarios where a line-of-sight (LOS) path is absent. They Engineering, Harbin Institute of Technology. Email: 19B905008@stu.hit.edu.cn; can be classified into two groups: mobile and static anchor dengweibo@hit.edu.cn. (Corresponding author: Weibo Deng.) points. The mobile anchor points [18] are equipped with GPS, J. A. Zhang and Y. J. Guo are with Global Big Data Technologies Centre, the University of Technology Sydney. Email: {Andrew.Zhang; moving among the sensing area and periodically broadcasting Jay.Guo}@uts.edu.au. their current positions to help the localization. The static anchor Abstract—Uplink sensing in integrated sensing and communications (ISAC) systems, such as Perceptive Mobile Networks, is challenging due to the clock asynchronism between transmitter and receiver. Existing solutions typically require the presence of a dominating line-of-sight path and the knowledge of transmitter location at the receiver. In this paper, relaxing these requirements, we propose a novel and effective uplink sensing scheme with the assistance of static anchor points. Two major algorithms are proposed in the scheme. The first algorithm estimates the relative timing and carrier frequency offsets due to clock asynchronism, with respect to those at a randomly selected reference snapshot. Theoretical performance analysis is provided for the algorithm. The estimates from the first algorithm are then used to compensate for the offsets and generate the angle-Doppler maps. Using the maps, the second algorithm identifies the anchor points, and then locates the UE and dynamic targets. Feasibility of UE localization is also analyzed. Simulation results are provided and demonstrate the effectiveness of the proposed algorithms. I" 2401.09124v1,"Received 17 November 2023, accepted 11 December 2023, date of publication 22 December 2023, date of current version 29 December 2023. Digital Object Identifier 10.1109/ACCESS.2023.3346320 Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation MIRZA AKHI KHATUN 1,2 , (Member, IEEE), SANOBER FARHEEN MEMON CIARÁN EISING 1,2 , (Senior Member, IEEE), AND LUBNA LUXMI DHIRANI 1,2 , (Senior Member, IEEE) 1 , (Member, IEEE), 1 Department Electronic and Computer Engineering, University of Limerick, Limerick, V94 T9PX Ireland 2 SFI CRT Foundations in Data Science, University of Limerick, Limerick, V94 T9PX Ireland Corresponding author: Mirza Akhi Khatun (Mirza.Akhi@ul.ie) This work has emanated from research conducted with the financial support of Science Foundation Ireland (SFI) under Grant Number 18/CRT/6049. ABSTRACT The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a datadriven infrastructure that highly relies on smart sensing devices (i.e., blood pressure monitors, temperature sensors, etc.) for faster response time, treatments, and diagnosis. However, with the evolving cyber threat landscape, IoT devices have become more vulnerable to the broader risk surface (e.g., risks associated with generative AI, 5G-IoT, etc.), which, if exploited, may lead to data breaches, unauthorized access, and lack of command and control and potential harm. This paper reviews the fundamentals of healthcare IoT, its privacy, and data security challenges associated with machine learning and H-IoT devices. The paper further emphasizes the importance of monitoring healthcare IoT layers such as perception, network, cloud, and application. Detecting and responding to anomalies involves various cyber-attacks and protocols such as Wi-Fi 6, Narrowband Internet of Things (NB-IoT), Bluetooth, ZigBee, LoRa, and 5G New Radio (5G NR). A robust authentication mechanism based on machine learning and deep learning techniques is required to protect and mitigate H-IoT devices from increasing cybersecurity vulnerabilities. Hence, in this review paper, security and privacy challenges and risk mitigation strategies for building resilience in H-IoT are explored and reported. INDEX TERMS Healthcare-IoT, generative AI, 5G-IoT, security and privacy challenges, cybersecurity, attacks, anomaly detection, machine learning, deep learning, mitigation techniques, 5G NR. I. INTRODUCTION The Internet of Things (IoT) consists of interconnected physical devices exchanging data through sensors, software, and connectivity [1], [2]. The healthcare industry has undergone a significant transformation in recent years with advances in IoT, cloud, artificial intelligence (AI), and machine learning (ML). According to several experts, the expanding horizon of IoT is expected to improve healthcare. IoT can revolutionize healthcare globally by providing affordable healthcare [3], remote health monitoring [4], wellness management [5], and virtual rehabilitation [6]. Healthcare analytics can provide insight into disease and drug discovery while adding a new dimension [7]. The associate editor coordinating the review of this manuscript and approving it for publication was Claudio Agostino Ardagna VOLUME 11, 2023 . The modern world requires more efficient and timely interventions to combat escalating health issues. While traditional healthcare systems are effective, these systems are often slow and inflexible [8]. The COVID-19 pandemic has fueled the need for remote and precision healthcare, and such objectives could only be achieved using emerging technologies. Embedding an IoT-enabled architecture in a healthcare ecosystem may facilitate the collecting and processing real-time data from sensors (i.e., body sensors strategically placed on or within a patient’s body, aiding real-time data collection) [9]. Different sensors are used for different applications, such as motion, flow, and biomedical. However, the ones used for healthcare applications are typically body sensor networks (BSN) [10]. In a BSN, each sensor is connected within a group, forming a network; this configuration enhances data collection and efficiency 2023 The Authors. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ 145869" 2401.09126v1,"Objects With Lighting: A Real-World Dataset for Evaluating Reconstruction and Rendering for Object Relighting Benjamin Ummenhofer 1,* Sanskar Agrawal 2 4 5 Kai Zhang Tianhang Cheng Stephan Richter 1 1 Rene Sepulveda 1 Shenlong Wang 5 Yixing Lao 3 German Ros 6,† Intel Labs, 2 Preimage, 3 The University of Hong Kong, 4 Adobe, 5 University of Illinois Urbana-Champaign, 6 NVIDIA Abstract Reconstructing an object from photos and placing it virtually in a new environment goes beyond the standard novel view synthesis task as the appearance of the object has to not only adapt to the novel viewpoint but also to the new lighting conditions and yet evaluations of inverse rendering methods rely on novel view synthesis data or simplistic synthetic datasets for quantitative analysis. This work presents a real-world dataset for measuring the reconstruction and rendering of objects for relighting. To this end, we capture the environment lighting and ground truth images of the same objects in multiple environments allowing to reconstruct the objects from images taken in one environment and quantify the quality of the rendered views for the unseen lighting environments. Further, we introduce a simple baseline composed of off-the-shelf methods and test several state-of-the-art methods on the relighting task and show that novel view synthesis is not a reliable proxy to measure performance. Code and dataset are available at https://github.com/isl-org/objects-with-lighting . 1. Introduction Inverse rendering, the task of recovering an object’s shape and material appearance from a collection of images, has been a longstanding goal in the fields of computer vision and graphics [4, 75]. Its potential applications span across diverse fields, such as photorealistic rendering [11, 79], video editing [26], simulation [14, 64] and mixed reality [36, 77]. However, inverse rendering poses significant challenges due to its ill-posed nature. The color of a pixel depends on a wide range of factors — often more numerous than the pixels observed — including but not limited to surface material, illumination, viewing angle, and surface geometry. * Corresponding author email benjamin.ummenhofer@intel.com † Work done while working at Intel Labs. Numerous methods have been proposed to tackle this problem, ranging from data-driven learning-based methods [37, 46, 48, 53, 77] to model-driven, optimization-based approaches [3, 11, 15, 29, 65, 79]. These have shown promising results in creating digital replicas of objects and rendering them from novel viewpoints and under different lighting conditions. Although qualitative comparisons among these methods are commonly made, the establishment of a comprehensive, unbiased, quantitative benchmark for evaluating inverse graphics approaches remains an elusive goal. This is largely because measuring ""ground truth"" surface reflective materials and illumination in the wild is notoriously difficult. Existing methods often resort to synthetic data [45, 80] or controlled lab settings [31, 50, 66], which inevitably restrict the applicability of these findings to real-world inverse graphics due to the domain shift. Merely evaluating novel view synthesis is inadequate since one can effectively render an object from a novel viewpoint without comprehending its materials and illumination. Instead, it becomes crucial to determine how effectively a relightable digital replica can generate realistic, high-fidelity images under diverse and novel lighting conditions. Despite this need, to the best of our knowledge, a well-calibrated, real-world, multi-illumination dataset enabling quantitative evaluation of object relighting remains absent. Motivated by these challenges, we present a novel, naturalistic, real-world dataset and benchmark for object reconstruction, rendering, and relighting. This dataset includes ground-truth environmental lighting and posed image observations for each object, captured across various natural illumination environments and viewpoints. All images have been geometrically and photometrically calibrated, facilitating the reconstruction of an object’s shape, material, and illumination from a single lighting environment, the object’s relighting under unseen lighting conditions, and the measurement of realism and fidelity against reference image observations. The dataset is characterized by a broad diversity of objects and illumination environments, spanning" 2401.09129v1,"Optimal one-sided approximants of circular arc Ada Šadl Praprotnik a,b,∗ , Aleš Vavpetič a,b , Emil Žagar a,b a Faculty of Mathematics and Physics, University of Ljubljana, Jadranska 19, Ljubljana, Slovenia b Institute of Mathematics, Physics and Mechanics, Jadranska 19, Ljubljana, Slovenia Abstract The optimal one-sided parametric polynomial approximants of a circular arc are considered. More precisely, the approximant must be entirely in or out of the underlying circle of an arc. The natural restriction to an arc’s approximants interpolating boundary points is assumed. However, the study of approximants, which additionally interpolate corresponding tangent directions and curvatures at the boundary of an arc, is also considered. Several low-degree polynomial approximants are studied in detail. When several solutions fulfilling the interpolation conditions exist, the optimal one is characterized, and a numerical algorithm for its construction is suggested. Theoretical results are demonstrated with several numerical examples and a comparison with general (i.e. non-one-sided) approximants are provided. Keywords: geometric interpolation, circular arc, parametric polynomial, Bézier curve 2020 MSC: 65D05, 65D07, 65D17 1. Introduction Circular arcs are among the most fundamental geometric objects used in the design of planar curves. Joining two arcs together in a biarc is quite a popular procedure in engineering, specially in robotics (see [1] and references therein). Although circular arcs can be considered as canonical objects in a particular computer-based design system, it is often desirable to work with polynomial objects only. Since a circular arc does not possess an exact polynomial representation, this leads to the problem of good (or the optimal) approximation of circular arcs by parametric polynomial curves. Several authors studied this problem in the frame of computer-aided geometric design (CAGD), from the pioneering paper [2] to the recent results on optimal approximation in [3] and [4]. Meanwhile, many authors considered a relaxed problem. They have either used the simplified radial distance as a measure of optimality, or they have fixed some free parameters to make the problem easier to handle (see [5] and a comprehensive list of references therein). In this paper, we focus on the optimal one-sided approximation, i.e., the one where an approximant of a circular arc is entirely in or entirely out of the underlying circle. This might be of interest when an approximant must not cross a circular arc for some reason (e.g., a design of circular molds). In both cases, the inner and outer ones will be studied in detail, and optimal solutions will be provided according to the Hausdorff distance. The paper is organized as follows. In Section 2, we review some basic definitions and discuss the number of free parameters for approximants of different degrees and the order of the geometric continuity. Sections 3, 4, and 5 deal with one–parametric optimization problems related the optimal one-sided G 0 , G 1 ∗ Corresponding author Email addresses: ada.sadl-praprotnik@imfm.si (Ada Šadl Praprotnik), ales.vavpetic@fmf.uni-lj.si (Aleš Vavpetič), emil.zagar@fmf.uni-lj.si (Emil Žagar) Preprint submitted to Computer Aided Geometric Design January 18, 2024" 2401.09145v1,"Your blush gives you away: detecting hidden mental states with remote photoplethysmography and thermal imaging Ivan Liu 1,2 , Fangyuan Liu 1 , Qi Zhong 2 , Fei Ma 3 , Shiguang Ni 4 1 Department of Psychology, Faculty of Arts and Sciences, Beijing Normal University at Zhuhai, Zhuhai, China 2 Faculty of Psychology, Beijing Normal University, Beijing, China 3 Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ),Shenzhen, China 4 Shenzhen International Graduate School, Tsinghua University, Shenzhen, China Corresponding Author: Shiguang Ni 4 University Town of Shenzhen, Nanshan District, Shenzhen, 518055, China Email address: ni.shiguang@sz.tsinghua.edu.cn Abstract Multimodal emotion recognition techniques are increasingly essential for assessing mental states. Image-based methods, however, tend to focus predominantly on overt visual cues and often overlook subtler mental state changes. Psychophysiological research has demonstrated that heart rate (HR) and skin temperature are effective in detecting autonomic nervous system (ANS) activities, thereby revealing these subtle changes. However, traditional HR tools are generally more costly and less portable, while skin temperature analysis usually necessitates extensive manual processing. Advances in remote photoplethysmography (r-PPG) and automatic thermal region of interest (ROI) detection algorithms have been developed to address these issues, yet their accuracy in practical applications remains limited. This study aims to bridge this gap by integrating r-PPG with thermal imaging to enhance prediction performance. Ninety participants completed a 20-minute questionnaire to induce cognitive stress, followed by watching a film aimed at eliciting moral elevation. The results demonstrate that the combination of r-PPG and thermal imaging effectively detects emotional shifts. Using r-PPG alone, the prediction accuracy was 77% for cognitive stress and 61% for moral elevation, as determined by a support vector machine (SVM). Thermal imaging alone achieved 79% accuracy for cognitive stress and 78% for moral elevation, utilizing a random forest (RF) algorithm. An early fusion strategy of these modalities significantly improved accuracies, achieving 87% for cognitive stress and 83% for moral elevation using RF. Further analysis, which utilized statistical metrics and explainable machine learning methods including SHapley Additive exPlanations (SHAP), highlighted key features and clarified the relationship between cardiac responses and facial temperature variations. Notably, it was observed" 2401.09162v1,"Named Service Networking as a primer for the Metaverse Paulo Mendes 1 Abstract—Ubiquitous extended reality environments such as the Metaverse will have a significant impact on the Internet, which will evolve to interconnect a large number of mixed reality spaces. Currently, Metaverse development is related to the creation of mixed reality environments, not tackling the required networking functionalities. This article analyzes suitable networking design choices to support the Metaverse, proposing a new service-centric networking approach capable of incorporating low-latency data fetching, distributed computing, and fusion of heterogeneous data types over the Cloud-to-Thing continuum. I. I NTRODUCTION The Metaverse will be based on interconnected ubiquitous eXtended Reality (XR) spaces encompassing immersive and interactive virtual and cyber-physical systems, networked over an Internet powered to provide users ubiquitous cyber-virtual experiences. Several Metaverse applications, such as smart manufacturing, remote health, and intelligent transportation systems will require new networking frameworks to interconnect autonomic virtual and physical agents encompassing realtime data gathering and analysis. In spite the general understanding about the internetworking requirements of the Metaverse, most of the discussion is centered on topics such as interoperability and ownership (e.g., Non-Fungible Tokens). However, there is a lack of discussion around the networking functionalities needed to transport new types of data (e.g., video, sound, haptic, holography) and to support the interaction between virtual applications and cyberphysical systems. Without a complementary discussion about networking, we may end up with a misalignment between the application layer aspirations and the capabilities of the networking functionality. For instance, expectations about Web3.0, also known as Semantic Web [1], related to enhanced interactions are different from how data is exchanged at the networking layer. From a networking perspective it is expected that the Metaverse will challenge traditional client-server web models and centralized cloud-based models, due to the need to support interoperability among a large number of XR spaces with low latency, which has to be kept lower than the human perceptible limit. To reduce latency, the Metaverse may rely on Multiaccess Edge Computing (MEC) [2] allowing cyber-physical devices to utilize nearby communication infrastructures and computing resources [3], while powering the intertwining between 3D virtual realms and physical systems. In this context, this article starts by discussing MEC limitations to support Metaverse in a Cloud-to-Thing continuum 1 Airbus, Willy-Messerschmitt-Strasse 1, 82024 Taufkirchen, Germany {paulo.mendes}@airbus.com scenario, and the role of information-centric and servicecentric networking to mitigate MEC challenges around resource discovery, dynamic function placement, and distributed data caching. A new framework intertwining in-network computing and Information Centric Networking (ICN) along the Cloud-to-Thing continuum is proposed. This new framework, called Software Defined Named Service Networking (SD- NSN), is proposed around a novel Named Service Networking (NSN) data plane that is combined with a Software Defined (SD) management plane defined based on a Software Defined Networking (SDN) service deployment strategy. The notion of Named Service proposed in this paper is a completely new approach. While the Name Service used in the Internet and by cloud platforms is an offline system that binds names to IP addresses to support packet forwarding based on the topological locations (IP addresses), the proposed Named Service based framework does not do any offline resolution of service names to IP addresses. On contrary, it provides an inline mechanism to forward packets based on service names. The remainder of the article goes as follows: Section II analyzes suitable networking approaches to support the Metaverse. After this initial analysis, Section III introduces the proposed SD-NSN networking framework and Section IV describes the new Named Service scheme used to manage computational services built based on serverless microservices. Section V provides a detailed description of the SD-NSN operation in terms of service deployment and service execution. Finally, Section VI shows how the SD-NSN framework can be used to support Metaverse applications in the Cloud-to-Thing continuum, while section VII summarizes the contribution of the article, pointing also to future research directions. II. F ROM E DGE C OMPUTING TO N AMED S ERVICE N ETWORKING Current Metaverse platforms rely on web protocols and cloud services suffering from performance limitations when interconnecting XR spaces. Some of the challenges pass by consistent throughput to handle high resolution XR applications and fast response times to computational requests. These challenges may be mitigated by bringing computing and storage resources towards the edge of the network [4]. Moreover, since Metaverse applications aims to operate on a decentralized manner, based on distributed ledger technology and Web3.0, it is importance that rely on a networking framework able to support decentralized services such as name resolution, identity management and resource discovery. This section analyzes three networking frameworks capable of supporting low latency, while protecting user privacy in a decentralized network: Edge computing, information-centric networking and service-centric networking." 2401.09167v1,"entropy Article Novel Entropy-Based Metrics for Long-Term Atrial Fibrillation Recurrence Prediction Following Surgical Ablation: Insights from Preoperative Electrocardiographic Analysis Pilar Escribano 1 , Juan Ródenas 1 , Manuel García 1 , Fernando Hornero 2 , Juan M. Gracia-Baena 2 , Raúl Alcaraz 1 and José J. Rieta 3, * 1 Citation: Escribano, P.; Ródenas, J.; García, M.; Hornero, F.; Gracia-Baena, J.M.; Alcaraz, R.; Rieta, J.J. Novel Entropy-Based Metrics for Long-Term Atrial Fibrillation Recurrence Prediction Following Surgical Ablation: Insights from Preoperative Electrocardiographic Analysis. Entropy 2024, 1, 0. https://doi.org/ Academic Editor: Paolo Castiglioni Received: 20 November 2023 2 3 * Research Group in Electronic, Biomedical and Telecommunication Engineering, University of Castilla-La Mancha, 02071 Albacete, Spain; pilar.escribano@uclm.es (P.E.); juan.rodenas@uclm.es (J.R.); manuel.garcia@uclm.es (M.G.); raul.alcaraz@uclm.es (R.A.) Cardiovascular Surgery Department, Hospital Clínico Universitario de Valencia, 46010 Valencia, Spain; hornero_fer@gva.es (F.H.); gracia_juabae@gva.es (J.M.G.-B.) BioMIT.org, Electronic Engineering Department, Universitat Politecnica de Valencia, 46022 Valencia, Spain Correspondence: jjrieta@upv.es Abstract: Atrial fibrillation (AF) is a prevalent cardiac arrhythmia often treated concomitantly with other cardiac interventions through the Cox–Maze procedure. This highly invasive intervention is still linked to a long-term recurrence rate of approximately 35% in permanent AF patients. The aim of this study is to preoperatively predict long-term AF recurrence post-surgery through the analysis of atrial activity (AA) organization from non-invasive electrocardiographic (ECG) recordings. A dataset comprising ECGs from 53 patients with permanent AF who had undergone Cox–Maze concomitant surgery was analyzed. The AA was extracted from the lead V1 of these recordings and then characterized using novel predictors, such as the mean and standard deviation of the relative wavelet energy (RWEm and RWEs) across different scales, and an entropy-based metric that computes the stationary wavelet entropy variability (SWEnV). The individual predictors exhibited limited predictive capabilities to anticipate the outcome of the procedure, with the SWEnV yielding a classification accuracy (Acc) of 68.07%. However, the assessment of the RWEs for the seventh scale (RWEs7), which encompassed frequencies associated with the AA, stood out as the most promising individual predictor, with sensitivity (Se) and specificity (Sp) values of 80.83% and 67.09%, respectively, and an Acc of almost 75%. Diverse multivariate decision tree-based models were constructed for prediction, giving priority to simplicity in the interpretation of the forecasting methodology. In fact, the combination of the SWEnV and RWEs7 consistently outperformed the individual predictors and excelled in predicting post-surgery outcomes one year after the Cox– Maze procedure, with Se, Sp, and Acc values of approximately 80%, thus surpassing the results of previous studies based on anatomical predictors associated with atrial function or clinical data. These findings emphasize the crucial role of preoperative patient-specific ECG signal analysis in tailoring post-surgical care, enhancing clinical decision making, and improving long-term clinical outcomes. Revised: 23 December 2023 Accepted: 26 December 2023 Published: Copyright: © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). Keywords: atrial fibrillation; Cox–Maze; surgical ablation; cardiac surgery; entropy; wavelet; longterm prediction; electrocardiogram analysis; decision tree models; signal processing 1. Introduction Atrial fibrillation (AF) is one of the most prevalent supraventricular rhythm disorders, impacting about 0.51% of the world’s population and affecting more than 37.5 million individuals [1]. The likelihood of suffering from this arrhythmia increases with age; only 0.16% of people under 50 have this disorder, whereas this proportion increases to 17% in people over 80 [2]. The expected increase in the population aged over 60 from 962 million in 2017 to more than 2 billion in 2050 [3], the higher occurrence of chronic conditions that Entropy 2024, 1, 0. https://doi.org/10.3390/e1010000 https://www.mdpi.com/journal/entropy" 2401.09175v1,"QAnswer: Towards Question Answering Search over Websites Kunpeng GUO ∗ The QA Company SAS Laboratoire Hubert Curien, UMR CNRS 5516 Saint-Etienne, France kunpeng.guo@univ-st-etienne.fr Clement Defretiere The QA Company SAS Université Jean Monnet Saint-Etienne, France clement.defretiere@the-qacompany.com Christophe Gravier Laboratoire Hubert Curien, UMR CNRS 5516 Saint-Etienne, France christophe.gravier@univ-stetienne.fr Dennis Diefenbach The QA Company SAS Laboratoire Hubert Curien, UMR CNRS 5516 Saint-Etienne, France dennis.diefenbach@the-qacompany.com Antoine Gourru Laboratoire Hubert Curien, UMR CNRS 5516 Saint-Etienne, France antoine.gourru@gmail.com ABSTRACT 1 Question Answering (QA) is increasingly used by search engines to provide results to their end-users, yet very few websites currently use QA technologies for their search functionality. To illustrate the potential of QA technologies for the website search practitioner, we demonstrate web searches that combine QA over knowledge graphs and QA over free text – each being usually tackled separately. We also discuss the different benefits and drawbacks of both approaches for web site searches. We use the case studies made of websites hosted by the Wikimedia Foundation (namely Wikipedia and Wikidata). Differently from a search engine (e.g. Google, Bing, etc), the data are indexed integrally, i.e. we do not index only a subset, and they are indexed exclusively, i.e. we index only data available on the corresponding website. Search is a fundamental element of the web which is offered mainly on two levels: CCS CONCEPTS • Information systems → Web searching and information discovery; Question answering. KEYWORDS Website Search, Question Answering, Open Domain Question Answering, Knowledge Graph Question Answering ACM Reference Format: Kunpeng GUO, Clement Defretiere, Dennis Diefenbach, Christophe Gravier, and Antoine Gourru. 2022. QAnswer: Towards Question Answering Search over Websites. In Companion Proceedings of the Web Conference 2022 (WWW ’22 Companion), April 25–29, 2022, Virtual Event, Lyon, France. ACM, New York, NY, USA, 4 pages. https://doi.org/10.1145/3487553.3524250 ∗ Corresponding Author ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only. WWW ’22 Companion, April 25–29, 2022, Virtual Event, Lyon, France © 2022 Association for Computing Machinery. ACM ISBN 978-1-4503-9130-6/22/04. . . $15.00 https://doi.org/10.1145/3487553.3524250 INTRODUCTION • Global Web search over (potentially) all websites available on the web, which is offered by search engines like (Google, Bing and Yandex) • Search on a single Website scale in order to create a search experience particularly adapted to the given Website content. Traditionally, both search functionalities exploit Information Retrieval (IR) systems. These are used to index the content and, given a search query, retrieve the documents that are more similar to the user’s request. In the last years, more fine-grained search systems are emerging that are derived from Question Answering research [12]. These not only retrieve a document that potentially contains the answer, but also highlight (for extractive QA [8]) or structure (for Knowledge Graphs QA [5]) the answer itself taken from the retrieved document which most likely contains the answer. These techniques are becoming more frequent in search engines that increasingly present “direct answers” to the user’s queries. We believe that this trend will also move to website search with the aim of improving content access and user experience. Websites hosted by the Wikimedia foundation are the most accessible websites to showcase search using question answering technologies. The main reason is that many researchers exploit these data due to the availability, licensing and quality of the data. As a consequence many resources (in terms of approaches and training data) are available. In this demo paper, we present a website search based on question answering technologies. We index the content of Wikipedia and Wikidata [14]. Both contents are currently only accessible on the respective websites via the traditional full-text search. The content includes both unstructured and structured contents. We therefore combine question answering technologies over free text and over knowledge graphs. We show the search experience that these technologies allow and describe the advantages that each one brings." 2401.09179v1,"Super-Directive Antenna Arrays: How Many Elements Do We Need? Ihsan Kanbaz ∗† , Okan Yurduseven ∗ , and Michail Matthaiou ∗ ∗ Centre for Wireless Innovation (CWI), Queen’s University Belfast, Belfast BT3 9DT, U.K. † Department of Electrical and Electronics Engineering, Gazi University, Ankara, Turkey e-mail: { i.kanbaz, okan.yurduseven, m.matthaiou } @qub.ac.uk Abstract—Super-directive antenna arrays have faced challenges in achieving high realized gains ever since their introduction in the academic literature. The primary challenges are high impedance mismatches and resistive losses, which become increasingly more dominant as the number of elements increases. Consequently, a critical limitation arises in determining the maximum number of elements that should be utilized to achieve super-directivity, particularly within dense array configurations. This paper addresses precisely this issue through an optimization study to design a superdirective antenna array with a maximum number of elements. An iterative approach is employed to increase the array of elements while sustaining a satisfactory realized gain using the differential evolution (DE) algorithm. Thus, it is observed that super-directivity can be obtained in an array with a maximum of five elements. Our results indicate that the obtained unit array has a 67.20% higher realized gain than a uniform linear array with conventional excitation. For these reasons, these results make the proposed architecture a strong candidate for applications that require densely packed arrays, particularly in the context of massive multiple-input multiple-output (MIMO). Index Terms—Dense arrays, optimization, realized gain, superdirective arrays. I. I NTRODUCTION The increasing interference in the frequency spectrum and the growing demand for faster data transmission have prompted researchers to focus on advanced communication systems at higher frequencies, such as 5G and beyond [1]–[3]. Due to the shorter wavelengths (higher frequency), it becomes possible to pack an unconventionally high number of antennas within finite volumes in order to compensate the exacerbated path loss and penetration losses. Not surprisingly, there has been a substantial surge in research efforts to develop cost-effective yet efficient hardware units, primarily focusing on antenna arrays [4]. Increasing the number of antennas within a confined space magnifies the mutual coupling effect in antenna arrays, degrading the array’s performance and introducing complex mathematical challenges for accurately calculating the current distributions This work was supported by a research grant from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant No. 101001331). of the array elements. Consequently, antenna engineers have focused on mitigating this mutual coupling effect and developing various array synthesis techniques. However, adapting these techniques to antenna array configurations with distinct geometric shapes proves to be a complex task. Despite this, a widely accepted approach for reducing the mutual coupling effect across all geometric shapes and array types involves maintaining an inter-element distance greater than half a wavelength [5]. Nevertheless, this method leads to an increase in the antenna size. This increase in the array form factor can be a significant limitation for massive MIMO applications, where arrays with numerous antenna terminals are deployed [6]. Therefore, recent attention has been directed towards the array configurations with interelement-antenna distances below half a wavelength, seeking for a more suitable solution [7]–[9]. Contrary to the common belief, a historically seminal study conducted by Uzkov uncovered an unexpected insight: reducing the distance between the isotropic antennas can improve the performance of an antenna array [10]. The traditional array systems typically assume that the directivity of an array increases linearly with the number of elements, but Uzkov demonstrated an intriguing alternative. He articulated that as the antenna spacing approaches zero in an ideal scenario, the resulting array directivity becomes proportional to the square of the number of elements. This shift in thinking has given rise to the concept of ’super-directive arrays’ where the focus is on creating more compact antenna arrays to achieve higher directivity [8], [11]. It is commonly acknowledged that there is a strong relationship between the directivity and the gain in antenna systems. The calculation of the gain includes both the directivity and radiation efficiency, as explained by Balanis [12]. In the context of super-directive arrays, where the challenges pertaining to the radiation efficiency are fundamental, super-conducting materials are suggested to address this issue. Another facet that merits consideration is related with the expression for the realized gain, which encompasses not only the radiation efficiency but also considers the line impedance mismatch [13]. The overall efficiency, combining the feedline and radiation efficiency, can be notably high in an ideally matched array." 2401.09181v1,"Beyond Anti-Forgetting: Multimodal Continual Instruction Tuning with Positive Forward Transfer 1 Introduction Recently, instruction tuning has shown effectiveness in bridging the gap between diverse vision-language tasks and creating general-purpose Multimodal Large Language Models (MLLMs) with broad capabilities [Dai et al., 2023; Liu et al., 2023]. In real-world applications, MLLMs are always expected to learn new vision-language tasks to support new functionalities. However, existing MLLMs are static and can not meet continuously emerging new requirements. To avoid the huge cost of retraining MLLMs, we can formulate this ∗ *Corresponding author Flickr30k 90 Learn Flickr30k 80 Forgetting 60 Vizwiz Multimodal Continual Instruction Tuning (MCIT) enables Multimodal Large Language Models (MLLMs) to meet continuously emerging requirements without expensive retraining. MCIT faces two major obstacles: catastrophic forgetting (where old knowledge is forgotten) and negative forward transfer (where the performance of future tasks is degraded). Although existing methods have greatly alleviated catastrophic forgetting, they still suffer from negative forward transfer. By performing singular value decomposition (SVD) on input embeddings, we discover a large discrepancy in different input embeddings. The discrepancy results in the model learning irrelevant information for old and pre-trained tasks, which leads to catastrophic forgetting and negative forward transfer. To address these issues, we propose Fwd-Prompt, a prompt-based method projecting prompt gradient to the residual space to minimize the interference between tasks and to the pre-trained subspace for reusing pre-trained knowledge. Our experiments demonstrate that Fwd-Prompt achieves state-of-the-art performance while updating fewer parameters and requiring no old samples. Our research sheds light on the potential of continuously adapting MLLMs to new tasks under the instruction tuning paradigm and encourages future studies to explore MCIT. The code will soon be publicly available. Forgetting 100 40 Negative Transfer 20 Learn Vizwiz 0 TextVQA Abstract 50 45 40 35 60 GQA Junhao Zheng, Qianli Ma*, Zhen Liu, Binquan Wu, Huawen Feng School of Computer Science and Engineering, South China University of Technology, Guangzhou, China junhaozheng47@outlook.com, qianlima@scut.edu.cn ∗ 40 20 0 Negative Transfer Forgetting Learn TextVQA Negative Transfer Learn GQA Initial -> Flickr30k-> Vizwiz-> TextVQA -> GQA Figure 1: Catastrophic forgetting and negative forward transfer in multimodal continual instruction-tuning. InstructBLIP [Dai et al., 2023] is sequential instruction-tuned on Flickr30k, VizWiz, TextVQA and GQA. scenario into the paradigm of Multimodal Continual Instruction Tuning (MCIT). In MCIT, we aim to instruction-tune MLLMs for new multimodal tasks incrementally while maintaining superior performance on learned tasks. For example, we start from InstructBILP [Dai et al., 2023], an MLLM instruction tuned on 13 datasets. Then, we instruction-tune InstructBILP incrementally on Flickr30k [Young et al., 2014], VizWiz [Gurari et al., 2018], TextVQA [Singh et al., 2019], and GQA [Hudson and Manning, 2019]. At last, we expect the final model to perform well on both 4 downstream and 13 pre-trained tasks. Therefore, MCIT is an ideal scenario that equips MLLMs with new skills incrementally without retraining on all datasets. However, MCIT is particularly challenging. Unlike typical continual learning scenarios, the tasks in MCIT are diverse in terms of input and output format. For example, in Flickr30k, the model outputs a detailed description given an" 2401.09185v1,"Behavior Trees with Dataflow: Coordinating Reactive Tasks in Lingua Franca Alexander Schulz-Rosengarten Akash Ahmad Malte Clement Reinhard von Hanxleden {als,stu222517,mac,rvh} @informatik.uni-kiel.de Kiel University Kiel, Germany Benjamin Asch Marten Lohstroh Edward A. Lee {benjamintasch,marten,eal} @berkeley.edu UC Berkeley Berkeley, USA Gustavo Quiros Araya Ankit Shukla {gustavo.quiros,ankit.shukla} @siemens.com Siemens Technology USA ABSTRACT 1.1 Behavior Trees ( BTs ) provide a lean set of control flow elements that are easily composable in a modular tree structure. They are well established for modeling the high-level behavior of non-player characters in computer games and recently gained popularity in other areas such as industrial automation. While BTs nicely express control, data handling aspects so far must be provided separately, e. g. in the form of blackboards. This may hamper reusability and can be a source of nondeterminism. We here present a dataflow extension to BTs that explicitly models data relations and communication. We provide a combined textual/graphical approach in line with modern, productivity-enhancing pragmatics-aware modeling techniques. We realize and validate that approach in the recently introduced polyglot coordination language Lingua Franca ( LF ). While the simplicity of BTs is attractive, its minimalist notation leaves the aspect of handling data unaddressed. This aspect, however, is crucial when using BTs for implementing behaviors that need to adapt based on data. In cyber-physical systems, such as robots or of vehicles, data may originate from sensors that inform the software about the state of its environment. A common solution is to use a blackboard [22] that introduces a global set of variables to a BT . However, in combination with a parallel composition in a BT , unconstrained access to shared variables can easily lead to race conditions and non-deterministic behavior. This hampers reproducibility, robustness, and debugging, and may be fatal when designing safety-critical software. Furthermore, as discussed further in Sec. 7, existing BT frameworks tend to be graphics-first, where users manually draw BT diagrams disconnected from their actual realization, or text-only, where BTs are realized, e. g., as C++ library. Both approaches do not fully use the potential of integrating graphics and text. CCS CONCEPTS • Software and its engineering → Model-driven software engineering; Abstraction, modeling and modularity; Visual languages; Orchestration languages. KEYWORDS Behavior trees, reactive systems, coordination languages, Lingua Franca 1 INTRODUCTION BTs originated in the gaming industry, where they are used to pro- gram non-player characters [11, 23]. They express complex behavior with highly reactive and modular software components coordinating agents in groups. Their simplicity and modularity has made them increasingly popular in real-world applications as well, such as industrial automation, where BTs control machines and robots in automated factories. BTs use a model-based approach with a simple and intuitive tree structure and a lean set of control flow elements. BTs are a high-level composition mechanism that supports the engineering of complex software systems by hierarchically composing atomic behaviors. We generally believe that BTs with their largely non-academic heritage deserve more attention in computer science research than they have received so far. There is some existing related work but, overall, the coverage does not seem adequate in light of the practical utility of BTs in software engineering. 1.2 Motivation Approach To address the handling of data, we propose to adopt a dataflow notation, already exemplified by various modeling languages, such as SCADE [8] or actors [1], which breaks down the program into smaller blocks with streams of data flowing between them. Dataflow, unlike blackboards, explicitly models data interfaces and communication, thus supporting modularity. Dataflow nodes, or actors, have explicit inputs and outputs, which define the way instances of these nodes need to be interconnected with their surrounding context. BTs provide a modular design, and instantiating a node or entire BT as a child seems rather straightforward, which facilitates reusability. However, if such a node or BT relies on access to a blackboard and may base its behavior on data written by other nodes to these variables, this constitutes a rather brittle interface. There is typically no indication which variables are considered inputs, outputs, or only local, and how to separate and address multiple instantiations and their memory. One solution could be to utilize decorator nodes, to attach these mappings to the BT [10, 11]. Instead, we propose to treat communication as a first-class citizen, as modeling it explicitly facilitates formal analyses and program comprehension. To address the sound integration of text and graphics, we propose a pragmatics-aware modeling approach [30]. Here, all the details and business logic of a model are specified in a textual file, and" 2401.09195v1,"TRAINING-FREE SEMANTIC VIDEO COMPOSITION VIA PRE-TRAINED DIFFUSION MODEL Jiaqi Guo, Sitong Su, Junchen Zhu, Lianli Gao, Jingkuan Song University of Electronic Science and Technology of China (UESTC) ABSTRACT Index Terms— video composition, training-free, semantic disparities. 1. INTRODUCTION Video composition investigates seamlessly blending multiple specified objects into a visually harmonious video, which has extensive applications in social media, artistic creation, and film production. It can be categorized into two types: textguided composition and reference-guided composition. Textguided composition[2] is provided with an image or video of the scenario and sentences of specific objects, thereby generating matching videos on this scenario. In contrast, referenceguided composition[3, 4] presents greater challenges since it provides reference videos of specific objects and requires the output to restore detailed characteristics. Existing methodologies of reference-guided video composition primarily concentrate on modifying color and lighting of the specified foreground to achieve visual concordance with the background, which is also referred to as video Inference process Training process The video composition task aims to integrate specified foregrounds and backgrounds from different videos into a harmonious composite. Current approaches, predominantly trained on videos with adjusted foreground color and lighting, struggle to address deep semantic disparities beyond superficial adjustments, such as domain gaps. Therefore, we propose a training-free pipeline employing a pre-trained diffusion model imbued with semantic prior knowledge, which can process composite videos with broader semantic disparities. Specifically, we process the video frames in a cascading manner and handle each frame in two processes with the diffusion model. In the inversion process, we propose Balanced Partial Inversion to obtain generation initial points that balance reversibility and modifiability. Then, in the generation process, we further propose Inter-Frame Augmented attention to augment foreground continuity across frames. Experimental results reveal that our pipeline successfully ensures the visual harmony and inter-frame coherence of the outputs, demonstrating efficacy in managing broader semantic disparities. Previous methods recover color and lighting variations still disparate deep semantic disparities Ours “A photograph of an astronaut before a building, ultra realistic.” Training-free jiaqiguo7@outlook.com, sitongsu9796@gmail.com, junchen.zhu@hotmail.com pre-trained diffusion model “An ink painting of a lion.” both ink painting Fig. 1: Comparison of our methods with previous methods. Above: Training and inference process of previous methods[1]. They perform poorly facing deep semantic disparities. Below: Our training-free pipeline. We achieve satisfactory results in both color and lighting adjustments and deep semantic transformation. More cases can be found in https://anonymous.4open.science/ r/paper130. harmonization[1, 5, 6]. These approaches often train a network on extensive samples which are typically constructed by artificially introducing disharmony in the foreground appearance of ground-truth samples, as shown in the first row of Fig. 1. In this strategy, the networks are adept at adjusting the pixel colors of the foreground and recovering the training samples. However, a significant limitation arises when encountering more complex semantic disparities between the specified foreground and background. An example of such a disparity is given in Fig.1: when the foreground comprises a real-world lion and the background originates from an ink" 2401.09199v1,"Data Trading and Monetization: Challenges and Open Research Directions Qusai Ramadan Institute of Software Engineering University of Koblenz Germany qramadan@uni-koblenz.de Zeyd Boukhers Fraunhofer Institute for Applied Information Technology FIT, and Uniklinik Köln Germany zeyd.boukhers@fit.fraunhofer.de Christoph Lange Fraunhofer Institute for Applied Information Technology FIT, and RWTH Aachen University Germany christoph.langebever@fit.fraunhofer.de ABSTRACT Traditional data monetization approaches face challenges related to data protection and logistics. In response, digital data marketplaces have emerged as intermediaries simplifying data transactions. Despite the growing establishment and acceptance of digital data marketplaces, significant challenges hinder efficient data trading. As a result, few companies can derive tangible value from their data, leading to missed opportunities in understanding customers, pricing decisions, and fraud prevention. In this paper, we explore both technical and organizational challenges affecting data monetization. Moreover, we identify areas in need of further research, aiming to expand the boundaries of current knowledge by emphasizing where research is currently limited or lacking. KEYWORDS Data marketplaces, data trading, data monetization 1 INTRODUCTION The amounts of data being created, captured, and replicated are continuously increasing at a fast pace. According to a recent study, the projected growth of annual data on a global scale indicates a substantial rise from 33 zettabytes in 2018 to an estimated 175 zettabytes by the year 2025 [32]. The availability of data and advanced technologies offer substantial potential for creating value. Therefore, within the business landscape, data has transitioned from being merely an enabler of products to becoming valuable products in and of themselves, serving as strategic resources for companies [37]. For example, it is predicted that the European Union’s data economy will attain a value of €829 billion, accompanied by a notable expansion in the workforce of data professionals, expected to reach 10.9 million by 2025 [32]. In situations where organizations lack efficient amounts and high-quality data to effectively execute or enhance their processes and services (which is the case in many SMEs) they may seek to acquire data from other organizations through purchasing arrangements. Traditionally, data monetization involves selling or licensing Muath AlShaikh College of Computing and Informatics Saudi Electronic University Kingdom of Saudi Arabia m.alshaikh@seu.edu.sa Jan Jürjens University of Koblenz, and Fraunhofer-Institute for Software and Systems Engineering ISST Germany http://jan.jurjens.de data directly to third parties. However, this approach often raised privacy concerns and required transferring large volumes of data, which could be time-consuming and costly [19]. As a result, in recent times, a multitude of digital data marketplaces and platforms have emerged, serving as intermediaries between data providers and consumers. Data marketplaces represent a recent development in the market, with recent instances emerging as a means to facilitate industrial data trading and monetization. Despite the growing establishment and acceptance of data marketplaces in industry (with more than 70% of enterprises in the EU having already acquired external data), substantial obstacles persist that hinder data trading [19]. In this paper, we shed light on the current technical and organizational challenges that affect data monetization. We also identify open research directions to push the boundaries of existing knowledge by highlighting areas where research is limited or lacking. This paper is organized as follows: in Section 2 we provide the necessary background. Section 3 provides the state of the art. In Section 4 we explore the challenges that affect data monetization, and we propose future research directions toward addressing the identified challenges. In Section 5 we discuss the limitations of our research findings. Finally, Section 6 concludes this paper. 2 BACKGROUND Online data marketplaces have evolved through different phases and in different categories. Initially, data catalogues focused on open data, providing search and browse mechanisms for metadata and links to data sets. Then, government and industrial marketplaces facilitated secure data exchange and data sovereignty. In later phases, personal data markets and open science marketplaces emerged 1 , along with Sensor Data Marketplaces for IoT data 2 . Three distinct directions have been deliberated and implemented concerning the architecture of data marketplaces: 1 https://marketplace.eosc-portal.eu/, Accessed: (14 September 2023) 2 https://rubygarage.org/blog/big-data-marketplaces, Accessed: (14 September 2023)" 2401.09207v1,"1 An Energy-efficient Capacitive-Memristive Content Addressable Memory Yihan Pan Graduate Student Member, IEEE, Adrian Wheeldon Mohammed Mughal Themis Prodromakis Member, IEEE, Member, IEEE, Shady Agwa, Member, IEEE, Senior Member, IEEE, and Alexantrou Serb Abstract—Content addressable memory is popular in the field of intelligent computing systems with its searching nature. Emerging CAMs show a promising increase in pixel density and a decrease in power consumption than pure CMOS solutions. This article introduced an energy-efficient 3T1R1C TCAM cooperating with capacitor dividers and RRAM devices. The RRAM as a storage element also acts as a switch to the capacitor divider while searching for content. CAM cells benefit from working parallel in an array structure. We implemented a 64 x 64 array and digital controllers to perform with an internal built-in clock frequency of 875MHz. Both data searches and reads take 3x clock cycles. Its worst average energy for data match is reported to be 1.71 fJ/bit-search and the worst average energy for data miss is found with 4.69 fJ/bit-search. The prototype is simulated and fabricated in 0.18 um technology with in-lab RRAM post-processing. Such memory explores the charge domain searching mechanism and can be applied to data centers that are power-hungry. Index Terms—Content addressable memory(CAM), capacitivedivider, resistive random-access memory(RRAM) I. I NTRODUCTION T RADITIONAL memory structures such as SRAM and DRAM are address-addressable only. With the development of intelligent systems, address-addressable-only memories limit computing efficiency in terms of data processing and transferring. Advanced intelligent systems require not only memory storage but also the ability to locate memory addresses by certain content [1]. We call this type of memory content addressable memory (CAM), also known as associative memory. The search-by-content manner of CAMs enables data visible to the system and accelerates information processes to focus on their location of interests without other extra data movement compared to the von Neumann architecture. Therefore, the ability of bit storage and comparison has made CAM attractive to the field of network routers [2], packet classification [3], neuromorphic computing [4], reconfigurable computing [5], pattern recognition [6], and data compression [7]. Conventional CAM in CMOS technology normally uses SRAM as memory elements to store data and its data compar- Y. Pan, A. Wheeldon, M. Mughal, S. Agwa, T. Prodromakis and A. Serb are with the Centre for Electronics Frontiers, Institute for Integrated Micro and Nano Systems, School of Engineering, University of Edinburgh, EH9 3LA, UK. (emails: yihan.pan@ed.ac.uk; adrian.wheeldon@ed.ac.uk; mmughal@exseed.ed.ac.uk; shady.agwa@ed.ac.uk; t.prodromakis@ed.ac.uk; aserb@ed.ac.uk). Senior Member, IEEE, ison is implemented by NAND-based [8] or NOR-based [9] topologies. A basic binary CAM typically has 10T (transistors) whereas it also can be implemented into a ternary CAM that takes two SRAM together to acquire an additional state called ‘don’t care’ in 16T [10]. CAM cell allows parallel searching and they normally been built with memory arrays. Studies have looked for a denser and more robust solution with less power consumption in the SRAM-based design [11]. Although the CAM memory is desired because of its high operational speed and searching function, its density increases its cost of implementation more than the other standard memories in CMOS. Thus, emerging memories beyond CMOS technologies have been taken into the field to maintain a high throughput rate with a reduction in area [1]. Emerging devices are treated as canonically non-volatile and their characteristics depend on the properties of their fabrication materials or structures. They are categorized by their operation mechanisms such as Resistive Random Access Memory (RRAM) [12], Phase Change Memory (PCM) [13], Ferroelectric RAM (FeRAM) [14], and magnetic RAM (MRAM) [15]. Those devices have a common factor that they can be altered to different states leading to a suitable technique for memory. As a result, the bit storage for CAM with emerging technologies is achieved by the device itself instead of two SRAMs (12T). At the same time, the bit comparison utilizes the differences between states to distinguish the stored bit on the device. In this work, we are focused on RRAM whose resistivity can be altered to different levels. The Metal- Insulator-Metal (MIM) structure of RRAM changes its resistance by redox processes, coupling to ion-migration effects [16]. In other words, the device resistance can be switched to a low resistance state (LRS) or a high resistance state (HRS) by applying set and reset threshold pulses respectively. Some material structure also allows middle resistance states to form the RRAM a multi-bit memory cell [17]. Existing non-volatile CAMs are proposed with a much dense area. The RC-XNOR-Z in [18] uses RRAM for storage and XNOR gate for evaluation. The non-volatile device can be also used for evaluation such as the 4T2R RRAM-based TCAM proposed in [19]. It implies an RC delay but suffers from a long recovery time for high RRAM resistive states. The same group also researched a 3T1R TCAM [20] further to improve the performance. However, the 3T1R solution works as a resistor divider which has a direct current path, consuming" 2401.09212v1,"Role of Elastic Phonon Couplings in Dictating the Thermal Transport across Atomically Sharp SiC/Si Interfaces Qinqin He 1# , Yixin Xu 1# , Haidong Wang 2 , Zhigang Li and Yanguang Zhou 1 * 1 Department of Mechanical and Aerospace Engineering, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong SAR 2 Key Laboratory of Thermal Science and Power Engineering of Ministry of Education, Tsinghua University, Beijing, 100084, China Abstract Wide-bandgap (WBG) semiconductors have promising applications in power electronics due to their high voltages, radio frequencies, and tolerant temperatures. Among all the WBG semiconductors, SiC has attracted attention because of its high mobility, high thermal stability, and high thermal conductivity. However, the interfaces between SiC and the corresponding substrate largely affect the performance of SiC-based electronics. It is therefore necessary to understand and design the interfacial thermal transport across the SiC/substrate interfaces, which is critical for the thermal management design of these SiC-based power electronics. This work systematically investigates heat transfer across the 3C-SiC/Si, 4H-SiC/Si, and 6H-SiC/Si interfaces using non-equilibrium molecular dynamics simulations and diffuse mismatch model. We find that the room temperature ITC for 3C-SiC/Si, 4H-SiC/Si, and 6H-SiC/Si interfaces is 932 MW/m 2 K, 759 MW/m 2 K, and 697 MW/m 2 K, respectively. We also show the contribution of the ITC resulting from elastic scatterings at room temperature is 80% for 3C-SiC/Si interfaces, 85% for 4H-SiC/Si interfaces, and 82% for 6H-SiC/Si interfaces, respectively. We further find the ITC contributed by the elastic scattering decreases with the temperature but # These authors contribute equally to this work. *Author to whom all correspondence should be addressed. Email: maeygzhou@ust.hk (Y. Zhou) 1" 2401.09221v2,"Multiple Subset Problem as an encryption scheme for communication Yair Zadok 1 , Nadav Voloch 2 , Noa Voloch-Bloch 3 and Maor Meir Hajaj 4 1 Achva Academic College, MP. Shikmim, Israel 2 Ruppin Academic Center, Emek Hefer, Israel 3 Raicol Crystals Ltd., Rosh Ha’Ayin, Israel 4 University of Haifa, Israel voloch@post.bgu.ac.il Abstract. Using well-known mathematical problems for encryption is a widely used technique because they are computationally hard and provide security against potential attacks on the encryption method. The subset sum problem (SSP) can be defined as finding a subset of integers from a given set, whose sum is equal to a specified integer. The classic SSP has various variants, one of which is the multiple-subset problem (MSSP). In the MSSP, the goal is to select items from a given set and distribute them among multiple bins, ensuring that the capacity of each bin is not exceeded while maximizing the total weight of the selected items. This approach addresses a related problem with a different perspective. Here a related different kind of problem is approached: given a set of sets A = {A 1 , A 2 ,…,A n }, find an integer s, for which every subset of the given sets is summed up to, if such an integer exists. The problem is NP-complete when considering it as a variant of SSP. However, there exists an algorithm that is relatively efficient for known private keys. This algorithm is based on dispensing non-relevant values of the potential sums. In this paper we present the encryption scheme based on MSSP and present its novel usage and implementation in communication. Keywords: Encryption, Cryptography, Subset problem, Communication, NP- complete problems. 1 Introduction and related work Methods of encryption have been widely used in the past decades for various purposes, from financial transactions, working with databases, internet communication, etc. Different encryption schemes fit different purposes. The basic encryption idea is to create a scheme that will be secure from possible untrustworthy third parties, that intend to approach our data. For that, the data being transferred is usually in a form that is not understandable to someone that does not have the knowledge of the encryption algorithm, or certain keys, that the receiver of the message does have. In this paper we further develop our encryption scheme that is based on a variant of the Multiple Subset Problem and was presented in [1]. We implement this method as a secure communication protocol, that has a unique and novel method of encrypting and decrypting data." 2401.09226v1,"Characterizing and visualizing the direct injection of hydrogen into high-pressure argon and nitrogen environments Max Peters ∗ , Noud Maes, Nico Dam, Jeroen van Oijen Department of Mechanical Engineering, Eindhoven University of Technology, P.O. Box 513, 5600 MB Eindhoven, the Netherlands Abstract Using argon as the working fluid in an internal combustion engine holds the potential of substantially enhancing thermal efficiency because of its high specific heat ratio. Burning hydrogen, not with air but with pure oxygen, in a closed-loop argon power cycle would lead to an emission-free exhaust composition, effectively containing only water and argon, which can be separated by condensation. One of the current challenges is the high-pressure direct injection of both fuel and oxidizer, which directly controls the combustion process. To support the development of such an injection strategy, high-pressure injections of hydrogen in pressurized argon and nitrogen are investigated using high-speed Schlieren and pressure transducers in a non-heated constant-volume chamber at varying conditions. We show that hydrogen mass flow is well described by choked flow theory, while jet penetration and angle are determined by the pressure ratio between the fuel line and the ambient. A correlation is presented between jet penetration and pressure ratio for argon or nitrogen ambient at room temperature. Keywords: Argon Power Cycle (APC), hydrogen injection, jet penetration, constant-volume setup, discharge coefficient 1. Introduction For the increasing energy demand with a simultaneous push toward cleaner technologies, hydrogen is considered as a future energy carrier in a multitude of applications [1]. For one of these applications, internal combustion engines (ICE), many different pathways regarding hydrogen injection, ignition, and combustion strategy are considered to optimize power density, emissions, and efficiency [2, 3]. One approach for pollutant-free, cost-effective power production could be the use of a hydrogen-based Argon Power Cycle (APC): an ICE with argon as the working fluid, in which hydrogen is burned not with air but with pure oxygen. This idea was first patented and introduced by Laumann and Reynolds in 1978 [4], followed by ∗ Corresponding author Email address: m.e.e.peters@tue.nl (Max Peters) Preprint submitted to Elsevier January 18, 2024" 2401.09231v1,"Scalable Resource Provisioning for Multi-user Communications in Next Generation Networks A. Neto Institute of Telecommunications Aveiro, Portugal E. Cerqueira, M. Curado and E. Monteiro P. Mendes University of Coimbra Porto, Portugal Coimbra, Portugal pmendes@inescporto.pt augusto@av.it.pt INESC {ecoelho; marilia; edmundo}@dei.uc.pt Abstract—The great demand for real-time multimedia sessions encompassing groups of users (multi-user), associated with the limitations of the current Internet in providing quality assurance, has raised challenges for defining the best mechanisms to deploy the Next Generation of Networks (NGN). There is a consensus that an efficient and scalable provisioning of network resources is crucial for the success of the NGN, mainly in what concerns access networks. Previous solutions for the control of multi-user sessions rely mostly on uncoordinated actions to allocate per-flow bandwidth and multicast trees. This paper introduces a Multiuser Aggregated Resource Allocation mechanism (MARA) that coordinates the control of class-based bandwidth and multicast resources in a scalable manner. In comparison with previous work, MARA significantly reduces signaling, state and processing overhead. The performance benefits of MARA are analyzed though simulations, which successfully demonstrated the significant optimization in the network performance. Keywords-Next generation networks; provisioning; Multi-user communications. I. Network resource I NTRODUCTION Changes in competition patterns are forcing Internets Service Providers (ISPs) to support more competitive applications. Some of those applications rely on the simultaneous delivery of content to groups of users (multi-user sessions), such as (mobile) IPTV, video streaming and video conferencing. In this context, the use of IP multicast allows the deployment of multi-user communications with good usage of resources in constrained (access) IP networks, as done today by DSL access providers. However, the per-flow control of IP multicast trees associated with the lack of coordination between the control of multicast and bandwidth resources may limit the success of large scale deployment of multi-user IP communications in the Next Generation of Networks (NGN). Trying to overcome some of the described limitations, the authors proposed in a previous work a mechanism, called MultI-Service Resource Allocation (MIRA) [1], supporting the coordinated control of Source-Specific Multicast (SSM) trees and bandwidth of DiffServ classes. With MIRA, the complexity of resource allocation is pushed to network edges, while interior routers remain simple. MIRA coordinates resource allocation within a network via a per-flow edge-to- edge ingress-driven signaling approach implemented by the MIRA Protocol (MIRA-P). MIRA-P uses only two messages for resource requests (indicated by message-specific flags) and operation feedback, called RESERVE and RESPONSE respectively. The performance evaluation presented in [1] shows that MIRA distinguishes itself from existing solutions by providing a low complexity approach to minimize signaling and state overhead. However, the main limitation of MIRA resides in the per-flow signaling to control the bandwidth of DiffServ classes and IP multicast trees. Whereas the control of bandwidth introduces excessive signaling load and processing overhead in large-scale networks, the control of multicast trees suffers from state overhead and has no access control and QoS support. Our performance findings in the analysis of MIRA motivated further investigation of methods to avoid per-flow operations, as much as possible. This paper extends our previous work by proposing the Multi-user Aggregated Resource Allocation (MARA), aiming to minimize the signaling, state and processing overhead of MIRA per-flow operation. MARA dynamically controls the overprovisioning of DiffServ classes bandwidth and multicast trees to increase the scalability of IP multi-user sessions on NGNs. The combination of surplus resources (bandwidth and multicast trees) with admission control allows MARA to establish multiple multi-user sessions without per-flow signaling. Multicast aggregation is used to optimize multicast state storage. To analyze the expected benefits of MARA over MIRA, a performance evaluation is carried out by simulations. The main goal is to analyze bandwidth and multicast state, as well as signaling overhead. The remainder of this paper is organized as follows. Related work is presented in section 2. Section 3 provides a detailed description of MARA, whose performance is evaluated in Section 4. Finally, Section 5 concludes this paper with a summary of our findings. II. RELATED WORK Resource allocation based on over-reservations has been addressed in the literature on a set of proposals. The Border Gateway Reservation Protocol (BGRP) [2] and the Sharedsegment Inter-domain Control Aggregation protocol (SICAP) [3], use a similar two-pass receiver-driven signaling schema to This work was done at the Laboratory of Communications and Telematics of the Faculty of Science and Technology of the University of Coimbra. It is supported by DoCoMo Euro-labs, by the Portuguese Ministry of Science, Technology and High Education, and by European Union FEDER - POSI (projects Q3M and SAPRA). At the time, Augusto Neto was working in University of Coimbra, and Paulo Mendes in NTT DoCoMo Euro-Labs. 978-1-4244-2324-8/08/$25.00 © 2008 IEEE. 1 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ""GLOBECOM"" 2008 proceedings." 2401.09239v1,"DaFoEs: Mixing Datasets towards the generalization of vision-state deep-learning Force Estimation in Minimally Invasive Robotic Surgery Mikel De Iturrate Reyzabal 1 , Mingcong Chen 2 , Wei Huang 2 , Sebastien Ourselin 1 and Hongbin Liu 1,2 Abstract—Precisely determining the contact force during safe interaction in Minimally Invasive Robotic Surgery (MIRS) is still an open research challenge. Inspired by post-operative qualitative analysis from surgical videos, the use of cross-modality data driven deep neural network models has been one of the newest approaches to predict sensorless force trends. However, these methods required for large and variable datasets which are not currently available. In this paper, we present a new vision-haptic dataset (DaFoEs) with variable soft environments for the training of deep neural models. In order to reduce the bias from a single dataset, we present a pipeline to generalize different vision and state data inputs for mixed dataset training, using a previously validated dataset with different setup. Finally, we present a variable encoder-decoder architecture to predict the forces done by the laparoscopic tool using single input or sequence of inputs. For input sequence, we use a recurrent decoder, named with the prefix R, and a new temporal sampling to represent the acceleration of the tool. During our training, we demonstrate that single dataset training tends to overfit to the training data domain, but has difficulties on translating the results across new domains. However, dataset mixing presents a good translation with a mean relative estimated force error of 5% and 12% for the recurrent and non-recurrent models respectively. Our method, also marginally increase the effectiveness of transformers for force estimation up to a maximum of ≃ 15%, as the volume of available data is increase by 150%. In conclusion, we demonstrate that mixing experimental set ups for vision-state force estimation in MIRS is a possible approach towards the general solution of the problem. I. I NTRODUCTION Minimally Invasive Robotic Surgery (MIRS) has been a broad area of research in recent years. One of the main challenges of these procedures is the safe and precise interaction with the soft environment, in order to avoid tissue damage or excessive bleeding. One way of increasing the safeness of the operations is to exchange control and simulate the current forces during the surgical task with real-time haptic feedback. Moreover, haptic feedback has been demonstrated to effectively reduce the amount of force during mock training soft tissue phantoms under different experimental set ups [1], [2]. Generating trustworthy and accurate haptic feedback is *This work was supported by UK Research and Innovation in the Engineering and Physical Sciences Research Council (EPSRC) iCASE [2446549] and the Centre for Artificial Intelligence and Robotics, Hong Kong Institute of Science & Innovation, Chinese Academy of Sciences (InnoHK). 1 Mikel De Iturrate Reyzabal, Sebastien Ourselin and Hongbin Liu are with the School of Biomedical Engineering and Imaging Sciences, King’s College London, UK, 2 Wei Huang, Mingcong Chen and Hongbin Liu are with the Centre for Artificial Intelligence and Robotics Hong Kong Institute of Science & Innovation, Chinese Academy of Sciences, Hong Kong. Correspondence: mikel.de_iturrate_reyzabal@kcl.ac.uk The code used in this research for the training and validation of the NN models can be found at: https://github.com/mikelitu/DaFoEs still an open research challenge [3]. One of the solutions for this problem is the use of force sensors at the tip of the robotic tool, to measure the contact force. There are various types of sensors depending on the mechanical or physical property that translates into the force. However, the development of such technologies is a difficult task as the list of requirements is extended. Some of the most relevant characteristics of these sensors are scalability, exact wide working range and biocompatibility, to name but a few. Other approaches to estimate the interaction force with the environment required the use of mathematical or physical models. These models can be adapted to the different robotic systems, such as the Da Vinci [4] Robotic system (Intuitive Surgical), to estimate the interaction wrench at the end effector, using the dynamic modelling of the string base robotic forceps. However, these methods are constrained to these unique systems. On the other hand, specific environments could be modelled using the Finite Element Method (FEM) approach. In which, Lagrangian Constraint Equations are used to determine the contact forces from the tool. Although there are many viable simulators available for this task [5], the solution of such equations is largely influenced by the geometry and physical parameters, as well as, the modelling of constraints. In the absence of sensors and models surgeons use visual information to qualitatively determine the effectiveness of a given motion and, therefore, infer the contact force. Although this kind of methods have been used to quantitatively score the performance of certain tasks [6], they present a clear subjective individual bias. In order to find a more general solution based on these visual performance evaluations, Deep Neural Networks have become the standard approach for vision-based sensorless force estimation. Specifically, Convolutional Neural Networks (CNN) presented a light and fast approach to the solution of this problem, but as demonstrated in some research visual predictions are sensitive to unseen environments [7]. Consequently, in the same study Chua et al. show that the combination of visual and robot state increases the robustness and generalization of such models. However, CNNs , due to their lack of temporal expansion, miss relevant information regarding the force and usually require from heavier robot state vectors. Here is where Recurrent Neural Networks (RNN) shown better results for lighter robot state vectors and multiple camera views [8]–[10]. More specifically in surgery, newest research have concluded that the combination of convolutional image encoder and recurrent decoder showed better results even for the most complex scenarios [11], [12]. Nevertheless, in other vision-based research" 2401.09241v1,"Biased-MPPI: Informing Sampling-Based Model Predictive Control by Fusing Ancillary Controllers Elia Trevisan and Javier Alonso-Mora Abstract— Motion planning for autonomous robots in human-populated environments poses numerous challenges due to uncertainties in the robot’s dynamics, environment, and interaction with other agents. Sampling-based MPC approaches, such as Model Predictive Path Integral (MPPI) control, have shown promise in addressing these complex motion planning problems. However, the performance of MPPI heavily relies on the choice of the sampling distribution. Existing literature often uses the previously computed input sequence as the mean of a Gaussian distribution for sampling, leading to potential failures and local minima. In this paper, we propose novel derivations of the MPPI method to enhance its efficiency, robustness, and convergence. Our approach includes a mathematical formulation allowing for arbitrary sampling distributions, addressing numerical issues, and alleviating the problem of local minima. We present an efficient importance sampling scheme that combines classical and learning-based ancillary controllers simultaneously, resulting in more informative sampling and control fusion. We demonstrate our proposed scheme’s superior efficiency and robustness through experiments by handling model uncertainties, rapid environmental changes and reducing susceptibility to local minima. Video: https://youtu.be/T-pE4g2mcqo I. I NTRODUCTION Navigating autonomous robots through dense and dynamic environments poses a formidable challenge due to significant uncertainties, including the robot’s state, model, environmental conditions, and interactions with other agents. Achieving desired behaviors under such conditions often necessitates using intricate cost functions and constraints, resulting in complex, nonlinear, non-convex, and occasionally discontinuous problem formulations. The dynamic nature of the environment introduces the potential for unexpected changes, demanding rapid adaptability and adjustment in the robot’s actions. To address these challenges, one approach is to cast the problem in a stochastic optimal control setting, where they can be mathematically represented as stochastic Hamilton- Jacobi-Bellman (HJB) equations. However, solving these equations numerically can be challenging due to the curse of dimensionality. Pioneering work demonstrated that the stochastic HJB equations can be linearized for control-affine systems, and their solution can be approximated through This research is supported by the project “Sustainable Transportation and Logistics over Water: Electrification, Automation and Optimization (TRiLOGy)” of the Netherlands Organization for Scientific Research (NWO), domain Science (ENW), and the Amsterdam Institute for Advanced Metropolitan Solutions (AMS) in the Netherlands. The authors are with the Cognitive Robotics Department, TU Delft, 2628 CD Delft, The Netherlands {e.trevisan, j.alonsomora}@tudelft.nl Fig. 1: Top: MPPI estimates the new optimal control sequence based on samples from a Gaussian distribution around the previously computed plan. In this example, the environment changes unexpectedly. Thus, all the sampled trajectories result in a collision, which leads to computing a new plan that also collides. Bottom: our Biased-MPPI adds ancillary controllers to the sampling distribution. These controllers can improve sampling efficiency, robustness, and, in this example, reactivity to rapid environmental changes. sampling using the path integral formulation [1]. Implemented in a receding horizon fashion, Model Predictive Path Integral (MPPI) control [2], [3], and its Information Theoretic counterpart [4], [5] have been initially used for racing a small-scale rally car. MPPI has also been successfully applied to several other planning problems, such as for autonomous vehicles with dynamic obstacles [6], solving games [7], flying drones in partially observable environments [8], performing complex maneuvers [9] and used in combination with adaptive control schemes [10]. It has also been adapted to multi-agent systems for formation flying [11], cooperative behavior [12], and simultaneous prediction and planning [13]. Furthermore, MPPI has shown promise in manipulating objects with robot arms [14] including model uncertainties [15], in pushing tasks [16], [17] and planning motion for four-legged walking robots [18]. MPPI is a model-based approach that requires a model to forward simulate trajectories given sampled inputs. Recent work has utilized physics engines to simulate samples [19], [20], eliminating the need for explicitly defining the dynamics of agents and the environment, thus providing a significant advantage in contact-rich manipulation tasks. One of the critical challenges in applying MPPI to dynamic environments is ensuring the algorithm’s performance" 2401.09244v1,"Cross-lingual Offensive Language Detection: A Systematic Review of Datasets, Transfer Approaches and Challenges AIQI JIANG, Queen Mary University of London, UK and Heriot-Watt University, UK ARKAITZ ZUBIAGA, Queen Mary University of London, UK The growing prevalence and rapid evolution of offensive language in social media amplify the complexities of detection, particularly highlighting the challenges in identifying such content across diverse languages. This survey presents a systematic and comprehensive exploration of Cross-Lingual Transfer Learning (CLTL) techniques in offensive language detection in social media. Our study stands as the first holistic overview to focus exclusively on the cross-lingual scenario in this domain. We analyse 67 relevant papers and categorise these studies across various dimensions, including the characteristics of multilingual datasets used, the crosslingual resources employed, and the specific CLTL strategies implemented. According to “what to transfer”, we also summarise three main CLTL transfer approaches: instance, feature, and parameter transfer. Additionally, we shed light on the current challenges and future research opportunities in this field. Furthermore, we have made our survey resources available online, including two comprehensive tables that provide accessible references to the multilingual datasets and CLTL methods used in the reviewed literature. CCS Concepts: • Computing methodologies → Natural language processing; Machine learning; • Humancentered computing → Collaborative and social computing. Additional Key Words and Phrases: Offensive language detection, Hate speech detection, Literature review, Survey, Cross-lingual, Multilingual, Social Media, Text classification ACM Reference Format: Aiqi Jiang and Arkaitz Zubiaga. 2023. Cross-lingual Offensive Language Detection: A Systematic Review of Datasets, Transfer Approaches and Challenges. J. ACM 37, 4, Article 127 (August 2023), 35 pages. https: //doi.org/XXXXXXX.XXXXXXX Disclaimer: Due to the nature of this work, some examples may contain offensive text and hate speech. 1 INTRODUCTION The prevalence of offensive language on social media platforms, such as Facebook and Twitter, has become a pressing concern in recent years. This surge can be attributed to the anonymity provided by these platforms and the lack of strict regulations and effective mechanisms to restrain such behaviour [64]. While social media platforms have fostered connections and bridged global distances, they have in turn enabled the spread of hate speech and various forms of offensive language [33]. Offensive language broadly refers to expressions that may upset or annoy others, while hate speech escalates beyond mere offensive behaviour to inciting discrimination, hostility, or violence against individuals or groups based on their race, religion, ethnicity, gender, or other identity factors [62]. Hate speech is considered a human rights violation in many legal systems due Authors’ addresses: Aiqi Jiang, a.jiang@qmul.ac.uk, Queen Mary University of London, Mile End Road, London, UK, E1 4NS and Heriot-Watt University, Edinburgh, UK, EH14 4AS; Arkaitz Zubiaga, a.zubiaga@qmul.ac.uk, Queen Mary University of London, Mile End Road, London, UK, E1 4NS. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. 0004-5411/2023/8-ART127 $15.00 https://doi.org/XXXXXXX.XXXXXXX J. ACM, Vol. 37, No. 4, Article 127. Publication date: August 2023. 127" 2401.09258v1,"An Efficient Generalizable Framework for Visuomotor Policies via Control-aware Augmentation and Privilege-guided Distillation Yinuo Zhao 1,* , Kun Wu 2,* , Tianjiao Yi 1 , Zhiyuan Xu 3 , Xiaozhu Ju 3 , Zhengping Che 3 , Qinru Qiu 2 , Chi Harold Liu 1 , Jian Tang 3 Abstract Visuomotor policies, which learn control mechanisms directly from high-dimensional visual observations, confront challenges in adapting to new environments with intricate visual variations. Data augmentation emerges as a promising method for bridging these generalization gaps by enriching data variety. However, straightforwardly augmenting the entire observation shall impose excessive burdens on policy learning and may even result in performance degradation. In this paper, we propose to improve the generalization ability of visuomotor policies as well as preserve training stability from two aspects: 1) We learn a controlaware mask through a self-supervised reconstruction task with three auxiliary losses and then apply strong augmentation only to those control-irrelevant regions based on the mask to reduce the generalization gaps. 2) To address training instability issues prevalent in visual reinforcement learning (RL), we distill the knowledge from a pretrained RL expert processing low-level environment states, to the student visuomotor policy. The policy is subsequently deployed to unseen environments without any further finetuning. We conducted comparison and ablation studies across various benchmarks: the DMControl Generalization Benchmark (DMC-GB), the enhanced Robot Manipulation Distraction Benchmark (RMDB), and a specialized longhorizontal drawer-opening robotic task. The extensive experimental results well demonstrate the effectiveness of our method, e.g., showing a 17% improvement over previous methods in the video-hard setting of DMC-GB. 1. Introduction Visuomotor policy is designed to predict precise actions and complete tasks based on high-dimensional pixel input in an end-to-end manner. It has received significant attention 1 Beijing Institute of Technology {ynzhao, tjyi}@bit.edu.cn, liuchi02@gmail.com 2 Syracuse University {kwu102, qiqiu}@syr.edu 3 Midea Group {xuzy70, juxz, chezp, tangjian22}@midea.com * These authors contributed equally. and been successfully applied in the field of robot learning and embodied AI, including robot manipulation [4, 26], autonomous navigation [1], and locomotion tasks [52, 55]. Although visual reinforcement learning (VRL) has shown promising results for learning such a visuomotor policy, recent studies [7, 12, 15, 45] indicated the fragility of VRL agents in the training process, not to mention generalizing to new environments. One promising solution for addressing the aforementioned challenges is Data Augmentation (DA) [11, 20, 44, 52, 53]. In contrast to weak augmentations, such as random cropping, rotation, and flipping, which provide only limited generalization improvement, strong augmentations like random conv [34] and random overlay [19] have demonstrated the potential to significantly diversify data and enhance the generalization capabilities of models. Followed by these techniques, many algorithms [5, 11, 20] were proposed to learn consistent visual features or control values between the augmented observations and the original ones. However, strong augmentations change not only the controlirrelevant context but also the control-relevant information, potentially destroying the inherent structures and dynamics of the environment contained in the observations. This usually increases the complexity of the training model and affects stability in both learning and the testing results. Recent advancements aimed at augmenting more specific regions within the observation space. However, these approaches typically depend on the availability of informative reward functions [2, 13] or are limited to identifying only dynamic objects [51]. Identifying control-related pixels in intricate tasks remains a significant challenge, especially in long-horizontal tasks with uninformative rewards. To improve the generalization ability while maintaining stability, in this paper, we propose an efficient GEneralizable fraMework for visuOmotor policies (GEMO) to identify the control-related information and enable zero-shot deployment to unseen environments. More specifically, GEMO comprises two jointly optimized modules: 1) a control-aware augmentation module adaptively learns a mask highlighting the control-related pixels with spatial-temporal data from the distillation mod-" 2401.09266v1,"Published as a conference paper at ICLR 2024 P 2 OT: P ROGRESSIVE P ARTIAL O PTIMAL T RANSPORT FOR D EEP I MBALANCED C LUSTERING Chuyu Zhang 1,2,∗ Hui Ren 1,∗ Xuming He 1,3 1 ShanghaiTech University, Shanghai, China 2 Lingang Laboratory, Shanghai, China 3 Shanghai Engineering Research Center of Intelligent Vision and Imaging, Shanghai, China {zhangchy2,renhui,hexm}@shanghaitech.edu.cn A BSTRACT Deep clustering, which learns representation and semantic clustering without labels information, poses a great challenge for deep learning-based approaches. Despite significant progress in recent years, most existing methods focus on uniformly distributed datasets, significantly limiting the practical applicability of their methods. In this paper, we first introduce a more practical problem setting named deep imbalanced clustering, where the underlying classes exhibit an imbalance distribution. To tackle this problem, we propose a novel pseudo-labeling-based learning framework. Our framework formulates pseudo-label generation as a progressive partial optimal transport problem, which progressively transports each sample to imbalanced clusters under prior distribution constraints, thus generating imbalance-aware pseudo-labels and learning from high-confident samples. In addition, we transform the initial formulation into an unbalanced optimal transport problem with augmented constraints, which can be solved efficiently by a fast matrix scaling algorithm. Experiments on various datasets, including a humancurated long-tailed CIFAR100, challenging ImageNet-R, and large-scale subsets of fine-grained iNaturalist2018 datasets, demonstrate the superiority of our method. 1 I NTRODUCTION Human beings possess the innate ability to categorize similar concepts, even when encountering them for the first time. In contrast, artificial models struggle to group similar concepts without labels, although they excel primarily in scenarios where extensive semantic labeling is available. Deep clustering, which aims to learn representation and semantic clustering, is proposed to enable models to achieve that. Currently, many researchers (Ji et al., 2019; Van Gansbeke et al., 2020; Ronen et al., 2022) are advancing the field of deep clustering. However, they focus on developing methods on balanced datasets, limiting their application in reality, where the data distributions are imbalanced. In this paper, we propose a practical deep imbalanced clustering problem, bridging the gap between the existing deep clustering and real-world application. Existing methods are broadly categorized into relation matching-based (Dang et al., 2021), mutual information maximization-based (Ji et al., 2019), and pseudo-labeling (PL)-based (Van Gansbeke et al., 2020). They face significant challenges when dealing with imbalanced clustering. Relation matching and mutual information maximization act as surrogate losses for clustering and show inferior results compared to the PL method (Van Gansbeke et al., 2020; Niu et al., 2022). PL, on the other hand, tends to learn degenerate solutions (Caron et al., 2018) and heavily relies on the quality of the pseudo-labels. This reliance often requires an additional training stage for representation initialization and sensitive hyperparameter tuning to mitigate confirmation bias (Arazo et al., 2020; Wei et al., 2021), especially in challenging imbalanced clustering scenarios, where imbalanced learning will seriously affect the quality of pseudo labels. To mitigate the above weakness, we propose a novel PL-based progressive learning framework for deep imbalanced clustering. Our framework introduces a novel Progressive Partial Optimal Transport (P 2 OT) algorithm, which integrates imbalance class distribution modeling and confident sample selection within a single optimization problem, enabling us to generate imbalanced pseudo labels and learn from high-confident samples in a progressive manner. Computationally, we reformulate our P 2 OT as a typical unbalanced OT problem with a theoretical guarantee and employ the light-speed scaling algorithm (Cuturi, 2013; Chizat et al., 2018) to solve it. ∗ Both authors contributed equally. Code is available at https://github.com/rhfeiyang/PPOT. 1" 2401.09283v1,"A GRADIENT - BASED APPROACH TO FAST AND ACCURATE HEAD MOTION COMPENSATION IN CONE - BEAM CT Mareike Thies Pattern Recognition Lab Friedrich-Alexander-Universität Erlangen-Nürnberg mareike.thies@fau.de Fabian Wagner Pattern Recognition Lab Friedrich-Alexander-Universität Erlangen-Nürnberg Noah Maul Pattern Recognition Lab Friedrich-Alexander-Universität Erlangen-Nürnberg Haijun Yu Pattern Recognition Lab Friedrich-Alexander-Universität Erlangen-Nürnberg Manuela Meier Pattern Recognition Lab Friedrich-Alexander-Universität Erlangen-Nürnberg Linda-Sophie Schneider Pattern Recognition Lab Friedrich-Alexander-Universität Erlangen-Nürnberg Mingxuan Gu Pattern Recognition Lab Friedrich-Alexander-Universität Erlangen-Nürnberg Siyuan Mei Pattern Recognition Lab Friedrich-Alexander-Universität Erlangen-Nürnberg Lukas Folle Pattern Recognition Lab Friedrich-Alexander-Universität Erlangen-Nürnberg Andreas Maier Pattern Recognition Lab Friedrich-Alexander-Universität Erlangen-Nürnberg A BSTRACT Cone-beam computed tomography (CBCT) systems, with their portability, present a promising avenue for direct point-of-care medical imaging, particularly in critical scenarios such as acute stroke assessment. However, the integration of CBCT into clinical workflows faces challenges, primarily linked to long scan duration resulting in patient motion during scanning and leading to image quality degradation in the reconstructed volumes. This paper introduces a novel approach to CBCT motion estimation using a gradient-based optimization algorithm, which leverages generalized derivatives of the backprojection operator for cone-beam CT geometries. Building on that, a fully differentiable target function is formulated which grades the quality of the current motion estimate in reconstruction space. We drastically accelerate motion estimation yielding a 19-fold speed-up compared to existing methods. Additionally, we investigate the architecture of networks used for quality metric regression and propose predicting voxel-wise quality maps, favoring autoencoder-like architectures over contracting ones. This modification improves gradient flow, leading to more accurate motion estimation. The presented method is evaluated through realistic experiments on head anatomy. It achieves a reduction in reprojection error from an initial average of 3 mm to 0.61 mm after motion compensation and consistently demonstrates superior performance compared to existing approaches. The analytic Jacobian for the backprojection operation, which is at the core of the proposed method, is made publicly available. In summary, this paper contributes to the advancement of CBCT integration into clinical workflows by proposing a robust motion estimation approach that enhances efficiency and accuracy, addressing critical challenges in time-sensitive scenarios. Keywords computed tomography · deep learning · differentiable programming · gradient descent · motion compensation" 2401.09324v1,"Establishing Awareness through Pointing Gestures during Collaborative Decision-Making in a Wall-Display Environment Valérie Maquil Luxembourg Institute of Science and Technology Luxembourg Adrien Coppens Luxembourg Institute of Science and Technology Luxembourg Dimitra Anastasiou Luxembourg Institute of Science and Technology Luxembourg Johannes Hermen Luxembourg Institute of Science and Technology Luxembourg Hoorieh Afkari Luxembourg Institute of Science and Technology Luxembourg Lou Schwartz Luxembourg Institute of Science and Technology Luxembourg Figure 1: Groups interacting at a wall-display and frequently using mid-air pointing gestures to share awareness information. ABSTRACT CCS CONCEPTS Sharing a physical environment, such as that of a wall-display, facilitates gaining awareness of others’ actions and intentions, thereby bringing benefits for collaboration. Previous studies have provided first insights on awareness in the context of tabletops or smaller vertical displays. This paper seeks to advance the current understanding on how users share awareness information in wall-display environments and focusses on mid-air pointing gestures as a foundational part of communication. We present a scenario dealing with the organization of medical supply chains in crisis situations, and report on the results of a user study with 24 users, split into 6 groups of 4, performing several tasks. We investigate pointing gestures and identify three subtypes used as awareness cues during face-to-face collaboration: narrative pointing, loose pointing, and sharp pointing. Our observations show that reliance on gesture subtypes varies across participants and groups, and that sometimes vague pointing is sufficient to support verbal negotiations. • Do Not Use This Code → Generate the Correct Terms for Your Paper; Generate the Correct Terms for Your Paper; Generate the Correct Terms for Your Paper; Generate the Correct Terms for Your Paper. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CHI EA ’23, April 23–28, 2023, Hamburg, Germany © 2023 © Authors | ACM 2023. This is the author’s version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in the CHI’23 proceedings, http://dx.doi.org/10.1145/3544549.3585830. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM https://doi.org/XXXXXXX.XXXXXXX KEYWORDS Large Interactive Displays,Wall Displays, Awareness, Collaborative Decision-Making, Pointing Gestures, User Study ACM Reference Format: Valérie Maquil, Dimitra Anastasiou, Hoorieh Afkari, Adrien Coppens, Johannes Hermen, and Lou Schwartz. 2023. Establishing Awareness through Pointing Gestures during Collaborative Decision-Making in a Wall-Display Environment. In Proceedings of (CHI EA ’23). ACM, New York, NY, USA, 7 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Large interactive displays are increasingly placed in public locations, including museums, shops, airports, city settings, and offices. They enable large amounts of data to be presented in different scales and views, and support users to better identify details and gain more insights about the data [1]. They therefore provide cognitive and perceptual benefits, and in general enhance user performance and satisfaction for such tasks (e.g., [2]). Another benefit of wall displays is that they inherently support (collocated) collaboration, as multiple users can access and view content at the same time, and also observe each other’s interactions. With this information they can coordinate their activities, anticipate others’ actions, and assist each other. The awareness information makes collaborators’" 2401.09329v1,"Calibrate-Extrapolate: Rethinking Prevalence Estimation with Black Box Classifiers Siqi Wu, Paul Resnick University of Michigan, Ann Arbor {siqiwu, presnick}@umich.edu Abstract In computational social science, researchers often use a pretrained, black box classifier to estimate the frequency of each class in unlabeled datasets. A variety of prevalence estimation techniques have been developed in the literature, each yielding an unbiased estimate if certain stability assumption holds. This work introduces a framework to rethink the prevalence estimation process as calibrating the classifier outputs against ground truth labels to obtain the joint distribution of a base dataset and then extrapolating to the joint distribution of a target dataset. We call this framework “Calibrate-Extrapolate”. Visualizing the joint distribution makes the stability assumption needed for a prevalence estimation technique clear and easy to understand. In the calibration phase, the techniques assume only a stable calibration curve between a calibration dataset and the full base dataset. This allows for the classifier outputs to be used for purposive sampling, thus improving the efficiency of calibration. In the extrapolation phase, some techniques assume a stable calibration curve while some assume stable class-conditional densities. We discuss the stability assumptions from a causal perspective. By specifying base and target joint distributions, we can generate simulated datasets, as a way to build intuitions about the impacts of assumption violations. This also leads to a better understanding of how the classifier predictive power affects the accuracy of prevalence estimates: the greater the predictive power, the lower the sensitivity to violations of stability assumptions in the extrapolation phase. We illustrate the framework with an application that estimates the prevalence of toxic news comments over time on Reddit, Twitter, and YouTube, using Jigsaw’s Perspective API as a black box classifier. 1 Introduction Measuring the frequency of certain labels within a data sample is a common task in many disciplines. This problem, generally called “prevalence estimation” or “quantification”, has a wide range of real world applications, from quantifying the number of species in a region (Gotelli and Colwell 2001), to infected COVID-19 patients in a country (Sempos and Tian 2021), to automated accounts in a social platform (Yang et al. 2020), and to anti-social posts in an online community (Park, Seering, and Bernstein 2022). It would be ideal to manually examine every individual in the dataset. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. This approach is called “census”. However, census is often prohibitively expensive. In computational social science (CSS), it is common to make use of an imperfect pre-trained classifier that assigns a label, or label probability, to each item (Yang et al. 2020; Rajadesingan, Budak, and Resnick 2021; Saha et al. 2023; Pfeffer et al. 2023). The prevalence estimation techniques then somehow account for the imperfections of the classifier. Alternative approaches are possible, such as a model trained with prevalence estimation evaluation metrics rather than individual classification accuracy as the objective function (Esuli and Sebastiani 2015). However, the classifieraided approaches are especially attractive when the dataset is on a large scale, ground truth labels are difficult or expensive to obtain, and a high quality pre-trained classifier such as ChatGPT or Jigsaw’s Perspective API (Wulczyn, Thain, and Dixon 2017) is available for use. Extant literature on prevalence estimation with black box classifiers is plentiful and there are two useful survey articles (Forman 2008; González et al. 2017). In this paper, we do not propose any new estimation techniques. Instead, our contribution is a conceptual framework called “Calibrate- Extrapolate”. It rethinks the prevalence estimation process not as merely estimating the percentage of ground truth labels but as estimating the complete joint distribution between the classifier outputs and ground truth. A calibration phase gathers ground truth labels for a small data sample, purposefully selected from a base dataset, and then estimates the joint distribution for the full base dataset. An extrapolation phase assumes that some properties of the base joint distribution are stable and infers other properties from the observed classifier output distribution of a target dataset. In both phases, the prevalence for label of interest can be read off from the inferred joint distribution of classifier outputs and ground truth labels. The Calibrate-Extrapolate framework is broadly applicable to many real world settings. It is also flexible because researchers can still customize design elements in some steps. We identify four such elements: which black box classifier to apply, which data to sample for ground truth labels, which stability assumption to make, and which prevalence estimation technique to employ. In a real-world setting, it may be unclear which stability assumptions are reasonable to make. Thinking about prevalence estimation techniques in the Calibrate-Extrapolate" 2401.09333v2,"Machines Do See Color: A Guideline to Classify Different Forms of Racist Discourse in Large Corpora. Diana Dávila Gordillo, Lake Forest College, ddavilagordillo@lakeforest.edu Joan C. Timoneda, Purdue University, timoneda@purdue.edu Sebastián Vallejo Vera, Western University, sebastian.vallejo@uwo.ca (*Corresponding Author) Abstract Current methods to identify and classify racist language in text rely on small-n qualitative approaches or large-n approaches focusing exclusively on overt forms of racist discourse. This article provides a step-by-step generalizable guideline to identify and classify different forms of racist discourse in large corpora. In our approach, we start by conceptualizing racism and its different manifestations. We then contextualize these racist manifestations to the time and place of interest, which allows researchers to identify their discursive form. Finally, we apply XLM-RoBERTa (XLM-R), a cross-lingual model for supervised text classification with a cutting-edge contextual understanding of text. We show that XLM-R and XLM-R-Racismo, our pretrained model, outperform other state-of-the-art approaches in classifying racism in large corpora. We illustrate our approach using a corpus of tweets relating to the Ecuadorian indı́gena community between 2018 and 2021. The full Appendix can be found at https://svallejovera.github.io/files/Racism__Latin_America_and_NLP.pdf." 2401.09334v1,"Large Language Models Are Neurosymbolic Reasoners Meng Fang * 1,2 , Shilong Deng * 1 , Yudi Zhang * 2 , Zijing Shi 3 , Ling Chen 3 , Mykola Pechenizkiy 2 , Jun Wang 4 1 University of Liverpool, United Kingdom Eindhoven University of Technology, Netherlands 3 University of Technology Sydney, Australia 4 University College London, United Kingdom {Meng.Fang, shilong.deng}@liverpool.ac.uk, {y.zhang5, m.pechenizkiy}@tue.nl, zijing.shi@student.uts.edu.au, ling.chen@uts.edu.au, j.wang@cs.ucl.ac.uk 2 Abstract A wide range of real-world applications is characterized by their symbolic nature, necessitating a strong capability for symbolic reasoning. This paper investigates the potential application of Large Language Models (LLMs) as symbolic reasoners. We focus on text-based games, significant benchmarks for agents with natural language capabilities, particularly in symbolic tasks like math, map reading, sorting, and applying common sense in text-based worlds. To facilitate these agents, we propose an LLM agent designed to tackle symbolic challenges and achieve in-game objectives. We begin by initializing the LLM agent and informing it of its role. The agent then receives observations and a set of valid actions from the text-based games, along with a specific symbolic module. With these inputs, the LLM agent chooses an action and interacts with the game environments. Our experimental results demonstrate that our method significantly enhances the capability of LLMs as automated agents for symbolic reasoning, and our LLM agent is effective in text-based games involving symbolic tasks, achieving an average performance of 88% across all tasks. Introduction The ability to perform reasoning is crucial for AI due to its significant impact on various real-world tasks. The widespread adoption of large language models (LLMs), such as ChatGPT and GPT-4 (OpenAI 2023), has led to a series of remarkable successes in reasoning tasks, ranging from question & answering to solving math problems. Among these challenges, text-based games serve as important benchmarks for agents with natural language capabilities and have garnered significant attention in the realm of language-centric machine learning research (Narasimhan, Kulkarni, and Barzilay 2015; Côté et al. 2018; Xu et al. 2020; Ryu et al. 2022; Shi et al. 2022). In these games, an agent uses language to interpret various scenarios and make decisions. The complexity of such games arises from the need for language comprehension, common sense, managing action spaces with combinatorial complexity, and the crucial importance of long-term memory and planning (Côté * These authors contributed equally. Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. et al. 2018; Wang et al. 2022a). The challenges escalate in text-based games that involve symbolic tasks (Wang et al. 2022b). For instance, contemporary agents might be tasked with a scenario where they are required to solve a mathematical problem and simultaneously gather a specified amount of fruits, with the quantity needed being the solution to the math problem. Using symbolic modules or external tools for arithmetic, navigation, sorting, and knowledge-base lookup is crucial for language agents, especially in complex text-based games (Lample and Charton 2020; Poesia, Dong, and Goodman 2021; Wang et al. 2022b; Qian et al. 2023). However, effectively integrating these aspects into language agents remains a relatively unaddressed challenge. Solving such textbased games requires interactive multi-step reasoning, and agents have most commonly been modeled using reinforcement learning (Xu et al. 2020; Yao et al. 2020; Xu et al. 2021). These methods, however, face challenges such as delayed rewards and difficulty in exploring large action spaces. Recently, there has been an exploration of imitation learning approaches, which utilize human play data (Wang et al. 2022b). While Behavior Cloning (BC) shows potential in effectively addressing these challenges, it often necessitates substantial effort and resources. This is primarily due to the need for acquiring expert data. Recently, large language models (LLMs) have demonstrated notable in-context generalization capabilities, suggesting the potential to elicit reasoning abilities by prompting these models (Brown et al. 2020; Min et al. 2022). However, the application of LLMs in performing symbolic reasoning remains an under-explored area. Models like GPT- 3.5 and GPT-4 have shown the ability to encode extensive information (OpenAI 2023). A significant example of this is their acquisition of substantial knowledge during training, enabling them to approach human-level performance across a wide range of tasks (OpenAI 2023). This indicates the feasibility of utilizing LLMs as neurosymbolic reasoners without relying on labeled gold training data. However, there is currently limited research on utilizing these models for reasoning tasks that involve logic, graphs, or symbolic formulas. The exploration and development of methods that leverage LLMs for symbolic reasoning is highly intriguing and" 2401.09335v1,"Condensed Matter Physics, 2023, Vol. 26, No. 4, 43602: 1–22 DOI: 10.5488/CMP.26.43602 http://www.icmp.lviv.ua/journal Formation of nano and micro scale hierarchical structures in MgO and ZnO quantum dots doped LC media: The role of competitive forces A. K. Singh , S. P. Singh ∗ Department of Physics and Material Science, Madan Mohan Malaviya University of Technology, Gorakhpur-273010, Uttar Pradesh, India Received April 17, 2023, in final form July 03, 2023 In this paper, we have studied the effect of doping of ZnO and MgO nanoparticles (NPs) in 4-(trans-4-n-hexylcyclohexyl) isothiocyanatobenzoate. A thorough comparison of dielectric properties, optoelectronic properties, and calorimetric phase transition properties has been done for MgO and ZnO NP doped LC. We prepare their homogenous mixture of MgO and ZnO NPs in toluene and transfer into cells made of glass and Indium Tin- Oxide (ITO) coated glass. The observed microstructures in the hybrid system can be classified into three main categories: grain like structures formed by aggregation of smaller size MgO nanoparticles while liquid crystal molecules anchor over the surfaces of nanoparticles, the grtu grain-like structures further integrate to form inorganic polymeric type of honeycomb-like mesostructures in presence of glass surface, and flower-like clusters of MgO nanoparticles on ITO surface. The smaller size nanoparticles can maintain the energy balance by allowing the anchoring of liquid crystal molecules over their surfaces whereas the larger size nanoparticles cannot compromise or maintain the energy balance with the liquid crystal molecules and are separated out to nucleate and form bigger size nanoaggregate or clusters. The energy preference of the substrate and nanoparticle’s surface to liquid crystal molecules plays an important role in the formation of different types of hierarchical nanoand microstructures. We account the reasons for the formation of nano and micro scale hierarchical structures on the basis of the competition between the forces: NP–NP, LC–LC, NP–LC, Glass/ITO-NP, and Glass/ITO-LC interactions. We observed a considerable change in the dielectric properties, transition temperature, bandgap, and other parameters of LC molecules when MgO NPs are doped, but a minor change occurs when ZnO NPs are doped in LC. Optical microscopy, FTIR, Raman, IR, HR–XRD and FESEM-EDX characterization data confirm and validate our guiding conceptions. Key words: grain structures, flower-like microstructures, honeycomb-like mesostructures, ZnO NPs, MgO NPs 1. Introduction Many metal oxide nanostructures, including Fe 3 O 4 , ZnO, TiO 2 , MgO, and CoFe 2 O 4 , are widely used in many applications. Semiconductors composed of elements of II and VI groups, e.g., ZnO, MgO, CdS and PbS, etc., are a unique class of substances having characteristics intermediate bandgaps between insulators and conductors. Modern material science considers ZnO and MgO to be significant II–VI semiconductors with a number of distinct properties, which make ZnO and MgO versatile materials suitable for a variety of novel applications, including light-emitting diodes, ultraviolet (UV) lasers, solar cells, solar water splitting cells, biosensors, and piezoelectronics [1]. ZnO and MgO nanoparticles (NPs) possess wide bandgaps in the range of 4.0–5.0 eV showing good transparency in the visible range. Doping in metal oxide NPs help to engineer their bandgap. MgO is a promising inorganic material that crystallizes in NaCl type crystal structure shown in figure 1. It is widely used for various applications such as sensors, antibacterial agents, optical coatings, water treatment, catalysis, adsorption, etc., as well as fuel additives, among others [2–4]. This is primarily due to its high surface reactivity, broad ∗ Corresponding author: singh.satyapal@hotmail.com. This work is licensed under a Creative Commons Attribution 4.0 International License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI. 43602-1" 2401.09338v1,"On the ε–Euler-Maruyama scheme for time inhomogeneous jump-driven SDEs Mireille Bossy * 1 and Paul Maurer †1 1 Université Côte d’Azur, Inria, CNRS, France January 18, 2024 Abstract We consider a class of general SDEs with a jump integral term driven by a time-inhomogeneous random Poisson measure. We propose a two-parameters Euler-type scheme for this SDE class and prove an optimal rate for the strong convergence with respect to the L p (Ω)-norm and for the weak convergence. One of the primary issues to address in this context is the approximation of the noise structure when it can no longer be expressed as the increment of random variables. We extend the Asmussen-Rosiński approach to the case of a fully dependent jump coefficient and time-dependent Poisson compensation, handling contribution of jumps smaller than ε with an appropriate Gaussian substitute and exact simulation for the large jumps contribution. For any p ≥ 2, under hypotheses required to control the L p -moments of the process, we obtain a strong convergence rate of order 1/p. Under standard regularity hypotheses on the coefficients, we obtain a weak convergence rate of 1/n + ε 3−β , where β is the Blumenthal-Getoor index of the underlying Lévy measure. We compare this scheme with the Rubenthaler’s approach where the jumps smaller than ε are neglected, providing strong and weak rates of convergence in that case too. The theoretical rates are confirmed by numerical experiments afterwards. We apply this model class for some anomalous diffusion model related to the dynamics of rigid fibres in turbulence. Contents 1 Introduction 1 2 Preliminaries and schemes 6 3 Strong convergence 9 4 Weak convergence 23 5 Evaluation of the convergences rates through numerical experiments 29 6 Application: the enhanced stochastic dynamics of rigid fibres in turbulence 35 7 37 Concluding remarks A Appendix 1 37 Introduction We consider general stochastic differential equations (SDEs) with jumps, of the form: X t = X 0 + Z t 0 a(s, X s )ds + Z t 0 b(s, X s )dW s + Z t Z +∞ 0 * mireille.bossy@inria.fr † paul.maurer@inria.fr 1 −∞  c(s − , X s − , z) N(ds, dz) − ν s (dz) ds , (1.1)" 2401.09342v1,"Klein-Gordon oscillators in (2+1)-dimensional traversable wormhole spacetime in rainbow gravity Omar Mustafa ∗ Department of Physics, Eastern Mediterranean University, 99628, Famagusta, North Cyprus, Mersin -10, Turkiye. Abdullah Guvendi † Department of Basic Sciences, Faculty of Science, Erzurum Technical University, 25050, Erzurum, Turkiye. Abstract: We investigate Klein-Gordon (KG) oscillators in traversable wormhole (TWH) space- time in rainbow gravity. We discuss a conditional exact solution for the corresponding KG-oscillators through some parametric correlation between the frequency of the KG-oscillators and the TWH throat radius. We report/discuss the effects of throat radius, rainbow parameter, and oscillator frequency on the spectroscopic structure of a vast number of (n, m)-states (the radial and magnetic quantum numbers, respectively). In the process, we use two loop quantum gravity motivated rain- bow functions pairs. We observe that rainbow gravity affects on both particles and anti-particles alike. PACS numbers: 05.45.-a, 03.50.Kk, 03.65.-w Keywords: Klein-Gordon (KG) oscillators, Traversable wormholes, Wu-Yang magnetic monopole, rainbow gravity. I. INTRODUCTION In the last few decades, wormholes, as solutions to Einstein’s field equation, have attracted research attention. The undoubtable significance of the effects of gravitational fields on the quantum mechanical structures, during the early universe, suggests that wormholes (also known as Einstein-Rosen-bridges (ER) [1]), play a crucial role in cosmology [1–6]. The current accumulated knowledge of physics does not rule out some intriguing ideas like the feasible existence of advanced civilizations’ capability to build wormholes for the sake of interstellar and/or time travels [2, 7]. Wormholes in (2+1)-dimensional spacetime are not only pedagogically interesting but they are also instructive for ideas related with quantization of gravitational fields [8]. Such a (2+1)-dimensional allows comprehensive analysis of some interesting physical properties of the wormholes spacetime, like Cauchy horizon properties [7], wormholes stability [9], etc. In quantum gravity, nevertheless, the harmonization of quantum mechanics with general relativity, has manifestly inspired intricate studies on quantum particles and/or antiparticles within the wormholes spacetime. Such intricate studies have shown that while the gravitational force fields introduce intense curvature, in the vicinity of wormholes spacetime, they may influence the dynamics of quantum particles [10–16], and may yield phenomena of ∗ Electronic address: omar.mustafa@emu.edu.tr † Electronic address: abdullah.guvendi@erzurum.edu.tr" 2401.09345v1,"Condensed Matter Physics, 2023, Vol. 26, No. 4, 43603: 1–13 DOI: 10.5488/CMP.26.43603 http://www.icmp.lviv.ua/journal Effect of out-of-plane acoustic phonons on the thermal transport properties of graphene J. Chen ∗ , Y. Liu Department of Energy and Power Engineering, School of Mechanical and Power Engineering, Henan Polytechnic University, Jiaozuo, Henan, 454000, P.R. China Received April 19, 2023, in final form July 28, 2023 The lattice thermal conductivity of graphene is evaluated using a microscopic model that takes into account the lattice’s discrete nature and the phonon dispersion relation within the Brillouin zone. The Boltzmann transport equation is solved iteratively within the framework of three-phonon interactions without taking into account the four-phonon scattering process. The Umklapp and normal collisions are treated rigorously, thereby avoiding relaxation-time and long-wavelength approximations. The mechanisms of the failures of these approximations in predicting the thermal transport properties are discussed. Evaluation of the thermal conductivity is performed at different temperatures and frequencies and in different crystallite sizes. Reasonably good agreement with the experimental data is obtained. The calculation reveals a critical role of out-of-plane acoustic phonons in determining the thermal conductivity. The out-of-plane acoustic phonons contribute greatly and the longitudinal and transverse acoustic phonons make small contributions over a wide range of temperatures and frequencies. The out-of-plane acoustic phonons dominate the thermal conductivity due to their high density of states and restrictions governing the anharmonic phonon scattering. The selection rule severely restricts the phase space for out-of-plane phonon scattering due to reflection symmetry. The optical phonon contribution cannot be neglected at higher temperatures. Both Umklapp and normal processes must be taken into account in order to predict the phonon transport properties accurately. Key words: thermal properties, thermal conductivity, phonons, scattering theory, transport phenomena, graphene 1. Introduction Graphene is a two-dimensional form of carbon that has attracted intense interest on account of its remarkable physical properties [1, 2]. For example, graphene has a tremendous mechanical strength [3, 4]. Graphene also has extraordinary electrical and thermal transport properties [5, 6]. Graphene offers excellent potential for thermal management applications [7, 8] due to its extremely high thermal conductivity, up to about 5000 W/(m·K) [9, 10], and relatively low density. Other carbon-based materials may possess exceedingly similar thermal transport properties, such as single-walled carbon nanotubes [11, 12], graphite [13, 14], and diamond [15, 16]. The thermal transport in graphene can be primarily attributed to lattice waves [17, 18], and therefore the thermal conductivity is limited by the scattering of lattice waves from crystallite boundaries [19, 20]. Heat from electronic circuits may be removed efficiently by using the peculiar thermal transport properties of graphene [21, 22], thereby making it possible to solve thermal management problems at the nanoscale. In addition to their importance in the acoustic properties, phonons are essential in the phenomenon of heat conduction, for instance, the thermal transport properties of graphene. The vibrations in the graphene lattice can be characterized by the following phonon branches: longitudinal acoustic mode, longitudinal optic mode, transverse acoustic mode, transverse optic mode, out-of-plane acoustic mode, and out-of-plane optical mode. Longitudinal and transverse phonons vibrate in the plane of the layer, ∗ Corresponding author: cjj@hpu.edu.cn. This work is licensed under a Creative Commons Attribution 4.0 International License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI. 43603-1" 2401.09351v1,"Condensed Matter Physics, 2023, Vol. 26, No. 4, 43604: 1–9 DOI: 10.5488/CMP.26.43604 http://www.icmp.lviv.ua/journal Nonlinear background corrections to dielectric permittivity of ferroics and multiferroics I. S. Girnyk 1 , B. I. Horon R. Y. Shopa 3 1,2 ∗ , V. B. Kapustianyk 1 , O. S. Kushnir 2 , 1 Physics Department, Ivan Franko National University of Lviv, 50 Drahomanov Street, 79005 Lviv, Ukraine 2 Electronics and Computer Technologies Department, Ivan Franko National University of Lviv, 107 Tarnavskyi Street, 79017 Lviv, Ukraine 3 Department of Complex Systems, National Centre for Nuclear Research, 05-400 Otwock-Świerk, Poland Received March 27, 2023, in final form August 16, 2023 Temperature measurements of dielectric permittivity are performed for nonstoichiometric ferroelectric lead germanate Pb 4.95 Ge 3 O 11 and multiferroic solid solution [N(C 2 H 5 ) 4 ] 2 CoClBr 3 . Unlike the heat capacity data, the analysis of the dielectric permittivity of ferroics is usually performed at the assumption that the dielectric ‘background’ is negligible compared with its critical part. In this work we quantitatively interpret the dielectric properties of the single crystals mentioned above and the appropriate literature data for multiferroic Sr 2 IrO 4 crystals, using generalized Curie-Weiss formulas that combine corrections due to a nonlinear temperature-dependent dielectric background, a modified critical index of electric susceptibility, and a diffuse character of phase transition. We argue that taking account of the temperature dependent dielectric background can improve notably the quantitative analysis of PTs for a number of classes of the ferroic materials. Key words: ferroelectrics, phase transitions, diffuse phase transitions, dielectric permittivity, critical behavior, lead germanate 1. Introduction Temperature behavior of different physical characteristics, in particular dielectric ones, around the points of phase transitions (PTs) in ferroics and multiferroics is an extensively explored problem of condensed matter physics [1, 2]. The temperature dependence of dielectric permittivity can be influenced by thermal fluctuations, long-range dipolar correlations, inhomogeneity of a solid due to defects, its structural disorder and ‘diffuseness’ of the PT, contributions of domain walls, etc. Distinguishing among all those factors is not a simple task, particularly in a complicated case of multiferroics, for which there are some indications that the critical indices can be modified due to magnetoelectric coupling [3], diffuseness of PTs and a relaxor-like behavior[4–6]. In general, quantitative analyses of critical behavior of the dielectric permittivity with rigorous statistically based techniques are rarer compared with those known for the heat capacity (see, e. g., [7]). In many works only qualitative features of the dependence are estimated (see, e. g., [5]), with no detailed and statistically grounded derivation of critical indices and amplitudes for the symmetric and asymmetric phases. We believe that, besides the objective factors mentioned above, the other reason can be the so-called dielectric ‘background’, which is not associated with the PT. Its occurrence and some relevant mechanisms were realized long ago [1, 8]. In particular, it would be natural to expect that the relative importance of the dielectric background should not be completely neglected for a large number of substances. These are weakly polar ferroics [9, 10], ferroelectric-dielectric composites [11], finite-sized or confined [12, 13] systems such as thin-film or nanoscale ferroelectrics [14–16], improper ∗ Corresponding Author: bohdan.horon@lnu.edu.ua This work is licensed under a Creative Commons Attribution 4.0 International License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI. 43604-1" 2401.09353v1,"Condensed Matter Physics, 2023, Vol. 26, No. 4, 43605: 1–9 DOI: 10.5488/CMP.26.43605 http://www.icmp.lviv.ua/journal Entropic force in a dilute solution of real ring polymer chains with different topological structures in a slit of two parallel walls with mixed boundary conditions ∗ P. Kuterba 1,2 , Z. Danel 3 † , W. Janke 4 1 Institute of Theoretical Physics, Jagiellonian University, prof. S. Łojasiewicza St. 11, 30–348 Cracow, Poland 2 Faculty of Medicine, Jagiellonian University Medical College, Łazarza St. 16, 31–530 Cracow, Poland 3 Faculty of Materials Engineering and Physics, Cracow University of Technology, Podchorażych St. 1 , 30–084 Cracow, Poland 4 Institut für Theoretische Physik, Universität Leipzig, IPF 231101, 04081 Leipzig, Germany Received September 5, 2023, in final form November 21, 2023 The molecular dynamics simulations were used to obtain the radius of gyration of real ring polymer chains with different topological structures consisting of 360 monomers. We focus on the entropic force which is exerted by a dilute solution of ring polymer chains of different topological structures with the excluded volume interaction (EVI) in a good solvent on the confining parallel walls of a slit geometry. We consider mixed boundary conditions of one repulsive wall and the other one at the adsorption threshold. The obtained molecular dynamics simulation results for a wide slit region demonstrate a qualitative agreement with previous analytical results for ideal ring polymers. These results could lead to interesting potential applications in materials engineering and improve understanding of some biological processes suggested in the paper. Additionally, they could be applied in microand nano-electromechanical devices (MEMS and NEMS) in order to reduce the static friction. Key words: soft matter, interface and surface thermodynamics, polymer behavior, phase transition, molecular dynamics simulations 1. Introduction Biopolymers such as deoxyribonucleic acid (DNA) can have in nature a ring topology. One example is the Escherichia coli (E. coli) bacteria, which is resistant to antibiotics. Additionally, the DNA of some viruses, such as bacteriophages 𝜆 that attack and destroy E. coli bacteria can oscillate between linear and ring topology as it was mentioned in [1, 2]. The DNA structure might depend on whether it is inside or outside the host cell. In the first case, it can switch to ring, in the other case it remains linear in mature viruses. Understanding those processes might help in the development of phage therapy. This therapy serves as an alternative to antibiotic treatments, especially for antibiotic-resistant bacteria. Besides, the measurements of the depletion force between repulsive wall and a single colloidal particle immersed in a dilute solution of nonionic linear polymer chains in a good solvent were performed in a series of papers [3–5]. The depletion force enters a complex force balance with other intercolloidal interactions such as: electrostatic repulsion and van der Waals attraction proposed by Derjaguin, Landau, Verwey, Overbeek (DLVO) or hydrophobic interaction and hydration [6–8]. Polymers are large macromolecules, consisting of a huge number 𝑁 of monomers with 𝑁 → ∞, which can be well described by statistical physics methods. In 1972, de Gennes [9] introduced a concept of the ∗ Former name Zoryana Usatenko † Corresponding author:zoriana.danel@pk.edu.pl This work is licensed under a Creative Commons Attribution 4.0 International License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI. 43605-1" 2401.09354v1,"Transcending Controlled Environments: Assessing the Transferability of ASR-Robust NLU Models to Real-World Applications Hania Khan, Aleena Fatima Khalid, Zaryab Hassan i200819@nu.edu.pk, k201688@nu.edu.pk, i202487@nu.edu.pk School of Computing, NUCES, Islamabad, Pakistan Abstract 2 The motivation behind this research stems from the recognition that ASR-robust NLU models developed in controlled environments may not seamlessly adapt to the challenges posed by real-world applications. Existing studies often lack a comprehensive evaluation of model performance in dynamic environments characterized by varied noise, linguistic nuances, and ASR errors. Understanding and addressing these challenges are critical for advancing the practical deployment of voiceactivated systems, particularly in multilingual and diverse linguistic contexts. By focusing on smart home automation in Urdu, we aim to address the unique linguistic and contextual challenges prevalent in the target domain. The research is motivated by the potential impact on user experience, as robust and adaptable NLU models can significantly enhance the usability and effectiveness of voiceactivated systems in real-world scenarios. The proposed methodology encompasses the collection of real-world data, fine-tuning models with transfer learning, employing cross-validation for reliability, introducing noise variations for robustness testing, and evaluating domain adaptability. The evaluation metrics include task-specific accuracy, latency, user satisfaction, and resilience to ASR errors. Through this research, we aspire to contribute valuable insights into the nuances of deploying ASR-robust NLU models in practical, real-world applications. The findings are expected to guide the refinement of existing models and the development of future systems that transcend the constraints of controlled environments, ultimately enhancing the user experience in voice-activated applications. This research investigates the transferability of Automatic Speech Recognition (ASR)-robust Natural Language Understanding (NLU) models from controlled experimental conditions to practical, real-world applications. Focused on smart home automation commands in Urdu, the study assesses model performance under diverse noise profiles, linguistic variations, and ASR error scenarios. Leveraging the Urdu- BERT model, the research employs a systematic methodology involving real-world data collection, cross-validation, transfer learning, noise variation studies, and domain adaptation. Evaluation metrics encompass task-specific accuracy, latency, user satisfaction, and robustness to ASR errors. The findings contribute insights into the challenges and adaptability of ASR-robust NLU models in transcending controlled environments. 1 Motivation Introduction The ubiquity of smart home automation systems has driven advancements in Natural Language Understanding (NLU) models for processing voice commands. However, the deployment of such models in real-world scenarios introduces complexities such as Automatic Speech Recognition (ASR) errors, diverse noise profiles, and linguistic variations. This research aims to bridge the gap between controlled experimental conditions and practical applications by evaluating the transferability of ASR- robust NLU models. Motivated by the imperative to enhance the robustness of NLU models in realworld environments, we focus on the specific domain of smart home automation commands in Urdu. This choice is informed by the need for models that can seamlessly understand and respond to user instructions in diverse linguistic contexts. The study employs the state-of-the-art UrduBERT model as the foundation for ASR-robust NLU, considering its proficiency in Urdu language understanding. 3 Related Work The landscape of spoken language understanding (SLU) has witnessed significant attention in recent years, driven by the surge in voice interface appli- 1" 2401.09362v1,"Condensed Matter Physics, 2023, Vol. 26, No. 4, 43702: 1–9 DOI: 10.5488/CMP.26.43702 http://www.icmp.lviv.ua/journal Exploring the structural, electronic, magnetic, and magneto-optical properties of double perovskites Ca 2 TMIrO 6 (TM=Fe, Co) through first principles study I. Touaibia 1 , A. Bouguerra 2 , W. Guenez 1 , F. Chemam 1 ∗ 1 Laboratory of Theoretical and Applied Physics (LPAT), Echahid Cheick Larbi Tebessi University, 12000 Tebessa, Algeria 2 Laboratory of Physics of Matter and Radiation (LPMR), Department of Matter Sciences, University of Souk-Ahras, P. O. Box 1553, 41000 Souk-Ahras, Algeria Received June 14, 2023, in final form September 12, 2023 This study is aimed at exploring the electronic, magnetic, and magneto-optical properties of double perovskites Ca 2 FeIrO 6 and Ca 2 CoIrO 6 with monoclinic structure (space group P21/ 𝑐 ) in order to examine their potential applications in spintronic and photovoltaic devices. The calculations were done using the full-potential linearized augmented plane wave within the density functional theory. For the electronic exchange-correlation function, we used the generalized gradient approximation (GGA) and GGA+U (Hubbard potential), and spinorbit coupling (SOC). The study showed that Ca 2 FeIrO 6 and Ca 2 CoIrO 6 exhibit a monoclinic structure (space group P21/ 𝑐 ). The structure relaxation shows an antiferromagnetic behavior in both systems with a magnetic moment of about 6.00 𝜇 𝐵 for Ca 2 FeIrO 6 and 4.00 𝜇 𝐵 for Ca 2 CoIrO 6 by using GGA+U approximation. The results of GGA and GGA+U predict the half-metallic behavior of Ca 2 FeIrO 6 and Ca 2 CoIrO 6 . The magneto-optical polar Kerr effect (MOKE) was examined by studying the variation of Kerr and ellipticity rotation. The Kerr rotation angle is 1.3 ◦ at 4.82 eV and −1.21 ◦ at 4.3 eV, and the ellipticity angle is −1.21 ◦ at 4.3 eV for Ca 2 FeIrO 6 . In the case of Ca 2 CoIrO 6 , the Kerr rotation angle is −1.04 ◦ at 4.05 eV; the significant Kerr rotation in both compounds may suggest the application of these materials in optoelectronics bias. The named compounds have a potential application in the field of spintronics and its devices, such as in optoelectronics technologies. Key words: double perovskites, Kerr effect, optical properties, wien2k 1. Introduction: Since the fifties of the last century, double perovskite has been the subject of many studies; the interest in these materials is due to the important electronic and magnetic properties that range from metallic, insulator, semi-conductor, superconductor to half-metallic that were discovered in Sr 2 FeMoO 6 compounds [2, 3]. Double perovskites show significant magnetic properties. The coupling between electronic and magnetic properties, such as half metallicity with antiferromagnetic behavior, is of great interest, allowing them to be the most promising and critical multifunctional materials for use in the new generation of spintronics or optoelectronics and its devices [4]. Double-perovskite oxides have the general formula A 2 B ′ B ′′ O 6 , where A is an alkaline-earth or rare-earth metal ion; B-site cations, B ′ and B ′′ , are transition metals [5]. The ideal structure of double perovskite is cubic, such as in Ba 2 NiOsO 6 [5] Ba 2 TMIrO 6 (TM=Cr, Mn, and Fe) [7] and Ba 2 BRuO 6 (B=Er, Tm) [8]. However, the small-size radius of the cation A compared with the radius size of the other ions has an important effect on the structural properties of the material. When the A-site cation radius is smaller than the ideal, the structure compensates for the cation size mismatch by tilting and rotating the B ′ O 6 and B ′′ O 6 octahedral. This property is observed in many compounds with Ca, Sr, and La cations in the A-site and of monoclinic structure: ∗ Corresponding author:fchemam@univ-tebessa.dz This work is licensed under a Creative Commons Attribution 4.0 International License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI. 43702-1" 2401.09367v1,"Condensed Matter Physics, 2023, Vol. 26, No. 4, 43704: 1–18 DOI: 10.5488/CMP.26.43704 http://www.icmp.lviv.ua/journal Optical and thermal effects in the neighborhood of the spherical layered nanoparticle of the “metallic core – J-aggregate shell” structure A. V. Korotun 1,2 ∗ , N. A. Smirnova 1 , V. I. Reva 1 , I. M. Titov 3 , G. M. Shilo 4 1 National University Zaporizhzhia Polytechnic, 64 Zhukovsky Str., Zaporizhzhia, 69063, Ukraine 2 G. V. Kurdyumov Institute for Metal Physics of National Academy of Sciences of Ukraine, 36 Academician Vernadsky Blvd., Kyiv, 03142, Ukraine 3 UAD Systems, 84 Olexandrivska Str., 69002, Zaporizhzhia, Ukraine 4 Zaporizhzhia National University, 66 Zhukovsky Str., 69600, Zaporizhzhia, Ukraine Received July 02, 2023, in final form October 01, 2023 The relations for the polarizability of the metallic nanoparticles, coated with the shell of cyanine dyes, are obtained in the article. The frequency dependencies for light absorption and scattering efficiencies, the heating of the composite nanoparticle and the electric field amplification in its neighborhood are studied. It is established that all the dependencies have three maxima which correspond to the frequencies of hybrid plasmon-exciton resonance. It is shown that an increase in content of metal in the nanoparticle causes a blue shift of the maxima from the visible part of the spectrum and a red shift of the maximum from ultraviolet frequency range. The issue of application of metal-organic nanoparticles in nanomedicine, in particular for the photothermal therapy of malignant neoplasms is studied. Key words: composite nanoparticles, J-aggregate, plasmon-exciton resonances, polarizability, absorption and scattering efficiencies 1. Introduction In the recent decade the surface plasmons in metallic nanostructures and the interaction between the surface plasmons and quantum emitters, for example, quantum dots, as well as cyanine dye molecules are under active research [1–5]. Such nanostructures make it possible to control the interaction between light and substance at the subwavelength scale. Their possible applications are associated with optical sensing, photon information processing [6, 7], and detecting ultra-low concentration of substances [8]. It should be pointed out that the assembly of dyes on plasmonic nanostructures can result in the formation of hybrid systems [9, 10]. At the same time, the most suitable organic components are cyanine dyes characterized by the presence of aggregated forms of molecules, such as J-aggregates [11], which demonstrate a narrow absorption peak shifted into the long wavelength region with respect to the absorption spectrum of the monomeric form [12, 13]. Moreover, J-aggregates have high optical absorption coefficient (larger than 10 6 cm −1 ) [14]. The mentioned absorption features of J-aggregates are fundamentally important for their use in photodetectors, which require characteristic wavelength of incident radiation [12]. The unusual optical properties of J-aggregates are also known due to exciton transfer and, hence, they can be used in such applications as organic field-effect transistors and solar cells [15]. An interaction between plasmons in metallic nanostructures and excitons of organic dyes attract attention due to unique properties of hybrid structures, obtained by using two components. For example, ∗ Corresponding author: andko@zp.edu.ua. This work is licensed under a Creative Commons Attribution 4.0 International License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI. 43704-1" 2401.09398v1,"A Future-Input Dependent model for Greenberger-Horne-Zeilinger correlations Izhar Neder ∗ Soreq Nuclear Research Center, Yavne 81800, Israel Nathan Argaman † Department of Physics, Ben-Gurion University of the Negev, Be’er Sheva, Israel and Department of Physics, Nuclear Research Center – Negev, P.O. Box 9001, Be’er Sheva 84190, Israel (Dated: January 18, 2024) It is widely appreciated, due to Bell’s theorem, that quantum phenomena are inconsistent with local-realist models. In this context, locality refers to local causality, and there is thus an open possibility for reproducing the quantum predictions with models which internally violate the causal arrow of time, while otherwise adhering to the relevant locality condition. So far, this possibility has been demonstrated only at a toy-model level, and only for systems involving one or two spins (or photons). The present work extends one of these models to quantum correlations between three or more spins which are entangled in the Greenberger-Horne-Zeilinger state. Keywords: Future-Input Dependent models; Greenberger-Horne-Zeilinger correlations; Toy models; Quantum correlations. I. INTRODUCTION )i( It is well known that quantum mechanics (QM) violates “local realism” [1]. Indeed, Bell’s theorem rules out local-hidden-variable models of quantum entanglement, under a broad set of assumptions which may be taken to represent the scientific method [2]. These assumptions include the identification of variables which may be externally controlled in the lab as mathematical free variables (barring “superdeterminism” [3]); the acceptance of irreversibly-recorded results of experiments as constraints on reality (barring many-worlds approaches [4]); and a causal arrow-of-time assumption, barring socalled retrocausal approaches [5]. However, the last assumption is too restrictive, as it excludes established scientific approaches such as the stationary action principle or Feynman’s path integrals [6]. Indeed, in order to evaluate and minimize the classical action, both initial and final conditions must be supplied as inputs, and thus the procedure is future-input dependent (FID), a term introduced in [7]. Such all-at-once (block universe) approaches are more time-reversal symmetric than a standard description, which explicitly begins with initial conditions and proceeds sequentially in time, see Fig. 1. The acceptance of the arrow of time as a basic background assumption allowed Bell to demonstrate that any mathematical model reproducing the predictions of QM must employ non-local variables, in a certain precisely-defined sense [8]. This, of course includes the standard quantum description, where the state of one ∗ Correspondence email address: izhar.neder@gmail.com † Correspondence email address: argaman@mailaps.org t )ii( D S locally causal probabilities x local weights + global normalization Figure 1. A sketch of a spacetime region described by a mathematical model (center panel), with marks for a source (S), a detector (D) and initial conditions (hatched). The blowups indicate two possibilities for the relations between model internal variables: (i) a locally causal description, with arrows indicating probabilistic dependencies (Bayesian network); (ii) a time-symmetric local description (Gibbs field), as per Eq. (1) below. particle of an entangled pair, A, changes as a result of performing a measurement on its distant partner, B (the state of A after the measurement depends on the result obtained for B). On the other hand, QM meets many other locality conditions, and in particular signal locality (the probabilities of any outcome for measurements on A do not depend on any external influence acted on B, e.g., what measurement was made on B). As signaling involves only inputs and outputs, any model reproducing the input-output relations predicted by QM will also exhibit signal locality. This tension between locality for signals and nonlocality for the internal variables is difficult to swallow, but one is forced to accept it due to Bell’s theorem and the subsequent experimental work [9]. Similarly, when one considers reproducing the predictions of QM with FID models, signal causality will be maintained despite" 2401.09446v1,"Explainable Multimodal Sentiment Analysis on Bengali Memes Kazi Toufique Elahi, Tasnuva Binte Rahman, Shakil Shahriar, Samir Sarker, Sajib Kumar Saha Joy, Faisal Muhammad Shah Department of Computer Science and Engineering Ahsanullah University of Science and Technology Dhaka 1208, Bangladesh Email: {ktoufiquee, tasnuvabinterahmansrishti, shakilshahriararnob, rohitsarker5}@gmail.com, {joy.cse, faisal.cse}@aust.edu Several research studies have been conducted to better understand the sentiment underlying memes. Various datasets specifically curated for memes, such as Facebook Hateful Memes (FHM) [4], Harmful Meme Dataset (HarM) [5], and Memotion [6], are available publicly. These datasets have served as a foundation for several significant researches. For instance, Alluri et al. [3] introduced the CAPSEN model with an accuracy of 60.25% (Memotion). Similarly, Cao et al. [7] introduced a prompt-based model PromptHate with an accuracy of 84.47% (FHM) and 72.98% (HarM). However, it is essential to highlight that most of these studies are focused on datasets in the English language. As Bengali is a low-resource language, the availability of datasets for memes in the Bengali language is scarce, and research in this domain is even rarer. Nonetheless, a recent study conducted by Hossain et al. [1] addressed this gap by introducing the MemoSen dataset, comprising a collection of Bengali memes for sentiment analysis. While their comprehensive analysis of the dataset yielded a weighted F1 score of 0.643, it remains a far cry from the scores achieved in sentiment analysis of memes in other languages. Additionally, the dataset suffers I. I NTRODUCTION from an inherent imbalance in its distribution. The usage of social media platforms (i.e. Facebook, Twitter, Due to the limited availability of research on sentiment Instagram) has increased dramatically due to the substantial analysis of Bengali memes, we aim to address this gap by evolution of the Internet and various Web 2.0 applications conducting research on the MemoSEN dataset. Initially, we [1]. These social media platforms contain people’s opinions implemented different models using solely text inputs and and conversations on various topics like politics, games, image inputs that attained the highest F1-score of 0.66 and entertainment, and so on. Sentiment analysis on these has 0.70 respectively. Afterward, we combined both text and image always been a popular topic for NLP researchers. However, the inputs to create a multimodal approach that achieved an F1- nature of data found on these platforms has evolved over time. score of 0.71. In summary, we have achieved the following: It has transformed from being solely text-based to encompass • Reached a desirable accuracy by implementing a multia combination of text, images, audio, and videos. One such modal approach on the MemoSEN dataset. content is memes. Memes are a popular form of communication • Evaluated the performance of our approach by performing amongst the younger generation. It is a type of content that a comparative analysis against the performance of other is context-based and might be in the form of images, text, models. or both. Memes are entertaining, critical, sarcastic, and may • Leveraged Explainable AI (XAI) to provide an explanation even be political [2]. Movies, politics, TV shows, religion, and of the implemented models. social culture are all common sources of Internet memes [3]. II. R ELATED W ORKS As it can be expressed in a lot of ways and can express a wide range of emotions, understanding and interpreting the Numerous studies have been conducted on sentiment analysis sentiment behind memes is of utmost relevance in this age. of memes, employing both unimodal and multimodal ap- Abstract—Memes have become a distinctive and effective form of communication in the digital era, attracting online communities and cutting across cultural barriers. Even though memes are frequently linked with humor, they have an amazing capacity to convey a wide range of emotions, including happiness, sarcasm, frustration, and more. Understanding and interpreting the sentiment underlying memes has become crucial in the age of information. Previous research has explored text-based, imagebased, and multimodal approaches, leading to the development of models like CAPSAN and PromptHate for detecting various meme categories. However, the study of low-resource languages like Bengali memes remains scarce, with limited availability of publicly accessible datasets. A recent contribution includes the introduction of the MemoSen dataset. However, the achieved accuracy is notably low, and the dataset suffers from imbalanced distribution. In this study, we employed a multimodal approach using ResNet50 and BanglishBERT and achieved a satisfactory result of 0.71 weighted F1-score, performed comparison with unimodal approaches, and interpreted behaviors of the models using explainable artificial intelligence (XAI) techniques. Index Terms—Sentiment Analysis, Memes, Multimodal, Deep Learning, Explainable AI." 2401.09451v2,"JOURNAL OF L A TEX CLASS FILES, VOL. 18, NO. 9, SEPTEMBER 2020 1 Diffusion-Driven Generative Framework for Molecular Conformation Prediction Bobin Yang, Jie Deng, Zhenghan Chen, Ruoxue Wu Abstract—The task of deducing three-dimensional molecular configurations from their two-dimensional graph representations holds paramount importance in the fields of computational chemistry and pharmaceutical development. This process significantly contributes to our comprehension of molecular mechanisms and interactions. The rapid advancement of machine learning, particularly within the domain of deep generative networks, has revolutionized the precision of predictive modeling in this context. Traditional approaches often adopt a two-step strategy: initially estimating interatomic distances and subsequently refining the spatial molecular structure by solving a distance geometry problem. However, this sequential approach occasionally falls short in accurately capturing the intricacies of local atomic arrangements, thereby compromising the fidelity of the resulting structural models. Addressing these limitations, this research introduces a cutting-edge generative framework named DDGF. This framework is grounded in the principles of diffusion observed in classical non-equilibrium thermodynamics. DDGF views atoms as discrete entities and excels in guiding the reversal of diffusion, transforming a distribution of stochastic noise back into coherent molecular structures through a process akin to a Markov chain. This transformation commences with the initial representation of a molecular graph in an abstract latent space, culminating in the realization of three-dimensional structures via a sophisticated bilevel optimization scheme meticulously tailored to meet the specific requirements of the task. One of the formidable challenges in this modeling endeavor involves preserving roto-translational invariance to ensure that the generated molecular conformations adhere to the laws of physics. Our proposed framework adeptly navigates this complexity, facilitating comprehensive training from inception to conclusion through the fine-tuning of a weighted variational lower bound that considers the conditional probability of conformations. Extensive experimental evaluations confirm the efficacy of the proposed DDGF in comparison to state-of-the-art methods. Index Terms—Graph Diffusion, Molecular Conformation Prediction, Bilevel Optimization I. I NTRODUCTION Graph representation learning has achieved remarkable success in modeling molecules for various tasks, encompassing property prediction [1], [2], graph domain adaptation [3], [4], [5], time series prediction [6], [7], and molecule generation [8], [9]. In this approach, molecules are typically represented as Bobin Yang is with the Life Sciences program at the University of Chinese Academy of Sciences. (e-mail: yangbolin22@mails.ucas.ac.cn) Jie Deng is with the B.E. in Software Engineering at Nankai University. (e-mail: dengjie2024@126.com) Zhenghan Chen is with the applied scientist in Yanshi. (e-mail: pandaarych@gmail.com) Ruoxue Wu is with the the M.S. degree in software engineering from Yunnan University. (e-mail: rochelle.wu820@gmail.com) Bobin Yang and Jie Deng contributed equally Corresponding author: Zhenghan Chen atom-bond graphs. Although this representation proves effective in multiple applications, a more intrinsic and informative depiction of molecules resides in their 3D geometry, often referred to as conformation. In this conformation, atoms are depicted using their Cartesian coordinates. The 3D structures exert significant influence over the biological and physical characteristics of molecules, rendering them crucial in various domains such as computational drug and material design [10], [11], [12], [13]. Despite these advancements, predicting stable molecular conformations remains a formidable challenge. Conventional approaches reliant on molecular dynamics (MD) or Markov chain Monte Carlo (MCMC) methods are computationally intensive and struggle to efficiently handle large molecules [14]. To address this challenge, researchers are exploring novel methods that integrate graph-based models with physics-based simulations or leverage reinforcement learning techniques to optimize molecular conformations. Experimentally determining the three-dimensional arrangements of molecules can be a challenging and resourceintensive endeavor, characterized by high costs and lengthy timeframes. As a result, the pursuit of computationally deriving precise and energetically favorable molecular structures has gained prominence within the field of computational chemistry. Traditional approaches in this domain have traditionally relied on methods such as Markov chain Monte Carlo (MCMC) or molecular dynamics (MD) simulations [15]. These methods involve proposing potential conformations and assigning energy levels to them through either cost-effective empirical potential models or high-precision quantum chemical calculations [16]. Recently, there has been a shift towards the integration of machine learning algorithms to estimate the conditional probability distribution p(C|G) for generating stable conformations C of a given molecular graph G. This approach builds upon datasets of molecules with known stable conformations [17], [18]. Notably, two pioneering studies [18], [19] have introduced a sequential methodology. The initial phase involves predicting interatomic distances, which lays the foundation for the subsequent creation of molecular structures based on these predicted distances. This task is facilitated by solving a set of distance geometry challenges [20]. By leveraging the principles of distance geometry, these innovative methods successfully capture the essential characteristics of rotation and translation invariance in molecular structures, leading to increasingly accurate predictions of molecular conformations. The sequential methodologies that initially estimate interatomic distances and then deduce conformations are susceptible to a notable drawback: the potential for inaccuracies in" 2401.09457v1,"Empowering Africa: An In-depth Exploration of the Adoption of Artificial Intelligence Across the Continent *Kinyua Gikunda, Denis Kute Dedan Kimathi University of Technology, Kenya patrick.gikunda@dkut.ac.ke, kute@osanoassociates.com Abstract—This paper explores the dynamic landscape of Artificial Intelligence (AI) adoption in Africa, analysing its varied applications in addressing socio-economic challenges and fostering development. Examining the African AI ecosystem, the study considers regional nuances, cultural factors, and infrastructural constraints shaping the deployment of AI solutions. Case studies in healthcare, agriculture, finance, and education highlight AI’s transformative potential for efficiency, accessibility, and inclusivity. The paper emphasizes indigenous AI innovations and international collaborations contributing to a distinct African AI ecosystem. Ethical considerations, including data privacy and algorithmic bias, are addressed alongside policy frameworks supporting responsible AI implementation. The role of governmental bodies, regulations, and private sector partnerships is explored in creating a conducive AI development environment. Challenges such as digital literacy gaps and job displacement are discussed, with proposed strategies for mitigation. In conclusion, the paper provides a nuanced understanding of AI in Africa, contributing to sustainable development discussions and advocating for an inclusive and ethical AI ecosystem on the continent. Index Terms—Artificial Intelligence (AI) Adoption, Socioeconomic Challenges, African AI Ecosystem, Ethical Considerations. I. I NTRODUCTION The exponential growth of Artificial Intelligence (AI) adoption in Africa heralds a transformative era, where technological innovations are becoming instrumental in tackling pressing socio-economic challenges and driving developmental initiatives [1]. In 2017, Price Waterhouse Coopers released a report forecasting a substantial contribution of US$15.7 trillion to the global economy by 2030 [2]. However, the distribution of wealth and influence derived from AI technologies has been notably uneven. PWC’s depiction of the future AI-driven economy, as illustrated below, highlights minimal growth for the African continent. Despite this, Africa plays a pivotal role in the development of AI systems, contributing natural resources, labor, and skills from across the region. Despite the extensive global reach of the AI supply chain, the advantages of these technologies have yet to materialize in Africa. Instead, they predominantly benefit Big Tech companies in the Global North and China, along with those who can afford the daily conveniences offered by AI through devices like Amazon’s Alexa and smart cars. The African continent presents a distinctive context poised to harness AI technologies for local socio-economic advancement [3]. With the potential to leapfrog the technological infrastructure associated with the Third Industrial Revolution and a dynamic youth population adept at adapting to digital work and entrepreneurship, Africa is well-positioned for growth. Emphasizing the importance of prioritizing AI solutions aligned with national developmental priorities, African governments should strive for prosperous and inclusive societies. While policy responses to AI are emerging in Africa, illustrated by countries like Egypt, Mauritius, and Rwanda publishing national AI strategies, the continent remains predominantly influenced by foreign technology and AI firms [4]. These external entities may not necessarily align with national developmental goals, and in some cases, may exacerbate exclusion and oppression, particularly affecting women. To counter this, African policymakers must prioritize the development of local AI capabilities that can significantly contribute to inclusive economic growth and social transformation. This emphasis necessitates building AI policy responses on national digital agendas and ensuring equitable access to digital, data, and computing infrastructure. In an analysis carried out between two countries —one advanced and the other developing- to find out if AI has the potential to widen the gap between rich and poor nations, the authors identify three significant channels through which divergence between the two economies can occur [1]. Firstly, in terms of share-in-production, advanced economies with higher total factor productivity and wages use AI more intensively, leading to a greater long-term benefit when AI productivity increases. This divergence is more pronounced when AI easily substitute for workers. Secondly, investment flows are impacted as the productivity increase in with use of AI creating higher demand for investment in both robots and traditional capital, particularly in advanced economies. This results in a diversion of investment from developing countries, causing a transitional decline in their GDP. Lastly, the terms-of-trade channel suggests that a developing economy, specializing in sectors reliant on unskilled labor, may experience a permanent decline in terms of trade after the AI revolution. As AI replace unskilled labor, leading to a drop in their relative wages, the price of goods using unskilled labor intensively decreases," 2401.09478v1,"arXived on January 19, 2024 Why the classes P and NP are not well-defined finitarily Gödel’s ‘formally’ unprovable, but ‘numeral-wise’ provable, arithmetical formula [R(x)] is not algorithmically computable as a tautology by any Turing machine, whether deterministic or non-deterministic Bhupinder Singh Anand Mumbai, India bhup.anand@gmail.com (https://orcid.org/0000-0003-4290-9549 ) Abstract. We distinguish finitarily between algorithmic verifiability, and algorithmic computability, to show that Gödel’s ‘formally’ unprovable, but ‘numeral-wise’ provable, arithmetical proposition [(∀x)R(x)] can be finitarily evidenced as: algorithmically verifiable as ‘always’ true, but not algorithmically computable as ‘always’ true. Hence, though [R(x)] is algorithmically verifiable as a tautology, it is not algorithmically computable as a tautology by any Turing machine, whether deterministic or non-deterministic. By interpreting the PvNP problem arithmetically, rather than set-theoretically, we conclude that the classes P and NP are not well-defined finitarily since it immediately follows that SAT ∈ / P, and SAT ∈ / NP. Keywords. algorithmic computability, algorithmic verifiability, Peano Arithmetic PA, PvNP, SAT 2010 Mathematics Subject Classification. 00A30, 03A05, 03B10, 03D10, 03D15, 03F25, 03F30, 68Q15, 68Q17, 68T27 DECLARATIONS • Funding: Not applicable • Conflicts of interest/Competing interests: Not applicable • Availability of data and material: Not applicable • Code availability: Not applicable • Authors’ contributions: Not applicable 1. Introduction In this investigation, we highlight a significant entailment for computational complexity of the distinction between algorithmic verifiability, and algorithmic computability, introduced in the 2012 Turingcentenary paper [An12] presented at the AISB/IACAP World Congress in Birmingham, and the paper [An16] published in the December 2016 issue of Cognitive Systems Research: “A number-theoretical relation F (x) is algorithmically verifiable if, and only if, for any given natural number n, there is an algorithm AL (F, n) which can provide objective evidence 18 for deciding the truth/falsity of each proposition in the finite sequence {F (1), F (2), . . . , F (n)}.” . . . Anand: [An16], §2, Definition 1 (Algorithmic verifiability). “A number theoretical relation F (x) is algorithmically computable if, and only if, there is an algorithm AL F that can provide objective evidence for deciding the truth/falsity of each proposition in the denumerable sequence {F (1), F (2), . . .}.” . . . Anand: [An16], §2, Definition 2 (Algorithmic computability). “We note that algorithmic computability implies the existence of an algorithm that can finitarily decide the truth/falsity of each proposition in a well-defined denumerable sequence of propositions, 19 whereas algorithmic verifiability does not imply the existence of an algorithm that can finitarily decide the truth/falsity of each proposition in a well-defined denumerable sequence of propositions. 18 cf. Murthy (1991): “It is by now folklore . . . that one can view the values of a simple functional language as specifying evidence for propositions in a constructive logic . . . ”. 19 We note that the concept of ‘algorithmic computability’ is essentially an expression of the more rigorously defined concept of ‘realizability’ in Kleene (1952), p. 503.” . . . Anand: [An16], §2, Defining algorithmic verifiability and algorithmic computability." 2401.09479v2,"Uncertainty-Aware Hardware Trojan Detection Using Multimodal Deep Learning Rahul Vishwakarma Amin Rezaei Computer Engineering & Computer Science Department California State University Long Beach Long Beach, CA, USA rahuldeo.vishwakarma01@student.csulb.edu Computer Engineering & Computer Science Department California State University Long Beach Long Beach, CA, USA amin.rezaei@csulb.edu Abstract—The risk of hardware Trojans being inserted at various stages of chip production has increased in a zero-trust fabless era. To counter this, various machine learning solutions have been developed for the detection of hardware Trojans. While most of the focus has been on either a statistical or deep learning approach, the limited number of Trojan-infected benchmarks affects the detection accuracy and restricts the possibility of detecting zero-day Trojans. To close the gap, we first employ generative adversarial networks to amplify our data in two alternative representation modalities: a graph and a tabular, which ensure a representative distribution of the dataset. Further, we propose a multimodal deep learning approach to detect hardware Trojans and evaluate the results from both early fusion and late fusion strategies. We also estimate the uncertainty quantification metrics of each prediction for risk-aware decision-making. The results not only validate the effectiveness of our suggested hardware Trojan detection technique but also pave the way for future studies utilizing multimodality and uncertainty quantification to tackle other hardware security problems. Index Terms—Hardware Trojan; Multimodal Deep Learning; Uncertainty Quantification I. I NTRODUCTION Hardware Trojan (HT) insertion has become a major concern in today’s fabless semiconductor manufacturing since attackers can make malicious modifications for a variety of reasons, such as information leakage, incorrect operation, or inflicting damage on the chip [1]–[4]. While comprehensive approaches are vital for countering HTs, they entail certain drawbacks. Formal methods and simulation-based testing can be resourceintensive and time-consuming. Intrusion detection systems may yield false alarms, disrupting operations. Establishing a secure supply chain can limit flexibility in supplier selection. Recently, Machine Learning (ML) has emerged as a powerful tool for detecting HTs [5]–[9]. It leverages algorithms to identify intricate patterns indicative of Trojans, even in increasingly sophisticated attacks. By training on diverse datasets, ML models can classify circuits as Trojan-free or Trojaninfected. Real-time processing enables continuous monitoring and immediate threat response. However, challenges exist, for example, acquiring large and diverse datasets, especially for rare Trojans, which can be difficult. Moreover, models are susceptible to adversarial attacks [10], potentially undermining their decision-making. Interpretability [11] and explainability [12] are crucial for trust but can be complex in this context. Additionally, resource-intensive training and deployment may limit accessibility for smaller manufacturers. Continuous retraining is necessary to adapt to evolving Trojan techniques [13], adding complexity to maintenance. Our goal in this paper is to address the gaps in the current ML-based approaches for identification of HTs by proposing NOODLE, an uNcertainty-aware hardware TrOjan detectiOn using multimoDal deep LEarning. The proposed method uses graph representation and tabular data and performs binary classification. A. Related Works The emphasis in traditional ML approaches for HT detection has primarily been on modeling techniques. This entails the development and implementation of algorithms aimed at enhancing the overall accuracy of HT detection. Many research papers have concentrated on extracting features from Register Transfer Level (RTL) or gate-level netlists and employing ML models such as Support Vector Machine (SVM) [14], Neural Network (NN) [15], eXtreme Gradient Boosting (XGB) [16], and the Random Forest (RF) classifier [17]. In [18], image classification techniques are also employed. Multimodal Deep Learning (DL) has been a well-explored topic in the Artificial Intelligence (AI) community. Early research, exemplified by Deep Boltzmann Machines (DBM) focused on the model’s capacity to understand probability distributions across inputs with multiple modes [19]. Additionally, applications of uncertainty-aware multimodal learning [20] have been successfully demonstrated in healthcare [21] and in scenarios involving multimodal task distributions [22], particularly in safety-critical environments. In our work, we target the fusion of graph [23], [24] and Euclidean data as the modalities of interest along with uncertainty estimation. Moreover, when working in the hardware security domain, it is expected to have fewer data points that are malicious or Trojan-infected. In this context, it is necessary to work with small data [25] and this has been achieved in various domains such as material science [26] and anomaly detection [27]. B. Contributions In this paper, we investigate the feasibility of applying a multimodal ML approach for HT identification by deriving two data representations of circuits. The first is graphical representation [28] of circuits, and the second is euclidean data" 2401.09496v2,"Learning to Generalize over Subpartitions for Heterogeneity-aware Domain Adaptive Nuclei Segmentation Jianan Fan 1 , Dongnan Liu 1 , Hang Chang 2,3 and Weidong Cai 1* 1* School of Computer Science, University of Sydney, Sydney, 2008, NSW, Australia. 2 Berkeley Biomedical Data Science Center, Lawrence Berkely National Laboratory, Berkeley, 94720, CA, United States. 3 Biological Systems and Engineering Division, Lawrence Berkely National Laboratory, Berkeley, 94720, CA, United States. *Corresponding author(s). E-mail(s): tom.cai@sydney.edu.au; Contributing authors: jfan6480@uni.sydney.edu.au; dongnan.liu@sydney.edu.au; hchang@lbl.gov; Abstract Annotation scarcity and cross-modality/stain data distribution shifts are two major obstacles hindering the application of deep learning models for nuclei analysis, which holds a broad spectrum of potential applications in digital pathology. Recently, unsupervised domain adaptation (UDA) methods have been proposed to mitigate the distributional gap between different imaging modalities for unsupervised nuclei segmentation in histopathology images. However, existing UDA methods are built upon the assumption that data distributions within each domain should be uniform. Based on the over-simplified supposition, they propose to align the histopathology target domain with the source domain integrally, neglecting severe intra-domain discrepancy over subpartitions incurred by mixed cancer types and sampling organs. In this paper, for the first time, we propose to explicitly consider the heterogeneity within the histopathology domain and introduce open compound domain adaptation (OCDA) to resolve the crux. In specific, a two-stage disentanglement framework is proposed to acquire domain-invariant feature representations at both image and instance levels. The holistic design addresses the limitations 1" 2401.09502v1,"On the Klein-Gordon oscillators in Eddington-inspired Born-Infeld gravity global monopole spacetime and a Wu-Yang magnetic monopole Omar Mustafa ∗ Department of Physics, Eastern Mediterranean University, 99628, G. Magusa, north Cyprus, Mersin 10 - Turkiye. A. R. Soares † Instituto Federal de Educação Ciência e Tecnologia do Maranhão, R. Dep. Gastão Vieira, 1000, CEP 65393-000 Buriticupu, MA, Brazil. C. F. S. Pereira ‡ Departamento de Fı́sica e Quı́mica, Universidade Federal do Espı́rito Santo, Av.Fernando Ferrari, 514, Goiabeiras, Vitória, ES 29060-900, Brazil. R. L. L. Vitória § Faculdade de Fı́sica, Universidade Federal do Pará, Av. Augusto Corrêa, Guamá, 66075-110, Belém, PA, Brazil. Abstract: We consider Klein-Gordon (KG) particles in a global monopole (GM) spacetime within Eddington-inspired Born-Infeld gravity (EiBI-gravity) and in a Wu-Yang magnetic monopole (WYMM). We discuss a set of KG-oscillators in such spacetime settings. We propose a textbook power series expansion for the KG radial wave function that allows us to retrieve the exact energy levels for KG-oscillators in a GM spacetime and a WYMM without EiBI-gravity. We, moreover, report some conditionally exact, closed form, energy levels (through some parametric correlations) for KG-oscillators in a GM spacetime and a WYMM within EiBI-gravity, and for massless KG- oscillators in a GM spacetime and a WYMM within EiBI-gravity under the influence of a Coulomb plus linear Lorentz scalar potential. We study and discuss the effects of the Eddington parameter κ, GM-parameter α, WYMM strength σ, KG-oscillators’ frequency Ω, and the coupling param- eters of the Coulomb plus linear Lorentz scalar potential, on the spectroscopic structure of the KG-oscillators at hand. Such effects are studied over a vast range of the radial quantum number n r ≥ 0 and include energy levels clustering at κ >> 1 (i.e., extreme EiBI-gravity), and at |σ| >> 1 (i.e., extreme WYMM strength). PACS numbers: 05.45.-a, 03.50.Kk, 03.65.-w Keywords: Klein-Gordon oscillators, Global monopole spacetime, Wu-Yang magnetic monopole, Eddington-inspired Born-Infeld gravity. ∗ Electronic address: omar.mustafa@emu.edu.tr † Electronic address: adriano.soares@ifma.edu.br ‡ Electronic address: carlos.f.pereira@edu.ufes.br § Electronic address: ricardo-luis91@hotmail.com" 2401.09507v1,"Deep Ensemble Shape Calibration: Multi-Field Post-hoc Calibration in Online Advertising Shuai Yang Hao Yang Zhuang Zou Linhe Xu Shopee Discovery Ads Beijing, China Shopee Discovery Ads Beijing, China Shopee Discovery Ads Beijing, China Shopee Discovery Ads Beijing, China Shuo Yuan Yifan Zeng Shopee Discovery Ads Beijing, China Shopee Discovery Ads Beijing, China ABSTRACT In the e-commerce advertising scenario, estimating the true probabilities (known as a calibrated estimate) on Click-Through Rate (CTR) and Conversion Rate (CVR) is critical and can directly affect the benefits of the buyer, seller and platform. Previous research has introduced numerous solutions for addressing the calibration problem. These methods typically involve the training of calibrators using a validation set and subsequently applying these calibrators to correct the original estimated values during online inference. However, what sets e-commerce advertising scenarios is the challenge of multi-field calibration. Multi-field calibration can be subdivided into two distinct sub-problems: value calibration and shape calibration. Value calibration is defined as no over- or under-estimation for each value under concerned fields (such as the average of pCTR should equal to the CTR for value ""women’s shoes"" in the field ""category"", in the advertising context, the number of fields can range from dozens to even hundreds). Shape calibration is defined as no over- or under-estimation for each subset of the pCTR within the specified range under condition of concerned fields. In order to achieve shape calibration and value calibration, it is necessary to have a strong data utilization ability. Because the quantity of pCTR specified range for single field-value (such as user ID and item ID) sample is relative small, which makes the calibrator more difficult to train. However the existing methods cannot simultaneously fulfill both value calibration and shape calibration. To solve these problems, we propose a new method named Deep Ensemble Shape Calibration (DESC) 1 . We introduce innovative basis calibration functions, which enhance both function expression capabilities and data utilization by combining these basis calibration functions. A significant advancement lies in the development of an allocator capable of allocating the most suitable shape calibrators to different estimation error distributions within diverse fields and values. Finally, we achieve significant improvements in both public 1 The code is at https://github.com/HaoYang0123/DESC Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference acronym ’XX, June 03–05, 2018, Woodstock, NY © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX data and industrial data, and on online experiments we get +2.5% of CVR and +4.0% of GMV (Gross Merchandise Volume). KEYWORDS Multi-Field Calibration, Basis Calibration Function, Field-aware Attention ACM Reference Format: Shuai Yang, Hao Yang, Zhuang Zou, Linhe Xu, Shuo Yuan, and Yifan Zeng. 2018. Deep Ensemble Shape Calibration: Multi-Field Post-hoc Calibration in Online Advertising. In Proceedings of Make sure to enter the correct conference title from your rights confirmation emai (Conference acronym ’XX). ACM, New York, NY, USA, 9 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Estimating CTR and CVR is a crucial technology in e-commerce advertising domains [2–6, 9, 13, 21, 25–27, 29, 32, 34]. Accurate prediction of CTR (pCTR) and CVR (pCVR) is essential, as it necessitates precision not only in ranking but also in absolute values. However, recent studies [1, 8, 15, 22] have revealed that numerous established machine learning techniques, particularly deep learning methods extensively applied in the fields of e-commerce advertising, often yield inadequately calibrated probability predictions. In previous research, there are many solutions to solve the calibration problem. These methods learn calibrator through the validation set, and then use the calibrator to correct the original estimated values in the online inference stage. These methods can be categorized into parameter methods (including Platt Scaling [24], Temperature scaling [8], Beta calibration [17], Gamma calibration [19] and Dirichlet calibration [16]), non-parameter methods (such as Histogram Binnning [30] and Isotonic Regression [31]) and hybrid methods. Hybrid methods encompass both non-field-aware [14, 18, 33] and field-aware approaches [12, 23, 28]. However, what sets apart e-commerce advertising scenarios is the challenge of multi-field calibration, which means that for each pCTR range in each value under each concerned field the pCTR should be calibrated. Multi-field calibration can be subdivided into two distinct sub-problems: value calibration and shape calibration. Value calibration is defined as no over- or under-estimation each value under concerned fields (such as average of pCTR should equal to the CTR for value ""women’s shoes"" in the field ""category"", in the e-commerce advertising context, the number of fields can range from dozens to even hundreds). Figure 1 illustrates the significant inconsistency of over- and under-estimation across different field" 2401.09513v1,"Role of Upwelling on Larval Dispersal and Productivity of Gooseneck Barnacle Populations in the Cantabrian Sea: Management Implications Antonella Rivera 1 *, Nicolás Weidberg 1¤ , Antonio F. Pardiñas 1 , Ricardo González-Gil 1 , Lucı́a Garcı́a- Flórez 2 , J. L. Acuña 1 1 Departamento de Biologı́a de Organismos y Sistemas, Universidad de Oviedo, Oviedo, Spain, 2 Centro de Experimentación Pesquera. Consejerı́a de Agroganaderı́a y Recursos Autóctonos, Gijón, Spain Abstract The effect of coastal upwelling on the recruitment and connectivity of coastal marine populations has rarely been characterized to a level of detail to be included into sound fishery management strategies. The gooseneck barnacle (Pollicipes pollicipes) fishery at the Cantabrian Coast (Northern Spain) is located at the fringes of the NW Spanish Upwelling system. This fishery is being co-managed through a fine-scale, interspersed set of protected rocks where each rock receives a distinct level of protection. Such interspersion is potentially beneficial, but the extent to which such spacing is consistent with mean larval dispersal distances is as yet unknown. We have simulated the spread of gooseneck barnacle larvae in the Central Cantabrian Coast using a high-resolution time-series of current profiles measured at a nearshore location. During a year of high upwelling activity (2009), theoretical recruitment success was 94% with peak recruitment predicted 56 km west of the emission point. However, for a year of low upwelling activity (2011) theoretical recruitment success dropped to 15.4% and peak recruitment was expected 13 km east of the emission point. This is consistent with a positive correlation between catch rates and the Integrated Upwelling Index, using a 4-year lag to allow recruits to reach commercial size. Furthermore, a net long-term westward larval transport was estimated by means of mitochondrial cytochrome c oxidase subunit I (COI) sequences for five populations in the Cantabrian Sea. Our results call into question the role of long distance dispersal, driven by the mesoscale processes in the area, in gooseneck barnacle populations and point to the prevalent role of small-scale, asymmetric connectivity more consistent with the typical scale of the co-management process in this fishery. Citation: Rivera A, Weidberg N, Pardiñas AF, González-Gil R, Garcı́a-Flórez L, et al. (2013) Role of Upwelling on Larval Dispersal and Productivity of Gooseneck Barnacle Populations in the Cantabrian Sea: Management Implications. PLoS ONE 8(11): e78482. doi:10.1371/journal.pone.0078482 Editor: Hans G. Dam, University of Connecticut, United States of America Received July 5, 2013; Accepted September 12, 2013; Published November 13, 2013 Copyright: ß 2013 Rivera et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Funding: This work was financed by the Spanish Government through projects COSTAS (CTM2006-05588/MAR, Ministry of Education and Science) and DOSMARES (CTM2010-21810-C03-02, Ministry of Science and Innovation), and by the Principality of Asturias Government through project FRENTES (IB08-122, FICYT). AR and RGG were supported by a FPU fellowship (ref. AP2010-5376 and AP2008-03992, respectively, Ministerio de Educación de España) and AFP by a ""Severo Ochoa"" FICYT-PCTI fellowship (ref. BP09038, Asturias Regional Government). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. Competing Interests: The authors have declared that no competing interests exist. * E-mail: riveralidia@uniovi.es ¤ Current address: Coastal Research Group, Department of Zoology and Entomology, Rhodes University, Grahamstown, South Africa populations are generally managed at much smaller scales and do not adapt well to finfish management tools [9]. For example, an emerging trend in the conservation of benthic resources incorporates co-management practices involving exclusive Territorial User Rights for Fishing (TURFs) in exchange for shared responsibility on resource management [10,11]. This kind of management practices favor the incorporation of local ecological knowledge into the regulations, which very often comprises aspects of the spatial distribution of the resource and of the fishermen’s activity spanning a fine scale from a few meters to several kilometers. But, does the management scale in these TURF systems have the potential to interact with the connectivity patterns of the resource? And, are the dispersal scales of benthic resources consistent with the scale of co-management practices? The gooseneck barnacle (Pollicipes pollicipes) fishery in the Cantabrian Sea offers a good opportunity to test these ideas. The fishery is located at the fringe of the NW Spanish Upwelling system, where frequent summer northeast winds cause the Introduction Most marine benthic species have a pelagic dispersal stage which is essential for their persistence. Dispersal and further recruitment to the benthic habitat allows for connectivity among disjunct populations, leading to metapopulations which are globally viable in spite of the possibility of local extinctions [1,2]. Thus, connectivity is a key factor for population persistence, which explains the rapid expansion of research on larval dispersal and connectivity in marine populations [3]. Much of this research has been focused on large and mesoscale (100s of km) connectivity [4,5], but less on scales of a few kilometers [6,7]. Mesoscale connectivity is consistent with the typical management scale of finfish populations [8]. However, for coastal benthic organisms, the concept of connectivity includes post-dispersal processes (such as settlement, survival of early stages and reproduction) which take place at the shore and could be totally decoupled from those affecting larvae in the pelagic realm. In fact, many benthic PLOS ONE | www.plosone.org 1 November 2013 | Volume 8 | Issue 11 | e78482" 2401.09536v1,"Few-body precursors of topological frustration Federico Raffaele De Filippi Department of Physics, University of Trieste, 34127 Trieste, Italy E-mail: federicoraffaele.defilippi@ds.units.it Antonio Francesco Mello International School for Advanced Studies (SISSA), 34136 Trieste, Italy E-mail: amello@sissa.it Daniel Sacco Shaikh Dipartimento di Fisica, Università degli Studi di Genova, via Dodecaneso 33, 16146, Genova, Italy E-mail: 4526348@studenti.unige.it Maura Sassetti Dipartimento di Fisica, Università degli Studi di Genova, via Dodecaneso 33, 16146, Genova, Italy CNR spin, via Dodecaneso 33, 16146, Genova, Italy E-mail: maura.sassetti@unige.it Niccolò Traverso Ziani Dipartimento di Fisica, Università degli Studi di Genova, via Dodecaneso 33, 16146, Genova, Italy CNR spin, via Dodecaneso 33, 16146, Genova, Italy E-mail: niccolo.traverso.ziani@unige.it Michele Grossi European Organization for Nuclear Research (CERN) Geneva 1211, Switzerland E-mail: michele.grossi@cern.ch January 2024 Abstract. Quantum spin chains - the prototypical model for coupled two-level systems - offer a fertile playground both for fundamental and technological applications, ranging from the theory of thermalization to quantum computation. The effects of frustration induced by the boundary conditions have recently been addressed in this context. In this work, we analyze the effects of such frustration on a few spin system and we comment the strong even-odd effects induced in the ground state energy. The" 2401.09556v1,"Deep learning enhanced mixed integer optimization: Learning to reduce model dimensionality Niki Triantafyllou 1,2 , Maria M. Papathanasiou 1, 2* 1 The Sargent Centre for Process Systems Engineering, Imperial College London, London, United Kingdom, SW7 2AZ 2 Department of Chemical Engineering, Imperial College London, London, United Kingdom, SW7 2AZ *maria.papathanasiou11@imperial.ac.uk Abstract This work introduces a framework to address the computational complexity inherent in Mixed-Integer Programming (MIP) models by harnessing the potential of deep learning. We compare the effectiveness of (a) feed-forward neural networks (ANN) and (b) convolutional neural networks (CNN) in approximating the active dimensions within MIP problems. We utilize multi-label classification to account for more than one active dimension. To enhance the framework's performance, we employ Bayesian optimization for hyperparameter tuning, aiming to maximize sample-level accuracy. The primary objective is to train the neural networks to predict all active dimensions accurately, thereby maximizing the occurrence of global optimum solutions. We apply this framework to a flow-based facility location allocation Mixed-Integer Linear Programming (MILP) formulation that describes long- term investment planning and medium-term tactical planning in a personalized medicine supply chain for cell therapy manufacturing and distribution. Keywords: deep learning; mixed integer programming; decomposition; synthetic data generation; Bayesian optimization 1. Introduction Mixed Integer Programming (MIP) is a widely used modeling approach for a wide range of problems in science, engineering, and management, including planning, scheduling, control, and routing (Bertsimas & Weismantel, 2005; Floudas & Lin, 2005). In the realm of enterprise-wide optimization (EWO), many problems can be described by MIP models (Grossmann, 2005, 2012). However, a major challenge in EWO is the synchronized multi-scale decision-making across organizational functions (raw material acquisition, manufacturing, distribution, sales), geographic entities (suppliers, manufacturers, distributors, markets), and planning levels (strategic, tactical, operational) (Applequist et al., 2000; Chu 1" 2401.09566v2,"Aligning Large Language Models with Counterfactual DPO Bradley Butcher Independent Researcher braddpbutcher@gmail.com Abstract Advancements in large language models (LLMs) have demonstrated remarkable capabilities across a diverse range of applications. These models excel in generating text completions that are contextually coherent and cover an extensive array of subjects. However, the vast datasets required for their training make aligning response styles during the pretraining and instruction tuning phases challenging. Consequently, an additional alignment phase is typically employed, wherein the model is further trained with human preference data to better align its outputs with human expectations. While this process doesn’t introduce new capabilities per se, it does accentuate generation styles innate to the model. This paper explores the utilization of counterfactual prompting within the framework of Direct Preference Optimization (DPO) to align the model’s style without relying on human intervention. We demonstrate that this method effectively instils desirable behaviour, mitigates undesirable ones, and encourages the model to disregard inappropriate instructions. Our findings suggest that counterfactual prompting with DPO presents a lowresource way to fine-tune LLMs to meet the demands for responsible and ethically aligned AI systems. 1 Introduction Recent progress in LLMs has elevated their text generation capabilities to a commercially viable standard [Qin et al., 2023; Vilar et al., 2022; Chowdhery et al., 2022]. These models are increasingly employed across diverse sectors, including chatbots, customer support assistants, retrievalaugmented generation (RAG), and structured data extraction [Soni, 2023; Lu et al., 2021; Gao et al., 2023]. As their integration becomes more widespread in professional and personal settings, aligning these models with user preferences has become crucial. The training of LLMs typically involves three stages [Ziegler et al., 2019]. Initially, in the general pretraining stage, the model learns the structure of the language, gains context understanding, and develops the ability to generate coherent and relevant text [Radford et al., 2018]. This is achieved by training the LLM to predict the next word in a sequence from a large corpus, including books, websites, and other texts, an approach known as causal language modelling (CLM) [Vaswani et al., 2017]. Following this, the model undergoes instruction finetuning, employing the same CLM objective but with data structured as pairs of instructions and responses. This phase enables the model to learn specific response patterns to various instructions, building on the foundational knowledge from the pretraining phase. The final stage, alignment with human preferences, aims to refine the model’s output for specific contexts, such as reducing hate speech or offering more concise responses [Ziegler et al., 2019]. This typically involves human annotation, where users select their preferred response from multiple options generated by the LLM. However, this process is inherently limited, as the model must already be capable of generating both styles of response; the process merely emphasizes one style over the other. Furthermore, this approach is constrained by the need for extensive human annotations and the untargeted nature of preference selection. Addressing these limitations, this paper introduces a novel approach using counterfactual prompts in the alignment stage, eliminating the need for human intervention. Our method utilizes counterfactual styles within the Direct Preference Optimization (DPO) framework to guide the model’s output [Rafailov et al., 2023]. This approach simplifies the alignment process and enhances scalability by directly injecting desired stylistic preferences into the model, a significant departure from traditional Reinforcement Learning from Human Feedback (RLHF) methods that depend on the availability and selection of styles by human evaluators. Our experiments are aimed at evaluating how effectively this method encourages the use of desired latent styles, minimizes the use of unwanted styles, and ignores inappropriate instructions. The results demonstrate that through counterfactual prompts combined with DPO, our approach can effectively reduce hallucinations, decrease bias, and ignore adversarial instructions. Our method offers a more controlled and efficient way to shape LLM responses, whilst maintaining the performance of the original model. With new global policies and rules for LLMs coming into play, it’s important to make sure these models meet set behav-" 2401.09574v1,"Towards Scalable and Robust Model Versioning Wenxin Ding, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng Department of Computer Science, University of Chicago { wenxind, abhagoji, ravenben, htzheng } @cs.uchicago.edu Unfortunately, replacing a breached model is a challenging task. This is because, building powerful deep learning models often involves acquiring and curating high quality training datasets, a process that incurs significant investment in time and capital, and can be difficult or impractical to repeat. For example, a model identifying diseases like rare skin lesions may take years to collect the training data, involving curation by specialists and de-identification to comply with privacy regulations [5]. Similarly, training data for content moderation models is often extremely sensitive and difficult to procure, e.g. images of extreme violence or abuse of minors. Obtaining and labeling these challenging images require manual inspection and careful supervision. These observations motivate us to investigate how model owners can protect themselves against model losses without the necessity of acquiring new training data. Ideally, they would like to train multiple versions of the target model from the same training set, deploy one version at a time and replace a leaked version with a new one. At the time of its deployment, each new version i of the model should resist adversarial attacks as if it were the sole model version that had been deployed. That is, when attempting to attack model i, an attacker would gain minimal or no advantage by obtaining white-box access to any or all previous model versions {j | j < i}. The longer the model sequence supports this sequential (or compound) robustness, the stronger the protection against repeated model leakages. We refer to this I. I NTRODUCTION problem as scalable and robust model versioning. As deep learning models become increasingly prevalent Unfortunately, solving this problem is difficult because across various industries, the risk of malicious attacks attempt- of two significant challenges. First is the well known pheing to breach access to these deployed models is growing. nomenon of attack transferability: adversarial attacks gener- When an attacker obtains access to a deployed model, via ated on one model often succeed on similar models trained on many methods including server breaches, insider attacks, or the same task, even when they use different architectures [6], model inversion attacks, they can craft white-box adversarial [7]. To date, few if any techniques provide the ability to attacks to manipulate the model’s classification results. As the generate multiple (> 3) models on the same task with low classification results lose their reliability, the deployed ML attack transferability between them, while maintaining normal service becomes obsolete and needs to be replaced or removed. classification accuracy. Second, our problem must address For example, in the medical field, image classification faces a novel but natural evolution of the white-box attack, a real-world attacks that aid insurance fraud. Some physicians sequential, compound transferability attack. As each leaked engage in overprescribing medications and misdiagnosing model is retired, an attacker with no white-box access to conditions, prompting insurance companies to employ image the new version i, can still utilize their white-box access classification for diagnosis verification. Adversarial attacks to prior versions (1 to i − 1) to orchestrate a strong attack against these models are well-documented and raise significant against version i. This new requirement and the need to concerns [1], [2]. Another example is classifiers for image sequentially deploy/replace models make our problem distinct content moderation on discussion boards and online platforms, from existing works (e.g., constructing robust ensembles [8], which are frequently attacked by bad actors seeking to bypass [9], [10]), creating a new, open challenge. content moderation with prohibited content [3], [4]. To tackle these challenges, our work introduces a principled Abstract—As the deployment of deep learning models continues to expand across industries, the threat of malicious incursions aimed at gaining access to these deployed models is on the rise. Should an attacker gain access to a deployed model, whether through server breaches, insider attacks, or model inversion techniques, they can then construct white-box adversarial attacks to manipulate the model’s classification outcomes, thereby posing significant risks to organizations that rely on these models for critical tasks. Model owners need mechanisms to protect themselves against such losses without the necessity of acquiring fresh training data - a process that typically demands substantial investments in time and capital. In this paper, we explore the feasibility of generating multiple versions of a model that possess different attack properties, without acquiring new training data or changing model architecture. The model owner can deploy one version at a time and replace a leaked version immediately with a new version. The newly deployed model version can resist adversarial attacks generated leveraging white-box access to one or all previously leaked versions. We show theoretically that this can be accomplished by incorporating parameterized hidden distributions into the model training data, forcing the model to learn task-irrelevant features uniquely defined by the chosen data. Additionally, optimal choices of hidden distributions can produce a sequence of model versions capable of resisting compound transferability attacks over time. Leveraging our analytical insights, we design and implement a practical model versioning method for DNN classifiers, which leads to significant robustness improvements over existing methods. We believe our work presents a promising direction for safeguarding DNN services beyond their initial deployment." 2401.09575v1,"Zero Trust Implementation in the Emerging Technologies Era: Survey Abraham Itzhak Weinberg a , Kelly Cohen b a AI-WEINBERG, Tel Aviv, Israel, aviw2010@gmail.com b Department of Aerospace Engineering, University of Cincinnati, OH, Cincinnati, 45231, USA Abstract This paper presents a comprehensive analysis of the shift from the traditional perimeter model of security to the Zero Trust (ZT) framework, emphasizing the key points in the transition and the practical application of ZT. It outlines the differences between ZT policies and legacy security policies, along with the significant events that have impacted the evolution of ZT. Additionally, the paper explores the potential impacts of emerging technologies, such as Artificial Intelligence (AI) and quantum computing, on the policy and implementation of ZT. The study thoroughly examines how AI can enhance ZT by utilizing Machine Learning (ML) algorithms to analyze patterns, detect anomalies, and predict threats, thereby improving real-time decision-making processes. Furthermore, the paper demonstrates how a chaos theory-based approach, in conjunction with other technologies like eXtended Detection and Response (XDR), can effectively mitigate cyberattacks. As quantum computing presents new challenges to ZT and cybersecurity as a whole, the paper delves into the intricacies of ZT migration, automation, and orchestration, addressing the complexities associated with these aspects. Finally, the paper provides a best practice approach for the seamless implementation of ZT in organizations, laying out the proposed guidelines to facilitate organizations in their transition towards a more secure ZT model. The study aims to support organizations in successfully implementing ZT and enhancing their cybersecurity measures. Keywords: Zero Trust, Policy, XDR, Artificial Intelligence (AI), Quantum Computing, Chaos Theory 1. Introduction In recent years, several phenomena have been observed in which their interactions lead to the proliferation of the ZT approach. The first is an increase in the number of devices connected to the network, such as IoTs (Internet of Things) Jeffrey (2021). The second is poised emerging technologies, such as Artificial Intelligence (AI), Generative AI (GAI), and quantum computing. The third is the rapid growth of cyberattacks, attack surfaces, and sophistication levels of attacks Verizon (2021). In addition, the COVID-19 pandemic has accelerated the adoption of cloud-based technologies as well as technologies that enable workers to work from everywhere they would like to. In addition, the White House Executive Order (WHEO) published definitions and migration steps for ZT to agencies House (2021). In this paper, we focus on recent technological developments in ZT. Additionally, we elaborate on their impact on ZT automation orchestration and migration in the context of new emerging technologies. To the best of our knowledge, only a few ZT survey papers relate to this aspect Syed et al. (2022) and this is the first time that the combination between them has been surveyed. This paper presents the challenges, approaches, and implementation of ZT for Detection and Response (DR) layers, such as Endpoint Detection and Response (EDR), eXtended Detection and Response (XDR), and Network Detection and Response (NDR) also known as Network Traffic Analysis (NTA). As can be learned from its name, DR has two purposes for detecting and responding to security incidents that aim to bypass the End Point Protection Platforms (EPP). ZT is a crucial framework for Preprint submitted to arXiv EDR as it is one of the most exposed points to cyberspace. While dealing with defense approaches, it is important to bear in mind that while the attack can be considered a success story, even after many failures, the defense must always be successful. Hence, defense capabilities must be better than potential attacks. Cybersecurity experts claim that an attack will eventually occur, and practically, the chances of 100% are only theoretical Yampolskiy and Spellchecker (2016). Risk can be mitigated by early detection and response to an attack when it occurs. ZT is expected to solve this gap. Since ZT plays a practical role in many organizations, we find in the literature design principles such as designing architecture from inside out, determination of the access needs at a preliminary stage, focusing on the required organizational outcomes, and using the EDR as a source for inspecting the log traffic Wylde (2021). The ZT can help protect against Operational Technology (OT) attacks. OT attacks are designed to exploit systems that are directly on the plant floor Paes et al. (2019). ZT can be applied to Industrial Control Systems (ICS) to ensure that only authorized devices and users can access the system Zanasi et al. (2022); Li et al. (2022). For example, in the case of the 2017 NotPetya attack Greenberg (2018), which caused millions of dollars in damage to industrial sites, ZT principles could have prevented the spread of malware by limiting lateral movement between systems. In addition, ZT can improve Remote Access Security (RAS) by enforcing strict authentication and access control policies Colombo et al. (2021); Chimakurthi (2020). ZT can help protect against supply chain attacks by limiting third-party vendors’ access to critical systems and data. It can also help protect against IoT based at- January 19, 2024" 2401.09584v1,"Exploring Lead Free Mixed Halide Double Perovskites Solar Cell Md Yekra Rahman*, Dr. Sharif Mohammad Mominuzzaman Department of Electrical & Electronic Engineering Bangladesh University of Engineering and Technology, Dhaka, Bangladesh *Corresponding Author Email: yekrarahman@gmail.com Abstract—The significant surge in energy use and escalating environmental concerns have sparked worldwide interest towards the study and implementation of solar cell technology. Perovskite solar cells (PSCs) have garnered remarkable attention as an emerging third-generation solar cell technology. This paper presents an in-depth analysis of lead-free mixed halide double perovskites in the context of their potential uses in solar cell technology. Through the previous studies of various mixed halide double perovskite materials as potential absorber layer materials, it has been observed that Cs 2 TiI 6-x Br x possesses promising characteristics. In this study, simulations were conducted using SCAPS-1D software to explore all possible combinations for x= 0 to 6. The materials for the Hole Transport Layer (HTL) and Electron Transport Layer (ETL) and absorber layer, along with their optimal thicknesses, are selected to yield the most promising results in terms of open-circuit voltage (V oc ), short-circuit current density (J sc ), fill factor (FF), and power conversion efficiency. A novel tolerance factor is employed to assess structural stability of perovskites. FTO/Cu 2 O/Cs 2 TiI 5 Br 1 /WS 2 emerges as the best combination in terms of the efficiency with 19.03% but FTO/Cu 2 O/Cs 2 TiI 2 Br 4 /WS 2 shows good stability with 13.31% efficiency. Keywords—Perovskite Solar Cell, SCAPS-1D, Hole Transport Layer, Electron Transport Layer, Stability I. I NTRODUCTION Over the decade, solar cells made from materials like CdTe, CIGS, GaInP, and CZTS were outperformed by a new kind of solar cell called Perovskite Solar Cells (PSCs) [1]. These PSCs are made from inorganic-organic halide ABX 3 type structure. It also possess several impressive and distinct photoelectric properties, such as a high absorption coefficient, long carrier diffusion length, high carrier mobility, low recombination rate, and tunable band gaps through chemical modification. [2]. In the past few years, the efficiency in hybrid halide organicinorganic perovskite solar cells, specifically CH 3 NH 3 PbI 3 (MAPbI 3 ), has improved quickly, rising from 3.8% in 2009 [3] to 26.1% in 2023 [4]. Despite the rapid increase in the efficiency, there are still a few major challenges hindering the widespread adoption of this technology. One issue is the intrinsic and extrinsic instability of the organic components, and another significant concern is the toxicity of lead. To address these issues, allinorganic cesium halide perovskites are being explored as alternatives [5]. In these, cesium Cs + is used to replace MA + or FA + in the A-site of the perovskite structure. These are more stable thermodynamically and less prone to moisture absorption. Research by Yang et al. indicates that the hightemperature phase of CsPbBr 3 shows greater thermodynamic stability, as well as intrinsic and extrinsic stability [6]. To make perovskites more stable and lead-free on the B site, A 2 B I B III X 6 structures have been introduced. Building on this strategy, researchers have successfully synthesized several halide double perovskites, such as Cs 2 AgInCl 6 [7] and Cs 2 AgSbCl 6 [8]. But these new perovskites have excessively large band gaps. This makes them unsuitable for use in single-junction solar cells. Meanwhile, Woodward et. al have developed the first halide double perovskite Cs 2 AgBiBr 6 which has large band gap and resistance to air and water exposure [9]. After that, the mutation of B 2+ ions in double perovskites has been achieved by incorporationg tetravalent cations resulting in ”vacancyordered” double perovskites with the general formula A 2 BX 6 . Chen et al. successfully synthesized Cs 2 TiBr 6 , with experimental results showing that it possesses a stable bandgap of 1.8eV [5]. The thin-film perovskite solar cells based on Cs 2 TiBr 6 have demonstrated a consistent efficiency of up to 3.3% [10]. Qui et al. conducted a detailed analysis of the band gaps, spectral characteristics, and formation energies of Cs 2 Ti(Br 1-x Y x ) 6 (where Y represents Cl and I; and x varies from 0 to 1 in increments of 0.25) by utilizing firstprinciples methods based on Density Functional Theory (DFT) calculations [11]. Despite these developments, the challenge of identifying the most effective ionic substitutions for enhanced efficiency and stability remains. To forecast the stability of the perovskite structure based on the chemical formula ABX 3 Goldschmidt tolerance factor (t) has been used. t = √ r A + r X 2(r B + r X ) (1) where ionic radii, r i , of each ion (i = A, B, X). For stable perovskite, 0.825 < t < 1.059 But It has only 74% accuracy for 576 experimentally collected ABX 3 type materials [12]. To improve accuracy, a new tolerance factor is introduced by Bartel et al. r τ = A r X − n A (n A − r B r A ) r B ln( r B ) (2) where n A is the oxidation state. For stable perovskite, τ < 4.18 and the accuracy is 92% for the same database [12]." 2401.09591v1,"Bringing Social Computing to Secondary School Classrooms Kianna Bolante Kevin Chen kbolan@cs.washington.edu University of Washington Seattle, Washington, USA kc@cs.washington.edu Cleveland STEM High School Seattle, Washington, USA Quan Ze Chen Amy Zhang cqz@cs.washington.edu University of Washington Seattle, Washington, USA ABSTRACT Social computing is the study of how technology shapes human social interactions. This topic has become increasingly relevant to secondary school students (ages 11–18) as more of young people’s everyday social experiences take place online, particularly with the continuing effects of the COVID-19 pandemic. However, social computing topics are rarely touched upon in existing middle and high school curricula. We seek to introduce concepts from social computing to secondary school students so they can understand how computing has wide-ranging social implications that touch upon their everyday lives, as well as think critically about both the positive and negative sides of different social technology designs. In this report, we present a series of six lessons combining presentations and hands-on activities covering topics within social computing and detail our experience teaching these lessons to approximately 1,405 students across 13 middle and high schools in our local school district. We developed lessons covering how social computing relates to the topics of Data Management, Encrypted Messaging, Human-Computer Interaction Careers, Machine Learning and Bias, Misinformation, and Online Behavior. We found that 81.13% of students expressed greater interest in the content of our lessons compared to their interest in STEM overall. We also found from pre- and post-lesson comprehension questions that 63.65% learned new concepts from the main activity. We release all lesson materials on a website for public use. From our experience, we observed that students were engaged in these topics and found enjoyment in finding connections between computing and their own lives. CCS CONCEPTS • Human-centered computing → Collaborative and social computing theory, concepts and paradigms. KEYWORDS Social Computing Education, K-12 Education, Lesson Design This work is licensed under a Creative Commons Attribution International 4.0 License. SIGCSE 2024, March 20–23, 2024, Portland, OR, USA © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0423-9/24/03. https://doi.org/10.1145/3626252.3630795 axz@cs.uw.edu University of Washington Seattle, Washington, USA ACM Reference Format: Kianna Bolante, Kevin Chen, Quan Ze Chen, and Amy Zhang. 2024. Bringing Social Computing to Secondary School Classrooms. In Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1 (SIGCSE 2024), March 20–23, 2024, Portland, OR, USA. ACM, New York, NY, USA, 7 pages. https://doi.org/10.1145/3626252.3630795 1 INTRODUCTION In today’s rapidly evolving digital world along with the impact that COVID-19 has had on technology use, social computing platforms have become an integral part of the lives of young individuals [4]. It profoundly influences how they communicate, learn, and interact with the world around them. The pervasiveness of social media, online communities, and virtual spaces has not only transformed the way information is disseminated but has also presented unique challenges and opportunities for society at large. As the younger generation navigates this dynamic technological space, there is a growing imperative to equip them with the necessary skills, critical thinking abilities, and ethical foundations to engage responsibly and constructively in social computing environments. The evolution of social computing has not only revolutionized how teens today use social technology to communicate but also seek information, collaborate on projects, and explore their interests in digital spaces. As such, educators should consider adapting their pedagogical approaches to accommodate this relevant topic to connect students to the broader social implications of computing and guide them through the potential pitfalls of social computing such as misinformation, cyberbullying, and privacy breaches. This research paper delves into the critical intersection of education and social computing for secondary-level students (ages 11–18), aiming to create sustainable teaching resources that can foster a community of socially responsible and aware individuals online. To assess the effectiveness of our resources, we used pre- and postsurveys following Bloom’s Taxonomy, a hierarchical model applied to assess comprehension levels of educational objectives through a variety of methods [12]. Through a comprehensive review of prior and related work, lesson development, and reflective school visits, this research paper seeks to spark conversation on the implementation of social computing education for K–12 students. In doing so, we aim to enable a generation of informed digital citizens to effectively shape the ever-evolving landscape of social computing." 2401.09592v1,"Suppression of metal-to-insulator transition and stabilization of superconductivity by pressure in Re 3 Ge 7 S. Huyan 1,2 , E. Mun 3 , H. Wang 4 , T. J. Slade 1,2 , Z. Li 1,2 , J. Schmidt 1,2 , R. A. Ribeiro 1,2 , W. Xie 4 , S. L. Bud’ko 1,2 , P. C. Canfield 1,2 1 2 Ames National Laboratory, US DOE, Iowa State University, Ames, Iowa 50011, USA Department of Physics and Astronomy, Iowa State University, Ames, Iowa 50011, USA 3 Department of Physics, Simon Fraser University, Burnaby, BC V5A 1S6, Canada 4 Department of Chemistry, Michigan State University, East Lansing, MI 48824, USA e-mail address: shuyan@iastate.edu canfield@ameslab.gov The effect of pressure on the low-temperature states of the Re 3 Ge 7 is investigated by both electrical and Hall resistance and magnetization measurements. At ambient pressure, the temperature dependent resistance of Re 3 Ge 7 behaves quasi-linearly from room temperature down to 60 K, then undergoes a two-step metal-toinsulator transitions (MIT) at temperatures T 1 = 59.4 K and T 2 = 58.7 K which may be related to a structural phase transition or occurrence of charge density wave ordering. Upon applying pressure, the two-step (T 1 , T 2 ) MIT splits into three steps (T 1 , T 2 and T 3 ) above 1 GPa, and all traces of MITs are fully suppressed by ~8 GPa. Subsequently, the onset of bulk superconductivity (SC) occurs between 10.8 and 12.2 GPa and persists to our highest pressure of 26.8 GPa. At 12.2 GPa the superconducting transition temperature, T c , and upper critical field, H c2 reach the maximum of T c (onset) ~5.9 K and H c2 (1.8 K) ~ 14 kOe. Our results not only present the observation of SC under high pressure in Re 3 Ge 7 but also delineate the interplay between SC and other competing electronic states by creating a T - p phase diagram for this potentially topologically nontrivial system Re 3 Ge 7 . INTRODUCTION Superconductivity (SC) frequently arises in a proximity to competing phase transitions, wherein the competing phase is sufficiently suppressed, allowing the emergence of the superconducting state. These competing phases may include antiferromagnetic (AFM) transitions [1-3] and charge density wave (CDW) transitions [4], sometimes accompanied by a transition from a metallic to a nonmetallic electron state [5,6]. The conventional SC, characterized by an effective attractive interaction between electrons mediated through electron-phonon coupling, follows a similar pattern. The SC state can be induced by suppressing these competing states by adjusting parameters such as chemical substitution [7] and external pressure [8]. Understanding the interplay between these competing phases and superconductivity not only provides insight into the pairing mechanism of superconductivity, but also offers a viable method for investigating new superconductors. Re 3 Ge 7 is a material predicted to be a topological semimetal with a high symmetry point [9]. Recently, Rabus and Mun [10] grew single crystals and reported that Re 3 Ge 7 undergoes a metal-to-insulator transition (MIT) at approximately 58 K. One report of temperature-dependent X-ray diffraction measurements show what appears to be an abrupt decrease of all of the unit cell parameters (and volume) upon cooling through the MIT temperature [11]. In contrast, in another report on polycrystalline samples, no clear abrupt change in lattice parameters and volume through MIT temperature was observed [12]. In addition, superconductivity was reported in Re 3 Ge 7-x Ga x polycrystalline samples in which the Ga substitution completely suppressed the MIT and induced a superconducting dome [12]. Unfortunately, the Ga substitution simultaneously acted as hole doping, anisotropically changed the size of the unit cell parameters, decreased the unit cell volume and induced disorder. In order to systematically investigate the evolution of Re 3 Ge 7 from a low temperature insulator to a low temperature superconductor we studied the physical properties of singlecrystalline Re 3 Ge 7 samples under high pressure. Here we report a comprehensive high-pressure investigation on single crystals of Re 3 Ge 7 , which included electrical transport and magnetization measurements. Our findings indicate that the MIT features are suppressed monotonically by pressures up to 8 GPa. Around 2.4 GPa, the first trace of superconductivity was detected and between 10.8 and 12.2 GPa, bulk superconductivity is detected by both electrical resistance and magnetization measurements. In addition to the above general picture, we observed, at low temperature, a clear sign-change in Hall coefficient (R H ) at 2.4 GPa. Based on the aforementioned observations, a T-p phase diagram is constructed, which highlights the emergence of SC in the pressure range associated with the complete suppression of the higher temperature MIT. 1" 2401.09605v1,"Charting a Path to E�icient Onboarding: The Role of So�ware Visualization Fernando Padoan CESAR School Recife, PE, Brazil fop@cesar.school Ronnie de Souza Santos University of Calgary Calgary, AB, Canada ronnie.desouzasantos@ucalgary.com ABSTRACT Background. Within the software industry, it is commonly estimated that software professionals invest a substantial portion of their work hours in the process of understanding existing systems. In this context, an ine�ective technical onboarding process, which introduces newcomers to software under development, can result in a prolonged period for them to absorb the necessary knowledge required to become productive in their roles. Goal. The present study aims to explore the familiarity of managers, leaders, and developers with software visualization tools and how these tools are employed to facilitate the technical onboarding of new team members. Method. To address the research problem, we built upon the insights gained through the literature and embraced a sequential exploratory approach. This approach incorporated quantitative and qualitative analyses of data collected from practitioners using questionnaires and semi-structured interviews. Findings. Our �ndings demonstrate a gap between the concept of software visualization and the practical use of onboarding tools and techniques. Overall, practitioners do not systematically incorporate software visualization tools into their technical onboarding processes due to a lack of conceptual understanding and awareness of their potential bene�ts. Conclusion. The software industry could bene�t from standardized and evolving onboarding models, improved by incorporating software visualization techniques and tools to support program comprehension of newcomers in the software projects. KEYWORDS software visualization, technical onboarding, program comprehension ACM Reference Format: Fernando Padoan, Ronnie de Souza Santos, and Rodrigo Pessoa Medeiros. 2024. Charting a Path to E�cient Onboarding: The Role of Software Visualization. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION In the software industry, technical onboarding is the process of integrating newly hired or transitioning software professionals into software development teams [2, 5]. This process is focused on equipping these individuals with the essential skills, knowledge, tools, and work�ows used in software projects. For software engineers, including developers and programmers, a successful technical onboarding experience is crucial to support them in program comprehension and enable them to swiftly become productive and Conference’17, July 2017, Washington, DC, USA 2024. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn Rodrigo Pessoa Medeiros Instituto Federal da Paraíba Cabedelo, PB, Brazil rodrigo.medeiros@ifpb.edu.br collaborative team members, thereby enhancing their e�ectiveness in contributing to software development projects [30, 31]. Comprehending code and the associated software system requirements are pivotal aspects of software development. It is worth noting that developers dedicate a signi�cant portion of their time to reviewing and troubleshooting existing code [39]. In this context, various factors, including outdated documentation, overly complex code, a growing number of features, tight project timelines, and alterations in team composition, can prolong the duration required for new team members to achieve their maximum potential. This challenging situation, in turn, may prompt them to leave their teams due to low satisfaction [33]. Recent research highlights the knowledge management challenges faced by software engineering organizations. These challenges are rooted in the necessity to maintain access to knowledge originating from the conceptual and construction phases of software development, even in the face of team adjustments, such as when team members depart from the project. In other words, it is essential to preserve and manage the knowledge generated during their participation in the project [4, 41]. In general, the processes of technical onboarding and knowledge management can bene�t signi�cantly from the use of appropriate tools [12, 34]. This includes the integration of software visualization tools [34], which encompass various methods and techniques for representing and conveying information about algorithms, software programs, and project data [17]. Such tools are particularly e�ective in enhancing program comprehension during the technical onboarding phase within development teams [34, 40]. In this study, we have two primary objectives: 1) To evaluate the familiarity of software project managers, technical leaders, and software developers with the concept of software visualization, and 2) To investigate the practical implementation of tools incorporating these concepts during the technical onboarding of new team members. In this context, we aim to address the following overarching research question: RQ. How do software professionals navigate technical onboarding and the utilization of software visualization tools within the software industry? To narrow our research focus, we have formulated the following speci�c inquiries: RQ1. How familiar are software professionals with software visualization tools? RQ2. How frequently do software companies incorporate software visualization tools into their technical onboarding processes? RQ3. How do software professionals assess the e�ectiveness of software visualization tools in improving their comprehension of source code during the onboarding process?" 2401.09608v1,"Hidden Populations in So�ware Engineering: Challenges, Lessons Learned, and Opportunities Ronnie de Souza Santos University of Calgary Calgary, AB, Canada ronnie.desouzasantos@ucalgary.ca ABSTRACT The growing emphasis on studying equity, diversity, and inclusion within software engineering has ampli�ed the need to explore hidden populations within this �eld. Exploring hidden populations becomes important to obtain invaluable insights into the experiences, challenges, and perspectives of underrepresented groups in software engineering and, therefore, devise strategies to make the software industry more diverse. However, studying these hidden populations presents multifaceted challenges, including the complexities associated with identifying and engaging participants due to their marginalized status. In this paper, we discuss our experiences and lessons learned while conducting multiple studies involving hidden populations in software engineering. We emphasize the importance of recognizing and addressing these challenges within the software engineering research community to foster a more inclusive and comprehensive understanding of diverse populations of software professionals. KEYWORDS empirical software engineering, diversity and inclusion, hidden populations ACM Reference Format: Ronnie de Souza Santos and Kiev Gama. 2024. Hidden Populations in Software Engineering: Challenges, Lessons Learned, and Opportunities. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 6 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Sampling is de�ned as selecting a subset (or sample) of individuals from a larger population to collect data and make inferences about that population [25]. In the context of Software Engineering, sampling focuses on selecting speci�c individuals—such as software engineers—from a larger pool of professionals to gain insights into the collective workforce. This strategy allows us to concentrate on a group of professionals to research their behaviors, practices, and experiences within the software development process [4, 15]. Thus, when sampling software professionals, it is crucial to select a subset that authentically mirrors the diverse array of backgrounds, skills, and experiences existing within the software industry. From its methodological roots, the sampling process must allow statistical generalizations to the broader population (positivist research) and allow analytical generalization to theories or transferability to other contexts (constructivist research) [4, 10, 15]. In theory, this means that the conclusions derived from a sample of Conference’17, July 2017, Washington, DC, USA 2024. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn Kiev Gama Universidade Federal de Pernambuco Recife, PE, Brazil kiev@cin.ufpe.br software professionals should allow researchers, practitioners, and stakeholders to derive knowledge about the speci�c aspects investigated within that sample, such as software development practices. Hence, an e�ective sampling method should provide insights about the sampled individuals and allow for meaningful extrapolation of the data to a wider software engineering domain [25, 40]. In practical terms, sampling for generalization can be challenging, particularly in certain software engineering contexts. Previous research has highlighted the scarcity of random sampling in empirical software engineering (ESE) studies due to the lack of available reliable sampling frames (e.g., population lists) [2, 4]. This challenge becomes more apparent in ongoing research on diversity in software engineering, as conventional sampling methods may not always be feasible when studying certain underrepresented groups of software professionals. The study of underrepresented groups in software engineering brings forward the concept of hidden populations. Hidden populations refer to groups or individuals within a larger population that is challenging to identify, access, or study due to their secretive, marginalized, or elusive nature [1, 22]. Common examples in broader literature include homeless individuals, people with stigmatized medical conditions, those who have faced violence and trauma, and several other marginalized groups in our society [27, 36, 43]. Based on this de�nition, certain groups of software professionals can be classi�ed as hidden populations, including female software professionals facing harassment in male-majority teams, LGBTQIA+ individuals in software engineering, indigenous software professionals, and other minority groups working in the �eld. Considering the broad challenges in sampling—such as nonrepresentative samples, inadequate sample sizes, and sampling bias—as well as speci�c software engineering issues—such as generalizing from students to software professionals or from open-source to closed-source projects—studying hidden populations in software engineering poses additional challenges [4]. Primarily, challenges emerge from identifying participants from some underrepresented groups for research and reporting �ndings derived from small sample sizes (either in a constructivist or positivist approach). In this sense, this study delves into these issues as we share insights from our experience investigating hidden populations of software professionals. From this introduction, our paper is organized as follows. Section 2 explores studies involving hidden populations in software engineering. In Section 3, we outline experiences in researching hidden populations, presenting faced challenges, discussing lessons learned, and introducing opportunities within this context. Lastly, Section 4 is focused on our general conclusions." 2401.09622v1,"IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 SMOOTHIE: A Theory of Hyper-parameter Optimization for Software Analytics Rahul Yedida, Tim Menzies, Fellow, IEEE Abstract—Hyper-parameter optimization is the black art of tuning a learner’s control parameters. In software analytics, a repeated result is that such tuning can result in dramatic performance improvements. Despite this, hyper-parameter optimization is often applied rarely or poorly in software analytics– perhaps due to the CPU cost of exploring all those parameter options can be prohibitive. We theorize that learners generalize better when the loss landscape is “smooth”. This theory is useful since the influence on “smoothness” of different hyper-parameter choices can be tested very quickly (e.g. for a deep learner, after just one epoch). To test this theory, this paper implements and tests SMOOTHIE, a novel hyper-parameter optimizer that guides its optimizations via considerations of “smothness”. The experiments of this paper test SMOOTHIE on numerous SE tasks including (a) GitHub issue lifetime prediction; (b) detecting false alarms in static code warnings; (c) defect prediction, and (d) a set of standard ML datasets. In all these experiments, SMOOTHIE out-performed state-of-the-art optimizers. Better yet, SMOOTHIE ran 300% faster than the prior state-of-the art. We hence conclude that this theory (that hyper-parameter optimization is best viewed as a “smoothing” function for the decision landscape), is both theoretically interesting and practically very useful. To support open science and other researchers working in this area, all our scripts and datasets are available on-line at https://github.com/yrahul3910/smoothness-hpo/. Index Terms—software analytics, smoothness, hyper-parameter optimization ✦ 1 I NTRODUCTION Modern software systems can get very complex. This is especially true for the learners using in software analytics which are controlled by a dauntingly large number of hyperparameters. For example, deep learners come with a very large number of control parameters including how to set their topology and activation functions. Configuring complex learners requires an understanding of the impact of each configuration parameter. When that expertise is missing, configuration options are underutilized [49]. This is especially true for learner hyperparameters. While studying industrial text-mining tools, we have found many examples of poorly-chosen hyperparameters (which meant our industrial partners were selling less-than-optimal products) [30]. Hyper-parameter optimizers are algorithms that design better learning algorithms by exploring the myriad of configuration choices for their hyper-parameters. As discussed below, these algorithms are not in common use. So, as a tactic for increasing their usage, we propose (a) simplifying their design; then (b) showing that this simpler design results in “better” HPO tools (where “better” means “runs faster” and “makes better predictions”). This paper shows that those two goals are quite achievable. While working on software analytics and hyper-parameter optimizations [53], one of us (Yedida) noticed a pattern in changes to the loss functions before and after hyper-parameter optimization. Loss functions are the evaluating metric for a machine learner (and the better the learner, the lower the loss). Figure 1 left and right shows that: • R. Yedida and T. Menzies are with the Department of Computer Science, North Carolina State University, Raleigh, USA. E-mail: ryedida@ncsu.edu, timm@ieee.org After optimization, the loss function gets “smoother’ (i.e. on average, fewer changes in any local region). Based on that observation, we theorized that: Hyper-parameter optimization is best viewed as a “smoothing” function for the decision landscape. This theory predicts that the greater the smoothing, the better the hyper-parameter optimization. This paper tests that theory. The algorithm we call SMOOTHIE is an experiment on whether or not increasing smoothness could be used to guide hyper-parameter optimization (HPO). As shown in this paper, SMOOTHIE can assess hyper-parameter options without needing to run a learner to completion. For example, for neural networks that learn over 100 epochs, SMOOTHIE can assess hyperparameter options within the first epoch. That is, SMOOTHIE can focus on good configurations by very quickly rejecting bad configurations using a fraction of the CPU cost of conventional hyper-parameter optimizers. Fig. 1: Left & right shows loss landscape before & after HPO. The loss function be visualized as the z dimension of domain data mapped into two PCA components x, y . In this figure, red indicates regions with highest mean squared error." 2401.09623v1,"Unified Momentum Model for Rotor Aerodynamics Across Operating Regimes Jaime Liew, 1 Kirby S. Heck, 1 Michael F. Howland 1∗ 1 Civil and Environmental Engineering, Massachusetts Institute of Technology, ∗ To whom correspondence should be addressed; E-mail: mhowland@mit.edu. Despite substantial growth in wind energy technology in recent decades, aerody- namic modeling of wind turbines relies on momentum models derived in the late 19th and early 20th centuries, which are well-known to break down under flow regimes in which wind turbines often operate. This gap in theoretical modeling for rotors that are misaligned with the inflow and also for high-thrust rotors has resulted in the development of numerous empirical corrections which are widely applied in textbooks, research articles, and open-source and industry de- sign codes. This work reports a unified momentum model to efficiently predict power production, thrust force, and wake dynamics of rotors under arbitrary inflow angles and thrust coefficients without empirical corrections. This unified momentum model can form a new basis for wind turbine modeling, design, and control tools from first-principles and may enable further development of innovations necessary for increased wind production and reliability to respond to 21st century climate change challenges. To meet mid-century global net-zero carbon emissions targets, wind energy capacity is estimated to require between a 9- and 11-fold increase (1, 2). Within the U.S. alone, as much 1" 2401.09641v1,"Functional Linear Non-Gaussian Acyclic Model for Causal Discovery Functional Linear Non-Gaussian Acyclic Model for Causal Discovery Tian-Le Yang yangtianle1996@gmail.com Graduate School of Engineering Science Osaka University 1-3, Machikaneyama, Toyonaka, Osaka, Japan Kuang-Yao Lee kuang-yao.lee@temple.edu Department of Statistics, Operations, and Data Science Temple University Philadelphia, PA 19122 United States Kun Zhang kunz1@cmu.edu Machine Learning Department Carnegie Mellon University & Mohamed bin Zayed University of Artificial Intelligence Pittsburgh, PA 15213, USA & Masdar city, Abu Dhabi, United Arab Emirates Joe Suzuki prof.joe.suzuki@gmail.com Graduate School of Engineering Science Osaka University 1-3, Machikaneyama, Toyonaka, Osaka, Japan Abstract In causal discovery, non-Gaussianity has been used to characterize the complete configuration of a Linear Non-Gaussian Acyclic Model (LiNGAM), encompassing both the causal ordering of variables and their respective connection strengths. However, LiNGAM can only deal with the finite-dimensional case. To expand this concept, we extend the notion of variables to encompass vectors and even functions, leading to the Functional Linear Non- Gaussian Acyclic Model (Func-LiNGAM). Our motivation stems from the desire to identify causal relationships in brain-effective connectivity tasks involving, for example, fMRI and EEG datasets. We demonstrate why the original LiNGAM fails to handle these inherently infinite-dimensional datasets and explain the availability of functional data analysis from both empirical and theoretical perspectives. We establish theoretical guarantees of the identifiability of the causal relationship among non-Gaussian random vectors and even random functions in infinite-dimensional Hilbert spaces. To address the issue of sparsity in discrete time points within intrinsic infinite-dimensional functional data, we propose optimizing the coordinates of the vectors using functional principal component analysis. Experimental results on synthetic data verify the ability of the proposed framework to identify causal relationships among multivariate functions using the observed samples. For real data, we focus on analyzing the brain connectivity patterns derived from fMRI data. Keywords: LiNGAM, Causal Discovery, Functional Data, Darmois-Skitovich Theorem, Non-Gaussian, Gaussian Process 1 Introduction Numerous empirical sciences strive to uncover and comprehend causal mechanisms that underlie a wide range of natural phenomena and human social behavior. Causal discovery 1" 2401.09681v1,"Harnessing Density Ratios for Online Reinforcement Learning Philip Amortila ∗ Dylan J. Foster Nan Jiang philipa4@illinois.edu dylanfoster@microsoft.com nanjiang@illinois.edu Ayush Sekhari Tengyang Xie sekhari@mit.edu tengyangxie@microsoft.com Abstract The theories of offline and online reinforcement learning, despite having evolved in parallel, have begun to show signs of the possibility for a unification, with algorithms and analysis techniques for one setting often having natural counterparts in the other. However, the notion of density ratio modeling, an emerging paradigm in offline RL, has been largely absent from online RL, perhaps for good reason: the very existence and boundedness of density ratios relies on access to an exploratory dataset with good coverage, but the core challenge in online RL is to collect such a dataset without having one to start. In this work we show—perhaps surprisingly—that density ratio-based algorithms have online counterparts. Assuming only the existence of an exploratory distribution with good coverage, a structural condition known as coverability (Xie et al., 2023), we give a new algorithm (Glow) that uses density ratio realizability and value function realizability to perform sample-efficient online exploration. Glow addresses unbounded density ratios via careful use of truncation, and combines this with optimism to guide exploration. Glow is computationally inefficient; we complement it with a more efficient counterpart, HyGlow, for the Hybrid RL setting (Song et al., 2023) wherein online RL is augmented with additional offline data. HyGlow is derived as a special case of a more general meta-algorithm that provides a provable black-box reduction from hybrid RL to offline RL, which may be of independent interest. 1 Introduction A fundamental problem in reinforcement learning (RL) is to understand what modeling assumptions and algorithmic principles lead to sample-efficient learning guarantees. Investigation into algorithms for sampleefficient reinforcement learning has primarily focused on two separate formulations: Offline reinforcement learning, where a learner must optimize a policy from logged transitions and rewards, and online reinforcement learning, where the learner can gather new data by interacting with the environment; both formulations share the common goal of learning a near-optimal policy. For the most part, the bodies of research on offline and online reinforcement have evolved in parallel, but they exhibit a number of curious similarities. Algorithmically, many design principles for offline RL (e.g., pessimism) have online counterparts (e.g., optimism), and statistically efficient algorithms for both frameworks typically require similar representation conditions (e.g., ability to model state-action value functions). Yet, the frameworks have notable differences: online RL algorithms require exploration conditions to address the issue of distribution shift (Russo and Van Roy, 2013; Jiang et al., 2017; Sun et al., 2019; Wang et al., 2020c; Du et al., 2021; Jin et al., 2021a; Foster et al., 2021), while offline RL algorithms require conceptually distinct coverage conditions to ensure the data logging distribution sufficiently covers the state space (Munos, 2003; Antos et al., 2008; Chen and Jiang, 2019; Xie and Jiang, 2020, 2021; Jin et al., 2021b; Rashidinejad et al., 2021; Foster et al., 2022; Zhan et al., 2022). Recently, Xie et al. (2023) exposed a deeper connection between online and offline RL by showing that coverability—that is, existence of a data distribution with good coverage for offline RL—is itself a sufficient condition that enables sample-efficient exploration in online RL, even when the learner has no prior knowledge of said distribution. This suggests the possibility of a theoretical unification of online and offline RL, but the ∗ Authors listed in alphabetical order. 1" 2401.09687v1,"Preprint Multi-faceted Methodology for Coastal Vegetation Drag Coefficient Calibration: Implications for Wave Height Attenuation Erfan A m ini 1 , R eza M arsooli 1* , M ehdi N eshat 2 1. Department of Civil, Environmental, and Ocean Engineering, Stevens Institute of Technology, Hoboken, New Jersey, USA 2. Faculty of Engineering and Information Technology, University of Technology Sydney, Ultimo, NSW, Australia A bstract The accurate prediction of wave height attenuation due to vegetation is crucial for designing effective and efficient natural and nature-based solutions for flood mitigation, shoreline protection, and coastal ecosystem preservation. Central to these predictions is the estimation of the vegetation drag coefficient. The present study undertakes a comprehensive evaluation of three distinct methodologies for estimating the drag coefficient: traditional manual calibration, calibration using a novel application of state-of-the-art metaheuristic optimization algorithms, and the integration of an established empirical bulk drag coefficient formula (Tanino and Nepf, 2008) into the XBeach non-hydrostatic wave model. These methodologies were tested using a series of existing laboratory experiments involving nearshore vegetation on a sloping beach. A key innovation of the study is the first application of metaheuristic optimization algorithms for calibrating the drag coefficient, which enables efficient automated searches to identify optimal values aligning with measurements. We found that the optimization algorithms rapidly converge to precise drag coefficients, enhancing accuracy and overcoming limitations in manual calibration which can be laborious and inconsistent. While the integrated empirical formula also demonstrates reasonable performance, the optimization approach exemplifies the potential of computational techniques to transform traditional practices of model calibration. Comparing these strategies provides a framework to determine the most effective methodology based on constraints in determining the vegetation drag coefficient. K eyw ords Wave Height Attenuation, Nearshore Vegetation, Vegetation Drag Coefficient Calibration, Metaheuristic Optimization, XBeach non-hydrostatic * Corresponding author. E-mail address: rmarsool@stevens.edu 1" 2401.09694v1,"SUBMITTED FOR PUBLICATION, JANUARY 2024. 1 A Multi-Area Architecture for Real-Time Feedback-Based Optimization of Distribution Grids Ilyas Farhat, Student Member, IEEE, Etinosa Ekomwenrenren, Student Member, IEEE, John W. Simpson-Porco Senior Member, IEEE Evangelos Farantatos, Senior Member, IEEE, Mahendra Patel, Fellow, IEEE, Aboutaleb Haddadi, Senior Member, IEEE, Abstract—A challenge in transmission-distribution coordina- Coordinated control of Distributed Energy Resources (DERs) tion is how to quickly and reliably coordinate Distributed Energy — including battery/thermal storage, distributed generation, Resources (DERs) across large multi-stakeholder Distribution flexible load, and electric vehicles — is one of the most Networks (DNs) to support the Transmission Network (TN), while ensuring operational constraints continue to be met within promising solutions to address these challenges. Indeed, DERs the DN. Here we propose a hierarchical feedback-based control (or aggregations thereof) offer unique advantages for fast architecture for coordination of DERs in DNs, enabling the DN to regulation services, including: low capital costs, integration quickly respond to power set-point requests from the Transmission within existing load centers, and (depending on the resource) System Operator (TSO) while maintaining local DN constraints. fast response to commands [2]. As DERs are primarily Our scheme allows for multiple independently-managed areas within the DN to optimize their local resources while coordinating distribution-connected [3], and are owned and operated by a to support the TN, and while maintaining data privacy; the only variety of stakeholders, harnessing their full collective flexibility required inter-area communication is between physically adjacent for emergency and ancillary services to the bulk grid requires areas within the DN control hierarchy. We conduct a rigorous further advances in TN–DN coordination [2], [3]. In particular, stability analysis, establishing intuitive conditions for closed-loop there is a need for a hierarchical framework that enables safe stability, and provide detailed tuning recommendations. The proposal is validated via case studies on multiple feeders, including and fast coordination of DERs and DER aggregates behind IEEE-123 and IEEE-8500, using a custom MATLAB ® -based the substation, while respecting operational boundaries and application which integrates with OpenDSS © . The simulation stakeholder privacy. results show that the proposed structure is highly scalable and can Literature Review: For the goal of providing fast ancillary quickly coordinate DERs in response to TSO commands, while services to the bulk grid, a candidate control architecture responding to local disturbances within the DN and maintaining for large-scale real-time DER coordination should meet the DN operational limits. Index Terms—Distribution network resources, decentralized control, smart grid, next generation control, distributed energy resources control, multi-area control, DERs coordination in distribution networks I. I NTRODUCTION T He grid is currently transitioning from being primarily powered by fossil-fuel generators with substantial rotating inertia to a more environmentally-friendly grid predominantly powered by renewable inverter-based resources (IBRs) with decoupled rotational dynamics. This evolution introduces added complexity to the operational strategies essential for the reliable management of the bulk grid. Increased IBR penetration leads to issues such as large and more frequent frequency and voltage excursions; for example, research by the California ISO (CAISO) underscores that the uncertainties and variability from these IBRs will require faster and more flexible regulation services to maintain system reliability [1]. Ilyas Farhat and Etinosa Ekomwenrenren are with the Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON N3L 3G1, Canada (e-mail: ilyas.farhat@uwaterloo.ca; etinosa.ekomwenrenren@uwaterloo.ca). Evangelos Farantatos, Mahendra Patel, and Aboutaleb Haddadi are with the Electric Power Research Institute, Palo Alto, CA 94304 USA (e-mail: efarantatos@epri.com; mpatel@epri.com; ahaddadi@epri.com). John W. Simpson-Porco is with the Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON M5S 3G4, Canada (email:jwsimpson@ece.utoronto.ca). following performance and practicality requirements: (i) the framework must coordinate resources optimally on a time-scale of seconds or faster 1 , (ii) the design should not depend on detailed system and component models, (iii) the framework should preferentially use local models, measurements, and communication, with flexibility on the amount of measurement feedback available 2 , and (iv) operational boundaries behind the substation should be maintained, as should the privacy of stakeholders, by minimizing the need for sharing of models and data. We next provide an overview of some recently proposed coordination methodologies, evaluating them against these criteria. In the pursuit of efficient DER coordination for providing fast ancillary services, centralized optimization techniques have been a subject of extensive study. Centralized feeder control approaches have been based on Linear Programming (LP) and Second-Order Cone Programming (SOCP) for Distribution Optimal Power Flow (DOPF) [7], Linearized DOPF [8], Model Predictive Control (MPC) [9] and feedback-based optimization [10]. While centralized optimization techniques can in principle 1 This requirement is strongly motivated by the authors’ recent work on fast frequency and voltage regulation using transmission-connected inverter-based resources [4]–[6]; fast DER coordination will be required for any TN-DN coordination scheme to emulate the control performance of an equivalent transmission-connected resource. 2 Critically, given that current data acquisition and communication infrastructures at the distribution level are under development, and may be costprohibitive to deploy extensively [2]." 2401.09695v1,"Should ChatGPT Write Your Breakup Text? Exploring the Role of AI in Relationship Dissolution YUE FU, Information School, University of Washington, US YIXIN CHEN, Information School, University of Washington, US ZELIA GOMES DA COSTA LAI, Human-Centered Design and Engineering, University of Washington, US ALEXIS HINIKER, Information School, University of Washington, US Relationships are essential to our happiness and wellbeing. The dissolution of a relationship, the final stage of relationship’s lifecycle and one of the most stressful events in an individual’s life, can have profound and long-lasting impacts on people. With the breakup process increasingly facilitated by computer-mediated communication (CMC), and the likely future influence of AI-mediated communication (AIMC) tools, we conducted a semi-structured interview study with 21 participants. We aim to understand: 1) the current role of technology in the breakup process, 2) the needs and support individuals have during the process, and 3) how AI might address these needs. Our research shows that people have distinct needs at various stages of ending a relationship. Presently, technology is used for information gathering and community support, acting as a catalyst for breakups, enabling ghosting and blocking, and facilitating communication. Participants anticipate that AI could aid in sense-making of their relationship leading up to the breakup, act as a mediator, assist in crafting appropriate wording, tones, and language during breakup conversations, and support companionship, reflection, recovery, and growth after a breakup. Our findings also demonstrate an overlap between the breakup process and the Transtheoretical Model (TTM) of behavior change. Through the lens of TTM, we explore the potential support and affordances AI could offer in breakups, including its benefits and the necessary precautions regarding AI’s role in this sensitive process. CCS Concepts: • Human-centered computing ! Empirical studies in HCI. Additional Key Words and Phrases: Computer-Mediated Communication, AI-Mediated Communication, interviews, 1 INTRODUCTION Close relationships are essential to people’s well-being [10]. Relationship dissolution, the final phase of a relationship’s life cycle, can have profound and long-lasting effects on the people in the relationship and their future connections with others [36]. As one of the most stressful events in an individual’s life [18], relationship dissolution is often associated with negative emotions [45], reduced self-esteem [19, 50] and worsened psychological well-being [36]. However, strategically navigating this stage can lead people to greater personal growth [70], alleviate the stress associated with the dissolving relationship [59], and prepare themselves for their future relationships [70]. Relationship dissolution is usually navigated through direct and indirect interpersonal communication. The advent of Computer-Mediated Communication (CMC) and other online communication tools, such as messaging apps and social media, have transformed these interactions [51, 75]. And the affordances of these tools, such as Facebook’s “relationship status”, ”unfriending”, and restricting profile access setting [52], significantly influence how users communicate and perceive sensitive messages about changes in romantic relationships and friendships [38, 53]. A 2015 Pew Research report shows that 27% teenagers have broken up with some one by texting, 29% by phone calls, and 16% by social media features (changing relationship status, messaging, posting updates) [39]. Moreover, a significant number of individuals turn to the internet for advice on ending romantic relationships; the collaborative information-sharing platform Authors’ addresses: Yue Fu, chrisfu@uw.edu, Information School, University of Washington, Seattle, Washington, US; Yixin Chen, Information School, University of Washington, Seattle, Washington, US, ; Zelia Gomes da Costa Lai, Human-Centered Design and Engineering, University of Washington, Seattle, Washington, US, ; Alexis Hiniker, Information School, University of Washington, Seattle, Washington, US, . 1" 2401.09698v1,"> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Photonic RF Channelization Based on Microcombs Weiwei Han, Zhihui Liu, Mengxi Tan, Chaoran Huang, Jiayang Wu, Kun Xu, David J. Moss, and Xingyuan Xu IDEBAND microwave signal receivers are used in a wide variety of modern electronic warfare systems, deep space tracking and telecommunications applications. Channelized reception refers to dividing the spectrum of the target signal, especially in the radio frequency (RF), microwave and millimeter wave bands, into different subchannels to achieve synchronous reception [1], [2], [3], [4], [5], [6], [7]. In general, the receiver’s bandwidth, sensitivity, spectral resolution, and real-time processing speed are more demanding for complex signals with multiple formats, wide spectrums, and overlapping time domains in the electromagnetic environment. Initially, in the early days, the RF signal was demodulated by a superheterodyne receiver, but was suffered from image frequency interference [8]. Subsequently, channelized receivers based on electrical filter banks were proposed to channelize the signal in the frequency domain. While this technique has its advantages, receiving high-frequency broadband signals often involves multi-stage frequency conversion, massive filters, mixers and local oscillators (LOs) that can introduce electromagnetic interference. Although high-frequency electronic devices have been developed, they are ultimately limited by analog-to-digital / digital-to-analog converters (ADCs/DACs), resulting in a receiver operation bandwidth of only a few GHz, which is insufficient for modern requirements. In contrast, microwave photonic channelized receivers map the wideband signal onto the optical domain, and then divide it into multiple narrowband subchannels for parallel reception and processing, thus breaking through traditional electronic bottleneck limitations to achieve operating bandwidths from 1 to 10’s of gigahertz. Benefiting from a high dynamic range, low power consumption, reconfigurability, and immunity to electromagnetic interference, photonic-assisted channelization has experienced unprecedented growth over the past two decades. Initially, channel division for microwave photonic channelized receivers was achieved using surface acoustic wave (SAW) phased array diffraction [9], fiber Bragg gratings, and Fabry-Perot (FP) etalons. To reduce the system volume, it was proposed to integrate two Bragg gratings with a FP etalon [10]. Alternatively, optical frequency combs (OFCs) have emerged as attractive multi-wavelength Los that can greatly increased the available number of channels. Generally, fourwave mixing (FWM) or time lens techniques [ref] in optical fiber can be exploited for spectral broadening to create an optical frequency comb [11], [12], after which the RF signal can be broadcast onto each comb line, immediately followed by channel segmentation by periodic optical filters. From this, dual coherent optical combs were demonstrated [13], where one serves to multicast RF signals and the other acts as a LO, after which both are fed into the in-phase/quadrature (I/Q) coherent demodulator simultaneously. Spectral slicing can be performed using the vernier effect arising from a slight difference in the frequency spacing of two combs, eliminating the need for optical filters. Clearly, the stability and accuracy of the filter are not specified, which reduces the complexity of the system. In recent years, wavelength scanning has been achieved by M anuscript received XXX X, XXXX; revised XXX X, XXXX; accepted XXX X, XXXX. Date of publication XXX X, XXXX; date of current version XXX X, XXXX. Corresponding author: Kun Xu, Xingyuan Xu. W. Han, Z. Liu, X. Xu, K. Xu are with the State Key Laboratory of Information of Photonics and Optical Communications, School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China (e-mail: hanww@bupt.edu.cn; zhihuiliu@bupt.edu.cn; xingyuanxu@bupt.edu.cn; xukun@bupt.edu.cn). M. Tan is with School of Electronic and Information Engineering, Beihang University, Beijing 100191, China (e-mail: simtan@buaa.edu.cn). C. Huang is with Department of Electronic Engineering, The Chinese University of Hong Kong, Hong Kong, China (email: crhuang@ee.cuhk.edu.hk) J. Wu, D. J. Moss is with Optical Sciences Centre, Swinburne University of Technology, Hawthorn, VIC 3122, Australia (e-mail: dmoss@swin.edu.au). Color versions of one or more of the figures in this letter are available online at http://ieeexplore.ieee.org. Digital Object Identifier XXXXXXXXXXXXXXXXX Abstract— In recent decades, microwave photonic channelization techniques have developed significantly. Characterized by low loss, high versatility, large instantaneous bandwidth, and immunity to electromagnetic interference, microwave photonic channelization addresses the requirements of modern radar and electronic warfare for receivers. Microresonator-based optical frequency combs are promising devices for photonic channelized receivers, enabling full advantage of multicarriers, large bandwidths, and accelerating the integration process of microwave photonic channelized receivers. In this paper, we review the research progress and trends in microwave photonic channelization, focusing on schemes that utilize integrated microcombs. We discuss the potential of microcomb-based RF channelization, as well as their challenges and limitations, and provide perspectives for their future development in the context of on-chip silicon-based photonics. Index Terms— Optical microcombs, RF channelization, microwave photonic. W I. I NTRODUCTION 1" 2401.09713v1,"New type of solutions for the critical Lane-Emden system Wenjing Chen ∗† and Xiaomeng Huang School of Mathematics and Statistics, Southwest University, Chongqing, 400715, P.R. China Abstract In this paper, we consider the critical Lane-Emden system  p N   −∆u = K 1 (y)v , y ∈ R , q N −∆v = K 2 (y)u , y ∈ R ,   u, v > 0, 1 1 where N ≥ 5, p, q ∈ (1, ∞) with p+1 + q+1 = N N −2 , K 1 (y) and K 2 (y) are positive radial potentials. Under suitable conditions on K 1 (y) and K 2 (y), we construct a new family of solutions to this system, which are centred at points lying on the top and the bottom circles of a cylinder. Keywords: critical Lane-Emden systems; Lyapunov-Schmidt reduction; infinitely many solutions. 2020 Mathematics Subject Classification: 35B33, 35B40, 35J47. 1 Introduction and statement of main result In this work, we consider the following critical Lane-Emden system  p N   −∆u = K 1 (y)v , y ∈ R , −∆v = K 2 (y)u q , y ∈ R N ,   u, v > 0, (1.1) where N ≥ 5, K 1 (y) and K 2 (y) are positive radial potentials, p, q ∈ (1, ∞) and (p, q) is a pair of positive numbers lying on the critical hyperbola 1 N − 2 1 + = . p +1 q +1 N (1.2) N +2 In this paper, without loss of generality, we may assume that p ≤ N −2 ≤ q. When u = v and K 1 (y) = K 2 (y) = K(y), system (1.1) is reduced to the following scalar equation N+2 −∆u = K(y)u N−2 , u > 0, y ∈ R N , u ∈ D 1,2 (R N ), (1.3) which can be transformed by the prescribed scalar curvature problem on S N through the stereo-graphic projection. There are many works revelent to (1.3), see [4, 10, 22, 24, 31] and reference therein. Wei ∗ † Corresponding author. E-mail address: wjchen@swu.edu.cn (W. Chen), hhuangxiaomeng@126.com (X. Huang). 1" 2401.09714v1,"ROBUST VIRTUAL ELEMENT METHODS FOR COUPLED STRESS-ASSISTED DIFFUSION PROBLEMS ∗ REKHA KHOT † , ANDRÉS E. RUBIANO ‡ , AND RICARDO RUIZ-BAIER § Abstract. This paper aims first to perform robust continuous analysis of a mixed nonlinear formulation for stressassisted diffusion of a solute that interacts with an elastic material, and second to propose and analyse a virtual element formulation of the model problem. The two-way coupling mechanisms between the Herrmann formulation for linear elasticity and the reaction-diffusion equation (written in mixed form) consist of diffusion-induced active stress and stress-dependent diffusion. The two sub-problems are analysed using the extended Babuška–Brezzi–Braess theory for perturbed saddle-point problems. The well-posedness of the nonlinearly coupled system is established using a Banach fixed-point strategy under the smallness assumption on data. The virtual element formulations for the uncoupled sub-problems are proven uniquely solvable by a fixed-point argument in conjunction with appropriate projection operators. We derive the a priori error estimates, and test the accuracy and performance of the proposed method through computational simulations. Key words. Virtual element methods, stress-assisted diffusion, diffusion-induced stress, perturbed saddle-point problems, fixed-point operators. AMS subject classifications. 65N30, 65N12, 65N15, 74F25. 1. Introduction. The process of diffusion within solid matter can result in the creation of mechanical stresses within the solid material, commonly referred to as chemical or diffusion-induced stresses. This phenomenon highlights a reciprocal relationship between chemical and mechanical driving forces, both of which play a key role in either facilitating or hindering the diffusion process. Stress-assisted diffusion for common materials has been introduced as a general formalism in [35, 34]. Important examples include Lithium-ion battery cells, silicon rubber and hydrogen diffusion, polymer-based coatings, semiconductor fabrication, oxidation of silicon nanostructures, and enhancing of conductivity properties in soft living tissue. In these processes, heterogeneity (and possibly also anisotropy) of stress localisation affects the patterns of diffusion. Our contribution addresses one of the simplest models for such an interaction, incorporating stress-dependency directly in the diffusion coefficient for a given solute, and assuming that in the absence of stress one recovers Fickian diffusion (see, e.g., [11, 37]). We consider the regime of linear elastostatics and assume that the total Cauchy stress is also due to a (possibly nonlinear) diffusion-induced isotropic stress. On the other hand, the diffusion coefficient in the reaction-diffusion equation governing the distribution of a solute is taken as a nonlinear function of the Cauchy stress. The well-posedness of primal formulations of the coupled problem has been studied in, e.g., [25, 26]. Some of the materials mentioned above are nearly incompressible, which is why we opt for a mixed formulation of the elastostatics in terms of displacement and Herrmann pressure [6, 21], which allows us to have stability robustly with respect to the Lamé parameter λ that goes to infinity when the Poisson ration approaches 2 1 . Robustness with respect to the Lamé parameter µ can be obtained from appropriate scaling of the inf-sup condition for the divergence operator, as done in, e.g., [22, 31]. Robustness with respect to the Lamé parameters is also required for the reaction-diffusion sub-problem, which is a priori not trivial since the diffusion coefficient depends on the Cauchy stress and in turn on the Lamé coefficients. Similarly to the diffusion-assisted elasticity, the stress-assisted reaction-diffusion problem is written as a perturbed saddle-point problem, and robustness is sought also with respect to the uniform bounds of the stress-assisted diffusion and of the reaction parameter. We therefore work with parameter-weighted norms and use the perturbed saddle-point theory from [7, 8]. The continuous analysis is then adequately adapted to the discrete case, here using virtual element methods (VEMs). There has been quite a few works on the mixed finite element methods for the stress-assisted diffusion problems, see e.g., [15, 16, 17, 18, 19]. The standard finite element methods (FEM) are well-adapted for many realistic models, but from the past decade, polygonal methods are fast emerging due to their capabilities for mesh flexibility and a common framework for higher-degrees and for higher-dimensions. The VEM ∗ Updated: January 19, 2024. Funding: This work has been partially supported by the Australian Research Council through the Future Fellowship grant FT220100496 and Discovery Project grant DP22010316. † School of Mathematics, Monash University, 9 Rainforest Walk, Melbourne, VIC 3800, Australia. Present address: Inria 75012, Paris, France (rekha.khot@inria.fr). ‡ School of Mathematics, Monash University, 9 Rainforest Walk, Melbourne, VIC 3800, Australia (Andres.RubianoMartinez@monash.edu). § School of Mathematics, Monash University, 9 Rainforest Walk, Melbourne, VIC 3800, Australia; and Universidad Adventista de Chile, Casilla 7-D, Chillán, Chile (Ricardo.RuizBaier@monash.edu). 1" 2401.09716v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 HCVP: Leveraging Hierarchical Contrastive Visual Prompt for Domain Generalization Guanglin Zhou , Zhongyi Han , Shiming Chen , Biwei Huang, Liming Zhu, Tongliang Liu , Senior Member, IEEE, Lina Yao , Senior Member, IEEE, Kun Zhang Abstract—Domain Generalization (DG) endeavors to create machine learning models that excel in unseen scenarios by learning invariant features. In DG, the prevalent practice of constraining models to a fixed structure or uniform parameterization to encapsulate invariant features can inadvertently blend specific aspects. Such an approach struggles with nuanced differentiation of inter-domain variations and may exhibit bias towards certain domains, hindering the precise learning of domain-invariant features. Recognizing this, we introduce a novel method designed to supplement the model with domainlevel and task-specific characteristics. This approach aims to guide the model in more effectively separating invariant features from specific characteristics, thereby boosting the generalization. Building on the emerging trend of visual prompts in the DG paradigm, our work introduces the novel Hierarchical Contrastive Visual Prompt (HCVP) methodology. This represents a significant advancement in the field, setting itself apart with a unique generative approach to prompts, alongside an explicit model structure and specialized loss functions. Differing from traditional visual prompts that are often shared across entire datasets, HCVP utilizes a hierarchical prompt generation network enhanced by prompt contrastive learning. These generative prompts are instance-dependent, catering to the unique characteristics inherent to different domains and tasks. Additionally, we devise a prompt modulation network that serves as a bridge, effectively incorporating the generated visual prompts into the vision transformer backbone. Experiments conducted on five DG datasets demonstrate the effectiveness of HCVP, outperforming both established DG algorithms and adaptation protocols. Index Terms—Domain Generalization, Visual Prompt, Contrastive Learning I. I NTRODUCTION Despite the remarkable successes of machine learning models, particularly deep neural networks (DNNs), in various areas, they often exhibit unexpected failures when the test data distribution deviates from the training data [1]–[3]. For instance, adversarial inputs can lead to misclassifications [4], performance on digit recognition may deteriorate under rotations [5], and DNNs trained to recognize pneumonia may fail Guanglin Zhou is with the University of New South Wales. Email: guanglin.zhou@unsw.edu.au Zhongyi Han and Shiming Chen are with Carnegie Mellon University and Mohamed bin Zayed University of Artificial Intelligence. Email: hanzhongyicn@gmail.com, gchenshiming@gmail.com Biwei Huang is with University of California, San Diego. Email: bih007@ucsd.edu Liming Zhu is with CSIRO’s Data61. Email: liming.zhu@data61.csiro.au Tongliang Liu is with the University of Sydney and Mohamed bin Zayed University of Artificial Intelligence. Email: tongliang.liu@sydney.edu.au Lina Yao is with CSIRO’s Data61, the University of New South Wales and Macquarie University. Email: lina.yao@unsw.edu.au Kun Zhang is with Carnegie Mellon University and Mohamed bin Zayed University of Artificial Intelligence. Email: kunz1@cmu.edu. Images (a) Conventional DG methods Patch Emb Blending domain specific features: Thick grey skin ViT Backbone Classify on unseen domain (b) Our HCVP Images Leveraging domain invariant features: Large ears and a long nose Patch Emb Domain Prompt ViT Backbone Task Prompt Classify on unseen domain Fig. 1. Motivation illustration. (a) Traditional DG methods, employing universal parameters across the entire dataset, often struggle to distinguish between invariant shape attributes (e.g., large ears, long nose) and domain-specific texture attributes (e.g., thick grey skin). This difficulty leads to a blending of features, thereby diminishing the model’s capacity for generalization. (b) Our approach introduces hierarchical visual prompts that encapsulate domain-level and task-specific characteristics, enabling the model to better differentiate and understand both invariant and specific attributes, thereby contributing to more effective generalization across different domains. when applied to scans from new hospitals [6]. Addressing this, domain generalization (DG) seeks to create robust models that can effectively adapt and perform on unseen, yet related, domains by leveraging invariant features learned across multiple source domains [1], [2]. Domain generalization has traditionally relied on techniques such as data manipulation and representation learning [1], [2], giving rise to classic DG algorithms [7]–[12]. Despite these efforts, several large-scale empirical studies [13], [14] have highlighted limited performance improvements in current DG algorithms. Alongside these traditional methods, recent advancements in visual foundation models [15], such as vision transformer (ViT) backbone [16], have been leveraged for DG tasks [17], [18]. Their ability to capture a broad spectrum of diverse features has opened up new avenues for effective DG. Several tuning protocols have been proposed to adapt these foundation models to downstream tasks [19], [19]–[23]. The fundamental objective in DG lies in effectively discerning and leveraging domain-invariant features from specific characteristics. Nevertheless, the challenge lies in accomplishing this separation within a unified modeling framework without extra, tailored information. The inherent complexity of handling diverse and often subtle differences between domains necessitates additional context beyond what a single model can provide. This lack of specificity leads to a DG approach that unintentionally blends domain-specific aspects, making it challenging to differentiate nuanced inter-domain variations" 2401.09735v1,"Evaluation of the performance of a CdZnTe-based soft γ-ray detector for CubeSat payloads. Kees de Kuijper 1 , Rishank Diwan 1 , Partha Sarathi Pal 1,3* , Andreas Ritter 1 , Pablo M. Saz Parkinson 2 , Andy C. T. Kong 1 , Quentin A. Parker 1 1* Laboratory for Space Research, Faculty of Science,, The University of Hong Kong, 405B, Block A, Cyberport 4, 100 Cyberport Road, Hong Kong, China. 2 Santa Cruz Institute for Particle Physics and Department of Physics, University of California, Street, Santa Cruz, 95064, CA, USA. 3 Institute of Astronomy Space and Earth Science, P 177, CIT Road, Scheme 7M, Kolkata, 700054, West Bengal, India. *Corresponding author(s). E-mail(s): parthasarathi.pal@gmail.com; Contributing authors: kdkuijper@gmail.com; rishank.phy.iitkgp@gmail.com; Abstract The low-energy γ-ray (0.1-30 MeV) sky has been relatively unexplored since the decommissioning of the COMPTEL instrument on the Compton Gamma-Ray Observatory (CGRO) satellite in 2000. However, the study of this part of the energy spectrum (the “MeV gap”) is crucial for addressing numerous unresolved questions in high-energy and multi-messenger astrophysics. Although several large MeV γ-ray missions like AMEGO and e-ASTROGAM are being proposed, they are predominantly in the developmental phase, with launches not anticipated until the next decade at the earliest. In recent times, there has been a surge in proposed CubeSat missions as cost-effective and rapidly implementable “pathfinder” alternatives. A MeV CubeSat dedicated to γ-ray astronomy has the potential to serve as a demonstrator for future, larger-scale MeV payloads. This paper presents a γ-ray payload design featuring a CdZnTe crystal calorimeter module developed by IDEAS. We report the detailed results of simulations to assess the performance of this proposed payload and compare it with those of previous γ-ray instruments. 1" 2401.09736v1,"1 Measuring the Discrepancy between 3D Geometric Models using Directional Distance Fields Siyu Ren, Junhui Hou, Senior Member, IEEE, Xiaodong Chen, Hongkai, Xiong, Senior Member, IEEE, and Wenping Wang, Fellow, IEEE Abstract—Qualifying the discrepancy between 3D geometric models, which could be represented with either point clouds or triangle meshes, is a pivotal issue with board applications. Existing methods mainly focus on directly establishing the correspondence between two models and then aggregating point-wise distance between corresponding points, resulting in them being either inefficient or ineffective. In this paper, we propose DirDist, an efficient, effective, robust, and differentiable distance metric for 3D geometry data. Specifically, we construct DirDist based on the proposed implicit representation of 3D models, namely directional distance field (DDF), which defines the directional distances of 3D points to a model to capture its local surface geometry. We then transfer the discrepancy between two 3D geometric models as the discrepancy between their DDFs defined on an identical domain, naturally establishing model correspondence. To demonstrate the advantage of our DirDist, we explore various distance metric-driven 3D geometric modeling tasks, including template surface fitting, rigid registration, non-rigid registration, scene flow estimation and human pose optimization. Extensive experiments show that our DirDist achieves significantly higher accuracy under all tasks. As a generic distance metric, DirDist has the potential to advance the field of 3D geometric modeling. The source code is available at https://github.com/rsy6318/DirDist. Index Terms—3D point clouds, 3D mesh, distance metric, geometric modeling, shape registration, scene flow estimation I. I NTRODUCTION T HREE-dimensional (3D) geometric models, which could be represented with either 3D point clouds or triangle meshes, have found extensive applications in various fields, including computer vision/graphics and robotics. Quantifying the discrepancy between 3D geometry data is critical in these applications. For instance, in tasks such as self-supervised surface registration [1]–[4], reconstruction [5]–[8], generation [9], [10], and scene flow estimation [11]–[13], a typical distance metric needs to be employed to drive the optimization/learning process. Unlike 2D images, where the discrepancy between them (e.g., one being the ground-truth/reference and the other This work was supported by the Hong Kong Research Grants Council under Grant 11202320, Grant 11219422, and Grant 11218121. S. Ren and J. Hou are with the Department of Computer Science, City University of Hong Kong, Hong Kong SAR. Email: siyuren2-c@my.cityu.edu.hk, jh.hou@cityu.edu.hk X. Chen is with the the School of Precision Instruments and Opto- Electronic Engineering, Tianjin University, Tianjin 300072, China (e-mail: xdchen@tju.edu.cn) Hongkai Xiong is with the Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, China (e-mail: xionghongkai@sjtu.edu.cn) W. Wang is with the Department of Computer Science & Engineering, Texas A& M University, USA. Email: wenping@tamu.edu. (a) EMD (b) CD (c) P2F (d) Ours Fig. 1: Visual illustration of different distance metrics for 3D geometry data. For convenience, we use 2D illustration. The yellow points in (a), (b), and (c) refer to 3D points located on 3D surfaces indicated by curves, and the brown points in (d) represent the generated reference points. The blue arrows represent the established correspondence. The color in (d) changes from green to red indicating the distance fields of the two surfaces indicated by curves (i.e., the set of the distances of arbitrary points in 3D space to the surfaces). one reconstructed through a typical task) can be easily computed pixel-by-pixel, owing to the canonical pixel coordinate system, quantifying the discrepancy between two 3D geometric models is non-trivial. This is primarily because of their unstructured nature, where data are irregularly distributed, and the correspondence information is unknown. Existing distance metrics for 3D geometry data predominantly fall into two main categories, point-to-point (P2P) and point-to-face (P2F) distances. In the P2P category, two representative and commonly employed metrics are Earth Mover’s Distance (EMD) [14] and Chamfer Distance (CD) [15], as illustrated in Fig. 1a and 1b, respectively. These metrics generally establish point-to-point correspondences between two point clouds 1 and subsequently compute the aggregation of the point-wise distances between corresponding points. However, these metrics suffer from limitations as they operate on sampled points, disregarding the continuity of the surfaces, which renders them ineffective. Additionally, the correspondence establishment process can be time-consuming, such as the 1 Directly measuring the discrepancy between two continuous 3D surfaces presents challenges. When dealing with continuous 3D surfaces, such as triangle meshes, a typical sampling method is often applied to sample a set of points on the surface for computation." 2401.09745v1,"Impact of Limited Statistics on the Measured Hyper-Order Cumulants of Net-Proton Distributions in Heavy-Ion Collisions Lizhu Chen, 1, 2, ∗ Ye-Yin Zhao, 3 Yunshan Cheng, 4, † Gang Wang, 4 Zhiming Li, 2 and Yuanfang Wu 2 1 School of Physics and Optoelectronic Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China 2 Key Laboratory of Quark and Lepton Physics (MOE) and Institute of Particle Physics, Central China Normal University, Wuhan 430079, China 3 School of Physics and Electronic Engineering, Sichuan University of Science and Engineering (SUSE), Zigong 643000, China 4 Department of Physics and Astronomy, University of California, Los Angeles, California 90095, USA Hyper-order cumulants C 5 /C 1 and C 6 /C 2 of net-baryon distributions are anticipated to offer crucial insights into the phase transition from quark-gluon plasma to hadronic matter in heavyion collisions. However, the accuracy of C 5 and C 6 is highly contingent on the fine shape of the distribution’s tail, the detectable range of which could be essentially truncated by low statistics. In this paper, we use the fast Skellam-based simulations, as well as the Ultrarelativistic Quantum Molecular Dynamics model, to assess the impact of limited statistics on the measurements of C 5 /C 1 and C 6 /C 2 of net-proton distributions at lower RHIC energies. Both ratios decrease from the unity baseline as we reduce statistics, and could even turn negative without a pertinent physics mechanism. By incorporating statistics akin to experimental data, we can replicate the net-proton C 5 /C 1 and √ C 6 /C 2 values comparable to the corresponding measurements for Au+Au collisions at s N N = 7.7, 11.5 and 14.5 GeV. Our findings underscore a caveat to the interpretation of the observed beam energy dependence of hyper-order cumulants. PACS numbers: 25.75.-q, 12.38.Mh, 25.75.Gz I. INTRODUCTION Cumulants, especially those of higher order, for conserved quantities in relativistic heavy-ion collisions, are crucial observables to probe the phase structure of Quantum Chromodynamics (QCD) [1]. Conventionally, the cumulants are expressed as C 1 = ⟨N ⟩, C 2 = ⟨(δN ) 2 ⟩, C 3 = ⟨(δN ) 3 ⟩, C 4 = ⟨(δN ) 4 ⟩ − 3⟨(δN ) 2 ⟩ 2 , C 5 = ⟨(δN ) 5 ⟩ − 10⟨(δN ) 2 ⟩⟨(δN ) 3 ⟩, C 6 = ⟨(δN ) 6 ⟩ + 30⟨(δN ) 2 ⟩ 3 −15⟨(δN ) 2 ⟩⟨(δN ) 4 ⟩ − 10⟨(δN ) 3 ⟩ 2 , (1) (2) (3) (4) (5) (6) where δN = N − ⟨N ⟩, N is the number of particles in one event, and the average is taken over all events. In practice, cumulant ratios such as C 2 /C 1 , C 3 /C 2 , C 4 /C 2 , C 5 /C 1 , and C 6 /C 2 are employed to mitigate the trivial volume dependence [2]. A Skellam distribution, defined as the difference between two independent Poisson distributions, is typically utilized as a statistical baseline [3, 4], which is unity for C 4 /C 2 , C 5 /C 1 , and C 6 /C 2 . Net-baryon C 5 /C 1 and C 6 /C 2 are of great interest as lattice QCD calculations [5] show that both of them are negative at low baryon chemical potential (µ B ) near a ∗ Electronic address: chenlz@nuist.edu.cn † Electronic address: yunshancheng@physics.ucla.edu pseudo-critical temperature, and become more negative as µ B increases. Additionally, the QCD-assisted lowenergy effective theory and the QCD-based models, such as the Polyakov loop extended quark-meson model and the Nambu-Jona-Lasinio model, indicate that these two ratios are also sensitive to the chiral crossover transition [6–10]. In experiments, neutrons are usually undetectable, and net-proton number (∆N p ) is measured as a proxy for net-baryon number [11]. The STAR Collaboration has reported the beam energy and collision centrality dependence of net-proton C 5 /C 1 and C 6 /C 2 √ in Au+Au collisions at center-of-mass energies ( s N N ) from 3 to 200 GeV [12, 13]. Except at 3 GeV, the measured C 6 /C 2 values for 0–40% centrality collisions display a progressively negative trend with decreasing energy, resembling the aforementioned lattice QCD calculations. Conversely, C 5 /C 1 for 0–40% centrality collisions from 7.7 to 200 GeV exhibits a weak beam energy dependence and fluctuates about zero. Before connecting the measured C 5 /C 1 and C 6 /C 2 to lattice QCD calculations, however, it is vital to eliminate contributions unrelated to the phase transition. For instance, the hadron resonance gas model can also produce √ negative net-baryon C 6 /C 2 values at s N N ≲ 40 GeV by integrating global baryon-number conservation [14]. Similar negative behaviors in C 6 /C 2 are also noted in the sub-ensemble acceptance method [15–17] and hydrodynamics calculations [18], encompassing global conservation, system non-uniformity, and momentum space acceptance. Moreover, it is imperative to consider other mechanisms, including initial volume fluctuations [19– 21], as well as distinctions between net-proton and netbaryon cumulants [22–24]." 2401.09768v1,"Quantum interface for telecom frequency conversion based on diamond-type atomic ensembles Po-Han Tseng 1 , Ling-Chun Chen 1,2 , Jiun-Shiuan Shiu 1,2 , and Yong-Fan Chen 1,2∗ 1 2 Department of Physics, National Cheng Kung University, Tainan 70101, Taiwan Center for Quantum Frontiers of Research & Technology, Tainan 70101, Taiwan (Dated: January 18, 2024) In a fiber-based quantum network, utilizing the telecom band is crucial for long-distance quantum information (QI) transmission between quantum nodes. However, the near-infrared wavelength is identified as optimal for processing and storing QI through alkaline atoms. Efficiently bridging the frequency gap between atomic quantum devices and telecom fibers while maintaining QI carried by photons is a challenge addressed by quantum frequency conversion (QFC) as a pivotal quantum interface. This study explores a telecom-band QFC mechanism using diamond-type four-wave mixing (FWM) with rubidium energy levels. The mechanism converts photons between the near-infrared wavelength of 795 nm and the telecom band of 1367 or 1529 nm. Applying the Heisenberg-Langevin approach, we optimize conversion efficiency (CE) across varying optical depths while considering quantum noises and present corresponding experimental parameters. Unlike previous works neglecting the applied field absorption loss, our results are more relevant to practical scenarios. Moreover, by employing the reduced-density-operator theory, we demonstrate that this diamond-type FWM scheme maintains quantum characteristics with high fidelity, unaffected by vacuum field noise, enabling high-purity QFC. Another significant contribution lies in examining how this scheme impacts QI encoded in photon-number, path, and polarization degrees of freedom. These encoded qubits exhibit remarkable entanglement retention under sufficiently high CE. In the case of perfect CE, the scheme can achieve unity fidelity. This comprehensive exploration provides theoretical support for the application of the diamond-type QFC scheme based on atomic ensembles in quantum networks, laying the essential groundwork for advancing the scheme in distributed quantum computing and long-distance quantum communication. I. INTRODUCTION Quantum networks play a crucial role in enabling distributed quantum computing and quantum communication [1–5]. In a quantum network, quantum information (QI) undergoes processing [6–12] and storage [13–19] within individual quantum nodes. These nodes interconnect through quantum channels, ensuring the transport of quantum states with high fidelity and facilitating entanglement distribution across the network [20–23]. However, quantum devices may operate at distinct optical frequencies, which might not align with the frequency range of fiber-optic communications [24], causing significant QI loss over long-distance transmission. Quantum frequency conversion (QFC) serves as a solution to manipulate the optical frequency of photons while preserving QI with high fidelity [25]. Implementing a telecom-band QFC scheme becomes crucial to enable devices operating at non-communication frequencies to exchange QI through optical fibers with minimal loss and maximum fidelity [26–32]. QFC undergoes validation across various platforms and is typically implemented through one of three approaches: utilizing a χ (2) nonlinear crystal, a χ (3) nonlinear crystal, or a χ (3) atomic ensemble. In the first approach, a χ (2) nonlinear crystal is employed, with the system typically operating far from resonance, resulting ∗ yfchen@mail.ncku.edu.tw in negligible spontaneous emission loss. However, this method necessitates a strong pumping laser to ensure sufficient atom-field interactions, leading to the occurrence of noise pollution [33, 34], thereby diminishing the fidelity of the converted field. While weak pumping power requirements can be met using a cavity [35–39] or a waveguide [40–44], effectively suppressing noise pollution remains a challenging task. In the second method of employing a χ (3) nonlinear crystal, the system remains far from resonance. However, to suppress the influence of the undesired symmetric-conversion channel [45], the symmetry between the channels must be broken. Feasible solutions, such as crystal fibers [46–48] or microresonators [49–51], introduce additional insertion photon loss, consequently reducing the overall efficiency of the conversion system. The third approach of utilizing a χ (3) atomic ensemble involves lower pumping power requirements compared to other platforms, as the system operates under a near-resonant condition. This condition ensures negligible pump-induced noise pollution [52]. Although the atom-field interactions within the undesired conversion channel are negligibly weak, allowing for its exclusion from consideration, the near-resonant condition also results in spontaneous emission loss, consequently reducing the conversion efficiency (CE). The introduction of electromagnetically induced transparency (EIT) [53–57] efficiently suppresses disturbances from the vacuum field reservoir, leading to a reduction in spontaneous emission loss [58–61]. Furthermore, EIT significantly enhances the nonlinear interaction between atoms and photons, enabling the system to achieve efficient QFC [62, 63]." 2401.09772v1,"PREPRINT VERSION 1 Robotic Test Tube Rearrangement Using Combined Reinforcement Learning and Motion Planning Hao Chen 1 , Weiwei Wan 1∗ , Masaki Matsushita 2 , Takeyuki Kotaka 2 and Kensuke Harada 1,3 Abstract—A combined task-level reinforcement learning and motion planning framework is proposed in this paper to address a multi-class in-rack test tube rearrangement problem. At the task level, the framework uses reinforcement learning to infer a sequence of swap actions while ignoring robotic motion details. At the motion level, the framework accepts the swapping action sequences inferred by task-level agents and plans the detailed robotic pick-and-place motion. The task and motion-level planning form a closed loop with the help of a condition set maintained for each rack slot, which allows the framework to perform replanning and effectively find solutions in the presence of low-level failures. Particularly for reinforcement learning, the framework leverages a distributed deep Q-learning structure with the Dueling Double Deep Q Network (D3QN) to acquire near-optimal policies and uses an A ⋆ -based postprocessing technique to amplify the collected training data. The D3QN and distributed learning help increase training efficiency. The post-processing helps complete unfinished action sequences and remove redundancy, thus making the training data more effective. We carry out both simulations and real-world studies to understand the performance of the proposed framework. The results verify the performance of the RL and post-processing and show that the closed-loop combination improves robustness. The framework is ready to incorporate various sensory feedback. The real-world studies also demonstrated the incorporation. Index Terms—Manipulation Planning, Deep Reinforcement Learning, Combined Task and Motion Planning I. I NTRODUCTION R EARRANGEMENT planning is an active and challenging research area in robotics that typically involves finding a sequence of motion to rearrange objects from an initial configuration to a goal configuration. In this paper, we focus on a multi-class in-rack test tube rearrangement, which requests rearranging various test tubes randomly placed within a rack into a specified pattern. The problem is challenging due to constraints such as intricate mutual blockage among the tubes, difficulty in carrying out replanning in the presence of motion planning and execution failures, etc. Additionally, the complexity of the rearrangement procedure can escalate, leading to an increased number of required motions, extended time, higher energy consumption, and susceptibility to disruptions that compromise overall success. Given these challenges, we propose a combined task-level reinforcement learning and motion planning framework to address the multi-class inrack test tube rearrangement problem. At the task level, the framework leverages a Dueling Double Deep Q Network 1 Graduate School of Engineering Science, Osaka University, Japan. 2 H.U. Group Research Institute G.K., Japan. 3 National Inst. of AIST, Japan. Contact: Weiwei Wan, wan@hlab.sys.es.osaka-u.ac.jp (D3QN) [1][2] and distributed Q-learning [3] to acquire nearoptimal policies for inferring action sequences while ignoring robotic motion details. At the motion level, the framework accepts the inferred task-level sequences and plans the robotic pick-and-place motion in the robot configuration space for implementing the sequence. The task-level RL inference and the motion-level planning are combined in a closed loop by maintaining a condition set for each rack slot. Previously, many researchers utilized combined task and motion planners to solve rearrangement planning problems. The task-level planner usually employed heuristic search (e.g., A ⋆ [4] or Monte Carlo Tree Search (MCTS) [5]) to plan feasible action sequences. The heuristic methods are ineffective as most rearrangement problems are NP-hard [5]. As the type and number of objects increase, heuristics become limited in scope and require significant computation [4][6]. Recent advances in reinforcement learning (RL) provide an alternative approach for task planning, which enables autonomous exploration of rearrangement sequences through iterative trial-and-error. By learning and continuously improving a policy from experience, RL agents can overcome the limited planning scope of heuristics. The trained models also have higher inference efficiency compared to heuristic methods. However, the sample complexity of RL may grow quadratically with the learning horizon [7]. This makes its application to rearrangement problems challenging, as such problems require long-term iteration and may cause RL agents to demand substantially large amounts of interactions and computational resources for convergence [8]. Taking into account both the strengths and weaknesses, we use RL as the task-level planner in our framework, and at the same time, we develop an A ⋆ -based post-processing technique to amplify the collected training data. The post-processing enhances the effectiveness of the generated training data by completing unfinished action sequences and eliminating redundancy, thereby improving training performance. The motion planners usually ran subsequently after the task planner in the previous studies. They were designed to accept task sequences and plan the detailed robotic pick-andplace motion in the robot configuration space. When motion planning fails, previous studies employed a simple closed-loop strategy to replan between task and motion levels. They invalidated the primary action and selected a secondary feasible action for exploration [9]. While effective in certain situations, the method faces challenges in environments with intricate dependencies and large action space. The reason is that actions are closely tied to states. As the state changes, similar actions may arise and cause replanning, leading to significant time consumption and even infinity. To address the challenges, we" 2401.09775v1,"Controllable Decontextualization of Yes/No Question and Answers into Factual Statements Lingbo Mo 1⋆ , Besnik Fetahu 2 , Oleg Rokhlenko 2 , and Shervin Malmasi 2 1 The Ohio State University, Ohio, USA mo.169@buckeyemail.osu.edu 2 Amazon.com, Inc. Seattle, WA, USA {besnikf,olegro,malmasi}@amazon.com Abstract. Yes/No or polar questions represent one of the main linguistic question categories. They consist of a main interrogative clause, for which the answer is binary (assertion or negation). Polar questions and answers (PQA) represent a valuable knowledge resource present in many community and other curated QA sources, such as forums or e-commerce applications. Using answers to polar questions alone in other contexts is not trivial. Answers are contextualized, and presume that the interrogative question clause and any shared knowledge between the asker and answerer are provided. We address the problem of controllable rewriting of answers to polar questions into decontextualized and succinct factual statements. We propose a Transformer sequence to sequence model that utilizes soft-constraints to ensure controllable rewriting, such that the output statement is semantically equivalent to its PQA input. Evaluation on three separate PQA datasets as measured through automated and human evaluation metrics show that our proposed approach achieves the best performance when compared to existing baselines. 1 Introduction Polar or Yes/No questions [12] represent one of the main question types, where the answers can be binary, confirming the interrogative clause in the question, with the possibility of containing embedded clauses that may precondition the proposition in the question, or answers can be implicit altogether [21]. The examples below show some manifestations of polar questions and answers. Question: Did Sandy want coffee? Polar Answer: Yes/No. Polar Answer with embedded clauses: – No, Sandy [wants tea] alt. – Yes, Sandy wants coffee, [only if there is cake too] cond. Implicit Answer: She’d rather have water. On the Web, polar question and answers (PQA) are present in forums, 3 e-commerce pages [29], and on other search related applications [6,18]. This human curated knowledge remains largely untapped, mainly due to the fact that answers are highly contextualized w.r.t their questions, and often are framed in a personalized language style. ⋆ 3 Work done during an internship at Amazon. https://www.reddit.com/r/YayorNay/" 2401.09787v1,"Published as a conference paper at ICLR 2024 Q UERYING E ASILY F LIP - FLOPPED S AMPLES FOR D EEP A CTIVE L EARNING Seong Jin Cho 1,2 , Gwangsu Kim 3 , Junghyun Lee 4 , Jinwoo Shin 4 , Chang D. Yoo 1 1 Department of Electrical Engineering, KAIST, 2 Korea Institute of Oriental Medicine, 3 Department of Statistics, Jeonbuk National University, 4 Kim Jaechul Graduate School of AI, KAIST {ipcng00,jh lee00,jinwoos,cd yoo}@kaist.ac.kr, s88012@jbnu.ac.kr A BSTRACT Active learning is a machine learning paradigm that aims to improve the performance of a model by strategically selecting and querying unlabeled data. One effective selection strategy is to base it on the model’s predictive uncertainty, which can be interpreted as a measure of how informative a sample is. The sample’s distance to the decision boundary is a natural measure of predictive uncertainty, but it is often intractable to compute, especially for complex decision boundaries formed in multiclass classification tasks. To address this issue, this paper proposes the least disagree metric (LDM), defined as the smallest probability of disagreement of the predicted label, and an estimator for LDM proven to be asymptotically consistent under mild assumptions. The estimator is computationally efficient and can be easily implemented for deep learning models using parameter perturbation. The LDM-based active learning is performed by querying unlabeled data with the smallest LDM. Experimental results show that our LDM-based active learning algorithm obtains state-of-the-art overall performance on all considered datasets and deep architectures. 1 I NTRODUCTION Machine learning often involves the burdensome task of annotating a large unlabeled data set that is generally abundant and readily available. Active learning (Cohn et al., 1996) alleviates this burden by selecting the most informative unlabeled samples. Of the various active learning algorithms, uncertainty-based sampling (Ash et al., 2020; Zhao et al., 2021b; Woo, 2023) is preferred for its simplicity and relatively low computational cost. Uncertainty-based sampling selects unlabeled samples that are most difficult to predict (Settles, 2009; Yang et al., 2015; Sharma & Bilgic, 2017). The main focus of uncertainty-based sampling is quantifying the uncertainty of each unlabeled sample given a predictor. Until now, various uncertainty measures, as well as corresponding active learning algorithms, have been proposed (Nguyen et al., 2022; Houlsby et al., 2011; Jung et al., 2023); see Appendix A for a more comprehensive overview of the related work. However, many of them are not scalable or interpretable and often rely on heuristic approximations lacking theoretical justifications. This paper focuses on a conceptually simple approach based on the distance between samples and the decision boundary. Indeed, the unlabeled samples closest to the decision boundary are considered the most uncertain samples (Kremer et al., 2014; Ducoffe & Precioso, 2018; Raj & Bach, 2022). It has been theoretically established that selecting unlabeled samples with the smallest margin leads to exponential performance improvement over random sampling in binary classification with linear separators (Balcan et al., 2007; Kpotufe et al., 2022). However, in most cases, the sample’s distance to the decision boundary is not computationally tractable, especially for deep neural network-based multiclass predictors. Various (approximate) measures have been proposed for identifying the closest samples to the decision boundary (Ducoffe & Precioso, 2018; Moosavi-Dezfooli et al., 2016; Mickisch et al., 2020), but most lack concrete justification. This paper proposes a new paradigm of closeness measure that quantifies how easily sample prediction can be flip-flopped by a small perturbation in the decision boundary, departing from the conventional Euclidean-based distance. Therefore, samples identified to be closest by this measure are most 1" 2401.09808v1,"SensoDat: Simulation-based Sensor Dataset of Self-driving Cars Christian Birchler Cyrill Rohrbach christian.birchler@{zhaw,unibe}.ch Zurich University of Applied Sciences University of Bern Switzerland cyrill.rohrbach@students.unibe.ch University of Bern Switzerland Timo Kehrer Sebastiano Panichella timo.kehrer@unibe.ch University of Bern Switzerland sebastiano.panichella@zhaw.ch Zurich University of Applied Sciences Switzerland ABSTRACT Developing tools in the context of autonomous systems [22, 24] such as self-driving cars (SDCs) is time-consuming and costly since researchers and practitioners rely on expensive computing hardware and simulation software. We propose SensoDat, a dataset of 32,580 executed simulation-based SDC test cases generated with state-of-the-art test generators for SDCs. The dataset consist of trajectory logs and a variety of sensor data from the SDCs (e.g., rpm, wheel speed, brake thermals, transmission, etc.) represented as a time series. In total, SensoDat provides data from 81 different simulated sensors. Future research in the domain of SDCs does not necessarily depend on executing expensive test cases when using SensoDat. Furthermore, with the high amount and variety of sensor data, we think SensoDat can contribute to research, particularly for AI development, regression testing techniques for simulation-based SDC testing, flakiness in simulation, etc. Link to the dataset: https://doi.org/10.5281/zenodo.10307479 ACM Reference Format: Christian Birchler, Cyrill Rohrbach, Timo Kehrer, and Sebastiano Panichella. 2024. SensoDat: Simulation-based Sensor Dataset of Self-driving Cars. In Proceedings of 21st International Conference on Mining Software Repositories (MSR 2024). ACM, New York, NY, USA, 5 pages. https://doi.org/10.1145/ nnnnnnn.nnnnnnn 1 INTRODUCTION Testing self-driving cars (SDCs) is crucial for maintaining high security levels and minimizing potential threats to humans. While infield SDC testing is costly, simulation technologies offer a safer alternative. However, conducting simulation-based tests demands increased computational resources, particularly GPUs for accelerated computation of physical dynamics [1, 27]. To address the challenge of minimizing the costs of simulationbased testing, recent research focused on various regression testing techniques for simulation-based tests. Those techniques aim to test Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. MSR 2024, April 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn Figure 1: High-level dataset generation process SDCs cost-effectively while maintaining the system’s safety. For instance, by test prioritization [2, 8], in which the tests of the test suite are prioritized, i.e., sorted in a way so that the testing phase reveals faults of the system earlier. However, to conduct research on optimizing simulation-based testing, researchers rely on expensive test executions in simulation environments [1, 27]. These additional computational costs are mainly due to the expensive computation simulating the physics of the environment, which is not the case when testing traditional software systems. Thus, those tests are expensive and often not affordable when a large amount of data is required, e.g., for ML and DNNs. To overcome the issue of running simulations to obtain the execution data of simulations, researchers can use existing datasets of executed simulation-based tests. There are only a few datasets available consisting of simulation data for SDCs [13, 26]. Despite the existence of those datasets, in most cases, the simulators used are not maintained anymore. Popular simulators like Udacity [21], Apollo [3], SVL [25], and DeepDrive [15], were used in the past for research purposes but unfortunately, the active development of these simulators has been stopped by the maintainers or have long release cycles. We propose a dataset consisting of simulation data of executed SDC test cases in the BeamNG.tech simulation environment. The BeamNG.tech simulator is known in academia [5, 7, 10, 16, 28, 29] and is based on the popular BeamNG.drive game, which is actively developed and maintained by BeamNG GmbH. The availability of simulation data of SDCs enhances the research on SDC testing in simulation. Researchers and practitioners do not rely on executing expensive test cases to develop and evaluate regression testing techniques. Having the dataset publicly available eases the research for the domain of SDC software, especially for researchers and practitioners who can not afford expensive computing hardware. Furthermore, the availability of an open dataset improves the reproducibility and comparability of research results in various areas." 2401.09813v1,"Near-infrared and Mid-infrared Light Emission of Boron-doped Crystalline Silicon Xiaoming Wang 1# , Jiajing He 1,2*# and Yaping Dan 1* 1 University of Michigan-Shanghai Jiao Tong University Joint Institute, Shanghai Jiao Tong University, Shanghai, 200240, China. 2 Photonic Integrated Circuits Center, Shanghai Institute of Optics and Fine Mechanics, Chinese Academy of Sciences, Shanghai, 201800, China *yaping.dan@sjtu.edu.cn; jiajinghe@siom.ac.cn Abstract: The bottleneck in achieving fully integrated silicon photonics lies in silicon-based light- emitting devices that are compatible with standard CMOS technology. Dislocation loops by implanting boron into silicon and annealing represents an enticing strategy to transform highly inefficient silicon into a luminescent material. However, the emission at telecommunication wavelength suffers from the strong thermal quenching effect, resulting in low efficiency at room temperature. Here, we applied a new deep cooling process to address this issue. Interestingly, we find that electrons and holes recombine through defects emitting two photons, one in near infrared (NIR, 1.3~1.6 μm) and the other in mid-infrared band (MIR, around 3.5 μm). The PL intensity at NIR increases by three folds when the temperature increases from 77 K to 300K. Furthermore, the NIR light emission of reverse biased silicon diodes was significantly enhanced compared to forward bias, emitting the maximum output power of 42 nW at 60 mA. The results offer new opportunities for the development of IR light sources in integrated circuits. 1. Introduction Electrically pumped Si based light sources are important devices for highly integrated silicon photonic systems. 1 However, achieving efficient light emission from silicon is extremely challenging due to its indirect band gap. Many approaches have been explored, including Si light emitting diodes (LED) and diodes based on rare earth-doped Si 2-4 , III-V group 5 , Ge-on-Si 6 , and dislocation engineering 7, 8 . Dislocation loops were studied intensively as a residual damage after ion implantation doping of silicon. 9-11 However, a common issue found in these approaches is the strong thermal quenching, leading to its poor performance at room temperature (RT). 12-14 Recently, we adopted a deep cooling (DC) process to address the thermal quenching by flushing the hightemperature samples with helium gas cooled by liquid nitrogen. 4 The resultant RT photoluminescence (PL) efficiency has been remarkably improved by 2-3 orders of magnitude. In this work, we employed the deep cooling method to treat our B-doped Si samples (210 19 cm -3 ) and fabricated a silicon p-n junction diode by introducing additional phosphorus (P) dopants. The interstitial dislocation loops induced a localized strain, thereby facilitating the spatial confinement of injected carriers and effectively suppressing their diffusion into non-radiative pathways. Temperature-dependent photoluminescence (PL) and room-temperature electroluminescence (EL) were recorded. Besides the broad spectrum at NIR, the emission wavelength 1" 2401.09817v1,"1 Automatic Tuning of Denoising Algorithms Parameters without Ground Truth Arthur Floquet, Sayantan Dutta, Member, IEEE, Emmanuel Soubies, Duong-Hung Pham, Member, IEEE, and Denis Kouame, Senior Member, IEEE Abstract—Denoising is omnipresent in image processing. It is usually addressed with algorithms relying on a set of hyperparameters that control the quality of the recovered image. Manual tuning of those parameters can be a daunting task, which calls for the development of automatic tuning methods. Given a denoising algorithm, the best set of parameters is the one that minimizes the error between denoised and ground-truth images. Clearly, this ideal approach is unrealistic, as the ground-truth images are unknown in practice. In this work, we propose unsupervised cost functions — i.e., that only require the noisy image — that allow us to reach this ideal gold standard performance. Specifically, the proposed approach makes it possible to obtain an average PSNR output within less than 1% of the best achievable PSNR. Index Terms—Bilevel parameter tuning. optimization, Denoising, Hyper- I. I NTRODUCTION OISE is inherent to any imaging device. It comes from a variety of sources and is modeled in a variety of ways. When considering additive noise, the corrupted measurements y ∈ R N follow the model : N y = x + n, (1) with x ∈ R the clean image we wish to recover, and n ∈ R N the noise. Many denoising algorithms, denoted A θ , have been proposed to address this task and provide estimates given by A θ (y), e.g, [1]–[3], to cite few. The quality of these estimates depends on the chosen parameters θ ∈ R d . In practice, however, manual tuning of these parameters is far from being trivial, even for low numbers of parameters such as two or three. As such, finding ways to automatically tune these parameters is of major importance and constitutes an active area of research. Most existing approaches use a ′ mapping Θ λ : y 7→ θ, itself parameterized by λ ∈ R d , that maps an image and/or its features (e.g., noise level, noise type, image dynamic, image content) to a set of parameters θ. The best λ, i.e. λ ∗ , is found by minimizing the expectancy E of a discrepancy measure L(·, ·) between the denoised images and ground truth images: N λ ∗ := arg min ′ E [L(A Θ λ (y) (y), x)]. λ∈R d (x,y) (2) There are several possibilities to define Θ λ with increasing degree of sophistication: This work was supported by the CIMI Excellence Laboratory, ANR grant ANR-11-LABX-0040 within the French State Programme “Investissements d’Avenir” A. Floquet, E. Soubies, D.-H. Pham, and D. Kouamé are with the IRIT Laboratory, Université de Toulouse, and CNRS, Toulouse 31400, France. Email: firstname.lastname@irit.fr. (Corresponding author : Arthur Floquet) S. Dutta is with the Department of Radiology, Weill Cornell Medicine, New York, NY 10022, USA. Email: sdu4004@med.cornell.edu. Θ λ is a constant mapping (i.e., Θ λ (y) = θ ∈ R d ). Solving (2) then consists in finding a fixed set of parameters θ such that, on average, the estimates are good, e.g, [4]. • Θ λ is defined using features extracted from y. For instance, Θ λ (y) = λ 1 +λ 2 σ̂(y) where σ̂(y) is an estimator of the noise variance. Here, solving (2) allows us to learn a mapping Θ λ that adjusts algorithm parameters according to a known and predefined model, e.g, [5]. • Θ λ is a neural network. In this case, solving (2) allows us to learn a mapping Θ λ that adjusts algorithm parameters according to an unknown model, e.g, [6], [7]. This greater flexibility comes at the price of a larger number of parameters λ to learn. Typically, all these methods require a dataset and work in a supervised way. Since this is not always feasible, unsupervised alternatives have been developed [8]–[11]. The main idea behind these approaches is to define an unsupervised loss (i.e., that does not depend on x) achieving the same minimizers as the supervised counterpart. Nevertheless, constructing Θ λ and finding λ remains challenging. To discard the need of defining and training a mapping Θ λ on a dataset, one could directly fit θ on individual images y. The ideal estimate would be: • x ∗ := A θ ∗ (y) with θ ∗ := arg min C y ∗ (θ) , C y ∗ (θ) := L(A θ (y), x). (3) θ∈R d Yet, this formulation is impractical as it requires knowing x to obtain x ∗ . In the following, x ∗ will be our gold standard, that is, the best estimate we can expect for a given image y and algorithm A θ . For Gaussian noise, methods such as the famous generalized cross-validation (GCV) [12] and its variants or the Stein’s unbiased risk estimate (SURE) [13], which depends only on the noisy data, can be used in place of the true mean-squared error (MSE). The SURE optimization is, however, challenging in the general case and requires the use of approximations [14] or Monte Carlo approaches [15]. It is noteworthy to mention that other metrics that do not require the reference image have also been proposed [16], [17]. Here, inspired by [8]–[11], we propose alternative unsupervised cost functions C b and inference schemes I b such that: b θ̂, y) x ∗ ≈ x̂ := I( with θ̂ := arg min C b y (θ). (4) θ∈R d Let us emphasize that the inference scheme in (4) is not directly A θ̂ (y). Indeed, as detailed in Section II, the proposed unsupervised cost functions may require adapting the inference" 2401.09823v1,"1 Enhancing Small Object Encoding in Deep Neural Networks: Introducing Fast&Focused-Net with Volume-wise Dot Product Layer Tofik Ali, Partha Pratim Roy Abstract—In this paper, we introduce Fast&Focused-Net, a novel deep neural network architecture tailored for efficiently encoding small objects into fixed-length feature vectors. Contrary to conventional Convolutional Neural Networks (CNNs), Fast&Focused-Net employs a series of our newly proposed layer, the Volume-wise Dot Product (VDP) layer, designed to address several inherent limitations of CNNs. Specifically, CNNs often exhibit a smaller effective receptive field than their theoretical counterparts, limiting their vision span. Additionally, the initial layers in CNNs produce low-dimensional feature vectors, presenting a bottleneck for subsequent learning. Lastly, the computational overhead of CNNs, particularly in capturing diverse image regions by parameter sharing, is significantly high. The VDP layer, at the heart of Fast&Focused-Net, aims to remedy these issues by efficiently covering the entire image patch information with reduced computational demand. Experimental results demonstrate the prowess of Fast&Focused-Net in a variety of applications. For small object classification tasks, our network outperformed state-of-the-art methods on datasets such as CIFAR-10, CIFAR-100, STL-10, SVHN-Cropped, and Fashion- MNIST. In the context of larger image classification, when combined with a transformer encoder (ViT), Fast&Focused-Net produced competitive results for OpenImages V6, ImageNet- 1K, and Places365 datasets. Moreover, the same combination showcased unparalleled performance in text recognition tasks across SVT, IC15, SVTP, and HOST datasets. This paper presents the architecture, the underlying motivation, and extensive empirical evidence suggesting that Fast&Focused-Net is a promising direction for efficient and focused deep learning. Index Terms—Effective Receptive Field, Object Classification, Convolutional Neural Networks (CNNs), Image Processing, Computational Efficiency in Deep Learning. I. I NTRODUCTION Deep Neural Networks (DNNs) are a class of machine learning models that are designed to mimic the way the human brain works, with the aim of learning from large amounts of data. While a neural network with a single layer can still make approximate predictions, additional hidden layers can help optimize the accuracy. DNNs use this concept of ’depth’, which refers to the number of hidden layers for which the learning process is repeated. This depth allows neural networks to learn through a hierarchical process of transforming the input data, layer by layer, to make more abstract and composite representations, thereby enabling the model to recognize complex patterns. T. Ali and P.P. Roy are with the Department of Computer Science and Engineering, Indian Institute of Technology Roorkee, India, e-mail: tali@cs.iitr.ac.in, e-mail: proy.fcs@iitr.ac.in The focus of this paper is on the encoding of small objects into fixed length feature vectors by a deep neural network. This is a critical aspect of machine learning and computer vision, as it allows for the efficient and comprehensive representation of data, which in turn enables more accurate predictions and analyses. The encoding process involves the transformation of raw data into a format that can be easily processed by the neural network, and the quality of this encoding can significantly impact the performance of the model. Despite the advancements in deep learning, there are still several challenges associated with the encoding of small objects in deep neural networks. One of the main issues is the effective receptive field of Convolutional Neural Networks (CNNs), which is often smaller than its theoretical receptive field. This means that the network is not able to fully capture the information in the input data [1], [2], [3], [4]. Additionally, the initial layers of CNNs often generate a low-dimensional feature vector, which can limit the learning capacity of the subsequent layers. Furthermore, the computation cost of CNNs is high due to the need to generate feature vectors for different regions of the image through a sliding window and parametersharing approach. To address these issues, we propose a new deep neural network, which we call Fast&Focused-Net (FFN). Unlike traditional CNNs, FFN uses a new type of layer, called the Volume-wise Dot Product (VDP) layer, which requires less computation and covers the full image patch information. The VDP layer is designed to overcome the limitations of the convolution layer, by ensuring that the effective receptive field is equal to the theoretical receptive field, and by generating distinct feature vectors for all encountered image regions. This results in a more efficient and comprehensive encoding of small objects, thereby improving the performance of the deep neural network. II. L IMITATIONS OF CNN Convolutional Neural Networks (CNNs) have been a cornerstone in the field of deep learning, particularly in image processing tasks. However, they are not without their limitations. This section will delve into the three main limitations of CNN-based networks as identified in the overview: the effective receptive field, the initial layer bottleneck, and the computation cost." 2401.09824v1,"Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams Bhupendra Acharya § Muhammad Saad Antonio Emanuele Cinà Lea Schönherr CISPA bhupendra.acharya@cispa.de PayPal Inc. muhsaad@paypal.com Università di Genova antonio.cina@unige.it CISPA schoenherr@cispa.de Hoang Dai Nguyen Adam Oest Phani Vadrevu Thorsten Holz Louisiana State University hngu281@lsu.edu PayPal Inc. aoest@paypal.com Louisiana State University kvadrevu@lsu.edu CISPA holz@cispa.de Abstract—The mainstream adoption of cryptocurrencies has led to a surge in wallet-related issues reported by ordinary users on social media platforms. In parallel, there is an increase in an emerging fraud trend called cryptocurrencybased technical support scam, in which fraudsters offer fake wallet recovery services and target users experiencing walletrelated issues. In this paper, we perform a comprehensive study of cryptocurrency-based technical support scams. We present an analysis apparatus called HoneyTweet to analyze this kind of scam. Through HoneyTweet , we lure over 9K scammers by posting 25K fake wallet support tweets (so-called honey tweets). We then deploy automated systems to interact with scammers to analyze their modus operandi. In our experiments, we observe that scammers use Twitter as a starting point for the scam, after which they pivot to other communication channels (e.g., email, Instagram, or Telegram) to complete the fraud activity. We track scammers across those communication channels and bait them into revealing their payment methods. Based on the modes of payment, we uncover two categories of scammers that either request secret key phrase submissions from their victims or direct payments to their digital wallets. Furthermore, we obtain scam confirmation by deploying honey wallet addresses and validating private key theft. We also collaborate with the prominent payment service provider by sharing scammer data collections. The payment service provider feedback was consistent with our findings, thereby supporting our methodology and results. By consolidating our analysis across various vantage points, we provide an end-toend scam lifecycle analysis and propose recommendations for scam mitigation. 1. Introduction Over the last few years, cryptocurrencies have witnessed mainstream adoption, leading to an increase in their user §. Part of this work contributed to the author’s dissertation at the University of New Orleans. base and price. Prominent cryptocurrencies such as Bitcoin and Ethereum represent knowledge-to-money transfer [1], [2], [3], whereby a user with the knowledge of a private key can spend funds linked to the corresponding public key. In cryptocurrencies, private keys are usually managed by a digital wallet whose access is protected by a secret “key phrase”. A wallet compromise (i.e. losing access to the key phrase associated with the wallet) results in the risk of losing funds linked with that wallet. With the growing adoption of cryptocurrencies as a popular payment instrument, there is an increase in incidents related to wallet theft or compromise [4], [5], [6]. Moreover, due to the fact that cryptocurrencies are decentralized, there is no central authority that can assist with non-custodial wallet recovery. To make matters worse, scammers can exploit such opportunities to offer fake service support for wallet recovery. As a result, naı̈ve users—who are already distressed by losing access to their cryptocurrency wallets— end up losing more money to these fraudsters. In this paper, we conduct a comprehensive analysis of the criminal ecosystem involved in such scams from different vantage points. Our approach is based on three key observations regarding cryptocurrencies and social media. Our first observation is the increasing use of social media for technical support, including support for cryptocurrencyrelated activities. According to a recent report [7], one in three social media users prefers to contact the brand or business support through social media. To accommodate such requests, businesses and brands are ensuring their social media presence by managing customer accounts across various social media platforms (e.g., Twitter/X, Instagram, and others). As a result, there is a gradual shift in the mode of technical support from traditional channels (e.g., phone calls) to social media platforms. Our second observation concerns the abuse of social media by technical support scammers. In a technical support scam, fraudsters trick victims by offering fake customer support for a technical issue. During interactions with the victims, fraudsters try to steal their money by obtaining credentials or charging a (typically high) fee for a service" 2401.09829v1,"MNRAS 000, 1–10 (2024) Compiled using MNRAS L A TEX style file v3.0 Preprint 19 January 2024 Polarized QED Cascades over Pulsar Polar Caps Huai-Hang Song 1★ † and Matteo Tamburini 2 ‡ 1 Institute of Physics, Chinese Academy of Sciences, Beijing 100190, China 2 Max-Planck-Institut für Kernphysik, Saupfercheckweg 1, D-69117 Heidelberg, Germany Last updated 2024 January 18; in original form 2024 January 18 ABSTRACT The formation of 𝑒 ± plasmas within pulsar magnetospheres through quantum electrodynamics (QED) cascades in vacuum gaps is widely acknowledged. This paper aims to investigate the effect of photon polarization during the QED cascade occurring over the polar cap of a pulsar. We employ a Monte Carlo-based QED algorithm that accurately accounts for both spin and polarization effects during photon emission and pair production in both single-particle and particle-in-cell (PIC) simulations. Our findings reveal distinctive properties in the photon polarization of curvature radiation (CR) and synchrotron radiation (SR). CR photons exhibit high linear polarization parallel to the plane of the curved magnetic field lines, whereas SR photons, on average, demonstrate weak polarization. As the QED cascade progresses, SR photons gradually dominate over CR photons, thus reducing the average degree of photon polarization. Additionally, our study highlights an intriguing observation: the polarization of CR photons enhances 𝑒 ± pair production by approximately 5%, in contrast to the inhibition observed in laser-plasma interactions. Our self-consistent QED PIC simulations in the corotating frame reproduce the essential results obtained from single-particle simulations. Key words: pulsar magnetosphere – QED cascade – electron-positron pair – gamma photon – spin and polarization effects 1 INTRODUCTION Pulsars are commonly understood to be rotation-powered neutron stars, and treated as rotating magnetic dipoles characterized by superstrong magnetic fields at the 10 12 G level close to their surface (Hewish et al. 1968; Gold 1968; Michel 1982; Philippov & Kramer 2022). In vacuum, the rapid rotation of pulsars would induce a strong electric field 𝐸 ∥ aligned with the magnetic field. The force associated to this induced electric field can surpass the gravitational pull, leading to the extraction of charged particles from the pulsar surface. To resolve this issue, Goldreich & Julian (1969) proposed the presence of a magnetosphere surrounding the pulsar, comprising corotating plasmas that effectively screen the parallel electric field. These plasmas are thought to be 𝑒 ± plasmas sustained by quantum electrodynamics (QED) cascades, with the polar cap identified as one of the key regions for their occurrence (Sturrock 1971; Ruderman & Sutherland 1975; Arons & Scharlemann 1979). The polarized QED cascade process over a pulsar polar cap is illustrated in Fig. 1. High-energy 𝑒 ± , accelerated by the electric field, are confined to move along the curved magnetic field lines with minimal pitch angles, emitting 𝛾 photons through curvature radiation (CR). These emitted 𝛾 photons travel straight, leading to an increase in their propagation angles relative to the magnetic field lines until they decay into 𝑒 ± pairs. The created 𝑒 ± pairs, inheriting large pitch angles from their parent 𝛾 photons, undergo synchrotron radiation ★ Contact e-mail: huaihangsong@sjtu.edu.cn † Present address: Key Laboratory for Laser Plasmas (MOE), School of Physics and Astronomy, Shanghai Jiao Tong University, Shanghai 200240, China ‡ Contact e-mail: Matteo.Tamburini@mpi-hd.mpg.de © 2024 The Authors ρ 0 , Pulsar Curvature Radiation (CR) − γ e k γ k e − e + ε 0 B 0 γ k,⊥ γ k,⊥ Synchrotron Pair Production Radiation (SR) y z x Figure 1. Schematic representation of the polarized QED cascade over a pulsar polar cap. High-energy 𝑒 ± particles, traversing the curved magnetic field, emit 𝛾 ∥ photons through CR, which subsequently convert into 𝑒 ± pairs. The resulting 𝑒 ± pairs can emit both 𝛾 ∥ and 𝛾 ⊥ photons via SR. The symbols 𝛾 ∥ and 𝛾 ⊥ denote photons polarized parallel and perpendicular to the plane of the magnetic field lines, respectively. (SR) emission while simultaneously experiencing strong radiation reaction. Subsequently, SR photons with sufficient energy also decay into 𝑒 ± pairs. The unscreened parallel electric field 𝐸 ∥ accelerates the created 𝑒 ± pairs, reducing their pitch angles and potentially bringing them into the CR regime. This cycle of photon emission and pair production sustains the QED cascade. Ultimately, the generated 𝑒 ± plasma becomes sufficiently dense to screen the parallel electric field 𝐸 ∥ , thus creating the pulsar magnetosphere and approaching a forcefree environment." 2401.09841v1,"Interior Schauder estimates for Stokes systems in non-divergence form ⋆ Rong Dong a , Dongsheng Li a,∗ , Lihe Wang b a School of Mathematics and Statistics, Xi’an Jiaotong University, Xi’an 710049, China b Department of Mathematics, University of Iowa, Iowa City, IA52242, USA Abstract The global Schauder estimates for Stokes systems are established by Solonnikov [15] and [16] while the interior ones may fail generally from Serrin’s counterexample (cf. [14]). Nevertheless, this paper obtains interior C 2,α estimates for velocity and interior C 1,α α estimates for pressure in spatial direction. Furthermore, the C α, 2 estimate is attained for derivatives of curl of velocity. The estimates for velocity can be achieved pointwisely. The results are sharp and surprising since no continuity in time variable is assumed for the coefficients and the righthand side terms. Keywords: Stokes system, Schauder estimate, Campanato’s characterization 2000 MSC: 76D07, 35B65 1. Introduction The primary purpose of this paper is to investigate interior Schauder estimates for Stokes systems with variable coefficients in non-divergence form. Precisely, the system concerned here is the following     u t + Lu + ∇p = f in Ω T ; (1.1)    div u = g in Ω T , where L := −A(x, t)D 2 =: −a ij (x, t)D ij , Ω T = Ω×(−T, 0] is a cylinder with T > 0 and Ω ⊂ R n (n ≥ 2), the velocity field u(x, t) = (u 1 , u 2 , ..., u n ) and the pressure p(x, t) are unknowns, and f and g are suitably a vector field and a function respectively. Throughout this paper, the summation convention is  assumed and the coefficient matrix A(x, t) = a ij (x, t) n×n always satisfies ⋆ Research supported by National Natural Science Foundation of China [grant 12001419 and grant 12071365], the Fundamental Research Funds for the Central Universities [grant xzy012022004] and Shaanxi Fundamental Science Research Project for Mathematics and Physics [grant 22JSZ003]. ∗ Corresponding author. Email addresses: dongrong1203@mail.xjtu.edu.cn (Rong Dong), lidsh@mail.xjtu.edu.cn (Dongsheng Li), lihe-wang@uiowa.edu (Lihe Wang) Preprint submitted to Elsevier January 19, 2024" 2401.09849v1,"Benchmarking hybrid digitized-counterdiabatic quantum optimization Ruoqian Xu, 1 Jialiang Tang, 1 Pranav Chandarana, 1, 2 Koushik Paul, 1, 2, ∗ Xusheng Xu, 3 Manhong Yung, 4, 5, 6, 7 and Xi Chen 1, 2, † 1 Department of Physical Chemistry, University of the Basque Country UPV/EHU, Apartado 644, 48080 Bilbao, Spain 2 EHU Quantum Center, University of the Basque Country UPV/EHU, Barrio Sarriena, s/n, 48940 Leioa, Spain 3 Department of Physics, State Key Laboratory of Low-Dimensional Quantum Physics, Tsinghua University, Beijing 100084, China 4 Department of Physics, Southern University of Science and Technology, Shenzhen 518055, People’s Republic of China 5 Shenzhen Institute for Quantum Science and Engineering, Southern University of Science and Technology, Shenzhen 518055, People’s Republic of China 6 Guangdong Provincial Key Laboratory of Quantum Science and Engineering, Southern University of Science and Technology, Shenzhen 518055, People’s Republic of China 7 Shenzhen Key Laboratory of Quantum Science and Engineering, Southern University of Science and Technology, Shenzhen 518055, People’s Republic of China Hybrid digitized-counterdiabatic quantum computing (DCQC) is a promising approach for leveraging the capabilities of near-term quantum computers, utilizing parameterized quantum circuits designed with counterdiabatic protocols. However, the classical aspect of this approach has received limited attention. In this study, we systematically analyze the convergence behavior and solution quality of various classical optimizers when used in conjunction with the digitized-counterdiabatic approach. We demonstrate the effectiveness of this hybrid algorithm by comparing its performance to the traditional QAOA on systems containing up to 28 qubits. Furthermore, we employ principal component analysis to investigate the cost landscape and explore the crucial influence of parameterization on the performance of the counterdiabatic ansatz. Our findings indicate that fewer iterations are required when local cost landscape minima are present, and the SPSA-based BFGS optimizer emerges as a standout choice for the hybrid DCQC paradigm. I. INTRODUCTION In the field of quantum computing, one crucial aspect of research involves benchmarking quantum algorithms. The purpose of benchmarking is to thoroughly evaluate the performance of a quantum algorithm using a well-defined set of metrics. This evaluation process is particularly important for the Noisy Intermediate-Scale Quantum (NISQ) era. Benchmarking quantum algorithms is essential for gaining insights into the capabilities and limitations of NISQ computers while executing quantum algorithms. In recent years, the field of quantum computing has witnessed remarkable progress, opening up new frontiers for solving complex computational problems that were once considered intractable for classical computers. Among several promising quantum algorithms, Variational Quantum Algorithms (VQAs) have emerged as a particularly intriguing and versatile approach [1]. VQAs utilize the unique properties of quantum systems to tackle optimization tasks by iteratively optimizing the parameters of a quantum circuit to minimize a given cost function. This flexibility and adaptability make VQAs well-suited for a wide range of applications, including quantum chemistry simulations [2–4], machine learning [5, 6], and combinatorial optimization [7, 8]. One powerful example of VQA is the Quantum Approximate Optimization Algorithm (QAOA) [9]. QAOA employs p layers of unitary operations to iteratively explore the potential solutions using classical optimization and enhance the probability of obtaining the optimal solution. By adjusting the number of layers, QAOA offers efficient use of quantum hardware ∗ koushikpal09@gmail.com † chenxi1979cn@gmail.com for solving a given optimization problem. One of the main challenges of QAOA is its sensitivity to the choice of hyperparameters. Finding the optimal values for these parameters can be a challenging and time-consuming task, especially for large-scale optimization problems, as it may require significant classical computational resources and extensive experimentation. Over the past few years, numerous algorithms have been introduced to enhance the capabilities of original QAOA. One such example is multi-angle QAOA (maQAOA), which incorporates additional parameters into the quantum circuit to achieve improved approximation ratios compared to the standard QAOA [10]. Similarly, Adaptive Derivative-Assembled Problem-Tailored QAOA (ADAPT-QAOA) employs an iterative process to select the ansatz from a predefined pool of operators [11]. This selection aims to maximize the gradient of the commutator between the pool operator and the cost Hamiltonian, leading to enhanced optimization outcomes. Several other techniques, such as Recursive QAOA (RQAOA) [12, 13], Quantum Alternating Operator Ansatzes (QAOAnsatz) [14], Spanning Tree QAOA (ST-QAOA) [15], and Adaptive Bias QAOA (ab-QAOA) [16], have been proposed with the aim of enhancing various aspects of the QAOA. These methods claim varying degrees of improvements in circuit depth, parameter space, operator pool, and computational cost [17]. In this paper, we examine the performance and effectiveness of hybrid digitized-counterdiabatic quantum computing (DCQC) algorithms [18]. This method incorporates elements from Shortcut to Adiabaticity (STA) [19, 20], particularly the use of counterdiabatic (CD) driving [21], to reduce the circuit depth and improve the optimization process of conventional QAOA. In prior studies, these algorithms have exhibited their efficacy in addressing diverse optimization problems, includ-" 2401.09852v1,"Enhancing the Fairness and Performance of Edge Cameras with Explainable AI Truong Thanh Hung Nguyen †‡ , Vo Thanh Khang Nguyen ‡ , Quoc Hung Cao ‡ , Van Binh Truong ‡ , Quoc Khanh Nguyen ‡ , Hung Cao † ‡ Quy Nhon AI, FPT Software, Vietnam † Analytics Everywhere Lab, University of New Brunswick, Canada Email: {hungntt, khangnvt1, hungcq3, binhtv8, khanhnq33}@fpt.com, hcao3@unb.ca Abstract—The rising use of Artificial Intelligence (AI) in human detection on Edge camera systems has led to accurate but complex models, challenging to interpret and debug. Our research presents a diagnostic method using XAI for model debugging, with expert-driven problem identification and solution creation. Validated on the Bytetrack model in a real-world office Edge network, we found the training dataset as the main bias source and suggested model augmentation as a solution. Our approach helps identify model biases, essential for achieving fair and trustworthy models. Index Terms—Explainable AI, Edge Camera I. I NTRODUCTION Human detection through security cameras, a pivotal AI task, employs AI models like YOLO and its YOLOX variant for alerts, such as falls and intrusions. Specifically, Bytetrack, based on YOLOX, excels in multi-object tracking [1], [2]. Yet, it struggles in detecting obscured or disabled individuals (Fig. 1a, Fig. 1b). Given their black-box nature, these models pose debugging challenges. Though XAI aids debugging in tabular and text data [3], its use in image data is less explored. Hence, our paper introduces an XAI-driven framework to debug human detection models in security cameras. The approach leverages experts for diagnosing problems and proposing solutions, with potential wider relevance to object detection and classification. detection, leveraging YOLOX for detection and Byte for postprocessing. B. Explainable AI AI’s integration into real-world scenarios has led to multiple Explainable AI (XAI) strategies: perturbation-based, backpropagation-based, and example-based. Perturbation techniques, such as D-RISE [4], which work independently of model design, perturb input images, then analyze predictions to gauge pixel or superpixel influence on outcomes. While widely applicable, their computational demand can be limiting. Backpropagation methods delve into model architecture to fetch explanatory data. Recognized techniques include Grad- CAM [5], SeCAM [6]. Example-based methods, like Influence Function [7], explain using training data samples to ascertain their effects on predictions. While XAI’s application to object detection is complex due to the intricate models, some methods, such as D-RISE [4], D-CLOSE [8], and G-CAME [9], are adaptations from classification for object detection. C. Debugging Model Framework with XAI Many studies utilize XAI methods [10], primarily answering, “Why does the model predict this?” Yet, the follow-up, “How can explanations improve the model?” requires using XAI to better the AI system. No research has yet outlined a framework for debugging human detection models. This paper, therefore, introduces such a framework, leveraging XAI to pinpoint issues and improve model fairness and efficacy. III. M ETHODOLOGY (a) (b) Fig. 1. (a) A security camera on the ceiling of an office can detect ordinary people (green boxes), but not people who cover their bodies with a cloth. (b) The Bytetrack model cannot detect the disabled woman but still detect the other, who is not disabled. II. R ELATED W ORK A. Human Detection Human detection identifies humans in images or videos and has evolved with various methods. Deep Learning (DL) brought forward models that address challenges like object size and illumination differences. Capitalizing on YOLOX’s [1] success, Bytetrack [2] was designed for human We present a structured debugging model framework shown in Fig. 2, with seven sequential stages. Each stage relies on the results of its predecessor. Where multiple methods or assumptions exist per stage, we offer strategy selection guidelines. In this framework, XAI aids experts in identifying core model issues and suggesting performance-enhancing solutions. A. Data Selection and Extraction of Predictions Our framework starts by selecting a training dataset subset for model enhancement, addressing potential dataset concerns. Public datasets like CrowdHuman [11], used in Bytetrack training, can face data poisoning [12], affecting data quality and model results. Error detection in the model or dataset is optimized using random testing [13], which randomly picks" 2401.09854v1,"1 A Survey on Energy Consumption and Environmental Impact of Video Streaming SAMIRA AFZAL † , NARGES MEHRAN † , ZOHA AZIMI OURIMI † , FARZAD TASHTARIAN ★ , HADI AMIRPOUR ★ , RADU PRODAN † , CHRISTIAN TIMMERER ★ , ★ Christian Doppler Labora- tory ATHENA, Alpen-Adria-Universität Klagenfurt , Austria and † Institute of Information Technology (ITEC), Alpen-Adria-Universität Klagenfurt, Austria Climate change challenges require a notable decrease in worldwide greenhouse gas (GHG) emissions across technology sectors. Digital technologies, especially video streaming, accounting for most Internet traffic, make no exception. Video streaming demand increases with remote working, multimedia communication services (e.g., WhatsApp, Skype), video streaming content (e.g., YouTube, Netflix), video resolution (4K/8K, 50 fps/60 fps), and multi-view video, making energy consumption and environmental footprint critical. This survey contributes to a better understanding of sustainable and efficient video streaming technologies by providing insights into the state-of-the-art and potential future directions for researchers, developers and engineers, service providers, hosting platforms, and consumers. We widen this survey’s focus on content provisioning and content consumption based on the observation that continuously active network equipment underneath video streaming consumes substantial energy independent of the transmitted data type. We propose a taxonomy of factors that affect the energy consumption in video streaming, such as encoding schemes, resource requirements, storage, content retrieval, decoding, and display. We identify notable weaknesses in video streaming that require further research for improved energy efficiency: (1) fixed bitrate ladders in HTTP live streaming; (2) inefficient hardware utilization of existing video players; (3) lack of comprehensive open energy measurement dataset covering various device types and coding parameters for reproducible research. CCS Concepts: • Information systems → Multimedia streaming; • Social and professional topics → Sustainability. Additional Key Words and Phrases: Energy consumption, carbon emission, video streaming, encoding, decoding, sustainability, cloud and edge computing. ACM Reference Format: Samira Afzal † , Narges Mehran † , Zoha Azimi Ourimi † , Farzad Tashtarian ★ , Hadi Amirpour ★ , Radu Prodan † , Christian Timmerer ★ . 2024. A Survey on Energy Consumption and Environmental Impact of Video Streaming. J. ACM 1, 1, Article 1 (January 2024), 34 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Global greenhouse gas (GHG) emissions impose significant climate change and environmental warming, severely affecting ecosystems and human well-being. Internet data traffic alone accounts for about 3.7 % of GHG, comparable to the global airline industry [69]. One main driver of data traffic is video streaming, responsible for more than 65 % of the total data volume on the Internet [162]. Video streaming encompasses various applications, including video-on-demand (VoD) and live services, 360 ◦ videos [54], user-generated content platforms, social media platforms, video chats, Author’s address: Samira Afzal † , Narges Mehran † , Zoha Azimi Ourimi † , Farzad Tashtarian ★ , Hadi Amirpour ★ , Radu Prodan † , Christian Timmerer ★ , ★ Christian Doppler Laboratory ATHENA, Alpen-Adria-Universität Klagenfurt, Austria and † Institute of Information Technology (ITEC), Alpen-Adria-Universität Klagenfurt, , Klagenfurt, Austria, samira.afzal@aau.at. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. 0004-5411/2024/1-ART1 $15.00 https://doi.org/XXXXXXX.XXXXXXX J. ACM, Vol. 1, No. 1, Article 1. Publication date: January 2024." 2401.09856v1,"EDAF: An End-to-End Delay Analytics Framework for 5G-and-Beyond Networks Samie Mostafavi ∗ , Marius Tillner † , Gourav Prateek Sharma ‡ , James Gross § Silicon Austria Labs † KTH Royal Institute of Technology ∗‡§ ssmos@kth.se ∗ , marius.tillner@silicon-austria.com † , gpsharma@kth.se ‡ , jamesgr@kth.se § to the devised model, we record timestamps coupled with relevant information throughout the traverse of packets across the network. The resulting decomposition supplies essential inputs for the subsequent delay optimization process. In this work, we design and implement an end-to-end delay analytics framework, EDAF, to tackle these challenges and facilitate delay optimization for enhancing the performance of time-critical applications in 5G/5G-Advanced networks. Abstract—Supporting applications in emerging domains like cyber-physical systems and human-in-the-loop scenarios typically requires adherence to strict end-to-end delay guarantees. Contributions of many tandem processes unfolding layer by layer within the wireless network result in violations of delay constraints, thereby severely degrading application performance. Meeting the application’s stringent requirements necessitates coordinated optimization of the end-to-end delay by fine-tuning all contributing processes. To achieve this task, we designed and implemented EDAF, a framework to decompose packets’ end-toend delays and determine each component’s significance for 5G network. We showcase EDAF on OpenAirInterface 5G uplink, modified to report timestamps across the data plane. By applying the obtained insights, we optimized end-to-end uplink delay by eliminating segmentation and frame-alignment delays, decreasing average delay from 12ms to 4ms. Index Terms—End-to-end delay, 5G, OpenAirInterface A. Related Works 3GPP has already introduced specifications for the Network Data Analytics Function (NWDAF) in 5G. NWDAF is an NF primarily responsible for collecting large amounts of data from UEs and 5G Network Functions such as Access Management Function (AMF) and Session Management Function (SMF). This enables NWDAF to perform analytics and leverage, e.g., Machine Learning (ML) algorithms for automating network operations to optimize resource allocations. However, supporting time-critical applications would require advanced predictive analytics that can be translated into real-time operational intelligence. As these applications can have extreme requirements (e.g., 10 ms One-way Delay (OWD) with 99.999% reliability), NWDAF needs to be enhanced [4], [5]. This requires, first, a fine-grained per-packet data collection mechanism that can track components of end-to-end latencies along with corresponding network states (e.g., Modulation and Coding Scheme (MCS) index, HARQ rounds) for these packets [6]. Second, certain analytics are required that can process this data to manage extreme latency and reliability requirements. Authors in [7], have proposed Latseq, a tool for the analysis of packet delays only in OpenAirInterface LTE basestation, not end-to-end. In addition, the majority of predictive analytics are too coarse-grained and thus are not suited for providing operations to guarantee tail latency [8]. The data collection mechanisms discussed above are incapable of fine-grained data required for predictive analysis. For instance, LatSeq is capable of only tracing packet traversal through different layers inside the OpenAirInterface LTE stack at the basestation which might not be suitable for comprehensive end-to-end delay decomposition between the two application endpoints. A key requirement for implementing and evaluating this framework is an adaptable experimentation platform capable of supporting comprehensive end-to-end experiments. ExPECA, a testbed designed for wireless communication and edge-computing research, can support repeatable experimentation by leveraging I. I NTRODUCTION In the realm of modern communication systems, a plethora of time-critical applications are emerging, e.g., smart manufacturing, Extended Reality (XR) and exoskeletons [1]. These applications necessitate that communication systems not only support low latency but with a certain level of reliability. The performance of these applications is highly susceptible to variations in end-to-end packet delays, especially instances where delays deviate from the norm, as such outliers degrade the application’s performance [2]. The end-to-end delay is a product of many tandem processes unfolding layer by layer within the wireless network, each exhibiting stochastic behavior [3]. For instance, inside 5G’s Radio Access Network (RAN), numerous processes, each serving different purposes, contribute to the end-to-end delay. Radio Link Control (RLC) queuing, resource scheduling, packet segmentation, Hybrid Automatic Repeat reQuest (HARQ), and more are among these processes. Meeting the application’s stringent requirements necessitates coordinated optimization of the end-to-end delay by finetuning all contributing processes. An effective approach involves firstly, conducting end-to-end delay measurements, and secondly, decomposing them into corresponding components while assessing the significance of each component. This will enable further efficient and practical delay optimization. To address this challenge, it is imperative to identify the sources of delay within the network under study and formulate an end-to-end decomposition model where each delay component represents a distinct delay source. Next, according 1" 2401.09881v1,"GA-SmaAt-GNet: Generative Adversarial Small Attention GNet for Extreme Precipitation Nowcasting Eloy Reulen, Siamak Mehrkanoon ∗ Department of Information and Computing Sciences, Utrecht University, Utrecht, The Netherlands Abstract In recent years, data-driven modeling approaches have gained considerable traction in various meteorological applications, particularly in the realm of weather forecasting. However, these approaches often encounter challenges when dealing with extreme weather conditions. In light of this, we propose GA-SmaAt-GNet, a novel generative adversarial architecture that makes use of two methodologies aimed at enhancing the performance of deep learning models for extreme precipitation nowcasting. Firstly, it uses a novel SmaAt-GNet built upon the successful SmaAt-UNet architecture as generator. This network incorporates precipitation masks (binarized precipitation maps) as an additional data source, leveraging valuable information for improved predictions. Additionally, GA-SmaAt-GNet utilizes an attention-augmented discriminator inspired by the well-established Pix2Pix architecture. Furthermore, we assess the performance of GA-SmaAt-GNet using real-life precipitation dataset from the Netherlands. Our experimental results reveal a notable improvement in both overall performance and for extreme precipitation events. Furthermore, we conduct uncertainty analysis on the proposed GA-SmaAt-GNet model as well as on the precipitation dataset, providing additional insights into the predictive capabilities of the model. Finally, we offer further insights into the predictions of our proposed model using Grad-CAM. This visual explanation technique generates activation heatmaps, illustrating areas of the input that are more activated for various parts of the network. Keywords: Extreme Precipitation Nowcasting, UNet, GAN, Attention, Deep Learning 1. Introduction Precipitation nowcasting [1], also referred to as shortterm precipitation forecasting, has long been a focal point of meteorological research. Especially, the ability to accurately predict short-term extreme precipitation events holds particular significance, as these weather phenomena have a substantial impact on both human life and economy. Notably, the Netherlands has experienced a noteworthy increase in precipitation over the past century, as highlighted in the findings of studies such as [2, 3]. Furthermore, the frequency of extreme precipitation events in the Netherlands has been on the rise, as demonstrated by [4, 3]. In light of these developments, precise nowcasts for extreme precipitation events are of great importance for timely warnings and precautionary measures. Traditionally, meteorologists have relied upon Numerical Weather Prediction (NWP) ∗ Corresponding author Email address: s.mehrkanoon@uu.nl (Siamak Mehrkanoon) Preprint submitted to arXiv models for generating weather forecasts [5]. NWP models employ intricate mathematical equations to simulate various atmospheric properties. This involves solving a set of complex partial differential equations governing the physical state of the atmosphere. While NWP models can deliver accurate forecasts, their computational demands make them less suitable for nowcasting tasks which require short-term forecasts, typically ranging from minutes to a maximum of six hours. In recent years, Convolutional Neural Networks (CNNs), a class of deep learning models particularly well-suited for image and spatial data analysis, have emerged as a promising area of research for tackling the precipitation nowcasting problem. CNNs have demonstrated remarkable success in various fields, including computer vision [6, 7, 8, 9], natural language processing [10, 11], and, increasingly, meteorology [12, 13, 9]. Their ability to extract spatial patterns and features from radar or satellite imagery has made them valuable tools in the quest for more accurate precipitation forecasts, even for extreme weather events [14]. However, it is essential January 19, 2024" 2401.09886v1,"1 Cooperative Edge Caching Based on Elastic Federated and Multi-Agent Deep Reinforcement Learning in Next-Generation Networks Qiong Wu, Senior Member, IEEE, Wenhua Wang, Pingyi Fan, Senior Member, IEEE, Qiang Fan, Huiling Zhu, Senior Member, IEEE and Khaled B. Letaief, Fellow, IEEE Abstract Edge caching is a promising solution for next-generation networks by empowering caching units in small-cell base stations (SBSs), which allows user equipments (UEs) to fetch users’ requested contents that have been pre-cached in SBSs. It is crucial for SBSs to predict accurate popular contents through learning while protecting users’ personal information. Traditional federated learning (FL) can protect users’ privacy but the data discrepancies among UEs can lead to a degradation in model quality. Therefore, it is necessary to train personalized local models for each UE to predict popular contents accurately. In addition, the cached contents can be shared among adjacent SBSs in next-generation networks, thus caching predicted popular contents in different SBSs may affect the cost to fetch contents. Hence, it is critical to determine where the popular contents are cached cooperatively. To address these issues, we propose a cooperative edge caching scheme based on elastic federated and multi-agent deep reinforcement learning (CEFMR) to optimize the cost in the network. We first propose an elastic FL algorithm to train the personalized model for each UE, where adversarial autoencoder (AAE) model is adopted for training to improve the prediction accuracy, then a popular content prediction algorithm is proposed to predict the popular contents for each SBS based on the trained AAE model. Finally, we propose a multi-agent deep reinforcement learning (MADRL) based algorithm to decide where the predicted popular contents are collaboratively cached among SBSs. Our experimental results demonstrate the superiority of our proposed scheme to existing baseline caching schemes. Index Terms cooperative edge caching, elastic federated learning, multi-agent deep reinforcement learning, next-generation networks I. I NTRODUCTION Qiong Wu and Wenhua Wang are with the School of Internet of Things Engineering, Jiangnan University, Wuxi 214122, China, and also with the State Key Laboratory of Integrated Services Networks (Xidian University), Xi’an 710071, China (e-mail: qiongwu@jiangnan.edu.cn, wenhuawang@stu.jiangnan.edu.cn) Pingyi Fan is with the Department of Electronic Engineering, Beijing National Research Center for Information Science and Technology, Tsinghua University, beijing 100084, China (Email: fpy@tsinghua.edu.cn) Qiong Fan is with Qualcomm, San Jose, CA 95110, USA (e-mail: qf9898@gmail.com) Huiling Zhu is with the School of Engineering, University of Kent, CT2 7NT Canterbury, U.K.(e-mail:H.Zhu@kent.ac.uk) K. B. Letaief is with the School of Engineering, Hong Kong University of Science and Technology (HKUST), Hong Kong (email:eekhaled@ust.hk)" 2401.09902v2,"Interplay between depth and width for interpolation in neural ODEs Antonio Álvarez-López a,∗ , Arselane Hadj Slimane b , Enrique Zuazua a,c,d a Universidad Autónoma de Madrid, C. Francisco Tomás y Valiente, 7, Madrid, 28049, Spain b ENS Paris Saclay, Avenue des science, 4, Gif-sur-Yvette, 91190, France c Chair for Dynamics, Control, Machine Learning, and Numerics, Alexander von Humboldt-Professorship, Department of Mathematics, Friedrich-Alexander-Universität Erlangen-Nürnberg, Cauerstraße, 11, Erlangen, 91058, Germany d Fundación Deusto, Av. de Universidades, 24, Bilbao, 48007, Spain Abstract Neural ordinary differential equations (neural ODEs) have emerged as a natural tool for supervised learning from a control perspective, yet a complete understanding of their optimal architecture remains elusive. In this work, we examine the interplay between their width p and number of layer transitions L (effectively the depth L + 1). Specifically, we assess the model expressivity in terms of its capacity to interpolate either a finite dataset D comprising N pairs of points or two probability measures in R d within a Wasserstein error margin ε > 0. Our findings reveal  a balancing trade-off between p and L, with L scaling as O(1 + N/p) for dataset interpolation, and L = O 1 + (pε d ) −1 for measure interpolation. In the autonomous case, where L = 0, a separate study is required, which we undertake focusing on dataset interpolation. We address the relaxed problem of ε-approximate controllability and establish an error decay of ε ∼ O(log(p)p −1/d ). This decay rate is a consequence of applying a universal approximation theorem to a custom-built Lipschitz vector field that interpolates D. In the high-dimensional setting, we further demonstrate that p = O(N ) neurons are likely sufficient to achieve exact control. Keywords: Neural ODEs, Depth, Width, Simultaneous controllability, Transport equation, Wasserstein distance 2000 MSC: 34H05, 35Q49, 68T07, 93B05 1. Introduction Residual neural networks (ResNets) are formally defined as the family of discrete systems ( x k+1 = x k + W k σ (A k x k + b k ) , (1.1) x 0 ∈ R d , where k = 0, . . . , L, W k ∈ R d×p , A k ∈ R p×d and b k ∈ R p , for some d ≥ 1, L ≥ 0 and p ≥ 1. Each time step k identifies a layer of the network. The number of layers L + 1 is the depth of (1.1). The parameter p is the width of (1.1), identifying the number of neurons per layer. The activation function σ : R p → R p is  defined as the column ⊤ vector σ(y) = σ(y (1) ), . . . , σ(y (p) ) from a chosen nonlinear function σ : R → R. We consider the Rectified Linear Unit (ReLU), given by σ(z) = max{z, 0}, z ∈ R. It has been noted [10, 17, 5, 4, 29] that (1.1) can be identified with the forward Euler discretization scheme for the class of continuous models known as neural ordinary ∗ Corresponding author Email addresses: antonio.alvarezl@uam.es (Antonio Álvarez-López), arselane.hadj_slimane@ens-paris-saclay.fr (Arselane Hadj Slimane), enrique.zuazua@fau.de (Enrique Zuazua) Preprint submitted to Elsevier differential equations (neural ODEs), ( ẋ(t) = W (t)σ (A(t) x(t) + b(t)) , x(0) = x 0 ∈ R d , (1.2)  where (W, A, b) ∈ L ∞ (0, T ), R d×p × R p×d × R p for some T > 0. Here, t ∈ (0, T ) parameterizes the evolution of the states through a continuous range of layers. As discussed in [27, 2], it is common to assume that (W, A, b) is a step function over (0, T ), to align closer with the dynamics of (1.1). Then, since σ is Lipschitz, existence and uniqueness of solutions hold for any (W, A, b) and initial condition x 0 . Equation (1.2) can be equivalently written as ẋ = p X w i (t)σ(a i (t) · x + b i (t)), (1.3) i=1 where w i and a i are respectively the p columns of W and the p rows of A, both seen as column vectors in R d , while b i is the i-th coordinate of b, for i = 1, . . . , p. In this work, we use formulation (1.3), although, for simplicity, we represent (w i , a i , b i ) pi=1 in their matrix form (W, A, b), which corresponds to the equivalent system (1.2). Equation (1.3) can be naturally extended to handle probability distributions, rather than points in R d , by interpreting its right-hand side as the advection field that drives the evolution of a measure ρ. This extension gives rise to the neural January 22, 2024" 2401.09903v1,", Global Parameters of Eight W UMa-type Binary Systems Atila Poro 1,2 , Mehmet Tanriver 3,4 , Raul Michel 5★ , Ehsan Paki 2 1 The Raderon AI Laboratory, Astronomy Department, BC., Burnaby, Canada 2 Binary Systems of South and North (BSN) Project, Tehran, Iran 3 Department of Astronomy and Space Science, Faculty of Science, University of Erciyes, TR-38039, Kayseri, Türkiye 4 Erciyes University, Astronomy and Space Science Observatory Application and Research Center, TR-38039, Kayseri, Türkiye 5 Observatorio Astronómico Nacional, Universidad Nacional Autónoma de México, Apartado Postal 877, Ensenada C.P. 22800, B.C., México ABSTRACT Multiband photometric investigations for eight binary systems of the W Ursae Majoris (W UMa)-type are presented. Six systems are presented for the first time to analyze their light curves. All the analyzed systems have a temperature below 5000 K and an orbital period of less than 0.28 days. We extracted primary and secondary minima from the ground-based observations of these systems. According to a few observations reported in the literature, linear fits were considered in the O-C diagrams, and new ephemerides were presented. Light curve solutions were performed using the PHysics Of Eclipsing BinariEs (PHOEBE) code. The results of the mass ratio and fillout factor indicate that the systems are contact binary stars. Six of them showed the O’Connell effect, and a cold starspot on each companion was required for light curve solutions. Their absolute parameters were estimated and evaluated by two other methods. In this study, the empirical relationship between the orbital period and semi-major axis was updated using a sample consisting of 414 contact binary systems and the Monte Carlo Markov Chain (MCMC) approach. Also, using Machine Learning (ML) and the Artificial Neural Network (ANN) model, the relationship between 𝑃 − 𝑇 1 − 𝑀 1 was updated for a better estimation of the mass of the primary star. Key words: eclipsing binary stars, photometry, individual (Eight binary systems) 1 INTRODUCTION W UMa-type binary systems (EWs) belong to contact binaries, which are considered eclipsing binaries. W UMa-type systems are important astrophysical tools for studying stars’ formation, structure, and evolution. Therefore, studying them provides insight into stellar evolution, including key stellar parameters such as mass, temperature, and surface gravity. There are many unresolved issues regarding W UMa systems in our knowledge, despite studies that attempt to answer them (Bradstreet & Guinan 1994, Qian 2003, Yakut & Eggleton 2005, Li et al. 2007, Eker et al. 2008, Eggleton 2012, Poro et al. 2024). Therefore, it is necessary to model various EW binary stars using observations and to accurately determine the basic physical parameters of the stars. W UMa stars consist of late spectral (A-K spectral type) main sequence stars with orbital periods of less than one day. However, recent studies show that hypercontact binary systems also include M spectral type stars (Terrell et al. 2012, Nefs et al. 2012, Drake et al. 2014b). In this study, we present photometric observations, light curve solutions, and the determination of astrophysical parameters for eight short orbital period binary systems. These binary systems including ATO J069.8679+53.7711 (hereinafter as J069), CRTS J213545.6+211104 (hereinafter as J213), CSS J004534.6+324435 (hereinafter as J004), CSS J073436.3+290946 ★ Corresponding author: rmm@astro.unam.mx © The Authors (hereinafter as J073), CSS J160934.4+351414 (hereinafter as J160), CSS J214144.0+213748 (hereinafter as J214), NSVS 11234970 (hereinafter as N112) and NSVS 5810460 (hereinafter as N581). The systems J069, J213, J004, J073, J160, J214, N581, and N112 were included in the Asteroid Terrestrial-impact Last Alert System (ATLAS) catalog (Heinze et al. 2018), and their apparent magnitudes were given in the 𝑔, 𝑟, 𝑖, 𝑧, and 𝑌 bands. In the Heinze et al. (2018) study, the classification of each light curve was made by applying the Fourier approximation. So, the variable systems J069 and J213 were classified as contact or near-contact eclipsing binaries 1 for which the Fourier fit had found the correct period. Hence, Heinze et al. (2018) fitted the primary and secondary eclipses separately and variable stars J073, J214, and N112 as contact or near-contact eclipsing binaries 2 . The J160 variable is classified as a star that exhibits sinusoidal changes 3 like ellipsoidal variables. The J004 and N581 variables are classified as stars showing modulated sinusoidal 1 CBF Close Binary, Full period, ATLAS catalog, https://vizier.cds. unistra.fr/viz-bin/VizieR?-source=J/AJ/156/241 2 CBH Close Binary, Half period, ATLAS catalog, https://vizier.cds. unistra.fr/viz-bin/VizieR?-source=J/AJ/156/241 3 SINE sinusoidal changes, ATLAS catalog, https://vizier.cds. unistra.fr/viz-bin/VizieR?-source=J/AJ/156/241" 2401.09918v1,"Probabilistic Truly Unordered Rule Sets Lincen Yang l.yang@liacs.leidenuniv.nl LIACS, Leiden University Niels Bohrweg 1, 2333 CA, Leiden, The Netherlands Matthijs van Leeuwen m.van.leeuwen@liacs.leidenuniv.nl LIACS, Leiden University Niels Bohrweg 1, 2333 CA, Leiden, The Netherlands Abstract Rule set learning has recently been frequently revisited because of its interpretability. Existing methods have several shortcomings though. First, most existing methods impose orders among rules, either explicitly or implicitly, which makes the models less comprehensible. Second, due to the difficulty of handling conflicts caused by overlaps (i.e., instances covered by multiple rules), existing methods often do not consider probabilistic rules. Third, learning classification rules for multi-class target is understudied, as most existing methods focus on binary classification or multi-class classification via the “one-versus-rest” approach. To address these shortcomings, we propose TURS, for Truly Unordered Rule Sets. To resolve conflicts caused by overlapping rules, we propose a novel model that exploits the probabilistic properties of our rule sets, with the intuition of only allowing rules to overlap if they have similar probabilistic outputs. We next formalize the problem of learning a TURS model based on the MDL principle and develop a carefully designed heuristic algorithm. We benchmark against a wide range of rule-based methods and demonstrate that our method learns rule sets that have lower model complexity and highly competitive predictive performance. In addition, we empirically show that rules in our model are empirically “independent” and hence truly unordered. Keywords: Rule sets, Probabilistic rules, MDL principle, Interpretable machine learning, Multi-class Classification 1 Introduction Despite the great success of black-box models in a wide range of tasks, intrinsically interpretable machine learning models have also received a lot of attention due to their transparency and hence their applicability to sensitive real-world scenarios, such as health care and judicial systems (Rudin, 2019). We particularly focus on modelling and learning probabilistic rule sets for multi-class classification. A probabilistic rule is in the form of IF X meets certain conditions, THEN P (Y ) = P̂ (Y ), in which X represents the feature variables, Y the target variable, and P̂ the associated class probability estimator. Rule-based methods have the unique advantage that they are not only accessible and interpretable to statisticians and data scientists but also to domain experts, since rules can be directly read. While a single rule summarizes a local pattern from the data and hence only describes a subset of the instances, existing rule-based methods adopt various approaches to put individual rules together to form a global predictive model. ©2024 Yang L. and van Leeuwen M.. License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/." 2401.09932v1,"Real-time and On-site Aerodynamics using Stereoscopic PIV and Deep Optical Flow Learning Mohamed Elrefaie a,b,d , Steffen Hüttig b , Mariia Gladkova c , Timo Gericke b,d , Daniel Cremers c , and Christian Breitsamter a a Chair of Aerodynamics and Fluid Mechanics, Technical University of Munich, Garching, Germany b Volkswagen AG, Wolfsburg, Germany c Chair of Computer Vision and Artificial Intelligence, Technical University of Munich, Garching, Germany d Corresponding authors: mohamed.elrefaie@tum.de, timo.gericke@volkswagen.de Abstract We introduce Recurrent All-Pairs Field Transforms for Stereoscopic Particle Image Velocimetry (RAFT-StereoPIV). Our approach leverages deep optical flow learning to analyze time-resolved and double-frame particle images from on-site measurements, particularly from the ’Ring of Fire,’ as well as from wind tunnel measurements for real-time aerodynamic analysis. A multi-fidelity dataset comprising both Reynolds-Averaged Navier-Stokes (RANS) and Direct Numerical Simulation (DNS) was used to train our model. RAFT-StereoPIV outperforms all PIV state-of-the-art deep learning models on benchmark datasets, with a 68 % error reduction on the validation dataset, Problem Class 2, and a 47 % error reduction on the unseen test dataset, Problem Class 1, demonstrating its robustness and generalizability. In comparison to the most recent works in the field of deep learning for PIV, where the main focus was the methodology development and the application was limited to either 2D flow cases or simple experimental data, we extend deep learning-based PIV for industrial applications and 3D flow field estimation. As we apply the trained network to three-dimensional highly turbulent PIV data, we are able to obtain flow estimates that maintain spatial resolution of the input image sequence. In contrast, the traditional methods produce the flow field of ∼16× lower resolution. We believe that this study brings the field of experimental fluid dynamics one step closer to the long-term goal of having experimental measurement systems that can be used for real-time flow field estimation. Keywords: Deep Optical Flow Learning, Car Aerodynamics, Stereoscopic PIV, Ring of Fire, Wind Tunnel Measurements et al. (2022), Yu et al. (2023), and Han and Wang (2023) demonstrating remarkable success in planar PIV evaluation. However, the complexity of real-world PIV measurements, such as those encountered in industrial applications, demands a more sophisticated approach than planar PIV can provide. In addition, as experimental setups become more intricate and the volume of analyzed data grows, the aforementioned traditional techniques can become computationally more intensive and time-consuming, thus for volumetric flow field quantification Lagrangian Particle Tracking is widely used. For instance, in highly complex experiments such as the Ring of Fire (RoF) Hüttig et al. (2023), Hüttig et al. (2024), or wind tunnel measurements Ladwig et al. (2023) where thousands of images need to be processed to analyze the three-dimensional flow, traditional stereoscopic PIV methods may prove insufficient in terms of efficiency and resolution. The considerable amount of data generated by the measurement systems necessitates extensive processing times for traditional methods, potentially demanding days or even weeks. To address the inherent limitations of con- 1. Introduction Particle Image Velocimetry (PIV) is a crucial method in experimental fluid mechanics for identifying velocity components in complex flow fields Adrian (2005). The flow medium is initially seeded with tiny particles. Then, a laser sheet is used to illuminate the flow domain so that the particles are visible and a camera records a sequence of images. Eventually, the velocity vectors of the flow can be estimated by analyzing the recorded images. The most commonly used techniques for flow field estimation from particle images are the cross-correlation and the optical flow methods Westerweel (1997). Given a sequence of particle images, the cross-correlation method produces a spatially sparse displacement field. In contrast, optical flow methods can provide a dense displacement field Adrian (2005). More recently, PIV processing has been approached using deep learning techniques Rabault et al. (2017), Lee et al. (2017), Cai et al. (2019), Cai et al. (2020), Zhang and Piggott (2020), Lagemann et al. (2021a), Lagemann et al. (2021b), Yu et al. (2021), Gao et al. (2021), Lagemann 1" 2401.09943v2,"Ruizhe Zhang 1* , Xinke Jiang 1* , Yuchen Fang 2∗ , Jiayuan Luo 2 , Yongxin Xu 1 , Yichen Zhu 3 , Xu Chu 1 , Junfeng Zhao 1 and Yasha Wang 1 1 Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education; School of Computer Science, Peking University 2 No affaliation 3 University of Toronto {nostradamus, xinkejiang}@stu.pku.edu.cn, fyclmiss@gmail.com, joyingluo@foxmail.com, xuyx@stu.pku.edu.cn, yichen zhu@foxmail.com, chu xu@pku.edu.cn, zhaojf@pku.edu.cn, Wangyasha@pku.edu.cn, Abstract Graph Neural Networks (GNNs) have shown considerable effectiveness in a variety of graph learning tasks, particularly those based on the messagepassing approach in recent years. However, their performance is often constrained by a limited receptive field, a challenge that becomes more acute in the presence of sparse graphs. In light of the power series, which possesses infinite expansion capabilities, we propose a novel Graph Power Filter Neural Network (GPFN) that enhances node classification by employing a power series graph filter to augment the receptive field. Concretely, our GPFN designs a new way to build a graph filter with an infinite receptive field based on the convergence power series, which can be analyzed in the spectral and spatial domains. Besides, we theoretically prove that our GPFN is a general framework that can integrate any power series and capture longrange dependencies. Finally, experimental results on three datasets demonstrate the superiority of our GPFN over state-of-the-art baselines 1 . 1 Introduction Graph neural networks (GNNs) have attracted significant attention in the research community due to their exceptional performance in a variety of graph learning applications, including social analysis [Qin et al., 2022; Matsugu et al., 2023] and traffic forecasting [Li et al., 2022; Gao et al., 2023; Jiang et al., 2023; Fang et al., 2023]. A prevalent method involves the use of message-passing [Kipf and Welling, 2016; Hamilton et al., 2017] technique to manage node features and the topology of the graph. Various layer types [Xu et al., 2019; Defferrard et al., 2016] like graph convolutional ∗ Ruize Zhang, Xinke Jiang, and Yuchen Fang contributed equally to this research. 1 Code is anonymously available at https://github.com/GPFN- Anonymous/GPFN.git (GCN) [Kipf and Welling, 2016] and graph attention layers (GAT) [Veličković et al., 2018] enable GNNs to capture complex relationships, enhancing their performance across multiple domains. However, despite their advancements in graph representation learning, message-passing-based GNNs still face certain limitations. GCN APPNP GPR-GNN 0.007 Graph Density (%) Infinite-Horizon Graph Filters: Leveraging Power Series to Enhance Sparse Information Aggregation 0.028 0.049 0.070 50 60 70 80 Accuracy (%) Figure 1: The influence of GCN [Kipf and Welling, 2016], APPNP [Gasteiger et al., 2022], and GPR-GNN [Eli Chien and Milenkovic, 2021] on the node classification task under different sparse situations. i) Long-range Dependencies: Balancing the trade-off between the receptive field size and feature distinctiveness is a challenging aspect in GNNs. On the one hand, deeper GNNs [Eli Chien and Milenkovic, 2021; Li et al., 2019; He et al., 2021] offer a larger receptive field, which allows for the incorporation of information from a broader range of the graph. However, this comes with the downside of feature homogenization across nodes, leading to the phenomenon known as over-smoothing. On the other hand, GNNs with shallower structures [Rusch et al., 2023], while avoiding over-smoothing, face limitations in capturing long-range dependencies due to their smaller receptive field. This limitation is particularly significant in real-world graphs, such as social networks or protein interaction networks, where understanding distant node relationships is crucial. ii) Graph Sparsity: A sparse graph is a type of graph in which the number of edges is relatively low compared to the total number of possible edges. Such graphs are common in" 2401.09949v1,"1 SymbolNet: Neural Symbolic Regression with Adaptive Dynamic Pruning Ho Fung Tsoi 1,* , Vladimir Loncar 2,3 , Sridhara Dasu 1 , Philip Harris 2,4 Abstract—Contrary to the use of genetic programming, the neural network approach to symbolic regression can scale well with high input dimension and leverage gradient methods for faster equation searching. Common ways of constraining expression complexity have relied on multistage pruning methods with fine-tuning, but these often lead to significant performance loss. In this work, we propose SymbolNet, a neural network approach to symbolic regression in a novel framework that enables dynamic pruning of model weights, input features, and mathematical operators in a single training, where both training loss and expression complexity are optimized simultaneously. We introduce a sparsity regularization term per pruning type, which can adaptively adjust its own strength and lead to convergence to a target sparsity level. In contrast to most existing symbolic regression methods that cannot efficiently handle datasets with more than O(10) inputs, we demonstrate the effectiveness of our model on the LHC jet tagging task (16 inputs), MNIST (784 inputs), and SVHN (3072 inputs). Index Terms—Symbolic Regression, Neural Network, Dynamic Pruning, Model Compression. I. I NTRODUCTION Symbolic regression (SR) is a supervised learning method that searches for analytic expressions that best fit the data. Unlike traditional regression methods such as linear and polynomial regression, SR can fit a much wider range of complex datasets since it does not require a pre-specified functional form, which itself is dynamically evolving in the fit. Embedding in symbolic forms facilitates human interpretation of the data so that one can potentially infer the underlying principle governing the observed system, as opposed to blackbox deep-learning (DL) models. For example, Max Planck in 1900 empirically fitted a formula to the data of blackbody radiation spectrum [1], known as Planck’s law; this symbolically fitted function inspired the physical derivation of the law and later led to the revolutionary development of quantum theory. On the other hand, because of its compact representation compared to most DL models, SR can also serve as a distillation method for model compression, which can be used to speed up inference time and reduce computational costs in resource-constrained environments. A major downside of SR is that it is a complex combinatorial problem, as the search space for equations grows exponentially with the number of its building blocks (i.e., variables, mathematical operators, and constants), and finding the best possible candidate has been shown to be NP-hard [2]. 1 University of Wisconsin-Madison, USA 2 Massachusetts Institute of Technology, USA Genetic programming (GP) has been the main approach to SR, which involves constructing an expression in a tree structure. The bottommost nodes of the tree are made up of constants and variables, while the nodes above them represent mathematical operations. It grows an expression tree in a way that mimics biological evolution, where node mutation and subtree crossover can take place to explore variations in expressions. Expression candidates are grouped into generations and take part in a tournament selection process, where individuals with the highest fitness score can survive and proceed to the next round. Despite their success in discovering human-interpretable solutions for most low-dimensional problems, these techniques are not suitable for large and highdimensional datasets because of their discrete combinatorial approach and long search time. Alternatively, SR can be realized in the DL framework, for example, by training a neural network (NN) with activation functions generalized to broader mathematical operations such as unary (·) 2 and sin(·), as well as binary + and ×. The NN is trained while enforcing sparse connections so that the final expressions unrolled from the NN are compact enough to be human-interpretable or efficiently deployable in a resourceconstrained environment. Apart from being able to leverage faster gradient-based optimization, the searching process can also be implemented on GPUs to accelerate both training and inference, while GP-based algorithms are limited to CPUs. The key ingredient in training an NN that produces reasonable SR results with a good balance between model performance and complexity is sparsity control. However, most recent developments in the use of NN for SR have relied on less efficient pruning methods to meet the demand for sparsity, which require multiple training phases with a hard-threshold pruning followed by fine-tuning. These multistage frameworks often lead to significant performance compromise, as accuracy and sparsity are optimized in separate training phases. The absence of an effective integration of a sparsity control scheme prevents DL approaches from taking full advantage of their potential to enable SR to be applied to a wider range of problems. In this contribution, we introduce SymbolNet † , a DL approach to SR using NN in a novel and SR-dedicated pruning framework with the following properties: • End-to-end single-phase dynamic pruning. There is only one training phase needed without fine-tuning. It does not require a pre-specified threshold to perform a 3 Institute of Physics Belgrade, Serbia 4 Institute for Artificial Intelligence and Fundamental Interactions, USA * Email: ho.fung.tsoi@cern.ch † A tensorflow [3] implementation code is available at https://github.com/ hftsoi/SymbolNet" 2401.09951v1,"1 Performance Evaluation of a Full-Duplex UWA System in Lake Experiments Lu Shen, Member, IEEE, Benjamin Henson, Member, IEEE, Long Shi, Member, IEEE, Yuriy Zakharov, Senior Member, IEEE Abstract—In this work we present a full-duplex (FD) underwater acoustic (UWA) communication system simultaneously transmitting and receiving acoustic signals in the same frequency bandwidth. To simplify the FD hardware, the system exploits a recently designed transducer capable of simultaneously transmitting and receiving signals. The key challenge of implementing an FD system is to cancel at the near-end receiver the strong self-interference (SI) from the near-end transmitter. By using advanced adaptive filtering algorithms providing high accuracy channel estimates, a high level of SI cancellation can be achieved when the far-end signal is absent. However, the SI channel estimation performance is limited in FD scenarios since the farend signal acts as an interference when estimating the near-end SI channel. In this paper, we propose an FD UWA communication system which alternates between the SI cancellation and farend data demodulation. An adaptive Rake combiner with multipath interference cancellation is implemented to improve the demodulation performance in time-varying multipath channels. The performance of the FD UWA system is evaluated in lake experiments. It is shown that the proposed adaptive Rake combiner with multipath interference cancellation significantly outperforms the conventional Rake combiner in all the experiments. The experimental results demonstrate that, with the new Rake combiner, the detection performance of the proposed FD UWA system is comparable with that of the half-duplex system. Index Terms—Adaptive filter, Channel estimation, Full-duplex, Rake combiner, Self-interference cancellation, Underwater acoustics. I. I NTRODUCTION Underwater acoustic (UWA) communication suffers from limited frequency bandwidth for data transmission [1]. To increase the spectral efficiency within the available bandwidth, we consider the full-duplex (FD) operation, which allows a simultaneous transmission and reception of acoustic signals in the same frequency bandwidth [2]–[5]. Apart from the far-end signal, the near-end receiver also receives a strong self-interference (SI) signal from the near-end transmitter. Therefore, a high level of SI cancellation (SIC) is required to detect the weak desired signal arriving from the far-end transmitter. In FD UWA systems, the spatial-domain SIC can be used for the SI suppression. In [6], a spatial SIC scheme is proposed, L. Shen, B. Henson and Y. Zakharov are with School of Physics, Engineering, and Technology, University of York, U.K. (e-mail: lu.shen@york.ac.uk; benjamin.henson@york.ac.uk; yury.zakharov@york.ac.uk). L. Shi is with School of Economic Information Engineering, Southwestern University of Finance and Economics. The work of L. Shen, B. Henson and Y. Zakharov was supported in part by the U.K. EPSRC through Grants EP/P017975/1 and EP/R003297/1. Part of the materials in this paper was presented at the Sixth Underwater Communications and Networking Conference (Ucomms) in Lerici, Italy. which uses a phased array of transducers and acoustic vector sensors. The SIC is achieved by adjusting the beampattern of the phased array based on the direction of arrivals estimated by the acoustic vector sensors. Sea experimental results demonstrate a spatial SIC of 40 to 60 dB depending on the steering angle of the near-end transducer. In [7], an FD UWA system with a combination of spatial SIC and digital SIC is proposed and investigated in an anechoic pool; this system requires the knowledge of the direction of the far-end transmitter, which is not always available in practice. UWA communication systems with antenna arrays are difficult for practical implementation. However, even without using an antenna array, in an FD system, typically the transmitting and receiving transducers are two separate devices. In [8], we proposed an FD transducer that can be used for simultaneous transmission and reception of acoustic signals. We use this transducer in our UWA FD experiments. For FD terrestrial radio communications, a combination of analogue and digital cancellation is normally used. Analogue cancellation is applied before digital cancellation to avoid the analogue-to-digital converter (ADC) saturation [2]–[4]. In FD UWA systems, compared to terrestrial radio systems, low-frequency signals are transmitted. In such a case, high resolution ADCs up to 24 bits can be used, which makes it feasible to achieve a high level of cancellation in the digital domain alone. Therefore, digital cancellation is considered as the main SIC approach in FD UWA systems [9]–[12]. In this work, we implement and investigate the performance of an FD UWA system with digital cancellation. Two factors limiting the digital SIC performance in FD UWA systems are nonlinearities introduced by the equipment [9], [13], [14] and fast variation of the SI channel [11], [12]. The dominant source of the nonlinearities is the power amplifier (PA). It is found that the SIC performance can be significantly improved by using the PA output as the reference signal (regressor) for SI channel estimation compared to the case of using the original digital data [13], [15]. After addressing the nonlinearities caused by the PA, a high level of digital SIC can be achieved in time-invariant scenarios with a classical recursive least-squares (RLS) adaptive filter [16]. In practice, the SI channel can be fast time-varying, e.g., due to reflections from the moving sea surface [17]. To achieve a high level of digital SIC in time-varying scenarios, advanced adaptive filtering algorithms with good tracking performance have been recently proposed [11], [12], [18], [19]. The SIC performance provided by these adaptive algorithms has been evaluated in shallow lake experiments. However, in those" 2401.09974v1,"The proton-neutron resonance states by solving Schrodinger equation Bao-Xi Sun, 1, ∗ Qin-Qin Cao, 1, † and Ying-Tai Sun 2, ‡ 1 School of Physics and Optoelectronic Engineering, Beijing University of Technology, Beijing 100124, China 2 School of Mechanical and Materials Engineering, North China University of Technology, Beijing 100144, China (Dated: January 19, 2024) The proton-neutron interaction is investigated by solving the Schrodinger equation, where a Yukawa type of potential with one pion exchanging between the proton and the neutron is assumed. Since the deutron is the unique bound state of the proton-neutron system, the coupling constant is fixed according to the binding energy of the deutron. The scattering process of the proton and the neutron is studied when the outgoing wave condition is taken into account, and two proton-neutron resonance states are obtained by solving the Schrodinger equation, which lie at 1905 − i13MeV and 2150 − i342MeV on the complex energy plane, respectively. It is no doubt that the calculation results would give some hints on the experimental research on the proton-neutron interaction in future. PACS numbers: I. INTRODUCTION The non-Hermitian physics has caused more interests of theorists in the past decade, and its methods are applied in different areas of physics, such as condensed matter physics, optics and nuclear physics. More detailed statements on this topic can be found in the review articles[1, 2]. However, in the study of exotic hadrons, the non-Hermitian character is not discussed yet. Two kinds of situations are often discussed in the non- Hermitian physics. Firstly, the Hamiltonian of the system is non-Hermitian, and the eigenfunctions and their biorthogonal normalization are evaluated. In order to study the non-Hermitian properties, a non-Hermitian system is constructed in the laboratory[3, 4]. In the traditional quantum mechanics, the Hamiltonian of a physical system is defined as a Hermite operator. However, this definition is based on the constraint of bound states, where the wave function tends to zero at the infinity. If this constraint condition is eliminated, for example, in the scattering process, the whole system will be non- Hermitian although the Hamiltonian of the system still takes a Hermite form in some special representations. Since the non-Hermitian properties of an operator depend not only on the operator itself but also on the properties of the wave functions, the Hamiltonian in a non- Hermitian system can have complex eigenvalues[5]. It is apparent that the wave function is not zero at the infinity in the scattering process, thus the scattering process can be treated as a non-Hermitian problem. In Ref. [5], the scattering process in a square well is studied, and the bound states below the threshold and the resonance ∗ Electronic address: sunbx@bjut.edu.cn † Electronic address: s202166092@emails.bjut.edu.cn ‡ Electronic address: 3071450876@qq.com states above the threshold are obtained respectively by solving the Schrodinger equation with different boundary conditions of the wave function. The deutron can be regarded as a proton-neutron(pn) bound state, and the structure of the deutron is investigated by solving the Schrodinger equation in the S-wave approximation, where a Yukawa type of potential is assumed between the proton and the neutron[6]. With the method of variable substitution, the radial Schrodinger equation takes a form of the Bessel equation in the S- wave approximation, and the solution for the bound state corresponds to the Bessel function. When the scattering process of the proton and the neutron is taken into account, the first and second kinds of Hankel functions are also solutions of the radial Schrodinger equation, and represent the incoming wave and the outgoing wave respectively. Therefore, the coupling constant of the proton and the neutron in the Yukawa type of potential is determined according to the binding energy of the deutron. Under the outgoing wave condition, the zero point of the second kind of Hankel function would correspond to the proton-neutron resonance state in the scattering process, and the position of the resonance state on the complex energy plane is related to the order of the second kind of Hankel function, which is complex when the outgoing wave condition is satisfied. In this work, the proton-neutron scattering process is studied by solving the Schrodinger equation when the wave function does not disappear at the infinity, and two pn resonance states are obtained, which lie at 1905 − i13MeV and 2150 − i342MeV on the complex energy plane, respectively. Moreover, this method is extended to study the meson-meson interaction, and a series of hadronic resonance states are generated dynamically when the meson-meson scattering process is considered[7]. The whole article is organized as follows: The pn bound state is discussed shortly in Section II, and then" 2401.09976v1,"Astronomy & Astrophysics manuscript no. satConSpectro January 19, 2024 ©ESO 2024 Contamination of spectroscopic observations by satellite constellations O. R. Hainaut 1 and S. Moehler 1 European Southern Observatory, Karl-Schwarzschild-Straße, 2 85470 Garching-bei-München, Germany e-mail: ohainaut@eso.org Received – ; accepted – ABSTRACT Context. With the onset of large telecommunication constellations, the number of satellites on low orbit has dramatically increased over the past years, raising concerns among the astronomical community about their impact on observations. Aims. Because spectroscopic observations represent a large fraction of professional astronomical observations, and because spectrographs lack spatial information that can reveal the presence of a satellite, this paper focuses on how satellites affect spectroscopic optical observations. Methods. We simulated how often satellites contaminate spectrograph observations by using realistic constellations with over 400,000 objects. We counted the satellites that crossed a representative 10 × 1 ′′ slit during a 1000 s exposure, for different solar elevations and observation directions. We also measured how a satellite affects a spectrum by using real data from different scientific targets and a scaled solar analogue as the satellite. We then used standard tools to measure astrophysical parameters and compare them with the clean spectrum. Results. As expected, the fraction of affected spectra varies dramatically with the direction of observation and the elevation of the sun, with a maximum of 10% at twilight down to no contamination when the sun reaches −30 ◦ , with a nightly average of ∼ 2%. The probability of a satellite crossing over the astronomical target will be further reduced depending on the target’s apparent size. Because of the fast motion of the satellites and the limiting magnitude of the spectrographs, high-resolution instruments are essentially blind to most satellites. For lower resolution spectrographs, the effect on the measured astrophysical parameters depends strongly on the signal-to-noise of the exposure, longer exposures on brighter targets being the least affected at ≲ 1%. Satellites that are brighter and/or higher than the constellation satellites, while less numerous, can also contaminate spectra. Conclusions. Satellites, either from a large constellation or not, have the potential to contaminate spectra. While the fraction of affected spectra is likely to remain low even with a number of satellites about 100× larger than today, some of these contaminated spectra will be difficult to identify, as it is already the case with existing satellites and asteroids. The best mitigation is to ensure that their brightness is fainter than V = 7, that satellites’ absolute magnitude V 1000km is also fainter than 7, and whenever possible to shoot multiple exposures. Key words. Techniques: spectroscopic – abundances – Light pollution 1. Introduction While artificial satellites have been orbiting the Earth since 1957, their number has recently increased dramatically from around 1500 in 2015 to over 5000 today (McDowell 2023a). The main contribution to this increased is the result of large satellite constellations providing global internet coverage. Several constellation operators have plans to launch over 500 000 satellites to low altitude orbits over the coming years (McDowell 2023b). The fate of many of these companies in uncertain. The maximum number of satellites that can be safely operated on low altitude orbit and the sustainability of such endeavour are a matter of debate Lawrence et al. (2022). Nevertheless, it is clear that the number of low altitude satellites will continue to increase over the coming years. As of today, the main constellation operators are SpaceX, whose Starlink constellation already has over 4500 satellites in orbit, and OneWeb, with over 600 satellites launched. This large —and increasing— number of satellites will have a series of environmental impacts (Lawrence et al. 2022, for a discussion), and will impact ground- and orbit-based astronomical observations in the optical and radio ranges. The Interna- tional Astronomical Union has set up a “Centre for the protection of the dark and quiet sky from satellite constellation interference” (CPS 1 ) to bring the astronomical communities, satellite operators, policy makers and community together, and consolidate and share data and information related to these interferences. A series of international conferences —SatCon-1, Walker et al. (2020b), and -2, Hall et al. (2021), Dark and Quiet Skies 1, Walker et al. (2020a), and 2, Walker et al. (2021)— took place over the past years to exchange information, raise awareness, discuss policies across all stakeholders; their reports constitute very good reviews of the issues at hand. These reports also discuss the impacts on the environment and on radio astronomy, as well as mitigation methods. In previous papers (Hainaut & Williams 2020; Bassa et al. 2022), we evaluated and quantified the impact of satellite constellations on astronomical observations in the optical, using simulated plausible future constellations and a series of representative instrumental set-up. While many parameters must be considered in the simulations (number of satellites and their altitude, location of the observatory, time of the observations, type 1 https://cps.iau.org Article number, page 1 of 10" 2401.09977v1,"Material-Response-Informed DeepONet and its Application to Polycrystal Stress-strain Prediction in Crystal Plasticity Junyan He 1∗ , Deepankar Pal 1 , Ali Najafi 1 , Diab Abueidda 3 , Seid Koric 2,3 , Iwona Jasiuk 2 1 2 Ansys Inc., Canonsburg, PA, USA Department of Mechanical Science and Engineering, University of Illinois at Urbana-Champaign, Urbana, IL, USA 3 National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign, Urbana, IL, USA Abstract Crystal plasticity (CP) simulations are a tool for understanding how microstructure morphology and texture affect mechanical properties and are an essential component of elucidating the structureproperty relations. However, it can be computationally expensive. Hence, data-driven machine learning models have been applied to predict the mean-field response of a polycrystal representative volume element to reduce computation time. In this work, we proposed a novel Deep Operator Network (DeepONet) architecture for predicting microstructure stress-strain response. It employs a convolutional neural network in the trunk to encode the microstructure. To account for different material properties, boundary conditions, and loading, we proposed using single crystal stressstrain curves as inputs to the branch network, furnishing a material-response-informed DeepONet. Using four numerical examples, we demonstrate that the current DeepONet can be trained on a single material and loading and then generalized to new conditions via transfer learning. Results show that using single crystal responses as input outperforms a similar model using material properties as inputs and overcomes limitations with changing boundary conditions and temporal resolution. In all cases, the new model achieved a R 2 value of above 0.99, and over 95% of predicted stresses have a relative error of ≤ 5%, indicating superior accuracy. With as few as 20 new data points and under 1min training time, the trained DeepONet can be fine-tuned to generate accurate predictions on different materials and loading. Once trained, the prediction speed is almost 1 × 10 4 times faster the CP simulations. The efficiency and high generalizability of our DeepONet render it a powerful data-driven surrogate model for CP simulations in multi-scale analyses. Keywords: Deep Operator Network (DeepONet), Crystal Plasticity (CP), Representative Volume Element (RVE), Stress-strain Curve, Homogenization, 1. Introduction It is well-known that the microstructure of polycrystalline materials significantly influences the material response (Zhao et al., 2021; Keller et al., 2011). Recent advancements in modern additive manufacturing (AM) techniques have allowed accurate control of the manufacturing process parameters, and the microstructure can be tailored (Liu et al., 2022a) to achieve desired mechani- ∗ Corresponding author Email address: jimmy.he@ansys.com (Junyan He 1 ) Preprint submitted to Elsevier January 19, 2024" 2401.09989v1,"Power Grid Parameter Estimation Without Phase Measurements: Theory and Empirical Validation Keith Moffat Florian Dörfler Jean-Sébastien Brouillon Giancarlo Ferrari Trecate Department of Information Technology and Electrical Engineering Institute of Mechanical Engineering ETH Zürich Ecole Polytechnique Fédérale de Lausanne Zürich, Switzerland Lausanne, Switzerland {kmoffat, dorfler}@ethz.ch {jean-sebastien.brouillon, giancarlo.ferraritrecate}@epfl.ch Abstract—Reliable integration and operation of renewable distributed energy resources requires accurate distribution grid models. However, obtaining precise models is often prohibitively expensive, given their large scale and the ongoing nature of grid operations. To address this challenge, considerable efforts have been devoted to harnessing abundant consumption data for automatic model inference. The primary result of the paper is that, while the impedance of a line or a network can be estimated without synchronized phase angle measurements in a consistent way, the admittance cannot. Furthermore, a detailed statistical analysis is presented, quantifying the expected estimation errors of four prevalent admittance estimation methods. Such errors constitute fundamental model inference limitations that cannot be resolved with more data. These findings are empirically validated using synthetic data and real measurements from the town of Walenstadt, Switzerland, confirming the theory. The results contribute to our understanding of grid estimation limitations and uncertainties, offering guidance for both practitioners and researchers in the pursuit of more reliable and cost-effective solutions. Index Terms—Distribution Grid, Parameter estimation, Smart meters, Network identification I. I NTRODUCTION The deployment of sensors and machine learning techniques on power grids has opened a new set of power system monitoring applications. Among them, line parameter and topology estimation may play a crucial role for deploying smart energy resources [1]–[7]. This is specially needed at the distribution level, as Distribution System Operators (DSOs) often lack accurate models of their Distribution Grids (DGs) 1 . Many recent studies have shown that physical models of a distribution grid can be estimated from synchronized voltage and current measurements [8]–[12]. However, micro synchrophasor measurement units (µPMUs) remain expensive and therefore mostly absent in DGs. Sensor costs motivate grid analysis that does not rely on accurate phase angle measurements, as voltage and cur- This research is supported by the Swiss National Science Foundation under the NCCR Automation (grant agreement 51NF40 180545). 1 We focus on distribution network applications in this paper, however the analysis applies to transmission networks as well. rent magnitude sensors are considerably cheaper than µPMU sensors. Smart meter sensors [13] are becoming ubiquitous for measuring power consumption. The load—coverage in European DGs is already above 70% [14]. Thus, the question whether it is possible to accurately estimate grid impedance or admittance without synchronized phase angle measurements is of practical importance. This paper investigates the feasibility of impedance and admittance estimation from voltage and current magnitude and power angle measurements only. Given that phase angles are typically small in DGs, one might consider applying the methods used for synchronized measurements with a zero angle. However, recent research demonstrates that such an approach results in an inconsistent estimate [15], even when employing Error-in-Variables (EIV) methods, e.g., the Total Least Squares (TLS). Consistency is critical when estimating DG parameters because the stability of the voltage operating point leads to a low Signal-to-Noise Ratio (SNR), which can only be mitigated by collecting a large volume of data. Prior research has improved the accuracy of power system parameter estimation from smart meter measurements. The authors of [16] attempted to simultaneously estimating phase angles and parameters, which reduced the estimation error in some cases but did not provide consistency guarantees. A similar approach is employed in [17], where µPMUs are added at some nodes to mitigate inconsistencies, albeit not eliminating them entirely. A more recent development [18] focuses on canceling the phase variable out of the current flow equations. This reduction yields consistent estimates of X/R ratios and certain transformations of conductance and susceptance, but not of these quantities themselves. Alternatively, some studies such as [19] have chosen to estimate impedance rather than admittance, but inverting the impedance estimates also results in accuracy issues [12]. In this paper, we aim to enhance our understanding of existing estimation methods by quantifying their inherent biases, i.e., their expected estimation errors. Our contribution can be summarized in three main aspects. We first present a detailed statistical model for common DG sensors and utilize it to express the biases associated with each estimation method in a single-line identification setup. Notably, we reveal 23rd Power Systems Computation Conference Paris, France — June 4 – 7, 2024 PSCC 2024" 2401.09998v1,"On the anti-concentration functions of some familiar families of distributions Ze-Chun Hu 1,∗ , Renming Song 2 and Yuan Tan 1 1 College of Mathematics, Sichuan University, Chengdu 610065, China 2 Department of Mathematics, University of Illinois Urbana-Champaign, Urbana, IL 61801, USA Abstract Let {X α } be a family of random variables following a certain type of distributions with finite expectation E[X α ] and finite variance Var(X α ), where α is a parameter. Motivated by the recent paper of Hollom and Portier  (arXiv: 2306.07811v1), we  study the p anti-concentration function (0, ∞) ∋ y → inf α P |X α − E[X α ]|≥ y Var(X α ) and find its explicit expression. We show that, for certain familiar families of distributions, including uniform distributions, exponential distributions, non-degenerate Gaussian distributions and student’s t-distribution, the anti-concentration function is not identically zero, while for some other familiar families of distributions, including binomial, Poisson, negative binomial, hypergeometric, Gamma, Pareto, Weibull, log-normal and Beta distributions, the anti-concentration function is identically zero. MSC: 60E07, 60E15. Keywords: Distribution, measure anti-concentration. 1 Introduction P n Let R be the family of random variables of the form X = k=1 a k ε k , where n ≥ 1, a k , k = 1, . . . , n, P n 2 are real numbers with k=1 a k = 1, and ε k , k = 1, 2, . . . , are independent Rademacher random variables (i.e., P(X k = 1) = P(X k = −1) = 1/2). Tomaszewski’s conjecture, see [3], can be stated as P(|X|≤ 1) ≥ 1/2 for all X ∈ R. Tomaszewski’s conjecture has many applications in probability theory, geometric analysis and computer science. Corresponding author. E-mail addresses: zchu@scu.edu.cn (Z.C. Hu), rsong@illinois.edu (R. Song), 630769091@qq.com (Y. Tan). ∗ 1" 2401.10005v1,"Advancing Large Multi-modal Models with Explicit Chain-of-Reasoning and Visual Question Generation Kohei Uehara 1, 2 Nabarun Goswami 1, 2 Hanqin Wang 1 Toshiaki Baba 1, 2 1, 2 1, 2 1, 2 Kohtaro Tanaka Tomohiro Hashimoto Kai Wang Rei Ito 1 Takagi Naoya 1, 2 Ryo Umagami 1 Yingyi Wen 1 Tanachai Anakewat 1, 2 Tatsuya Harada 1, 2 1 The University of Tokyo, 2 RIKEN {uehara, nabarungoswami, wang, baba, k-tanaka, hashimoto, wang-kai, ito, takagi, umagami, wenyy, anakewat, harada}@mi.t.u-tokyo.ac.jp Abstract Question: What brand of candy is shown here? Answer: mike and ike The increasing demand for intelligent systems capable of interpreting and reasoning about visual content requires the development of Large Multi-Modal Models (LMMs) that are not only accurate but also have explicit reasoning capabilities. This paper presents a novel approach to imbue an LMM with the ability to conduct explicit reasoning based on visual content and textual instructions. We introduce a system that can ask a question to acquire necessary knowledge, thereby enhancing the robustness and explicability of the reasoning process. Our method comprises the development of a novel dataset generated by a Large Language Model (LLM), designed to promote chain-of-thought reasoning combined with a question-asking mechanism. We designed an LMM, which has high capabilities on region awareness to address the intricate requirements of imagetext alignment. The model undergoes a three-stage training phase, starting with large-scale image-text alignment using a large-scale datasets, followed by instruction tuning, and fine-tuning with a focus on chain-of-thought reasoning. The results demonstrate a stride toward a more robust, accurate, and interpretable LMM, capable of reasoning explicitly and seeking information proactively when confronted with ambiguous visual input. Initial Reasoning Reasoning with Questioning 1. I observe a scene where a person is decorating a cake with frosting and candy. [Uncertainty Score: 1] 1. I observe a scene where a person is decorating a cake with frosting and candy. [Uncertainty Score: 1] 2. The cake is placed on a dining table surrounded by several bowls. [Uncertainty Score: 1] 2. The cake is placed on a dining table surrounded by several bowls. [Uncertainty Score: 1] 3. Among the objects present, one of 3. Among the objects present, one of the the bowls appears to contain candy. bowls appears to contain candy. [Uncertainty Score: 2] [Uncertainty Score: 2] 4. There is no explicit mention of the type or brand of candy in the given description of the image. [Uncertainty Score: 1] [+] Question to knowledgeable person: Can you describe the visual appearance or packaging characteristics of popular candy brands? 5. Without additional information on the appearance or label of the candy, it's challenging to identify its brand. [Uncertainty Score: 8] [+] Answer: Mike and Ike candies are oblong, chewy, fruit-flavored candies often found in a colorful box; Skittles are small, round, and brightly colored; M&M's have 6. Therefore, the brand of the candy an ""m"" printed on them and are round on the table is uncertain. [Uncertainty chocolate candies; Starburst are square, fruit-flavored chews wrapped individually. Score: 10] [+] 4. Comparing the candies in the bowl to the described characteristics, the candies most closely resemble Mike and Ike based on their oblong shape and appearance. [Uncertainty Score: 3] [+] 5. Thus, the brand of candy shown in the image is identified as Mike and Ike. [Uncertainty Score: 2] Figure 1. An example of the explicit reasoning steps we aim to achieve, also representing a sample from our constructed dataset. It demonstrates the thought process in response to a given question. Notably, we incorporate a question generation step into the reasoning process (as seen on the right side of the figure), allowing the model to interactively acquire knowledge and refine its reasoning steps. 1. Introduction In recent years, Large Language Models (LLMs) have gained significant popularity in the field of artificial intelligence [5, 35, 48]. Building upon this, research has progressed into Large-scale Multi-modal Models (LMMs) [11, 21, 26, 27]. Our study specifically focuses on tasks involving both vision and language modalities. Generally, LMMs learn the alignment between images and texts using large datasets sourced by web crawling. They are then fine-tuned with smaller, high-quality datasets for instruction tuning to enhance their text generation capabilities for various tasks. 1" 2401.10009v1,"An optimization-based equilibrium measure describes non-equilibrium steady state dynamics: application to edge of chaos Junbin Qiu 1 and Haiping Huang 1,2∗ 1 PMI Lab, School of Physics, Sun Yat-sen University, Guangzhou 510275, People’s Republic of China and 2 Guangdong Provincial Key Laboratory of Magnetoelectric Physics and Devices, Sun Yat-sen University, Guangzhou 510275, People’s Republic of China (Dated: January 19, 2024) Understanding neural dynamics is a central topic in machine learning, non-linear physics and neuroscience. However, the dynamics is non-linear, stochastic and particularly non-gradient, i.e., the driving force can not be written as gradient of a potential. These features make analytic studies very challenging. The common tool is to use path integral approach or dynamical mean-field theory, but the drawback is one has to solve the integro-differential or dynamical mean-field equations, which is computationally expensive and has no closed form solutions in general. From the aspect of associated Fokker-Planck equation, the steady state solution is generally unknown. Here, we treat searching for the steady state as an optimization problem, and construct an approximate potential closely related to the speed of the dynamics, and find that searching for the ground state of this potential is equivalent to running a stochastic gradient dynamics. The resultant stationary state follows exactly the canonical Boltzmann measure. Within this framework, the quenched disorder intrinsic in the neural networks can be averaged out by applying the replica method. Our theory reproduces the well-known result of edge-of-chaos, and further the order parameters characterizing the continuous transition are derived, and different scaling behavior with respect to inverse temperature in both sides of the transition is also revealed. Our method opens the door to analytically study the steady state landscape of the deterministic or stochastic high dimensional dynamics. I. INTRODUCTION Non-equilibrium dynamics is a central topic of statistical physics [1–3], from which general fluctuation-dissipation relations can be established [4–6], and path integral approach was developed to derive the relationship between correlation and response function of the dynamics [7–9]. One benchmark for testing or deriving theoretical hypotheses is the Langevin dynamics with conservative (expressed as gradient of a potential) or nonconservative forces, including Ising spin glass dynamics [10], steady state thermodynamics [11], and neural dynamics with partially symmetric couplings [12]. These studies always resort to dynamical mean-field theory (DMFT) [13, 14], where all possible trajectory paths are integrated to give a physical action, from which correlation and response functions are derived as an optimization of the action [15]. In a general context, the dynamics would be very complicated, e.g., non-gradient and highly coupled, which makes the DMFT very complicated, and even it remains unknown how to capture the steady state properties of these dynamics. It is commonly observed that the speed of dynamics determines whether the system enters a steady state and thus can be identified [16]. In this paper, we propose a new angle that only the low-speed or zero speed region of the phase space is considered. In this sense, one can write down an energy cost function to optimize for satisfying this speed constraint. This optimization can be formulated under the stochastic gradient dynamics, where a temperature like parameter is introduced. This temperature plays the same role as in the canonical Boltzmann measure. In fact, in the zero temperature and stationary limit, the gradient dynamics are self-consistent with the original general dynamics. Therefore, if the ground state of the energy cost is concentrated on, one can capture the steady state properties of the original phase space. This has an additional benefit that powerful equilibrium concepts such as Boltzmann measure, phase transitions, and order parameters can be leveraged [17]. We verify our framework in recurrent neural networks with asymmetric couplings, where the deterministic dynamics yields order-to-chaos transition [18, 19]. We are able to handle the quenched disorder due to the coupling statistics with the help of replica method, a powerful trick in spin glass theory [20]. Furthermore, two types of order parameters are derived; one describes the network activity, while the other describes the response property of the dynamic system. The former order parameter exhibits a continuous phase transition from null to positive value as the network ∗ Electronic address: huanghp7@mail.sysu.edu.cn" 2401.10015v2,"Towards Hierarchical Spoken Language Disfluency Modeling Jiachen Lian UC Berkeley jiachenlian@berkeley.edu Abstract Speech disfluency modeling is the bottleneck for both speech therapy and language learning. However, there is no effective AI solution to systematically tackle this problem. We solidify the concept of disfluent speech and disfluent speech modeling. We then present Hierarchical Unconstrained Disfluency Modeling (H-UDM) approach, the hierarchical extension of Lian et al. (2023c) that addresses both disfluency transcription and detection to eliminate the need for extensive manual annotation. Our experimental findings serve as clear evidence of the effectiveness and reliability of the methods we have introduced, encompassing both transcription and detection tasks. 1 Introduction Spoken language disfluency modeling is the core technology in speech therapy and language learning. According to NIDCD (2016), an estimated 17.9 million adults and 1.4 percent of children in the U.S. suffer from chronic communication and speech disorders. Currently, hospitals have to invest substantial resources in hiring speech and language pathologists (SLPs) to manually analyze and provide feedback. More importantly, the cost is not affordable for low-income families. Kids’ speech disorders also have a significant connection to the language learning market. According to a report by VCL (2021), the English language learning market will reach an estimated value of 54.8 billion by 2025. Unfortunately, there is not an AI tool that can effectively automate this problem. In current research community, there is not a unified definition for disfluent speech, as mentioned in Lian et al. (2023c). As such, we solidify the definition of disfluent speech as any form of speech characterized by abnormal patterns such as repetition, replacement, and irregular pauses, as summarized in Lian et al. (2023c). Within the domain of disfluent speech modeling, research efforts are Gopala Anumanchipalli UC Berkeley gopala@berkeley.edu conducted both on the speech side and the language side. Whenever disfluent speech transcription is given (such as human transcription in Figure 1), the problem can be tackled by LLMs (OpenAI et al., 2023). However, such transcription is not available and current best ASR systems such as Radford et al. (2023) tend to recognize them as perfect speech. Thus, we argue that the bottleneck lies in the speech side rather than in language. Unfortunately, there is also no established definition for the problem of speech disfluency modeling. We formally define that speech disfluency modeling is to detect all types of disfluencies at both the word and phoneme levels while also providing a time-stamp for each type of disfluency. In other words, disfluency modeling should be hierarchical and time-accurate. Previous research has mainly focused on a small aspect of this problem. Researchers started by focusing on spotting stuttering using end-to-end methods. They manually tagged each utterance and developed the classification model at the utterance level (Kourkounakis et al., 2021; Alharbi et al., 2017, 2020; Jouaiti and Dautenhahn, 2022). Later on, things got detailed with frame-level stutter detection (Harvill et al., 2022; Shonibare et al., 2022). However, end-toend methods have their limitations. First, stuttering is just one aspect of disfluency. Current end-to-end models struggle to handle other forms of disfluency effectively. Second, manually labeling data for these methods is a lot of work and not practical for larger-scale projects. Lastly, disfluency modeling depends on the specific text being spoken, a factor that has been overlooked in previous research, as pointed out in Lian et al. (2023c). It is typically intuitive to consider speech transcription that offers disfluency-specific representations. For a long time, the mainstream of researchers in speech transcription has been focused on word-level automatic speech recognition (ASR), which has been further scaled. However, The most" 2401.10045v1,"Antonym vs Synonym Distinction using InterlaCed Encoder NETworks (ICE-NET) Muhammad Asif Ali, 1 Yan Hu, 1 Jianbin Qin, 2 Di Wang 1 King Abdullah University of Science and Technology, KSA 2 Shenzhen University, China {muhammadasif.ali, yan.hu, di.wang}@kaust.edu.sa, qinjianbin@szu.edu.cn 1 Abstract Antonyms vs synonyms distinction is a core challenge in lexico-semantic analysis and automated lexical resource construction. These pairs share a similar distributional context which makes it harder to distinguish them. Leading research in this regard attempts to capture the properties of the relation pairs, i.e., symmetry, transitivity, and trans-transitivity. However, the inability of existing research to appropriately model the relation-specific properties limits their end performance. In this paper, we propose InterlaCed Encoder NET- works (i.e., ICE-NET) for antonym vs synonym distinction, that aim to capture and model the relation-specific properties of the antonyms and synonyms pairs in order to perform the classification task in a performance-enhanced manner. Experimental evaluation using the benchmark datasets shows that ICE-NET outperforms the existing research by a relative score of upto 1.8% in F1-measure. We release the codes for ICE-NET at https://github.com/ asif6827/ICENET. 1 Introduction Antonyms vs synonyms distinction is a core challenge in natural language processing applications, including but not limited to: sentiment analysis, machine translation, named entity typing etc. Synonyms are defined as semantically related words, whereas antonyms are defined as semantically opposite words. For example “disperse"" and “scatter"" are synonyms, while “disperse"" and “garner"" are antonyms (Ono et al., 2015). Existing research on the antonym-synonym distinction is primarily categorized into pattern-based and embedding-based approaches. Pattern-based approaches attempt to curate distinguishing lexicosyntactic patterns for the word pairs (Schwartz et al., 2015; Nguyen et al., 2017). A major limitation of the pattern-based approaches is the sparsity of the feature space. Despite using massive data sets, the generalization attempts result in highly overlapping and noisy features, which further deteriorate the model’s performance. Embedding based methods rely on the distributional hypothesis, i.e., “words that occur in the same contexts tend to have similar meanings"" (Harris, 1954). These methods use widely available embedding resources to capture/compute the semantic relatedness of synonym and antonym pairs (Nguyen et al., 2016; Etcheverry and Wonsever, 2019). Ali et al. (2019) proposed Distiller that uses non-linear projections to project the embedding vectors in task-specific dense sub-spaces. The key challenge faced by existing embeddingbased approaches is their inability to correctly model the inherent relation-specific properties among different relation pairs. These models mix different lexico-semantic relations and perform poorly when applied to a specific task (Ali et al., 2019). Existing approaches, moreover, model each relation pair independently, which is not adequate for antonym and synonym relation pairs as these relation pairs exhibit unique properties that may be exploited by modeling the relation pair in correlation with other instances (discussed in detail in Section 4). Keeping in view the above-mentioned challenges, in this paper, we propose InterlaCed Encoder NETworks (ICE-NET) for antonym vs synonym distinction. ICE-NET uses multiple different encoders to capture relation-specific properties of antonym and synonym pairs from pre-trained embeddings in order to augment the end-performance of the antonyms vs synonyms distinction task. Specifically, it uses: (i) an encoder (ENC-1) to capture the symmetry of synonyms; (ii) an encoder (ENC-2) to model the symmetry for antonyms; and (iii) an encoder (ENC-3) to preserve the transitivity of the synonyms and trans-transitivity of antonym and synonym relation pairs by employing attentive graph convolutions. These relation-specific" 2401.10063v2,"Stability of C 59 Knockout Fragments from Femtoseconds to Infinity Michael Gatchell a,∗ , Naemi Florin a , Suvasthika Indrajith a , José Eduardo Navarro Navarrete a , Paul Martini a , MingChao Ji a , Peter Reinhed a , Stefan Rosén a , Ansgar Simonsson a , Henrik Cederquist a , Henning T. Schmidt a , Henning Zettergren a a Department of Physics, Stockholm University, 106 91 Stockholm, Sweden Abstract We have studied the stability of C 59 anions as a function of time, from their formation on femtosecond timescales to their stabilization on second timescales and beyond, using a combination of theory and experiments. The C − 59 fragments were produced in collisions between C 60 fullerene anions and neutral helium gas at a velocity of 90 km/s (corresponding to a collision energy of 166 eV in the center-of-mass frame). The fragments were then stored in a cryogenic ion-beam storage ring at the DESIREE facility where they were followed for up to one minute. Classical molecular dynamics simulations were used to determine the reaction cross section and the excitation energy distributions of the products formed in these collisions. We found that about 15 percent of the C − 59 ions initially stored in the ring are intact after about 100 ms, and that this population then remains intact indefinitely. This means that C 60 fullerenes exposed to energetic atoms and ions, such as stellar winds and shock waves, will produce stable, highly reactive products, like C 59 , that are fed into interstellar chemical reaction networks. Keywords: Fullerenes, Knockout, Collision Induced Dissociation, Ion Storage Ring 2010 MSC: 00-01, 99-00 1. Introduction Fullerenes are classically defined as compounds solely composed of an even number of carbon atoms in cage-like structures made up of twelve five-membered rings and a number of six-membered rings, with the archetype being the C 60 molecule of icosahedral symmetry [1, 2]. This definition leaves little room for ambiguity, but it does raise the question as to what to call fullerene-like structures with an odd number of carbon atoms other than in generic terms such as fulleroids. This may seem like a purely hypothetical thought exercise, but the fact is that odd-numbered, thermodynamically stable fullerene-like species have been known to exist for nearly three decades [3]. C + 59 ions were first reported in experiments where N + ions collided with C 60 targets at center-of-mass energies close to 10 eV [3]. In these conditions, the nitrogen ion is likely captured by the fullerene before the excited system cools by emitting a CN-group, leaving behind a C + 59 product. These experiments also identified substituted fullerenes such as C 59 N + ions referred to as “dopeyballs” [3]. Later studies produced similar results when studying interactions between − − fullerenes and oxygen. Deng et al. identified C − 53 , C 55 , C 57 , − and C 59 in laser ablation experiments on surfaces with deposited C 60 O [4]. Around the same time, McElvany and − − coworkers produced C − 119 , C 129 , and C 139 ions through the ∗ Corresponding author Email address: gatchell@fysik.su.se (Michael Gatchell) Preprint submitted to Carbon thermal desorption of soot samples in an ozone atmosphere [5]. Odd-numbered fullerene fragments were also reported in laser ablation studies of various fullerene-containing materials [6, 7]. The above-mentioned studies of odd-numbered fullerene fragments all involve a chemical process where a classical fullerene is compromised by another element (O or N) which leads to the removal of a C atom from the cage. There is, however, at least one other mechanism that may lead to the formation of such species: energetic collisions. In measurements performed at Aarhus University, C 60 anions were collided with rare gas targets at center-of-mass energies of a few hundred eV, resulting in the production of C 59 cations and anions in addition to the usual even-numbered fragments [8, 9]. The mechanism leading to appearance of these fragments in collisions is known as knockout [10, 11]. Knockout can occur when an energetic, massive particle, such as an atom or ion, collides with a molecule. If the impacting particle directly strikes an individual atom in the molecule, that atom may be permanently displaced or even removed from the lattice in a prompt, quasi-elastic process on femtosecond timescales [11]. Knockout-driven fragmentation differs from statistical, thermally-driven dissociation processes in that energetically unfavorable pathways may occur with a high probability. This is the case with fullerenes, as the lowest energy dissociation pathways favor the loss of C 2 fragments (∼ 10 eV dissociation energy [12, 13]) when the molecules are excited rather than the loss of single C atoms (12–13 eV January 22, 2024" 2401.10068v1,"GPU Acceleration of a Conjugate Exponential Model for Cancer Tissue Heterogeneity ANIK CHAUDHURI, Indian Institute of Technology Bhubaneswar, India ANWOY KUMAR MOHANTY, The Arena Group, New York MANORANJAN SATPATHY, Indian Institute of Technology Bhubaneswar, India Heterogeneity in the cell population of cancer tissues poses many challenges in cancer diagnosis and treatment. Studying the heterogeneity in cell populations from gene expression measurement data in the context of cancer research is a problem of paramount importance. In addition, reducing the computation time of the algorithms that deal with high volumes of data has its obvious merits. Parallelizable models using Markov chain Monte Carlo methods are typically slow. This paper shows a novel, computationally efficient, and parallelizable model to analyze heterogeneity in cancer tissues using GPUs. Because our model is parallelizable, the input data size does not affect the computation time much, provided the hardware resources are not exhausted. Our model uses qPCR (quantitative polymerase chain reaction) gene expression measurements to study heterogeneity in cancer tissue. We compute the cell proportion breakup by accelerating variational methods on a GPU. We test this model on synthetic and real-world gene expression data collected from fibroblasts and compare the performance of our algorithm with those of MCMC and Expectation Maximization. Our new model is computationally less complex and faster than existing Bayesian models for cancer tissue heterogeneity. CCS Concepts: • Computing methodologies → Parallel programming languages; • Mathematics of computing → Bayesian computation; Variational methods; Gibbs sampling; Expectation maximization; Bayesian networks; • Applied computing → Bioinformatics. Additional Key Words and Phrases: CUDA, graphics processing unit, hierarchical model and heterogeneity ACM Reference Format: Anik Chaudhuri, Anwoy Kumar Mohanty, and Manoranjan Satpathy. 2018. GPU Acceleration of a Conjugate Exponential Model for Cancer Tissue Heterogeneity. 1, 1 (January 2018), 24 pages. https://doi.org/XXXXXXX.XXXXXXX 1 Introduction The clonal evolution model is a well-known model to explain proliferation in cancer progression [1] and [2]. There is a widespread belief that tumors arise from a single mutated cell as described in [1] and [2]; thereafter, accumulated mutation makes it neoplastic. According to the clonal evolution model, the cell population becomes heterogeneous due to the stepwise accumulation of mutation. The stem cell theory states that tumor cells have a small proportion of dominant cells out of the entire cell population [3], [4], [5], and [6]. These theories explain the heterogeneous cell population in cancer tissues. Heterogeneity in a cell population gives rise to many challenges because therapies behave differently for sub-populations of the population. A particular treatment may be helpful for a specific cell population Authors’ addresses: Anik Chaudhuri, anik.chaudhuri09@gmail.com, Indian Institute of Technology Bhubaneswar, Bhubaneswar, Odisha, India; Anwoy Kumar Mohanty, The Arena Group, New York, anwoy.rkl@gmail.com; Manoranjan Satpathy, Indian Institute of Technology Bhubaneswar, Bhubaneswar, India, manoranjan@iitbbs.ac.in. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2018 Association for Computing Machinery. Manuscript submitted to ACM Manuscript submitted to ACM 1" 2401.10078v2,"Doubly charmed pentaquark states in QCD sum rules Feng-Bo Duan 1 , Qi-Nan Wang 1 , Zi-Yan Yang 3, 4 , Xu-Liang Chen 1 , and Wei Chen 1, 2∗ 1 School of Physics, Sun Yat-sen University, Guangzhou 510275, China Southern Center for Nuclear-Science Theory (SCNT), Institute of Modern Physics, Chinese Academy of Sciences, Huizhou 516000, Guangdong Province, China 3 Key Laboratory of Atomic and Subatomic Structure and Quantum Control (MOE), Guangdong Basic Research Center of Excellence for Structure and Fundamental Interactions of Matter, Institute of Quantum Matter, South China Normal University, Guangzhou 510006, China 4 Guangdong-Hong Kong Joint Laboratory of Quantum Matter, Guangdong Provincial Key Laboratory of Nuclear Science, Southern Nuclear Science Computing Center, South China Normal University, Guangzhou 510006, China 2 (∗) (∗) We have studied the mass spectra of doubly charmed pentaquark states in the Λ (∗) and Σ (∗) channels c D c D P ± ± ± with J = 1/2 , 3/2 and 5/2 within the framework of QCD sum rules. We use the parity projected sum rules to separate the contributions of negative and positive parities from the two-point correlations induced by the pentaquark interpolating currents. Our results show that the bound states of P cc pentaquarks may exist in the − − − − − + + Λ c D ( 12 ), Σ c D ( 2 1 ), Σ c D ∗ ( 32 ), Λ ∗ c D ( 32 ), Λ ∗ c D ∗ ( 2 5 ) channels with negative-parity and Σ c D ( 2 1 ), Σ c D ∗ ( 2 3 ), 3 + ∗ Σ c D ( 2 ) channels with positive-parity, since their masses are predicted to be lower than the corresponding meson-baryon thresholds. However, they are still allowed to decay into the Ξ (∗) cc π final states via strong in- 0 ¯ teraction. The triply charged P +++ cc (ccuu d) and neutral P cc (ccdd ū) in the isospin quartet would definitely be pentaquark states due to their exotic charges. We suggest searching for these characteristic doubly charmed (∗)0 (∗)0 − − pentaquark signals in the P +++ → Ξ (∗)++ π + /ρ + , Σ (∗)++ D (∗)+ and P 0 cc → Ξ (∗)+ decays in the near cc c cc π /ρ , Σ c D cc future. PACS numbers: 12.39.Mk, 12.38.Lg, 14.20.Lq Keywords: Doubly charmed states, Pentaquarks, QCD sum rules I. INTRODUCTION Since the discovery of X(3872) in 2003, there have been reported numerous new hadron states, including the XYZ states, hidden-charm pentaquark states, doubly charmed tetraquark T cc state, fully-charm tetraquark states, doubly charged T c s̄ (2900) ++ state and so on [1–6]. They are good candidates of exotic hadron states. It is very important to study their various properties for identifying and understanding the new hadron spectroscopy and nonperturbative QCD. In 2015, the LHCb Collaboration observed two hidden-charm pentaquark states P c (4380) and P c (4450) in the J/ψp invariant mass spectrum in the Λ 0 b → J/ψK − p process [7]. Combined with LHCb’s Run 2 data in 2019, they discovered a new narrow pentaquark P c (4312) in the same process and final states [8]. They further claimed that P c (4450) was consisted of two narrow pentaquark structures P c (4440) and P c (4457) with the statistical significance of 5.4σ [8]. In the B 0 s → J/ψ p̄p decays, an evidence for a new structure P c (4337) was found in both the J/ψp and J/ψ p̄ systems [9]. The story was ongoing with the observation of P cs (4459), which is the candidate of hidden-charm pentaquark state with strangeness reported in the J/ψΛ invariant mass distribution in the Ξ − b → J/ψK − Λ decays [10]. Very recently, LHCb also reported a very narrow resonance P cs (4338) in the B − → J/ψΛ p̄ process, with the preferred spin-parity quantum numbers J P = 1/2 − at high confidence level [11]. The observations of these P c and P cs structures have attracted extensive theoretical studies in the hidden-charm pentaquark states, including their inner structures, quantum numbers, mass spectra, decay and production properties, etc. On the other hand, one may wonder if there exist pentaquark states other than in the hidden-charm channels, such as the doubly charmed pentaquarks. Such expectations were directly inspired by the observations of the doubly charmed baryons and doubly charmed + − + + tetraquark state. In 2017, the LHCb Collaboration discovered the doubly charmed baryon Ξ ++ cc in the Λ c K π π mass spec- ++ + + trum [12] and confirmed it later in the Ξ cc → Ξ c π decay mode [13], shedding light on the long-standing puzzle in the Ξ cc system after the previous observations of the Ξ + cc baryon by SELEX in the Λ + c K − π + final states [14, 15]. Recently in 2022, LHCb + reported the observation of the doubly charmed tetraquark state T cc in the mass spectrum of D 0 D 0 π + just below the D ∗+ D 0 threshold, with very narrow decay width and the quantum numbers I(J P ) = 0(1 + ) [16, 17]. To date, there are some theoretical investigations on the existence of doubly charmed pentaquark states [18–31]. In Ref. [18],the authors explored the intermediate- and short-range forces from σ/ω exchange in the one-boson-exchange (OBE) ∗ Electronic address: chenwei29@mail.sysu.edu.cn" 2401.10081v1,"Journal of Personalized Medicine Article Preoperative Prediction of Catheter Ablation Outcome in Persistent Atrial Fibrillation Patients through Spectral Organization Analysis of the Surface Fibrillatory Waves Pilar Escribano 1, * , Juan Ródenas 1 , Manuel García 1 , Miguel A. Arias 2 , Víctor M. Hidalgo 3 , Sofía Calero 3 , José J. Rieta 4 and Raúl Alcaraz 1 1 2 3 4 * check for updates Citation: Escribano, P.; Ródenas, J.; García, M.; Arias, M.A.; Hidalgo, V.M.; Calero, S.; Rieta, J.J.; Alcaraz, R. Preoperative Prediction of Catheter Ablation Outcome in Persistent Atrial Fibrillation Patients through Spectral Organization Analysis of the Surface Fibrillatory Waves. J. Pers. Med. 2022, 12, 1721. https://doi.org/10.3390/ jpm12101721 Academic Editor: José Miguel Rivera-Caravaca Research Group in Electronic, Biomedical and Telecommunication Engineering, University of Castilla-La Mancha, 02071 Albacete, Spain Cardiac Arrhythmia Department, Complejo Hospitalario Universitario de Toledo, 45007 Toledo, Spain Cardiac Arrhythmia Department, Complejo Hospitalario Universitario de Albacete, 02006 Albacete, Spain BioMIT.org, Electronic Engineering Department, Universitat Politecnica de Valencia, 46022 Valencia, Spain Correspondence: pilar.escribano@uclm.es Abstract: Catheter ablation (CA) is a commonly used treatment for persistent atrial fibrillation (AF). Since its medium/long-term success rate remains limited, preoperative prediction of its outcome is gaining clinical interest to optimally select candidates for the procedure. Among predictors based on the surface electrocardiogram, the dominant frequency (DF) and harmonic exponential decay (γ) of the fibrillatory waves ( f -waves) have reported promising but clinically insufficient results. Hence, the main goal of this work was to conduct a broader analysis of the f -wave harmonic spectral structure to improve CA outcome prediction through several entropy-based measures computed on different frequency bands. On a database of 151 persistent AF patients under radio-frequency CA and a follow-up of 9 months, the newly introduced parameters discriminated between patients who relapsed to AF and those who maintained SR at about 70%, which was statistically superior to the DF and approximately similar to γ. They also provided complementary information to γ through different combinations in multivariate models based on lineal discriminant analysis and report classification performance improvement of about 5%. These results suggest that the presence of larger harmonics and a proportionally smaller DF peak is associated with a decreased probability of AF recurrence after CA. Keywords: persistent atrial fibrillation; catheter ablation; outcome prediction; fibrillatory wave analysis; electrocardiogram; spectral analysis; dominant frequency; harmonic content Received: 20 August 2022 Accepted: 11 October 2022 Published: 14 October 2022 Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affil- iations. Copyright: © 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 1. Introduction Atrial fibrillation (AF) is the most frequently encountered cardiac arrhythmia in clinical practice [1]. This disruption of heart sinus rhythm (SR) affects roughly 37.5 million people worldwide [2], thus making it one of the most important public health problems and a significant cause of rising healthcare costs in developed countries [3]. Although the mechanisms underlying AF are not fully understood, it requires a combination of triggers, mainly located near the pulmonary veins (PVs), and a vulnerable atrial substrate characterized by reentry circuits [4]. AF is commonly linked to life-altering symptoms such as palpitations, fatigue, chest pain, shortness of breath, and dizziness [5]. This arrhythmia is not a direct cause of death, but it is associated with a two-fold increase in mortality because of a higher risk of heart failure and ischemic stroke [6]. Depending on the duration and recurrence of arrhythmic episodes, AF is classified into several stages [7]. However, the disease is not static and often progresses from paroxysmal to sustained forms over the course of a few years; this is usually correlated with irreversible 4.0/). J. Pers. Med. 2022, 12, 1721. https://doi.org/10.3390/jpm12101721 https://www.mdpi.com/journal/jpm" 2401.10089v1,"Polynomial approximations for the matrix logarithm with computation graphs E. Jarlebring a , J. Sastre b , J. Javier c a Department of Mathematics, KTH Royal Institute of Technology in Stockholm, Lindstedtsvägen 25, 114 28 Stockholm, (Sweden) b Instituto de Telecomunicaciones y Aplicaciones Multimedia, Universitat Politècnica de València, Camino de Vera s/n, 46022-Valencia (Spain) c Instituto Universitario de Matemática Multidisciplinar, Universitat Politècnica de València, Camino de Vera s/n, 46022-Valencia (Spain) Abstract The most popular method for computing the matrix logarithm is a combination of the inverse scaling and squaring method in conjunction with a Padé approximation, sometimes accompanied by the Schur decomposition. The main computational effort lies in matrix-matrix multiplications and left matrix division. In this work we illustrate that the number of such operations can be substantially reduced, by using a graph based representation of an efficient polynomial evaluation scheme. A technique to analyze the rounding error is proposed, and backward error analysis is adapted. We provide substantial simulations illustrating competitiveness both in terms of computation time and rounding errors. Keywords: Matrix logarithm, matrix square root, inverse scaling and squaring method, computation graphs, Taylor series, Padé approximant, Paterson-Stockmeyer method, matrix polynomial evaluation. PACS: 02.10.Yn, 02.60.Gf, 02.60.Lj 1. Introduction and notation This paper concerns the matrix logarithm, e.g., defined as the inverse problem corresponding to the matrix exponential. A logarithm of a square Email addresses: eliasj@kth.se (E. Jarlebring), jsastrem@upv.es (J. Sastre), jjibanez@upv.es (J. Javier) Preprint submitted to Elsevier January 19, 2024" 2401.10128v1,"Sub2Full: split spectrum to boost OCT despeckling without clean data L INGYUN W ANG , 1,2 J OSE A S AHEL , 1 AND S HAOHUA P I 1,2,* 1 Department of Ophthalmology, University of Pittsburgh, Pittsburgh, PA 15213, USA 2 Department of Bioengineering, University of Pittsburgh, Pittsburgh, PA 15213, USA *shaohua@pitt.edu Received XX Month XXXX; revised XX Month, XXXX; accepted XX Month XXXX; posted XX Month XXXX (Doc. ID XXXXX); published XX Month XXXX Optical coherence tomography (OCT) suffers from speckle noise, causing the deterioration of image quality, especially in high-resolution modalities like visible light OCT (vis-OCT). The potential of conventional supervised deep learning denoising methods is limited by the difficulty of obtaining clean data. Here, we proposed an innovative self-supervised strategy called Sub2Full (S2F) for OCT despeckling without clean data. This approach works by acquiring two repeated B-scans, splitting the spectrum of the first repeat as a lowresolution input, and utilizing the full spectrum of the second repeat as the high-resolution target. The proposed method was validated on vis-OCT retinal images visualizing sublaminar structures in outer retina and demonstrated superior performance over conventional Noise2Noise and Noise2Void schemes. The code is available at https://github.com/PittOCT/Sub2Full-OCT-Denoising. http://doi.org/10.1364/OL.XXXXXX Optical coherence tomography (OCT) is a reflectance-based, depth-resolved, micron-resolution imaging technique that has become a routine imaging modality in ophthalmology 1 . However, the speckle noise, induced by the interference of light, obscures the implementation of ideal axial resolution to visualize the fine details of bio-tissue, bringing challenges to the subsequent image analysis and interpretation 2 . Conventional OCT denoising approaches typically rely on sparse reconstruction or frame averaging (usually >100 frames) 3-5 . The major drawback of sparse reconstruction methods is the potential blurry of image, sacrificing the attainable resolution of OCT. Additionally, the frame averaging scheme subjects to long acquisition time (especially for volume averaging) and precise image registration, making it susceptible to eye movements and less practical in clinical applications 6 . With the rapid advancement of deep learning methods, various networks, including both the supervised and self-/unsupervised strategies, have been proposed for OCT despeckling. For instance, Ma et al. introduced a supervised cGAN method relying on framemerged noise-free images for training 7 . Although effective, the supervised methods pose a shared challenge of obtaining noise-free images. Recently, the self-/unsupervised methods are emerging to address this problem, requiring only noisy images for the training and processing. Lehtinen et al. proposed a Noise2Noise (N2N) approach to restore images by using two independent observations of the same scene to estimate the real structures 8 . Additionally, blind-spot schemes such as Noise2Void (N2V) used only one observation per scene by strategically masking the central pixel of a patch during training, treating the masked central pixel as the target for the network 9, 10 . However, as gradient information is backpropagated only for the masked pixels, N2V suffers a compromised enhancement to N2N. Nevertheless, performance of self-/unsupervised methods is usually less optimal to supervised ones. Visible light OCT (vis-OCT) is an emerging modality with higher scattering contrast and improved axial resolution than standard near-infrared OCT (NIR-OCT) 11 . These benefits enable the visualization of retinal fine structures in inner plexiform layer and outer retinal bands 12, 13 . However, the strong speckle noise undermines these advantages, making the challenging frame averaging process an essential procedure for vis-OCT. Fortunetaly, attempts are emerging to develop deep learning despeckling method for vis-OCT. Notably, Fan et al. employed N2N strategy to reduce noise in Fibergrams 14 . Ye et al. achieved denoising in the proposed DenoiSegOCT framework using N2V 15 . Recognizing the need for effective and robust self-supervised OCT denoising solutions without clean data, we proposed an innovative Sub2Full (S2F) strategy in this study. Building upon the strengths of N2N (we choose N2N here as OCT routinely acquires at least two repeated B-scans for applications like OCT angiography), it works by generating a low-resolution (LR) image for expanded mapping to multiple underlaying high-resolution (HR) images, and thus increases the possibility to converge to the true clean image. The S2F utilizes the sub-band image of the first repeated B-scan (S- R1) as the LR input, while setting the full spectrum image of the second repeated B-scan (F-R2) as the HR target for the network. We showed that the network powered with S2F strategy achieved superior performance over conventional N2N and N2V schemes, allowing identification of sublaminar structure of outer retina in single B-scan frame without averaged clean data in vis-OCT. Although validated in vis-OCT with N2N, it should be noted that S2F strategy can potentially be applied to all OCT types and integrated with various schemes for improved denoising performance." 2401.10144v1,"GENERIC COLORIZED JOURNAL, VOL. XX, NO. XX, XXXX 2023 1 Exploiting Hierarchical Interactions for Protein Surface Learning Yiqun Lin, Liang Pan, Yi Li, Ziwei Liu, and Xiaomeng Li ∗ Abstract— Predicting interactions between proteins is one of the most important yet challenging problems in structural bioinformatics. Intrinsically, potential function sites in protein surfaces are determined by both geometric and chemical features. However, existing works only consider handcrafted or individually learned chemical features from the atom type and extract geometric features independently. Here, we identify two key properties of effective protein surface learning: 1) relationship among atoms: atoms are linked with each other by covalent bonds to form biomolecules instead of appearing alone, leading to the significance of modeling the relationship among atoms in chemical feature learning. 2) hierarchical feature interaction: the neighboring residue effect validates the significance of hierarchical feature interaction among atoms and between surface points and atoms (or residues). In this paper, we present a principled framework based on deep learning techniques, namely Hierarchical Chemical and Geometric Feature Interaction Network (HCGNet), for protein surface analysis by bridging chemical and geometric features with hierarchical interactions. Extensive experiments demonstrate that our method outperforms the prior state-of-the-art method by 2.3% in site prediction task and 3.2% in interaction matching task, respectively. Our code is available at https://github.com/xmed-lab/HCGNet. Index Terms— Biology, Computer Vision, Point Cloud, Protein-Protein Interaction, Surface Learning. I. I NTRODUCTION P ROTEINS composed of amino acids are large, complex molecules that play critical roles in all living organisms. Proteins can provide various functions with different structures for organisms, including causing biomedical reactions, acting as messengers, and balancing fluid. From a biological perspective, proteins can be described in four structural levels, including primary, secondary, tertiary, and quaternary structures. The amino acid sequence (primary) determines the three-dimensional (3D) structure (tertiary) of the protein, and its functions mainly depend on its 3D structure. Therefore, exploring the functions of different proteins’ 3D structures is crucial for understanding their working mechanism, which benefits many applications, such as new drug development [1]. Manuscript received xx/xx, 2023. ∗ : Xiaomeng Li is the corresponding author. Yiqun Lin, Yi Li, and Xiaomeng Li are with the Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong SAR (e-mail: {ylindw, ylini, eexmli}@ust.hk). Liang Pan and Ziwei Liu are with the School of Computer Science and Engineering, Nanyang Technological University, Singapore (e-mail: {liang.pan, ziwei.liu}@ntu.edu.sg). hifts ical S Chem A Y V T A F R Y (a) Amino Acid Sequence (b) Surface (c) Atoms (d) Cartoon Structure Fig. 1. (a-d) show a protein’s amino acid sequence, surface, atoms, and cartoon structure (a simplified representation based on the secondary structure), respectively. (a) Due to the neighboring residue effect [2], multiscale relationships among atoms and between surface points and atoms should be considered in protein function analysis. (b-d) Our key idea is to model the hierarchical feature interactions between chemical (atom/residue) and geometric (surface) features for efficient protein surface learning. Proteins carry out their functions by interacting with other proteins or molecules. Therefore, predicting protein-protein or protein-biomolecule interaction (e.g., interaction sites and interaction matching) becomes one of the most important and challenging problems in structural bioinformatics. Proteins often associate through hydrophobic patches on their surfaces. Amino acid residues in the interaction interfaces can give a general indication of hydrophobicity [3]. Various studies about the electrostatic nature of the protein-protein interface demonstrate that the associating surfaces interacting with one another have charge complementarity [4], [5] or electrostatic complementarity [6]–[8]. In addition, the size and shape of protein interfaces, measured with solvent accessible surface area (∆ASA) [9], varies in different types of protein complexes. Earlier work [3] shows that the range of ∆ASA in the heterocomplexes is smaller than in the homodimers, and the larger molecules usually have larger interfaces. The interaction between proteins also relies on shape complementarity [10], such as convex bulges and concave pockets. Therefore, whether proteins interact with other molecules and where the interaction sites are located depends on both chemical features and 3D geometric shapes. Existing research works on protein interaction prediction [8], [11]–[13] utilize handcrafted chemical features (e.g., hydrophobicity and charges) and adopt deep neural networks to learn geometric features (e.g., curvatures and normals) from 3D structures. Recently, dMaSIF [14] is proposed to" 2401.10149v1,"Multi-Agent Reinforcement Learning for Maritime Operational Technology Cyber Security Alec Wilson 1 , Ryan Menzies 1 , Neela Morarji 1 , David Foster 2 , Marco Casassa Mont 1 , Esin Turkbeyler 1 and Lisa Gralewski 1 1 2 BMT, London, UK ADSP, London, UK Abstract This paper demonstrates the potential for autonomous cyber defence to be applied on industrial control systems and provides a baseline environment to further explore Multi-Agent Reinforcement Learning’s (MARL) application to this problem domain. It introduces a simulation environment, IPMSRL, of a generic Integrated Platform Management System (IPMS) and explores the use of MARL for autonomous cyber defence decision-making on generic maritime based IPMS Operational Technology (OT). OT cyber defensive actions are less mature than they are for Enterprise IT. This is due to the relatively ‘brittle’ nature of OT infrastructure originating from the use of legacy systems, design-time engineering assumptions, and lack of full-scale modern security controls. There are many obstacles to be tackled across the cyber landscape due to continually increasing cyber-attack sophistication and the limitations of traditional IT-centric cyber defence solutions. Traditional IT controls are rarely deployed on OT infrastructure, and where they are, some threats aren’t fully addressed. In our experiments, a shared critic implementation of Multi Agent Proximal Policy Optimisation (MAPPO) outperformed Independent Proximal Policy Optimisation (IPPO). MAPPO reached an optimal policy (episode outcome mean of 1) after 800K timesteps, whereas IPPO was only able to reach an episode outcome mean of 0.966 after one million timesteps. Hyperparameter tuning greatly improved training performance. Across one million timesteps the tuned hyperparameters reached an optimal policy whereas the default hyperparameters only managed to win sporadically, with most simulations resulting in a draw. We tested a real-world constraint, attack detection alert success, and found that when alert success probability is reduced to 0.75 or 0.9, the MARL defenders were still able to win in over 97.5% or 99.5% of episodes, respectively. Keywords Multi-Agent Reinforcement Learning, Cyber Security, Operational Technology 1. Introduction Operational Technology (OT) cyber defensive actions are less mature than they are for Enterprise IT. This is due to the relative ‘brittle’ nature of OT infrastructure originating from the use of legacy systems, design-time engineering assumptions, and lack of full-scale modern security controls. Traditional IT controls are rarely deployed on OT infrastructure, and where they are, some threats aren’t fully addressed. Additionally, there may be a lack of trained cyber CAMLIS’23: Conference on Applied Machine Learning for Information Security, October 19–20, 2023, Arlington, VA $ Alec.Wilson@uk.bmt.org (A. Wilson); Ryan.Menzies@uk.bmt.org (R. Menzies)  0009-0003-9181-9766 (A. Wilson); 0009-0003-9646-196X (R. Menzies); 0000-0001-9002-1187 (N. Morarji); 0009-0004-7611-6947 (M. Casassa Mont) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org)" 2401.10187v1,"Fast Kronecker Matrix-Matrix Multiplication on GPUs Abhinav Jangda Mohit Yadav ajangda@microsoft.com Microsoft Research Redmond, Washington, USA myadav@umass.edu University of Massachusetts Amherst Amherst, Massachusetts, USA two matrix factors of shape P×Q and M×N. Kronecker Matrix- Matrix Multiplication (Kron-Matmul) is the multiplication of an input matrix with a kronecker matrix. Kron-Matmul is the key operation for computations that represents their data as a Kronecker Matrix. For example, training Gaussian Processes (GPs), which are a class of machine learning models, involves multiplication of GPs’ kernel matrix with the dataset matrix. In several state-of-the-art GPs [51, 52], the kernel matrix is a kronecker product of smaller matrix factors. Hence, training of these GPs involves Kron-Matmul of the kernel matrix with the training dataset matrix. There are two existing algorithms for Kron-Matmul: the shuffle algorithm [10] and the fused tensor matrix multiply transpose (FTMMT) algorithm [26]. Both algorithms run for multiple iterations, where at each iteration, algorithms multiply the input matrix with a factor to generate an intermediate matrix. This intermediate of an iteration is the input for the next iteration. These algorithms differ in how they perform the multiplication in each iteration. The shuffle algorithm uses a series of reshape, matrix multiplication, and transpose operations. Existing single-GPU implementations of the shuffle algorithm, GPyTorch [15] and PyKronecker [6], use NVIDIA cuBLAS [1] for matrix multiplication and generate optimized transpose kernels. Similarly, the multi-GPU implementation in Cyclops Tensor Framework (CTF) [41] uses distributed matrix multiplication and transpose. The FTMMT algorithm represents the input matrix as a multidimensional tensor and fuses the transpose and multiplication using linear algebra engines, such as COGENT [24] for single-GPU and Distal [53] for multi-GPU. Hence, both algorithms use existing linear algebra operations. However, due to this design choice, these implementations miss several Kron-Matmul specific optimizations leading to the following three inefficiencies. First, the transpose in the shuffle algorithm is significantly expensive. Our experiments found that the transpose step can take up to 80% of the total execution time on both single- and multi-GPU executions. Second, linear algebra GPU kernels are not optimized for Kron-Matmul. For example, the matrix multiplication in the shuffle algorithm is performed on small and rectangular matrices, which is an inefficient case for NVIDIA cuBLAS. Moreover, when caching data from the global to shared memory, COGENT performs a high number of shared memory bank conflicts. Third, linear algebra operations used in both algorithms require full intermediates in the global memory at each iteration, leading to unnecessary loads and stores from Abstract Kronecker Matrix-Matrix Multiplication (Kron-Matmul) is the multiplication of a matrix with the Kronecker Product of several smaller matrices. Kron-Matmul is a core operation for many scientific and machine learning computations. State-of-the-art Kron-Matmul implementations utilize existing tensor algebra operations, such as matrix multiplication, transpose, and tensor matrix multiplication. However, this design choice prevents several Kron-Matmul specific optimizations, thus, leaving significant performance on the table. To address this issue, we present FastKron, an efficient technique for Kron-Matmul on single and multiple GPUs. FastKron is independent of linear algebra operations enabling several new optimizations for Kron-Matmul. Thus, it performs up to 40.7× and 7.85× faster than existing implementations on 1 and 16 GPUs respectively. CCS Concepts: • Computing methodologies → Massively parallel algorithms; Algebraic algorithms; Distributed algorithms. Keywords: Graphics Processing Units, CUDA, Kronecker Product, Linear Algebra ACM Reference Format: Abhinav Jangda and Mohit Yadav. 2024. Fast Kronecker Matrix- Matrix Multiplication on GPUs. In The 29th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming (PPoPP ’24), March 2–6, 2024, Edinburgh, United Kingdom. ACM, New York, NY, USA, 14 pages. https://doi.org/10.1145/3627535.3638489 1 Introduction Kronecker Matrix is a widely used data format in machine learning [7, 14, 22, 28, 34, 45, 51, 52] and scientific computations [9, 17, 50]. A Kronecker Matrix is a block matrix of shape PM × QN and is the result of the kronecker product of Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. PPoPP ’24, March 2–6, 2024, Edinburgh, United Kingdom © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0435-2/24/03. . . $15.00 https://doi.org/10.1145/3627535.3638489 1" 2401.10191v2,"D IVIDE AND NOT FORGET : E NSEMBLE OF SELECTIVELY TRAINED EXPERTS IN C ONTINUAL L EARNING Grzegorz Rypeść 1, 2∗ , Sebastian Cygert 1, 3 , Valeriya Khan 1, 2 , Tomasz Trzciński 1, 2, 4 , Bartosz Zieliński 1,5 & Bartłomiej Twardowski 1,6,7 1 IDEAS-NCBR, 2 Warsaw University of Technology, 3 Gdańsk University of Technology, 4 Tooploox, 5 Jagiellonian University, 6 Computer Vision Center, Barcelona 7 Department of Computer Science, Universitat Autònoma de Barcelona, {grzegorz.rypesc, sebastian.cygert, valeriya.khan, tomasz.trzc inski, bartosz.zielinski, bartlomiej.twardowski}@ideas-ncbr.pl A BSTRACT Class-incremental learning is becoming more popular as it helps models widen their applicability while not forgetting what they already know. A trend in this area is to use a mixture-of-expert technique, where different models work together to solve the task. However, the experts are usually trained all at once using whole task data, which makes them all prone to forgetting and increasing computational burden. To address this limitation, we introduce a novel approach named SEED. SEED selects only one, the most optimal expert for a considered task, and uses data from this task to fine-tune only this expert. For this purpose, each expert represents each class with a Gaussian distribution, and the optimal expert is selected based on the similarity of those distributions. Consequently, SEED increases diversity and heterogeneity within the experts while maintaining the high stability of this ensemble method. The extensive experiments demonstrate that SEED achieves state-of-the-art performance in exemplar-free settings across various scenarios, showing the potential of expert diversification through data in continual learning. 1 I NTRODUCTION In Continual Learning (CL), tasks are presented to the learner sequentially as a stream of non-i.i.d data. The model has only access to the data in the current task. Therefore, it is prone to catastrophic forgetting of previously acquired knowledge (French, 1999; McCloskey & Cohen, 1989). This effect has been extensively studied in Class Incremental Learning (CIL), where the goal is to train the classifier incrementally and achieve the best accuracy for all classes seen so far. One of the most straightforward solutions to alleviate forgetting is to store exemplars of each class. However, its application is limited, e.g., due to privacy concerns or in memory-constrained devices (Ravaglia et al., 2021). That is why more challenging, exemplar-free CIL solutions attract a lot of attention. Many recent CIL methods that do not store exemplars rely on having a strong feature extractor right from the beginning of incremental learning steps. This extractor is trained on the larger first task, which provides a substantial amount of data (i.e., 50% of all available classes) (Hou et al., 2019; Zhu et al., 2022; Petit et al., 2023), or it starts from a large pre-trained model that remains unchanged (Hayes & Kanan, 2020a; Wang et al., 2022c) that eliminates the problem of representational drift (Yu et al., 2020). However, these methods perform poorly when little training data is available upfront. In Fig. 1, we illustrate both CIL setups, with and without the more significant first task. The trend is evident Figure 1: Exemplar-free Class Incremental Learnwhen we have a lot of data in the first task - re- ing methods evaluated on CIFAR100 divided into sults steadily improve over time. However, the eleven tasks for two different data distributions. ∗ Code: https://github.com/grypesc/SEED 1" 2401.10196v1,"FUNCTIONAL CONDITIONAL GAUSSIAN GRAPHICAL MODELS FICI R., AUGUGLIARO L., AND WIT E.C. Abstract. Functional data has become a commonly encountered data type. In this paper, we contribute to the literature on functional graphical modelling by extending the notion of conditional Gaussian Graphical models and proposing a double-penalized estimator by which to recover the edge-set of the corresponding graph. Penalty parameters play a crucial role in determining the precision matrices for the response variables and the regression matrices. The performance and model selection process in the proposed framework are investigated using information criteria. Moreover, we propose a novel version of the Kullback-Leibler cross-validation designed for conditional joint Gaussian Graphical Models. The evaluation of model performance is done in terms of Kullback- Leibler divergence and graph recovery power. 1. Introduction In recent years, there has been increasing interest in the statistical analysis of sample path data observed from continuous stochastic processes, which has spurred the development of powerful tools for handling random functional variables. In such cases, the realizations of the variable under study are a collection of functions. We define a class of Gaussian Graphical Models (GGMs) capable of capturing the conditional independent structure among a set of functional variables and the effects of external functional covariates on its expected functions. However, extending GGMs to the realm of functional variables is a nontrivial task due to the intricate nature of functional data. To address this challenge, it is common to use dimensionality reduction techniques such as Functional Principal Component Analysis (FPCA). We propose a double-penalized estimator, which serves as a robust method to recover the edge-set of the corresponding graph associated with the functional variables. By incorporating penalties tailored specifically for functional data, our estimator strikes a balance between capturing the underlying dependence structure and avoiding overfitting. Model selection plays a crucial role in GGMs. To this end, we propose a modified version of the Kullback-Leibler Cross-Validation (KLCV) criterion tailored for model selection in the context of conditional joint glasso estimator. The proposed KLCV variant accounts for the unique characteristics of functional data, allowing for an effective and reliable selection of the optimal GGM. Through simulations, we demonstrate the effectiveness and efficiency of our proposed double-penalized estimator and modified KLCV criterion in recovering the rita.fici@unipa.it, Università degli Studi di Palermo, Piazza Marina 61, Palermo, Italy. luigi.augugliaro@unipa.it, Università degli Studi di Palermo, Piazza Marina 61, Palermo, Italy. wite@usi.ch, Università della Svizzera Italiana, Via Buffi 13, Lugano, Switzerland. 1" 2401.10205v1,"Effective Communication of Scientific Results JOSÉ NELSON AMARAL, UNIVERSITY OF ALBERTA, CANADA ACM Reference Format: José Nelson Amaral, University of Alberta, Canada. 2024. Effective Communication of Scientific Results. 1, 1 (January 2024), 14 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn Communication is essential for the advancement of Science. Technology advances and the proliferation of personal devices have changed the ways in which people communicate in all aspects of life. Scientific communication has also been profoundly affected by such changes, and thus it is important to reflect on effective ways to communicate scientific results to scientists that are flooded with information. This article advocates for receiver-oriented communication in Science, discusses how effective oral presentations should be prepared and delivered, provides advice on the thought process that can lead to scientific papers that communicate effectively, discusses suitable methodology to produce experimental data that is relevant and offers advice on how to present such data in ways that lead to the formulation of correct claims that are supported by the data. 1 RECEIVER-ORIENTED COMMUNICATION Many years ago I went to a lecture by Preston Manning, a well-known retired politician in Canada, in the then new Science building at the University of Alberta. I expected to hear about geopolitics and major socio-economic issues in Canada. Instead, Manning delivered a lecture on sender-oriented communication vs receiver-oriented communication. While he has since talked about this principle in many contexts, including the failure of elites to communicate with the general public [12], on that night his focus was to contrast the typical communication styles of an effective politician with that of a successful scientist. A memorable example that he conjured would contrast the politician speaking at the opening of a new child-care centre and the scientist explaining a new method to generate electrical energy. In his telling the scientist would systematically and sequentially go over all the ideas explored in order to deliver the new generator. She would describe many false starts and explain the way in which obstacles would have been overcome. In contrast the politician would focus on the people around her, talk about the impact of the care centre to families, perhaps tell an anecdote about real people impacted by the centre. Even though the politician may have had many false starts and many obstacles when she tried to get the centre approved and built, when communicating at that moment, she will focus on the people in front of her, on what they are interested to hear, on what matters to them. The scientist, on the other hand, is acting as a sender-oriented communicator. She is focused on the things that matter to her, on the troubles and difficulties that she encountered and how she overcame them. That single lecture changed the way that I Author’s address: José Nelson Amaral, University of Alberta, Canada. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Association for Computing Machinery. 1" 2401.10215v1,"Published as a conference paper at ICLR 2024 GPA VATAR : G ENERALIZABLE AND P RECISE H EAD A VATAR FROM I MAGE ( S ) Xuangeng Chu 1,2∗ Yu Li 2† Ailing Zeng 2 Tianyu Yang 2 Lijian Lin 2 Yunfei Liu 2 Tatsuya Harada 1,3† 1 The University of Tokyo 2 International Digital Economy Academy (IDEA) 3 RIKEN AIP {xuangeng.chu, harada}@mi.t.u-tokyo.ac.jp {liyu, zengailing, yangtianyu, linlijian, liuyunfei}@idea.edu.cn Figure 1: Our GPAvatar is able to reconstruct 3D head avatars from even a single input (i.e., oneshot), with strong generalization and precise expression control. The leftmost images are the inputs, and the subsequent images depict reenactment results. Inset images display the corresponding driving faces. Additionally, the first row shows three novel view results. A BSTRACT Head avatar reconstruction, crucial for applications in virtual reality, online meetings, gaming, and film industries, has garnered substantial attention within the computer vision community. The fundamental objective of this field is to faithfully recreate the head avatar and precisely control expressions and postures. Existing methods, categorized into 2D-based warping, mesh-based, and neural rendering approaches, present challenges in maintaining multi-view consistency, incorporating non-facial information, and generalizing to new identities. In this paper, we propose a framework named GPAvatar that reconstructs 3D head avatars from one or several images in a single forward pass. The key idea of this work is to introduce a dynamic point-based expression field driven by a point cloud to precisely and effectively capture expressions. Furthermore, we use a Multi Tri-planes Attention (MTA) fusion module in the tri-planes canonical field to leverage information from multiple input images. The proposed method achieves faithful identity reconstruction, precise expression control, and multi-view consistency, demonstrating promising results for free-viewpoint rendering and novel view synthesis. Code is available at https://github.com/xg-chu/GPAvatar. 1 I NTRODUCTION Head avatar reconstruction holds immense potential in various applications, including virtual reality, online meetings, gaming, and the film industry. In recent years, this field has garnered significant attention within the computer vision community. The primary objective of head avatar reconstruction is to faithfully recreate the source head while enabling precise control over expressions and posture. This capability will facilitate the generation of desired new expressions and poses for the source portrait (Li et al., 2023a; Yu et al., 2023b; Li et al., 2023b). ∗ † This work was partially done during an internship at IDEA. Corresponding Author. 1" 2401.10232v1,"ParaHome: Parameterizing Everyday Home Activities Towards 3D Generative Modeling of Human-Object Interactions Jeonghwan Kim * Jisoo Kim * Jeonghyeon Na Seoul National University Hanbyul Joo {roastedpen,jlogkim,prom317,hbjoo}@snu.ac.kr https://jlogkim.github.io/parahome Figure 1. Our ParaHome system enables to parameterize the detailed 3D movements of the human body, hands, and diverse objects towards the generative modeling of the human-object interactions Abstract scenarios with corresponding descriptions in texts; (3) including articulated objects with multiple parts expressed with parameterized articulations. Building upon our dataset, we introduce new research tasks aimed at building a generative model for learning and synthesizing human-object interactions in a real-world room setting. To enable machines to learn how humans interact with the physical world in our daily activities, it is crucial to provide rich data that encompasses the 3D motion of humans as well as the motion of objects in a learnable 3D representation. Ideally, this data should be collected in a natural setup, capturing the authentic dynamic 3D signals during humanobject interactions. To address this challenge, we introduce the ParaHome system, designed to capture and parameterize dynamic 3D movements of humans and objects within a common home environment. Our system consists of a multi-view setup with 70 synchronized RGB cameras, as well as wearable motion capture devices equipped with an IMU-based body suit and hand motion capture gloves. By leveraging the ParaHome system, we collect a novel large-scale dataset of human-object interaction. Notably, our dataset offers key advancement over existing datasets in three main aspects: (1) capturing 3D body and dexterous hand manipulation motion alongside 3D object movement within a contextual home environment during natural activities; (2) encompassing human interaction with multiple objects in various episodic 1. Introduction Our daily routines involve a series of actions where we interact with various objects in various ways. As humans, we effortlessly foresee the consequences of our actions; for instance, pulling the refrigerator handle opens the door, and tilting a kettle towards a cup pours water into it. As seen, there is a clear and robust correlation between our actions and how the environment responds, which cannot be easily understood or mimicked by machines and robots. A key obstacle in making machines to understand such sophisticated human-object interactions lies in the scarcity of large-scale datasets captured in natural and casual settings, including the 3D motions of both humans and objects occurring in causal interactions. Existing datasets primarily focus on limited aspects of these challenges. Early approaches capture * Equal contribution 1" 2401.10245v1,"Train Small, Model Big: Scalable Physics Simulators via Reduced Order Modeling and Domain Decomposition Seung Whan Chung a,∗ , Youngsoo Choi b , Pratanu Roy c , Thomas Moore d , Thomas Roy e , Tiras Y. Lin e , Du T. Nguyen a , Christopher Hahn f,g , Eric B. Duoss a,h , Sarah E. Baker f a Material Engineering Division, Lawrence Livermore National Laboratory, Livermore, 94550, CA, US b Center for Applied Scientific Computing, Lawrence Livermore National Laboratory, Livermore, 94550, CA, US c Atmospheric, Earth and Energy Division, Lawrence Livermore National Laboratory, Livermore, 94550, CA, US d School of Mechanical, Medical and Process Engineering, Queensland University of Technology, Brisbane, 4000, QLD, Australia e Computational Engineering Division, Lawrence Livermore National Laboratory, Livermore, 94550, CA, US f Material Science Division, Lawrence Livermore National Laboratory, Livermore, 94550, CA, US g Laboratory for Energy Applications for the Future, Lawrence Livermore National Laboratory, Livermore, 94550, CA, US h Center for Engineered Materials, Manufacturing and Optimization, Lawrence Livermore National Laboratory, Livermore, 94550, CA, US Abstract Numerous cutting-edge scientific technologies originate at the laboratory scale, but transitioning them to practical industry applications is a formidable challenge. Traditional pilot projects at intermediate scales are costly and time-consuming. An alternative, the E-pilot, relies on high-fidelity numerical simulations, but even these simulations can be computationally prohibitive at larger scales. To overcome these limitations, we propose a scalable, physics-constrained reduced order model (ROM) method. ROM identifies critical physics modes from small-scale unit components, projecting governing equations onto these modes to create a reduced model that retains ∗ corresponding author Email address: chung28@llnl.gov (Seung Whan Chung) Preprint submitted to arXiv January 22, 2024" 2401.10249v1,"Building a Reusable and Extensible Automatic Compiler Infrastructure for Reconfigurable Devices Zhenya Zang †, * Uwe Dolinsky † Pietro Ghiglio † Stefano Cherubin * † Codeplay Software Ltd. † Codeplay Software Ltd. † Codeplay Software Ltd. * School of Computing, * School of Computing, Edinburgh, United Kindom uwe@codeplay.com Edinburgh, United Kindom pietro.ghiglio@codeplay.com Engineering and Build Environment Edinburgh Napier University Edinburgh, United Kindom s.cherubin@napier.ac.uk Engineering and Build Environment, Edinburgh Napier University Edinburgh, United Kindom zhenya.zang@codeplay.com Mehdi Goli † Shufan Yang * † Codeplay Software Ltd. * School of Computing, Edinburgh, United Kindom mehdi.goli@codeplay.com Engineering and Build Environment Edinburgh Napier University Edinburgh, United Kindom s.yang@napier.ac.uk Abstract— Multi-Level Intermediate Representation (MLIR) is gaining increasing attention in reconfigurable hardware communities due to its capability to represent various abstract levels for software compilers. This project aims to be the first to provide an end-to-end framework that leverages open-source, cross-platform compilation technology to generate MLIR from SYCL. Additionally, it aims to explore a lowering pipeline that converts MLIR to RTL using open-source hardware intermediate representation (IR) and compilers. Furthermore, it aims to couple the generated hardware module with the host CPU using vendorspecific crossbars. Our preliminary results demonstrated the feasibility of lowering customized MLIR to RTL, thus paving the way for an end-to-end compilation. Keywords—Open-source FPGA compiler infrastructure, Multi- Level Intermediate Representation (MLIR), Hardware description language (HDL) I. I NTRODUCTION Intermediate representation (IR) and compilers of FPGA bridge the gap between software programming languages and the hardware domain. A novel HDL [1] was reported to simplify hardware design using its compiler and Medium-Level IR. Besides, open-source, software-defined HDL and compilers become emerging technologies for FPGAs and applicationspecific integrated circuits (ASIC). Chisel [2] is successful in modeling digital circuits using a high-level, objective-oriented language and has launched a high-performance, open-source CPU [3], and ASIC [4]. FIRRTL [5] is Chisel’s IR and can be lowered to hardware primitives, i.e., combinational and sequential logic, and memories. Despite Chisel’s agility for fast RTL prototyping, the program compilation for CPU and GPU has not been well-developed. An HDL that can target CPUs, 1 https://github.com/cucapra/calyx/issues/1470 XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE GPUs, and FPGAs is demanding. Equipped with powerful compilers, SYCL has been adopted to accelerate computing for CPUs and GPUs. Herein, we adopt SYCL and DPC++ [6] as the front-end to generate Multi-Level Intermediate Representation (MLIR) [7]. In essence, MLIR aims to provide a common representation for different levels of abstraction, including high-level algorithmic descriptions. However, mapping these high-level abstractions to efficient reconfigurable hardware implementations is challenging. This involves translating the MLIR representation to RTL and finegrained control over hardware primitives. We have explored a lowering pipeline for converting MLIR to RTL by using opensource circuit compilers CIRCT [8] and Calyx [9] to generate RTL. Our work has already led to several fixes and improvements 1 in the Calyx toolchain. The ultimate objective of the project is to encapsulate all the compilation and lowering processes to form an automated end-to-end framework for reconfigurable heterogenous platforms. II. O N - GOING W ORK TO D ATE A. Framework architecture The sketch of our compilation framework is shown in Fig. 1. The framework begins with input SYCL code, which is processed by DPC++ to generate the corresponding MLIR compatible with CIRCT. The output Calyx dialects produced by CIRCT are then passed to Calyx to generate System Verilog. Using established EDA tools, we can acquire synthesized and simulation results. Additionally customized hardware drivers must be written to facilitate the booting of the heterogeneous platform on an FPGA." 2401.10251v1,"Non-Terrestrial Network (NTN): a Novel Alternate Fractional Programming for the Downlink Channels Power Allocation Mahfuzur Rahman, Zoheb Hassan, Jeffrey H. Reed, and Lingjia Liu Abstract—Non-terrestrial network (NTN) communication has garnered considerable attention from government entities, industries, and academia in recent times. NTN networks encompass a variety of systems, including Low Earth Orbit (LEO) satellites, Medium Earth Orbit (MEO) satellites, Geostationary Earth Orbit (GEO) satellites, High Altitude Platforms (HAPS), and Low Altitude Platforms (LAPS). Furthermore, the deployment of high-throughput satellites (HTS/VHTS) in the GEO space has gained momentum. While LEO and MEO satellites offer advantages such as low latency and reduced launching costs compared to GEO satellites, this study focuses on GEO satellites due to their stationary nature and broader coverage. In traditional cellular networks, each user equipment (UE) is allocated at least one resource block (RB), which is not shared with other UEs. However, in NTN communications, where the coverage area is extensive, dedicating an RB to only one UE is an inefficient utilization of radio resources. To address this challenge, fractional programming (FP), cognitive radio, and rate splitting multiple access (RSMA) are existing technologies that enable multiple UEs to share the same RB, thereby enhancing spectral and power efficiency. This paper aims to maximize spectral efficiency, average RBG rate, and sum rate for GEO satellite systems. However, achieving this objective involves dealing with a nonconvex, NP-hard problem, as it requires the logarithmic sum of different fractions. Finding a global solution to such an NP-hard problem presents significant challenges. This paper introduces a novel alternate fractional programming algorithm specifically designed to tackle these complex NP-hard problems in the context of GEO NTN cellular networks. By employing this innovative approach, the study seeks to contribute to the optimization of NTN communication systems, enabling efficient resource allocation and improved network performance. Index Terms—5G, 6G, Terrestrial Network (TN), Non- Terrestrial Network (NTN), Enhanced mobile broadband (eMBB), ultra-reliable low latency communication (URLLC), Power allocation, Fractional Programming (FP). I. B ACKGROUND AND M OTIVATION A. Introduction The widespread deployment of commercial 5G networks has already had a transformative impact on our lives. Researchers from both academia and industries are now actively directing their attention towards the development of the next-generation cellular technology, 6G [1], [2]. As the number of cellular data users continues to surge, meeting the demands of these users and catering to their diverse data requirements has become M. Rahman, J. H. Reed, L. Liu are with Wireless@Virginia Tech, Bradley Department of Electrical and Computer Engineering, Virginia Tech. Z. Hassan is with the Electrical and Computer Engineering Department, Université Laval, QC, Canada. This work was funded in part by U.S. National Science Foundation (NSF) under grant CNS-2148212. crucial, making the deployment of 5G and beyond imperative. The 5G wireless system is designed to support a wide range of use cases, including Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communication (uRLLC), and Massive Machine Type Communication (mMTC) [3]. In 3GPP TR Release 17, [4], 3GPP has provided guidelines on the Technical Specification for Narrow-Band Internet of Things (NB-IoT) / enhanced Machine Type Communication (eMTC) to facilitate the operation of Non-Terrestrial Networks (NTN). However, to effectively accommodate eMBB traffic everywhere, the deployment of 5G networks necessitates the implementation of 5G through the use of the NTN infrastructure. B. Non-Terrestrial Network The Non-Terrestrial Network (NTN) offers a significantly wider coverage footprint compared to terrestrial networks. The coverage range of non-geostationary satellites, such as Medium Earth Orbit (MEO) and Low Earth Orbit (LEO) satellites, can extend from 100 meters to 500 kilometers, while Geo-Satellites can provide even better coverage ranging from 200 kilometers to 1000 kilometers [5], [6]. The expansive coverage of NTN 5G enables the provision of cellular network connectivity in areas that traditional terrestrial networks cannot reach to such an extent. Non-terrestrial 5G can be deployed in different configurations based on specific use cases. In situations where latency is not a critical factor and delay can be tolerated, Non-Terrestrial 5G can be implemented using the Bent Pipe Transparent payload, both with and without a Relay Node. On the other hand, for delay-sensitive applications requiring Ultra Low Latency Reliable Communication (uLLRC), Non-Terrestrial 5G/6G can be deployed using the Regenerative Payload, again with or without a Relay Node. In scenarios involving high-speed trains or airplanes, these vehicles can serve as the relay node for Non-Terrestrial 5G/6G deployment. C. NTN Use Cases and Motivation The impact of Non-Terrestrial Cellular Networks on various sectors, including general cellular usage, emergency services, disaster relief, maritime operations, US government and defense, transportation, energy, aviation, autonomous systems, and healthcare, has already begun to revolutionize our lives. Key players such as SpaceX Starlink, Amazon project Kuiper, Hughes, and Iridium are fiercely competing in the race to dominate the market. SpaceX has already launched more" 2401.10264v1,"Accepted to Appear in the Proceedings of International Conference on Learning Analytics & Knowledge (LAK) 2024 Harnessing Transparent Learning Analytics for Individualized Support through Auto-detection of Engagement in Face-to-Face Collaborative Learning Qi Zhou UCL Knowledge Lab, University College London qtnvqz3@ucl.ac.uk Wannapon Suraworachet UCL Knowledge Lab, University College London wannapon.suraworachet.20@ucl.ac.uk ABSTRACT Using learning analytics to investigate and support collaborative learning has been explored for many years. Recently, automated approaches with various arti�cial intelligence approaches have provided promising results for modelling and predicting student engagement and performance in collaborative learning tasks. However, due to the lack of transparency and interpretability caused by the use of “black box” approaches in learning analytics design and implementation, guidance for teaching and learning practice may become a challenge. On the one hand, the black box created by machine learning algorithms and models prevents users from obtaining educationally meaningful learning and teaching suggestions. On the other hand, focusing on group and cohort level analysis only can make it di�cult to provide speci�c support for individual students working in collaborative groups. This paper proposes a transparent approach to automatically detect student’s individual engagement in the process of collaboration. The results show that the proposed approach can re�ect student’s individual engagement and can be used as an indicator to distinguish students with di�erent collaborative learning challenges (cognitive, behavioural and emotional) and learning outcomes. The potential of the proposed collaboration analytics approach for sca�olding collaborative learning practice in face-to-face contexts is discussed and future research suggestions are provided. CCS CONCEPTS • Applied computing ! Education; Collaborative learning; • Human-centered computing ! Collaborative and social computing; Empirical studies in collaborative and social computing. KEYWORDS Multimodal learning analytics, Physical collaborative learning, Individual learning engagement ACM Reference Format: Qi Zhou, Wannapon Suraworachet, and Mutlu Cukurova. 2024. Harnessing Transparent Learning Analytics for Individualized Support through Autodetection of Engagement in Face-to-Face Collaborative Learning. In The This work is licensed under a Creative Commons Attribution International 4.0 License. LAK ’24, March 18–22, 2024, Kyoto, Japan © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-1618-8/24/03. https://doi.org/10.1145/3636555.3636894 Mutlu Cukurova UCL Knowledge Lab, University College London m.cukurova@ucl.ac.uk 14th Learning Analytics and Knowledge Conference (LAK ’24), March 18–22, 2024, Kyoto, Japan. ACM, New York, NY, USA, 12 pages. https://doi.org/10. 1145/3636555.3636894 1 INTRODUCTION Collaboration has been considered an important skill both in learning and working [24]. However, only asking students to work together cannot guarantee the success of collaborative learning. It requires students to have mutual interactions and achieve consensus on what they have discussed. Yet, understanding such a complex process of collaborative learning is a challenge for both teachers and students [20]. Recently, learning analytics and AI approaches have been frequently used in the context of collaborative learning. It has been argued to have the potential to contribute to investigating di�erent modes of collaboration [35], modelling learner behaviours [28], predicting collaboration performance [17], providing adaptive support for collaborative groups [23], and theory building [27]. However, previous studies focused more on sensing and capturing data, automation of metrics generation, and elucidations of the analysis result [8]. How to design learning analytics to provide learning suggestions and feedback in collaborative learning, especially physical collaborative learning contexts, is still under exploration. The transparency of the learning analytics systems might be a signi�cant challenge when implementing them in natural teaching and learning scenarios [12]. To be more speci�c, although the non-transparent approaches, such as neural networks, can provide models with high accuracy [22], their value can be limited in education contexts. The interpretation of which factors in�uence the outputs of models and their metrics has been illustrated to be an important purpose of learning analytics [9]. Moreover, it is also di�cult for users to understand the metrics used in such nontransparent approaches and inducted learning suggestions from their relationship with learning outcomes. For instance, previous research showed that the distance between students’ hands might be a reliable predictor of group performance in hands-on, practice-based collaborative learning activities [40]. However, teachers cannot simply ask students to put their hands closer to each other to provide support for their collaboration. Therefore, the value of such a model for a practitioner is limited. There is a need to take both the transparency and the educational value of what is made transparent into consideration when designing learning analytics systems. Therefore, this study proposes a transparent approach to automatically detecting students’ individual engagement from their" 2401.10278v1,"EEGFormer: Towards Transferable and Interpretable Large-Scale EEG Foundation Model Yuqi Chen 1 * , Kan Ren 2 , Kaitao Song 1 , Yansen Wang 1 , Yifan Wang 2 , Dongsheng Li 1 , Lili Qiu 1 1 Microsoft Research 2 ShanghaiTech University yansenwang@microsoft.com renkan@shanghaitech.edu.cn Abstract Self-supervised learning has emerged as a highly effective approach in the fields of natural language processing and computer vision. It is also applicable to brain signals such as electroencephalography (EEG) data, given the abundance of available unlabeled data that exist in a wide spectrum of realworld medical applications ranging from seizure detection to wave analysis. The existing works leveraging self-supervised learning on EEG modeling mainly focus on pretraining upon each individual dataset corresponding to a single downstream task, which cannot leverage the power of abundant data, and they may derive sub-optimal solutions with a lack of generalization. Moreover, these methods rely on end-to-end model learning which is not easy for humans to understand. In this paper, we present a novel EEG foundation model, namely EEGF ORMER , pretrained on large-scale compound EEG data. The pretrained model cannot only learn universal representations on EEG signals with adaptable performance on various downstream tasks but also provide interpretable outcomes of the useful patterns within the data. To validate the effectiveness of our model, we extensively evaluate it on various downstream tasks and assess the performance under different transfer settings. Furthermore, we demonstrate how the learned model exhibits transferable anomaly detection performance and provides valuable interpretability of the acquired patterns via self-supervised learning. Introduction Scalp electroencephalography (EEG) are physiological signal data that provide valuable insight into the human brain activities and has extensive applications in healthcare, e.g., disease diagnosis and medical monitoring (Lawhern et al. 2018; Tang et al. 2021, 2023; Li et al. 2023). Despite the ease of collecting EEG signals, comprehending and interpreting them often requires extensive expertise from medical professionals. To address this challenge, recent research has focused on leveraging self-supervised learning techniques to learn meaningful representations from EEG data (Yi et al. 2023; Wang et al. 2023; Li et al. 2022). These learned representations can then be fine-tuned for various downstream tasks, including seizure detection (Tang et al. 2021, 2023), abnormal detection (Darvishi-Bayazi et al. 2023), emotion recognition (Yi et al. 2023; Ye, Chen, and Zhang 2022; Song * A preprint version of an ongoing work, conducted during Yuqi’s internship at Microsoft Research. Correspondence to Kan Ren. et al. 2021; Li, Wang, and Lu 2021), etc. However, these existing works focus on pretraining upon each individual dataset corresponding to a single downstream task and fail to leverage the power of abundant data. In this paper, our primary interest lies in exploring the potential of self-supervised learning using abundant large-scale unlabeled data without human annotations. Moreover, interpretability is a crucial concern when applying machine learning models to real-world applications (Peng et al. 2022; Ali et al. 2022; Leung et al. 2022), particularly in the healthcare community (Mendoza-Cardenas, Meek, and Brockmeier 2023; Gulamali et al. 2023). Prior research (Tang et al. 2021; Wang et al. 2023) has predominantly relied on end-to-end model learning, which poses challenges for human comprehension. Models that lack interpretability have the potential to yield unsafe and irrational outcomes, thereby increasing the risk of severe medical malpractice. To address the above issues, we introduce EEGF ORMER as a solution for large-scale EEG pretraining. Our primary objective is to investigate a discrete representation learning approach (Van Den Oord, Vinyals et al. 2017; Fortuin et al. 2018; Peng et al. 2022; Esser, Rombach, and Ommer 2021) specifically designed for EEG pretraining. We provide the evidence that the utilization of vector quantized Transformer (Vaswani et al. 2017) model can learn universal representations on EEG signals with adaptable performance on various downstream tasks compared to the conventional mask reconstruction strategy (Nie et al. 2022). Furthermore, the learned codebook, along with the discrete indices provides interpretable outcomes of the useful patterns within the data. The contribution of the paper can be summarized as below: • We propose a novel pretraining strategy for EEG data. EEGF ORMER adopts a discrete representation learning algorithm along with reconstruction loss. • We harness the plentiful EEG data available in the TUH Corpus (Harati et al. 2014) to construct a foundational EEG model. This marks the pioneering effort in pretraining with a massive 1.7TB EEG dataset. • We conduct a comprehensive analysis of the pretrained foundation model EEGF ORMER , evaluating its performance on four downstream corpora sourced from the TUH corpus. Additionally, we explore its transferability by applying it to the Neonate dataset (Stevenson et al." 2401.10281v1,"Chaotic properties of an FIR filtered Hénon map Vinı́cius S. Borges 1,∗ , Magno T. M. Silva, Marcio Eisencraft Escola Politécnica, University of São Paulo, Brazil Abstract When chaotic signals are used in practical communication systems, it is essential to control and eventually limit the spectral bandwidth occupied by these signals. One way to achieve this goal is to insert a discrete- time filter into a nonlinear map that generates chaotic signals. However, this can completely change the dynamic properties of the original map. Considering this situation, this paper presents a series of numerical experiments aimed at obtaining the Lyapunov exponents of the signals generated by the two-dimensional Hénon map with a set of prototypical finite impulse response (FIR) filters added in the feedback loop. Our results show that the number of filter coefficients and the location of the zeros have a significant and complex impact on the behavior of the generated signals. Therefore, FIR filters should be carefully designed to preserve or suppress chaos in practical applications. Keywords: Chaotic signals, dynamical systems, nonlinear systems, discrete-time filters. 1. Introduction A chaotic signal has three main characteristics: it is bounded, aperiodic, and exhibits a sensitive de- pendence on initial conditions [1]. These properties often result in large bandwidth and have stimulated proposals for the application of chaotic signals in Telecommunications and Signal Processing, such as mod- ulation [2–4], image encryption [5–7], 5G technology standards [8, 9], ultra-wideband communications [10], among many others. Since transmission channels are usually limited in bandwidth [11], knowing and controlling the spectrum of transmitted signals is a relevant problem when using chaotic signals in communication systems. With this in mind, the authors of [12] proposed the use of a discrete-time finite impulse response (FIR) filter [13] in a chaotic signal generator as a way to control the spectral content of the generated signals. Linear filters have been used to denoise or detect chaotic signals [15–19]. But in general, their output is not fed back into the generating system. Thus, they can be designed and analyzed in a way that is essentially separated from the chaos generator itself. However, in [12, 14] the filter is inserted into the chaos generator, and its output is fed back through the nonlinear system and through the filter itself. In this way, although Email addresses: viniciusb@usp.br (Vinı́cius S. Borges), magno.silva@usp.br (Magno T. M. Silva), marcioft@usp.br (Marcio Eisencraft) 1 Corresponding author Preprint submitted to Communications in Nonlinear Science and Numerical Simulation January 22, 2024" 2401.10283v1,"1–17 Window Stacking Meta-Models for Clinical EEG Classification Yixuan Zhu yixuan2.zhu@live.uwe.ac.uk University of the West of England, UK Rohan Kandasamy rohan.kandasamy@nhs.net University College London Hospitals NHS Foundation Trust, UK UCL Queen’s Square Institute of Neurology, UK Luke J. W. Canham luke.canham@nbt.nhs.uk North Bristol NHS Trust, UK David Western david.western@uwe.ac.uk University of the West of England, UK Abstract Windowing is a common technique in EEG machine learning classification and other time series tasks. However, a challenge arises when employing this technique: computational expense inhibits learning global relationships across an entire recording or set of recordings. Furthermore, the labels inherited by windows from their parent recordings may not accurately reflect the content of that window in isolation. To resolve these issues, we introduce a multistage model architecture, incorporating metalearning principles tailored to time-windowed data aggregation. We further tested two distinct strategies to alleviate these issues: lengthening the window and utilizing overlapping to augment data. Our methods, when tested on the Temple University Hospital Abnormal EEG Corpus (TUAB), dramatically boosted the benchmark accuracy from 89.8 percent to 99.0 percent. This breakthrough performance surpasses prior performance projections for this dataset and paves the way for clinical applications of machine learning solutions to EEG interpretation challenges. On a broader and more varied dataset from the Temple University Hospital EEG Corpus (TUEG), we attained an accuracy of 86.7%, nearing the assumed performance ceiling set by variable inter-rater agreement on such datasets. 1. Introduction 1.1. Background Electroencephalography (EEG) plays a pivotal role in diagnosing, monitoring and prognostication in a plethora of neurological conditions, but there is a paucity of trained EEG reporters globally. A cornerstone of clinical EEG analysis lies in discerning between normal and abnormal recordings. Over the years, the application of machine learning for this purpose has gained traction, with many studies delving into its potentials (Schirrmeister et al., 2017; Amin et al., 2019; Banville et al., 2021, 2022; Gemein et al., 2020; Muhammad et al., 2020; Wagh and Varatharajah, 2020; Alhussein et al., 2019; Roy et al., 2019). Prominent research in this domain predominantly relies on the Temple University Hospital Abnormal EEG Corpus (TUAB) for both training and assessment (López et al., 2017), which is an annotated subset of the larger Temple University Hospital EEG Corpus (TUEG) (Obeid and Picone, 2016). Since the inception of the Deep4 convolutional neural network in 2017 (Schirrmeister et al., 2017), advancements in machine learning accuracy for this task, when gauged on TUAB, have been incremental at best — moving from 85.4 percent with Deep4 to a high of 89.8 percent (Muhammad et al., 2020), Data and Code Availability Our study includes as detailed in Table 1. Gemein et al. (2020) even conelectroencephalography (EEG) datasets collected jectured the presence of an accuracy ceiling close to from https://isip.piconepress.com/projects/ 90 percent, drawing parallels with established intertuh_eeg/. Our code is shared on https://github. rater agreement levels among human experts in routine clinical settings. com/zhuyixuan1997/EEGScopeAndArbitration. © Y. Zhu, R. Kandasamy, L.J.W. Canham & D. Western." 2401.10291v1,"Detecting Post-Stroke Aphasia Via Brain Responses to Speech in a Deep Learning Framework Pieter De Clercq ∗ 1 , Corentin Puffay ∗ 1,2 , Jill Kries 1 , Hugo Van Hamme 2 , Maaike Vandermosten 1 , Tom Francart 1 and Jonas Vanthornhout 1 ∗ Shared first authors 1 KU Leuven, dept. Neurosciences, ExpORL, Leuven, Belgium KU Leuven, dept. Electrical engineering (ESAT), PSI, Leuven, Belgium Correspondence: pieter.declercq@kuleuven.be, corentin.puffay@kuleuven.be 2 Abstract—Aphasia, a language disorder primarily caused by a stroke, is traditionally diagnosed using behavioral language tests. However, these tests are time-consuming, require manual interpretation by trained clinicians, suffer from low ecological validity, and diagnosis can be biased by comorbid motor and cognitive problems present in aphasia. In this study, we introduce an automated screening tool for speech processing impairments in aphasia that relies on time-locked brain responses to speech, known as neural tracking, within a deep learning framework. We modeled electroencephalography (EEG) responses to acoustic, segmentation, and linguistic speech representations of a story using convolutional neural networks trained on a large sample of healthy participants, serving as a model for intact neural tracking of speech. Subsequently, we evaluated our models on an independent sample comprising 26 individuals with aphasia (IWA) and 22 healthy controls. Our results reveal decreased tracking of all speech representations in IWA. Utilizing a support vector machine classifier with neural tracking measures as input, we demonstrate high accuracy in aphasia detection at the individual level (85.42%) in a time-efficient manner (requiring 9 minutes of EEG data). Given its high robustness, time efficiency, and generalizability to unseen data, our approach holds significant promise for clinical applications. I. I NTRODUCTION The prevalence of aphasia, a language disorder primarily resulting from a stroke, is substantial, impacting over one-third of global stroke patients [1]. Accurate and timely diagnosis of aphasia typically performed using behavioral language tests, is crucial for initiating effective therapy. However, language tests used in the clinic do not measure natural, daily-life language skills, as they consist of artificial tasks that target isolated language components (i.e., phonetic, semantic, or syntactic processes) [2]. Furthermore, these tests are time-consuming in administration and post-hoc interpretation by a trained clinician and can be biased by comorbid motor and cognitive problems present in over 80% of individuals with aphasia (IWA) [3], [4]. To address these limitations, electroencephalography (EEG) studies have explored biomarkers of impaired language functioning in aphasia. EEG-based neural tracking of natural speech measures time-locked brain responses to acoustic (e.g., the speech envelope) and linguistic (providing the semantic value carried by a word or a phoneme) [5] speech representations. Several methods are used to relate the neural signals to speech, for example using backward models that reconstruct the speech features from the neural signals [6] or models that attempt to discriminate time-aligned from misaligned speech segments (i.e., the match-mismatch paradigm) using the neural signals [7]. Recent findings using linear models showed decreased neural tracking of the speech envelope and segmentation features (i.e., phoneme and word onsets) in IWA compared to healthy controls, but no group differences were observed for linguistic speech tracking [8]. Focusing on the temporal envelope of speech, a follow-up study using nonlinear mutual information analyses demonstrated that primarily low-frequency envelope tracking (delta and theta band) is impaired in IWA [9], which carries cues for detecting and segmenting lexical units of speech (i.e., syllables, words, phrases and sentences) and prosody [10]. Using neural envelope tracking measures as input, classification algorithms reliably detected aphasia at the individual level [9]. Together, these results show promise for neural tracking as an automated assessment tool for natural speech abilities in aphasia. A critical drawback in previous aphasia studies is that the applied techniques (i.e., linear models/mutual information) require participant- and stimulus-specific training data. Here, we test the potential of more powerful deep neural networks to generalize to unseen data and capture speech processing impairments in IWA, aiming to build a more robust and generalizable screening tool for aphasia. Specifically, we pre-train convolutional neural networks (CNNs) on acoustic (envelope), segmentation (phoneme/word onsets), and linguistic speech representations in a large independent sample of healthy individuals with intact speech processing. Subsequently, we evaluate the pre-trained CNNs on individual data from IWA and healthy age-matched controls. All models’ performance for each speech feature is computed and provided as input to a nonlinear support vector machine (SVM) classifier trained to detect aphasia at the individual level. Furthermore, we investigate the contribution of each feature and the minimally required recording length for accurate aphasia detection. II. M ETHODS A. Participants The presented sample is identical to previous work in our lab [9], comprising 26 IWA (seven female participants, mean age=72, std=15 y/o) in the chronic phase (> 6 months" 2401.10302v3,"Hybrid Quantum Solvers in Production: how to succeed in the NISQ era? Eneko Osaba †∗ , Esther Villar-Rodriguez † , Aitor Gomez-Tejedor †‡ , and Izaskun Oregi †§ † TECNALIA, Basque Research and Technology Alliance (BRTA), 48160 Derio, Spain ‡ University of the Basque Country UPV/EHU, 48940 Leioa, Spain § European University of Gasteiz, EUNEIZ, 01013 Vitoria-Gasteiz, Spain ∗ Corresponding author. Email: eneko.osaba@tecnalia.com Abstract—Hybrid quantum computing is considered the present and the future within the field of quantum computing. Far from being a passing fad, this trend cannot be considered just a stopgap to address the limitations of NISQ-era devices. The foundations linking both computing paradigms will remain robust over time. Despite buoyant research activity, the challenges in hybrid computing are still countless, ranging from the proper characterization of current solvers to the establishment of appropriate methodologies for the design and fair evaluation of hybrid algorithms. The contribution of this work is twofold: first, we describe and categorize some of the most frequently used hybrid solvers, resorting to two different taxonomies recently published in the literature. Secondly, we put a special focus on two solvers that are currently deployed in real production and that have demonstrated to be near the real industry. These solvers are the LeapHybridBQMSampler contained in D-Wave’s Hybrid Solver Service and Quantagonia’s Hybrid Solver. We analyze the performance of both hybrid methods using as benchmarks four well-known combinatorial optimization problems: the Traveling Salesman Problem, Vehicle Routing Problem, Bin Packing Problem, and Maximum Cut Problem. Thanks to the contributions presented in this paper, the reader gains insight into the performance of those hybridization strategies nowadays in production and close to the industrial markets. Index Terms—Hybrid Quantum-Classical Computing, Combinatorial Optimization, Quantagonia, D-Wave, Quantum Computing. I. I NTRODUCTION Recent years have seen significant progress in quantum computing (QC), primarily as a result of the fast development of the technology and the advances made in the democratization of its access [1]. As a result, QC has already helped several application domains launch various proofs of concept. Frequently, these endeavors depend on hybrid systems, which symbolize the immediate future of this field. This is so since hardware capabilities play a major role in the adoption of quantum approaches to solve industrial use cases. Being immersed in the noisy intermediate scale quantum (NISQ, [2]), today’s quantum technology is neither entirely dependable nor competent to resolve medium- or This work was supported by the Basque Government through HAZITEK program (Q4 Real, ZE-2022/00033) and through Plan complementario comunicación cuántica (EXP. 2022/01341) (A/20220551). It was also supported by the Spanish CDTI through Misiones Ciencia e Innovación 2021 program (CUCO: Quantum Computing and its Application to Strategic Industries, Grant MIG-20211005) large-sized problems. In this context, the challenge lies in finding the way to build fruitful harmony between classical and quantum computing, assembling a tandem that, eventually, outperforms previous purely classical conceptualizations. Furthermore, it would be a mistake to conceive of quantum-classical hybrid computing simply as a stopgap to address the limitations of NISQ-era computers, just as quantum computing should not be referred to as a natural substitute for classical computing. As stated in [3], ”hybrid algorithms are likely here to stay well past the NISQ era and even into full fault-tolerance, with the quantum processors augmenting the already powerful classical processors which exist by performing specialized task”. In other words, classical and quantum computing will play collaborative and cooperative (but never competitive) roles in the mid-term horizon. Despite the work carried out in this area, there are a multitude of aspects that deserve much more in-depth study than has been done to date. These open issues range from the proper characterization of the hybrid quantum computing world to the concrete definition of what a hybrid solver is. Specifically, in this research, main contributions revolve around: • Describing and categorizing some of the most frequently used hybrid solvers to provide a clear picture of the dominant trends in today’s scientific and industrial community: 1) According to the layout established by the workflow of the hybrid solver, following the guidelines of [4]. This means focusing on the logical arrangement of the quantum and classical modules within the method. Note that this work focuses on giving an overview of the hybrid solver strategies with emphasis on the designable-by-designer steps. This means that the taxonomy will not include any consideration with respect to vertical hybrid workflows, i.e. those with ”controlling activities required to control and operate” either a classical or a quantum subroutine, as these operations are not key functional stages of the algorithmic scheme of the solver. 2) According to the role of the classical mechanisms in the solving procedure: collaborative versus cooperative, as" 2401.10303v1,"Fine scale depth regulation of invertebrate larvae around coastal fronts Nicolas Weidberg (1,2,*), Wayne Goschen (3, 4), Jennifer M. Jackson (2,5), Paula Pattrick (2,3), Christopher D. McQuaid (1), Francesca Porri (1,2) 1 Department of Zoology and Entomology, Rhodes University, Grahamstown 6140, South Africa. 2 South African Institute for Aquatic Biodiversity, Somerset Street, Grahamstown 6139, South Africa. 3 South African Environmental Observation Network, Elwandle Coastal Node, Nelson Mandela University Ocean Sciences Campus, Port Elizabeth 77000, South Africa. 4 Institute for Coastal and Marine Research, Nelson Mandela University, Port Elizabeth 77000, South Africa 5 Hakai Institute, Victoria BC, Canada. * present address: Department of Arctic Marine Biology, University of Tromso, Tromso 9019, Norway. Emails:Nicolas Weidberg, j_weidberg@hotmail.com, nlo009@uit.no Wayne Goschen, wayne@saeon.ac.za Jennifer Jackson, jennifer.jackson@hakai.org Paula Pattrick, p.pattrick@saiab.ac.za Christopher D. McQuaid, c.mcquaid@ru.ac.za Francesca Porri, f.porri@ru.ac.za" 2401.10326v1,"FERMILAB-PUB-24-0013-T The Smallness of Matter Effects in Long-Baseline Muon Neutrino Disappearance Peter B. Denton 1, ∗ and Stephen J. Parke 2, † 1 High Energy Theory Group, Physics Department, Brookhaven National Laboratory, Upton, NY 11973, USA 2 Theoretical Physics Department, Fermi National Accelerator Laboratory, P. O. Box 500, Batavia, IL 60510, USA (Dated: January 18, 2024) Current long-baseline accelerator experiments, NOvA and T2K, are making excellent measurements of neutrino oscillations and the next generation of experiments, DUNE and HK, will make measurements at the O(1%) level of precision. These measurements are a combination of the appearance channel which is more challenging experimentally but depends on many oscillation parameters, and the disappearance channel which is somewhat easier and allows for precision measurements of the atmospheric mass splitting and the atmospheric mixing angle. It is widely recognized that the matter effect plays a key role in the appearance probability, yet the effect on the disappearance probability is surprisingly small for these experiments. Here we investigate both exactly how small the effect is and show that it just begins to become relevant in the high statistics regime of DUNE. We dedicate this paper to the memory of the outstanding neutrino theorist, inspiring mentor, and dear friend, Tom Weiler. His insights on neutrino physics and the neutrinos he emitted will both live on until the end of the Universe. I. INTRODUCTION Considerable progress has been made in determining the six oscillation parameters. Addressing the three remaining unknowns, the sign of the atmospheric mass splitting, the octant of θ 23 , and measuring the amount of CP violation, requires a high degree of precision of all the other oscillation parameters [1, 2]. For the absolute value of the atmospheric mass splitting and the closeness of θ 23 to maximal, the best approach is via ν µ disappearance in long-baseline experiments with additional information in the same oscillation channel with atmospheric neutrinos. The matter effect [3] modifies the oscillation probability in the presence of matter and is relevant for longbaseline experiments through the Earth’s crust. In particular, it modifies the propagation of ν e and ν̄ e ’s. For the appearance channels, ν µ → ν e and ν̄ µ → ν̄ e , the impact is sizable, see e.g. [4–16] and plays a major role in DUNE’s sizable sensitivity to the atmospheric mass ordering [17]. The matter effect also plays a role in ν µ disappearance, but the effect is typically smaller; understanding this is the focus of this article. While it is true that for ν µ disappearance experiments the neutrinos spend the majority of their time in a state that would project on to either ν µ or ν τ , they still spend O(few%) of the time on average in a ν e state. This alone does not explain the smallness of the impact of the matter effect which is at the O(0.1%) level or less as shown in this paper. This level is below the expected experimental determination of ∆m 231 which will be at the 0.5−1% level in the upcoming long-baseline accelerator neutrino experiments. ∗ pdenton@bnl.gov; 0000-0002-5209-872X † parke@fnal.gov; 0000-0003-2028-6782 In this paper we will work in a framework where we take the vacuum oscillation probability (either two flavor or three flavor) and modify the six oscillation parameters as they evolve in the presence of matter. Specifically, we will write probabilities as a function of the eigenvalues and eigenvectors (mapped onto mixing angles using the standard parameterization [18, 19] of the PMNS matrix [20, 21]). This makes a determination of the evolution of the mixing parameters directly related to the impact of the matter effect. Then we will investigate the role of the matter effect on both the ∆m 2 and the mixing angles. The article is organized as follows. We will overview the role of the matter effect in neutrino oscillations in general and a basic understanding of ν µ disappearance in vacuum in section II. We then present numerical results to quantify the size of the effects discussed in section III. In section IV we will present our main results of the evolution of the relevant ∆m 2 in matter and the mixing angles (e.g. amplitude of the oscillation) in matter. Finally we will discuss our results in a broader context including atmospheric neutrinos in section V and conclude in section VI. II. ν µ DISAPPEARANCE AND THE MATTER EFFECT Neutrino oscillation probabilities are expressed as a function of the eigenvalues and eigenvectors of the Hamiltonian. In vacuum, the probabilities are thus directly a function of the fundamental parameters: the neutrino masses (expressed as ∆m 2 ij ≡ m 2 i − m 2 j ) and parameters of the mixing matrix between the mass basis and the flavor or interaction basis. The Hamiltonian in vacuum" 2401.10338v1,"MELODY: Robust Semi-Supervised Hybrid Model for Entity-Level Online Anomaly Detection with Multivariate Time Series Jingchao Ni, Gauthier Guinet, Peihong Jiang ∗ , Laurent Callot, Andrey Kan AWS AI Labs, Amazon.com, Inc. {jingchni, guinetgg, lcallot, avkan}@amazon.com, peihong.jiang.7@gmail.com ABSTRACT In large IT systems, software deployment is a crucial process in online services as their code is regularly updated. However, a faulty code change may degrade the target service’s performance and cause cascading outages in downstream services. Thus, software deployments should be comprehensively monitored, and their anomalies should be detected timely. In this paper, we study the problem of anomaly detection for deployments. We begin by identifying the challenges unique to this anomaly detection problem, which is at entity-level (e.g., deployments), relative to the more typical problem of anomaly detection in multivariate time series (MTS). The unique challenges include the heterogeneity of deployments, the low latency tolerance, the ambiguous anomaly definition, and the limited supervision. To address them, we propose a novel framework, semi-supervised hybrid Model for Entity-Level Online Detection of anomalY (MELODY). MELODY first transforms the MTS of different entities to the same feature space by an online feature extractor, then uses a newly proposed semi-supervised deep one-class model for detecting anomalous entities. We evaluated MELODY on real data of cloud services with 1.2M+ time series. The relative F1 score improvement of MELODY over the state-ofthe-art methods ranges from 7.6% to 56.5%. The user evaluation suggests MELODY is suitable for monitoring deployments in large online systems. CCS CONCEPTS • Do Not Use This Code → Generate the Correct Terms for Your Paper; Generate the Correct Terms for Your Paper; Generate the Correct Terms for Your Paper. KEYWORDS Do, Not, Us, This, Code, Put, the, Correct, Terms, for, Your, Paper ACM Reference Format: Jingchao Ni, Gauthier Guinet, Peihong Jiang ∗ , Laurent Callot, Andrey Kan. 2018. MELODY: Robust Semi-Supervised Hybrid Model for Entity-Level Online Anomaly Detection with Multivariate Time Series. In Proceedings ∗ Independent researcher, work conducted while employed at Amazon Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. The Web Conference’24, May 13–17, 2024, Singapore © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX !""#$%&'()*+,-,.$/(&0"".1$2,),3)'&( !%01!'07#"")$1(""/0$%)# (1$)#"" 345 !""#$%&'(""(%)$)* +(,&,-""!"".(/'0*1(%)2 !4#$5()')1*+,-,.$/(&0"".1$2,),3)'&( ! ! ! "" (1$)#""345 ! # !%01!'07#""(%)$)* ! % (1$)#""345 ! $ ! & 4$1(""6$%( (1$)#""345 Figure 1: An illustration of (a) point-level anomaly detection, and (b) entity-level anomaly detection. of Make sure to enter the correct conference title from your rights confirmation emai (The Web Conference’24). ACM, New York, NY, USA, 11 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION As cloud native systems become prevalent in modern IT industry, most applications “born on cloud” are composed of a multitude of interconnected services (or microservices), each specialized in accomplishing a narrow range of tasks [2, 9]. This composability of the services facilitates independent deployment, rapid delivery, and flexible expansion of applications in many cloud architectures [38]. It is particularly useful in large cloud platforms such as Amazon AWS, Google Cloud, and Microsoft Azure due to their culture of team-level service ownership. As the code implementing these services is regularly updated, whether to add new functionality or improve performance, faults may be introduced. Faulty changes can degrade the target service’s performance or cause externally-facing outages, which directly impact the customer’s experience and the company’s reputation. To prevent faulty changes, code deployments should be monitored comprehensively for rapid detection of anomalous behaviors so that faulty deployments can be stopped in time and the software can be returned to its previous, safe status. This process is called rollback, which helps avoid cascading damages to a cloud application. The existing approaches mainly detect anomalies in online systems from four perspectives, namely KPI-level (key performance" 2401.10352v1,"Bridging Cultural Nuances in Dialogue Agents through Cultural Value Surveys Yong Cao 1,2 , Min Chen 3 , Daniel Hershcovich 2 1, Huazhong University of Science and Technology 2 Department of Computer Science, University of Copenhagen 3 School of Computer Science and Engineering, South China University of Technology yongcao_epic@hust.edu.cn, minchen@ieee.org, dh@di.ku.dk 1 Introduction Culture can be defined as the combinations of beliefs, norms, and customs among groups (Tomlinson et al., 2014). Implicit cultural cues hinted in dialogue utterances reveal different values and beliefs among speakers, which reflects their way of thinking (Nisbett et al., 2001) and emotions (Almuhailib, 2019; Sun et al., 2021; Ma et al., 2022). While pre-trained language models (PLMs) have shown impressive performance on dialogue tasks (Gu et al., 2021; Liu et al., 2021; Sweed and Shahaf, 2021), their cultural bias in terms of values and their inconsistency in many other cultural aspects (Fraser et al., 2022) has severe implications on the prospect of employing them for interaction with speakers of diverse cultural backgrounds (Hersh- Culture Identification Cultures China target Culture Enhancement Sen 1 Classifier/ Regressor Sen 2 Sen m Decoder (Prediction) America fusion German Japan Encoder ... The cultural landscape of interactions with dialogue agents is a compelling yet relatively unexplored territory. It’s clear that various sociocultural aspects—from communication styles and beliefs to shared metaphors and knowledge— profoundly impact these interactions. To delve deeper into this dynamic, we introduce cu- Dialog, a first-of-its-kind benchmark for dialogue generation with a cultural lens. We also develop baseline models capable of extracting cultural attributes from dialogue exchanges, with the goal of enhancing the predictive accuracy and quality of dialogue agents. To effectively co-learn cultural understanding and multi-turn dialogue predictions, we propose to incorporate cultural dimensions with dialogue encoding features. Our experimental findings highlight that incorporating cultural value surveys boosts alignment with references and cultural markers, demonstrating its considerable influence on personalization and dialogue quality. To facilitate further exploration in this exciting domain, we publish our benchmark publicly accessible at https: //github.com/yongcaoplus/cuDialog. Cultural Survey ... Abstract Cultural Vector Sen 1 Sen 2 Sen n Dialogue Tasks Figure 1: Our proposed framework: Utilizing cultural survey (Hofstede, 1984) as an additional vector for multi-turn dialogue culture identification and dialogue prediction enhancement, leveraging our proposed multicultural dialogue benchmark dataset, cuDialog. covich et al., 2022). For example, scholars tend to believe that Eastern societies have a more communal or collective orientation compared to that Western societies (Lomas et al., 2023). Previous studies in the field of cross-cultural NLP (Arora et al., 2023; Hämmerl et al., 2022; Johnson et al., 2022; Santurkar et al., 2023) have primarily utilized probing methods to study the characteristics of models or agents. For instance, Cao et al. (2023) applied the Hofstede Culture Survey (Hofstede, 1984, see §3) to probe ChatGPT, a prominent dialogue system, revealing a distinct disparity between the system and human society. This underscores the need to enhance dialogue agents’ performance by incorporating cultural dimensions. However, developing culturally adaptive dialogue agents poses a significant challenge due to the scarcity of suitable datasets. While there are available multicultural corpora focused on specific domain tasks such as news (Ma et al., 2022) and image captions (Liu et al., 2021), there is currently a lack of datasets specifically designed for cross-cultural dialogue tasks. To address this research gap, we introduce cu-" 2401.10353v1,"Inconsistent dialogue responses and how to recover from them Mian Zhang ♦∗ , Lifeng Jin ♡ , Linfeng Song ♡ , Haitao Mi ♡ and Dong Yu ♡ ♦ Virginia Tech ♡ Tencent AI Lab, USA mianz@vt.edu, lifengjin@global.tencent.com Abstract A1 One critical issue for chat systems is to stay consistent about preferences, opinions, beliefs and facts of itself, which has been shown a difficult problem. In this work, we study methods to assess and bolster utterance consistency of chat systems. A dataset is first developed for studying the inconsistencies, where inconsistent dialogue responses, explanations of the inconsistencies, and recovery utterances are authored by annotators. This covers the life span of inconsistencies, namely introduction, understanding, and resolution. Building on this, we introduce a set of tasks centered on dialogue consistency, specifically focused on its detection and resolution. Our experimental findings indicate that our dataset significantly helps the progress in identifying and resolving conversational inconsistencies, and current popular large language models like ChatGPT which are good at resolving inconsistencies however still struggle with detection. 1 1 我尤其是喜欢朱婷,打比赛时的那个劲儿,真帅。 I especially like Zhu Ting, she is so handsome when she plays the game. 我也都路转粉了,只要有她的比赛我都看。 I have also become a fan, as long as there is her game, I will watch it. A2 B1 但是最近传出她很多绯闻,不知道真的假的,有点不 喜欢她了。 But there have been a lot of scandals about her recently. I don’t know if it’s true or not. I don’t like her a bit. 那按照你的想法,你是喜欢朱婷还是不喜欢朱婷呢? Then according to your thinking, do you like Zhu Ting or not? B2 A1意思是喜欢朱婷,A2的意思不喜欢朱婷,所以冲突。 The meaning of sentence A1 is to like Zhu Ting, and the meaning of sentence A2 is not to like Zhu Ting, so there is a conflict. Figure 1: An instance in CIDER dataset. {A, B}x denotes the x-th utterance of one of the two speakers (A or B). An inconsistent utterance (A2 in this case), an explanation of the inconsistency (the dotted box), and a clarification response (B2 in this case) are written for each dialogue. Introduction For years, inconsistencies in human-to-chatbot conversations have been evident (Dziri et al., 2019; Qin et al., 2021; Ji et al., 2023), even in the era of large language models (Mündler et al., 2023). We categorize these inconsistencies as either extrinsic or intrinsic. Extrinsic inconsistencies (Rashkin et al., 2021; Santhanam et al., 2021) arise when there’s a discrepancy between a statement and an external source of information, such as a knowledge base. On the other hand, intrinsic inconsistencies (Dziri et al., 2019; Nie et al., 2021; Zheng et al., 2022) occur within the dialogue itself. These can manifest in two ways: through an intra-utterance contradiction (Zheng et al., 2022), where a single sentence contains conflicting information, or a history contradiction (Nie et al., 2021), where a current state- ∗ Work done as an intern at Tencent AI Lab. The dataset and codebase are released https://github.com/mianzhang/CIDER. 1 at ment conflicts with a previous one. Our study particularly addresses history contradictions, a persistent challenge in conversational models due to the nature of language modeling: models could forget what they said due to intervening context (Roller et al., 2021). Researchers have been actively exploring how to resolve inconsistencies between utterances generated by conversational models in recent years. Li et al. (2020); Rashkin et al. (2021) has made progress in this domain by enhancing the training of these models, incorporating additional features and objectives to bolster self-consistency. Furthermore, Lee et al. (2022); Su and Collier (2022) introduced innovative decoding algorithms aimed at fostering greater coherence in utterances. These preemptive approaches are designed to mitigate conversational inconsistencies by reducing the likelihood of generating responses that contradict pre-" 2401.10357v1,"Article Measuring User Interface Accessibility for Color Blind Users Amaan Jamil 1 and Gyorgy Denes 1 * † Citation: Jamil, A.; Denes, G. Accessibility for Color Blind users. Preprints 2024, 1, 0. Copyright: © 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). 1 * The Perse School, Cambridge, UK Correspondence: gdenes@perse.co.uk (G.D.) This paper is an extended version of our paper published in Computer Graphics & Visual Computing 2023. Abstract: Color vision deficiency (CVD, color blindness) is the failure or decreased ability to distinguish between colors under normal lighting conditions. There are over 300 million people worldwide with CVD, including approx. 1 in 12 men (8%) and 1 in 250 women (0.5%). CVD can limit a user’s ability to interact with websites and software packages that are otherwise basic commodities. User interface designers have taken various approaches to tackle the issue with some interfaces offering a high contrast mode, and others integrating color-blind awareness into their website design process. The Web Content Accessibility Guidelines (WCAG) outline some best practices for maintaining accessibility that have been adopted and recommended by several governments; however, it is currently uncertain how this impacts perceived user functionality and if this could result in a reduced aesthetic look. In our work, we present a subjective user study to measure the loss of functionality and aesthetics as potentially seen by CVD observers for 20 popular websites and software packages. As recruiting participants with CVD is non-trivial, we developed a simulation-based pipeline instead for our full-reference mean opinion score experiment, which as far as we know is a novelty in the field. Our results show that relative aesthetics and functionality correlate positively and that an operating-system-wide high contrast mode can reduce both aesthetics and functionality for CVD users. Finally, we propose a AAA–A classification of the interfaces we analyzed. Keywords: user interface, color vision, color blindness, CVD, accessibility 1. Introduction Color vision deficiency (CVD, color blindness) is the failure or decreased ability to distinguish between colors under normal illumination. There are over 300 million people with CVD, including approx. 1 in 12 men (8%) and 1 in 250 women (0.5%) [1–3]. CVD is an X-linked genetic disorder impacting both eyes with varying degrees of prevalence in different populations [4]. It affects an individual’s ability to perform tasks in both personal and professional settings [5]. Color is an important asset in user interface (UI) design [6], and while the exact impact of color is known to vary between demographics [7], applications can still often rely on established conventions, such as green and red indicating ‘yes‘ and ‘no’ respectively. Objects of the same color satisfy the Gestalt principle of similarity, whereas different colors can help an object stand out or mark figure-ground articulation [8]. With the ever-increasing color gamut of novel displays [9], new domains are opening up in the use of color; however, some of these domains simply cannot be seen by someone with CVD. UI designers have taken various approaches to tackle the issue of CVD, including the use of a reduced color palette (high contrast mode), integrating CVD awareness into the design process, or relying on automatic post-processing enhancements (daltonization) [10]. The Web Content Accessibility Guidelines (WCAG) [6] outline some best practices for maintaining accessibility; however, these often only target core functionality. Another consideration for UI is perceived aesthetics. Many professional designers see aesthetics as inversely proportional to functionality [11], while other evidence points towards a positive correlation between functionality and aesthetics [12–14]. In the domain of CVD, a high contrast theme is rarely a top-priority feature, which could imply that people with CVD have a substantially reduced aesthetic experience. However, there is generally insufficient existing data to understand CVD users’ perceived functionality and aesthetics of UIs. 1" 2401.10361v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 Hierarchical Federated Learning in Multi-hop Cluster-Based VANETs M. Saeid HaghighiFard, Student Member, IEEE and Sinem Coleri, Fellow, IEEE Abstract—The usage of federated learning (FL) in Vehicular Ad hoc Networks (VANET) has garnered significant interest in research due to the advantages of reducing transmission overhead and protecting user privacy by communicating local dataset gradients instead of raw data. However, implementing FL in VANETs faces challenges, including limited communication resources, high vehicle mobility, and the statistical diversity of data distributions. In order to tackle these issues, this paper introduces a novel framework for hierarchical federated learning (HFL) over multi-hop clustering-based VANET. The proposed method utilizes a weighted combination of the average relative speed and cosine similarity of FL model parameters as a clustering metric to consider both data diversity and high vehicle mobility. This metric ensures convergence with minimum changes in cluster heads while tackling the complexities associated with non-independent and identically distributed (non-IID) data scenarios. Additionally, the framework includes a novel mechanism to manage seamless transitions of cluster heads (CHs), followed by transferring the most recent FL model parameter to the designated CH. Furthermore, the proposed approach considers the option of merging CHs, aiming to reduce their count and, consequently, mitigate associated overhead. Through extensive simulations, the proposed hierarchical federated learning over clustered VANET has been demonstrated to improve accuracy and convergence time significantly while maintaining an acceptable level of packet overhead compared to previously proposed clustering algorithms and non-clustered VANET. Index Terms—Vehicular ad hoc networks, hierarchical federated learning, clustering I. I NTRODUCTION V EHICULAR Ad hoc NETworks (VANETs) have recently adopted machine learning (ML) algorithms to improve the safety of transportation networks by providing a set of tools to assist the system in making more informed and data-driven decisions based on learning from sensors such as LIDAR, RADAR, vehicle cameras, and provide novel services such as location-based services, real-time traffic flow prediction and control, and autonomous driving [1]. In centralized machine learning algorithms, a robust learning algorithm, typically a neural network (NN), is trained on a vast dataset acquired from the vehicles’ edge devices [2]. The concept of federated learning (FL) was recently established to bring machine learning (ML) to the edge [3], which reduces transmission overhead and preserves the privacy of the users. In FL, instead of sending local datasets to the central entity, the edge devices only communicate the gradients of the learnable parameters obtained M. Saeid Haghighifard and Sinem Coleri are with the Department of Electrical and Electronics Engineering, Koc University, Istanbul, Turkey, email: mhaghighifard21, scoleri@ku.edu.tr. This work is supported by the Scientific and Technological Research Council of Turkey Grant number 119C058 and Ford Otosan. from these local datasets. These gradients are aggregated by the central entity, which determines the model parameters, which are subsequently sent to the edge devices. This process is repeated until the learning model is fully trained [2]. The main challenges of using FL algorithms are restricted communication resources of the wireless environment, vehicle mobility, and statistical heterogeneity of data distributions over the road. The first challenge of the restricted communication resources in FL arises when the central entity cannot satisfy the concurrent requests from a massive number of vehicles, resulting in a communication bottleneck. Since the produced traffic grows linearly with the number of participating vehicles and model size, one way to address the communication bottleneck problem is a partial participation rule to reduce the number of vehicles uploading updates simultaneously [4]. However, the convergence time of the FL may significantly increase with partial participation, which may not be acceptable for some applications [5]. Another way to alleviate the bottleneck problem is the usage of hierarchical FL such that clusters of vehicles train models concurrently and only the aggregate of each cluster is provided by the cluster head to the central entity [6]–[8]. Cluster formation in FL has been formulated as an optimization problem with different objective functions and constraints [5], [9], [10]. [5] performs the clustering with the objective of maximizing the weighted sum of the FL accuracy of the cluster heads, with the constraint that the sum of training and upload time of any vehicle is less than the link lifetime, which is the duration of time where two vehicles remain connected. [9] formulates the clustering problem with the objective of minimizing the cosine similarity of the client gradient updates while constraining on the maximum similarity between the updates from any two clients based on their data generating distribution. [10] aims to minimize the empirical risk of the model over the data samples and parameters of the FL model while constraining the data samples in each cluster should not overlap with those of the other clusters. However, these clustering algorithms are impractical since they require collecting complete network topology and data characteristics of the nodes in a highly dynamic vehicular network. The second challenge of handling high vehicle mobility in FL arises since network coverage, link quality, and stability fluctuate rapidly in vehicle-to-everything (V2X) communication, which influences the performance of FL applications regarding convergence rate and accuracy [2]. [5] considers the mobility in clustered FL by constraining that the upload time for the transmission of the model update to the cluster head is less than the time duration during which the vehicle is" 2401.10368v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 18, NO. 9, FEBRUARY 2024 1 HRL-TSCH: A Hierarchical Reinforcement Learning-based TSCH Scheduler for IIoT F. Fernando Jurado-Lasso, Member, IEEE, Charalampos Orfanidis, Member, IEEE, J. F. Jurado, and Xenofon Fafoutis, Senior Member, IEEE Abstract—The Industrial Internet of Things (IIoT) demands adaptable Networked Embedded Systems (NES) for optimal performance. Combined with recent advances in Artificial Intelligence (AI), tailored solutions can be developed to meet specific application requirements. This study introduces HRL-TSCH, an approach rooted in Hierarchical Reinforcement Learning (HRL), to devise Time Slotted Channel Hopping (TSCH) schedules provisioning IIoT demand. HRL-TSCH employs dual policies: one at a higher level for TSCH schedule link management, and another at a lower level for timeslot and channel assignments. The proposed RL agents address a multi-objective problem, optimizing throughput, power efficiency, and network delay based on predefined application requirements. Simulation experiments demonstrate HRL-TSCH’s superiority over existing state-of-art approaches, effectively achieving an optimal balance between throughput, power consumption, and delay, thereby enhancing IIoT network performance. Index Terms—Industrial Internet of Things (IIoT), Networked Embedded Systems (NES), Sleep Scheduling, Time Slotted Channel Hopping (TSCH), Reinforcement Learning (RL), Software- Defined Wireless Sensor Networks (SDWSNs). I. I NTRODUCTION T HE Internet of Things (IoT) is a transformative technology that interconnects objects to the Internet, paving the way for innovative applications and services [1]. These objects equipped with sensors, processing capabilities, power sources, and wireless communication radios, form the backbone of the Industrial Internet of Things (IIoT). The IIoT specifically leverages IoT devices to facilitate real-time control and monitoring of industrial processes, enhancing operational efficiency and decision-making [2]. In the realm of IIoT applications, diverse needs arise, ranging from data rate and delay to throughput and power usage [3]. Some applications demand energy-efficient modes Manuscript received February 1, 2024; revised xx, xx. This work was partly supported by DAIS. DAIS (https://dais-project.eu/) has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 101007273. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Sweden, Spain, Portugal, Belgium, Germany, Slovenia, Czech Republic, Netherlands, Denmark, Norway, and Turkey. The document reflects only the authors’ view, and the Commission is not responsible for any use that may be made of the information it contains. Danish participants are supported by Innovation Fund Denmark under grant agreement No. 0228-00004A. F. Fernando Jurado-Lasso, Charalampos Orfanidis, and Xenofon Fafoutis are with the Embedded Systems Engineering section, DTU Compute, Technical University of Denmark, 2800 Lyngby, Denmark (e-mail: ffjla@dtu.dk; chaorf@dtu.dk; xefa@dtu.dk). J. F. Jurado is with the Department of Basic Science, Faculty of Engineering and Administration, Universidad Nacional de Colombia Sede Palmira, Palmira 763531, Colombia (e-mail: jfjurado@unal.edu.co). to extend the lifespan of sensor nodes, particularly in remote and challenging environments. Others prioritize low latency for real-time industrial control, while some strike a fair balance between reliability and power efficiency. As operational needs evolve, the network must dynamically adapt to ensure seamless performance. Networked Embedded Systems (NES) traditionally serve as the foundation for both IoT and IIoT. These networks consist of numerous low-cost, low-power wireless sensor nodes (often called Sensor Nodes (SNs)) deployed in the environment to monitor and control physical phenomena [4]. In challenging environments susceptible to interference and multipath fading, a conventional approach involves utilizing Time Slotted Channel Hopping (TSCH), a Media Access Control (MAC) protocol of the IEEE 802.15.4 standard. TSCH schedules packet transmission and reception in a time-slotted fashion, overcoming the challenges of interference and multipath fading [5]. The effectiveness of a TSCH network heavily relies on its scheduler, responsible for assigning timeslots and channels to communication links. While redundant links enhance network reliability and minimize packet delay, they may also increase power consumption. Therefore, the TSCH scheduler must be cautiously designed to meet the requirements of IIoT applications, ensuring flexibility and adaptability to dynamic changes. In this context, this paper introduces Hierarchical Reinforcement Learning for Time-Slotted Channel Hopping (HRL- TSCH). This innovative approach, grounded in Hierarchical Reinforcement Learning (HRL), is intricately designed to customize TSCH schedules according to the specific requirements of IIoT applications. The hierarchical framework comprises RL agents responsible for learning the optimal schedule and a TSCH selection algorithm enabling SNs to efficiently select the nearest scheduled link for a designated destination address. The incorporation of HRL proves highly beneficial as it efficiently manages the inherent complexity of the TSCH link scheduling problem. By partitioning decision-making into higher and lower levels, our approach optimizes network performance by considering both global changes and local link-specific policies. This hierarchical structure significantly enhances adaptability, efficiency in exploration and exploitation, scalability, and generalization capabilities. The proposed methodology contributes to the field by providing a flexible and responsive solution that maximizes network performance in dynamic IIoT environments. In brief terms, the contributions of this paper are as follows: 1) We develop a HRL architecture specifically designed for" 2401.10372v1,"MutaBot: A Mutation Testing Approach for Chatbots Michael Ferdinando Urrico m.urrico@campus.unimib.it University of Milano-Bicocca Milan, Italy Diego Clerissi diego.clerissi@unimib.it University of Milano-Bicocca Milan, Italy ABSTRACT Mutation testing is a technique aimed at assessing the effectiveness of test suites by seeding artificial faults into programs. Although available for many platforms and languages, no mutation testing tool is currently available for conversational chatbots, which represent an increasingly popular solution to design systems that can interact with users through a natural language interface. Note that since conversations must be explicitly engineered by the developers of conversational chatbots, these systems are exposed to specific types of faults not supported by existing mutation testing tools. In this paper, we present MutaBot, a mutation testing tool for conversational chatbots. MutaBot addresses mutations at multiple levels, including conversational flows, intents, and contexts. We designed the tool to potentially target multiple platforms, while we implemented initial support for Google Dialogflow chatbots. We assessed the tool with three Dialogflow chatbots and test cases generated with Botium, revealing weaknesses in the test suites. CCS CONCEPTS • Software and its engineering → Software testing and debugging; • Human-centered computing → Natural language interfaces. KEYWORDS Chatbot Testing, Mutation Testing, Botium, Dialogflow ACM Reference Format: Michael Ferdinando Urrico, Diego Clerissi, and Leonardo Mariani. 2024. MutaBot: A Mutation Testing Approach for Chatbots. In 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion ’24), April 14–20, 2024, Lisbon, Portugal. ACM, New York, NY, USA, 5 pages. https://doi.org/10.1145/3639478.3640032 1 INTRODUCTION The widespread adoption of conversational chatbots (e.g., 88% of people had at least a conversation with a chatbot in 2022 [13]), also known as virtual assistants or conversational agents, in various domains (e.g., e-commerce, booking, tech support, healthcare, and more) [1, 14, 28] raised the need of dedicated testing methodologies and tools [4–8, 15, 24, 27] to assess their effectiveness. Mutation testing is a popular validation strategy that can be used to assess the effectiveness of test suites and test case generation Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). ICSE-Companion ’24, April 14–20, 2024, Lisbon, Portugal © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0502-1/24/04. https://doi.org/10.1145/3639478.3640032 Leonardo Mariani leonardo.mariani@unimib.it University of Milano-Bicocca Milan, Italy techniques [17]. It is a fault-based testing technique that consists of producing many faulty versions of a software under test, called mutants, by systematically introducing artificial faults in the software. The faults are introduced through mutation operators, designed to change the software according to patterns that represent possible faults. For instance, an operator may replace the name of a variable in an expression with another one to represent the case of a wrongly referred variable. The effectiveness of test suites is assessed by measuring the rate of mutants that they can reveal, that is, the percentage of mutants that fail (i.e., killed, according to the mutation testing terminology [17]) when executed with the test suite. In order to apply mutation testing in a given context, it is necessary to define a set of operators that can modify the relevant language elements and entities. Conversational chatbots, differently from other software, implement a number of components with a specific structure, even spanning multiple diverse languages, to encode the supported conversations. For instance, chatbots implemented with Google Dialogflow [12] are composed of several JSON files that specify both the sentences that a chatbot can use and the possible flows of conversation that the chatbot can follow, text files with alternative sentences, and webhooks to trigger external functions. This case is the same for all the chatbot platforms (e.g., Rasa [26] and Amazon Lex [18]), where conversations and interactions are implemented with specific language elements. Currently, there is no mutation testing tool that can properly target the elements that implement the conversations, taking the semantics of the mutated element into consideration. On the other hand, conversations need to be carefully validated since they are the main and only interface used by chatbots to interact with the outside world. In this paper, we introduce MutaBot, to be best of our knowledge the first mutation testing tool for chatbots. MutaBot is characterized by a general-purpose technology-agnostic design, inspired by the meta-model proposed by Cañizares et al. [9], that can be exploited to virtually address any chatbot platforms. When a specific platform has to be addressed, the technology-dependent interfaces, which provide the operations to locate the items to be mutated in a given platform, have to be implemented. Our first prototype version of the tool implements 24 mutation operators specifically designed for chatbots and provides support to Google Dialogflow [12], which is among the most popular chatbot platforms. We preliminary validated our tool with three Dialogflow chatbots, applying all the supported mutations, and observed how the test suites generated with Botium [5], a state-of-the-art automated test generation framework for chatbots, perform in detecting mutants. Results show that the test suites were capable of killing only" 2401.10374v1,"1 4PoM04-05 Printed Circuit Board Based Rotating Coils for Measuring Sextupole Magnets J. DiMarco Abstract—The use of Printed Circuit Boards (PCBs) for the inductive pick-up windings of rotating coil probes has made the construction of these precision magnetic measurement devices much more accessible. This paper discusses the design details for PCBs which on each layer of the board provide for simultaneous analog bucking (suppression) of dipole, quadrupole, and sextupole field components so as to more accurately measure the higher order harmonic fields in sextupole magnets. Techniques to generate designs are discussed, as well as trade-offs to optimize sensitivity. Examples of recent sextupole PCBs and their performance are given. Index Terms— Accelerator magnets, electromagnetic measurements, superconducting magnets, magnetic measurements. T I. INTRODUCTION he rotating coils designed for magnetic measurements rely on precise windings to obtain accurate measurements of harmonic fields. An important component of this is satisfactory suppression (i.e., ‘bucking’) of main field components, so that the coils mitigate against spurious harmonics, which can be generated if coil rotation is imperfect, such as having transverse or torsional vibrations [1]. Because of the high precision involved in the manufacture of Printed Circuit Boards (PCBs) (trace placement on a layer at the level of microns), rotating coil probes employing PCBs can achieve high levels of bucking. The so-called ‘bucking ratio’ (the ratio of main field signal before/after bucking) can typically be several hundred for dipole and quadrupole probes built in this way [2]. The first probes suppressing dipole, quadrupole and sextupole fields (DQS bucking) [3] were built with a design that was not ideal, since it involved other layers of the PCB, and the relative trace placement accuracy of a PCB is most advantageous on a single layer. To use a single layer also means multiple layers go into boosting signal size, not merely bucking. This paper outlines the design of PCBs for magnetic measurement probes which feature DQS bucking on each single layer. The design of the probes is reviewed in detail, and features which can help optimize the DQS-buck PCB circuits are discussed. Examples of fabricated probes are also given. Submitted for review September 19, 2023 This manuscript has been authored by Fermi Research Alliance, LLC under Contract No. DE-AC02-07CH11359 with the U.S. Department of Energy, Office of Science, Office of High Energy Physics. The author is with Fermi National Accelerator Laboratory, P.O. Box 500, Batavia, IL 60510, USA, (author e-mail: dimarco@fnal.gov). Color versions of one or more of the figures in this article are available online at http://ieeexplore.ieee.org II. Q UADRUPOLE B UCKING C IRCUIT The standard way to calculate sensitivity of a PCB circuit is to account for the contribution of each wire according to n L R  ( x + iy j )  K n = ∑ j   j   ( − 1 ) j n  R j = 1  N wires (1) Here L is the length of a given wire and R is the reference radius. The (-1) j gives the sign of the current flow of each wire and the (x j ,y j ) are the locations of the wires with respect to the rotation axis. Typically, PCB probe layouts are designed with fixed grid spacing – this is easier for designers, and less susceptible to round-off errors which can inadvertently shift traces – and these will be used in the examples here. A sample vertical representation of a standard PCB layer cross-section for radial bucking of dipole and quadrupole fields is shown in Fig. 1. In this view, the ‘+1’ represents the centroid of wires traveling axially ‘positive’ over the length of the PCB, and those with ‘-1‘, returning. The radial extent of the PCB is shown by wires at X=0, and a Y value given in the first column, with probe rotation being around [0,0]. The locations of wires are in mm for the examples shown. Fig. 1. A representative view of a PCB cross-section, positioned vertically, with wire loop tracks, running in/out the page. Rotation center is at Y=0. There are 4 sets of loops or ‘tracks’ seen in the crosssection. Pairs of identical windings separated in radius with opposite chirality, such as T1 + T3 or T2 + T4 will buck the dipole field (because the dipole does not have radial dependence), each forming gradient coils. When these two pairs, having opposite chirality to each other, are similarly" 2401.10375v1,"Vulnerabilities of Foundation Model Integrated Federated Learning Under Adversarial Threats Chen Wu ∗ , Xi Li ∗ , Jiaqi Wang the Pennsylvania State University {cvw5218, XiLi , jqwang}@psu.edu Abstract Federated Learning (FL) addresses critical issues in machine learning related to data privacy and security, yet suffering from data insufficiency and imbalance under certain circumstances. The emergence of foundation models (FMs) offers potential solutions to the limitations of existing FL frameworks, e.g., by generating synthetic data for model initialization. However, due to the inherent safety concerns of FMs, integrating FMs into FL could introduce new risks, which remains largely unexplored. To address this gap, we conduct the first investigation on the vulnerability of FM integrated FL (FM-FL) under adversarial threats. Based on a unified framework of FM-FL, we introduce a novel attack strategy that exploits safety issues of FM to compromise FL client models. Through extensive experiments with well-known models and benchmark datasets in both image and text domains, we reveal the high susceptibility of the FM-FL to this new threat under various FL configurations. Furthermore, we find that existing FL defense strategies offer limited protection against this novel attack approach. This research highlights the critical need for enhanced security measures in FL in the era of FMs 1 . 1 Introduction Federated Learning (FL) [McMahan et al., 2017] is a decentralized approach to machine learning where multiple clients collaboratively train a model while keeping their data local. It encompasses a wide range of applications, including healthcare [Wang et al., 2022], model personalization [Zhang et al., 2022], and video surveillance [Rehman et al., 2022]. This methodology, while safeguarding privacy, often encounters challenges such as data scarcity and imbalanced data distribution across clients. The integration of Foundation Models (FM), e.g., GPT series [Brown et al., 2020], LLaMA [Touvron et al., 2023], Stable Diffusion [Rombach et al., 2022], and Segment Anything [Kirillov et al., 2023], known for their ∗ 1 Equal contribution. The source code will be available after acceptance. extensive pre-training on diverse datasets, offers a solution to these challenges. FMs can enhance FL by providing a robust starting point for learning [Zhang et al., 2023b], addressing issues like limited data availability [Lin et al., 2020], and introducing additional diversity into the training process to cover a broader spectrum of scenarios not originally included in the original data [de Luca et al., 2022]. However, incorporating FMs into FL systems introduces potential threats. The large-scale data scraped from the Internet used for FM training may be of low quality, containing bias, misinformation, toxicity, or even poisoned [Zhuang et al., 2023]. This brings inherent vulnerabilities in the FMs to have robustness, fairness, and privacy issues [Bommasani et al., 2021]. Recent studies have revealed threats to FMs range from adversarial examples [Zhang et al., 2023a], data poisoning attacks to generate malicious output [Schlarmann and Hein, 2023], backdoor attacks to inject hidden mappings in the objective function [Kandpal et al., 2023], privacy attacks to reveal sensitive information from training data [Pan et al., 2020], to fairness and reliability of the FMs [Si et al., 2022]. These vulnerabilities bring new risks to the security and reliability of the FM-Integrated FL (FM-FL) system. Despite these emerging risks, there exists a significant gap in research specifically targeting these vulnerabilities [Wang et al., 2023; Zhuang et al., 2023]. To thoroughly investigate the susceptibility of FM-FL, we leverage a unified framework well-suited for both homogeneous and heterogeneous FL systems [Lin et al., 2020; Li and Wang, 2019; Zhuang et al., 2023; Zhang et al., 2023b]. Specifically, the server employs the FMs to generate synthetic data, which plays a dual role: (i) assisting in the initialization of client models to provide a better starting point for training, and (ii) facilitating mutual information exchange between client models through knowledge distillation while protecting privacy. This dual application ensures a thorough and comprehensive integration of FMs across all stages of the FL process, from initialization to ongoing learning and model fusion. We propose a novel attack strategy against FM-FL, where the attacker compromises the FM used by the server and consequently embeds the threat in client models during their initialization using the synthetic data. This threat is iteratively reinforced through the mutual information-sharing process on the server. We specialize our attack strategy to backdoor attacks to thoroughly investigate the vulnerability of" 2401.10385v1,"Approximation of Solution Operators for High-dimensional PDEs Xiaojing Ye ∗ Nathan Gaby Abstract We propose a finite-dimensional control-based method to approximate solution operators for evolutional partial differential equations (PDEs), particularly in high-dimensions. By employing a general reduced-order model, such as a deep neural network, we connect the evolution of the model parameters with trajectories in a corresponding function space. Using the computational technique of neural ordinary differential equation, we learn the control over the parameter space such that from any initial starting point, the controlled trajectories closely approximate the solutions to the PDE. Approximation accuracy is justified for a general class of second-order nonlinear PDEs. Numerical results are presented for several high-dimensional PDEs, including real-world applications to solving Hamilton-Jacob-Bellman equations. These are demonstrated to show the accuracy and efficiency of the proposed method. Key words. Operator Learning; Partial Differential Equations; Deep Neural Networks; Control MSC codes. 65M99, 49M05 1 Introduction Partial Differential Equations (PDEs) are important in numerous disciplines from finance, to engineering, to science [26, 75, 78]. As the solutions of many PDEs lack analytical form, it is necessary to use numerical methods to approximate them [5, 1, 80, 44, 70]. However, the traditional numerical methods, such as finite difference and finite element methods, rely upon the discretization of problem domains, which does not scale to high-dimensional problems due to the well-known issue of “curse of dimensionality”. This drawback has led to the more recent interest in using deep neural networks (DNNs) for the solving of PDEs in high-dimensions [71, 6, 35, 24, 18, 36, 38, 49]. One of the most notable approaches [71, 6, 24, 18, 90] is to parameterize the solution of a given PDE as a DNN, and the network parameters are trained to minimize potential violations (in various definitions) to the PDE. These methods have enjoyed success in solving a large variety of PDEs empirically. Theoretically, this has been partly justified by the provable universal approximation power of DNNs [39, 89, 53]. Nonetheless, most deep-learning based PDE solvers aim to solve specific instances of PDEs, and as a consequence, they need to relearn from scratch whenever the initial and/or boundary value changes even for the same PDE operator. To address the aforementioned issue, there has been a collection of recent studies to find solution operators of PDEs [52, 58, 30]. A solution operator of a given PDE is the mapping from the problem’s parameters (e.g., PDE coefficient, initial value, or boundary value) to the corresponding solution. Finding solution operators has substantial applications, especially in those where solutions to the same PDE are needed for different initial or boundary value configurations. Examples include (decentralized) robotic control problems where robotic agents need to plan optimal trajectories in response to frequently changing terminal cost functions. These agents often have limited computation and battery power and thus they can only adopt low-cost solution operator approximation implemented in their systems. In this paper, we propose a novel control-based strategy to approximate solution operators of highdimensional evolution PDEs based on the principle established in [30], which results in substantially improved solution efficiency and accuracy compared to the latter. Specifically, we parameterize the PDE solution using a reduced-order model (e.g., a deep neural network) and learn a control field to steer the model parameters, such that the rendered parameter trajectory induces an approximate solution of the PDE for any initial value. ∗ Department of Mathematics and Statistics, Georgia State University, Atlanta, GA 30303, USA. Email: {ngaby1,xye}@gsu. edu. 1" 2401.10394v1,"Distribution Consistency based Self-Training for Graph Neural Networks with Sparse Labels Fali Wang Tianxiang Zhao Suhang Wang The Pennsylvania State University University Park, USA fqw5095@psu.edu The Pennsylvania State University University Park, USA tkz5084@psu.edu The Pennsylvania State University University Park, USA szw494@psu.edu ABSTRACT 1 Few-shot node classification poses a significant challenge for Graph Neural Networks (GNNs) due to insufficient supervision and potential distribution shifts between labeled and unlabeled nodes. Self-training has emerged as a widely popular framework to leverage the abundance of unlabeled data, which expands the training set by assigning pseudo-labels to selected unlabeled nodes. Efforts have been made to develop various selection strategies based on confidence, information gain, etc. However, none of these methods takes into account the distribution shift between the training and testing node sets. The pseudo-labeling step may amplify this shift and even introduce new ones, hindering the effectiveness of self-training. Therefore, in this work, we explore the potential of explicitly bridging the distribution shift between the expanded training set and test set during self-training. To this end, we propose a novel Distribution-Consistent Graph Self-Training (DC-GST) framework to identify pseudo-labeled nodes that both are informative and capable of redeeming the distribution discrepancy and formulate it as a differentiable optimization task. A distributionshift-aware edge predictor is further adopted to augment the graph and increase the model’s generalizability in assigning pseudo labels. We evaluate our proposed method on four publicly available benchmark datasets and extensive experiments demonstrate that our framework consistently outperforms state-of-the-art baselines. Graph Neural Networks (GNNs) have achieved noteworthy success on semi-supervised node classification on graphs, which exploit the graph inductive bias and labeled nodes to predict labels for the remaining unlabeled nodes [1, 4, 9, 13, 22, 30]. However, their advance is often dependent on intricate training with a large number of labeled nodes, which can be costly to acquire [29]. Empirically, the performance of Graph Convolutional Networks (GCNs) tends to deteriorate rapidly as the amount of labeled data decreases [37]. The generalization capacity of the classifier is significantly affected by the variability of the labeled nodes [38]. Biases in the sampling process can result in distributional shifts between the training nodes and the rest of the graph, causing the classifier to over-fit in the training data irregularities and resulting in performance degradation during testing. For example, in social networks, popular users (high-degree nodes) are more likely to be labeled. However, as social networks follow a power-law distribution, the majority of nodes are low-degree nodes. Those popular nodes are actually not representative nodes, causing a distribution shift in terms of both graph structure and node attributes. Furthermore, it is usually costly and expensive to obtain labels. Thus, we are often faced with sparse labels. The sparse label also makes the distribution shifts more severe due to the less coverage of representative labeled nodes. Self-training [14, 16] has shown great success in tackling sparse labels. Generally, in self-training, an arbitrary backbone trained on the original labeled data acts as the teacher model. This teacher model assigns pseudo-labels to selected unlabeled nodes and incorporates them to augment the labeled data, after which a student model is trained on the augmented training nodes. Typically, current self-training frameworks introduce multiple stages where the teacher model is iteratively updated with augmented data to generate more confident pseudo-labeled nodes [7, 11, 29, 37]. For example, Self-Training (ST) [16] represents a single-stage self-training framework that initially trains a GCN using given labels, subsequently selects predictions exhibiting the highest confidence, and then proceeds to further train the GCN utilizing the expanded set of labels. Conversely, M3S [29] stands for a multi-stage self-training framework that, during each stage, applies DeepCluster to the graph embeddings of GCNs and introduces an alignment mechanism for the clusters to generate pseudo-labels. Despite their great success, most existing self-training methods are developed under the assumption of distribution consistency across labeled and unlabeled node sets. Yet, a distribution shift often occurs between these two sets. This distribution shift is more severe when the labeled nodes are sparse because there are not enough labeled nodes to well represent the distribution. In addition, recent work [18] shows that the pseudo-labeling step may amplify this CCS CONCEPTS • Computing methodologies → Semi-supervised learning settings; Neural networks. KEYWORDS Self-Training, Distribution Shifts, Graph Neural Networks ACM Reference Format: Fali Wang, Tianxiang Zhao, and Suhang Wang. 2024. Distribution Consistency based Self-Training for Graph Neural Networks with Sparse Labels. In Proceedings of the 17th ACM International Conference on Web Search and Data Mining (WSDM ’24), March 4–8, 2024, Merida, Mexico. ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/3616855.3635793 Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. WSDM ’24, March 4–8, 2024, Merida, Mexico © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0371-3/24/03. . . $15.00 https://doi.org/10.1145/3616855.3635793 INTRODUCTION" 2401.10397v1,"1 Analyzing and Mitigating Bias for Vulnerable Classes: Towards Balanced Representation in Dataset Dewant Katare § , David Solans Noguero † , Souneil Park † , Nicolas Kourtellis † , Marijn Janssen § , Aaron Yi Ding § , § Delft University of Technology, † Telefónica Research Abstract—The accuracy and fairness of perception systems in autonomous driving are crucial, particularly for vulnerable road users. Mainstream research has looked into improving the performance metrics for classification accuracy. However, the hidden traits of bias inheritance in the AI models, class imbalances and disparities in the datasets are often overlooked. In this context, our study examines the class imbalances for vulnerable road users by focusing on class distribution analysis, performance evaluation, and bias impact assessment. We identify the concern of imbalances in class representation, leading to potential biases in detection accuracy. Utilizing popular CNN models and Vision Transformers (ViTs) with the nuScenes dataset, our performance evaluation reveals detection disparities for underrepresented classes. We propose a methodology for model optimization and bias mitigation, which includes data augmentation, resampling, and metric-specific learning. Using the proposed mitigation approaches, we see improvement in IoU(%) and NDS(%) metrics from 71.3 to 75.6 and 80.6 to 83.7 respectively, for the CNN model. Similarly, for ViT, we observe improvement in IoU and NDS metrics from 74.9 to 79.2 and 83.8 to 87.1 respectively. This research contributes to developing more reliable models and datasets, enhancing inclusiveness for minority classes. I. I NTRODUCTION The advent of autonomous driving technology marks a significant leap forward in the automotive industry. While the benefits of autonomous vehicles (AVs) are manifold, including potential reductions in traffic accidents and increased mobility for various demographics, the technology’s reliability is highly contingent on the accuracy and fairness of its perception systems [12] [14]. These systems, particularly those involving object detection, are critical for identifying and appropriately reacting to various entities on the road, such as pedestrians, cyclists, motorcyclists, and mobility-impaired persons [8] [31]. However, recent studies have underscored the existence of biases in autonomous driving datasets, which could lead to discriminatory treatment of certain road users [17] [25]. Our study delves into two prominent datasets in this domain, nuScenes [4] and Waymo [27], aiming to uncover and address these biases. We explore the representation of vulnerable classes on object detection models’ accuracy and fairness through class distribution analysis, model’s performance evaluation, and bias impact assessment. Class imbalance refers to the disproportionate representation of different categories or classes within a dataset [23]. In the context of autonomous Corresponding e-mails: d.katare@tudelft.nl driving, this often manifests as an overrepresentation of certain types of vehicles, while pedestrians, cyclists, motorcyclists, and especially mobility-impaired individuals are underrepresented [17]. The imbalance is not only a statistical concern but a practical one, as it can lead to perception systems that are less adept at recognizing minor, yet crucial classes. Studies have shown that this imbalance can result in biased learning outcomes, where models preferentially detect overrepresented classes [29]. The consequences of such an imbalance in the dataset cannot be overlooked, as evidenced by incidents like the Uber self-driving car collision [26]. In this dataset imbalance context, our paper explores: 1) How do the representation and disparities of classes in datasets impact the accuracy of AI models? 2) How do biases in AI systems for detecting underrepresented classes manifest in visual application, and what implications do they have on diverse models? To counter biases towards learning, our research explores a framework for balanced class representation and AI model optimization. We emphasize the need for diverse and representative datasets that include a wide range of scenarios, reflecting the complexity of real-world conditions. The proposed framework includes bias assessment and model re-calibration to ensure model fairness and effectiveness with the retraining of models with the inclusion of new classes/sub-samples. We also highlight critical gaps in current vision datasets used in autonomous driving through metric-specific learning to develop more equitable and reliable systems. The aim is to contribute to the generalization of AI algorithms and respective datasets. II. B ACKGROUND AND R ELATED W ORK Perception technology in autonomous driving has evolved through extensive research and development, with significant milestones achieved in sensor technology, algorithmic processing, and machine learning models. Early systems relied heavily on rule-based algorithms and limited sensor input, but the advancements in deep learning and improvements in LiDAR, radar, and camera technologies have provided next-generation solutions [15]. Despite these advancements, the challenge of developing perception systems that can reliably interpret diverse and unpredictable road scenarios remains a significant research focus. Datasets play a crucial role in training and validating autonomous driving systems. Datasets like KITTI" 2401.10402v1,"Reconstructing the Invisible: Video Frame Restoration through Siamese Masked Conditional Variational Autoencoder Yongchen Zhou LIRA Center, Lancaster University Lancaster, England Richard Jiang LIRA Center, Lancaster University Lancaster, England y.zhou52@lancaster.ac.uk r.jiang2@lancaster.ac.uk Abstract In the domain of computer vision, the restoration of missing information in video frames is a critical challenge, particularly in applications such as autonomous driving and surveillance systems. This paper introduces the Siamese Masked Conditional Variational Autoencoder (SiamMC- VAE), leveraging a siamese architecture with twin encoders based on vision transformers. This innovative design enhances the model’s ability to comprehend lost content by capturing intrinsic similarities between paired frames. SiamMCVAE proficiently reconstructs missing elements in masked frames, effectively addressing issues arising from camera malfunctions through variational inferences. Experimental results robustly demonstrate the model’s effectiveness in restoring missing information, thus enhancing the resilience of computer vision systems. The incorporation of Siamese Vision Transformer (SiamViT) encoders in SiamMCVAE exemplifies promising potential for addressing real-world challenges in computer vision, reinforcing the adaptability of autonomous systems in dynamic environments. 1. Introduction In the dynamic world of computer vision, where the lens of artificial intelligence gazes upon the visual landscape, a singular challenge has continued to captivate the imaginations of researchers and engineers alike. This challenge lies at the intersection of technology and the human experience—a quest to restore what has been lost [17], to unveil the unseen, and to breathe life into the incomplete. In a world fueled by the relentless pursuit of innovation, the restoration of missing information within video frames stands as a formidable testament to the artistry of visual intelligence [26]. In recent years, developments in the field of deep learning have witnessed a growing movement towards the inte- gration of methodologies to address a wide array of challenges, encompassing language [24], vision [10, 21], speech [43], and various other domains. The adaptation of Transformer architectures [32], initially prevalent in natural language processing, has found successful integration into the realm of computer vision [14]. The landscape of predictive learning methods has witnessed an intriguing evolution, driven by the transformative potential of masked language modeling [5, 13] and its visual counterpart, masked visual modeling (MVM) [2, 17, 38]. This paper confronts the formidable challenge of restoring large-scale missing information within video frames, introducing a groundbreaking solution that harnesses the latest advancements in machine learning and computer vision. Our model, SiamMCVAE, illustrated in Figure 1, draws inspiration from the Conditional Variational Autoencoder (CVAE) [29], ushering in a significant breakthrough in the realm of restoration capability. While siamese networks [29] have conventionally found applications in classification and comparison tasks [6, 9, 16, 37], our work extends this architecture to the generative domain, introducing a novel dimension to its utilization. The existing Masked Autoencoders (MAE) [17] and their extensions [15, 31] demonstrate proficiency in restoring large-scale missing information. However, these models lack comprehensive evaluations specifically focused on image restoration. To address this void, our meticulous evaluation uniquely scrutinizes the performance of these models, placing a distinct emphasis on their efficacy in the context of image restoration. Through this investigation, we unveil SiamMCVAE’s unparalleled advantages over them. Notably, its exceptional capability to excel in reconstructing images, even in scenarios characterized by extensive missing information, establishes it as a pioneering solution in the field. What sets our model apart is its remarkable ability to excel in restoring information under challenging conditions. SiamMCVAE, with its unique capacity to learn correspondences and reconstruct lost patches within video frames," 2401.10405v1,"Differentially Private and Adversarially Robust Machine Learning: An Empirical Evaluation Janvi Thakkar 1 , Giulio Zizzo 2 , Sergio Maffeis 1 1 Department of Computing, Imperial College London 2 IBM Research Europe janvi.thakkar22@imperial.ac.uk, giulio.zizzo2@ibm.com, sergio.maffeis@imperial.ac.uk Abstract Malicious adversaries can attack machine learning models to infer sensitive information or damage the system by launching a series of evasion attacks. Although various work addresses privacy and security concerns, they focus on individual defenses, but in practice, models may undergo simultaneous attacks. This study explores the combination of adversarial training and differentially private training to defend against simultaneous attacks. While differentially-private adversarial training, as presented in DP-Adv (Bu, Li, and Zhao 2021), outperforms the other state-of-the-art methods in performance, it lacks formal privacy guarantees and empirical validation. Thus, in this work, we benchmark the performance of this technique using a membership inference attack and empirically show that the resulting approach is as private as non-robust private models. This work also highlights the need to explore privacy guarantees in dynamic training paradigms. Introduction Despite their success, machine learning (ML) models are susceptible to various malicious attacks. Privacy attacks like model extraction (Tramèr et al. 2016) and membership inference attacks (Shokri et al. 2017) try to infer sensitive information of the model and its training datasets. Evasion attacks using adversarial samples (Szegedy et al. 2013) fool the model into predicting wrong outcomes, critically increasing the risks associated with ML models. Multiple studies have focused on devising techniques to preserve the privacy and security of ML models independently from each other. Several strategies were proposed (Chaudhuri, Monteleoni, and Sarwate 2011; Kifer, Smith, and Thakurta 2012; Rubinstein et al. 2009) to defend against privacy attacks. One of the widely used approaches is to employ differential privacy in the training algorithm, DPSGD (Abadi et al. 2016), to safeguard the privacy of individual datapoints. In response to evasion attacks, defense techniques such as adversarial training augment the training set with adversarial samples, generated using FGSM (Goodfellow, Shlens, and Szegedy 2014) or PGD (Madry et al. 2017), significantly increasing the robustness of the resulting model. PPAI-24: The 5th AAAI Workshop on Privacy-Preserving Artificial Intelligence There is little work addressing these concerns at the same time. Preliminary research observed that applying DP makes the model more vulnerable to adversarial attacks (Tursynbek, Petiushko, and Oseledets 2020), and similarly, using adversarial training techniques makes the model more susceptible to privacy attacks (Shokri et al. 2017). Recent work (Phan et al. 2020) proposed the StoBatch algorithm, which combines differential privacy and adversarial training to defend against simultaneous privacy and security attacks. The primary goal was to convert the training data to DP-private data and then leverage these DP- training samples to generate adversarial samples. However, this comes at the cost of model utility and robustness. DP-Adv (Bu, Li, and Zhao 2021) tried addressing the limitations of StoBatch, by adopting the traditional DPSGD strategy (Abadi et al. 2016) and replacing each training sample with exactly one adversarial example. This approach is more practical, and provides improved utility and robustness compared to StoBatch. However, the approach has not been empirically evaluated. Furthermore there is a concern that owing to the use of adversarial samples, which are generated using a non-private optimizer, it may not be as private as DPSGD, i.e., a non-robust private model. Thus, in this work, we address these privacy concerns, and empirically validate the claims made by the DP-Adv algorithm. Our main contribution includes: • We benchmark the performance of the DP-Adv technique using a membership inference attack (MIA) and empirically showed its efficacy in preserving both the individual and group-level privacy of training data. • We raise an important research question for the differential privacy community, which involves investigating privacy guarantees in the context of dynamic algorithms, i.e., constantly changing training paradigms. Approach: DP-Adv In this section, we describe the DP-Adv algorithm (Bu, Li, and Zhao 2021). The main intuition is to replace each normal training sample with exactly one adversarial example in the differentially private training, DPSGD algorithm. According to the post-processing property of DP, pre-processing the data has no impact on the privacy of the ML model; thus, the algorithm tackles the same" 2401.10416v1,"DataViz3D: An Novel Method Leveraging Online Holographic Modeling for Extensive Dataset Preprocessing and Visualization Jinli Duan a a New York University, Tandon School of Engineering, New York, NY, United States Abstract DataViz3D is an innovative online software that transforms complex datasets into interactive 3D spatial models using holographic technology. This tool enables users to generate scatter plot within a 3D space, accurately mapped to the XYZ coordinates of the dataset, providing a vivid and intuitive understanding of the spatial relationships inherent in the data. DataViz3D’s userfriendly interface makes advanced 3D modeling and holographic visualization accessible to a wide range of users, fostering new opportunities for collaborative research and education across various disciplines. This project is hosted at:DataViz3D Frontpage Keywords: 3D Visualization, Holographic Tech, Dataset Interpretation, high-dimensional datasets 1. Introduction In the area of big data, the ability to effectively visualize and interpret complex datasets is of paramount importance. DataViz3D, a novel online software tool, represents a significant step forward in this domain, leveraging advanced holographic modeling to enhance the process of dataset visualization and preprocessing.This tool offers an intuitive perception of showing spatial relationships inherent within the data using holographic display, a perspective that traditional twodimensional visualizations often fail to provide. The human visual system, being the dominant sensory pathway for information processing. Research suggests that a significant portion of the information we process is mediated through visionMilner and Goodale (2006). This underscores the importance of data visualization, defined as the graphical representation of informationKorting et al. (2023). DataViz3D meets this need by enabling a dynamic and interactive exploration of data in a three-dimensional space. This approach not only enhances the visualization of three-dimensional data but also offers new perspectives for understanding highdimensional data, which can be challenging to represent in flat, two-dimensional formats. The application of holographic technology in DataViz3D is particularly significant. It facilitates a dynamic representation of data in three-dimensional space, enabling users to engage with and comprehend data in ways that two-dimensional visualizations cannot achieveGao et al. (2019). By utilizing holograms, DataViz3D allows for an enhanced visual experience where data points are not only visible but also interactable in a simulated three-dimensional environment. DataViz3D’s user-friendly interface further broadens its appeal, making advanced 3D modeling and holographic visualization accessible to a diverse range of users. This accessibility Email address: jd5374@nyu.edu (Jinli Duan) Preprint submitted to Expert systems with applications fosters new avenues for collaborative research and education across various disciplines. The software’s intuitive design ensures that users, regardless of their technical background, can effectively engage with and analyze complex data structures. In the following sections, we will dive deeper into the technical aspects of DataViz3D, explore its application structure, and discuss its potential impact on the field of data analysis and visualization. The aim is to demonstrate how DataViz3D stands as a transformative tool, enhancing our ability to interact with and understand complex datasets in the field of big data. 2. Related Work In reviewing the previous work of researches that forms the foundation of our study, this section explores pivotal contributions and technological advancements in data visualization. We focus particularly on the developments that have led to the integration of three-dimensional and holographic visualization techniques, which are central to the design and functionality of DataViz3D. 2.1. 3D-RadViz 3D-RadVizElewah et al. (2021) extends the traditional Radial Visualization (RadViz) by introducing a third dimension, offering an improved way to visualize complex datasets with minimal overlap and ambiguity. This method has been successfully applied to various datasets, demonstrating its efficacy in providing clear and distinct visual representations, especially in cases where traditional 2D approaches, like RadViz2D, might fall short. The development of 3D-RadViz is a significant contribution to the field of data visualization, addressing the challenges of interpreting multi-dimensional data in a more intuitive and accessible manner. The development of 3D-RadViz has been inspiring for projects like DataViz3D, particularly in how it addresses the January 22, 2024" 2401.10444v1,"Can A Cognitive Architecture Fundamentally Enhance LLMs? Or Vice Versa? Ron Sun Department of Cognitive Science Rensselaer Polytechnic Institute Troy, NY 12180, USA dr.ron.sun@gmail.com Abstract The paper discusses what is needed to address the limitations of current LLM-centered AI systems. The paper argues that incorporating insights from human cognition and psychology, as embodied by a computational cognitive architecture, can help develop systems that are more capable, more reliable, and more human-like. It emphasizes the importance of the dual-process architecture and the hybrid neuro-symbolic approach in addressing the limitations of current LLMs. In the opposite direction, the paper also highlights the need for an overhaul of computational cognitive architectures to better reflect advances in AI and computing technology. Overall, the paper advocates for a multidisciplinary, mutually beneficial approach towards developing better models both for AI and for understanding the human mind. Keywords LLM, cognitive architecture, dual process, psychology, AI 1" 2401.10446v1,"Published as a conference paper at ICLR 2024 L ARGE L ANGUAGE M ODELS ARE E FFICIENT L EARN - ERS OF N OISE -R OBUST S PEECH R ECOGNITION Yuchen Hu †,1∗ Chen Chen 1∗ Chao-Han Huck Yang 2,3,† Ruizhe Li 4 Chao Zhang 5 Pin-Yu Chen 6 Eng Siong Chng 1 1 Nanyang Technological University 2 Georgia Institute of Technology 3 NVIDIA Research 4 University of Aberdeen 5 Tsinghua University 6 MIT-IBM Waston AI Lab A BSTRACT Recent advances in large language models (LLMs) have promoted generative error correction (GER) for automatic speech recognition (ASR), which leverages the rich linguistic knowledge and powerful reasoning ability of LLMs to improve recognition results. The latest work proposes a GER benchmark with “HyPoradise” dataset to learn the mapping from ASR N-best hypotheses to ground-truth transcription by efficient LLM finetuning, which shows great effectiveness but lacks specificity on noise-robust ASR. In this work, we extend the benchmark to noisy conditions and investigate if we can teach LLMs to perform denoising for GER just like what robust ASR do, where one solution is introducing noise information as a conditioner into LLM. However, directly incorporating noise embeddings from audio encoder could harm the LLM tuning due to cross-modality gap. To this end, we propose to extract a language-space noise embedding from the N-best list to represent the noise conditions of source speech, which can promote the denoising process in GER. Furthermore, in order to enhance its representation ability of audio noise, we design a knowledge distillation (KD) approach via mutual information estimation to distill the real noise information in audio embeddings to our language embedding. Experiments on various latest LLMs demonstrate our approach achieves a new breakthrough with up to 53.9% correction improvement in terms of word error rate while with limited training data. Analysis shows that our language-space noise embedding can well represent the noise conditions of source speech, under which off-the-shelf LLMs show strong ability of language-space denoising 1 . 1 I NTRODUCTION Recent advances in large language models (LLMs) have attracted a surge of research interest due to their representation power of language generation (OpenAI, 2022; 2023; Touvron et al., 2023a), which achieve a wide range of success on natural language processing (NLP) tasks (Brown et al., 2020; Wei et al., 2022; Ouyang et al., 2022). Powered by LLMs, latest works (Chen et al., 2023b; Yang et al., 2023a) propose a generative error correction (GER) framework 2 for automatic speech recognition (ASR), along with a “HyPoradise” dataset 3 that contains abundant pairs of ASR N-best hypotheses and ground-truth transcription. It has shown great performance in learning the mapping from hypotheses to transcription by parameter-efficient LLM finetuning (Hu et al., 2021), which significantly outperforms typical LM rescoring methods (Mikolov et al., 2010). However, their study lacks specificity on noisy ASR scenarios, which are the most common in real world (Li et al., 2015). In this work, we extend the GER benchmark to noisy conditions, as well as propose a Robust HyPoradise (RobustHP) dataset with 113K hypotheses-transcription pairs from various ASR corpus in common noisy scenarios. Similar to the original benchmark, we also observe error correction improvement of LLM finetuning on noisy ASR, but the performance gain in most noisy conditions is still limited (see Table 1). It indicates that LLMs-based GER is still prone to source audio noise ∗ Equal contribution. †Corresponding authors: yuchen005@e.ntu.edu.sg, hucky@nvidia.com This work is open sourced at: https://github.com/YUCHEN005/RobustGER 2 https://github.com/Hypotheses-Paradise/Hypo2Trans 3 https://huggingface.co./datasets/PeacefulData/Robust-HyPoradise 1 1" 2401.10464v1,"PhotoScout: Synthesis-Powered Multi-Modal Image Search CELESTE BARNABY, University of Texas at Austin, USA QIAOCHU CHEN, University of Texas at Austin, USA CHENGLONG WANG, Microsoft Research, USA IŞIL DILLIG, University of Texas at Austin, USA Due to the availability of increasingly large amounts of visual data, there is a growing need for tools that can help users find relevant images. While existing tools can perform image retrieval based on similarity or metadata, they fall short in scenarios that necessitate semantic reasoning about the content of the image. This paper explores a new multi-modal image search approach that allows users to conveniently specify and perform semantic image search tasks. With our tool, PhotoScout, the user interactively provides natural language descriptions, positive and negative examples, and object tags to specify their search tasks. Under the hood, PhotoScout is powered by a program synthesis engine that generates visual queries in a domain-specific language and executes the synthesized program to retrieve the desired images. In a study with 25 participants, we observed that PhotoScout allows users to perform image retrieval tasks more accurately and with less manual effort. 1 INTRODUCTION With the advancement of camera technologies and the prevalence of social media, photography is more accessible than ever. Nowadays, people increasingly have access to large volumes of photographs, taken by themselves or shared by others, that capture unique moments of their lives. As this volume grows, the task of retrieving relevant images from one’s personal library becomes more important yet also more challenging. Modern photo management tools like Google Photos allow the user to search for relevant images based on metadata constraints (e.g., presence of a specific person; the date the photo was taken) or visual similarity to another image or natural language query. While existing interfaces work reasonably well for simple search tasks, they fall short in structured image retrieval tasks: that is, tasks that require semantic reasoning about the structure of objects in an image. Such structured image retrieval tasks are important both for professional photographers as well as regular users who increasingly have access to large amounts of visual data on their smartphones and the cloud. For example, event photographers often have a shot list describing certain images that they must deliver to a client, such as those where the bride and groom are walking down the aisle or images containing only the bride and her mother [1, 49]. However, such structured image search tasks also come up in everyday life for regular users. For example, someone who is writing a travel blog might want to retrieve those images in which they are standing in front of the Eiffel Tower, or someone mourning the loss of a pet might want to find all images in which their cat is sitting on their lap. As illustrated by these examples, such structured image search tasks require reasoning about contents of the image as well as relationships between them. However, such tasks are not easy to specify using existing image search interfaces. For example, while they provide support for finding images that contain a specific person, they do not facilitate searching for images where that person is performing a certain action or has a certain property. In fact, a key characteristic of Authors’ addresses: Celeste Barnaby, University of Texas at Austin, USA, celestebarnaby@utexas.edu; Qiaochu Chen, University of Texas at Austin, USA, qchen@cs.utexas.edu; Chenglong Wang, Microsoft Research, USA, chenwang@microsoft.com; Işıl Dillig, University of Texas at Austin, USA, isil@cs.utexas.edu. 2024. Manuscript submitted to ACM Manuscript submitted to ACM 1" 2401.10465v1,"DATA DRIVEN GRAPHEME-TO-PHONEME REPRESENTATIONS FOR A LEXICON-FREE TEXT-TO-SPEECH Abhinav Garg ∗ 1† , Jiyeon Kim ∗2 , Sushil Khyalia 3† , Chanwoo Kim 4† , Dhananjaya Gowda 2 abhinavg@stanford.edu, jstacey7.kim@samsung.com, skhyalia@andrew.cmu.edu, chanwcom@korea.ac.kr, d.gowda@samsung.com 1 2 3 4 Stanford University Samsung Research Carnegie Mellon University Korea University ABSTRACT Grapheme-to-Phoneme (G2P) is an essential first step in any modern, high-quality Text-to-Speech (TTS) system. Most of the current G2P systems rely on carefully hand-crafted lexicons developed by experts. This poses a two-fold problem. Firstly, the lexicons are generated using a fixed phoneme set, usually, ARPABET or IPA, which might not be the most optimal way to represent phonemes for all languages. Secondly, the man-hours required to produce such an expert lexicon are very high. In this paper, we eliminate both of these issues by using recent advances in self-supervised learning to obtain data-driven phoneme representations instead of fixed representations. We compare our lexicon-free approach against strong baselines that utilize a well-crafted lexicon. Furthermore, we show that our data-driven lexicon-free method performs as good or even marginally better than the conventional rule-based or lexicon-based neural G2Ps in terms of Mean Opinion Score (MOS) while using no prior language lexicon or phoneme set, i.e. no linguistic expertise. Index Terms— Grapheme-to-Phoneme, data-driven G2P, Text-to-Speech, lexicon-free TTS, self-supervised learning 1. INTRODUCTION Text-to-Speech synthesis has been the subject of extensive research for several decades [1, 2]. Initially, concatenative speech synthesis models were developed to address this task by assembling waveforms from a pre-existing database of speech. Subsequently, statistical approaches were introduced to generate speech features from the text, which were then fed to a vocoder to produce the final output. The results of these methods are unsatisfactory due to the unnaturalness and mispronunciations in the generated speech. Grapheme-to-Phoneme (G2P) models are an integral part of current Text-to-Speech (TTS) engines [3, 4]. The initial work in this field was done using rule-based and joint sequence models. However, with the rise of deep learning methods, RNN, and even more recently, Transformer based architectures have been used to perform a variety of ∗ Equal contributions. † Work done at Samsung Research. tasks such as Grapheme-to-Phoneme, Automatic Speech Recognition[5, 6, 7], Machine Translation, and Text-to- Speech Synthesis [3, 4, 8, 9]. As G2P conversion is essentially a sequence-to-sequence modeling task, using Encoder- Decoder architectures[10, 11] helped obtain improvements on Grapheme-to-Phoneme conversion [3]. Traditional G2Ps [12] typically use a large lexicon to perform dictionary searches of the most frequent words and use hand-crafted rules to generate pronunciations for out-ofvocabulary words. Neural G2Ps [3], in contrast, use lexicons as their data for training their neural network and use the obtained network for predicting pronunciations. While both of these methods have been instrumental in building modernday TTS systems, they have severe limitations in terms of requiring an external lexicon. Building a lexicon is an expensive and highly cumbersome task, as it requires multiple language experts to propose and then verify its validity. Recently there have been efforts to build a massively multi-lingual ByT5 G2P [13]. It uses a T5 transformer based encoder-decoder architecture [14] and uses an UTF8 based input tokenization to handle scripts in multiple languages. It uses publicly available lexicons from the internet covering upto 100 languages with varying size and quality of the lexicons. The difficulty in procuring high quality lexicon for all languages and the decreasing accuracy of g2p models for languages with limited or noisy data can be clearly seen from this paper. In this paper, we propose a new mechanism to train the Grapheme-to-Phoneme model without the need of any lexicon. We use Text-to-Speech as a use-case to show the effectiveness of our G2P model. We first use unlabeled speech data to pre-train a HuBERT [15] for three iterations. Once we have a pre-trained HuBERT model, we input the labeled speech data and use a specific transformer layer to extract the speech features and apply k-means clustering on them to obtain frame-level phoneme targets. We use paired phoneme targets and labeled speech data to train our G2P transformer model. We then use the trained G2P to train a Tacotron 2 [1] model." 2401.10471v1,"DeepEdit: Knowledge Editing as Decoding with Constraints † Yiwei Wang † Muhao Chen ‡ Nanyun Peng † Kai-Wei Chang † University of California, Los Angeles ‡ University of California, Davis wangyw.evan@gmail.com Abstract We develop a new perspective of knowledge editing for large language models (LLMs) as decoding with constraints. We propose D EEP E DIT (Depth-first Search based Progressive Decoding for Knowledge Editing), a neurosymbolic method that improves knowledge editing with better coherence of reasoning, relevance to the question, and awareness of updated knowledge. D EEP E DIT can be flexibly applied to all black-box LLMs: it does not require any access to the model parameters, representations, or output vocabulary distributions. D EEP E DIT progressively produces the high-quality reasoning steps towards effective knowledge editing. It utilizes a depthfirst search to revise the LLMs’ output, which improves the output’s informativeness to the input question and awareness of the updated knowledge. Qualitatively, D EEP E DIT effectively controls LLMs to produce more succinct reasoning in accord with knowledge editing. Quantitatively, D EEP E DIT yields significant gains on MQuaKE, a challenging multihop question-answering dataset with knowledge editing. We release the source code at https://github.com/wangywUST/DeepEdit . 1 Introduction We consider a challenging setting of knowledge editing for large language models (LLMs): the multi-hop question answering (Zhong et al., 2023), where LLMs should answer the questions corresponding to a chain of facts with the updated knowledge. Given the fast-growing parameter sizes of large language models (LLMs) (Zhao et al., 2023), frequently updating LLMs with new knowledge through retraining is more and more expensive. Hence, it is vital to effectively edit the LLMs’ knowledge without retraining. Recent literature has mainly sought to perform knowledge editing through in-context editing (Zhong et al., 2023; Cohen et al., 2023). For exam- Figure 1: Our progressive decoding method D EEP E DIT generates a reasoning step; searches the relevant updated knowledge; verifies the constraints; and then revises the reasoning at every iteration. We maintain a stack to control the text decoding with a depth-first search for effective knowledge editing. ple, Cohen et al. (2023) propose to append the new knowledge at the head of the prompt as “Imagine that ...” However, in-context editing lacks direct control of the outputs; how the updated knowledge in the input text influences the outputs is not traceable and the performance is not guaranteed. This issue raises a natural question: Can we directly control the LLMs’ output to follow the updated knowledge in a traceable way? The central idea of this paper is to view knowledge editing as a problem of decoding with constraints. We propose to impose semantic constraints on the LLMs’ outputs to represent the desired properties that benefit knowledge editing, as shown in Figure 2. Specifically, we propose the following constraints: [Uniqueness] ensures the advancements of every reasoning step; [Coherence] guarantees the coherence of adjacent steps; [Awareness] guarantees the LLMs’ awareness of updated knowledge; [Relevance] improves the relevance of reasoning to the input question. Our idea is to directly control the LLMs’ outputs to follow the" 2401.10513v1,"SAGE-HB: Swift Adaptation and Generalization in Massive MIMO Hybrid Beamforming Ali Hasanzadeh Karkan, Hamed Hojatian, Jean-François Frigon, and François Leduc-Primeau Abstract—Deep learning (DL)-based solutions have emerged as promising candidates for beamforming in massive Multiple-Input Multiple-Output (mMIMO) systems. Nevertheless, it remains challenging to seamlessly adapt these solutions to practical deployment scenarios, typically necessitating extensive data for fine-tuning while grappling with domain adaptation and generalization issues. In response, we propose a novel approach combining Meta-Learning Domain Generalization (MLDG) with novel data augmentation techniques during fine-tuning. This approach not only accelerates adaptation to new channel environments but also significantly reduces the data requirements for fine-tuning, thereby enhancing the practicality and efficiency of DL-based mMIMO systems. The proposed approach is validated by simulating the performance of a backbone model when deployed in a new channel environment, and with different antenna configurations, path loss, and base station height parameters. Our proposed approach demonstrates superior zero-shot performance compared to existing methods and also achieves near-optimal performance with significantly fewer fine-tuning data samples. I. I NTRODUCTION The emergence of massive MIMO (mMIMO) technology ushers in a new era of wireless communication, promising unprecedented gains in spectral efficiency and network capacity [1]. Hybrid beamforming (HBF) offers a balanced solution, merging analog and digital beamforming to efficiently deploy mMIMO systems. Unlike fully digital precoder (FDP), HBF strikes a practical solution, optimizing signal transmission while overcoming hardware constraints in large-scale deployments [2]. Alongside traditional beamforming methods, recent advances in deep learning (DL)-based HBF design, encompassing supervised, unsupervised, and reinforcement learning paradigms, have drawn significant attention [3]–[8]. These DL-based HBF methods not only hold the potential for improved spectral efficiency but also offer the promise of lower complexity. Supervised learning excels in precision but lacks adaptability and relies on labeled data, while unsupervised learning is more adaptive than supervised learning but is not known for its fast adaptability; it often involves time-complex fine-tuning that can be ineffective. Reinforcement learning holds promise for adaptability in dynamic environments but imposes significant computational complexity and maintaining adaptability, requiring extensive resources and potentially impractical training times. In practical deployment scenarios, the need for fine-tuning poses a significant challenge for DL-based approaches. The data collection not only incurs resource costs but, more critically, reduces the base The authors are with the Department of Electrical Engineering, Polytechnique Montreal, Montreal, QC H3T 1J4, Canada. Emails: {ali.hasanzadeh-karkan, hamed.hojatian, j-f.frigon, francois.leduc-primeau}@polymtl.ca. station’s operational efficiency. There is thus a strong need for resource-efficient fine-tuning in DL implementation. Recent studies have explored transfer learning, and metalearning techniques aimed at enhancing the adaptation of pretrained DNN to the specific requirements of deployment base station (BS) [9]–[11]. Particularly, in [9], the authors propose two offline adaptive beamforming algorithms based on deep transfer learning and meta-learning, and an online algorithm to enhance the adaptation capability of the offline meta-algorithm in realistic non-stationary environments. The authors in [10] presented a solution for tackling the problem of mismatch by first training an embedding model to extract transferable features, and then using support vector regression for fitting. An iterative meta-learning algorithm is introduced in [11] for maximizing Weighted Sum Rate (WSR) in MISO downlink channels. In [12], the authors proposed to use data augmentation techniques to enhance the robustness of the neural precoding methods for designing beamforming in the MISO system. However, their methods rely on adding noise to the input CSI, which may not capture the true diversity and complexity of the new deployment domain. A shortcoming of many existing studies in transfer learning for wireless communications is that both the training and deployment scenarios are simulated using statistical channel models, which may not capture the full extent of the domain shift. In this paper, we focus on enhancing the adaptability and generalization capabilities of DL-based HBF in diverse channel conditions while addressing the resource-intensive nature of finetuning. Our goal is to seamlessly integrate DL-based HBF into the dynamic realm of mMIMO systems. Inspired by the success of meta-learning and domain generalization, we aim for swift adaptation. Additionally, we introduce an innovative data augmentation technique in unsupervised fine-tuning to reduce the resource demands for dataset gathering. Based on our evaluations, we demonstrate our method’s swift adaptation, requiring fewer fine-tuning samples, and its superior performance over existing DL-based solutions. Notably, it can achieve good performance even in scenarios with changes in antenna configurations. Finally, the experimental validation provides insight into the transition from statistical channel models to real-world scenarios. II. S YSTEM MODEL Let us consider a multi-user mMIMO system consisting of a BS equipped with N T antennas and N RF radio frequency (RF) chains serving N U single antenna users simultaneously. For the" 2401.10519v1,"A Wind-Aware Path Planning Method for UAV-Asisted Bridge Inspection 1 st Jian Xu 2 nd Hua Dai Nanjing ShuZu Information Technology Co. Ltd. Nanjing 211899, China xujian@shuzutech.com Nanjing University of Posts & Telecommunications Nanjing 210023, China daihua@njupt.edu.cn Abstract—In response to the gap in considering wind conditions in the bridge inspection using unmanned aerial vehicle (UAV) , this paper proposes a path planning method for UAVs that takes into account the influence of wind, based on the simulated annealing algorithm. The algorithm considers the wind factors, including the influence of different wind speeds and directions at the same time on the path planning of the UAV. Firstly, An environment model is constructed specifically for UAV bridge inspection, taking into account the various objective functions and constraint conditions of UAVs. A more sophisticated and precise mathematical model is then developed based on this environmental model to enable efficient and effective UAV path planning. Secondly, the bridge separation planning model is applied in a novel way, and a series of parameters are simulated, including the adjustment of the initial temperature value. The experimental results demonstrate that, compared with traditional local search algorithms, the proposed method achieves a cost reduction of 30.05% and significantly improves effectiveness. Compared to path planning methods that do not consider wind factors, the proposed approach yields more realistic and practical results for UAV applications, as demonstrated by its improved effectiveness in simulations. These findings highlight the value of our method in facilitating more accurate and efficient UAV path planning in wind-prone environments. Index Terms—simulated annealing,local search,unmanned aerial vehicle,wind factor,path planning. I. I NTRODUTION Bridge inspection has always been a high-risk and highcost industry that is closely related to the use of bridges. With the continuous development and maturity of aerial photography and remote sensing technology, the application of unmanned aerial vehicle (UAV) technology in bridge inspection has broken through the limitations of traditional bridge inspection methods, which has promoted the development and progress of the field [1]. Due to the application of these technologies, UAVs will have long-term development and application in bridge inspection. However, the current application of UAVs in bridge inspection is mainly based on single UAV execution, and the task objectives are achieved through manual control [2]. In this mode, the efficiency of UAVs is severely reduced. Under the mode of autonomous flight inspection, the current issue with UAV path planning mainly focuses on planning the length of the UAV path, and does not involve other factors such as weather. Since most bridges are built above rivers or even seas, where the wind speed changes greatly and the UAV encounters unfavorable conditions, path planning for UAVs should not be overlooked. Due to payload limitations, UAVs must reasonably plan and select suitable routes. There is no mature mechanism in the 3D modeling environment to ensure the impact of changing factors on path planning. Previous path planning did not consider the existence of wind factors, resulting in the number of UAVs needed to rotate in actual applications being much larger than the ideal planned number. Traditional local search algorithms are widely used in UAV path planning due to their fast efficiency, but they often fall into local optimal solutions [3]. To address the problem under study, we propose a simulated annealing planning method that embeds wind factors.Our contributions are as follows: 1) A bridge deck separation detection model is established to accelerate the maturity of path planning. 2) The impact of wind from different directions at different times on UAVs is considered in the wind factor measurement and control. 3) The mainstream path planning algorithm is improved by embedding the wind factor into the algorithm, and the efficiency and number of UAVs are compared with traditional search algorithms [4] and situations without considering wind factors. In the following sections, we describe our model in the first part, followed by a description of the algorithm we used and a comparison of simulation results. The fourth part summarizes the conclusions of relevant work, and the future research directions are suggested. II. P ROBLEM DESCRIPTION The key issue in introducing wind parameters lies in the decomposition of wind speed and direction. To address this, we have developed and applied the following bridge deck separation detection model and wind direction vector decomposition model. The main Notation involved are shown below. A. Bridge Surface Separation Planning Model The existing methods for modeling bridges mainly use unmanned aerial vehicles to perform cyclic scans of the entire bridge for image processing and modeling [5]. However, this" 2401.10521v1,"Cross-lingual Editing in Multilingual Language Models Himanshu Beniwal ∗ , Kowsik Nandagopan D, Mayank Singh Department of Computer Science and Engineering Indian Institute of Technology Gandhinagar {himanshubeniwal, dkowsik, singh.mayank}@iitgn.ac.in Abstract The training of large language models (LLMs) necessitates substantial data and computational resources, and updating outdated LLMs entails significant efforts and resources. While numerous model editing techniques (METs) have emerged to efficiently update model outputs without retraining, their effectiveness in multilingual LLMs, where knowledge is stored in diverse languages, remains an underexplored research area. This research paper introduces the cross-lingual model editing (XME) paradigm, wherein a fact is edited in one language, and the subsequent update propagation is observed across other languages. To investigate the XME paradigm, we conducted experiments using BLOOM, mBERT, and XLM-RoBERTa using the two writing scripts: Latin (English, French, and Spanish) and Indic (Hindi, Gujarati, and Bengali). The results reveal notable performance limitations of state-of-the-art METs under the XME setting, mainly when the languages involved belong to two distinct script families. These findings highlight the need for further research and development of XME techniques to address these challenges. For more comprehensive information, the dataset used in this research and the associated code are publicly available at the following URL 1 . 1 Introduction The introduction of large language models (LLMs) has revolutionized tasks such as dialogue generation, question-answering, and contextual reasoning (Brants et al., 2007; Touvron et al., 2023; Scao et al., 2022). LLMs are trained on massive datasets, but this unsupervised data can potentially contain biased or incorrect information. For example, an LLM trained on a dataset of news articles might learn that: Apple iPhones are the best phones or ∗ This work is supported by the Prime Minister Research Fellowship. 1 https://github.com/lingo-iitgn/XME that Mumbai is the capital of India. This issue becomes problematic because retraining an LLM with equivalent computational power and environmental impact is impractical (Madaan et al., 2022; Si et al., 2023). To address this problem, researchers have proposed several Model-Editing Techniques (hereafter referred as METs, Dai et al. (2022); De Cao et al. (2021)). METs focus on updating the knowledge within existing LLMs rather than undergoing complete retraining. However, these METs have been evaluated predominantly in monolingual settings, where editing and evaluation occur within a single language, typically English. This paper aims to explore an alternative scenario, as depicted in Figure 1. For example, we consider the task of updating a language model (in the English language) to reflect the transition of presidential power from Donald Trump to Joe Biden in the United States, using established model editing techniques. Subsequently, we prompt the updated model with the following French query: Donald Trump est le présidentdes États-Unis d’Amérique? (Donald Trump is the President of the United States of America?), expecting the model to correctly predict ‘REFUTES’. We term this new editing paradigm as Cross Lingual Model Editing (XME). We evaluate a specific family of METs that leverage a hypernetwork, an additional model, to update the parameters of a base LLM within the framework of XME. The primary objective is to address the following research questions: [Q1] What is the effectiveness of hypernetwork-based editing techniques in cross-lingual settings? [Q2] Do different architectures store knowledge at different locations? [Q3] How does language selection in the initial fine-tuning stage affect editing performance? [Q4] Is the traditional fine-tuning approach more effective than METs in achieving higher performance in the cross-lingual setting? In our research, we present the following key contributions:" 2401.10535v1,"The “Colonial Impulse"" of Natural Language Processing: An Audit of Bengali Sentiment Analysis Tools and Their Identity-based Biases DIPTO DAS, Department of Information Science, University of Colorado Boulder, United States SHION GUHA, Faculty of Information, University of Toronto, Canada JED BRUBAKER, Department of Information Science, University of Colorado Boulder, United States BRYAN SEMAAN, Department of Information Science, University of Colorado Boulder, United States While colonization has sociohistorically impacted people’s identities across various dimensions, those colonial values and biases continue to be perpetuated by sociotechnical systems. One category of sociotechnical systems–sentiment analysis tools–can also perpetuate colonial values and bias, yet less attention has been paid to how such tools may be complicit in perpetuating coloniality, although they are often used to guide various practices (e.g., content moderation). In this paper, we explore potential bias in sentiment analysis tools in the context of Bengali communities who have experienced and continue to experience the impacts of colonialism. Drawing on identity categories most impacted by colonialism amongst local Bengali communities, we focused our analytic attention on gender, religion, and nationality. We conducted an algorithmic audit of all sentiment analysis tools for Bengali, available on the Python package index (PyPI) and GitHub. Despite similar semantic content and structure, our analyses showed that in addition to inconsistencies in output from different tools, Bengali sentiment analysis tools exhibit bias between different identity categories and respond differently to different ways of identity expression. Connecting our findings with colonially shaped sociocultural structures of Bengali communities, we discuss the implications of downstream bias of sentiment analysis tools. ACM Reference Format: Dipto Das, Shion Guha, Jed Brubaker, and Bryan Semaan. 2024. The “Colonial Impulse"" of Natural Language Processing: An Audit of Bengali Sentiment Analysis Tools and Their Identity-based Biases. 1, 1 (January 2024), 30 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Natural language processing (NLP) enables computers to “understand,"" “interpret,"" and “generate"" language. One kind of NLP is centered around analyzing ""sentiment,"" which is the process of determining the emotional tone expressed in text data. Though it is widely used in computational linguistics, HCI researchers have critiqued this approach. Sentiment analysis, which seeks to assign subjectivity or polarity scores (usually within standardized scales) or nominal sentiment categories (e.g., positive, negative, neutral), becomes an exercise of quantifying and categorizing complex human language and emotion. However, researchers have highlighted how the process of sorting and categorization are political and reductionist and can perpetuate inequality [30, 60]. When Authors’ addresses: Dipto Das, dipto.das@colorado.edu, Department of Information Science, University of Colorado Boulder, Boulder, Colorado, United States; Shion Guha, shion.guha@utoronto.ca, Faculty of Information, University of Toronto, Toronto, Ontario, Canada; Jed Brubaker, jed.brubaker@colorado.edu, Department of Information Science, University of Colorado Boulder, Boulder, Colorado, United States; Bryan Semaan, bryan.semaan@colorado.edu, Department of Information Science, University of Colorado Boulder, Boulder, Colorado, United States. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Association for Computing Machinery. XXXX-XXXX/2024/1-ART $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn , Vol. 1, No. 1, Article . Publication date: January 2024." 2401.10541v1,"I-SplitEE: Image classification in Split Computing DNNs with Early Exits Divya J. Bajpai, Aastha Jaiswal, and Manjesh K. Hanawal Indian Institute of Technology Bombay, India Email: {20i190003, 22n0463, mhanawal}@iitb.ac.in Abstract—The recent advances in Deep Neural Networks (DNNs) stem from their exceptional performance across various domains. However, deploying these networks on resourceconstrained devices—like edge, mobile, and IoT platforms—is hindered by their inherent large size. Strategies have emerged, from partial cloud computation offloading (split computing) to integrating early exits within DNN layers. Our work presents an innovative unified approach merging early exits and split computing. We determine the ’splitting layer,’ the optimal depth in the DNN for edge device computations, and whether to infer on edge device or be offloaded to the cloud for inference considering accuracy, computational efficiency, and communication costs. Also, Image classification faces diverse environmental distortions, influenced by factors like time of day, lighting, and weather. To adapt to these distortions, we introduce I-SplitEE, an online unsupervised algorithm ideal for scenarios lacking ground truths and with sequential data. Experimental validation using Caltech-256 and Cifar-10 datasets subjected to varied distortions showcases I-SplitEE’s ability to reduce costs by a minimum of 55% with marginal performance degradation of at most 5%. I. I NTRODUCTION In recent years, the scale of Deep Neural Networks (DNNs) has undergone substantial expansion, leading to remarkable performance achievements [1], especially for computer vision tasks such as image classification [2]. This increased scale has increased computational demands, rendering their deployment on resource-constrained platforms like mobile and edge devices. To mitigate the computational challenges associated with deploying DNNs on these devices, various strategies have been introduced. These include approaches like Split Computing, Early Exits, and offloading to cloud [3]. Split Computing. Edge devices, often constrained by limited processing capabilities, can opt to offload their data to the cloud, which boasts superior computational power. This approach involves running the full-fledged Deep Neural Network (DNN) in the cloud, subsequently returning the inferences to the edge device. However, this offloading of data to the cloud incurs latency due to communication delays between the edge device and the cloud. To harness the combined resources available on both mobile devices and the cloud, a strategy known as ”split computing” has been introduced. In split computing, the DNN is bifurcated into two segments: a subset of initial layers is deployed on the edge device, while the remaining layers are hosted in the cloud. The portion deployed on the edge device serves as an encoder for processing input images, reducing their size and, consequently, mitigating latency costs. This hybrid approach facilitates edge-cloud co- inference. Nonetheless, it’s important to note that in split computing, all samples still need to be inferred at the final layer on the cloud, which, while reducing the computational burden on edge devices, maintains significant communication costs, as every sample is offloaded [3]. Early Exits (EE-DNNs). Several previous methods, including BranchyNet [4], SPINN [5], and LGViT [6], enable the classification of input images by adding classifiers at intermediate layers within DNNs. In these early exit DNNs, the decision to classify the image at an intermediate stage is contingent on the confidence of the prediction surpassing a predefined threshold. Exiting the network at its early layers demands less computational resources but may lead to less precise predictions. Conversely, deeper exits offer greater precision but at the cost of higher computational demands. Therefore, determining the best exit point within the network is important to model the accuracy-efficiency trade-off. In our approach, we introduce a hybrid strategy that combines both split computing and early exits to optimize resource usage on both edge devices and the cloud. We define the ”splitting layer” as the final layer on the edge device. At this layer, we attach an exit point for making inferences locally on the edge device. Before an input image is transferred to the cloud, it undergoes classification on the edge device. If the prediction confidence exceeds a predetermined threshold, the process is terminated, and the image is classified on the edge. In cases where the confidence falls below the threshold, the image is offloaded to the cloud for further processing. While previous methods [7], [8] traditionally employ a fixed splitting layer on the edge device, our approach advocates for the adaptive selection of the splitting layer. This adaptability is particularly crucial in real-world scenarios where input images often exhibit various distortions [9]. For instance, edge devices frequently encounter noisy or blurred images, with different levels of distortion. Pacheco et al. [10] empirically illustrate the influence of noise on confidence values in images. The distortion in images changes the latent distribution of the dataset and significantly impacts the confidence values and inference results [7]. During inference, the data arrives in an online (sequential order) fashion and the ground truth values for the image sample are not available. Hence the question then arises, how to adaptively choose the optimal splitting layer to model the accuracy-efficiency trade-off when the underlying latent distribution of incoming data changes? To address the challenge of selecting an optimal split-" 2401.10561v1,"MAEDiff: Masked Autoencoder-enhanced Diffusion Models for Unsupervised Anomaly Detection in Brain Images Rui Xu 1 , Yunke Wang 1 , Bo Du 1 1 School of Computer Science, Wuhan University {rui.xu, yunke.wang, dubo}@whu.edu.cn Abstract Unsupervised anomaly detection has gained significant attention in the field of medical imaging due to its capability of relieving the costly pixel-level annotation. To achieve this, modern approaches usually utilize generative models to produce healthy references of the diseased images and then identify the abnormalities by comparing the healthy references and the original diseased images. Recently, diffusion models have exhibited promising potential for unsupervised anomaly detection in medical images for their good mode coverage and high sample quality. However, the intrinsic characteristics of the medical images, e.g. the low contrast, and the intricate anatomical structure of the human body make the reconstruction challenging. Besides, the global information of medical images often remain underutilized. To address these two issues, we propose a novel Masked Autoencoder-enhanced Diffusion Model (MAEDiff) for unsupervised anomaly detection in brain images. The MAEDiff involves a hierarchical patch partition. It generates healthy images by overlapping upper-level patches and implements a mechanism based on the masked autoencoders operating on the sub-level patches to enhance the condition on the unnoised regions. Extensive experiments on data of tumors and multiple sclerosis lesions demonstrate the effectiveness of our method. 1 Introduction Segmenting lesions in medical images holds significant clinical importance. Yet the supervised deep learning techniques for this task often require extensive pixel-level annotations, limiting their applicability in tasks like anomaly detection. Therefore, unsupervised anomaly detection approaches are proposed as an alternative. Specifically, approaches using generative models have been explored and exhibit promising performance [Kascenas et al., 2022; Bengs et al., 2021; Behrendt et al., 2022; Silva-Rodrı́guez et al., 2022; Pinaya et al., 2022b; Keshavamurthy et al., 2021; Nguyen et al., 2021]. Typically, the generative models are trained on healthy data to learn their underlying distributions. Then when presented with anomalous data, these models can detect deviations from the learned normal distribution. This is achieved by performing a pixel-by-pixel comparison between the reconstructed images, which are also called the healthy references, and their original counterparts. Diffusion models [Ho et al., 2020] have recently emerged as a powerful tool for unsupervised anomaly detection in brain images. Diffusion models work by incrementally adding noise to map images into latent spaces of identical dimensions. Then a model is trained to reverse the process for denoising, thereby restoring the original image from its noiseperturbed state. Compared to generative adversarial networks (GANs) [Goodfellow et al., 2014], diffusion models demonstrate superior mode coverage, avoiding the issue of mode collapse often seen in GANs where only a limited portion of the data distribution is captured [Baur et al., 2021]. In contrast to autoencoders (AEs) and variational autoencoders (VAEs) [Kingma and Welling, 2014], diffusion models produce samples of higher fidelity and greater detail, as AEs and VAEs tend to generate blurrier images due to the loss of spatial information [Baur et al., 2021]. Approaches proposed in [Wolleb et al., 2022; Wyatt et al., 2022; Sanchez et al., 2022; Pinaya et al., 2022a; Fontanella et al., 2023] utilize diffusion models to reconstruct the entire brain images. In [Behrendt et al., 2023], a patch-based denoising diffusion probabilistic model (DDPM) approach is presented to reconstruct the brain images by sliding patches. However, some of these approaches struggle to generate the fine anatomical structures of the brain images due to their focus on reconstructing the entire images. Some works do not make full use of the contextual information, as the diffusion networks are not inherently designed for this purpose. Hence, in this work, we propose a novel unsupervised anomaly detection method named Masked Autoencoder-enhanced Diffusion Model (MAEDiff). In our MAEDiff, we divide the entire brain image into hierarchical patches. During training, the forward diffusion process is applied on one of the upperlevel patches, while the backward diffusion process processes the entire image. Thereinto, we add a mechanism based on the Masked Autoencoder (MAE), which operates on the sublevel patches, to the diffusion U-Net [Dhariwal and Nichol, 2021] for better condition on the unnoised regions. The training loss is computed within the noised patch. During inference, the forward and backward diffusion processes are" 2401.10567v1,"Self-training from Self-memory in Data-to-text Generation Hoang-Thang Ta a a Department of Information Technology, Dalat University, Da Lat, Vietnam Abstract This paper introduces a novel training model, self-training from self-memory (STSM) in data-to-text generation (DTG), allowing the model to self-train on subsets, including self-memory as outputs inferred directly from the trained models and/or the new data. The quality of self-memory is validated by two models, data-to-text (D2T) and text-todata (T2D), by two pre-defined conditions: (1) the appearance of all source values in the outputs of the D2T model and (2) the ability to convert back to source data in the outputs in the T2D model. We utilize a greedy algorithm to generate shorter D2T outputs if they contain all source values. Subsequently, we use the T2D model to confirm that these outputs can capture input relationships by demonstrating their capacity to convert text back into data. With 30% of the dataset, we can train the D2T model with a competitive performance compared to full training in the same setup. We experiment with our model on two datasets, E2E NLG and DART. STSM offers the D2T model a generalization capability from its subset memory while reducing training data volume. Ultimately, we anticipate that this paper will contribute to continual learning solutions that adapt to new training data, incorporating it as a form of self-memory in DTG tasks. The curated dataset is publicly available at: https://github.com/hoangthangta/STSM. Keywords: Natural Language Generation, Data-to-text Generation, Self-training, Self-memory 1. Introduction Within the broad scope of natural language generation (NLG), DTG processes a problem involving converting structured data, typically presented as tables, meaning representations (MRs), knowledge graphs, or sets of triples, into natural language texts. The generated output can be either a summary of the input or a coherent text that adheres to specified criteria, including fluency, naturalness, and incorporating all source values. A prevalent approach to generating text from a set of triples involves employing a sequence-to-sequence architecture designed for handling sequential data. This often includes using encoder-decoder recurrent neural networks like Transformers. Specifically, it is transfer learning from pre-trained models such as BART and T5. Alternatively, recent methods leverage language instructions and large language models like Alpaca [1], ChatGPT [2], Flan-T5 [3], and Llama [4]. While these large models demonstrate relatively strong performance across various DTG tasks, it’s important to note that they demand massive memory and supercomputing resources, making them unsuitable for downstream tasks. Email address: thangth@dlu.edu.vn (Hoang-Thang Ta ) Preprint submitted to Knowledge-Based Systems In this paper, we introduce a novel model as part of our exploration for an optimization strategy tailored for self-training in D2T, aiming to uphold model performance at a level comparable to full-data training. In each epoch, our model trains on a subset of the training set, incorporating a mix of self-memory derived from trained models and/or newly introduced data. This methodology enables us to reduce the volume of training data in each epoch while maintaining performance levels consistent with full training. Our model also provides helpfulness in continual learning studies, specifically when initiating training on new data from an existing dataset, as opposed to amalgamating new data with the old and training them collectively at the outset. In experiments, we train D2T and T2D models using 30% of the training set in each epoch, with the optional self-training in the T2D model. Ultimately, we compare the outputs of the D2T model with those of other widely adopted methods to clarify the effectiveness of our model over two datasets, DART and E2E NLG. The main contributions of our work are as follows: • STSM (Self-training from Self-memory): The novel training model from the merge of self-memory and/or the new data to keep the output quality on par with the full data training. January 22, 2024" 2401.10571v1,"Testing the consistency of early and late cosmological parameters with BAO and CMB data Guanlin Liu , 1, 2, ∗ Yu Wang, 1, 2 and Wen Zhao 1, 2, † 1 CAS Key Laboratory for Researches in Galaxies and Cosmology, Department of Astronomy, University of Science and Technology of China, Chinese Academy of Sciences, Hefei, Anhui 230026, China 2 School of Astronomy and Space Sciences, University of Science and Technology of China, Hefei 230026, China The recent local measurements of the Hubble constant H 0 , indicate a significant discrepancy of over 5σ compared to the value inferred from Planck observations of the cosmic microwave background (CMB). In this paper, we try to understand the origin of this tension by testing the consistency of early and late cosmological parameters in the same observed data. In practice, we simultaneously derive the early and late parameters using baryon acoustic oscillation (BAO) measurements, which provide both low and high-redshift information. To resolve parameter degeneracy, the complementary data from CMB observations are included in the analysis. By using the parameter ω m = Ω m h 2 , we introduce ratio(ω m ), defined as the ratio of ω m which are constrained from high and low-redshift measurements respectively, to quantify the consistency between early and late parameters. We obtained a value of ratio(ω m ) = 1.0069 ± 0.0070, indicating there is no tension between early parameters and late parameters in the framework of ΛCDM model. As a result, the Hubble tension may arise from the differences of datasets or unknown systematic errors in the current data. In addition, we forecast the future BAO measurements of ratio(ω m ), using several galaxy redshift surveys and 21 cm intensity mapping surveys, and find that these measurements can significantly improve the precision of cosmological parameters. I. INTRODUCTION The standard cosmological model, ΛCDM, has withstood the rigorous scrutiny due to significant advances in observations of the cosmic microwave background (CMB) [1–3], Type Ia supernovae (SNIa) [4, 5] and large-scale structure [6–8] in recent years. However, tensions have emerged for several parameters when they are inferred from distinct observations within the ΛCDM. The most significant tension is related to determinations of the Hubble constant H 0 . The representative difference is between the SH0ES 1 [9] determination of H 0 and the value inferred from Planck [1] for the ΛCDM cosmology, which has increased to 5σ level [10, 11]. Actually, the tension exists in not only these two values, but also in two sets of measurements [11]. One set contains indirect estimates at early times which are cosmological model dependent, such as CMB and Baryon Acoustic Oscillation (BAO) [12, 13]. As mentioned above, the Planck 2018 release [1] predicts H 0 = 67.36 ± 0.54 km s −1 Mpc −1 in combination with the CMB lensing. Moreover, the final combination of the BAO measurements from galaxies, quasars, and Lyman- α forest (Ly-α) from Baryon Oscillation Spectroscopic −1 Survey (BOSS) prefers H 0 = 67.64 +0.94 Mpc −1 −1.03 km s [13] involving a prior on the physical density of the baryons Ω b h 2 derived from the latest Big Bang Nucleosynthesis (BBN) measurements of the primordial deuterium [14, 15]. In contrast, another set includes di- ∗ irithyll0110@mail.ustc.edu.cn † wzhao7@ustc.edu.cn 1 Supernovae and H 0 for the Equation of State. rect late time cosmological model-independent measurements, such as distance ladders [9, 16–20] and strong lensing [21]. The determination of H 0 is based on calibration of the SNIa using the Cepheids, Miras and Tip of the Red Giant Branch (TRGB), which prefers a higher value. The latest SH0ES measurement gives H 0 = 73.04 ± 1.04 km s −1 Mpc −1 using Cepheid period–luminosity relations to calibrate distances to Type Ia SNe host galaxies [9]. There are various potential solutions proposed for the Hubble tension. One kind of viewpoint thinks that some unknown systematic errors affect either early-universe or late-universe observation [22]. However, the other viewpoint is related to the new physics beyond the standard cosmological model. The late time modifications of the ΛCDM expansion history have been showed that they cannot resolve the Hubble tension through a model independent method in [23, 24]. Therefore, many solutions to the Hubble tension is to introduce new physics about early universe that increases the value of the Hubble constant inferred from the CMB. An popular early-time resolution [25–27] is an exotic early dark energy (EDE) that behaves like a cosmological constant at early time and dilutes faster than radiation at later time. It addresses the Hubble tension by decreasing the sound horizon while leaving the later evolution of the Universe unchanged. In order to understand the Hubble tension, it is important to ask the question: Whether or not the inconsistency of the cosmological parameter exists in the same observed data? In this paper, we achieve the simultaneous constraints on the early and late cosmological parameters with the help of BAO measurements that contain both low and high-redshift universe information. This approach enables us to investigate if any tension exists" 2401.10583v1,"EXISTENCE AND RELAXATION FOR OPTIMAL CONTROL GOVERNED BY STEADY, QUASILINEAR PDES PABLO PEDREGAL † Abstract. We focus on optimal control problems governed by elliptic, quasilinear PDEs. Though there are various examples of such problems in the literature, we make an attempt at describing some general principles by dealing with three basic situations. In the first one, we assume that the state equation is variational; the second one focuses on a non-variational, monotone operator as state equation; finally, we add a non-linear term off the divergence part of the equation. In the first two cases, existence of optimal solutions can be established under suitable sets of assumptions, while relaxation is required for the third situation. Concerning the cost functional, and though more general examples can be dealt with, we will take a typical case consisting of two terms: one depending on the state, and another one of the form of a typical Thychonov regularization. Optimality, especially for the last situation, will be addressed in a forthcoming work. 1. Introduction We would like to address the basic issues of existence of optimal solutions and optimality conditions for optimal control problems under state equations of the general structure (1.1) − div[A(x, y u (x), ∇y u (x))] + a(x, y u (x), ∇y u (x)) = f (u(x)) in Ω, and some appropriate boundary condition around ∂Ω for y u in such a way that the operation u 7→ y u is well-defined. Here A(x, y, y) : Ω × R × R N → R N , a(x, y, y) : Ω × R × R N → R, are functions that are assumed continuous, or even smooth, in variables (y, y) and measurable in x, while f (u) : R → R is a continuous function. Since our interest is not to examine results under the most general hypotheses on the domain Ω, we will assume it to be as regular as we may need it to be. The variable u represents the control while y u stands for its associated state. For the cost functional, we will put Z E(u) = F (x, y u (x), u(x), ∇y u (x), ∇u(x)) dx Ω for an integrand F (x, y, u, y, u) : Ω × R × R × R N × R N → R INEI, U. de Castilla-La Mancha, 13071 Ciudad Real, SPAIN. Supported by grants PID2020- 116207GB-I00, and SBPLY/19/180501/000110. Data sharing not applicable to this article as no datasets were generated or analysed during the current study. † Corresponding author: pablo.pedregal@uclm.es. 1" 2401.10586v1,"PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks Ping Guo 1 Zhiyuan Yang 1 Xi Lin 1 Qingchuan Zhao 1 Qingfu Zhang 1 Abstract model and black-box attacks in case the model is inaccessible. While black-box attacks appear to be more challenging, it is often considered a more realistic threat model, and its state-of-the-art (SOTA) could leverage a limited number of queries to achieve high successful rates against closedsource commercial platforms, i.e. Clarifai (Clarifai, 2022) and Google Cloud Vision API (Google, 2022), presenting a disconcerting situation (Liu et al., 2017). Black-box query-based attacks constitute significant threats to Machine Learning as a Service (MLaaS) systems since they can generate adversarial examples without accessing the target model’s architecture and parameters. Traditional defense mechanisms, such as adversarial training, gradient masking, and input transformations, either impose substantial computational costs or compromise the test accuracy of non-adversarial inputs. To address these challenges, we propose an efficient defense mechanism, PuriDefense, that employs random patch-wise purifications with an ensemble of lightweight purification models at a low level of inference cost. These models leverage the local implicit function and rebuild the natural image manifold. Our theoretical analysis suggests that this approach slows down the convergence of query-based attacks by incorporating randomness into purifications. Extensive experiments on CIFAR-10 and ImageNet validate the effectiveness of our proposed purifier-based defense mechanism, demonstrating significant improvements in robustness against query-based attacks. Defending black-box query-based attacks in real-world large-scale Machine-Learning-as-a-Service (MLaaS) systems calls for an extremely low extra inference cost. This is because business companies, such as Facebook, handle millions of image queries daily and thereby increase the extra cost for defense a million-fold (VentureBeat, 2022). This issue prohibits testing time defenses to run multiple inferences to achieve certified robustness (Cohen et al., 2019; Salman et al., 2020b). Moreover, training time defenses, i.e. retraining the DNNs with large datasets to enhance their robustness against adversarial examples (e.g. adversarial training (Madry et al., 2018) and gradient masking (Tramèr et al., 2018)), impose substantial economic and computational costs attributed to the heavy training expense. Therefore, there is a critical need for a lightweight yet effective strategy to perform adversarial purifications to enable low inference cost for achieving robustness. Given the aforementioned challenges, recent research efforts have been devoted to either eliminating or disturbing adversarial perturbations prior to the forwarding of the query image to the classifier. Nevertheless, the existing methods that include both heuristic transformations and neural network-based adversarial purification models have certain limitations in removing adversarial perturbations. While heuristic transformation methods cause minimal impact on cost, they merely disrupt adversarial perturbations and often negatively impact the testing accuracy of non-adversarial inputs (Xu et al., 2018; Qin et al., 2021). Moreover, neural network-based purifications aiming to completely eradicate adversarial perturbations can even exceed the computational burden of the classifier itself (Carlini et al., 2023). Consequently, there have been no effective defense mechanisms that can achieve both high robustness and low computational cost against black-box query-based attacks. 1. Introduction Deep neural networks (DNNs), while presenting remarkable performance across various applications, are mostly leaning to become subject to adversarial attacks, where even slight perturbations to the inputs can severely compromise their predictions (Szegedy et al., 2014). This notorious vulnerability significantly challenges the inherent robustness of DNNs and could even make the situation much worse when it comes to security-critical scenarios, such as facial recognition (Dong et al., 2019) and autonomous driving (Cao et al., 2019). Accordingly, attackers have devised both white-box attacks if having full access to the DNN 1 Department of Computer Science, City University of Hong Kong, Hong Kong. Correspondence to: Ping Guo . Under Review. 1" 2401.10592v1,"Bayesian sample size determination using robust commensurate priors with interpretable discrepancy weights Lou E. Whitehead 1 *, James M. S. Wason 1 , Oliver Sailer 2 , Haiyan Zheng 3 1. Biostatistics Research Group, Population Health Sciences Institute, Newcastle University, Newcastle upon Tyne, UK 2. Boehringer Ingelheim Pharma GmbH & Co. KG, Biberach, Germany 3. Department of Mathematical Sciences, University of Bath, Bath, UK *Corresponding Author Details: Lou E. Whitehead; Address: Biostatistics Research Group, Population Health Sciences Institute, Ridley 1 Building, Richardson Road, Newcastle upon Tyne NE1 7RU, UK Telephone number: +44(0)0191-208-6000; E-mail address: l.whitehead2@newcastle.ac.uk Abstract Randomized controlled clinical trials provide the gold standard for evidence generation in relation to the effectiveness of a new treatment in medical research. Relevant information from previous studies may be desirable to incorporate in the design of a new trial, with the Bayesian paradigm providing a coherent framework to formally incorporate prior knowledge. Many established methods involve the use of a discounting factor, sometimes related to a measure of ‘similarity’ between historical sources and the new trial. However, it is often the case that the sample size is highly nonlinear in those discounting factors. This hinders communication with subject-matter experts to elicit sensible values for borrowing strength at the trial design stage. Focusing on a sample size formula that can incorporate historical data from multiple sources, we propose a linearization technique such that the sample size changes evenly over values of the discounting factors (hereafter referred to as ‘weights’). Our approach leads to interpretable weights that directly represent the dissimilarity between historical and new trial data on the probability scale, and could therefore facilitate easier elicitation of expert opinion on their values. Inclusion of historical data in the design of clinical trials is not common practice. Part of the reason might be difficulty in interpretability of discrepancy parameters. We hope our work will help to bridge this gap and encourage uptake of these innovative methods. Keywords: Bayesian sample size determination; Commensurate priors; Historical borrowing; Prior aggregation; Uniform shrinkage. 1 Introduction In clinical drug development randomized controlled trials (RCTs) are regarded as the gold standard for evaluating the effectiveness of new treatments or interventions. Randomization of trial participants to the new treatment or a control group aims to reduce bias and provides a rigorous tool to examine whether a causal relationship exists between an intervention and outcome (Hariton and Locascio, 2018). Sample size calculations are an essential part of clinical trial design, with a sample needing to be at least large enough to meet the study objectives but also small enough to minimize (for example) ethical or cost concerns (Julious, 2023). In the frequentist paradigm, the number of participants recruited onto a study is often chosen to control the type I error rate (the rate of incorrectly declaring a treatment effective) and/or power (the rate of correctly declaring a treatment effective) to pre-specified levels, based on assumptions about the sampling distribution of the data and the size of the treatment effect considered clinically meaningful. Designing a trial with a large enough sample size to achieve the frequentist power can sometimes 1" 2401.10601v1,"Influential Slot and Tag Selection in Billboard Advertisement Dildar Ali Tejash Gupta Department of Computer Science and Engineering, Indian Institute of Technology Jammu Jammu, Jammu & Kashmir, India 2021rcs2009@iitjammu.ac.in Department of Mathematics and Scientific Computing, National Institute of Technology Hamirpur Hamirpur, Himachal Pradesh, India 20bma019@nith.ac.in Suman Banerjee Yamuna Prasad Department of Computer Science and Engineering, Indian Institute of Technology Jammu Jammu, Jammu & Kashmir, India suman.banerjee@iitjammu.ac.in Department of Computer Science and Engineering, Indian Institute of Technology Jammu Jammu, Jammu & Kashmir, India yamuna.prasad@iitjammu.ac.in ABSTRACT The selection of influential billboard slots remains an important problem in billboard advertisements. Existing studies on this problem have not considered the case of context-specific influence probability. To bridge this gap, in this paper, we introduce the Context Dependent Influential Billboard Slot Selection Problem. First, we show that the problem is NP-hard. We also show that the influence function holds the bi-monotonicity, bi-submodularity, and non-negativity properties. We propose an orthant-wise Stochastic Greedy approach to solve this problem. We show that this method leads to a constant factor approximation guarantee. Subsequently, we propose an orthant-wise Incremental and Lazy Greedy approach. In a generic sense, this is a method for maximizing a bi-submodular function under the cardinality constraint, which may also be of independent interest. We analyze the performance guarantee of this algorithm as well as time and space complexity. The proposed solution approaches have been implemented with real-world billboard and trajectory datasets. We compare the performance of our method with many baseline methods, and the results are reported. Our proposed orthant-wise stochastic greedy approach leads to significant results when the parameters are set properly with reasonable computational overhead. CCS CONCEPTS • Information Systems → Computational Advertising; KEYWORDS Billboard Advertisement, Billboard Database, Trajectory Database, Influence Probability, Bi-Submodularity 1 INTRODUCTION In recent times, due to the advancement of wireless internet and hand-held mobile devices, it has become easier to capture moving object’s locations. This leads to the availability of many datasets of the following kind: location information of a set of moving objects over different time stamps. This kind of database is called Trajectory Database [17] and has been used to solve many real-life problems, including route recommendation, driving behavior prediction, influential location selection problems, etc. A trajectory database contains the location information of moving objects, and managing, mining, and efficiently retrieving the required information leads to a completely new discipline called Spatial Databases. Many Internet Giants, including Google, Alibaba, etc., are in the business of spatial databases and earn a significant portion of their total revenue. ‘Advertisement’ remains a central theme of any commercial house. The literature has reported that a commercial house spends 7 − 10% of its earned revenue on advertisement. There are several methods by which advertisement can be conducted, e.g., social media, sponsored search auctions, digital billboards, etc. Billboard advertising has emerged as an effective approach among all these techniques due to many advantages, such as ensuring a return on investment. In billboard advertisement, the billboards are owned by some other company (e.g., Lamar, Sigtel, etc.), and different ecommerce houses approach the company for a number of billboard slots depending on their budget. Here, the question is given the trajectory database, billboard database, and a positive integer 𝑘, in which 𝑘 billboard slots should be chosen to maximize the influence. This problem has been referred to as the Top-𝑘 Influential Billboard Slot Selection Problem in the literature [2], and a few solution methodologies are available. The influence probability between a billboard slot and a trajectory has been considered in all the studies [1, 2, 22, 23]. However, in practice, it varies from context to context. This means it is meaningful to show the advertisement of a low-cost product (rather than a costly product) to a low-income person. In this paper, we extend the study of influential billboard slot selection in the context-specific setting where, for every tag, there exists a tag-specific influence probability. In real-world scenarios, billboard advertisement requires not only the selection of influential slots but also the selection of influential tags. Now, the question is that given two positive integers 𝑘 and ℓ, which 𝑘 influential slots and ℓ influential tags should be chosen such that the influence is maximized. To the best of our knowledge, such a problem has not been addressed in billboard advertisement settings. However, some studies focus on the influence maximization in the presence of tags in social networks. The first study in this direction was done by Ke et al. [6], where they studied the problem of finding 𝑘 seed nodes and 𝑟 influential tags to maximize the influence in the network. Subsequently, other solution methodologies have been proposed in the literature, e.g., community-based approach [3] that exploits the bi-submodularity of the influence function. This paper bridges this gap by studying the influential billboard slot selection" 2401.10603v1,"ZnTrack: Data as Code FABIAN ZILLS, Institute for Computational Physics, Germany MORITZ SCHÄFER, Institute for Theoretical Chemistry, Germany SAMUEL TOVEY, Institute for Computational Physics, Germany JOHANNES KÄSTNER, Institute for Theoretical Chemistry, Germany CHRISTIAN HOLM, Institute for Computational Physics, Germany The past decade has seen tremendous breakthroughs in computation and there is no indication that this will slow any time soon. Machine learning, large-scale computing resources, and increased industry focus have resulted in rising investments in computer-driven solutions for data management, simulations, and model generation. However, with this growth in computation has come an even larger expansion of data and with it, complexity in data storage, sharing, and tracking. In this work, we introduce ZnTrack, a Python-driven data versioning tool. ZnTrack builds upon established version control systems to provide a user-friendly and easy-to-use interface for tracking parameters in experiments, designing workflows, and storing and sharing data. From this ability to reduce large datasets to a simple Python script emerges the concept of Data as Code, a core component of the work presented here and an undoubtedly important concept as the age of computation continues to evolve. ZnTrack offers an open-source, FAIR data compatible Python package to enable users to harness these concepts of the future. Additional Key Words and Phrases: Data as Code, Data Version Control, Machine Learning, Data Science, FAIR data, Reproducibility, Collaboration 1 INTRODUCTION Large-scale computing is steadily becoming the norm in many industrial and research settings. With the rise of large-scale compute clusters, computational sciences have risen equally as fast in the size and number of experiments being performed on the newly available resources [67]. This has coincided with extraordinary advances in machine learning which is now ubiquitous in science and industry applications. Nevertheless, the challenge doesn’t end with the capability to implement extensive simulations or machine learning models. With the growing number of simulations and models comes an increase in parameters and workflows that must be tracked and stored efficiently, not only for reproducibility but also for distribution. Furthermore, once a workflow is applied in production, it is often desirable to submit the results to a publication or, more often, share models with other users in one’s community. The challenges in managing this generated data remain an issue in many fields [6, 8, 39, 61, 69]. Sharing data in a standardized format can be challenging because there can either be many different formats to choose from or none that fulfill all the requirements of new research questions. New formats can be introduced or generalizations attempted, but naming conventions and standardized data formats have a finite degree of complexity that they can handle before becoming overcrowded and unusable [26, 54]. When discussing data, it is often overlooked that most of the time software was used to generate it in the first place. This is to say that a simulation script has been written, a configuration file parsed, or command line interface (CLI) arguments have been used to initiate this generation of data. In this case, it is reasonable to say that all information required to reproduce the data is contained in the code used in its generation. Therefore, it is a convenient Authors’ addresses: Fabian Zills, Institute for Computational Physics, Allmandring 3, Stuttgart, Germany, 70569, fzills@icp.uni-stuttgart.de; Moritz Schäfer, Institute for Theoretical Chemistry, Pfaffenwaldring 55, Stuttgart, Germany, 70569; Samuel Tovey, Institute for Computational Physics, Allmandring 3, Stuttgart, Germany, 70569; Johannes Kästner, Institute for Theoretical Chemistry, Pfaffenwaldring 55, Stuttgart, Germany, 70569; Christian Holm, Institute for Computational Physics, Allmandring 3, Stuttgart, Germany, 70569. 1" 2401.10605v1,"The Unconditional Performance of Control Charts for Zero-Inflated Processes with Estimated Parameters 1 1 2 Athanasios C. RAKITZIS ∗ , 2 Eftychia MAMZERIDOU, 3 Petros E. MARAVELAKIS Department of Statistics and Insurance Science, University of Piraeus, Piraeus 18534, Greece. Department of Statistics and Actuarial-Financial Mathematics, University of the Aegean, Karlovasi 83200, Samos, Greece. 3 Department of Business Administration, University of Piraeus, Piraeus 18534, Greece. Abstract Control charts for zero-inflated processes have attracted the interest of the researchers in the recent years. In this work we investigate the performance of Shewhart-type charts for zero-inflated Poisson and zero-inflated Binomial processes, in the case of estimated parameters. This is a case that usually occurs in practice, especially prior to starting the process monitoring. Using Monte Carlo simulation we evaluate charts’ performance under an unconditional perspective and provide guidelines for their use in practice. We examine both the in-control and the out-of-control performance. Keywords: Moment estimators, Maximum likelihood estimators, Unconditional run length distribution, zero-inflated binomial distribution, zero-inflated Poisson distribution. 1 Introduction Control charts are the main tool of Statistical Process Control (SPC) and can be used for monitoring a process in order to detect changes in it. Walter A. Shewhart (Shewhart (1926)) was the first who proposed the use of control charts, back in the 1920’s. The most common and often used are the Shewhart-type charts because of their ease in design and interpretation. Two main categories of control charts are the variables charts and the attributes charts. Control charts for variables are used when the quality characteristic X (random variable, r.v.) follows a continuous distribution while if X follows a discrete distribution then the respective chart is a control chart for attributes. Control charts for attributes are used for process monitoring when the data collected by the process are counts. For example, attributes control charts are used for monitoring the number of non-conforming items in a sample, the number of non-conformities in ∗ Corresponding author. E-mail address: arakitz@unipi.gr. This is an original manuscript of an article that will be published by Taylor & Francis in Statistical Methods and Applications in Systems Assurance & Quality of the Book Series Advanced Research in Reliability and System Assurance 1" 2401.10611v1,"Publication venue recommendation using profiles based on clustering Luis M. de Campos ∗ , Juan M. Fernández-Luna, Juan F. Huete Departamento de Ciencias de la Computación e Inteligencia Artificial, ETSI Informática y de Telecomunicación, CITIC-UGR, Universidad de Granada, 18071, Granada, Spain Abstract In this paper we study the venue recommendation problem in order to help researchers to identify a journal or conference to submit a given paper. A common approach to tackle this problem is to build profiles defining the scope of each venue. Then, these profiles are compared against the target paper. In our approach we will study how clustering techniques can be used to construct topic-based profiles and use an Information Retrieval based approach to obtain the final recommendations. Additionally, we will explore how the use of authorship, representing a complementary piece of information, helps to improve the recommendations. Key words: Publication Venue Recommendation, Clustering, Profiling, Information Retrieval 1. Introduction The problem of journal or conference recommendation (venue recommendation in general) tries to identify appropriate publication venues to submit a paper. It is a difficult problem for several reasons: there is an enormous quantity of possible publication venues; even within a single specific research domain there are thousands of publications; for example, only within computer science, [1] reported in 2018 9,185 conferences and 4,152 journals. Therefore, it is not easy for researchers to be aware of all academic venues that fit their domain of interests. The problem is worse due to the increasing number of papers which contain multidisciplinary research, to the dynamic change in the scope of some venues and also for new (unexperienced) researchers or for (experienced) researchers who are going to move to a new research area. Selecting a good conference or journal in which to publish a new article is very important in the academic world. Almost every researcher of every institution in every country may be interested in a tool for recommending appropriate ∗ Corresponding author. Tel.: +34958243199; Email addresses: lci@decsai.ugr.es (Luis M. de Campos ), jmfluna@decsai.ugr.es (Juan M. Fernández-Luna), jhg@decsai.ugr.es (Juan F. Huete) Preprint submitted to Elsevier January 22, 2024" 2401.10621v1,"EPJ manuscript No. (will be inserted by the editor) Event-Generator Validation with MCPLOTS and LHC@home N. Korneeva 1,2a , A. Karneyeu 3 , and P. Skands 2,4 1 Tomsk Polytechnic University, 634050 Tomsk, Russia School of Physics and Astronomy, Monash University, Clayton VIC-3800, Australia 3 Institute for Nuclear Research, 117312 Moscow, Russia 4 Rudolf Peierls Centre for Theoretical Physics, University of Oxford, Parks Road, Oxford, UK 2 Abstract. We document several recent updates to the MCPLOTS event-generator validation resource. The project is based on the RIVET analysis library and harnesses volunteer computing provided by LHC@home to generate high-statistics MC comparisons to data. Users interact with the resource via a simple website, mcplots.cern.ch, which provides flexible options for requesting comparison plots and comprehensive statistical analyses on demand, all in a few clicks. The project has been structured to enable communitydriven developments, and we discuss the computational back end, the web front end, and how to add new data analyses, generators, and tunes that would be accessible on the website for comparison. 1 Introduction In particle physics, Monte Carlo event generators (MCs) connect theoretical calculations with the complex final states that are observed in experiments. For the experimental community, MCs serve as benchmarks for establishing calibrations and uncertainties, and for optimising measurements and detector designs. For the theoretical community, they serve as vessels for exploring new approaches to solving perturbative quantum field theories, modelling their non-perturbative aspects, and exploring the observable consequences of physics beyond the Standard Model. When new experimental measurements are published, the associated analysis papers typically include comparisons to small sets of representative MC models. These give an instantaneous snapshot of the theoretical state of the art at the time the analysis was done but can necessarily neither be totally exhaustive nor do they remain up to date as further theoretical work is developed and published. Major steps towards ensuring that experimental measurements remain useful to constrain theoretical models were the developments of the data preservation resource HEPDATA 1 [1–3], and analysis preservation tools like HZTOOL [4] and RIVET [5, 6], and the adoption of these tools by the experimental community. These tools make it possible to validate new and alternative MC models in a homogeneous and standardised way. They also play an important role in the context of the growing field of MC tuning; see, e.g., [7–22]. Taking RIVET as an example, which is the most widely used analysis preservation tool today, the task of producing a validation of a given MC model or tune against a specific set of experimental analyses essentially reduces to: 1. If starting from scratch: installing RIVET and the relevant MC generator(s), and any required dependencies. 2. Selecting a subset of RIVET analyses to include in the validation. 3. Preparing a run card for the given MC generator(s), for each selected RIVET analysis. 4. Generating a statistically relevant number of events for each analysis. 5. Quantifying and analysing the agreement or disagreement, e.g., by computing and ranking some measure of statistical compatibility, and/or by simply making plots and organising them for inspection. Each of these steps takes time and involves a learning curve for non-experts. a 1 natalia.korneeva@cern.ch https://www.hepdata.net" 2401.10632v1,"Published as a conference paper at ICLR 2024 I NTERVENTIONAL F AIRNESS ON P ARTIALLY K NOWN C AUSAL G RAPHS : A C ONSTRAINED O PTIMIZATION A PPROACH 1 1,2,3 1 1,3∗ Aoqi Zuo , Yiqing Li , Susan Wei & Mingming Gong 1 School of Mathematics and Statistics, The University of Melbourne 2 School of Data Science, Fudan University 3 Mohamed bin Zayed University of Artificial Intelligence azuo@student.unimelb.edu.au yiqingli20@fudan.edu.cn {susan.wei,mingming.gong}@unimelb.edu.au A BSTRACT Fair machine learning aims to prevent discrimination against individuals or subpopulations based on sensitive attributes such as gender and race. In recent years, causal inference methods have been increasingly used in fair machine learning to measure unfairness by causal effects. However, current methods assume that the true causal graph is given, which is often not true in real-world applications. To address this limitation, this paper proposes a framework for achieving causal fairness based on the notion of interventions when the true causal graph is partially known. The proposed approach involves modeling fair prediction using a Partially Directed Acyclic Graph (PDAG), specifically, a class of causal DAGs that can be learned from observational data combined with domain knowledge. The PDAG is used to measure causal fairness, and a constrained optimization problem is formulated to balance between fairness and accuracy. Results on both simulated and real-world datasets demonstrate the effectiveness of this method. 1 I NTRODUCTION Machine learning algorithms have demonstrated remarkable success in automating decision-making processes across a wide range of domains (e.g., hiring decisions (Hoffman et al., 2018), recidivism predictions (Dieterich et al., 2016; Brennan et al., 2009), and finance (Sweeney, 2013; Khandani et al., 2010)), providing valuable insights and predictions. However, it has become increasingly evident that these algorithms are not immune to biases in training data, potentially perpetuating discrimination against individual or sub-population group with respect to sensitive attributes, e.g., gender and race. For example, bias against female was found in a recruiting tool built by one of Amazon’s AI team to review job applicants’ resume in a period of time (Kodiyan, 2019). To achieve fair machine learning, various methods have been proposed with respect to different fairness measures. These methods can be broadly classified into two groups. The first group focuses on developing statistical fairness measures, which typically indicate the statistical discrepancy between individuals or sub-populations, e.g., statistical parity (Dwork et al., 2012), equalized odds (Hardt et al., 2016), and predictive parity (Chouldechova, 2017). The second group is grounded in the causal inference framework (Pearl et al., 2000), which emphasizes understanding the causal relationships between the sensitive attribute and decision outcomes and treats the presence of causal effect of the sensitive attribute on the decision as discrimination (Zhang et al., 2017; Kilbertus et al., 2017; Kusner et al., 2017; Zhang & Bareinboim, 2018b;a; Nabi & Shpitser, 2018; Wu et al., 2019b; Khademi et al., 2019; Chiappa, 2019; Russell et al., 2017; Zhang et al., 2018; Zhang & Wu, 2017; Kusner et al., 2019; Salimi et al., 2019; Wu et al., 2018; Galhotra et al., 2022; Zuo et al., 2022). ∗ Corresponding author 1" 2401.10634v1,"Automatic Construction of Multi-faceted User Profiles using Text Clustering and its Application to Expert Recommendation and Filtering Problems Luis M. de Campos, Juan M. Fernández-Luna ∗ , Juan F. Huete, Luis Redondo-Expósito Departamento de Ciencias de la Computación e Inteligencia Artificial, ETSI Informática y de Telecomunicación, CITIC-UGR, Universidad de Granada, 18071, Granada, Spain Abstract In the information age we are living in today, not only are we interested in accessing multimedia objects such as documents, videos, etc. but also in searching for professional experts, people or celebrities, possibly for professional needs or just for fun. Information access systems need to be able to extract and exploit various sources of information (usually in text format) about such individuals, and to represent them in a suitable way usually in the form of a profile. In this article, we tackle the problems of profile-based expert recommendation and document filtering from a machine learning perspective by clustering expert textual sources to build profiles and capture the different hidden topics in which the experts are interested. The experts will then be represented by means of multi-faceted profiles. Our experiments show that this is a valid technique to improve the performance of expert finding and document filtering. Keywords: Clustering, Content-based Recommendation, Expert Finding, Filtering, User Profiling 1. Introduction The content of the world wide web is incredibly wide and varied and so one common search task is to look for people that can help us with a particular problem. For example, we might search for a doctor to treat a specific illness, a builder to repair a leaking roof, or a politician to discuss a local problem with so that solutions may be found. This type of information search is set in the broader field of expert finding [3] whereby users find experts in a given area. For this task to be successful, it is necessary for experts to be represented in ∗ Corresponding author. Tel.: +34958240804; Email addresses: lci@decsai.ugr.es (Luis M. de Campos), jmfluna@decsai.ugr.es (Juan M. Fernández-Luna ), jhg@decsai.ugr.es (Juan F. Huete), luisre@decsai.ugr.es (Luis Redondo-Expósito) Preprint submitted to Elsevier January 22, 2024" 2401.10646v1,"Empowering HWNs with Efficient Data Labeling: A Clustered Federated Semi-Supervised Learning Approach Moqbel Hamood, Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar {moha19838, aalbaseer, moabdallah, aalfuqaha}@hbku.edu.qa Abstract—Clustered Federated Multi-task Learning (CFL) has gained considerable attention as an effective strategy for overcoming statistical challenges, particularly when dealing with nonindependent and identically distributed (non-IID) data across multiple users. However, much of the existing research on CFL operates under the unrealistic premise that devices have access to accurate ground-truth labels. This assumption becomes especially problematic in, especially hierarchical wireless networks (HWNs), where edge networks contain a large amount of unlabeled data, resulting in slower convergence rates and increased processing times—particularly when dealing with two layers of model aggregation. To address these issues, we introduce a novel framework—Clustered Federated Semi-Supervised Learning (CFSL), designed for more realistic HWN scenarios. Our approach leverages a best-performing specialized model algorithm, wherein each device is assigned a specialized model that is highly adept at generating accurate pseudo-labels for unlabeled data, even when the data stems from diverse environments. We validate the efficacy of CFSL through extensive experiments, comparing it with existing methods highlighted in recent literature. Our numerical results demonstrate that CFSL significantly improves upon key metrics such as testing accuracy, labeling accuracy, and labeling latency under varying proportions of labeled and unlabeled data while also accommodating the non-IID nature of the data and the unique characteristics of wireless edge networks. Index Terms—Clustered federated learning (CFL), Semisupervised learning (SSL), Hierarchical wireless networks, Specialized models. I. I NTRODUCTION The proliferation of mobile devices and the Internet of Things (IoT) has not only exponentially increased data generation but also ignited a technological revolution that transforms everyday life [1], [2]. This surge in data has enriched various applications and enabled cross-domain knowledge sharing, especially within Hierarchical Wireless Networks (HWNs) in which different edge networks, including mobile and IoT devices, are connected through a cloud [3], [4]. Particularly, HWNs enable seamless collaboration among diverse IoT ecosystems, optimizing the data’s utility for multiple applications by employing Machine Learning (ML) and Deep Learning (DL) techniques. However, traditional ML/DL approaches face considerable challenges when operating in HWNs, including handling vast volumes of data, which mostly is unlabeled, limited network resources, latency due to two levels of connections, and privacy concerns due to data leakage [5]–[7]. In response, hierarchical federated learning (HFL) [8] was introduced as a proposed solution to address some of the aforementioned challenges. In the HFL approach, IoT-enabled devices conduct local model training and send only model parameters (i.e., weights and biases) to their corresponding edge servers and then to the cloud to update a global model. This strategy minimizes communication overhead and protects sensitive data. Despite its advantages, HFL approaches face several challenges during training. These include the diversity of device capabilities and the massive amount of nonindependent and identically distributed (non-IID) data, which hinder efficient model development and communication. Cluster federated learning (CFL) paradigm [9] has emerged as a promising solution that copes with these problems, especially the non-IID problem where the data residing on each device does not follow the same distribution, nor are the data points independent of each other. CFL is considered a post-processing technique that improves the FL algorithm without altering its fundamental communication protocol and at least achieves the same performance as FL. This is done by splitting devices into clusters based on similarity in their data distributions when the HFL objective at each edge network reaches a stationary point (i.e., where the FL model cannot improve further on its current data). Each cluster then develops a tailored model that accurately captures specific data patterns. Several existing research [9]–[12] have delved into CFL’s effectiveness within the edge network, focusing on fully labeled datasets to cluster the devices into different clusters. These works have also addressed bandwidth and energy consumption for the CFL in wireless edge networks. For example, the work in [13] proposed solutions to prioritize participant devices according to their training latency by leveraging the dynamic characteristics of edge networks, scheduling devices based on their round latency, satisfying fairness, and exploiting bandwidth reuse. In addition, the work in [14] proposed a solution to address the service heterogeneity where local models have different structures in HWNs using CFL with knowledge distillation. However, none of these works [9]– [14] addressed the problem of unlabeled data under HWNs and CFL settings." 2401.10653v1,"Attentive Fusion: A Transformer-based Approach to Multimodal Hate Speech Detection 1† 2‡∗ 3† Atanu Mandal and Gargi Roy and Amit Barman 4† 5† Indranil Dutta and Sudip Kumar Naskar † Jadavpur University, Kolkata, INDIA ‡ Optum Global Solutions Private Limited, Bengaluru, INDIA 1 2 3 5 { atanumandal0491, roygargi1997, amitbarman811, sudip.naskar}@gmail.com, 4 indranildutta.lnl@jadavpuruniversity.in Abstract With the recent surge and exponential growth of social media usage, scrutinizing social media content for the presence of any hateful content is of utmost importance. Researchers have been diligently working since the past decade on distinguishing between content that promotes hatred and content that does not. Traditionally, the main focus has been on analyzing textual content. However, recent research attempts have also commenced into the identification of audio-based content. Nevertheless, studies have shown that relying solely on audio or text-based content may be ineffective, as recent upsurge indicates that individuals often employ sarcasm in their speech and writing. To overcome these challenges, we present an approach to identify whether a speech promotes hate or not utilizing both audio and textual representations. Our methodology is based on the Transformer framework that incorporates both audio and text sampling, accompanied by our very own layer called “Attentive Fusion”. The results of our study surpassed previous stateof-the-art techniques, achieving an impressive macro F1 score of 0.927 on the Test Set. 1 Introduction In recent years, the explosive growth of digital communication platforms has facilitated unprecedented levels of information exchange, enabling individuals from diverse backgrounds to interact and share ideas. However, this surge in online interactions has also led to the emergence of a concerning issue: the increase of hate speech (Davidson et al., 2017). Hate speech, characterized by offensive, discriminatory, or derogatory language targeting individuals or groups based on race, ethnicity, religion, gender, or sexual orientation, poses significant challenges to maintaining a safe and inclusive online environment (Schmidt and Wiegand, 2017). ∗ The work was carried out when the author was at Jadavpur University. Traditional methods of hate speech detection primarily focused on analyzing text-based content, leveraging natural language processing (NLP) techniques to identify offensive language patterns. While these approaches have yielded some success, they often struggle to capture the nuanced nature of speech, as the exact text might be interpreted differently when considering context, tone, and intent (Fortuna and Nunes, 2018). To address these limitations, researchers are turning to a more holistic approach combining both text and speech modalities to enhance the accuracy and robustness of hate speech detection systems (Rana and Jha, 2022). ""I can't really say South Park is stupid, but it actually is"" ""I can't really say South Park is stupid, but it actually is"" !! Hate ""And it's basically about, it's about Dracula and he goes around killing people and sucking the blood"" ""And it's basically about, it's about Dracula and he goes around killing people and sucking the blood"" Not Hate !! Figure 1: Identification of “Hate” or “Not Hate” using multimodality approach This multidimensional approach referred to as multimodal hate speech detection, leverages not only the textual content of messages but also the acoustic cues and prosodic features present in speech. By simultaneously analyzing both text and speech-based characteristics, this approach aims to capture a more comprehensive representation of communication, considering not only the words" 2401.10662v1,"Non-hydrostatic mesoscale atmospheric modeling by the anisotropic mesh adaptive discontinuous Galerkin method ⋆ Vı́t Dolejšı́ a a Charles University, Faculty of Mathematics and Physics, Sokolovská 83, 186 75 Praha, Czech Republic Abstract We deal with non-hydrostatic mesoscale atmospheric modeling using the fully implicit space-time discontinuous Galerkin method in combination with the anisotropic hp-mesh adaptation technique. The time discontinuous approximation allows the treatment of different meshes at different time levels in a natural way which can significantly reduce the number of degrees of freedom. The presented approach generates a sequence of triangular meshes consisting of possible anisotropic elements and varying polynomial approximation degrees such that the interpolation error is below the given tolerance and the number of degrees of freedom at each time step is minimal. We describe the discretization of the problem together with several implementation issues related to the treatment of boundary conditions, algebraic solver and adaptive choice of the size of the time steps. The computational performance of the proposed method is demonstrated on several benchmark problems. Keywords: non-hydrostatic mesoscale atmospheric problems, space-time discontinuous Galerkin method, anisotropic hp-mesh adaptation, numerical study 2000 MSC: 65M60, 65M50, 76M10 1. Introduction The numerical solution of the compressible Euler and/or Navier-Stokes equations has become the standard tool for the simulation of the atmosphere in the last decades, see e.g. the reviews in [30] or [14]. Due to the large scale simulation, it is advantageous to use higher order discretization schemes since they significantly reduce the number of degrees of freedom (DoF) needed to achieve the required accuracy. It is possible to use the spectral element (SE) method [16, 18] or the finite volume (FV) approach with higher-order reconstruction schemes as ENO, WENO or TENO, cf. [23] and the references cited therein. In the recent years, large attention has been devoted to the discontinuous Galerkin (DG) methods which employ the advantageous properties of SE and FV methods, cf. [3, 21, 26, 32, 33] for example. DG methods employ piecewise polynomial but discontinuous approximation, they provide high accuracy and flexibility, local conservation, stability, and parallel efficiency. However, the disadvantage is a large number of DoF in comparison to FV and SE methods. Due to the high-order spatial approximation, the use of an explicit time discretization is very inefficient, since the size of the time steps is strongly restricted by the stability condition, cf. [17]. Therefore, several variants of semi-implicit time discretization techniques have been developed, e.g., the implicit-explicit (IMEX) formulation in [15, 26], its recent improvement in [25], the IMEX evolution Galerkin method in [22, 33], the positivity-preserving well-balanced central discontinuous Galerkin method in [21] or the techniques based on the Eulerian-Lagrangian approach in [3]. In the last two decades, we have developed, analyzed and tested the discontinuous Galerkin method for solving the compressible Navier-Stokes equations with applications in aerodynamics, including supersonic, transonic, subsonic, ⋆ This work was supported by grant No. 20-01074S of the Czech Science Foundation. The author acknowledges also the membership in the Nečas Center for Mathematical Modeling ncmm.karlin.mff.cuni.cz. Email address: dolejsi@karlin.mff.cuni.cz (Vı́t Dolejšı́) Preprint submitted to Elsevier January 22, 2024" 2401.10664v1,"PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis Andreas Finkenzeller ∗ , Oliver Butowski ∗ , Emanuel Regnath † , Mohammad Hamad ∗ , and Sebastian Steinhorst ∗ ∗ Technical University of Munich, Germany † Siemens AG, Germany Email: ∗ firstname.lastname@tum.de, † firstname.lastname@siemens.com Abstract—High-precision time synchronization is a vital prerequisite for many modern applications and technologies, including Smart Grids, Time-Sensitive Networking (TSN), and 5G networks. Although the Precision Time Protocol (PTP) can accomplish this requirement in trusted environments, it becomes unreliable in the presence of specific cyber attacks. Mainly, time delay attacks pose the highest threat to the protocol, enabling attackers to diverge targeted clocks undetected. With the increasing danger of cyber attacks, especially against critical infrastructure, there is a great demand for effective countermeasures to secure both time synchronization and the applications that depend on it. However, current solutions are not sufficiently capable of mitigating sophisticated delay attacks. For example, they lack proper integration into the PTP protocol, scalability, or sound evaluation with the required microsecond-level accuracy. This work proposes an approach to detect and counteract delay attacks against PTP based on cyclic path asymmetry measurements over redundant paths. For that, we provide a method to find redundant paths in arbitrary networks and show how this redundancy can be exploited to reveal and mitigate undesirable asymmetries on the synchronization path that cause the malicious clock divergence. Furthermore, we propose PTPsec, a secure PTP protocol and its implementation based on the latest IEEE 1588-2019 standard. With PTPsec, we advance the conventional PTP to support reliable delay attack detection and mitigation. We validate our approach on a hardware testbed, which includes an attacker capable of performing static and incremental delay attacks at a microsecond precision. Our experimental results show that all attack scenarios can be reliably detected and mitigated with minimal detection time. Index Terms—Security, IEEE 1588, PTP, Time Delay Attack, Time Synchronization I. I NTRODUCTION Precise time synchronization is indispensable for many applications and technologies, such as Smart Grids, Time Sensitive Networking (TSN), and 5G networks. To work correctly, these applications usually require synchronization accuracies on a microsecond or sub-microsecond level, and even small deviations can already have significant impacts. The consequences range from performance degradation to, in the worst case, full system failure. For example, delay attacks in Smart Grids render the control loops unstable, eventually disrupting the entire system [1]. The Precision Time Protocol (PTP) (see § II-A) is a commonly used network protocol to provide accurate time synchronization in the aforementioned scenarios. Unfortunately, Fig. 1: The path asymmetry analysis concept to detect time delay attacks within our proposed PTPsec protocol. The PTP Sync message, sent via the attacked path P 0 (1), is followed by our newly introduced Meas message over the genuine path P 1 to complete the first round trip (2). Similarly, the exchange of the Delay_Req (3) and another Meas message (4) leads to a second circulation. This allows for cyclic RTT measurements from which we derive the current path asymmetry α P 0 to reveal and mitigate ongoing delay attacks. PTP was initially designed without any security considerations in mind and, hence, makes certain network assumptions, such as path symmetry and message integrity, that might not always hold. Especially in spatially large networks like Smart Grids, for instance, cyber attacks targeting the network infrastructure are becoming more likely, forcing the protocol designers to reconsider security concepts in PTP. With the four-pronged approach in Annex P of the latest revision from 2019 [2], the PTP standard aims to address this problem. While the suggested cryptographic countermeasures can guarantee message integrity and protect against many other attack vectors, including message replay and spoofing attacks, they cannot counteract all known threats. In particular, time delay attacks (see § II-B) remain an unsolved problem so far, as previous work has extensively shown [3, 4, 5]. Delay attacks exploit and violate the protocol’s assumption of symmetric path delays by maliciously introducing unidirectional delays into the network. In the literature, initial solutions to counteract delay attacks against PTP have been proposed recently, none of which provide an effective solution to the problem yet. Threshold-based approaches, for example, as presented in [6, 7], perform the attack detection by" 2401.10665v1,"Optoacoustic entanglement in a continuous Brillouin-active solid state system Changlong Zhu, 1 Claudiu Genes, 1, 2 and Birgit Stiller 1, 2, ∗ 2 1 Max Planck Institute for the Science of Light, Staudtstraße 2, D-91058 Erlangen, Germany Department of Physics, Friedrich-Alexander-Universität Erlangen-Nürnberg, Staudtstraße 7, D-91058 Erlangen, Germany (Dated: January 22, 2024) Entanglement in hybrid quantum systems comprised of fundamentally different degrees of freedom, such as light and mechanics is of interest for a wide range of applications in quantum technologies. Here, we propose to engineer bipartite entanglement between traveling acoustic phonons in a Brillouin active solid state system and the accompanying light wave. The effect is achieved by applying optical pump pulses to state-of-the-art waveguides, exciting a Brillouin Stokes process. This pulsed approach, in a system operating in a regime orthogonal to standard optomechanical setups, allows for the generation of entangled photon-phonon pairs, resilient to thermal fluctuations. We propose an experimental platform where readout of the optoacoustics entanglement is done by the simultaneous detection of Stokes and Anti-Stokes photons in a two-pump configuration. The proposed mechanism presents an important feature in that it does not require initial preparation of the quantum ground state of the phonon mode. Entanglement between two quantum systems describes a many body quantum state which is not separable and can exhibit quantum correlations even at arbitrarily large distances [1]. It is therefore a resource not only for a plethora of emerging quantum technologies [2–4] such as quantum cryptography [5, 6], quantum teleportation [7, 8], and quantum computation [9], but also offers a tool to deeper study and understand the classicalto-quantum boundary [10]. As many experimental endeavors are easier performed under ambient conditions, it is essential to study possibilities of generating entangled quantum states robust to thermal noise even at room temperature. Cavity optomechanics [11], which provides a platform to explore quantum effects via coupling photons and phonons at the macroscale, has been a hot topic of investigations in terms of generation and measurement of entanglement both in theory [12–15] and experiments [16–18, 56]. Continuum optomechanical systems [20, 21], such as Brillouin-active optical waveguides [22], are a more recent alternative to standard optomechanical cavities, offering a viable platform for the interface between optical photons and continuously accessible groups of acoustic phonons. Such platforms exhibit a powerful performance in quantum information processing with unprecedented acoustic and optical bandwidth compared to cavity optomechanical systems. Especially due to the recent development in nanofabrication, a new breed of chip-based Brillouin-active waveguides with short length (∼ cm) have been achieved experimentally [23], which enables coherent information transduction [24], information storage [25, 26] and phonon cooling [27, 28]. However, the next logical step after the experimental demonstration of Brillouin cooling [28–30] in continuum optomechanics is the observation of quantum optoacoustical entanglement. ∗ Electronic address: birgit.stiller@mpl.mpg.de (a) (c) Scattered optical wave * "" Entangle * + * % Transfer ) Pump Photon-phonon entanglement (d) & #' Traveling acoustic wave $ !% Waveguide (b) (e) !"" #$ ( Nonlinear Brillouin interaction Stokes photon PD Pump mp 1 Anti-Stokes #$ Forward Pump !"" phonon Undepleted pump condition Acoustic wave & #' Linearized interaction with coupling g Pump 2 Stokes !% #$ g PD St Stok okes ok es photon Stokes ph phon onon on on phonon FIG. 1: (a) The Brillouin Stokes scattering implies the down conversion of a pump photon (at ω p ) into a Stokes scattered photon (ω s ) and traveling acoustic phonon (at Ω ac ). (b) Protocol for entanglement generation, via pump 1 and detection (at photon-diode detectors PD) via the simultaneous monitoring of both Stokes and Anti-Stokes scattered photons in the presence of pump 2. (c) The timing diagram of the protocol showing the application of an entangling pulse for duration τ 1 followed by the transfer pulse with duration τ 2 after the interval τ d . (d) The frequency relations between optical and acoustic waves, i.e., ω p1 − ω s = ω as − ω p2 = Ω ac and ω as = ω p1 . (e) In the lineared regime, under the undepleted pump assumption, the nonlinear Brillouin Stokes scattering process can be mapped into a linear Hamiltonian with pumpenhanced coupling strength g. In this work, we propose and analyze the feasibility of an experimental scheme (see Fig.1) which enables the generation of bipartite light-matter entanglement in Brillouin-active waveguides. The mechanism is based on a down-conversion like process, where pairs of phonons (frequency Ω ac ) and Brillouin Stokes scattered photons" 2401.10666v1,"MixNet: Towards Effective and Efficient UHD Low-Light Image Enhancement Chen Wu 1 , Zhuoran Zheng 2∗ , Xiuyi Jia 2 and Wenqi Ren 3 1 University of Science and Technology of China 2 Nanjing University of Science and Technologyn 3 Sun Yat-sen University wuchen5X@mail.ustc.edu.cn Abstract 1 Introduction In recent years, high-resolution imaging has experienced significant advancements due to the emergence of sophisticated imaging sensors and displays. This has led to a rapid evolution of Ultra-High-Definition (UHD) imaging technology. However, the inherent high-resolution characteristics of UHD images make them more susceptible to noise during the imaging process. Additionally, the increased number of pixels in UHD images challenges the efficiency of existing image processing methods. These undoubtedly affect the quality of UHD imaging. MixNet (Ours) LLFormer Restormer 35.00 PSNR (dB) With the continuous advancement of imaging devices, the prevalence of Ultra-High-Definition (UHD) images is rising. Although many image restoration methods have achieved promising results, they are not directly applicable to UHD images on devices with limited computational resources due to the inherently high computational complexity of UHD images. In this paper, we focus on the task of low-light image enhancement (LLIE) and propose a novel LLIE method called MixNet, which is designed explicitly for UHD images. To capture the long-range dependency of features without introducing excessive computational complexity, we present the Global Feature Modulation Layer (GFML). GFML associates features from different views by permuting the feature maps, enabling efficient modeling of longrange dependency. In addition, we also design the Local Feature Modulation Layer (LFML) and Feed-forward Layer (FFL) to capture local features and transform features into a compact representation. This way, our MixNet achieves effective LLIE with few model parameters and low computational complexity. We conducted extensive experiments on both synthetic and real-world datasets, and the comprehensive results demonstrate that our proposed method surpasses the performance of current state-of-the-art methods. The code will be available at https://github.com/zzr-idam/MixNet. PSNR vs. FLOPs vs. Params 40.00 30.00 UFormer DSLR 25.00 20.00 Zero-DCE 15.00 RUAS 0.00 500.00 1000.00 1500.00 FLOPs (G) 2000.00 2500.00 Figure 1: Model complexity and performance comparison between our proposed MixNet and other LLIE methods on the UHD- LOL4K dataset. Since the inability of most methods to process UHD images directly, the calculation of FLOPs is performed based on the scale of 1024 × 1024 images (the maximum resolution that these algorithms can process on a single GPU). Our MixNet achieves a better trade-off between model complexity and performance. In this paper, we focus on the task of UHD low-light image enhancement (LLIE). Images captured under low-light conditions usually exhibit significant degradation, including reduced visibility, low contrast, and high noise levels. Recovering ideal normal-light images from UHD low-light images is a long-studied problem. Although many learning-based LLIE methods have made significant progress, they always focus on low-resolution images [Wei et al., 2018; Zhao et al., 2021; Wu et al., 2022; Xu et al., 2022; Cai et al., 2023]. For example, in the LLIE task, the most common dataset used is LOL [Wei et al., 2018], which consists of images with resolutions below 1K (1920 × 1080). To achieve better results, current state-ofthe-art (SOTA) methods [Hou et al., 2023; Cai et al., 2023] commonly employ larger models and introduce a significant number of parameters. When faced with UHD images, these SOTA methods often encounter memory overflow and cannot perform full-resolution inference on consumer-grade GPUs. With the prevalence of UHD images, designing a LLIE algorithm tailored explicitly for UHD images becomes increas-" 2401.10685v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2021 1 Towards End-to-End GPS Localization with Neural Pseudorange Correction Xu Weng, Student Member, IEEE, KV Ling, Member, IEEE, Haochen Liu, Student Member, IEEE, and Kun Cao, Member, IEEE Abstract—Pseudorange errors are the root cause of localization inaccuracy in GPS. Previous data-driven methods regress and eliminate pseudorange errors using handcrafted intermediate labels. Unlike them, we propose an end-to-end GPS localization framework, E2E-PrNet, to train a neural network for pseudorange correction (PrNet) directly using the final task loss calculated with the ground truth of GPS receiver states. The gradients of the loss with respect to learnable parameters are backpropagated through a differentiable nonlinear least squares optimizer to PrNet. The feasibility is verified with GPS data collected by Android phones, showing that E2E-PrNet outperforms the state-of-the-art end-to-end GPS localization methods. Fig. 1. An overview of our E2E-PrNet GPS localization pipeline. The learnable parameters ϕ of the neural network for pseudorange correction are tuned by the final task loss calculated using the receiver states X ∗ . Index Terms—GPS, deep learning, end-to-end learning, localization, pseudoranges, Android phones. unnecessary commitment to learning the well-established and robust classical localization theories. I. I NTRODUCTION P SEUDORANGE errors are a long-standing curse of GPS localization, resulting in positioning errors that are hard to mitigate. Because of their complicated composition, encompassing satellite clock errors, residual atmospheric delays, multipath errors, receiver noise, hardware delays, and so on, how to remove them has long been under active research in the GPS community. Due to the difficulty of modeling pseudorange errors mathematically, researchers have been falling back on big data to attend to this issue. On the one hand, most previous work performed supervised learning to regress pseudorange errors using handcrafted labels – we only have the ground truth of locations of GPS receivers and have to derive the target values for pseudorange errors using our domain knowledge of GPS. Various derived labels of pseudorange errors are proposed, including pseudorange errors containing residual receiver clock offset [1], double difference of pseudoranges [2], and smoothed pseudorange errors [3]. However, the final task target values – receiver locations – are in place but not used directly. On the other, an end-toend deep learning approach is proposed to directly map GPS measurements to user locations and implicitly correct pseudorange errors [4]. However, this approach puts considerable but X. Weng and K. Ling are with the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, 639798, Singapore e-mail: (xu009@e.ntu.edu.sg; ekvling@ntu.edu.sg). H. Liu is with the School of Mechanical and Aerospace Engineering, Nanyang Technological University, Singapore, 639798, Singapore e-mail: (haochen002@e.ntu.edu.sg). K. Cao is with the School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm, SE-100 44, Sweden e-mail: (kun001@e.ntu.edu.sg). Manuscript received April 19, 2005; revised August 26, 2015. The data-driven methods can learn pseudorange errors while the model-based approaches can perfectly compute locations using the corrected pseudoranges. So, can we combine them so that we can preserve our well-established priors and train the neural modules using the final task loss instead of the intermediate loss? Such hybrid end-to-end pipelines have achieved success in many other domains, including robot control [5], autonomous driving [6], and so on. In the GPS community, recently, an end-to-end learning framework has been proposed to improve GNSS positioning using the differentiable factor graph optimization, the factor weightings of which are tweaked by the final task loss of receiver locations [7]. This paper proposes E2E-PrNet, an end-to-end GPS localization framework with learnable pseudorange correction. As shown in Fig. 1, a neural network (PrNet) is used to regress pseudorange errors that are then combined with other necessary measurements and fed into a Differentiable Nonlinear Least Squares (DNLS) optimizer for location computation. The loss is calculated with the state estimation of the DNLS optimizer and the ground truth of the receiver state, the gradients of which are backpropagated through the DNLS optimizer to tune learnable parameters. To handle the issue that we have no target value for the receiver clock offset, we select its WLS-based estimation as its label. We evaluate our proposed pipeline using Google Smartphone Decimeter Challenge (GSDC) datasets and compare it with the baseline WLS algorithm and the state-of-the-art (SOTA) end-to-end approach. Finally, we explore what the front-end PrNet has learned when trained by the final task loss. The codes of E2E- PrNet are available at https://github.com/AILocAR/e2ePrNet. 0000–0000/00$00.00 © 2021 IEEE" 2401.10686v1,"Manipulating Sparse Double Descent Ya Shi Zhang ∗ Department of Pure Mathematics and Mathematical Statistics University of Cambridge ysz23@cam.ac.uk Abstract This paper investigates the double descent phenomenon in two-layer neural networks, focusing on the role of L1 regularization and representation dimensions. It explores an alternative double descent phenomenon, named ’sparse double descent’. The study emphasizes the complex relationship between model complexity, sparsity, and generalization, and suggests further research into more diverse models and datasets. The findings contribute to a deeper understanding of neural network training and optimization. The code is available at https://github.com/yashizhang/sparsedoubledescent. 1 Introduction In the modern era of deep learning, it is commonplace for practitioners to specify models that have many more parameters than the number of training data. This is due to a statistically non-intuitive phenomenon known as double descent [Belkin et al., 2019]. In a first course on regression, we are often taught the dangers of overfitting, when the model fits to the noise in the data and severely deteriorates performance across the entire population. For example, consider polynomial regression, where the degree of the polynomial is significantly higher than the number of training data points. This leads to the notion of a trade-off between the bias and variance of the model, inducing a U-shaped curve (depicted in fig. 1) where the vertical axis depicts the population risk and the horizontal axis depicts the ratio between the number of model parameters and number of data points. Recently, Curth et al. [2023] has attempted to bridge the gap of our understanding on the prevalence of the double descent phenomenon in non-deep learning models, such as trees, boosting, and linear regression — methods known as smoothers. Notably, analysis of these model classes affirmed the wisdom that model complexity and capacity is not necessarily an affine function of the number of model parameters. Rather, there are higher dimensional substructures in the set of model parameters such that increasing model parameters in certain directions do not cause overfitting. In this paper, we examine the possibility of controlling the double descent phenomenon on simple two layer neural networks with varying representation dimension. We view the first layer as a learned approximation of the ‘ground truth kernel,’ and the second layer as a linear classifier. Particularly, we extend Curth et al. [2023] by first considering LASSO regressors, then implementing LASSO via L 1 regularization in neural network training as a sparsifier. This is motivated by the perspective of the L 1 regularizer as a convex surrogate for the “L 0 ” objective, aiming to prune down the number of parameters active in the network. Benefits of pruning and/or sparsification include (1) computational and storage savings, (2) model capacity regularization motivated by Occam’s razor [LeCun et al., 1989], and (3) potential lottery ticket subspaces [Frankle and Carbin, 2019]. Furthermore, the prevalence of a ‘sparse double descent’ first noted by He et al. [2022] — as model sparsity increases, test performance first decreases then increases (before finally decreasing as ∗ https://yashizhang.github.io/" 2401.10689v1,"A Lightweight Multi-Attack CAN Intrusion Detection System on Hybrid FPGAs Shashwat Khandelwal & Shanker Shreejith Department of Electronic & Electrical Engineering, Trinity College Dublin Dublin, Ireland Email: {khandels, shankers}@tcd.ie Abstract—Rising connectivity in vehicles is enabling new capabilities like connected autonomous driving and advanced driver assistance systems (ADAS) for improving the safety and reliability of next-generation vehicles. This increased access to in-vehicle functions compromises critical capabilities that use legacy invehicle networks like Controller Area Network (CAN), which has no inherent security or authentication mechanism. Intrusion detection and mitigation approaches, particularly using machine learning models, have shown promising results in detecting multiple attack vectors in CAN through their ability to generalise to new vectors. However, most deployments require dedicated computing units like GPUs to perform line-rate detection, consuming much higher power. In this paper, we present a lightweight multi-attack quantised machine learning model that is deployed using Xilinx’s Deep Learning Processing Unit IP on a Zynq Ultrascale+ (XCZU3EG) FPGA, which is trained and validated using the public CAN Intrusion Detection dataset. The quantised model detects denial of service and fuzzing attacks with an accuracy of above 99% and a false positive rate of 0.07%, which are comparable to the state-of-the-art techniques in the literature. The Intrusion Detection System (IDS) execution consumes just 2.0 W with software tasks running on the ECU and achieves a 25% reduction in per-message processing latency over the state-of-the-art implementations. This deployment allows the ECU function to coexist with the IDS with minimal changes to the tasks, making it ideal for real-time IDS in in-vehicle systems. Index Terms—Controller Area Network, Machine Learning, FPGA, Intrusion Detection System I. I NTRODUCTION & R ELATED W ORKS Most high-end vehicles today integrate over 50 electronic computing units (ECUs) interconnected through different network standards for incorporating safety-critical, comfort and automation capabilities in a cost and energy-efficient manner. Controller Area Network (CAN) and its variants continue to be the most widely used network protocol in automotive electric/electronic systems owing to their low cost, flexibility, and robustness. CAN is a broadcast protocol with implicit priority using the ID field and support for multiple data rates (from 125 Kbps to 1 Mbps), allowing their use in critical and non-critical network segments in the vehicle [1], [2]. CAN (and most other automotive networks) do not have native support for message (sender) authentication or encryption; however, due to the physical localization of earlier vehicular systems and the design of (critical) applications as silos (paritioned into domains), integrating them over unprotected CAN networks was considered secure. With increasing connectivity enforcing bridged access between previously siloed domains, security gaps and vulnerabilities in these networks have been exposed further through numerous exploits [3]. For instance, passive eavesdropping attacks enabled through malicious code or aftermarket extensions can lead to a complete loss of user privacy [4], while more enhanced attacks like Denial of Service (DoS) can fully disrupt normal vehicle functioning. Intrusion detection systems (IDSs) for high-speed CAN networks address these challenges, often leveraging hardware accelerators to analyse and identify attacks like DoS in realtime [5]. Early rule-based IDS schemes used inherent network and message properties like message frequency, voltage profiles of ECUs, or timing of remote request frames as features to detect abnormal operations [6]–[8]. However, the rule-based approach limits their ability to scale and generalise towards new attack vectors, while also incurring incremental storage and computational overheads for new attack modes/vectors. More recently, both classical and deep-learning based IDSs have proved extremely efficient in detecting CAN bus attacks [9]–[13]. In [12], the authors use a deep-convolutional neural network (CNN) based on inception net architecture as an IDS taking the CAN IDs as the input features to achieve an average detection accuracy of 99% on both the DoS and Fuzzing attacks. Alternative network architectures like Generational Adversarial Networks (GAN) [14], temporal convolutional networks with global attention [15] and a combination of CNN and long short-term memory (LSTM) as an unsupervised learning network [16] have been explored in the literature to improve detection accuracy, using only CAN IDs or complete data frame as inputs. Most such models rely on GPU acceleration to deploy the IDS at an ECU. Dedicated IDS-ECUs have also been proposed, where stacked models are executed on a Raspberry Pi-3 device that acts as an IDS-ECU [17]. An intrusion prevention ECU has also been proposed where an anomaly detection algorithm is executed on a Raspberry Pi device (acting as a standalone ECU) to detect fuzzing and spoofing attacks [18]. This approach drops any suspected messages from the network by triggering an error response on the bus; however, this can cause a large number of critical messages to be affected in case of false positives or DoS attacks. In all the above cases, the scalable and generalisable nature of ML models are deployed through specialised accelerators (GPUs) or dedicated ECUs and can adapt to new threats post-deployment, making them more attractive than traditional rule-based methods. An alternative architecture approach is through the use of hybrid FPGAs as ECUs, allowing a machine learning accelerator to be closely coupled with the application(s) running on the ECU for a software-controlled hardware IDS. Hybrid FPGA devices like Zynq Ultrascale+ combine automotivegrade ARM processors and a large programmable fabric" 2401.10708v1,"Demonstration of Cooperative Transport Interface using open-source 5G OpenRAN and virtualised PON network Frank Slyne 1, * , Kevin O’Sullivan 2 , Merim Dzaferagic 1 , Bruce Richardson 2 , Marcin Wrzeszcz 2 , Brendan Ryan 2 , Niall Power 2 , Robin Giller 2 , Marco Ruffini 1 1 CONNECT Centre, School of Computer Science and Statistics, Trinity College Dublin, 2 Intel Corporation, Ireland {fslyne, mdzafera, marco.ruffini}@tcd.ie, {kevin.o.sullivan, bruce.richardson, marcin.wrzeszcz, brendan.ryan, , robin.giller}@intel.com Abstract: We demonstrate a real-time, converged 5G-PON through the Cooperative Transport Interface, synchronising 5G and PON-DBA upstream schedulers. This innovative approach, implemented using 5G and PON open network implementations, significantly enhances network resource allocation, reducing latency. © 2024 The Author(s) 1. Overview The Open Radio Access Network (O-RAN), an evolution of the Cloud-Radio Access Network (Cloud-RAN) [1], is transforming network performance by integrating new features and enhancing capacity and latency. The architecture of Cloud-RAN, defined by the Next Generation Mobile Networks (NGMN) alliance, includes the Central Unit (CU), Distributed Unit (DU), and Radio Unit (RU). The connection between these units, known as the Low Layer Split (LLS) [2] transport interface or fronthaul, is traditionally handled by dedicated fiber fronthaul networks. However, replacing point-to-point fibre with Passive Optical Networks (PON), would substantially reduce connectivity costs, enabling a much needed increase in small cell densification, for 5G and beyond. The key issue to be addressed in 5G over PON is the latency generated by the Dynamic Bandwidth Allocation (DBA), which occurs due to lack of coordination between PON and DU upstream schedulers. The concept of ”Cooperative DBA” was originally introduced in [3] to address this issue. This focuses on the development of an optical-mobile cooperative interface that translates mobile upstream scheduling data into PON transmit request information. The concept was later standardised as ”Cooperative Transport Interface (CTI)” [4], which facilitates enhanced coordination between PON and RAN upstream schedulers, leading to more efficient resource allocation and reduced latency. In our demonstration, we show the integration of a Passive Optical Network (PON) Dynamic Bandwidth Allocation (DBA) with an open source 5G New Radio (NR) Medium Access Control (MAC) scheduler. The 5G DU and CU are open source from the srsRAN project [5], and the RU is a National Instruments (NI) USRP X310. The transmission was implemented using Tibit PON transceivers, which include a PON MAC layer. In addition, we have modified the PON MAC by integrating it with our virtual DBA technology [6]. The key points our demo will address is to show the capability to intercept UE grant requests from the DU, and make use of that information to schedule upstream PON bursts through a software-based virtual DBA, enabling dynamic and flexible bandwidth management. Achieving this required to provide strict synchronisation between PON and RAN schedulers, thereby reducing latency and improving network efficiency. The implementation makes use of Intel networking technologies like AF XDP and DPDK for low-latency packet processing and high-performance network packet delivery. It also required to develop mechanisms to access the Tibit OLT architecture, using MongoDB to program grant scheduling within the Tibit hardware. 2. Innovation The focus of our innovation is the synchronisation of a PON virtual DBA and 5G MAC scheduler using open networking implementations. PON and 5G NR systems typically operate independently of each other, which leads to suboptimal resource allocation and data transmission delays affecting QoS and user experience. Unfortunately, this integration can be complicated by the lack of alignment in standards and technologies. To understand the innovation in the synchronisation of MAC scheduling for 5G NR over PON, we consider two sequence diagrams for non-optimised and optimised scheduler scenarios in Fig 1. Here, the timeline is downwards, the components (CU/DU, OLT, ONU, RU and UE) through which data flows is left to right. For the non-optimised case (left), a" 2401.10713v1,"Under consideration for publication in J. Plasma Phys. 1 Temperature inversion in a non-homogeneous collisionless plasma with a thermal boundary: the temporal coarse-graining method Luca Barbieri 1,2,3, †, Emanuele Papini 4 , Pierfrancesco Di Cintio 2,3,5 , Simone Landi 1,2 , Andrea Verdini 1,2 , Lapo Casetti 1,2,3 1 Dipartimento di Fisica e Astronomia, Università di Firenze, via Giovanni Sansone 1, Sesto Fiorentino, I-50019, Italy, 2 INAF - Osservatorio Astrofisico di Arcetri, Largo Enrico Fermi 5, Firenze, I-50125, Italy 3 INFN - Sezione di Firenze, via Giovanni Sansone 1, Sesto Fiorentino, I-50019, Italy 4 INAF - Istituto di Astrofisica e Planetologia Spaziali, via del Fosso Cavaliere 100, Roma, I-00133, Italy 5 Istituto dei Sistemi Complessi, Consiglio Nazionale delle Ricerche (ISC-CNR), via Madonna del piano 10, Sesto Fiorentino, I-50019, Italy (Received xx; revised xx; accepted xx) Prompted by the relevant problem of temperature inversion (i.e. gradient of density anticorrelated to the gradient of temperature) in solar physics, we introduce a novel method to model a gravitationally confined multi-component collisionless plasma in contact with a fluctuating thermostat. The dynamics is described via a set of effective partial differential equations for the coarse-grained versions of the distribution functions of the plasma components and a temporally coarse-grained energy reservoir. We derive a stationary solution of this system naturally predicting the inverted density-temperature profiles of the two-species as observed in systems of astrophysical interest such as the solar corona. We validate our method by comparing the analytical results with kinetic numerical simulations of the plasma dynamics in the context of the two-species Hamiltonian meanfield model (HMF). Finally, we apply our theoretical framework to the problem of the temperature inversion in the solar corona obtaining density and temperature profiles in remarkably good agreement with the observations. Key words: plasma dynamics, plasma properties, plasma nonlinear phenomena, space plasma physics 1. Introduction Stationary states out of thermal equilibrium occur in nature and often exhibit unexpected properties. An example is given by the so-called inverted temperature-density profiles, or temperature inversion, that corresponds to an increase in temperature while the density is decreasing. Numerical simulations have shown how temperature inversion can be achieved in non-equilibrium stationary states, usually referred to as quasi-stationary states, attained after processes of violent relaxation (see e.g. Lynden-Bell 1967; Kandrup 1998; Levin et al. 2008; Ewart et al. 2022, see also Barbieri et al. 2022 and references therein), of many-body systems with long-range inter-particle potentials (see Di Cintio et al. 2013; Campa et al. 2014 and references therein), brought out of thermal equilibrium by energy injection (Casetti & Gupta 2014; Teles et al. 2015; Gupta & Casetti 2016). † Email address for correspondence: luca.barbieri@unifi.it" 2401.10733v1,"Dynamic Q&A of Clinical Documents with Large Language Models Ran Elgedawy Sudarshan Srinivasan relgedaw@vols.utk.edu srinivasans@ornl.gov University of Tennessee, Knoxville Oak Ridge National Laboratory Ioana Danciu danciui@ornl.gov Oak Ridge National Laboratory demonstrated the highest accuracy due to its 13B parameters but required heavy compute. To improve inference latency and deployability, model optimization techniques like weight quantization was utilized to reduce latency by approximately 48 times. While results are promising, several limitations remain including model hallucinations, and lack of robust evaluation across diverse medical cases. Addressing these gaps represents important future work to unlock the value in clinical notes and advance clinical decision making through AI. Abstract Electronic health records (EHRs) contain a wealth of valuable patient information embedded within clinical notes. However, the everincreasing volume and complexity of these unstructured clinical notes makes it extremely challenging for researchers and clinicians to manually locate and extract relevant information in a timely manner. Intelligent systems that can understand clinical documents and enable users to efficiently query and retrieve key details on demand are urgently needed. In this work our aim is to develop a natural language conversational interface powered by state-of-the-art open source large language models (LLMs) that allows users to explore clinical notes through dynamic question-answering. A chatbot interface was built using Langchain, a framework for creating and managing applications powered by large language models, paired with powerful transformer-based language models. The system allows users to simply ask questions in natural language and receive answers extracted from relevant parts of the clinical notes. Extensive experiments were performed to evaluate combinations of semantic embedding models such as the state of the art SentenceTransformers framework, based on the Sentence-BERT embedding models [1], and advanced large language models on their ability to encode both queries and documents for optimal information retrieval. Wizard Vicuna 1 Introduction Electronic health record (EHR) systems have become ubiquitous in modern healthcare environments [2, 3, 4]. They offer an integrated digital repository of patient health information collected from various clinical encounters across time. EHRs may contain a range of data including demographics, medical and family histories, laboratory test results, radiology images, computed biosignals and crucially, clinical notes generated by physicians, nurses and other providers. These clinical notes, documenting physician-patient interactions, encapsulate a wealth of vital information about the patient’s conditions, treatments, care plans and outcomes in rich natural language. However, a significant limitation of EHRs is that critical patient information is buried within large volumes of unstructured clinical notes that are challenging for providers to efficiently search through and extract relevant details on demand. For instance, a newly assigned physician may need to rapidly comprehend a patient’s care history across multiple specialists to make appropri- 1" 2401.10752v1,"1 HiCD: Change Detection in Quality-Varied Images via Hierarchical Correlation Distillation Chao Pang, Xingxing Weng, Jiang Wu, Qiang Wang, and Gui-Song Xia Abstract—Advanced change detection techniques primarily target image pairs of equal and high quality. However, variations in imaging conditions and platforms frequently lead to image pairs with distinct qualities: one image being high-quality, while the other being low-quality. These disparities in image quality present significant challenges for understanding image pairs semantically and extracting change features, ultimately resulting in a notable decline in performance. To tackle this challenge, we introduce an innovative training strategy grounded in knowledge distillation. The core idea revolves around leveraging task knowledge acquired from high-quality image pairs to guide the model’s learning process when dealing with image pairs that exhibit differences in quality. Additionally, we develop a hierarchical correlation distillation approach (involving self-correlation, crosscorrelation, and global correlation). This approach compels the student model to replicate the correlations inherent in the teacher model, rather than focusing solely on individual features. This ensures effective knowledge transfer while maintaining the student model’s training flexibility. Through extensive experimentation, we demonstrate the remarkable superiority of our methodologies in scenarios involving only resolution disparities, single-degradation, and multi-degradation quality differences. The codes will be released at https://github.com/fitzpchao/HiCD. Index Terms—Change detection, quality difference, hierarchical correlation distillation. I. I NTRODUCTION HANGE detection (CD), which aims to identify changes in Earth’s surface using bi-temporal remote sensing image pairs captured within the same area, holds immense significance in numerous applications, including urban planning [1– 3] and disaster assessment [4–7], among others. To date, numerous initiatives have been made to develop automated and precise change detection methods. Recently, deep learningbased methods [8–10] have attracted a lot of interest due to their outstanding performance. However, it is worth noting that the majority of deep learning-based change detection methods [8–11] excel in handling pairs of images with equal and high quality, as exemplified by the top-left two images in Figure 1. Nonetheless, they often face significant performance degradation when tasked with scenarios where bi-temporal images exhibit varying qualities, as seen in the top-right image pair in Figure 1. The variation in image quality between bi-temporal images primarily stems from fluctuations in imaging conditions, such as the presence of clouds, fog, haze, or smoke, during the C C. Pang, X. Weng and G.-S. Xia are with School of Computer Science, Wuhan University, Wuhan 430072, China. J. Wu is with Shanghai Artificial Intelligence Laboratory, Shanghai, China. Q. Wang is with SenseTime Research, Beijing, China. Corresponding Author: Gui-Song Xia (guisong.xia@whu.edu.cn) Quality Quality Equal Difference 𝑡 "" image (high-quality) 90 80 F1 𝑡 ! image (high-quality) 𝑡 "" image (low-quality) 85.52 IoU 73.58 70 58.15 60 78.86 71.43 55.56 69.97 74.7 65.1 53.82 50 40 30 20 10 0 2.56 1.3 3.07 1.56 ChangeFormer Baseline FC-EF* FC-Siam-conc* FC-Siam-diff* ChangeFormer* HiCD* Fig. 1. The performance of the excellent CD methods on the multidegradation LEVIR-CD dataset. * indicates the method trained on qualityvaried image pairs, otherwise on the equal high-quality image pairs. acquisition of these bi-temporal image pairs. Additionally, random signals introduced during processes such as storage, compression, and transmission can also result in image pairs displaying varying quality, leading to disparities in noise levels between the bi-temporal images. Moreover, in certain realworld applications, such as disaster monitoring, there is a need to utilize image pairs obtained from different platforms with differing spatial resolutions. Consequently, there is a compelling need for the development of change detection (CD) methods that can effectively account for these variations in quality within bi-temporal image pairs. Up to this point, several studies [12–16] have been dedicated to addressing change detection tasks involving image pairs with differences in spatial resolution. These studies have reported promising results, achieved either by developing methods to directly extract high-resolution features from lowresolution images or by exploiting the advanced methods in super-resolution to enhance low-resolution images before conducting change detection. Nevertheless, there remains a deficiency of effective methods capable of handling change detection tasks involving a broader spectrum of quality differences mentioned earlier. Different from existing works that only focus on image pairs with different resolutions, quality differences concern diverse degradation factors such as blur, noise, or combinations of" 2401.10778v1,"HaliVer: Deductive Verification and Scheduling Languages Join Forces Lars B. van den Haak 1[0000−0002−0330−5016] , Anton Wijs 1[0000−0002−2071−9624] , Marieke Huisman 2[0000−0003−4467−072X] , and Mark van den Brand 1[0000−0003−3529−6182] 1 Eindhoven University of Technology, The Netherlands {l.b.v.d.haak, a.j.wijs, m.g.j.v.d.brand}@tue.nl 2 University of Twente, The Netherlands m.huisman@utwente.nl Abstract. The HaliVer tool integrates deductive verification into the popular scheduling language Halide, used for image processing pipelines and array computations. HaliVer uses VerCors, a separation logicbased verifier, to verify the correctness of (1) the Halide algorithms and (2) the optimised parallel code produced by Halide when an optimisation schedule is applied to an algorithm. This allows proving complex, optimised code correct while reducing the effort to provide the required verification annotations. For both approaches, the same specification is used. We evaluated the tool on several optimised programs generated from characteristic Halide algorithms, using all but one of the essential scheduling directives available in Halide. Without annotation effort, HaliVer proves memory safety in almost all programs. With annotations HaliVer, additionally, proves functional correctness properties. We show that the approach is viable and reduces the manual annotation effort by an order of magnitude. Keywords: Program correctness · Deductive verification · Scheduling language. 1 Introduction To meet the continuously growing demands on software performance, parallelism is increasingly often needed [15]. However, introducing parallelism tends to increase the risk of introducing errors, as the interactions between parallel computations can be hard to predict. Moreover, a plethora of optimisation techniques exists [12], so identifying when an optimisation can be applied safely, without breaking correctness, can be very challenging. Also, applying optimisations tends to make a program more complex, making it harder to reason about. To address this, on the one hand, various domain-specific languages (DSLs) have been proposed that separate the algorithm (what it does) from the parallelisation schedule (how it does it). These are called scheduling languages [3, 7, 8, 10, 24, 25, 30]. Given an algorithm and a schedule, a compiler generates an" 2401.10813v1,"Inverse Primitive Path Analysis Carsten Svaneborg a a University of Southern Denmark, Campusvej 55, 5230 Odense M, Denmark Abstract The primitive-path analysis (PPA) [R. Everaers et al. Science 303, 823, (2004)] is an algorithm that transforms a model polymer melt into its topologically equivalent mesh by removing excess contour length stored in thermal fluctuations. Here we present an inverse PPA algorithm that gradually reintroduces contour length in a PPA mesh to produce an topologically equilvalent polymer melt. This enables the generation of model polymer materials with well controlled topology. As an illustration, we generate knitted model polymer materials with a 2D cubic lattice of entanglement points using a synthetic PPA mesh as a starting point. We also show how to combine PPA and inverse PPA to accelerate stress relaxation approximately by an order of magnitude in simulation time. This reduces the computational cost of computational studies of structure-property relations for polymer materials. Keywords: computational polymer physics, topological analysis methods, generating model polymer materials 1. Introduction The complex interplay between molecular topology and emergent properties of soft-matter is of great interest for physics, biology, and chemistry. The relation between viscoelasticity and topological entanglements in linear polymer melts is well understood[1]. Entanglements gives rise to localization of thermal fluctuations to tube like structures along chains.[2] Melt dynamics is explained by the reptation motion of chains inside tubes with slow tube renewal occuring at the chain ends.[3] Significant efforts have been invested in expanding our understanding to non-concatenated ring polymer melts. Ring polymers crumple and adapt random tree-like structures due to intermolecular entanglements in dense solutions[4, 5, 6] which gives rise to unexpected elastic properties[7, 8, 9]. Grossberg et al. proposed that biological function relies on DNA being in the form of crumbled unknotted globules, since entanglements and knots would ∗ Corresponding author Email address: zqex@sdu.dk (Carsten Svaneborg) Preprint submitted to Computer Physics Communications January 22, 2024" 2401.10818v1,"From Market Saturation to Social Reinforcement: Understanding the Impact of Non-Linearity in Information Diffusion Models Tobias Friedrich ∗ Andreas Göbel ∗ Nicolas Klodt ∗ Martin S. Krejca † Marcus Pappik ∗ ∗ Hasso Plattner Institute, University of Potsdam, Potsdam, Germany {tobias.friedrich, andreas.goebel, nicolas.klodt, marcus.pappik}@hpi.de † LIX, CNRS, Ecole Polytechnique, Institut Polytechnique de Paris, Palaiseau, France martin.krejca@polytechnique.edu Abstract Diffusion of information in networks is at the core of many problems in AI. Common examples include the spread of ideas and rumors as well as marketing campaigns. Typically, information diffuses at a non-linear rate, for example, if markets become saturated or if users of social networks reinforce each other’s opinions. Despite these characteristics, this area has seen little research, compared to the vast amount of results for linear models, which exhibit less complex dynamics. Especially, when considering the possibility of re-infection, no fully rigorous guarantees exist so far. We address this shortcoming by studying a very general non-linear diffusion model that captures saturation as well as reinforcement. More precisely, we consider a variant of the SIS model in which vertices get infected at a rate that scales polynomially in the number of their infected neighbors, weighted by an infection coefficient 𝜆. We give the first fully rigorous results for thresholds of 𝜆 at which the expected survival time becomes super-polynomial. For cliques we show that when the infection rate scales sub-linearly, the threshold only shifts by a poly-logarithmic factor, compared to the standard SIS model. In contrast, super-linear scaling changes the process considerably and shifts the threshold by a polynomial term. For stars, sublinear and super-linear scaling behave similar and both shift the threshold by a polynomial factor. Our bounds are almost tight, as they are only apart by at most a poly-logarithmic factor from the lower thresholds, at which the expected survival time is logarithmic. 1" 2401.10825v1,"A SURVEY ON RECENT ADVANCES IN N AMED E NTITY R ECOGNITION Imed Keraghel Centre Borelli UMR9010 Université Paris Cité Paris, France imed.keraghel@u-paris.fr Stanislas Morbieu Kernix Software Paris, France smorbieu@kernix.com Mohamed Nadif Centre Borelli UMR9010 Université Paris Cité Paris, France mohamed.nadif@u-paris.fr A BSTRACT Named Entity Recognition seeks to extract substrings within a text that name real-world objects and to determine their type (for example, whether they refer to persons or organizations). In this survey, we first present an overview of recent popular approaches, but we also look at graph- and transformerbased methods including Large Language Models (LLMs) that have not had much coverage in other surveys. Second, we focus on methods designed for datasets with scarce annotations. Third, we evaluate the performance of the main NER implementations on a variety of datasets with differing characteristics (as regards their domain, their size, and their number of classes). We thus provide a deep comparison of algorithms that are never considered together. Our experiments shed some light on how the characteristics of datasets affect the behavior of the methods that we compare. Keywords Named Entity Recognition · Information Extraction · Natural Language Processing · Large Language Models · Machine Learning 1 Introduction Named Entity Recognition (NER) is a field of computer science and natural language processing (NLP) that deals with the identification and classification of named items in unstructured text. The items in question belong to predefined semantic types such as persons, locations, and organizations [Grishman and Sundheim, 1996a]. NER is today a key component in areas including machine translation [Babych and Hartley, 2003], question-answering [Mollá et al., 2006], and information retrieval [Guo et al., 2009]. A number of NER systems have been developed, particularly for English, but also for other languages, including Chinese [Liu et al., 2022] and French [Mikheev et al., 1999]. Early NER systems used algorithms based on handcrafted rules, lexicons, and spelling features [Rau, 1991]. Systems were subsequently developed that used algorithms based on machine learning [Nadeau and Sekine, 2007], neural networks [Collobert, 2011], and transformers [Labusch et al., 2019a]. Several NER surveys have been published. Among these, we might mention [Nadeau and Sekine, 2007, Shaalan, 2014], in which the authors present an overview of methods, from the rise of rule-based NER systems through to those based on machine learning. The authors in [Goulart et al., 2011] analyze relevant work in relation to biomedical texts over the period 2007-2009. Marrero et al. [2013] summarize the work on NER from a theoretical and practical point of view. An early study on neural network-based NER is available in [Sharnagat, 2014]. Deep learning methods are studied in-depth in [Li et al., 2020a]. However, the authors do not address the use of transformers because their use remained limited at the time of their study. Surveys that include transformer-based methods are largely absent from the literature. Some recent studies include methods based on neural networks and transformers [Li et al., 2022], but these are far from complete since they do not include recent methods such as large language models (LLMs) and graph-based NER. The study Wang et al. [2022] focuses on graph-based methods specifically for nested named entities, but does not address flat named entities. Moreover, apart from one study, namely Li et al. [2020a] (which does not feature any mention of transformers), the" 2401.10832v1,"Accuracy of metaGGA functionals in describing transition metal fluorides Dereje Bekele Tekliye 1 and Gopalakrishnan Sai Gautam 1,∗ 1 Department of Materials Engineering, Indian Institute of Science, Bengaluru, 560012, Karnataka, India Accurate predictions of material properties within the chemical space of transition metal fluorides (TMFs), using computational frameworks such as density functional theory (DFT), is important for advancing several technological applications. The state-of-the-art semi-local exchange-correlation (XC) functionals within DFT include the strongly constrained and appropriately normed (SCAN) and the restored regularized SCAN (r 2 SCAN), both of which are meta generalized gradient approximation (metaGGA) functionals. Given their semi-local nature, both SCAN and r 2 SCAN are susceptible to self-interaction errors (SIEs) while modelling highly correlated d electrons of transition metals (TMs). Hence, in this work, we evaluate the accuracy of both SCAN and r 2 SCAN functionals in estimating several properties of TMFs, including redox enthalpies, lattice geometries, on-site magnetic moments, and band gaps. Specifically, we consider binary fluorides of Ti, V, Cr, Mn, Fe, Co, Ni, and Cu. We observe both SCAN and r 2 SCAN exhibit poor accuracy in estimating fluorination enthalpies among TMFs, which can be primarily attributed to SIEs among the d electrons, given both functionals bind F 2 accurately. Thus, we derive optimal Hubbard U corrections for both functionals based on experimental fluorination (or oxidation) enthalpies within binary TMFs. Note that our attempts at using the linear response theory to derive U corrections yielded unphysical values for V, Fe, and Ni fluorides. While adding the fluorination-enthalpy-derived U corrections to the metaGGA functionals does not significantly affect the lattice volumes and on-site magnetic moments (and in turn, the accuracy of these property estimations versus experiments), it does cause a significant increase in calculated band gaps. Also, we calculated the average Na intercalation voltage in Mn, Fe, Co, and Ni fluorides as a transferability check of our optimal U values. Overall, we do recommend the incorporation of the Hubbard U correction to improve predictions of redox enthalpies in other TMFs. With respect to band gap predictions, given the lack of experimental data, we suggest the use of the non-U -corrected metaGGA functionals, given their observed physically-precise underestimation of empirical gaps. Finally, our study should advance the accuracy of DFT-based screening studies to unearth novel TMFs, which can be used in various applications, including energy storage, catalysis, and magnetic devices. I. INTRODUCTION Redox-active 3d transition metal fluorides (TMFs) are widely studied and have been used in the fields of magnetism [1, 2], catalysis [3–6], electroceramics [7–9], and electrochemical energy storage [10–18]. For instance, fluorides exhibit considerable promise as prospective positive electrode (cathode) materials for batteries owing to the advantageous inductive effect associated with fluorine [19]. Characterized by fluorine’s high electronegativity, fluorine addition to a cathode material typically yields higher voltages and higher energy densities. Several fluoride-based cathode materials, such as LiMnF 3 , NaFeF 3 , NaMnF 3 , NaCoF 3 , and KVO 4 F have been investigated as potential candidates for intercalation-type and conversion-type rechargeable lithium-ion, sodiumion, and potassium-ion batteries [20–24]. Other notable conversion-based electrodes in the lithium-ion chemical space include the LiF+FeF 2 -LiFeF 3 and LiF-FeO systems, which are fluoride-based as well [16, 25–28]. Investigating materials for energy storage and other applications, including identifying new materials and understanding the underlying properties of existing mate- ∗ saigautamg@iisc.ac.in rials, has greatly benefited from the utilization of quantum mechanical methods [29–34], such as density functional theory (DFT [35, 36]). Notably, the choice of the exchange-correlation (XC) functional in DFT plays a crucial role in accurately describing the electronic interactions within a given material, and hence its resultant properties, such as redox enthalpies and ground state atomic configurations. Prominent XC functionals include the local density approximation (LDA [36]), the generalized gradient approximation (GGA [37]), and the metageneralized gradient approximation (metaGGA [38–40]), which represent increasing levels of accuracy, as illustrated using the Jacob’s ladder analogy [41]. Among metaGGA functionals, the strongly constrained and appropriately normed (SCAN [38]) functional satisfies all the 17 known constraints of an XC functional. SCAN incorporates the orbital kinetic energy density as a parameter in addition to the local electron density and its gradient, resulting in higher accuracy [42–45]. However, SCAN suffers from numerical instability and associated computational convergence difficulties [39]. To address SCAN’s shortcomings, the restored regularized SCAN (r 2 SCAN [40]) functional has been developed. r 2 SCAN combines the numerical accuracy of SCAN with improved numerical stability [46–48], while satisfying 16 out of the 17 known constraints for an XC functional. Thus, SCAN and r 2 SCAN represent" 2401.10839v1,"Holonic Learning: A Flexible Agent-based Distributed Machine Learning Framework Ahmad Esmaeili Zahra Ghorrati Eric T. Matson Purdue University West Lafayette, United States aesmaei@purdue.edu Purdue University West Lafayette, United States zghorrat@purdue.edu Purdue University West Lafayette, United States ematson@purdue.edu ABSTRACT Ever-increasing ubiquity of data and computational resources in the last decade have propelled a notable transition in the machine learning paradigm towards more distributed approaches. Such a transition seeks to not only tackle the scalability and resource distribution challenges but also to address pressing privacy and security concerns. To contribute to the ongoing discourse, this paper introduces Holonic Learning (HoL), a collaborative and privacy-focused learning framework designed for training deep learning models. By leveraging holonic concepts, the HoL framework establishes a structured self-similar hierarchy in the learning process, enabling more nuanced control over collaborations through the individual model aggregation approach of each holon, along with their intra-holon commitment and communication patterns. HoL, in its general form, provides extensive design and flexibility potentials. For empirical analysis and to demonstrate its effectiveness, this paper implements HoloAvg, a special variant of HoL that employs weighted averaging for model aggregation across all holons. The convergence of the proposed method is validated through experiments on both IID and Non-IID settings of the standard MNISt dataset. Furthermore, the performance behaviors of HoL are investigated under various holarchical designs and data distribution scenarios. The presented results affirm HoL’s prowess in delivering competitive performance particularly, in the context of the Non-IID data distribution. KEYWORDS Distributed learning, Holonic Learning, Collaborative Learning, Edge Computing ACM Reference Format: Ahmad Esmaeili, Zahra Ghorrati, and Eric T. Matson. 2024. Holonic Learning: A Flexible Agent-based Distributed Machine Learning Framework. In Proc. of the 23rd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2024), Auckland, New Zealand, May 6 – 10, 2024, IFAAMAS, 9 pages. 1 INTRODUCTION Today’s interconnected world, marked by the proliferation of information and computational capabilities across vast digital landscapes, has led to critical challenges concerning the scalability, adaptability, speed, and support for diversity in the traditional centralized learning models. As a solution to such limitations and harnessing the collective power of the networked devices—whether servers or edge devices—recent decade has witnessed a substantial Proc. of the 23rd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2024), N. Alechina, V. Dignum, M. Dastani, J.S. Sichman (eds.), May 6 – 10, 2024, Auckland, New Zealand. © 2024 International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). This work is licenced under the Creative Commons Attribution 4.0 International (CC-BY 4.0) licence. growth in the rise of distributed learning methodologies that not only expedite training process but also enhances robustness and privacy. Federated Learning (FL) [17] stands out as one of the prominent distributed learning approaches attracting attentions from both academia and industry [26]. By empowering end users to participate in the collaborative learning process while retaining ownership of their data, FL ensures both data security and privacy on one hand, and leveraging the potential of computationally constrained devices on the other. Despite its apparent simplicity in its original format, FL introduces a series of intricate open problems and challenges tackled by a plethora of research work. Communication efficiency, convergence rates, privacy preservation, addressing potential adversarial attacks, robustness across heterogeneous devices and data distributions, non-identically and independently distributed (non-IID) data, mitigating potential aggregation bias, and ensuring fairness in model updates are among the nuanced and critical open problems that arise within the realm of Federated Learning [13]. Emerging real-world scenarios and applications have given rise to new trends in methodologies that focus on relaxing some of FL’s core assumptions. Some of the noteworthy examples include peerto-peer Learning [12, 22], edge-based learning [19, 24], and split learning [9, 23]. In fully decentralized Peer-to-Peer (P2P) learning the objective revolves around replacing the central orchestration server with a peer-to-peer communications topology between the clients to mitigate the risk of single-point of failure and address the potential communication bottlenecks in large-scaled systems. In edge-based FL system, on the other hand, the emphasis lies in relocating the parameter server to the vicinity of edge devices to enhance latency and strike a balance between computation and communication. Unlike the previous approaches, split learning introduces another dimension of parallelism and shifts the focus from data partitioning to splitting the execution of the learning model into layers across multiple clients and the server. Hierarchical approaches have consistently been instrumental in shaping the development and structure of intricate systems, and FL is no exception to this pattern. In Hierarchical FL approaches, the clients are clustered into groups to reduce communication overheads and add an extra privacy layer through periodic model updates within and across groups [18]. The studies reported in [1, 11, 16, 25] exemplify noteworthy contributions that center on enhancing energy consumption, latency, and communication efficiency. In [1], a two-tier hierarchical FL architecture is employed for wireless heterogeneous cellular networks. This structure clusters mobile users into localized cells, leveraging local FL within" 2401.10841v2,"Using LLMs to discover emerging coded antisemitic hate-speech in extremist social media Dhanush Kikkisetti, Raza Ul Mustafa, Wendy Melillo, Roberto Corizzo, Zois Boukouvalas, Jeff Gill, Nathalie Japkowicz American University, 4400 Massachusetts Ave NW, Washington, DC 20016, USA {vk4372a,rmustafa,melillo,rcorizzo,boukouva,jgill,japkowic}@american.edu Abstract—Online hate speech proliferation has created a difficult problem for social media platforms. A particular challenge relates to the use of coded language by groups interested in both creating a sense of belonging for its users and evading detection. Coded language evolves quickly and its use varies over time. This paper proposes a methodology for detecting emerging coded hate-laden terminology. The methodology is tested in the context of online antisemitic discourse. The approach considers posts scraped from social media platforms, often used by extremist users. The posts are scraped using seed expressions related to previously known discourse of hatred towards Jews. The method begins by identifying the expressions most representative of each post and calculating their frequency in the whole corpus. It filters out grammatically incoherent expressions as well as previously encountered ones so as to focus on emergent well-formed terminology. This is followed by an assessment of semantic similarity to known antisemitic terminology using a fine-tuned large language model, and subsequent filtering out of the expressions that are too distant from known expressions of hatred. Emergent antisemitic expressions containing terms clearly relating to Jewish topics are then removed to return only coded expressions of hatred. Index Terms—hate speech, coded antisemitic terminology I. I NTRODUCTION Online hate speech detection 1 is a complex problem for social media platforms. A particular challenge, not much discussed in the literature, relates to the use of coded language. The following post illustrates the issue in the context of antisemitic hate speech: “Nope Globalist want us intertwined and run by the elites, Globalist don’t lay tariffs on their friends you stupid fu****”. [posted on Dec. 31, 2022, on the Disqus platform ] According to the American Jewish Committee (AJC) Translate Hate Glossary 2 , a globalist, in its unbiased definition, is “a person who advocates the interpretation or planning of economic and foreign policy in relation to events and developments throughout the world”. According to this definition, the term is rather flattering. Indeed, that is the way it is intended in the Hyatt hotel’s welcoming message to its club members seen in Figure 1 3 . In that commercial context a Research supported by American University’s Signature Research Initiative program. We thank Jacob Levine for his inspiration in the initial steps of this project. 1 Warning: Some of the paper’s content may be disturbing to the reader. 2 https://www.ajc.org/translatehate/globalist 3 Photo by one of the authors on 11/3/23 at a Hyatt Texas property. Fig. 1. Non antisemitic use of the term ”globalist” globalist refers to someone “who gets it!” and should feel good about it! The term does not, in any way, refer to Jews. Yet, the AJC Translate Hate Glossary argues that the term has an antisemitic connotation when it “is used to promote the antisemitic conspiracy that Jewish people do not have allegiance to their countries of origin, like the United States, but to some worldwide order—like a global economy or international political system—that will enhance their control over the world’s banks, governments, and media”. In the above post, it is clear that the antisemitic connotation is implied. From this post, we surmise that 1) The globalists (a.k.a., the Jews) are distinct from “us”, presumably, the good American citizens; 2) They control “our” fate to be run by the elites (a subset of these Jews) 4 ; 3) They help each other by not imposing the same tariffs on each other as those they impose on “us”. The above post, thus has a double meaning. To a recipient who is unaware of its antisemitic connotation, some category of people, the globalists, do not seem to behave very nicely. Yet, to an informed audience, it is a very pointed post that reiterates old Nazi and Soviet anitisemitic propaganda 5 and propagates it further. Furthermore, on social media platforms, 4 “Elite” appears in the AJC Glossary in the context of “Cosmpolitan Elite”: ““Cosmopolitan” and “elite” are terms that have separately incited antisemites across the political spectrum. Based on stereotypes of Jewish wealth and insularity, Jews have been accused of being part of an elite class for centuries.” 5 c.f. “Globalist” and “Cosmopolitan Elite” in the AJC Glossary." 2401.10845v2,"Emotion Classification In Software Engineering Texts: A Comparative Analysis of Pre-trained Transformers Language Models Mia Mohammad Imran Virginia Commonwealth University Richmond, Virginia, USA imranm3@vcu.edu ABSTRACT Emotion recognition in software engineering texts is critical for understanding developer expressions and improving collaboration. This paper presents a comparative analysis of state-of-the-art Pretrained Language Models (PTMs) for fine-grained emotion classification on two benchmark datasets from GitHub and Stack Overflow. We evaluate six transformer models - BERT, RoBERTa, ALBERT, DeBERTa, CodeBERT and GraphCodeBERT against the current best-performing tool SEntiMoji. Our analysis reveals consistent improvements ranging from 1.17% to 16.79% in terms of macroaveraged and micro-averaged F1 scores, with general domain models outperforming specialized ones. To further enhance PTMs, we incorporate polarity features in attention layer during training, demonstrating additional average gains of 1.0% to 10.23% over baseline PTMs approaches. Our work provides strong evidence for the advancements afforded by PTMs in recognizing nuanced emotions like Anger, Love, Fear, Joy, Sadness, and Surprise in software engineering contexts. Through comprehensive benchmarking and error analysis, we also outline scope for improvements to address contextual gaps. ACM Reference Format: Mia Mohammad Imran. 2024. Emotion Classification In Software Engineering Texts: A Comparative Analysis of Pre-trained Transformers Language Models. In Proceedings of 3rd International Workshop on Natural Languagebased Software Engineering (NLBSE 2024). ACM, New York, NY, USA, 9 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION The exploration of emotion classification in software engineering (SE) texts has garnered considerable attention in recent years [1, 2], leading to the development of various emotion classification tools by researchers. Notable among these are ESEM-E by Murgia et al. [3], EMTk by Calefato et al. [4], and SEntiMoji by Chen et al. [5]. Chen et al.’s comparative study, utilizing emotion datasets extracted from Stack Overflow and JIRA [6, 7], affirmed the superior performance of SEntiMoji compared to EMTk and ESEM-E, solidifying its prominence in the domain. However, compared to open-domain, Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. NLBSE 2024, April 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn Pre-Trained Language Models (PTMs) rarely have been used in software engineering text for emotion classification. A recent study by Li et al. [8] introduced the use of BERT [9] as part of a two-stage framework for ambiguity detection, surpassing the performance of SEntiMoji in a GitHub emotion dataset curated by Imran et al. [10]. Another recent study by Bleyl et al. [11] found that BERT outperforms EMTk on Stack Overflow dataset curated by Novielli et al. [7]. This shift towards leveraging PTMs prompts a critical inquiry into the overall efficacy of such models in the nuanced task of emotion classification within software engineering contexts. Notably, Pre-trained Transformer Language Models like BERT [9] and RoBERTa [12] have already demonstrated state-of-theart results across various software engineering domains, including code completion, code review, bug localization, sentiment analysis, and toxicity detection [13–19]. In light of these developments, this paper embarks on a comprehensive exploration of Pre-trained Transformers Language Models in emotion classification for software engineering texts. Through rigorous evaluation and comparison, we aim to shed light on the strengths, limitations, and potential implications of leveraging PTMs in this nuanced domain. Our study utilizes two distinct datasets sourced from GitHub by Imran et al. [10] and Stack Overflow by Novielli et al. [7], encompassing a diverse range of emotions expressed in software engineering contexts. We assess the effectiveness of six state-of-the-art PTMs, including four general domain models (BERT, RoBERTa, ALBERT and DeBERTa) and two specifically tailored for software engineering (CodeBERT and GraphCodeBERT). This evaluation is conducted against the benchmark set by the SEntiMoji model. EMTk and ESEM-E are excluded from this comparative analysis, aligning with findings reported by Chen et al. [5] indicating the superior performance of SEntiMoji. Our investigation is guided by two primary research questions, each addressing specific facets of PTMs for emotion classification: RQ1: How accurately can Pre-Trained Language Models classify emotions in software engineering texts compared to state-of-the-art model? To address this question, we evaluate the performance of the six aforementioned state-of-the-art PTMs against the SEntiMoji model. Utilizing two distinct datasets, the GitHub dataset by Imran et al.[10] and the Stack Overflow dataset by Novielli et al.[7], both annotated using the comprehensive model by Shaver et al. [20], we scrutinize the models’ efficacy in capturing the nuances of emotions expressed in software engineering contexts. Our results suggest that the PTMs generally outperform state-of-the-art, average f1-score improvement ranges from 1.17% to 16.79%." 2401.10848v1,"Published as a conference paper at ICLR 2024 S OURCE -F REE AND I MAGE -O NLY U NSUPERVISED D OMAIN A DAPTATION FOR C ATEGORY L EVEL O BJECT P OSE E STIMATION Prakhar Kaushik Aayush Mishra Adam Kortylewski † Alan Yuille Johns Hopkins University † University of Freiburg and Max-Planck-Institute for Informatics {pkaushi1,amishr24,ayuille1}@jh.edu † akortyle@mpi-inf.mpg.de A BSTRACT We consider the problem of source-free unsupervised category-level pose estimation from only RGB images to a target domain without any access to source domain data or 3D annotations during adaptation. Collecting and annotating realworld 3D data and corresponding images is laborious, expensive, yet unavoidable process, since even 3D pose domain adaptation methods require 3D data in the target domain. We introduce 3DUDA, a method capable of adapting to a nuisance ridden target domain without 3D or depth data. Our key insight stems from the observation that specific object subparts remain stable across out-of-domain (OOD) scenarios, enabling strategic utilization of these invariant subcomponents for effective model updates. We represent object categories as simple cuboid meshes, and harness a generative model of neural feature activations modeled at each mesh vertex learnt using differential rendering. We focus on individual locally robust mesh vertex features and iteratively update them based on their proximity to corresponding features in the target domain even when the global pose is not correct. Our model is then trained in an EM fashion, alternating between updating the vertex features and the feature extractor. We show that our method simulates fine-tuning on a global pseudo-labeled dataset under mild assumptions, which converges to the target domain asymptotically. Through extensive empirical validation, including a complex extreme UDA setup which combines real nuisances, synthetic noise, and occlusion, we demonstrate the potency of our simple approach in addressing the domain shift challenge and significantly improving pose estimation accuracy. 1 I NTRODUCTION In recent years, object pose estimation has witnessed remarkable progress, revolutionizing applications ranging from robotics (Du et al., 2019; Wang et al., 2019a; Wong et al., 2017; Zeng et al., 2017) and augmented reality (Marchand et al., 2016; Marder-Eppstein, 2016; Runz et al., 2018) to human-computer interaction. There have been works for 3D and 6D pose estimation that have focused primarily on instance-level (He et al., 2021; 2020; Park et al., 2019; Peng et al., 2019; Tremblay et al., 2018; Wang et al., 2019a; Xiang et al., 2018) pose estimation methods. However, these methods require object-specific 3D CAD models or instance-specific depth information and are often unable to estimate object pose without given instance-specific 3D priors. Category-level methods (Chen et al., 2020a; Chen & Dou, 2021; Lin et al., 2021; Tian et al., 2020; Wang et al., 2019b; 2021b) are more efficient, but often still require some 3D information, such as the ground truth depth map (Wang et al., 2019b; Lin et al., 2021; Lee et al., 2022) or point clouds (Lee et al., 2023). Acquiring such labeled 3D data across different domains is often a formidable challenge, impeding the performance of these models when deployed in real-world scenarios. Some recent attempts (Lee et al., 2022; 2023) to perform category level pose estimation in a semisupervised manner also require a ground truth depth map (Lee et al., 2023) or point cloud (Lee et al., 2022) for every instance. 1" 2401.10853v1,"Kővári-Sós-Turán theorem for hereditary families Zach Hunter ∗ , Aleksa Milojević ∗ , Benny Sudakov ∗ , István Tomon † Abstract The celebrated Kővári-Sós-Turán theorem states that any n-vertex graph containing no copy of the complete bipartite graph K s,s has at most O s (n 2−1/s ) edges. In the past two decades, motivated by the applications in discrete geometry and structural graph theory, a number of results demonstrated that this bound can be greatly improved if the graph satisfies certain structural restrictions. We propose the systematic study of this phenomenon, and state the conjecture that if H is a bipartite graph, then an induced H-free and K s,s -free graph cannot have much more edges than an H-free graph. We provide evidence for this conjecture by considering trees, cycles, the cube graph, and bipartite graphs with degrees bounded by k on one side, obtaining in all the cases similar bounds as in the non-induced setting. Our results also have applications to the Erdős-Hajnal conjecture, the problem of finding induced C 4 -free subgraphs with large degree and bounding the average degree of K s,s -free graphs which do not contain induced subdivisions of a fixed graph. 1 Introduction The goal of this paper is to combine two classical areas of graph theory: Turán problems and the study of graphs with forbidden induced subgraphs. The extremal number or Turán number of a graph H is the maximum number of edges in an n-vertex graph containing no copy of H as a subgraph, and it is denoted by ex(n, H). The study of extremal numbers goes back more than a 100 years to Mantel [41], who determined the extremal number of the triangle. This was extended by Turán [56], who found the extremal number of every clique. By the Erdős-Stone-Simonovits theorem [15, 17], we know the extremal number of every non-bipartite graph H up to lower order terms. The extremal numbers of bipartite graphs are much more mysterious, with a plethora of results addressing specific instances, and with just as many open problems. One of the most notorious problems is to determine the extremal number of K s,t , i.e. the complete bipartite graph with vertex classes of size s and t. The celebrated Kővári-Sós-Turán theorem [35] states that if s ≤ t, then ex(n, K s,t ) = O t (n 2−1/s ). This is only known to be tight if s ∈ {2, 3}, or t is sufficiently large with respect to s [2, 9]. On the other hand, the random deletion method shows that ex(n, K s,s ) = Ω s (n 2−2/(s+1) ). Another classical topic of graph theory is the study of graphs avoiding a fixed graph H as an induced subgraph. One such problem closely related to the topic of this paper is the Gyárfás-Sumner conjecture [26, 52]. A family of graphs G is χ-bounded if there exists a function f such that χ(G) ≤ f (ω(G)) for every G ∈ G, where χ(G) denotes the chromatic number, and ω(G) the clique number. In this case, we say that f is a χ-bounding function for G. The Gyárfás-Sumner conjecture states that if T is a tree, then the family of graphs avoiding T as an induced subgraph is χ-bounded. An additional classical problem of interest about graphs avoiding a fixed induced subgraph is the Erdős-Hajnal conjecture [14]. This conjecture states that if H is a graph, then any induced H-free n-vertex graph contains either a clique or an independent set of size at least n c for some c = c(H) > 0. Here, we consider the problem of finding the maximum number of edges in a K s,s -free graph, assuming the host graph satisfies certain further structural restrictions. To this end, given a family of graphs G, let ex G (n, s) denote the maximum number of edges of an n-vertex member of G which contains no copy of K s,s . In the past two decades, the function ex G (n, s) has been extensively studied for various natural (typically hereditary) families G. In each case, it has been observed that the trivial ∗ ETH Zurich, e-mail: {zach.hunter, aleksa.milojevic, benjamin.sudakov}@math.ethz.ch. Research supported in part by SNSF grant 200021 196965. † Umeå University, e-mail : istvan.tomon@umu.se. 1" 2401.10857v1,"Copyright © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Published in: Proceedings of the 2023 Latin American Robotics Symposium (LARS), 2023 Brazilian Symposium on Robotics (SBR), and 2023 Workshop on Robotics in Education (WRE). Motion Consistency Loss for Monocular Visual Odometry with Attention-Based Deep Learning 1 st André O. Françani 2 nd Marcos R. O. A. Maximo Autonomous Computational Systems Lab (LAB-SCA) Computer Science Division Aeronautics Institute of Technology São José dos Campos, SP, Brazil andre.francani@ga.ita.br Autonomous Computational Systems Lab (LAB-SCA) Computer Science Division Aeronautics Institute of Technology São José dos Campos, SP, Brazil mmaximo@ita.br Abstract—Deep learning algorithms have driven expressive progress in many complex tasks. The loss function is a core component of deep learning techniques, guiding the learning process of neural networks. This paper contributes by introducing a consistency loss for visual odometry with deep learning-based approaches. The motion consistency loss explores repeated motions that appear in consecutive overlapped video clips. Experimental results show that our approach increased the performance of a model on the KITTI odometry benchmark. Index Terms—deep learning, loss function, transformer, monocular visual odometry I. I NTRODUCTION Deep learning (DL) techniques have shown to be stateof-the-art in diverse complex applications, such as computer vision (CV) and natural language processing (NLP). As evidence, DL models can be employed in image classification tasks [1], video surveillance [2], text translation [3], and others [4]. A fundamental component of deep learning techniques is the loss function, being a core element in the optimization algorithm. The loss function is minimized during the training step and the model’s parameters are adjusted according to the error between the model’s prediction and the expected ground truth. Different loss functions guide the training to a specific task, tuning the model’s parameters to a good performance in regression or classification tasks. This means that the choice of the loss function impacts what the model is in fact learning. The focal loss [5] is a clear example where the loss function played an important role in object detection applications, enabling inferences as fast as one-stage detectors while reaching accuracy competitive to two-stage detectors. A consistency loss may introduce a gain of information capable of making the model more robust and more reliable, increasing the performance. Thus, a consistency loss may André Françani was supported by CAPES – Coordination of Improvement of Higher Education Personnel under grant 88887.687888/2022-00. Marcos Maximo is partially funded by CNPq — National Research Council of Brazil through grant 307525/2022-8. 979-8-3503-1538-7/23/$31.00©2023 IEEE guide the learning process to be more accurate in its predictions regarding a particular task, reducing the error between the predicted output and the expected ground truth. Zhu et al. [6] achieved outstanding qualitative results in generative models by introducing a cycle consistency loss in the image-to-image translation task. In this paper, our contribution is a novel consistency loss function that deals with repeated motion in overlapped clips in the context of monocular visual odometry with deep learning. We evaluate our method on the KITTI odometry benchmark [7], showing that our approach increases the performance of the model. The remaining of this paper is organized as follows. Section II provides theoretical background about visual odometry and attention mechanisms. Section III introduces the proposed motion consistency loss. Section IV describes the experimental setups. Section V shows the experimental results on the KITTI odometry benchmark. Finally, Section VI concludes and shares our ideas for future work. II. B ACKGROUND A. Monocular visual odometry Visual odometry (VO) is widely applied in robotics and autonomous vehicles to estimate the camera’s pose given a sequence of image frames [8]. The motion between consecutive time steps k − 1 and k comprises a rotation matrix R k ∈ SO(3) and a translation vector t k ∈ R 3×1 . Note that R k and t k , respectively, depict the rotation and translation from time step k − 1 to k. The complete motion can be written as a transformation T k ∈ R 4×4 , defined as   R k t k T k = . 0 1 Furthermore, the poses in VO problems are typically described through 6 degrees of freedom (6-DoF): three rotational, and three translational. To address the visual odometry problem of estimating the 6-DoF, one can rely on traditional geometry-based approaches [9], [10], deep learning-based approaches through end-to-end architectures [11], [12], and hybrid methods that mix deep learning-based and geometrybased algorithms depending on the component of the visual" 2401.10861v1,"Letter Optics Letters 1 Experimental generation of cylindrical vector modes via an astigmatic mode converter T ATIANA R OMÁN -V ALENZUELA 1 , V ALERIA R ODRÍGUEZ -F AJARDO 2 , X IAO B O - HU 3 , AND C ARMELO R OSALES -G UZMÁN 1* 1 Centro de Investigaciones en Óptica, A.C., Loma del Bosque 115, Colonia Lomas del campestre, 37150 León, Gto., Mexico. 2 Department of Physics and Astronomy, Colgate University, Hamilton, NY 13346, United States of America. 3 Key Laboratory of Optical Field Manipulation of Zhejiang Province,Department of Physics, Zhejiang Sci-Tech University, Hangzhou, 310018, China * Corresponding author: carmelorosalesg@cio.mx Compiled January 22, 2024 In this work, we propose and demonstrate experimentally a compact technique for the generation of cylindrical vector beams, based on a Michelson interferometer and a π-astigmatic mode converter, capable of inverting the topological charge of higher-order Laguerre-Gauss beams. Compared to previously demonstrated methods, this is relatively easy to align, and very compact. In addition, it generalises the concept of astigmatic mode conversion, commonly associated with scalar beams, to vector beams with non-homogeneous polarisation distribution. We anticipate that many of the applications based on Michelson interferometers will benefit from the unique properties of vector beams. © 2024 Optical Society of America http://dx.doi.org/10.1364/ao.XX.XXXXXX Vector vortex beams, commonly regarded as a nonseparable superposition of the spatial and polarisation degrees of freedom, have become a topic of late, pioneering a wide diversity of applications, which have impacted research fields such as optical tweezers, optical metrology, optical communications, amongst many others [1–4]. They have been also identified as the classical analogous of quantum entangled states, an analogy that has coined them the controversial term classically-entangled beams, and has allowed the adaptation of many of the tools initially developed to describe the quantum word, to the classical word [5, 6]. In addition, it has triggered the development of quantuminspired technologies with vector beams [7]. As such, in the last two decades, a variety of generation techniques have been proposed. Noteworthy, the advent of computer-controlled devices ignited a new era, the era of computer-generated holography, which has enabled the generation of arbitrary vector beams. Liquid crystal Spatial Light Modulators (SLMs) [8–11] and more recently Digital Micromirror Devices (DMDs) [12–16] represent two of the most popular technologies. One of the main differences between SLMs and DMDs is the polarisation-dependent attribute of the first, which only allows the modulation of linear polarisation (typically horizontal) [17], while the latter can modulate any polarisation state [16]. Hence, the generation of vector beams with an SLM requires independent manipulation of the transverse profile of both polarisation components, commonly employing interferometric arrays [18–23]. The use of DMDs simplifies these tasks, with the additional advantage of allowing higher refreshing rates [24, 25]. Given that vector beams are generated as the nonseparable superposition of the spatial and polarisation degrees of freedom, most interferometric techniques are restricted to the use of Mach-Zehnder or Sagnac interferometric arrays [26–30]. Here we demonstrate a method for generating vector beams employing a Michelson interferometer, one of the most famous that has given rise to various applications, such as Optical Coherence Tomography (OCT) [31]. Nonetheless, given its configuration, and the fact that both beams inside the interferometer travel twice along the same optical path, it does not allow in principle to generate vector beams. Therefore, it has never been used for this purpose, even though many of the applications based on such interferometer would benefit from the additional properties the polarisation degree of freedom offers. Our technique requires the use of an astigmatic mode converter using a pair of cylindrical lenses [32–34]. There are two types of such astigmatic mode converters, with a theoretical formulation detailed in [34]. The first is the π/2-mode converter, which transforms Hermite- Gauss (HG) beams into Laguerre-Gauss (LG), as illustrated in Fig. 1 (a). This mode converter is implemented by placing two cylindrical lenses of identical focal length f facing each other and separated by a distance d given in terms of the focal length √ as d = 2 f . The second mode converter, capable of inverting the topological charge of LG beams, can be implemented similarly but with a separation distance d = 2 f , as schematically shown in Fig. 1 (b). To begin with, let’s recall that cylindrical vector beams can be described mathematically as the weighted non-separable superposition of the spatial and polarisation degrees of freedom as [2], U ( r ) = cos θ u R ( r ) ê R + sin θ u L ( r ) e iδ ê L , (1) where the functions u R ( r ) and u L ( r ) are in general two orthogonal spatial modes. Further, the unitary vectors ê R and ê L represent the right and left-handed circular polarisation. The parameter θ ∈ [ 0, π/2 ] is a weighing coefficient that allows a transition from scalar to vectorial. The parameter δ ∈ [ 0, π ] is an inter-" 2401.10882v1,"Reinforcement learning for question answering in programming domain using public community scoring as a human feedback Alexey Gorbatovski ITMO University Saint Petersburg, Russia gorbatoski@itmo.ru Abstract In this study, we investigate the enhancement of the GPT Neo 125M’s performance in Community Question Answering (CQA) with a focus on programming, through the integration of Reinforcement Learning from Human Feedback (RLHF) and the utilization of scores from Stack Overflow. Two distinct reward model training strategies are employed for fine-tuning with Proximal Policy Optimization (PPO). Notably, the improvements in performance achieved through this method are comparable to those of GPT Neo’s 2.7B parameter variant. Additionally, an auxiliary scoring mechanism is introduced, which demonstrates the limitations of conventional linguistic metrics in evaluating responses in the programming domain. Through accurate analysis, this paper looks at the divergence between traditional linguistic metrics and our human-preferences-based reward model, underscoring the imperative for domainspecific evaluation methods. By elucidating the complexities involved in applying RLHF to programming CQA and accentuating the significance of context-aware evaluation, this study contributes to the ongoing efforts in refining Large Language Models through focused human feedback. 1 Introduction Advances in Reinforcement Learning from Human Feedback (RLHF) have revolutionized the fine-tuning of Large Language Models (LLMs), facilitating adaptation for human-like response generation and precise behavior control (Ouyang et al., 2022). While RLHF has proven effective in general domains, its application in specialized fields such as Community Question Answering (CQA) for programming remains unexplored (Beeching et al., 2023). LLMs face unique challenges in handling the complex nature of programming queries, including conceptual understanding, code generation, API usage, and debugging, due to struggles with subtle semantic relations. Sergey Kovalchuk Huawei Saint Petersburg, Russia sergey.kovalchuk@huawei.com Furthermore, a critical challenge is the evaluation of the quality of responses generated by LLMs. Conventional metrics such as BertScore and Rouge do not capture the essence of responses effectively, especially in specialized domains like programming (Wang et al., 2019). Moreover, they don’t account for the diversity in valid answers and lack in capturing deeper semantic correctness. The development of more reliable and context-sensitive evaluation metrics is essential(Kovalchuk et al., 2022). To address these challenges, in this paper, we investigate the application of RLHF to a smaller model, GPT Neo 125M (Black et al., 2021a), in the context of programming CQA. We aim not only to enhance the model’s response generation capabilities but also to address the evaluation challenge. Our contributions are two-fold. First, we explore the potential and efficacy of RLHF in retraining a smaller LLM for programming CQA. Second, through empirical analysis, we highlight the discrepancies between the RLHF reward model and existing linguistic metrics, emphasizing the limitations of current evaluation methodologies and advocating for the development of more semanticallysensitive measures. The structure of the paper is as follows: Section 2 provides background information and describes the datasets used in this study. In Section 3, we delve into the application of RLHF for programming CQA, explaining the data preparing methodologies employed. Section 4 focuses on the experimental evaluation and results. Section 5 presents a discussion of the study results and evaluation methods. Finally, Section 6 concludes the paper with final remarks and reflections on our findings. 2 Background and Dataset 2.1 Background on RLHF and LLMs Reinforcement Learning from Human Feedback (RLHF) is a technique where models are trained us-" 2401.10895v2,"AI in Supply Chain Risk Assessment: A Systematic Literature Review and Bibliometric Analysis Md Abrar Jahin a , Saleh Akram Naife a , Anik Kumar Saha a , and M. F. Mridha b,∗ a Department of Industrial Engineering and Management, Khulna University of Engineering and Technology (KUET), Khulna, 9203, Bangladesh b Department of Computer Science, American International University-Bangladesh (AIUB), Dhaka, 1229, Bangladesh Abstract Supply chain risk assessment (SCRA) has witnessed a profound evolution through the integration of artificial intelligence (AI) and machine learning (ML) techniques, revolutionizing predictive capabilities and risk mitigation strategies. The significance of this evolution stems from the critical role of robust risk management strategies in ensuring operational resilience and continuity within modern supply chains. Previous reviews have outlined established methodologies but have overlooked emerging AI/ML techniques, leaving a notable research gap in understanding their practical implications within SCRA. This paper conducts a systematic literature review combined with a comprehensive bibliometric analysis. We meticulously examined 1,717 papers and derived key insights from a select group of 48 articles published between 2014 and 2023. The review fills this research gap by addressing pivotal research questions and exploring existing AI/ML techniques, methodologies, findings, and future trajectories, thereby providing a more encompassing view of the evolving landscape of SCRA. Our study unveils the transformative impact of AI/ML models, such as Random Forest, XGBoost, and hybrids, in substantially enhancing precision within SCRA. It underscores adaptable post-COVID strategies, advocating for resilient contingency plans and aligning with evolving risk landscapes. Significantly, this review surpasses previous examinations by accentuating emerging AI/ML techniques and their practical implications within SCRA. Furthermore, it highlights the contributions through a comprehensive bibliometric analysis, revealing publication trends, influential authors, and highly cited articles. This analysis provides an encompassing view of the field’s growth, offering insights into its evolution. This comprehensive review provides a roadmap for practitioners and researchers, offering insights into fortifying supply chain risk management strategies through AI integration, ultimately contributing to a deeper understanding of evolving trends and applications in this dynamic field. Keywords: Artificial Intelligence (AI), Supply chain risk assessment, Bibliometric analysis, Systematic literature review 1. Introduction Supply chain management (SCM) has long grappled with various challenges stemming from a spectrum of sources. Past outbreaks of infectious diseases, geological upheavals like earthquakes, and other natural catastrophic events have put supply chains at risk, albeit on a limited scale (Govindan et al., 2020). These incidents have illustrated how interrelationships within ∗ Corresponding author. Email addresses: abrar.jahin.2652@gmail.com (Md Abrar Jahin), naife.iem.kuet@gmail.com (Saleh Akram Naife), anikkumarsaha1999@gmail.com (Anik Kumar Saha), firoz.mridha@aiub.edu (and M. F. Mridha ) Preprint submitted to Computers & Industrial Engineering supply chains have formed intricate risk contagion networks, making them susceptible to contagion effects (Agca et al., 2022). The cascade effect, characterized by risk spillover from one enterprise to another, exacerbates the challenges, culminating in a chain reaction of Supply Chain Resilience (SCR) disasters (Roukny et al., 2018). Across the globe, companies confront formidable challenges across all stages of their supply chains. Suppliers failing to meet delivery obligations, unpredictable shifts in customer demands, and episodes of panic buying are just a few examples of the hurdles companies face (Ivanov, 2020). In pursuing market leadership, enterprises must also contend with the complexity introduced by the management and launch of innovation January 26, 2024" 2401.10899v1,"Published as a conference paper at ICLR 2020 C ONCRETE P ROBLEMS IN AI S AFETY , R EVISITED Inioluwa Deborah Raji & Roel Dobbe AI Now Institute New York University New York City, NY, USA {deb,roel}@ainowinstitute.org A BSTRACT As AI systems proliferate in society, the AI community is increasingly preoccupied with the concept of AI Safety, namely the prevention of failures due to accidents that arise from an unanticipated departure of a system’s behavior from designer intent in AI deployment. We demonstrate through an analysis of real world cases of such incidents that although current vocabulary captures a range of the encountered issues of AI deployment, an expanded socio-technical framing will be required for a more complete understanding of how AI systems and implemented safety mechanisms fail and succeed in real life. 1 I NTRODUCTION The rapid adoption and widespread experimentation and deployment of AI systems has triggered a variety of failures. Some are catastrophic and visible such as in the case of fatal crashes involving autonomous vehicles. Other failures are much more subtle and pernicious, such as the development of new forms of addiction to personalized content. As a response to these safety concerns, a variety of research communities from control theory and formal methods (Fisac et al., 2018; Seshia et al., 2016), computer security (Carlini et al., 2019; Papernot et al., 2018), engineering for safety assurances (Fang & Johnson, 2019; Trapp & Wei, 2019), and within the AI field itself (Amodei et al., 2016; Leike et al., 2017b; Varshney, 2016) have begun to weigh in on how to characterize and address safety risks and vulnerabilities in AI systems. Despite the complexity of modern AI systems and their already widespread impact, few studies are yet to ground their analysis of the taxonomy of problems in an understanding of real world deployments and disasters. The goal of this study is to revisit the effectiveness of AI safety problem formulations in providing adequate vocabulary for characterising the key challenges of implementing safe AI systems in the real world. This workshop paper is an initial investigation into ongoing work on this topic. 2 M ETHODOLOGY In this paper, we go through a commonly cited taxonomy for AI safety by Amodei et al. (2016), who survey and taxonimize a body of 170 papers to propose a subset of concrete AI Safety problems to pay attention to, aiming to understand “what challenges remain to reducing accident risk in modern machine learning systems”. In this context, an accident is defined as “a situation where a human designer had in mind a certain (perhaps informally specified) objective or task, but the system that was designed and deployed for that task produced harmful and unexpected results.” The authors then propose to “categorize safety problems according to where in the [technical AI design] process things went wrong.” We re-examine the provided definitions of three concrete problems from the taxonomy presented by Amodei et al., and identify a real world use case that fits the provided descriptions of the safety risk. We then diagnose the nature of the challenges in the real world, paying particular attention to dimensions of the issue that current frameworks do not adequately address. 1" 2401.10917v1,"Springer Nature 2021 L A TEX template Artificial intelligence to automate the systematic review of scientific literature ∗ José de la Torre-López 1 , Aurora Ramı́rez † 1 and José Raúl Romero 1 1* Dept. Computer Science and Numerical Analysis, University of Córdoba, Rabanales Campus, Córdoba, 14071, Spain. Contributing authors: i82toloj@uco.es; aramirez@uco.es; jrromero@uco.es; Abstract Artificial intelligence (AI) has acquired notorious relevance in modern computing as it effectively solves complex tasks traditionally done by humans. AI provides methods to represent and infer knowledge, efficiently manipulate texts and learn from vast amount of data. These characteristics are applicable in many activities that human find laborious or repetitive, as is the case of the analysis of scientific literature. Manually preparing and writing a systematic literature review (SLR) takes considerable time and effort, since it requires planning a strategy, conducting the literature search and analysis, and reporting the findings. Depending on the area under study, the number of papers retrieved can be of hundreds or thousands, meaning that filtering those relevant ones and extracting the key information becomes a costly and error-prone process. However, some of the involved tasks are repetitive and, therefore, subject to automation by means of AI. In this paper, we present a survey of AI techniques proposed in the last 15 years to help researchers conduct systematic analyses of scientific literature. We describe the tasks currently supported, the types of algorithms applied, and available tools proposed in 34 primary studies. This survey also provides a historical perspective of the evolution of the field and the role that humans can play in an increasingly automated SLR process. Keywords: artificial intelligence, machine learning, systematic literature review, survey ∗ † Published version available at: https://doi.org/10.1007/s00607-023-01181-x Corresponding author 1" 2401.10922v1,"(The following article has been submitted to ""Chaos: An Interdisciplinary Journal of Nonlinear Science"") Chaotic Associative Memory A Chaotic Associative Memory N. Rajagopal Rohan, 1, 2 Sayan Gupta, 2, 3 and V. S. Chakravarthy 1, 3 1) Laboratory of Computational Neuroscience, Bhupat and Jyoti Mehta School of Biosciences and Biotechnology, Indian Institute of Technology Madras, Chennai - 600036, India 2) The Uncertainty Lab, Department of Applied Mechanics, Indian Institute of Technology Madras, Chennai - 600036, India 3) Center for Complex Systems and Dynamics, Indian Institute of Technology Madras, Chennai - 600036, India (*Electronic mail: schakra@ee.iitm.ac.in) (*Electronic mail: sayan@iitm.ac.in) (Dated: 23 January 2024) We propose a novel Chaotic Associative Memory model using a network of chaotic Rossler systems and investigate the storage capacity and retrieval capabilities of this model as a function of increasing periodicity and chaos. In early models of associate memory networks, memories were modeled as fixed points, which may be mathematically convenient but has poor neurobiological plausibility. Since brain dynamics is inherently oscillatory, attempts have been made to construct associative memories using nonlinear oscillatory networks. However, oscillatory associative memories are plagued by the problem of poor storage capacity, though efforts have been made to improve capacity by adding higher order oscillatory modes. The chaotic associative memory proposed here exploits the continuous spectrum of chaotic elements and has higher storage capacity than previously described oscillatory associate memories. In indexed memories used in a computer, the right address has to be known to fetch the corresponding content. Contrasting, in a human or an associative memory, there is no division between the “address” and the “content”: a part of the content can itself serve as an “address.” Thus when the system is cued by an incomplete pattern it retrieves the corresponding complete pattern. In early network models of associative memories, memories were stored as fixed points. Subsequently, in recognition of the incessant oscillatory activity of the brain, oscillatory associative memories have been proposed. However, oscillatory associative memories suffer from the problem of poor storage capacity. Here we describe a chaotic associative memory in which memories are stored as chaotic attractors. The model has higher storage capacity than the previously described oscillatory associative memories. The model is also justified by experimental studies in literature that showed that memories of odors are stored as chaotic attractors in the olfactory bulb. I. INTRODUCTION The idea that attractors of neural dynamics can be interpreted as memories in the brain had paved the way to an important class of memory models - the neural associative memories 1 . An associative memory is a type of memory that is akin to human memory. In contrast to the human memory, a computer memory, which is sometimes described as an indexed memory, is organized as a long of addresses and the corresponding contents. If we wish to retrieve a certain content, we must know the corresponding address like, for example, the call number of a book in a library. In a human memory, on the other hand, there is no separate address and the content. We often store information as a network of items from which items are recalled by associating them with other items. For example when we think of the city of Paris we think of the Eiffel tower and vice versa. There is no separate “address” and “content”. Depending on the context, Paris can be the address (content) and Eiffel toward can be the content (address). Referring to this lack of distinction between the address and the content, associate memories are sometimes referred to as Content Addressable Memories. One of the earliest of such models, proposed by Hopfield 2 , consisted of a network of sigmoid neurons with binary states, in which memories are stored using Hebb’s rule 2 . This mode was subsequently extended to continuous states and continuous time 3 . The aforementioned models serve as pattern-completion systems in which the network takes an incomplete pattern as input and retrieves the corresponding complete pattern i.e., the networks are unidirectional. Kosko 4 generalized such networks to bidirectional associative memories in which there are separate input and output channels, an idea further extended to multidimensional associative memories. The Boltzmann machine is an extension of these models in which there are hidden or invisible neurons in addition to the input/output neurons 5 . The working principle of the models discussed above become apparent when viewed as dynamical systems. These models have certain common features - existence of a Lyapunov or an “energy” function, retrieval dynamics depends on performing gradient descent on the Lyapunov function and memories are therefore local minima of the Lyapunov function, or fixed points of the retrieval dynamics. Hence, the efficacy of any associative memory model is a measure of increasing stability of the fixed points associated to the stored memories. Stability analysis in a more general class of associative memory networks were studied by Cohen and Grossberg 6 ." 2401.10934v1,"A New Creative Generation Pipeline for Click-Through Rate with Stable Diffusion Model Hao Yang Jianxin Yuan Shuai Yang Linhe Xu Shopee Discovery Ads Beijing, China Shopee Discovery Ads Beijing, China Shopee Discovery Ads Beijing, China Shopee Discovery Ads Beijing, China Shuo Yuan Yifan Zeng Shopee Discovery Ads Beijing, China Shopee Discovery Ads Beijing, China ABSTRACT In online advertising scenario, sellers often create multiple creatives to provide comprehensive demonstrations, making it essential to present the most appealing design to maximize the Click-Through Rate (CTR). However, sellers generally struggle to consider users’ preferences for creative design, leading to the relatively lower aesthetics and quantities compared to Artificial Intelligence (AI)-based approaches. Traditional AI-based approaches still face the same problem of not considering user information while having limited aesthetic knowledge from designers. In fact that fusing the user information, the generated creatives can be more attractive because different users may have different preferences. To optimize the results, the generated creatives in traditional methods are then ranked by another module named creative ranking model. The ranking model can predict the CTR score for each creative considering user features. However, the two above stages (generating creatives and ranking creatives) are regarded as two different tasks and are optimized separately. Specifically, generating creatives in the first stage without considering the target of improving CTR task may generate several creatives with poor quality, leading to dilute online impressions and directly making bad effectiveness on online results. In this paper, we proposed a new automated Creative Generation pipeline for Click-Through Rate (CG4CTR) 1 with the goal of improving CTR during the creative generation stage. In this pipeline, a new creative is automatically generated and selected by stable diffusion method with the LoRA model and two novel models: prompt model and reward model. Our contributions have four parts: 1) The inpainting mode in stable diffusion method is firstly applied to creative image generation task in online advertising scene. A self-cyclic generation pipeline is proposed to ensure the convergence of training. 2) Prompt model is designed to generate individualized creative images for different user groups, which can further improve the diversity and quality of the generated 1 The code is at https://github.com/HaoYang0123/Creative_Generation_Pipeline. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference acronym ’XX, June 03–05, 2018, Woodstock, NY © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX creatives. 3) Reward model comprehensively considers the multimodal features of image and text to improve the effectiveness of creative ranking task, and it is also critical in self-cyclic generation pipeline. 4) The significant benefits obtained in online and offline experiments verify the significance of our proposed method. KEYWORDS Stable Diffusion, Creative Generation, Prompt and Reward Models ACM Reference Format: Hao Yang, Jianxin Yuan, Shuai Yang, Linhe Xu, Shuo Yuan, and Yifan Zeng. 2018. A New Creative Generation Pipeline for Click-Through Rate with Stable Diffusion Model. In Proceedings of Make sure to enter the correct conference title from your rights confirmation emai (Conference acronym ’XX). ACM, New York, NY, USA, 10 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Recently, the topic of AI-Generated Content (AIGC) has developed rapidly, such as GLIDE [24], DALL-E 1-3 [31, 36, 45], Imagen [40], Stable Diffusion (SD) [37] and ChatGPT [43]. One of the most representative tasks is text-to-image (T2I) generation, which has received much attention in both academia and industry. The target of T2I task is to generate images with similar semantics given input language prompt. Currently, the diffusion-based methods [18, 23, 37] have become the state-of-the-art (SoTA) method in T2I task due to the stationary training objective and easy scalability. Although these diffusion methods have a satisfactory performance on the T2I task, directly using these methods in creative image generation is infeasible in the advertising scene because they will modify the main product image. Traditional creative generation methods in the advertising scene use deep learning to generate some objects/tags [19, 20], dense captions [32] or layout information [33, 46, 47] on image. Different from these methods, we first use diffusion model to generate background images while keeping the main product information unchanged in creative generation task for the advertising scene. In the experimental analysis, we found that modifying the background while keeping the visual pixels of the main product unchanged can also significantly improve the CTR. In addition, when using the diffusion model, there are two very important factors, prompt and diffusion models, that will directly affect the effect of the generated image. As shown in Fig. 1, for the original product image uploaded by the seller, the background image is simple with solid white color. To make the background more attractive, we can use the inpainting mode in SD method to generate more individualized background images with richer colors. However, if a proper prompt (a prompt consists of several" 2401.10942v1,"Machine Unlearning for Recommendation Systems: An Insight Bhavika Sachdeva ⋆1 , Harshita Rathee *1 , Sristi *1 , Arun Sharma 1 , and Witold Wydmański 2 1 Department of Computer Science and Engineering, Indira Gandhi Delhi Technical University for Women, New Delhi, India bhavika2210@gmail.com, harshita10.17@gmail.com, sristi0108@gmail.com and arunsharma@igdtuw.ac.in 2 Faculty of Mathematics and Computer Science, Jagiellonian University, Kraków, Poland witold.wydmanski@uj.edu.pl Abstract. This review explores machine unlearning (MUL) in recommendation systems, addressing adaptability, personalization, privacy, and bias challenges. Unlike traditional models, MUL dynamically adjusts system knowledge based on shifts in user preferences and ethical considerations. The paper critically examines MUL’s basics, real-world applications, and challenges like algorithmic transparency. It sifts through literature, offering insights into how MUL could transform recommendations, discussing user trust, and suggesting paths for future research in responsible and user-focused artificial intelligence (AI). The document guides researchers through challenges involving the trade-off between personalization and privacy, encouraging contributions to meet practical demands for targeted data removal. Emphasizing MUL’s role in secure and adaptive machine learning, the paper proposes ways to push its boundaries. The novelty of this paper lies in its exploration of the limitations of the methods, which highlights exciting prospects for advancing the field. Keywords: Machine Unlearning · Right to be Forgotten · Recommendation Unlearning · Data Privacy · Machine Learning Security nature of the intersection between machine learning and recommendation systems, marking it as a compelling frontier in the evolving landscape of digital technology. These applications vary from news portals, social media [1], [2], e-commerce platforms to OTT platforms such as Netflix [3]. Random walkbased models, such as Pixie [4], have been successfully employed in large-scale industrial contexts to deliver highly effective personalized recommendations. There are several types of filtering algorithms used like Collaborative filtering, Content based filtering, and matrix factorization. Many of the recommendation systems use hybrid algorithms which combine several recommendation techniques into one. Once created, these recommendation systems have the capacity to retain knowledge from their training data. However, with the ever-growing importance and prevalence of recommendation systems, a challenging concept looms in the background – the need for machine unlearning. As these systems continuously evolve and adapt, there arises a crucial question: how do we effectively mitigate or alter the impacts of prior learning, both within the data repositories and the core ML models that power recommendation systems? MUL is an emerging science that tries to address the complexities associated with undoing or revising the consequences of prior learning, both within the data repositories and the 1 Introduction underlying machine learning models. It arises from the recognition that, in a constantly evolving and privacy-conscious dig- Machine learning (ML) stands as a transformative force, revital landscape, users may require their data to be selectively olutionizing data processing and analysis across diverse doerased or modified, not only to enhance privacy and data semains. Its pervasive impact on our approach to data is particcurity but also to maintain the accuracy and relevance of recularly evident in recommendation systems, a critical subset of ommendations. ML that significantly influences our digital experiences. However, an essential consideration arises in this context Within the intricate realm of recommendation systems, these algorithms are architects of personalized user interac- [5]: throughout the life cycle of recommendation algorithms tions. Operating on sophisticated algorithms and data-driven under examination, instances arise where it becomes imperainsights, these systems are crucial in delivering tailored content tive for the system to selectively discard specific information and product suggestions. Through a nuanced understanding and its complete historical context. of user behaviors and preferences, recommendation systems Given that all these algorithms rely on the premise of recontribute to an enriched online experience by seamlessly in- taining data, a significant and pressing concern associated with tegrating relevant and engaging recommendations. these systems is the potential compromise of user privacy. Re- At the core of this intricate interplay lies the pivotal role of cent studies have brought to light that trained models, in- ML, serving as the backbone that propels the nuanced mechan- cluding recommender systems, large pre-trained models, and ics of recommendation systems. These systems, meticulously fine-tuned natural language models, can inadvertently expose designed to decipher and respond to user preferences and be- sensitive user information. In such cases, users are actively haviors, exemplify the symbiotic relationship between human looking for methods to remove the impact of their sensitive interaction and algorithmic intelligence. The synergy between data from these models. ML and recommendation systems highlights the depth of their Another important rationale for the need for recommenimpact on how we consume and engage with content in the dation unlearning pertains to the system’s utility. Over time, digital realm. continuous data collection is essential for enhancing existing As we delve further into the intricacies of recommendation models. However, some of this newly acquired data can be systems, it becomes apparent that machine learning’s role is harmful, such as tainted data resulting from poisoning attacks not ancillary but foundational. Its integration empowers these or data that diverges from the model’s typical distribution systems to continually evolve and adapt, fine-tuning their rec- (out-of-distribution data) [2]. This subpar data can have a ommendations based on the dynamic landscape of user prefnotable detrimental impact on the effectiveness of recommenerences. This symbiotic relationship underscores the dynamic dations. Once identified, it becomes imperative for the system ⋆ These authors should be considered co-first authors. to expunge such data to restore its usefulness." 2401.10945v1,"1 Automatic dimensionality reduction of Twin-in-the-Loop Observers Giacomo Delcaro, Federico Dettù, Simone Formentin, Senior member, IEEE and Sergio Matteo Savaresi, Senior member, IEEE Abstract—State-of-the-art vehicle dynamics estimation techniques usually share one common drawback: each variable to estimate is computed with an independent, simplified filtering module. These modules run in parallel and need to be calibrated separately. To solve this issue, a unified Twin-in-the-Loop (TiL) Observer architecture has recently been proposed: the classical simplified control-oriented vehicle model in the estimators is replaced by a full-fledged vehicle simulator, or digital twin (DT). The states of the DT are corrected in real time with a linear time invariant output error law. Since the simulator is a black-box, no explicit analytical formulation is available, hence classical filter tuning techniques cannot be used. Due to this reason, Bayesian Optimization will be used to solve a data-driven optimization problem to tune the filter. Due to the complexity of the DT, the optimization problem is high-dimensional. This paper aims to find a procedure to tune the high-complexity observer by lowering its dimensionality. In particular, in this work we will analyze both a supervised and an unsupervised learning approach. The strategies have been validated for speed and yawrate estimation on real-world data. Index Terms—vehicle dynamics, observer design, bayesian optimization, twin-in-the-loop, dimensionality reduction. I. I NTRODUCTION A. Background INCE the 80s, car manufacturers and their tier-one vendors have been developing vehicle dynamics controllers that require unmeasured signals. In light of both physical and economic limitations, the measurement of these signals is impractical; thus, it becomes necessary to develop observers that estimate the missing variables. A thorough review on the topic is presented in [1]: in Table 1 the authors compare 33 state-of-the-art filters, which share one common drawback: they are only able to estimate a subset of states, such as tire forces, tire slip angles, vehicle sideslip and/or vehicle lateral velocity, etc. The adopted models are quite simple, e.g. singletrack model to describe the lateral dynamic or quarter-car model for the vertical one. Due to the lack of one unified full-state filter, many observers are executed in parallel (see Figure 1 in [2]), often running in dedicated ECUs. S In recent times, the computational power available onboard vehicles has increased to the point where we are able to run a multibody vehicle simulator in real-time 1 . We can adopt this virtual vehicle inside state estimators and advanced control architectures, as in the recent works by Riva et al. [3] and The authors are with the Electronics, Computer Science and Bioengineering Department (Dipartimento di Elettronica, Informazione e Bioingegneria), Politecnico di Milano, Milan, Italy (email: giacomo.delcaro@polimi.it) 1 See, e.g., https://www.vi-grade.com/en/products/autohawk. Dettù et al. [4]–[6] and Delcaro et al. [7]. Since the vehicle simulator (or Digital Twin DT) is adopted inside the observer or the control architecture, we will refer to these schemes as Twin-in-the-Loop (TiL) systems. In [3], [5], the authors have already proven that the TiL architecture is able to outperform existing benchmarks on experimental data. B. Motivations In this paper, we will consider the TiL observer scheme, which exploits the DT as the model of the system, and corrects the virtual vehicle’s states in real time in order to track the real car with the simulated one. Key advantages of using such an architecture are: 1) carmakers already use vehicle simulators in order to prototype and develop the vehicle, hence they do not need to develop a different model; 2) all vehicle’s states and variables of interest can be estimated simultaneously with one single observer. This means that a single observer has to be tuned. Due to the intrinsic complexity of the vehicles’ simulator, we have to consider the DT as a black-box model whose inputs are the driver’s commands. This is not the first time a unified observer for the entire vehicle has been put forth: the authors in [8] and [9] propose observers based on full-state white-box vehicle models, corrected in a Kalman-filter-like fashion. Despite being more accurate than the canonical singe-dynamic observers, these filters still lack the fidelity of the simulation-based environment: the DT can easily deal with complex phenomena such as aerodynamic and floor effects, which play a fundamental role for both traction and stability when dealing with highperforming vehicles at high speeds. The white-box approach is alternative to the TiL one, and poses other challenges, such as the tuning of the state and output covariance matrices, which have hundreds of entries. As analyzed in [3], [5] and [7] the main disadvantage of the TiL observer architecture is the black-box nature of the DT: there is no explicit analytical formulation of the model as a dynamic system. Therefore, we cannot adopt classical filter-tuning theory, such as (extended or unscented) Kalman filtering [10]–[12] or sliding-mode-observer tuning [13]. The correction matrix K can be tuned by solving a black-box optimization problem that aims at minimizing the difference between the real and the estimated states. In order to solve the optimization problem with statistical accuracy in spite of a small number of data samples, we will use Bayesian" 2401.10947v1,"Quantum Space-Time Symmetries: A Principle of Minimum Group Representation Diego J. Cirilo-Lombardo M. V. Keldysh Institute of the Russian Academy of Sciences, Federal Research Center-Institute of Applied Mathematics, Miusskaya sq. 4, 125047 Moscow, Russian Federation and CONICET-Universidad de Buenos Aires, Departamento de Fisica, Instituto de Fisica Interdisciplinaria y Aplicada (INFINA), Buenos Aires, Argentina. Norma G. Sanchez International School of Astrophysics Daniel Chalonge - Hector de Vega, CNRS, INSU-Institut National des Sciences de l’Univers, Sorbonne University 75014 Paris, France. Norma.Sanchez@orange.fr https://chalonge-devega.fr/sanchez (Dated: today) 1" 2401.10949v2,"The Synergy Between Optimal Transport Theory and Multi-Agent Reinforcement Learning Ali Baheri 1 and Mykel J. Kochenderfer 2 Abstract— This paper explores the integration of optimal transport (OT) theory with multi-agent reinforcement learning (MARL). This integration uses OT to handle distributions and transportation problems to enhance the efficiency, coordination, and adaptability of MARL. There are five key areas where OT can impact MARL: (1) policy alignment, where OT’s Wasserstein metric is used to align divergent agent strategies towards unified goals; (2) distributed resource management, employing OT to optimize resource allocation among agents; (3) addressing non-stationarity, using OT to adapt to dynamic environmental shifts; (4) scalable multi-agent learning, harnessing OT for decomposing large-scale learning objectives into manageable tasks; and (5) enhancing energy efficiency, applying OT principles to develop sustainable MARL systems. This paper articulates how the synergy between OT and MARL can address scalability issues, optimize resource distribution, align agent policies in cooperative environments, and ensure adaptability in dynamically changing conditions. I. INTRODUCTION Multi-agent reinforcement learning (MARL) is a framework where multiple agents interact, learn, and adapt within shared environments [1]. These interactions, governed by diverse objectives and constraints, present significant challenges related to coordination, resource management, adaptability, and operational efficiency [2]. Optimal transport (OT) theory offers a powerful mathematical framework for comparing and transforming probability distributions in a cost-effective manner [3]. It is concerned with finding the most efficient plan to transport mass from one distribution to another, minimizing a given cost function. OT has found applications across diverse fields due to its ability to provide geometrically and statistically meaningful ways to compare distributions [4]. In this context, the fusion of OT with MARL represents a promising interdisciplinary strategy, designed to harness the strengths of OT in tackling the multifaceted challenges inherent in MARL. Policy Alignment in MARL with OT. We explore how OT, particularly through its Wasserstein distance metric, can be used to minimize the divergence in strategies among agents. This approach promises a more coherent and effective collaborative learning process, ensuring agents’ policies are aligned towards common goals. Distributed Resource Management in MARL with OT. In scenarios where agents must efficiently share limited resources like energy or information, OT provides a principled framework to optimize this distribution. The paper delves 1 Ali Baheri is with the Department of Mechanical engineering at Rochester Institute of Technology. akbeme@rit.edu 2 Mykel J. Kochenderfer is with the Department of Aeronautics & Astronautics at Stanford University. mykel@stanford.edu into how OT can minimize the costs associated with resource allocation, balancing efficiency and equity among agents. Addressing Non-Stationarity in MARL with OT. The dynamic nature of MARL environments, where the ground truth shifts as agents learn and adapt, presents a significant challenge. OT’s ability to adapt to changes in probability distributions is investigated as a method to manage this nonstationarity, enhancing capacity of the agents to respond to evolving environments. Scalable Learning in Large-Scale MARL with OT. As the scale of MARL systems expands, so does the complexity of managing interactions and learning. We propose using OT to decompose global learning objectives into localized tasks, facilitating scalable and efficient learning across large networks of agents. Enhancing Energy Efficiency in MARL with OT. In energy-constrained MARL scenarios, optimizing energy usage is crucial. This paper discusses how OT can be used to develop energy-efficient MARL systems. Contributions. This paper explores how the fusion of OT and MARL can lead to more efficient multi-agent systems. The structure of the paper is as follows: Section II provides an overview of OT. Section III discusses how to integrate OT principles into MARL. Section IV examines the challenges of this integration, addressing potential computational issues. II. O PTIMAL T RANSPORT OT theory, rooted in the works of Gaspard Monge and later Leonid Kantorovich, revolves around finding the most cost-effective way of transporting mass from one distribution to another [3], [5]. Central to OT is the concept of the Wasserstein distance, also known as the Earth Mover’s distance, which quantifies the “effort” required to transform one probability distribution into another. Originating from Monge’s problem in the 18th century, which sought an optimal plan for moving soil with minimum effort, the theory has evolved, especially with Kantorovich’s formulation in the 20th century, to incorporate modern mathematical tools from linear programming and functional analysis [6]. OT has found applications in diverse fields. In economics, it aids in understanding resource allocation and market dynamics [7], [8]; in computer vision and graphics [9], [10], it helps in image retrieval and texture mixing [11], [12]; and in machine learning [13], [14], [15], [16], [17], it is used for domain adaptation and generative modeling. OT theory is concerned with the problem of transporting mass from one distribution to another in the most efficient manner. Formally, given two probability distributions µ and" 2401.10957v1,"Analysis of the nonlinear dynamics of a single pendulum driven by a magnetic field using the magnetic charges interaction model and the experimentally fitted interaction model. B. Nana a,1 , Krystian Polczyński b,2 , P. Woafo b,c,3,∗ , Jan Awrejcewicz b,4 , Grzegorz Wasilewski b,5 a Department of Physics, Higher Teacher Training College, University of Bamenda, PO Box 39 Bamenda, Cameroon b Lodz University of Technology, Department of Automation, Biomechanics, and Mechatronics, 1/15 Stefanowskiego Str., 90-537 Lodz, Poland c Laboratory of Modelling and Simulation in Engineering, Biomimetics and Prototypes, Faculty of Science, University of Yaounde I, PO Box 812 Yaounde, Cameroon Abstract In this work, we analyzed theoretically and experimentally the nonlinear dynamics of a magnetic pendulum driven by a coil-magnet interaction. The force between the magnetic elements and the resulting torque on the pendulum are derived using both the magnetic charges interaction model and the experimentally fitted interaction model. This enables the comparison between the two models. The current in the coil is taken first as a sinusoidal current and then as a square current. The comparison of the structure of each interaction model is conducted and it appears that they give qualitatively similar characteristics. The harmonic balance method is used to approximate the frequency responses of the pendulum leading to both symmetric and asymmetric or one-side (intrawell) oscillations. The two-parameters bifurcation diagrams are plotted showing the different dynamical behaviors considering the current amplitude and frequency as the control parameters. Good agreements are found between our theoretical results and experimental ones. Keywords: magnetic pendulum, magnets interaction potential, bifurcation, chaos 1. Introduction In recent years pendulum systems are extensively analyzed due to a variety of reasons. In fact, pendulum systems are the source of motivation for many discoveries in nonlinear dynamics and other engineering domains [1–11]. Pendulum-like systems have been also used to model biological systems and electrical motors [12, 13]. Results show several complex responses that include bifurcations, chaos, multistability, transient chaos, and hysteresis. Contrary to electronic and electrical circuits, where one has to monitor chaotic behavior on the oscilloscope, pendulum systems allow direct observation of the chaotic motion of the bobs or masses of the system. Being involved in the development of a wave energy converter, the parametrically excited pendulums have significant interest. Parametric excitation is a phenomenon widely encountered in electrical and mechanical dynamical systems. The fundamental characteristics of such systems are that the stiffness coefficients and in some cases the damping parameters are functions of the external excitation. The most common example is a simple pendulum whose pivot executes vertical periodic oscillations [14]. The linear differential equation known as the Mathieu equation that describes the dynamics of such systems has been shown to give rise to unstable response when resonating [15]. Among the parametric systems analyzed in the literature, magnetic pendulums are of higher interest given their numerous applications in engineering. For example, in Ref. [16] was investigated a novel autoparametric pendulum absorber utilizing magnetic forces for enhanced vibration damping. Analytical analyses of axial and ∗ Corresponding author Email addresses: na1bo@yahoo.fr (B. Nana), krystian.polczynski@.p.lodz.pl (Krystian Polczyński), pwoafo1@yahoo.fr (P. Woafo), jan.awrejcewicz@p.lodz.pl (Jan Awrejcewicz), grzegorz.wasilewski@p.lodz.pl (Grzegorz Wasilewski) 1 2 https://orcid.org/0000-0002-1177-6109 3 https://orcid.org/0000-0002-7918-4118 4 https://orcid.org/0000-0003-0387-921X 5 https://orcid.org/0000-0002-5549-2976 Preprint submitted to Mechanical Systems and Signal Processing January 23, 2024" 2401.10961v1,"Positive unlabeled learning for building recommender systems in a parliamentary setting Luis M. de Campos a,∗ , Juan M. Fernández-Luna a , Juan F. Huete a , Luis Redondo-Expósito a a Departamento de Ciencias de la Computación e Inteligencia Artificial, ETSI Informática y de Telecomunicación, CITIC-UGR, Universidad de Granada, 18071, Granada, Spain Abstract Our goal is to learn about the political interests and preferences of the Members of Parliament by mining their parliamentary activity, in order to develop a recommendation/filtering system that, given a stream of documents to be distributed among them, is able to decide which documents should receive each Member of Parliament. We propose to use positive unlabeled learning to tackle this problem, because we only have information about relevant documents (the own interventions of each Member of Parliament in the debates) but not about irrelevant documents, so that we cannot use standard binary classifiers trained with positive and negative examples. We have also developed a new algorithm of this type, which compares favourably with: a) the baseline approach assuming that all the interventions of other Members of Parliament are irrelevant, b) another well-known positive unlabeled learning method and c) an approach based on information retrieval methods that matches documents and legislators’ representations. The experiments have been carried out with data from the regional Andalusian Parliament at Spain. Keywords: positive unlabeled learning, content-based recommender systems, parliamentary documents, k-means, support vector machines 1. Introduction Nowadays we live in the information society, where enterprises, institutions and people in general can easily access to vast amounts of information. Moreover, in many cases users do not need to actively search for the information they need but they play a more passive role and are constantly bombarded with advertising, news, e-mails, etc. The problem is then to separate the chaff from ∗ Corresponding author Email addresses: lci@decsai.ugr.es (Luis M. de Campos), jmfluna@decsai.ugr.es (Juan M. Fernández-Luna), jhg@decsai.ugr.es (Juan F. Huete), luisre@decsai.ugr.es (Luis Redondo-Expósito) Preprint submitted to Elsevier January 23, 2024" 2401.10963v1,"On the selection of the correct number of terms for profile construction: theoretical and empirical analysis Luis M. de Campos a , Juan M. Fernández-Luna a , Juan F. Huete a,∗ a Departamento de Ciencias de la Computación e Inteligencia Artificial, ETSI Informática y de Telecomunicación, CITIC-UGR, Universidad de Granada, 18071, Granada, Spain Abstract In this paper, we examine the problem of building a user profile from a set of documents. This profile will consist of a subset of the most representative terms in the documents that best represent user preferences or interests. Inspired by the discrete concentration theory we have conducted an axiomatic study of seven properties that a selection function should fulfill: the minimum and maximum uncertainty principle, invariant to adding zeros, invariant to scale transformations, principle of nominal increase, transfer principle and the richest get richer inequality. We also present a novel selection function based on the use of similarity metrics, and more specifically the cosine measure which is commonly used in information retrieval, and demonstrate that this verifies six of the properties in addition to a weaker variant of the transfer principle, thereby representing a good selection approach. The theoretical study was complemented with an empirical study to compare the performance of different selection criteria (weight- and unweight-based) using real data in a parliamentary setting. In this study, we analyze the performance of the different functions focusing on the two main factors affecting the selection process: profile size (number of terms) and weight distribution. These profiles are then used in a document filtering task to show that our similaritybased approach performs well in terms not only of recommendation accuracy but also efficiency (we obtain smaller profiles and consequently faster recommendations). Keywords: Content analysis, Term selection, Document-based profiles, Expert search ∗ Corresponding author Email addresses: lci@decsai.ugr.es (Luis M. de Campos), jmfluna@decsai.ugr.es (Juan M. Fernández-Luna), jhg@decsai.ugr.es (Juan F. Huete) Preprint submitted to Information Sciences January 23, 2024" 2401.10969v1,"MacroSwarm: A FIELD-BASED COMPOSITIONAL FRAMEWORK FOR SWARM PROGRAMMING GIANLUCA AGUZZI , ROBERTO CASADEI , AND MIRKO VIROLI Alma Mater Studiorum—Università di Bologna, Cesena, Italy e-mail address: {gianluca.aguzzi, roby.casadei, mirko.viroli}@unibo.it Abstract. Swarm behaviour engineering is an area of research that seeks to investigate methods and techniques for coordinating computation and action within groups of simple agents to achieve complex global goals like pattern formation, collective movement, clustering, and distributed sensing. Despite recent progress in the analysis and engineering of swarms (of drones, robots, vehicles), there is still a need for general design and implementation methods and tools that can be used to define complex swarm behaviour in a principled way. To contribute to this quest, this article proposes a new field-based coordination approach, called MacroSwarm, to design and program swarm behaviour in terms of reusable and fully composable functional blocks embedding collective computation and coordination. Based on the macroprogramming paradigm of aggregate computing, MacroSwarm builds on the idea of expressing each swarm behaviour block as a pure function mapping sensing fields into actuation goal fields, e.g. including movement vectors. In order to demonstrate the expressiveness, compositionality, and practicality of MacroSwarm as a framework for collective intelligence, we perform a variety of simulations covering common patterns of flocking, morphogenesis, and collective decision-making. 1. Introduction Recent technological advances foster a vision of swarms of mobile cyber-physical agents able to compute, coordinate with neighbours, and interact with the environment according to increasingly complex patterns, plans, and goals. Notable examples include swarms of drones and robots [SUSE20], fleets of vehicles [TBH + 19], and crowds of wearable-augmented people [GMH + 18]. In these domains, a prominent research problem is how to effectively engineer swarm behaviour [BFBD13], i.e., how to promote the emergence of desired global-level outcomes with inherent robustness and resiliency to changes and faults in the swarm or the environment. Complex patterns can emerge through the interaction of simple agents [BDT99], and centralised approaches can suffer from scalability and dependability issues: as such, we seek for an approach based on suitable distributed coordination models and languages to steer the micro-level activity of a possibly large set of agents. This direction has been explored by various research threads related to coordination like macroprogramming [Cas23, NW04], spatial computing [BDU + 13], ensemble languages [DNLPT14, AADNL20], field-based coordination [LLM17, MZL04], and aggregate computing [VBD + 19]. Though a number of approaches and languages have been proposed for specifying or programming swarm behaviour [AGL + 07, CNS21, DK18, KHB + 20, KL16, LMPS18, © MacroSwarm: A FIELD-BASED COMPOSITIONAL FRAMEWORK FOR SWARM PROGRAMMING CC ⃝ Creative Commons" 2401.10991v1,"Draft version January 23, 2024 Typeset using L A TEX twocolumn style in AASTeX631 Dust around massive stars is agnostic to galactic environment: New insights from PHAT/BEAST Christina Willecke Lindberg , 1 Claire E. Murray , 2, 1 Julianne J. Dalcanton Karl D. Gordon 2 , 3, 4 J. E. G. Peek , 2, 1 and 1 Johns Hopkins University, 3400 North Charles St., 473 Bloomberg Center for Physics and Astronomy, Baltimore, MD, 21218 2 Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD, 21218 3 Center for Computational Astrophysics, Flatiron Institute, 162 Fifth Ave, New York, NY 10010, USA 4 Department of Astronomy, Box 351580, University of Washington, Seattle, WA 98195 (Accepted December 24, 2023) Submitted to ApJ ABSTRACT Resolving the environments of massive stars is crucial for understanding their formation mechanisms and their impact on galaxy evolution. An important open question is whether massive stars found in diffuse regions outside spiral arms formed in-situ or migrated there after forming in denser environments. To address this question, we use multi-resolution measurements of extinction in the Andromeda Galaxy (M31) to probe the ISM surrounding massive stars across galactic environments. We construct a catalog of 42,107 main-sequence massive star candidates (M ≥ 8M ⊙ ) using resolved stellar photometry from the Panchromatic Hubble Andromeda Treasury (PHAT) program, plus stellar and dust model fits from the Bayesian Extinction and Stellar Tool (BEAST). We quantify galactic environments by computing surrounding stellar densities of massive stars using Kernel Density Estimation. We then compare high-resolution line-of-sight extinction estimates from the BEAST with 25-pc resolution dust maps from PHAT, measuring the total column density distribution of extinction. Our key finding is that, although the average total column density of dust increases with the density of massive stars, the average line-of-sight extinction towards massive stars remains constant across all environments. This suggests that massive stars have a uniform amount of dust in their immediate environment, regardless of their location in the galaxy. One possible explanation for these findings is that small molecular clouds are still capable of forming massive stars, even if they are not resolvable at 25-pc. These results indicate that massive stars are forming in the sparse regions of M31, as opposed to migrating there. Keywords: Stellar populations — Massive stars — Interstellar medium — Interstellar dust —Hubble Space Telescope 1. INTRODUCTION Massive stars are generally thought to form within giant molecular clouds (GMCs) and molecular cloud complexes, where enough star-forming material can coalesce to fully sample the initial mass function (IMF) (Lada & Lada 2003). While observations broadly corroborate this theory, there is still considerable debate regarding Corresponding author: Christina Willecke Lindberg clindbe2@jhu.edu which formation mechanism dominates the formation of massive stars, e.g. competitive accretion (Zinnecker 1982) versus core/monolith collapse (Shu et al. 1987), and thereby what environments are conducive to the formation of massive stars i.e. could massive stars form in relative isolation in less gas-rich environments in galaxies (Lamb et al. 2010)? Knowing where massive stars can form is critical for understanding the evolution of the interstellar medium (ISM) and galaxies. Massive stars are short-lived and highly energetic, emitting feedback into the surrounding ISM. Supernovae have traditionally been viewed as" 2401.11008v1,"1 Helmholtz-Decomposition and Optical Flow: A new method to characterize GCamP recordings Michael Gerstenberger, Dominik Juestel and Silviu Bodea Abstract—During deep sleep and under anaesthesia spontaneous patterns of cortical activation frequently take the form of slow travelling waves. Slow wave sleep is an important cognitive state especially because of its relevance for memory consolidation. However, despite extensive research the exact mechanisms are still ill-understood. Novel methods such as high speed widefield imaging of GCamP activity offer new potentials. Here we show how data recorded from transgenic mice under anesthesia can be processed to analyze sources, sinks and patterns of flow. To make the best possible use of the data novel means of data processing are necessary. Therefore, we (1) give a an brief account on processes that play a role in generating slow waves and demonstrate (2) a novel approach to characterize its patterns in GCamP recordings. While slow waves are highly variable, it shows that some are surprisingly similar. To enable quantitative means of analysis and examine the structure of such prototypical events we propose a novel approach for the characterization of slow waves: The Helmholtz-Decomposition of gradient-based Dense Optical Flow of the pixeldense GCamP contrast (df/f). It allows to detect the sources and sinks of activation and discern them from global patterns of neural flow. Aggregated features can be analyzed with variational autoencoders. The results unravel regularities between slow waves and shows how they relate to the experimental conditions. The approach reveals a complex topology of different features in latent slow wave space and identifies prototypical examples for each stage. Index Terms—Helmholtz-Decomposition, Optical Flow; Slow Waves; Optical Imaging; GCamp Imaging I. I NTRODUCTION While stimulus dependent activity can be observed during wakefulness, spontaneous patterns of activation dominate in stages of deep sleep [1]. Similarly, fast neuronal firing is replaced by slow, traveling waves of activation during anaesthesia [2], [3]. Neocortical slow waves can be captured by fluorescence microscopy of GCaMP activity in transgenic mice with a sampling rate of up to 100Hz. Slow waves represent an important yet highly variable neural phenomenon. Thus methods are required which allow for a systematic measurement of slow wave properties. Previous work that described different types of slow waves relied on manually crafted shape parameters such as the slope of the rising and falling edge of the slow waves in EEG or the spatial extent (local/widespread) of cortical coverage [4]. Some invasive neuroimaging studies have focused on patterns of the spread of activity. For example, the wavefront is measured using delay maps which indicate the temporal offset of an event for every pixel relative to its global onset [3]. Townsend D. Juestel leads the Optoacoustic Lab at the Helmholtz-Center Munich, Germany. S. Bodea is Member of the Westmeyer Lab at TU Munich and M. Gerstenberger was Research Associate at Fraunhofer HHI Berlin, Germany. E-Mail the corresponding author at michael.werner.gerstenberger@gmail.com. Manuscript submitted 12/2023. and Gong [5] suggest an approach to characterize more diverse temporo-spatial properties of slow waves in GCamP recordings by the kernel-based detection of specific patterns in the vector fields of Dense Optical Flow such as spirals or saddles. We considered related methods for structural MRI [6], extend on the idea of an event related slow wave analysis [3] as well as the one of using Optical Flow [5] and suggest a technique that enables a novel perspective on slow waves as events with source- and sink-regions and specific patterns of directional flow: The combination of Helmholtz-Decomposition and Optical Flow for fluorescence microscopy. It allows to measure properties of events that can incorporate several oscillations even if they have a poor signal-to-noise ratio, occur simultaneously and overlap. The procedure aims to describe slow waves by a dense yet interpretable set of features that includes the shape of the spatially averaged df /f , the location of sources and sinks and the direction of flow. To visualize the polymorphism of slow waves and identify prototypical slow waves that are most characteristic for each experimental condition embedding vectors are computed for each event using autoencoders. We test our novel method using a GCamP dataset of mice including six levels of isoflurane. The approach can help in improving our understanding of neural processing in the brain during sleep and under anaesthesia. This paper is structured as follows. In section 2 we briefly explain the mechanisms that generate slow waves during sleep and anaesthesia. Section 3 introduces the approach of using Helmholtz-Decomposition and Optical flow with GCamP data and the results achieved with it are presented in section 4. The last section summarizes and gives a critical discussion on the limitations of the results and the presented approach. II. S LOW -W AVES AND D ELTA O SCILLATIONS A large body of literature addresses slow oscillations in the brain. Slow waves in the delta range (0.5-4 Hz) can be identified in electroencephalograms (EEG) during deep sleep and under anaesthesia. Neurons that switch between up and down states in the respective frequency exist in thalamus and arguably trigger slow waves. Hence, this kind of slow waves is referred to as thalamocortical slow wave [1], [7]. A different type of slow waves that occurs with a frequency below 1Hz has been studied as well[2]: Neocortical slow oscillations. As they do not necessarily occur in regular time intervals they are also referred to as neocortical slow waves here. Note also that the exact frequency depends on the measuring technique. The peak frequency in ECoG tends to be higher as compared to GCamp imaging due to implicit temporal smoothing as a result" 2401.11013v1,"Custom Developer GPT for Ethical AI Solutions Lauren Olson l.a.olson@vu.nl Vrije Universiteit Amsterdam Amsterdam, Netherlands ABSTRACT The main goal of this project is to create a new software artefact: a custom Generative Pre-trained Transformer (GPT) for developers to discuss and solve ethical issues through AI engineering. This conversational agent will provide developers with practical application on (1) how to comply with legal frameworks which regard AI systems (like the EU AI Act [8] and GDPR [11]) and (2) present alternate ethical perspectives to allow developers to understand and incorporate alternate moral positions. In this paper, we provide motivation for the need of such an agent, detail our idea and demonstrate a use case. The use of such a tool can allow practitioners to engineer AI solutions which meet legal requirements and satisfy diverse ethical perspectives. ACM Reference Format: Lauren Olson. 2024. Custom Developer GPT for Ethical AI Solutions. In Proceedings of 3rd International Conference on AI Engineering — Software Engineering for AI (CAIN 2024). ACM, New York, NY, USA, 3 pages. https: //doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Current development strategies contain roles, artefacts, ceremonies, and cultures that focus on business rather than human ethical values [6]. The business focus of these standard practices facilitates the creation of unethical AI software, creating myriad ethical concerns. Ethical concerns, issues regarding the subversion of ethical values, plague software technologies. These concerns include cyberbullying, privacy, and censorship, and have been at the forefront of modern societal struggles. AI plays a predominant role in the propagation of these ethical concerns due to its ubiquity and effectiveness in modern software solutions; therefore, any solution to ameliorate these issues will likely also require AI solutions. Furthermore, when incorporating ethical standards (like GDPR) into AI software, some developers find legal requirements general and difficult to apply consistently [6]. This legal ambiguity also makes it easier for software companies to subvert ethical values while technically following legal requirements [5], leading to continued ethical concerns. As potential solutions, few software tools have been proposed to aid developers in complying with AI legal frameworks: a privacy chatbot [1] and legal compliance API [4]. In our approach, we aim to improve the previously proposed privacy chatbot [1] by Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CAIN 2024, April 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn expanding the ethical concerns addressed by the conversational agent to encompass a wide range of AI-related software ethical issues. In addition, the restricted demography of software practitioners, especially in decision-making roles, narrows the available ethical perspectives and concerns discussed in development processes. Eighty-five percent of software developers are men, and most are white, English-speaking, middle to upper-class men from the USA [2]. The background of these developers drive their perspectives and priorities regarding software development, with studies showing that political affiliations affect design decisions [2]. Therefore, the human values reflected in many software products may reflect only a small portion of the population. Unfortunately, current artefacts for integrating minoritized perspectives into the design practice, like user personas and user journey stories, have received criticism for creating biased, stereotyped views of identities [9]. This lack of proper artefacts, combined with a dearth of user feedback tools for analysis and triangulation in general [7], demonstrate a gap for new, improved artefacts which capture and integrate user perspectives on software, especially minoritized populations’ ethical concerns. As a result, our proposed conversational agent will be trained on real user feedback data collected from minoritized participants. In this paper, we propose a custom Generative Pre-trained Transformer (GPT). GPTs have already become widely popular tools amongst developers, with many companies considering it best practice for practitioners to use when developing software. However, these systems are non-determininstic 1 and contain unknown safeguards and biases. Therefore, will we develop a custom GPT with two critical features: (1) a sizeable knowledge base of data from minoritized groups on their ethical concerns regarding software and (2) deterministic responses to feature-elicitation prompts with AI features which follow legal frameworks and address diverse ethical perspectives. This tool will function within software development processes as both an interactive, data-driven user story and a values translator [6]. As such, it will be used to define value streams and epics, create and prioritize features, and guide sprint planning, design and testing. As a values translator, it will ‘communicate values concepts in a terminology understandable for the development teams [6].’ 2 IMPLEMENTATION To implement our new SE artefact, we will (1) create a high-quality dataset of diverse users’ ethical concerns, (2) discover the inherent LLM biases and trained safeguards of GPT surrounding these ethical conversations, (3) create a GPT customized with the most recent legal and ethical frameworks, our data, and deterministic responses based on our data to users’ top concerns. 1 given the same input, output is not constant" 2401.11022v2,"Formulating or Fixating: Effects of Examples on Problem Solving Vary as a Function of Example Presentation Interface Design JOEL CHAN, College of Information Studies, University of Maryland, USA ZIJIAN DING, College of Information Studies, University of Maryland, USA EESH KAMRAH, Department of Mechanical Engineering, University of Maryland, USA MARK FUGE, Department of Mechanical Engineering, University of Maryland, USA Interactive systems that facilitate exposure to examples can augment problem solving performance. However designers of such systems are often faced with many practical design decisions about how users will interact with examples, with little clear theoretical guidance. To understand how example interaction design choices affect whether/how people benefit from examples, we conducted an experiment where 182 participants worked on a controlled analog to an exploratory creativity task, with access to examples of varying diversity and presentation interfaces. Task performance was worse when examples were presented in a list, compared to contextualized in the exploration space or shown in a dropdown list. Example lists were associated with more fixation, whereas contextualized examples were associated with using examples to formulate a model of the problem space to guide exploration. We discuss implications of these results for a theoretical framework that maps design choices to fundamental psychological mechanisms of creative inspiration from examples. Additional Key Words and Phrases: Creativity, Examples, Interface, Problem Solving ACM Reference Format: Joel Chan, Zijian Ding, Eesh Kamrah, and Mark Fuge. 2023. Formulating or Fixating: Effects of Examples on Problem Solving Vary as a Function of Example Presentation Interface Design. 1, 1 (January 2023), 25 pages. https://doi.org/10.1145/1122445.1122456 1 INTRODUCTION Examples — descriptions or representations of possible solutions (or parts thereof) for the same or related problems [8, 18, 35, 83, 84] — are an integral part of the creative problem solving process. Examples can take many forms, such as previous physical prototypes brought to a brainstorm [33], search results for patents for related problems [25], spoken ideas from collaborators [66], UI designs in an accessible gallery [50]), or references from memory to earth animals or science fiction creatures when inventing new fictional alien creatures [89]). Importantly, examples can substantially shape what ideas come to mind [84, 89]. This ""structuring of imagination"" [89] is sometimes helpful “inspiration"" that leads to more creative ideas [19, 23, 33, 80]. But examples can also have harmful “fixation” effects that constrain novelty and innovation [40, 54, 84, 89] (for recent reviews, see [83] and [18]). Importantly, examples can influence problem solving without conscious effort or recognition [54, 60, 61], and persist in spite of creators’ explicit intentions not to be influenced by them [40, 84, 85]. Perhaps in recognition of these facts, effective creators take an active role Authors’ addresses: Joel Chan, College of Information Studies, University of Maryland, USA; Zijian Ding,, College of Information Studies, University of Maryland, USA; Eesh Kamrah, Department of Mechanical Engineering, University of Maryland, USA; Mark Fuge, Department of Mechanical Engineering, University of Maryland, USA. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. Manuscript submitted to ACM Manuscript submitted to ACM 1" 2401.11029v1,"Optimization of the Context-Free Language Reachability Matrix-Based Algorithm ILIA MURAVEV, Saint Petersburg State University, Russia Various static analysis problems are reformulated as instances of the Context-Free Language Reachability (CFL-r) problem. One promising way to make solving CFL-r more practical for large-scale interprocedural graphs is to reduce CFL-r to linear algebra operations on sparse matrices, as they are efficiently executed on modern hardware. In this work, we present five optimizations for a matrix-based CFL-r algorithm that utilize the specific properties of both the underlying semiring and the widely-used linear algebra library SuiteSparse:GraphBlas. Our experimental results show that these optimizations result in orders of magnitude speedup, with the optimized matrix-based CFL-r algorithm consistently outperforming state-of-the-art CFL-r solvers across four considered static analyses. CCS Concepts: • Theory of computation → Grammars and context-free languages; • Information systems → Query languages for non-relational engines; • Computing methodologies → Massively parallel algorithms; • Software and its engineering → Automated static analysis. Additional Key Words and Phrases: Context-free language reachability, GraphBLAS 1 INTRODUCTION Context-Free Language Reachability (CFL-r) is the problem of finding pairs of vertices in an edgelabeled graph that are connected by a path, with the condition that the labels along this path spell a word from a Context-Free Language (CFL) defined by a given Context-Free Grammar (CFG). A wide range of problems is reduced to CFL-r, including, among others, alias analysis [18], points-to analysis [4], value-flow analysis [13], and fixing compilation errors [17]. Furthermore, CFL-r is also used to approximate solutions for some undecidable problems, for example, points-to analysis that is simultaneously context-, field-, and flow-sensitive [9, 12]. Since Thomas Reps et al. [10] proposed using CFL-r for precise interprocedural dataflow analysis, numerous CFL-r algorithms have been developed [2, 6–8]. One of the promising general-purpose CFL-r algorithms is a matrix-based algorithm by Rustam Azimov et al. [2]. This algorithm naturally utilizes parallel hardware and oftentimes surpasses analogous in terms of performance [1]. However, it still takes a considerable amount of time to deal with paths with deep derivation trees and large CFGs of field- and context-sensitive analyses. In this work, we propose a set of optimizations that improve performance of the matrix-based algorithm in such cases. Our evaluation demonstrates that the optimized version outperforms such tools as POCR [6], Gigascale [4], and Graspan [16]. 2 PRELIMINARIES Definition 2.1 (Weak Chomsky Normal Form (WCNF)). Let 𝐺𝑟 = (𝑁 , Σ, 𝑃, 𝑆) be a CFG, where 𝑁 is a set of non-terminals, Σ is a set of terminals, 𝑃 is a set of productions, and 𝑆 is the starting non-terminal. 𝐺𝑟 is said to be in WCNF if 𝑃 ⊆ {𝑎 → 𝑏 | 𝑎 ∈ 𝑁 , 𝑏 ∈ Σ∪ {𝜀}} ∪ {𝑐 → 𝑎 𝑏 | 𝑎, 𝑏, 𝑐 ∈ 𝑁 }. Definition 2.2 (Reachability Semiring of CFG). Let 𝐺𝑟 = (𝑁 , Σ, 𝑃, 𝑆) be a CFG in WCNF. In this paper, 𝑅 𝐺𝑟 = (2 𝑁 , ∪, ⊗ 𝐺𝑟 , ∅) is called a reachability semiring 1 of 𝐺𝑟 , where 2 𝑁 is the domain, ∪ acts as addition, ⊗ 𝐺𝑟 acts as multiplication, and 𝐴 ⊗ 𝐺𝑟 𝐵 = {𝑐 ∈ 𝑁 | ∃(𝑎, 𝑏) ∈ 𝐴 × 𝐵 ((𝑐 → 𝑎 𝑏) ∈ 𝑃)}. 1 𝑅 𝐺𝑟 is a semiring according to GraphBlas [3], but not according to the common algebraic definition of a semiring. Research advisor: Semyon Grigorev, s.v.grigoriev@spbu.ru. Author’s address: Ilia Muravev, muravjovilya@gmail.com, Saint Petersburg State University, 7/9 University Embankment, St. Petersburg, Russia, 199034." 2401.11033v2,"FAIR E NOUGH : D EVELOP AND A SSESS A FAIR-C OMPLIANT D ATASET FOR L ARGE L ANGUAGE M ODEL T RAINING ? A P REPRINT Shaina Raza ∗ Vector Institute for Artificial Intelligence Toronto, ON, Canada shaina.raza@vectorinstitute.ai Shardul Ghuge Vector Institute for Artificial Intelligence Toronto, ON, Canada shardul.ghuge@mail.utoronto.ca Deval Pandya Vector Institute for Artificial Intelligence Toronto, ON, Canada deval.pandya@vectorinstitute.ai Chen Ding Toronto Metropolitan University Toronto, ON, Canada chen.ding@torontomu.ca January 24, 2024 A BSTRACT The rapid evolution of Large Language Models (LLMs) underscores the critical importance of ethical considerations and data integrity in AI development, emphasizing the role of FAIR (Findable, Accessible, Interoperable, Reusable) data principles. While these principles have long been a cornerstone of ethical data stewardship, their application in LLM training data is less prevalent, an issue our research aims to address. Our study begins with a review of existing literature, highlighting the significance of FAIR principles in data management for model training. Building on this foundation, we introduce a novel framework that incorporates FAIR principles into the LLM training process. A key aspect of this approach is a comprehensive checklist, designed to assist researchers and developers in consistently applying FAIR data principles throughout the model development lifecycle. The practicality and effectiveness of our framework are demonstrated through a case study that involves creating a FAIR-compliant dataset to detect and reduce biases. This case study not only validates the usefulness of our framework but also establishes new benchmarks for more equitable, transparent, and ethical practices in LLM training. We offer this framework to the community as a means to promote technologically advanced, ethically sound, and socially responsible AI models. Keywords Large Language Models, FAIR Principles, Data Management, AI Ethics, Interoperability, Dataset Curation, Bias 1 Introduction In the dynamic realm of artificial intelligence (AI), Language Models (LMs) play a pivotal role in advancing diverse AI applications Jiang et al. (2020). From virtual assistants to content generation, LMs have become indispensable in both shaping the future trajectory of academic research and in their widespread practical applications. The impact of this transformation is further amplified by the advancements of Large Language Models (LLMs) Zhao et al. (2023b), such as OpenAI’s GPT series, Gemini, LLaMa, and Falcon. As of January 2024, LLM development has garnered $18.2 billion in funding and $2.1 billion in revenue, showcasing its substantial economic impact TrendFeedr (2024). The rapid success of LLMs underscores the importance of diverse data for broadening their applicability across different domains. This idea is also well-supported in research Bender et al. (2021); Wang et al. (2023), which affirms the importance of high-quality data in refining these models. The training of these big models on data from diverse sources highlights ∗ Corresponding author. Email: shaina.raza@vectorinstitute.ai" 2401.11035v1,"Image Safeguarding: Reasoning with Conditional Vision Language Model and Obfuscating Unsafe Content Counterfactually Mazal Bethany * 1 2 , Brandon Wherry * 1 2 , Nishant Vishwamitra 1 , Peyman Najafirad 1 2 † University of Texas at San Antonio 2 Secure AI and Autonomy Lab {mazal.bethany, brandon.wherry, nishant.vishwamitra, peyman.najafirad}@utsa.edu 1 Abstract Social media platforms are being increasingly used by malicious actors to share unsafe content, such as images depicting sexual activity, cyberbullying, and self-harm. Consequently, major platforms use artificial intelligence (AI) and human moderation to obfuscate such images to make them safer. Two critical needs for obfuscating unsafe images is that an accurate rationale for obfuscating image regions must be provided, and the sensitive regions should be obfuscated (e.g. blurring) for users’ safety. This process involves addressing two key problems: (1) the reason for obfuscating unsafe images demands the platform to provide an accurate rationale that must be grounded in unsafe imagespecific attributes, and (2) the unsafe regions in the image must be minimally obfuscated while still depicting the safe regions. In this work, we address these key issues by first performing visual reasoning by designing a visual reasoning model (VLM) conditioned on pre-trained unsafe image classifiers to provide an accurate rationale grounded in unsafe image attributes, and then proposing a counterfactual explanation algorithm that minimally identifies and obfuscates unsafe regions for safe viewing, by first utilizing an unsafe image classifier attribution matrix to guide segmentation for a more optimal subregion segmentation followed by an informed greedy search to determine the minimum number of subregions required to modify the classifier’s output based on attribution score. Extensive experiments on uncurated data from social networks emphasize the efficacy of our proposed method. We make our code available at: https://github.com/SecureAIAutonomyLab/ConditionalVLM Introduction Social media is being increasingly misused by bad actors to share sexually explicit, cyberbullying, and self-harm content (Hendricks 2021; Chelmis and Yao 2019; Adler and Chenoa Cooper 2022). However, social media platforms are required by law to safeguard their users against such images (Exon 1996), as well as provide a rationale for why such images are flagged (Gesley 2021; Cabral et al. 2021) for the purpose of transparency. In response, major platforms have deployed AI and human-based content moderation techniques to flag and obfuscate (i.e, make the image safer by blurring sensitive regions) such images (Bethany * These authors contributed equally. † Corresponding author et al. 2023). This process involves obfuscating (e.g. by blurring or blocking) unsafe image regions in the image (Li et al. 2017) along with generating a rationale that backs up the decision to obfuscate the flagged images (Meta 2022). The image obfuscation process faces two critical problems regarding how much of the unsafe image is obfuscated and why it is obfuscated: First, the decision to deem an image unsafe and obfuscate it demands providing a rationale for the decision. For example, Instagram moderators are required to provide a legal rationale (Bronstein 2021; Are 2020) to back up their decision (Tenbarge 2023). Existing visual reasoning methods (Li et al. 2022, 2023; Dai et al. 2023) are severely limited for unsafe images such as sexually explicit, cyberbullying, and self-harm since they cannot provide a rationale grounded in attributes that are specific to such images, such as rude hand gestures in cyberbullying images (Vishwamitra et al. 2021), or sensitive body parts in sexually-explicit images (Binder 2019). Second, the unsafe image needs minimal obfuscation while still depicting the safe regions for evidence collection and investigation (Billy Perrigo 2019). For instance, human moderators need to determine the age of the person in the image (e.g., in child sexual abuse material (CSAM) investigations), look for identifiers (e.g., tattoos, scars, and unique birthmarks), and determine their location information (e.g., landmarks, geographical features, and recognizable surroundings). Current segmentation techniques (Chandrasekaran et al. 2021; Vermeire et al. 2022; Bethany et al. 2023) cannot minimally identify the regions and consequently impede investigations that pertinently need full details of the remaining safe regions. In this work, we take the first step towards addressing a pertinent, but overlooked problem of the image moderation process in social media platforms. Our major objective is to first identify and minimally obfuscate the sensitive regions in an unsafe image such that the safe regions are unaltered to aid an investigation, and then provide an accurate rationale for doing so, that is grounded in unsafe image attributes (e.g., private body parts, rude gestures or hateful symbols). To this end, we address this problem in two steps: (1) we develop a novel unsafe image rationale generation method called ConditionalVLM (i.e., conditional vision language model) that leverages the state-of-the-art large language models (LLM)-based vision language models (Fang et al. 2023) to perform an in-depth conditional inspection to" 2401.11041v1,"Noether Symmetry Analysis of the Klein–Gordon and Wave Equations in Bianchi I Spacetime Ugur Camci ∗ Department of Chemistry and Physics, Roger Williams University, Bristol, Rhode Island 02809, USA (Dated: January 23, 2024) We investigate the Noether symmetries of the Klein–Gordon Lagrangian for Bianchi I spacetime. This is accomplished using a set of new Noether symmetry relations for the Klein–Gordon Lagrangian of Bianchi I spacetime, which reduces to the wave equation in a special case. A detailed Noether symmetry analysis of the Klein–Gordon and the wave equations for Bianchi I spacetime is presented, and the corresponding conservation laws are derived. PACS numbers: 04.20.-q, 11.30.-j, 98.80.-k I. INTRODUCTION A conformal Killing vector (CKV) K has to satisfy £ K g ij = 2 σ(x k )g ij , (1) where g ij is the metric tensor, £ K is the Lie derivative operator along K, and σ(x k ) is a conformal factor. When σ ;ij 6 = 0, the CKV field is said to be proper [1]. The vector field K is called a special conformal Killing vector (SCKV) field if σ ;ij = 0; a homothetic Killing vector (HKV) field if σ , i = 0, e.g., σ is a constant on the manifold; and a Killing vector (KV) field if σ = 0, which is also called the isometry of spacetime. The set of all CKVs (respectively SCKV, HKV, and KV) forms a finite-dimensional Lie algebra. The maximum dimensions of the CKV algebra on the manifold M is fifteen if M is conformally flat, and it is seven if the spacetime is not conformally flat. The physical features of differential equations, in terms of the conservation laws admitted by them, are directly associated with the Noether symmetries, which is facilitated using a Lagrangian of the corresponding dynamical system. As we show in the following section, there is a direct relation between the conformal symmetries and Noether symmetries. If a Lagrangian L for a given dynamical system exhibits symmetry, this property is strongly related to Noether symmetries, which describe the physical characteristics of differential equations associated with a Lagrangian L, in terms of the first integrals they possess [2, 3]. This relationship can be viewed from two different perspectives. First, one can take a strict Noether symmetry approach [4, 5, 6], which results in £ X L = 0, where £ X is the Lie derivative operator along X. On the other hand, one can employ the Noether symmetry approach with a gauge term [7, 8, 9, 10, 11, 12, 13], a generalization of the strict Noether symmetry approach where the Noether symmetry equation includes the gauge term. Noether symmetries with a gauge term are equally valuable in addressing a variety of problems in physics and applied mathematics. In the following section, we will discuss the relationship between Noether symmetries with a gauge term of the Klein–Gordon Lagrangian and the geometric symmetries of spacetimes. The study of differential equations involving geometry is an active area of research. Recent literature [14, 15] has delved into the connection between geometrical structures and conserved quantities. Noether symmetries are directly linked to conserved quantities or conservation laws [3], which naturally emerge in a wide range of applications. The cosmological principle assumes that the universe is homogeneous and isotropic at large scales, and the geometrical model that satisfies these properties is Friedmann–Lemaı̂tre–Robertson–Walker (FLRW) spacetime. However, there has been a suggestion from studies of the cosmic microwave background (CMB) temperature anisotropies that the assumption of statistical isotropy is violated at the largest angular scales, leading to some intriguing anomalies [16]. In order to make predictions for the CMB anisotropies, one can explore cosmological models that are homogeneous but anisotropic, such as the Bianchi-type spacetimes, which encompass both isotropic and homogeneous FLRW models. Bianchi classified all three-dimensional real Lie algebras and demonstrated that there are nine possible simply transitive groups of motions, denoted as G 3 . These groups are generated using Killing vectors K α , where α = 1, 2, 3, γ γ γ with structure constants C αβ , defined by [K α , K β ] = C αβ K γ . The structure constants C αβ can be decomposed into ∗ Electronic address: ucamci@rwu.edu,ugurcamci@gmail.com" 2401.11051v1,"A Comprehensive Approach to Characterize Navigation Instruments for Magnetic Guidance in Biological Systems Peter Blümler 1,* , Fabian Raudzus 2,3,4* , and Friederike Schmid 1 1 University of Mainz, Institute of Physics, 55128 Mainz, Germany 2 Kyoto University, Department of Clinical Application, Center for iPS Cell Research and Application (CiRA), Kyoto, Japan 3 Kyoto University, Neuronal Signaling and Regeneration Unit, Graduate School of Medicine, Kyoto, Japan 4 Kyoto University, Medical Education Center/International Education Section, Graduate School of Medicine, Kyoto, Japan * bluemler@uni-mainz.de, fabian.raudzus@cira.kyoto-u.ac.jp ABSTRACT The non-invasive spatiotemporal control of cellular functions, organization of tissues, and even the behavior of small animals has become paramount for advanced therapies. As magnetic fields do not interact with biological matter, their application is not only suitable for in vitro experiments but also for in vivo applications, even in deep tissues. Particularly, the remote manipulation of paramagnetic entities through magnetic instruments has emerged as a promising approach across various biological contexts. Despite similarities in basic experimental concepts, variations in the properties and descriptions of those magnetic instruments among the authors and studies resulted in a lack of reproducibility and comparability. Therefore, this article addresses the question of how to standardize the characterization of magnetic instruments. Our emphasis lies on the ability of magnetic systems to control the movement of paramagnetic objects such as ferro- or superparamagnetic particles, within organisms. This movement is achieved by exerting a force on magnetic particles by exposing them to a locally varying magnetic field. While it is well-known that the exerted force depends on the spatial variation (i.e. the gradient) of the magnetic field, the magnitude of the field is equally important. However, this second factor is often neglected in the literature. Therefore, we conduct a comprehensive analysis and discussion of both factors. Furthermore, we propose a novel descriptor, termed ‘effective gradient’, which combines both dependencies. To illustrate, we characterize different magnet systems by calculating and comparing the different quantities and relating them to two experiments with different superparamagnetic nanoparticles. Introduction For research, diagnosis, and the application of novel therapies it is often necessary to spatiotemporally control cellular functions, the organization of tissues, or the location of substances remotely. Within living organisms, achieving these goals with minimal interaction with the biological system presents a significant challenge. Unfortunately, common techniques utilizing light or ultrasound face limitations due to the energy transfer to the cells, and depth of tissue penetration. Conversely, techniques based on magnetic fields present an attractive alternative that is gaining popularity. As most biological substances such as organic materials and tissues are diamagnetic or only slightly paramagnetic, they interact very weakly with magnetic fields. Consequently, biological substances can be penetrated non-invasively, and the depth of penetration is just limited by the decay of the magnetic field over distance. On the other hand, objects made from strongly paramagnetic (i.e. superpara-, ferro- or ferrimagnetic) materials, undergo significant magnetization in the presence of magnetic fields. This enables their manipulation by magnetic forces, facilitating remote movement or actuation within larger diamagnetic environments. This fundamental principle is currently harnessed for various biological applications. One notable application is the magnetic guidance of objects through living organisms for diagnostic or therapeutic purposes. This concept can be applied to objects spanning a wide range of sizes, from millimeters (e.g. endoscopes and capsules 1, 2 ), micrometers (e.g. microrobots 3–6 ) to nanometers (nanoparticles). The latter are employed in drug delivery (magnetic drug delivery or targeting 7–9 ), tissue manipulation (by actuation 10 , hyperthermia 11, 12 , or other localized therapies 13, 14 ) at target sites. Furthermore, magnetic guidance can be utilized to move cells 15, 16 , or cellular extensions such as neurites 17, 18 , for applications in tissue engineering and regenerative medicine 19–22 . In this context, the strategy involves incorporating nanoparticles into the cells and subsequently applying force" 2401.11081v1,"Learning from Aggregate responses: Instance Level versus Bag Level Loss Functions Adel Javanmard ∗† , Lin Chen † , Vahab Mirrokni † , Ashwinkumar Badanidiyuru † , Gang Fu † ajavanma@usc.edu, {linche,mirrokni,ashwinkumarbv,thomasfu}@google.com Abstract Due to the rise of privacy concerns, in many practical applications the training data is aggregated before being shared with the learner, in order to protect privacy of users’ sensitive responses. In an aggregate learning framework, the dataset is grouped into bags of samples, where each bag is available only with an aggregate response, providing a summary of individuals’ responses in that bag. In this paper, we study two natural loss functions for learning from aggregate responses: bag-level loss and the instance-level loss. In the former, the model is learnt by minimizing a loss between aggregate responses and aggregate model predictions, while in the latter the model aims to fit individual predictions to the aggregate responses. In this work, we show that the instance-level loss can be perceived as a regularized form of the bag-level loss. This observation lets us compare the two approaches with respect to bias and variance of the resulting estimators, and introduce a novel interpolating estimator which combines the two approaches. For linear regression tasks, we provide a precise characterization of the risk of the interpolating estimator in an asymptotic regime where the size of the training set grows in proportion to the features dimension. Our analysis allows us to theoretically understand the effect of different factors, such as bag size on the model prediction risk. In addition, we propose a mechanism for differentially private learning from aggregate responses and derive the optimal bag size in terms of prediction riskprivacy trade-off. We also carry out thorough experiments to corroborate our theory and show the efficacy of the interpolating estimator. 1 Introduction Machine learning has revolutionized many industries and aspects of our lives, but its widespread use has also raised concerns about privacy. One way to address these concerns is to use aggregate labels, which are labels that are assigned to groups of data points rather than individual data points (Criteo Privacy Preserving ML Competition, 2021). Since even the pre-machine learning age, aggregate labels have been commonly used in group testing, a method of testing that combines samples from various individuals or objects to maximize the use of limited resources (Wein & Zenios, 1996; Sunjaya & Sunjaya, 2020). For example, group testing is used to screen for HIV in donated blood products and to identify viral epidemics such as COVID-19. In recent years, there has been growing interest in using aggregate labels to train machine learning models (Papernot et al., 2016; Al-Rubaie & Chang, 2019; De Cristofaro, 2020). This approach has the potential to preserve privacy while still allowing for the development of accurate and effective models. The SKAdNetwork API from Apple is an example of how aggregate labels can be used to preserve privacy in machine learning (Apple Developer Documentation, 2023). SKAdNetwork provides advertisers with insights into the effectiveness of their ad campaigns without compromising the privacy of their users. This is achieved by using aggregate labels to represent groups of users who have interacted with an ad. For example, an advertiser might see a report that tells them that 10% of users who saw their ad installed their app. However, the advertiser would not be able to see the specific identities of those users. Another example is the Private Aggregation API of ∗ Data Sciences and Operations Department, University of Southern California † Google Research 1" 2401.11105v1,"Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study Triet Huynh Minh Le Xiaoning Du M. Ali Babar CREST - The Centre for Research on Engineering Software Technologies, The University of Adelaide Adelaide, Australia Cyber Security Cooperative Research Centre, Australia triet.h.le@adelaide.edu.au Monash University Melbourne, Victoria, Australia xiaoning.du@monash.edu CREST - The Centre for Research on Engineering Software Technologies, The University of Adelaide Adelaide, Australia Cyber Security Cooperative Research Centre, Australia ali.babar@adelaide.edu.au ABSTRACT Software Repositories (MSR 2024). ACM, New York, NY, USA, 12 pages. https: //doi.org/10.1145/nnnnnnn.nnnnnnn Collecting relevant and high-quality data is integral to the development of effective Software Vulnerability (SV) prediction models. Most of the current SV datasets rely on SV-fixing commits to extract vulnerable functions and lines. However, none of these datasets have considered latent SVs existing between the introduction and fix of the collected SVs. There is also little known about the usefulness of these latent SVs for SV prediction. To bridge these gaps, we conduct a large-scale study on the latent vulnerable functions in two commonly used SV datasets and their utilization for functionlevel and line-level SV predictions. Leveraging the state-of-the-art SZZ algorithm, we identify more than 100k latent vulnerable functions in the studied datasets. We find that these latent functions can increase the number of SVs by 4× on average and correct up to 5k mislabeled functions, yet they have a noise level of around 6%. Despite the noise, we show that the state-of-the-art SV prediction model can significantly benefit from such latent SVs. The improvements are up to 24.5% in the performance (F1-Score) of function-level SV predictions and up to 67% in the effectiveness of localizing vulnerable lines. Overall, our study presents the first promising step toward the use of latent SVs to improve the quality of SV datasets and enhance the performance of SV prediction tasks. 1 INTRODUCTION Software Vulnerabilities (SVs) pose significant risks to the security and reliability of software systems. With the increasing scale, complexity, and number of software applications, the effective detection of SVs has become an urgent need [28]. Learning-based methods have garnered growing attention for automating the SV detection process [27, 45]. Recently, deep learning models have been increasingly used for the task, particularly the identification of potentially vulnerable functions (e.g., [25, 36, 44, 70]). The successful development of these SV prediction models heavily depends on the availability of high-quality SV datasets [19]. There has been an increasing number of datasets of SVs in code functions [46]. One of the most widely used approaches for curating such datasets is to leverage Vulnerability-Fixing Commits (VFCs) and label the code before the fixes as vulnerable [18]. These VFCs are reported on security/SV advisories or can be obtained directly from project repositories on GitHub. However, SVs may have been introduced long before they are fixed and exist across multiple software versions [50]. Between the introduction and fix of a vulnerable function, many other commits may have modified the function without changing its vulnerable part, creating different vulnerable versions of the original function, so-called latent SVs. Unfortunately, current SV datasets have considered/included only vulnerable functions in fixing commits, not in prior commits, and thus, they have overlooked these latent SVs. We posit that latent SVs, though being underutilized in the literature, can benefit the datasets and SV prediction. In other words, they may be the valuable “hidden gems” that can greatly impact the field of SV prediction. Firstly, latent vulnerable functions may be mistakenly labeled as non-vulnerable due to a lack of awareness about latent SVs in existing datasets. The current practice involves collecting functions as non-vulnerable if they were not patched by VFCs (e.g., [22, 70]). Yet, these functions can be actually vulnerable if they contain the vulnerable parts of vulnerable functions fixed in respective VFCs. Using latent SVs can address such mislabeling, which improves the quality of SV datasets as well as the training, optimization, and evaluation of SV prediction models [18]. Secondly, incorporating latent SVs serves as a possible way to increase the overall quantity and the diversity of real-world code patterns of vulnerable functions in an SV dataset. This can lead to a more CCS CONCEPTS • Security and privacy → Software security engineering. KEYWORDS Software vulnerability, Software security, Deep learning, Data quality, SZZ algorithm ACM Reference Format: Triet Huynh Minh Le, Xiaoning Du, and M. Ali Babar. 2024. Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study. In Proceedings of 21st International Conference on Mining Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. MSR 2024, April 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn 1" 2401.11106v1,"′ Study on the mixing of Ξ c and Ξ ′ c by the transition Ξ b → Ξ c ( ) Hong-Wei Ke 1∗ , Gang-Yang Fang 1 and Yan-Liang Shi 2† 1 School of Science, Tianjin University, Tianjin 300072, China 2 Princeton Neuroscience Institute, Princeton University, Princeton, NJ 08544, USA Abstract − 0 − − Recently, the LHCb collaboration has observed the decays Ξ 0 b → Ξ + c D s and Ξ b → Ξ c D s . They measured the relative branching fractions times the ratio of beauty-baryon production cross- Ξ − σ(Ξ 0 ) Ξ 0 σ(Ξ 0 ) σ(Ξ − ) B(Ξ 0 →Ξ + D − ) B(Ξ − →Ξ 0 D − ) sections R( Λ b b ) ≡ σ(Λ b 0 ) × B(Λ 0 b →Λ c + D s − ) and R( Λ b b ) ≡ σ(Λ b 0 ) × B(Λ b 0 →Λ + c D s − ) . Once the ratio σ(Λ b 0 ) b b c s b b c s b σ(Ξ − ) or σ(Λ b 0 ) is known, one can determine the relative branching fractions which can be used to exam b the mixing of Ξ c and Ξ ′ c . In previous literature, Ξ c and Ξ ′ c were assumed to belong to SU(3) F antitriple and sextet, respectively. However, recent experimental measurements such as the ratio Γ(Ξ cc → Ξ c π + )/Γ(Ξ cc → Ξ ′ c π + ) indicate the spin-flavor structures of Ξ c and Ξ ′ c are a mixture of Ξ 3̄ c and Ξ 6 c . The exact value of mixing angle θ is still under debate. In theoretical models, the mixing ( ′ ) angle was fitted to be about 16.27 ◦ ± 2.30 ◦ or 85.54 ◦ ± 2.30 ◦ based on decay channels Ξ cc → Ξ cc . While in lattice calculation, a small angle (1.2 ◦ ± 0.1 ◦ ) is preferred. To address such discrepancy and test the mixing of Ξ c and Ξ ′ c , here we propose the analysis of semileptonic and non-leptonic ′ ′ decays of Ξ b → Ξ c and Ξ b → Ξ c . We calculate the decay rate of Ξ b → Ξ c and Ξ b → Ξ c based on light-front quark model and study the effect of the mixing angle on the ratios of weak decays ′ ′ Ξ b → Ξ c and Ξ b → Ξ c . In particular, we find the transition Ξ b → Ξ c can be an ideal channel to verify the mixing and extract the mixing angle because in theory the decay rate would be extremely tiny without mixing. Our calculation suggests a measurement of Ξ b → Ξ ′ c can be feasible in the near future, which will help to test flavor mixing angle θ and elucidate the mechanism of decay of heavy baryons. PACS numbers: 13.30.-a,12.39.Ki, 14.20.Mr ∗ † khw020056@tju.edu.cn ys6085@princeton.edu 1" 2401.11114v2,"DengueNet: Dengue Prediction using Spatiotemporal Satellite Imagery for Resource-Limited Countries Kuan-Ting Kuo 1 , Dana Moukheiber 2 , Sebastian Cajas Ordonez 3,4 , David Restrepo 2,5 , Atika Rahman Paddo 6 , Tsung-Yu Chen 1 , Lama Moukheiber 2 , Mira Moukheiber 2 , Sulaiman Moukheiber 7 , Saptarshi Purkayastha 6 , Po-Chih Kuo 1 and Leo Anthony Celi 2,3,8 1 National Tsing Hua Unversity, Taiwan 2 Massachusetts Institute of Technology, USA 3 Harvard University, USA 4 University College Dublin, Ireland 5 University of Cauca, Colombia 6 Indiana University – Purdue University Indianapolis, USA 7 Worcester Polytechnic Institute, USA 8 Beth Israel Deaconess Medical Center, USA {mimikuo365, lear1007}@gmail.com, {danamouk, davidres, lamam, miram, lceli}@mit.edu, apaddo@iu.edu, ulsordonez@unicauca.edu.co, swmoukheiber@wpi.edu, saptpurk@iupui.edu, kuopc@cs.nthu.edu.tw Abstract Dengue fever presents a substantial challenge in developing countries where sanitation infrastructure is inadequate. The absence of comprehensive healthcare systems exacerbates the severity of dengue infections, potentially leading to lifethreatening circumstances. Rapid response to dengue outbreaks is also challenging due to limited information exchange and integration. While timely dengue outbreak forecasts have the potential to prevent such outbreaks, the majority of dengue prediction studies have predominantly relied on data that impose significant burdens on individual countries for collection. In this study, our aim is to improve health equity in resourceconstrained countries by exploring the effectiveness of high-resolution satellite imagery as a nontraditional and readily accessible data source. By leveraging the wealth of publicly available and easily obtainable satellite imagery, we present a scalable satellite extraction framework based on Sentinel Hub, a cloud-based computing platform. Furthermore, we introduce DengueNet 1 , an innovative architecture that combines Vision Transformer, Radiomics, and Long Short-term Memory to extract and integrate spatiotemporal features from satellite images. This enables dengue predictions on an epidemiological-week basis. To evaluate the effectiveness of our proposed method, we conducted experiments on five municipalities in Colombia. We utilized a dataset comprising 780 high-resolution Sentinel-2 satellite images for training and eval- 1 https://github.com/mimikuo365/DengueNet-IJCAI uation. The performance of DengueNet was assessed using the mean absolute error (MAE) metric. Across the five municipalities, DengueNet achieved an average MAE of 43.92±42.19. Notably, the highest MAE was recorded in Cali at 113.65±0.08, whereas the lowest MAE was observed in Ibagué, amounting to 5.67±0.18. Our findings strongly support the efficacy of satellite imagery as a valuable resource for dengue prediction, particularly in informing public health policies within low- and middle-income countries. In these countries, where manually collected data of high quality is scarce and dengue virus prevalence is severe, satellite imagery can play a crucial role in improving dengue prevention and control strategies. 1 Introduction Dengue, one of the most ubiquitous mosquito-borne viral infections, is the leading cause of hospitalization and death in many parts of the world, especially in tropical and subtropical countries [Cattarino et al., 2020]. It is estimated that 129 countries [WHO, 2022] and 4 billion people [CDC, 2022] are at risk of dengue infection. In low- and middleincome countries (LMICs) where dengue fever is endemic, the prevalence of dengue outbreaks is exacerbated by multifarious factors such as barriers in the continuum of care, inequities in resource allocation, education levels, literacy, and income[Chaparro et al., 2016]. Because there are no specific treatments available for the virus, dengue prevention is critical to reducing its infectious and fatality rate, particularly in hyperendemic regions in LMICs where dengue poses a significant public health predicament [Gutierrez-Barbosa et al., 2020]. Therefore, the strategic utilization of viable early" 2401.11117v1,"A Finger on the Pulse of Cardiovascular Health: Smartphone Photoplethysmography-Based Pulse Waveform Analysis for Blood Pressure Measurement Ivan Liu 1,2 , Fangyuan Liu 1 , Qi Zhong 2 , Shiguang Ni 3 1 Department of Psychology, Faculty of Arts and Sciences, Beijing Normal University at Zhuhai, Zhuhai, Guangdong, China 2 Faculty of Psychology, Beijing Normal University, Beijing, China 3 Shenzhen International Graduate School, Tsinghua University, Shenzhen, China Corresponding Author: Shiguang Ni 3 University Town of Shenzhen, Nanshan District, Shenzhen, 518055, China Email address: ni.shiguang@sz.tsinghua.edu.cn Abstract:Routine blood pressure (BP) monitoring, crucial for health assessment, faces challenges such as limited access to medical-grade equipment and expertise. Portable cuff BP devices, on the other hand, are cumbersome to carry all day and often cost-prohibitive in less developed countries. Additionally, these sphygmomanometer-based devices can cause discomfort and disrupt blood flow during measurement. Our research explores the possibility of using a smartphone for continuous BP monitoring, aiming to balance accuracy and interpretability. We enhance linear models, traditionally more interpretable, with additional features derived from cardiovascular studies. These models undergo data transformation, normalization, and careful pre-processing to eliminate corrupted data and minimize randomness. For the linear models' results to gain broader acceptance in medical literature, we incorporate Bland-Altman analysis. Conversely, for machine learning models known for their accuracy, we implement SHapley Additive exPlanations (SHAP) to improve interpretability. Data from 125 participants validated the study, showing significant correlations in waveform features between smartphone and reference BP monitoring devices (Bonferroni corrected significance level: 1.8 × 10 −3 ). Cross-validation results from linear regression and random forest models, yielding mean absolute errors (MAE) of 9.86 mmHg for systolic blood pressure (SBP) and 8.01 mmHg for diastolic blood pressure (DBP), and 8.91 mmHg for SBP and 6.68 mmHg for DBP respectively, using waveform-only variables, demonstrated the feasibility of using a smartphone to estimate BP. Although SHAP analysis identified key feature sets, Bland-Altman results did not fully align with the established thresholds of less than 15 mmHg MAE in 84.64% for SBP and 94.69% for DBP, respectively. 1" 2401.11124v1,"EMA-Net: Efficient Multitask Affinity Learning for Dense Scene Predictions Dimitrios Sinodinos 1,2 , Narges Armanfard 1,2 1 McGill University 2 Mila Quebec dimitrios.sinodinos@mail.mcgill.ca, narges.armanfard@mcgill.ca Abstract Multitask learning (MTL) has gained prominence for its ability to jointly predict multiple tasks, achieving better per-task performance while using fewer per-task model parameters than single-task learning. More recently, decoder-focused architectures have considerably improved multitask performance by refining task predictions using the features of other related tasks. However, most of these refinement methods fail to simultaneously capture local and global task-specific representations, as well as cross-task patterns in a parameter-efficient manner. In this paper, we introduce the Efficient Multitask Affinity Learning Network (EMA-Net), which is a lightweight framework that enhances the task refinement capabilities of multitask networks. EMA-Net adeptly captures local, global, and cross-task interactions using our novel Cross- Task Affinity Learning (CTAL) module. The key innovation of CTAL lies in its ability to manipulate task affinity matrices in a manner that is optimally suited to apply parameter-efficient grouped convolutions without worrying about information loss. Our results show that we achieve state-ofthe-art MTL performance for CNN-based decoderfocused models while using substantially fewer model parameters. Our code is publicly available at https://github.com/Armanfard-Lab/EMA-Net. 1 Introduction Modern AI research is rapidly integrating into our daily lives. However, most cutting-edge models are massive and rely on remote access since they cannot be easily deployed on edge devices such as mobile phones, smart accessories, or wearable medical equipment. For many applications, the need for models to operate locally without network dependence highlights the importance of balancing performance with parameter efficiency in model design. In recent years, multitask learning (MTL) [Caruana, 1997] has emerged as a parameter-efficient learning paradigm that can also outperform traditional single-task learning (STL). Generally, MTL involves a single network that can learn multiple tasks by jointly optimizing multiple loss functions. Con- This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. sequently, using a single network means that several layers or features are being shared between tasks. In many dense prediction cases, sharing features across tasks has been proven to improve per-task performance, while using fewer per-task model parameters. This is the result of improved generalization by leveraging domain-specific knowledge between related tasks [Kendall et al., 2018]. The prominent research directions for modern MTL methods explore either the optimization strategy [Chen et al., 2018; Liu et al., 2022; Xin et al., 2022] or the design of the deep multitask architecture [Misra et al., 2016; Gao et al., 2019; Sinodinos and Armanfard, 2022]. Within the vein of deep architecture design, Vandenhende et al. [2022] further fragment the designs into encoder-focused and decoder-focused architectures. As the name suggests, decoder-focused models employ feature-sharing mechanisms within the decoder(s). Specifically, decoder-focused architectures introduce mechanisms to refine task predictions by capturing feature patterns between tasks. An example of a pattern between tasks would be the alignment of segmentation edges with discontinuities in depth values. This refinement process is also called task prediction distillation [Xu et al., 2018]. By capturing these inter-task relationships, decoder-focused architectures consistently achieve state-of-the-art performance in MTL and can be regarded as the prevailing research direction for multitask architecture design. A foundational decoder-focused method, PAP-Net [Zhang et al., 2019], introduces the notion of “task affinity”, which is a measure of similarity between pairs of features for a given task. Specifically, they construct affinity matrices to store the similarity information between every possible pair of features for a given task. The benefit of working with affinity matrices is that they capture long-range dependencies and introduce very few additional model parameters. To perform task prediction distillation, they combine affinity matrices from all tasks using a weighted sum, and then diffuse this similarity information into the features of each initial task prediction. A problem with this approach is that learning a single weight per affinity matrix suggests that all pairwise similarity patterns in the feature space are equally important. However, we hypothesize that cross-task patterns are nuanced and vary in importance throughout the feature space. This simple cross-task mechanism was likely used because processing these matrices can be expensive, especially at larger feature" 2401.11131v1,"Towards a Non-Ideal Methodological Framework for Responsible ML RAMARAVIND KOMMIYA MOTHILAL, University of Toronto, Canada SHION GUHA, University of Toronto, Canada SYED ISHTIAQUE AHMED, University of Toronto, Canada Though ML practitioners increasingly employ various Responsible ML (RML) strategies, their methodological approach in practice is still unclear. In particular, the constraints, assumptions, and choices of practitioners with technical duties–such as developers, engineers, and data scientists—are often implicit, subtle, and under-scrutinized in HCI and related fields. We interviewed 22 technically oriented ML practitioners across seven domains to understand the characteristics of their methodological approaches to RML through the lens of ideal and non-ideal theorizing of fairness. We find that practitioners’ methodological approaches fall along a spectrum of idealization. While they structured their approaches through ideal theorizing, such as by abstracting RML workflow from the inquiry of applicability of ML, they did not pay deliberate attention and systematically documented their non-ideal approaches, such as diagnosing imperfect conditions. We end our paper with a discussion of a new methodological approach, inspired by elements of non-ideal theory, to structure technical practitioners’ RML process and facilitate collaboration with other stakeholders. CCS Concepts: • Human-centered computing → Empirical studies in HCI. Additional Key Words and Phrases: Responsible ML, Fairness, Machine Learning, Justice, Ideal Theory, Non-Ideal Theory, ML Practitioners ACM Reference Format: Ramaravind Kommiya Mothilal, Shion Guha, and Syed Ishtiaque Ahmed. 2018. Towards a Non-Ideal Methodological Framework for Responsible ML. In Woodstock ’18: ACM Symposium on Neural Gaze Detection, June 03–05, 2018, Woodstock, NY . ACM, New York, NY, USA, 26 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Responsible Machine Learning (RML) is increasingly becoming a top priority for organizations, international bodies, state institutions, startups, NGOs, and anyone pursuing ML-informed decision-making [12, 29, 42, 81, 145]. RML is loosely defined such that any step geared towards better ethical design, development, and deployment is formulated as a “responsible” use of ML and allows its association with diverse values such as fairness, transparency, accessibility, privacy, and inclusion [30, 58]. Further, prior research in HCI and related fields often discuss these steps at several levels: from inter-organizational [60, 123], intra-organizational [25, 57, 110, 129], team [48, 67], and individual practitioner levels [51, 111, 155]. Due to this multidimensional pursuit of RML, developing and using ML responsibly is increasingly becoming a multi-stakeholder vocation from a model-centric task. Nonetheless, practitioners with technical duties —such as developers, engineers, data scientists, and researchers—play the central role in data processing, model building, model evaluation, and system monitoring, with support of various kinds from data collectors, data annotators, managers, leaders, domain experts, and any other stakeholder involved in the ML pipeline [6]. While a significant effort has been directed towards algorithmic approaches of technical practitioners, Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2018 Association for Computing Machinery. Manuscript submitted to ACM 1" 2401.11142v1,"Generic Predictions for Primordial Perturbations and their implications Mohit K. Sharma, 1, ∗ M. Sami, 1, 2, 3, † and David F. Mota 4, ‡ 1 Centre For Cosmology and Science Popularization (CCSP), SGT University, Gurugram, Haryana- 122505, India 2 Eurasian International Centre for Theoretical Physics, Astana, Kazakhstan 3 Chinese Academy of Sciences,52 Sanlihe Rd, Xicheng District, Beijing 4 Institute of Theoretical Astrophysics, University of Oslo, P.O. Box 1029 Blindern, N-0315 Oslo, Norway We introduce a novel framework for studying small-scale primordial perturbations and their cosmological implications. The framework uses a deep reinforcement learning to generate scalar power spectrum profiles that are consistent with current observational constraints. The framework is shown to predict the abundance of primordial black holes and the production of secondary induced gravitational waves. We demonstrate that the set up under consideration is capable of generating predictions that are beyond the traditional model-based approaches. I. INTRODUCTION In exploring the origins of gravitational waves and the abundance of primordial black holes within the standard inflationary paradigm, a pivotal question arises: How can we best realize these phenomena in a model-independent manner, and could artificial intelligence (AI) contribute to this pursuit? Since the inflationary paradigm have been successful in explaining the origin of density perturbations, flatness of the universe, and the horizon size, it also holds the possibility of anticipating the production of gravitational waves (GWs) and the dense objects like primordial black holes (PBH) [1–8]. However, the usual way to achieve this involves a lot of careful adjustment in the parameter space, and the need for reverse cosmological modeling to match some of the observational evidence often makes the whole picture quite rigid and less general. In order to alleviate these tight restrictions and explore other possibilities within a given framework, we opt for AI based technique. It may be noted that the AI algorithms have been successful in diverse problem-solving scenarios, their application presents a viable approach to achieve optimal or near-optimal outcomes for the aforementioned inflationary challenges. In order to obtain the outcomes for the standard inflationary scenario, which contains several theoretical constraints, we opt to develop a modelindependent framework capable of accommodating and addressing necessary requirements, such as Cosmic Microwave Background (CMB) constraints [9, 10]. One effective approach to constructing a framework is leveraging the benefits of the dimensionless nature of slow-roll parameters. These parameters not only offer insights into the evolution of the background spacetime but also play a crucial role in determining the amplitude of primordial density fluctuations [11–15]. The framework comprises a large m × n grid structure, ∗ mrmohit254@gmail.com † samijamia@gmail.com ‡ d.f.mota@astro.uio.no representing the entire range of magnitudes the first slowroll parameter can assume. Each transition from one cell to another is treated as a transition in time, effectively determining the second slow-roll parameter at a specific time instance. Being unconstrained from any sort of prerequirements, the framework is capable to make predictions while satisfying the observational constraints. In order to make the predictions, we use the state-of-the-art reinforcement algorithm: Proximal Policy Optimization (PPO) of OpenAI [16]. The main reason to choose this algorithm is its proven track record of being successful in tackling complex problems and its smooth training process. After constructing the framework and completing the training process, the model’s predictions can be evaluated to determine if they exhibit any enhancement in the scalar power spectrum and satisfy the inflationary requirements. In this paper, our primary goal is not only to examine the predictions of the trained model but also to assess if, at the observational level, it reveals evidence that may not be feasible within conventional cosmological models. Given that the trained model generates predictions without imposing constraints on its predictive nature, it is likely to produce results that are more natural. Given its flexible nature, this approach not only enables the prediction of the abundance of primordial black holes (PBHs) and gravitational waves (GWs) generated from the scalar perturbations but also allows to examine their distribution. The paper is organized as follows: (i) We provide a brief explanation of the working principles of reinforcement learning, (ii) We present a detailed discussion on cosmological inflation within a general framework, and discussing the conditions for large density fluctuations, (iii) We give a detailed explanation of our framework, including the pertinent equations employed to analyze various phenomena, (iv) We examine the predictive results derived from our trained model, and (v) We conclude with final remarks." 2401.11147v1,"Nonadiabatic Geometric Quantum Gates with on-Demanded Trajectories Yan Liang 1, 2 and Zheng-Yuan Xue 2, 3, 4, ∗ 1 School of Physical Science and Technology, Guangxi Normal University, Guilin 541004, China Key Laboratory of Atomic and Subatomic Structure and Quantum Control (Ministry of Education), Guangdong Basic Research Center of Excellence for Structure and Fundamental Interactions of Matter, and School of Physics, South China Normal University, Guangzhou 510006, China 3 Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials, Guangdong-Hong Kong Joint Laboratory of Quantum Matter, and Frontier Research Institute for Physics, South China Normal University, Guangzhou 510006, China 4 Hefei National Laboratory, Hefei 230088, China (Dated: January 23, 2024) 2 High-fidelity quantum gates are essential prerequisite for large-scale quantum computation. When manipulating practical quantum systems, environmental and operational induced errors are inevitable, and thus, besides to be fast, operations are more preferable to be intrinsically robust against different errors. Here, we propose a general protocol to construct geometric quantum gates with on demanded trajectory, by modulating the applied pulse shapes that define the system’s evolution trajectory. Our scheme adopts a reverse engineering of the target Hamiltonian by using smooth pulses, which also removes the difficulty of calculating geometric phases for an arbitrary trajectory. Besides, as a certain geometric gate can be induced by various trajectories, we can further optimize the gate performance under different scenarios, and numerical simulations indicate that this optimization can greatly enhance its quality. Therefore, our protocol presents a promising approach for high-fidelity and strong-robust geometric quantum gates for large-scale quantum computation. I. INTRODUCTION Quantum computation is an emerging technology that can succeed in dealing with problems that are hard for classical computers [1]. During the past decades, there are tremendous progress towards practical quantum computation on various physical platforms [2–6]. Recent milestone in the field is that the quantum computational advantage of quantum computers has been successfully demonstrated [7–10]. However, it is still hard to build a practical quantum computer, due to the high overhead of quantum error correction, as gates errors can accumulate and propagate [11], which will quickly fail the quantum computation process. Current efforts are devoted to successfully extend the lifetimes of logical qubits beyond the corresponding physical qubit [12, 13], which proves that quantum error correction codes can benefit quantum information storage and processing. Besides, it is well known that, less resource for quantum error corrections is needed when the used quantum gates have higher fidelity. Therefore, in building a practical quantum computer, high-fidelity quantum gates under practical scenarios are essential. It is well-known that geometric phases are intrinsic robust against the operational errors [14–16], and thus quantum gates induced by geometric phases have built-in fault-tolerance. Besides, to decrease the time of quantum systems exposed in the environment, fast nonadiabatic geometric quantum gates (NGQG) are more preferable [17–19]. During the last twodecades, we have seen great progress in this field [20–33]. However, due to the difficulty of calculating geometric phases for arbitrary trajectories, only specifically loops [20–25], usually constructed by the longitude and latitude lines on the Bloch sphere, are proposed to implement NGQG, with sudden changes of the Hamiltonian parameters. These settings introduce more experimentally requirements in implementing geometric quantum gates, and more unacceptably, they will smear the intrinsic robustness of geometric phases. Here, we address the above obstacles by presenting a general protocol to construct NGQG with on demanded trajectories, by modulating the applied pulse shapes. Our scheme adopts a reverse engineering [34, 35] of the target Hamiltonian using only smooth pulse, avoiding the sudden change of the systems Hamiltonian, which also removes the difficulty of calculating geometric phases. Besides, we can further optimize the gate performance among different trajectories under various scenarios, and numerical simulations versifies its enhancement in the gate quality. Therefore, our protocol presents a promising approach for high-fidelity and strongrobust NGQG for large-scale quantum computation. II. GATE CONSTRUCTION We first proceed to present our scheme of constructing NGQG, using the reverse engineering of the target Hamiltonian. To induce target gates for a quantum two-level system, we choose a set of evolution states |ψ k (t)⟩ = e iγ k (t) |µ k (t)⟩ (k = 1, 2) that satisfy the Schrödinger equation i| ψ̇ k (t)⟩ = H(t)|ψ k (t)⟩, where we have set ℏ = 1 hereafter, γ k (0) = 0 and γ k (t) being the accumulated total phase, and θ(t) iφ(t) |µ 1 (t)⟩ = cos θ(t) |1⟩ 2 |0⟩ + sin 2 e −iφ(t) |µ 2 (t)⟩ = sin θ(t) |0⟩ − cos θ(t) 2 e 2 |1⟩, ∗ zyxue83@163.com (1) are a set of orthogonal auxiliary basis with θ(t) and φ(t) being the time-dependent parameters. We further assume that the" 2401.11185v1,"How the Advent of Ubiquitous Large Language Models both Stymie and Turbocharge Dynamic Adversarial Question Generation Yoo Yeon Sung University of Maryland yysung53@umd.edu Ishani Mondal University of Maryland imondal@umd.edu Abstract Dynamic adversarial question generation, where humans write examples to stump a model, aims to create examples that are realistic and informative. However, the advent of large language models ( LLM s) has been a doubleedged sword for human authors: more people are interested in seeing and pushing the limits of these models, but because the models are so much stronger an opponent, they are harder to defeat. To understand how these models impact adversarial question writing process, we enrich the writing guidance with LLM s and retrieval models for the authors to reason why their questions are not adversarial. While authors could create interesting, challenging adversarial questions, they sometimes resort to tricks that result in poor questions that are ambiguous, subjective, or confusing not just to a computer but also to humans. To address these issues, we propose new metrics and incentives for eliciting good, challenging questions and present a new dataset of adversarially authored questions. 1 Introduction One of the major weaknesses of current QA models come from training crowdsourced datasets including artifacts (Weissenborn et al., 2017; Ettinger et al., 2017; Jia and Liang, 2017). Natural questions (Kwiatkowski et al., 2019) are likewise not immune: they contain idiosyncracies, ambiguities, or false presuppositions (Min et al., 2020, 2022). Thus, recent attempts have focused on dynamically creating adversarial examples to challenge state-ofthe-art models (Nie et al., 2020). Kiela et al. (2021) (DADC 1 ) invites direct human interaction with the models when human authors write questions to stump models (Wallace et al., 2022; Bartolo et al., 2020). However, advent of LLM s makes it difficult for humans to stump QA models not only because the 1 https://dynabench.org/tasks/qa Jordan Boyd-Graber University of Maryland jbg@umiacs.umd.edu Written: “In 1804, what deaf man scratched out the name of a French general born in Corsica? Gold Answer: Beethoven ChatGPT : Bernadotte Adversarial Type: Composing Seen Clues, Domain Expert Knowledge Written: “What 1987 hit song contains a line that rhymes with ketchup?” Gold Answer: Never Gonna Give You Up ChatGPT : ""Faith"" by George Michael Adversarial Type: Commonsense Reasoning Question Quality: Lack Specificity Figure 1: Our IRT analysis exposes what makes for good and poor adversarial questions. The poor questions that had low discriminability but high difficulty (blue) lack specificity despite their adversarialness against CHATGPT (e.g., There are many songs in 1987 containing a line that rhymes with “ketchup”). The questions that had both high discriminability and difficulty (green) met the criterion of being good, adversarial questions. models became knowledgeable but also because the models are more opaque (Raffel et al., 2020; Lewis et al., 2020; Bowman, 2023). These disadvantages of LLMS leave the human authors discouraged and untaught on the groundings of why their questions are not successful in fooling the machines. This paper makes three contributions: an interface for DADC for LLM s for QA (§2 and §4), the" 2401.11194v1,"Mapping the Field of Algorithm Auditing: A Systematic Literature Review Identifying Research Trends, Linguistic and Geographical Disparities ALEKSANDRA URMAN, University of Zurich, Switzerland MYKOLA MAKHORTYKH, University of Bern, Switzerland ANIKO HANNAK, University of Zurich, Switzerland The increasing reliance on complex algorithmic systems by online platforms has sparked a growing need for algorithm auditing, a research methodology evaluating these systems’ functionality and societal impact. In this paper, we systematically review algorithm auditing studies and identify trends in their methodological approaches, the geographic distribution of authors, and the selection of platforms, languages, geographies, and group-based attributes in the focus of auditing research. We present evidence of a significant skew of research focus toward Western contexts, particularly the US, and a disproportionate reliance on English language data. Additionally, our analysis indicates a tendency in algorithm auditing studies to focus on a narrow set of group-based attributes, often operationalized in simplified ways, which might obscure more nuanced aspects of algorithmic bias and discrimination. By conducting this review, we aim to provide a clearer understanding of the current state of the algorithm auditing field and identify gaps that need to be addressed for a more inclusive and representative research landscape. CCS Concepts: • Human-centered computing → Collaborative and social computing; Human computer interaction (HCI); • General and reference → Surveys and overviews. Additional Key Words and Phrases: algorithm auditing, literature review, comparative, linguistic diversity, representation 1 INTRODUCTION The ubiquity of intransparent algorithms adopted by (online) platforms prompted the emergence of a research method- ology known as algorithm(ic) 1 auditing. It allows researchers to evaluate the functionality and/or impact of algorithmic systems and diagnose problems in algorithmic decision-making such as discrimination of social groups or misrepresen- tation of societal phenomena. Though the field is relatively young, it is developing quickly, and in an interdisciplinary manner: while auditing methodology emerged within the Computer Science community, it has by now been adopted by other disciplines such as Social Sciences [49, 112]. The fast-paced and interdisciplinary nature of algorithm auditing make it difficult to keep track of the field and identify main trends in auditing research. Addressing this, [8] conducted the first and, to date, only systematic literature review of algorithm audits, identifying important imbalances in terms of the domains and platforms that are in focus of audit studies. However, other trends in auditing - such as which national and linguistic contexts are in the focus of auditing research - have not been examined before, despite their importance. It is widely recognized that conclusions drawn about the design and performance of technologies in specific contexts do not necessarily generalize to other contexts [81, 94, 125]. In relation to algorithm auditing, for instance, if we find that a certain social media algorithm is more likely to prioritize right-leaning vs left-leaning content in user feeds in the US, this does not automatically mean that the same effect will be observed in, say, a Western European multi-party democracy or in an authoritarian context. This is because even if the algorithms deployed by a platform work exactly 1 Both terms are used in the field to refer to this methodology, we will use ""algorithm auditing"" in this paper for consistency. Authors’ addresses: Aleksandra Urman, urman@ifi.uzh.ch, University of Zurich, Zurich, Switzerland; Mykola Makhortykh, mykola.makhortykh@unibe.ch, University of Bern, Bern, Switzerland; Aniko Hannak, hannak@ifi.uzh.ch, University of Zurich, Zurich, Switzerland. 2024. Manuscript submitted to ACM Manuscript submitted to ACM 1" 2401.11197v1,"INTRODUCING TOAST: SAFE ASYNCHRONOUS MIXED-CHOICE FOR TIMED INTERACTIONS JONAH PEARS a , LAURA BOCCHI a , MAURIZIO MURGIA b , AND ANDY KING a University of Kent, Canterbury, UK e-mail address: jjp38@kent.ac.uk,l.bocchi@kent.ac.uk,a.m.king@kent.ac.uk b Gran Sasso Science Institute, L’Aquila, Italy e-mail address: maurizio.murgia@gssi.it a Abstract. Mixed-choice has long been barred from models of asynchronous communication since it compromises the decidability of key properties of communicating finite-state machines. Session types inherit this restriction, which precludes them from fully modelling timeouts – a core property of web and cloud services. To address this deficiency, we present (binary) Timeout Asynchronous Session Types (TOAST) as an extension to (binary) asynchronous timed session types, that permits mixed-choice. TOAST deploys timing constraints to regulate the use of mixed-choice so as to preserve communication safety. We provide a new behavioural semantics for TOAST which guarantees progress in the presence of mixed-choice. Building upon TOAST, we provide a calculus featuring process timers which is capable of modelling timeouts using a receive-after pattern, much like Erlang, and capture the correspondence with TOAST specifications via a type system for which we prove subject reduction. 1. Introduction Mixed-choice is an inherent feature of models of communications such as communicating finite-state machines (CFSM) [BZ83] where actions are classified as either send or receive. In this setting, a state of a machine is said to be mixed if there exist both a sending action and a receiving action from that state. When considering an asynchronous model of communication, deadlock-freedom is undecidable in general [GMY84] but can be guaranteed in presence of three sufficient and decidable conditions: determinism, compatibility, and absence of mixed-states [GMY84, DY13]. Intuitively, determinism means that it is not possible, from a state, to reach two different states with the same kind of action, and compatibility requires Key words and phrases: Session types · Mixed-choice · Timeouts · π-calculus. This work is an extended version of [PBK23] that was accepted at COORDINATION 2023. This work has been partially supported by EPSRC project EP/T014512/1 (STARDUST) and the BehAPI project funded by the EU H2020 RISE under the Marie Sklodowska-Curie action (No: 778233). We thank Simon Thompson for his insightful comments on an early version of this work. Preprint submitted to Logical Methods in Computer Science © J. Pears, L. Bocchi, M, Murgia, and A. King CC ⃝ Creative Commons" 2401.11203v2,"Obstacle-Aware Navigation of Soft Growing Robots via Deep Reinforcement Learning Haitham El-Hussieny 1 , Ibrahim Hameed 2 Department of Mechatronics and Robotics Engineering, Egypt-Japan University of Science and Technology, Alexandria, Egypt 2 Department of ICT and Natural Sciences, Norwegian University of Science and Technology, 7034 Trondheim, Norway haitham.elhussieny@ejust.edu.eg, ibib@ntnu.no 1 January 24, 2024 Abstract significant challenges for traditional rigid robot designs [1, 2]. Consequently, there is a critical need for innovative materials and locomotion systems in robotics to navigate these challenging environments effectively. Drawing inspiration from biological systems like elephant trunks, octopus tentacles, and snakes, the development of soft continuum robots featuring continuous bending backbones has facilitated non-destructive navigation in congested spaces [3–5]. However, the limited lengths of traditional continuum robots restrict their capacity to explore more distant spaces [6]. Addressing this limitation, the concept of growth mobility, inspired by the way plants grow, has emerged as a groundbreaking approach in robotics. Growing robots, emulating the biological growth of plants, can extend their lengths, volumes, or knowledge, gradually adapting to their environment [7]. These robots, made of soft materials or equipped with flexible joints, can extend to reach faraway spaces while maintaining compliance in confined settings. Prior efforts in designing long, flexible robots suitable for tight spaces include the “Active Hose” by Tsukagoshi et al., a multi-degree-of-freedom robot designed for search and rescue applications [8]. Isaki et al. developed a flexible, extended cable with a camera for exploration in narrow areas [9], and the “Slime Scope,” a pneumatically driven soft arm, was Soft growing robots, are a type of robots that are designed to move and adapt to their environment in a similar way to how plants grow and move with potential applications where they could be used to navigate through tight spaces, dangerous terrain, and hard-toreach areas. This research explores the application of deep reinforcement Q-learning algorithm for facilitating the navigation of the soft growing robots in cluttered environments. The proposed algorithm utilizes the flexibility of the soft robot to adapt and incorporate the interaction between the robot and the environment into the decision-making process. Results from simulations show that the proposed algorithm improves the soft robot’s ability to navigate effectively and efficiently in confined spaces. This study presents a promising approach to addressing the challenges faced by growing robots in particular and soft robots general in planning obstacle-aware paths in real-world scenarios. 1 Introduction The exploration of confined spaces, such as those encountered in Minimally Invasive Surgeries (MIS) or the inspection of archaeological sites, presents 1" 2401.11212v1,"PROGRAMMING DISTRIBUTED COLLECTIVE PROCESSES IN THE EXCHANGE CALCULUS GIORGIO AUDRITO a , ROBERTO CASADEI b , FERRUCCIO DAMIANI GIANLUCA TORTA a , AND MIRKO VIROLI b a , a Università di Torino, Turin, Italy e-mail address: giorgio.audrito@unito.it, ferruccio.damiani@unito.it, gianluca.torta@unito.it b Alma Mater Studiorum—Università di Bologna, Cesena, Italy e-mail address: roby.casadei@unibo.it, mirko.viroli@unibo.it Abstract. Recent trends like the Internet of Things (IoT) suggest a vision of dense and multi-scale deployments of computing devices in nearly all kinds of environments. A prominent engineering challenge revolves around programming the collective adaptive behaviour of such computational ecosystems. This requires abstractions able to capture concepts like ensembles (dynamic groups of cooperating devices) and collective tasks (joint activities carried out by ensembles). In this work, we consider collections of devices interacting with neighbours and that execute in nearly-synchronised sense–compute–interact rounds, where the computation is given by a single program mapping sensing values and incoming messages to output and outcoming messages. To support programming whole computational collectives, we propose the abstraction of a distributed collective process, which can be used to define at once the ensemble formation logic and its collective task. We formalise the abstraction in the eXchange Calculus (XC), a core functional language based on neighbouring values (maps from neighbours to values) where state and interaction is handled through a single primitive, exchange, and provide a corresponding implementation in the FCPP language. Then, we exercise distributed collective processes using two case studies: multi-hop message propagation and distributed monitoring of spatial properties. Finally, we discuss the features of the abstraction and its suitability for different kinds of distributed computing applications. 1. Introduction Programming the collective behaviour of large collections of computing and interacting devices is a major research challenge, promoted by recent trends like the Internet of Things [AIM10] and swarm robotics [BFBD13]. This challenge is investigated and addressed by several related research threads including coordination [GC92, PA98], multi-agent systems [BBHR20], collective adaptive systems [DJW20], macroprogramming [Cas23b, NW04], spatial computing [BDU + 13], field-based coordination [MZ04], aggregate computing [VBD + 19], and attributebased communication [AADNL20]. Key words and phrases: collective computing and collective processes and ensembles and formation control and multi-agent systems and programming languages and self-organisation. Preprint submitted to Logical Methods in Computer Science © G. Audrito, R. Casadei, F. Damiani, G. Torta, and M. Viroli CC ⃝ Creative Commons" 2401.11215v1,"Selecting Walk Schemes for Database Embedding Yuval Lev Lubarsky Jan Tönshoff Technion Haifa, Israel lubarsky@cs.technion.ac.il RWTH Aachen University Aachen, Germany toenshoff@informatik.rwth-aachen.de Martin Grohe Benny Kimelfeld RWTH Aachen University Aachen, Germany grohe@informatik.rwth-aachen.de Technion Haifa, Israel bennyk@cs.technion.ac.il ABSTRACT Machinery for data analysis often requires a numeric representation of the input. Towards that, a common practice is to embed components of structured data into a high-dimensional vector space. We study the embedding of the tuples of a relational database, where existing techniques are often based on optimization tasks over a collection of random walks from the database. The focus of this paper is on the recent FoRWaRD algorithm that is designed for dynamic databases, where walks are sampled by following foreign keys between tuples. Importantly, different walks have different schemas, or “walk schemes,” that are derived by listing the relations and attributes along the walk. Also importantly, different walk schemes describe relationships of different natures in the database. We show that by focusing on a few informative walk schemes, we can obtain tuple embedding significantly faster, while retaining the quality. We define the problem of scheme selection for tuple embedding, devise several approaches and strategies for scheme selection, and conduct a thorough empirical study of the performance over a collection of downstream tasks. Our results confirm that with effective strategies for scheme selection, we can obtain high-quality embeddings considerably (e.g., three times) faster, preserve the extensibility to newly inserted tuples, and even achieve an increase in the precision of some tasks. CCS CONCEPTS • Information systems → Relational database model; • Computing methodologies → Machine learning. KEYWORDS Database embedding, random walks, walk schemes ACM Reference Format: Yuval Lev Lubarsky, Jan Tönshoff, Martin Grohe, and Benny Kimelfeld. 2023. Selecting Walk Schemes for Database Embedding. In Proceedings of the 32nd ACM International Conference on Information and Knowledge Management Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CIKM ’23, October 21–25, 2023, Birmingham, United Kingdom © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0124-5/23/10. . . $15.00 https://doi.org/10.1145/3583780.3615052 (CIKM ’23), October 21–25, 2023, Birmingham, United Kingdom. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/3583780.3615052 1 INTRODUCTION Machine-learning algorithms are conventionally designed to generalize observations about numerical vectors, and hence, their application to non-numeric data requires embeddings of these data into a numerical vector space. The embedding should faithfully reflect the semantics of data in the sense that similar entities are to be mapped to vectors that are close geometrically and vice versa. Instantiations of this practice include models like Word2Vec [17] and BERT (Bidirectional Encoder Representations from Transformers) [9] that map words (or tokens of words) in natural language [15], Node2Vec that maps nodes of a graph [11], TransE [5] that map entities of a knowledge graph, Mol2Vec [14] that maps molecule structures, and EmbDI [6] and FoRWaRD [22] that map database tuples. Database embeddings have enabled the deployment of machine-learning architectures to traditional database tasks such as record similarity [2–4, 12, 13], record linking [10, 19] integration tasks such as schema, token and record matching (entity resolution) [6], and column prediction [22]. The embedded entities are typically either tuples or attribute values. Here we focus on tuple embeddings. Embedding techniques are often based on the analysis of sequences obtained from the data. In word embedding, the data is naturally organized in sequences (e.g., sentences or sliding windows in the text) [9, 17]; in node embedding, the sequences are paths obtained from random walks in the graph [11]; and in tuple embedding, the sequences consist of database components (cells and tuples) that one can reach through natural joins [6] or foreignkey references [22]. The analysis is typically done by learning to predict masked parts of the sequence from other parts of the sequence [6, 9, 11, 17]. We focus on FoRWaRD that is designed for producing stable embeddings in dynamic databases, as we explain next. FoRWaRD analyzes walks, which are sequences of tuples connected via foreign-key references, and it does so differently from masking. Roughly speaking, training aims for the distance between two (vector representations of) tuples to capture the distance between the distributions of values reachable from the tuples through foreign-key references, starting from the corresponding tuples. (We recall the exact definition of FoRWaRD in Section 2.) The FoRWaRD algorithm has been designed to solve the stable embedding problem, where the goal is to infer the embedding of the new tuples without recomputing the embedding over the entire database and without changing the embeddings of existing tuples" 2401.11233v1,"A versatile apparatus for simultaneous trapping of multiple species of ultracold atoms and ions to enable studies of low energy collisions and cold chemistry Bubai Rahaman 1 , Satyabrata Baidya 1 and Sourav Dutta 1, * 1 Tata Institute of Fundamental Research, 1 Homi Bhabha Road, Colaba, Mumbai 400005, India * Author to whom correspondence should be addressed: sourav.dutta@tifr.res.in (Received 20 January 2024) We describe an apparatus where many species of ultracold atoms can be simultaneously trapped and overlapped with many species of ions in a Paul trap. Several design innovations are made to increase the versatility of the apparatus while keeping the size and cost reasonable. We demonstrate the operation of a 3-dimensional (3D) magneto-optical trap (MOT) of 7 Li using a single external cavity diode laser. The 7 Li MOT is loaded from an atomic beam, with atoms slowed using a Zeeman slower designed to work simultaneously for Li and Sr. The operation of a 3D MOT of 133 Cs, loaded from a 2D MOT, is demonstrated and provisions for MOTs of Rb and K in the same vacuum manifold exist. We demonstrate the trapping of 7 Li + and 133 Cs + at different setting of the Paul trap and their detection using an integrated time-of-flight mass spectrometer. We present results on low energy neutral-neutral collisions ( 133 Cs- 133 Cs, 7 Li- 7 Li and 133 Cs- 7 Li collisions) and charge-neutral collisions ( 133 Cs + - 133 Cs and 7 Li + - 7 Li collisions). We show evidence of sympathetic cooling of 7 Li + ( 133 Cs + ) due to collisions with the ultracold 7 Li ( 133 Cs). I. INTRODUCTION Over the last three decades, the fields of cold trapped neutral atoms and trapped ions have individually seen tremendous progress enabling the precise control of the quantum state of these systems. This has intensified the research efforts in precision spectroscopy, quantum simulation, quantum computation and quantum logic spectroscopy [1–7]. Alongside, new directions have evolved which aim to achieve similar level of control in dipolar molecules [8–19] and in hybrid systems consisting of ions and atoms or ions and molecules [20–36]. The trend of studying increasingly complex systems perhaps originates from the “bottom-up” approach to understanding small systems and emergent phenomena. While experiments with hybrid systems as a whole continue to produce trailblazing science, the apparatuses have become more sophisticated, specialized and goaldriven. This approach of course has the advantage of attaining superior performance for a specified scientific objective, but often such an apparatus leaves little room for exploratory and quickly adaptable inquisitive experimental research. As an example, once a research group chooses Cs as the atomic system and builds an apparatus, it is typically very difficult to switch to a different species, say Li, or to address some question that would require one to detect Cs 2 or Cs + . Switching between species can be difficult because of restricted availability of laser sources or the lack of versatility in the vacuum apparatus. In this article, we focus on the latter and report a versatile apparatus that can be used to simultaneously trap and cool several species. This would allow one to quickly switch between species and open up the possibility of combining different species to explore new directions in cold chemistry. As one would expect, such an apparatus has limitations arising from the compromises one needs to make to accommodate different species with widely different properties. It is nevertheless worthwhile to invest in such apparatuses, especially in space-constrained and resource-constrained settings. In our laboratory, some of the planned research directions are: to study the formation of ultracold polar diatomic molecules, use them for studies of the  / dipole-dipole interaction and emulate strongly interacting quantum systems [37,38]; detect the molecules by resonance enhanced multi-photon ionization (REMPI); detect, using REMPI assisted mass spectrometry, the long-lived molecular complexes conjectured to be formed in ultracold molecule-molecule collisions [39]; study collisions between trapped ions and atoms interacting via the − / potential and explore cold charge exchange reactions [20]; study collisions between trapped ions and dipolar molecules interacting via the − / potential and explore the effects of competing dipole-dipole and charge-dipole interactions. Our goal is to build a single apparatus that can be used to address these research directions. In addition to increasing the range of possible questions that can be addressed, a single apparatus allows substantial monitory savings by reducing the number of vacuum pumps, vacuum gauges etc. and economical use of the laboratory space. We do not attempt to achieve the state-of-the-art performance for any of the individual species (e.g. in terms of number of atoms trapped, atomic density or atom loading rate) but rather focus on the versatility, while achieving reasonable performance for all species and maintaining ultra-high vacuum (UHV) conditions with pressure ~10 -11 mbar. We report an apparatus which is designed to trap and laser cool neutral atoms of Li, K, Rb, Cs and Sr as well as trap ions in a Paul trap. We demonstrate the simultaneous and overlapped operation of 3-dimensional (3D) magnetooptical traps (MOTs) of 7 Li and 133 Cs. The 3D MOT of 7 Li is loaded from an atomic beam, with atoms slowed using a Zeeman slower which is designed to work for Sr as well. The 3D MOT of 133 Cs is loaded from a 2D MOT and the same vacuum manifold can be used for 2D MOTs of K and Rb. In the same region of space as the 3D MOTs, positively charged ions can be trapped in a four-rod linear 1" 2401.11243v1,"LRP-QViT: Mixed-Precision Vision Transformer Quantization via Layer-wise Relevance Propagation Navin Ranjan Andreas Savakis Rochester Institute of Technology Rochester, New York 14623, USA nr4325@rit.edu andreas.savakis@rit.edu Abstract Vision transformers (ViTs) have demonstrated remarkable performance across various visual tasks. However, ViT models suffer from substantial computational and memory requirements, making it challenging to deploy them on resource-constrained platforms. Quantization is a popular approach for reducing model size, but most studies mainly focus on equal bit-width quantization for the entire network, resulting in sub-optimal solutions. While there are few works on mixed precision quantization (MPQ) for ViTs, they typically rely on search space-based methods or employ mixed precision arbitrarily. In this paper, we introduce LRP-QViT, an explainability-based method for assigning mixed-precision bit allocations to different layers based on their importance during classification. Specifically, to measure the contribution score of each layer in predicting the target class, we employ the Layer-wise Relevance Propagation (LRP) method. LRP assigns local relevance at the output layer and propagates it through all layers, distributing the relevance until it reaches the input layers. These relevance scores serve as indicators for computing the layer contribution score. Additionally, we have introduced a clipped channel-wise quantization aimed at eliminating outliers from post-LayerNorm activations to alleviate severe inter-channel variations. To validate and assess our approach, we employ LRP-QViT across ViT, DeiT, and Swin transformer models on various datasets. Our experimental findings demonstrate that both our fixed-bit and mixed-bit post-training quantization methods surpass existing models in the context of 4-bit and 6-bit quantization. 1. Introduction Vision Transformers (ViTs) have achieved state-of-the-art (SOTA) performance across various vision tasks, including image classification [13, 28, 42], object detection [4, 32] and segmentation [38, 50]. However, their computational demands, high memory footprint, and significant energy consumption make them impractical for deployment on resource constrained platforms. Compression and acceleration techniques have been investigated for ViTs, aiming to reduce the original network size while maintaining performance. Various approaches for model reduction include network pruning [15, 47], low-rank decomposition [9], quantization [19, 23, 26], knowledge distillation [7, 24], and dynamic token reduction [34, 46]. Model quantization is an effective and popular approach to reduce the model size by converting floating-point parameters into lower-bit representations, but its drawback is an associated drop in performance. Thus, research focused on quantization methods that mitigate the performance drop is of significant importance. Quantization-Aware Training (QAT) involves quantizing model parameters to lower bit precision and retraining on the entire dataset to optimize the quantized model and recover from the performance drop. However, this approach results in significant training costs in time and resources. In contrast, Post Training Quantization (PTQ) is considered an efficient and practical compression technique. It directly quantizes the model without the need for retraining. Instead, it simply uses a small sample of images to calibrate the quantized parameters. Various studies have been conducted using PTQ for ViT quantization [10, 23, 26, 48]. These works have identified several bottleneck components that limit the performance of the quantized model, such as LayerNorm, Softmax and GELU, and proposed PTQ schemes with improvements. However, most of the existing work is based on the premise that all the layers in ViTs contribute equally towards the model output and therefore use equal bit precision for the entire network leading to sub-optimal solutions. Fixed bit quantization forces important layers to be quantized with the same bit precision as the unimportant ones, missing an opportunity to further reduce the model size and enhance performance. Mixed-precision quantization (MPQ) addresses this limitation by allowing different bit precision for different layers. This enables the crucial layer to use" 2401.11248v1,"Drop your Decoder: Pre-training with Bag-of-Word Prediction for Dense Passage Retrieval Guangyuan Ma 1,2 , Xing Wu 1,2 , Zijia Lin 3 , Songlin Hu 1,2 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China 2 School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China 3 Kuaishou Technology, Beijing, China {maguangyuan,wuxing,husonglin}@iie.ac.cn, linzijia07@tsinghua.org.cn ABSTRACT Masked auto-encoder pre-training has emerged as a prevalent technique for initializing and enhancing dense retrieval systems. It generally utilizes additional Transformer decoder blocks to provide sustainable supervision signals and compress contextual information into dense representations. However, the underlying reasons for the effectiveness of such a pre-training technique remain unclear. The usage of additional Transformer-based decoders also incurs significant computational costs. In this study, we aim to shed light on this issue by revealing that masked auto-encoder (MAE) pretraining with enhanced decoding significantly improves the term coverage of input tokens in dense representations, compared to vanilla BERT checkpoints. Building upon this observation, we propose a modification to the traditional MAE by replacing the decoder of a masked auto-encoder with a completely simplified Bag-of-Word prediction task. This modification enables the efficient compression of lexical signals into dense representations through unsupervised pre-training. Remarkably, our proposed method achieves state-ofthe-art retrieval performance on several large-scale retrieval benchmarks without requiring any additional parameters, which provides a 67% training speed-up compared to standard masked auto-encoder pre-training with enhanced decoding. 1 A) Masked Auto-Encoder Pre-training Aircraft made from Traits sheet Decoder CLS [M] wings are [M] [M] aluminum [M] wings SEP Lack of interpretability Additional complexity aluminum Extra GPU memory Encoder CLS Aircraft [M] are made from [M] sheet SEP B) Bag-of-Word Prediction Pre-training Predicting lexicon bags CLS Aircraft made wings are from sheet aluminum Full interpretability Project to vocab dim wings Zero complexity aluminum No extra GPU memory Encoder CLS Aircraft [M] are made from [M] sheet SEP Figure 1: Comparison of Masked Auto-Encoder Pre-training and Bag-of-Word Prediction Pre-training. CCS CONCEPTS • Information systems → Language models. KEYWORDS Dense Retrieval, Masked auto-encoder pre-training, Bag-of-Word prediction 1 INTRODUCTION Dense passage retrieval utilizes pre-trained language models (PLMs), e.g., BERT [1], to encode the lexical information as representations in latent spaces and retrieve relevant passages of a given query based on the similarity search [16, 17]. Pre-training with masked auto-encoder (MAE) has recently become a hot topic to boost the initialization ability of PLMs for downstream retrieval tasks. Such a technique appends carefully designed Transformers-based decoder blocks to the PLM encoder, forming encoder-decoder architecture, and bringing supervision signals to the representations. Recent studies have explored several pre-training strategies, such as pre-training with the weakened decoder [14], extreme mask ratio [12], replace token detection [26], context reconstruction [29], and 1 Our code will be available at https://github.com/ma787639046/bowdpr. multi-task decoding [32]. As is shown in Figure 1 A), these MAE- style pre-trainings commonly preserve several traits: 1) Asymmetric structure: The encoder is a full-sized BERT for generating discriminative representations based on input sentences. While the decoder is typically a shallow Transformers-based block with a few or just one layer. 2) Bottlenecked connection. The connection between the encoder and the decoder is typically a single representation vector. 3) Reconstruction signals. Carefully designed decoding tasks are applied to the decoder side, which decodes context information through auto-encoding [4, 12], auto-regression [14], enhanced decoding [12] or other curated decoding tasks [26, 28, 32]. By optimizing a weak decoder, the lexical information is compressed into the sentence representations, thus providing good initialization ability for retrieval tasks. Notably, enhanced decoding from [12] is proven effective for dense retrieval pre-training, which utilizes sentence representations as query streams and masked context embeddings as content streams. However, we argue that existing MAE-style pre-training paradigms have several drawbacks, which may hinder the development of dense retrieval pre-training: 1) Lack of interpretability. Existing studies focus on creating carefully designed tasks, but still neglect to reveal the underlying reason for why such a pre-training method" 2401.11252v1,"Automated Fusion of Multimodal Electronic Health Records for Better Medical Predictions Suhan Cui 1 , Jiaqi Wang 1 , Yuan Zhong 1 , Han Liu 2 , Ting Wang 3 , Fenglong Ma 1∗ 1 1 Pennsylvania State University, 2 Dalian University of Technology, 3 Stony Brook University {suhan, jqwang, yfz5556, fenglong}@psu.edu, 2 liu.han.dut@gmail.com, 3 twang@cs.stonybrook.edu Abstract The widespread adoption of Electronic Health Record (EHR) systems in healthcare institutes has generated vast amounts of medical data, offering significant opportunities for improving healthcare services through deep learning techniques. However, the complex and diverse modalities and feature structures in real-world EHR data pose great challenges for deep learning model design. To address the multi-modality challenge in EHR data, current approaches primarily rely on hand-crafted model architectures based on intuition and empirical experiences, leading to sub-optimal model architectures and limited performance. Therefore, to automate the process of model design for mining EHR data, we propose a novel neural architecture search (NAS) framework named AutoFM, which can automatically search for the optimal model architectures for encoding diverse input modalities and fusion strategies. We conduct thorough experiments on real-world multi-modal EHR data and prediction tasks, and the results demonstrate that our framework not only achieves significant performance improvement over existing state-of-the-art methods but also discovers meaningful network architectures effectively 1 . Keywords: Electronic Health Records, Neural Architecture Search, Multimodal Fusion 1 Introduction Electronic Health Record (EHR) systems have been extensively adopted in numerous hospitals and healthcare institutions, resulting in the generation of vast amounts of patient EHR data on a daily basis. This data holds significant potential for various predictive tasks, including but not limited to diagnosis prediction [1, 16], medical recommendation [22], health risk prediction [2, 17], and hospital readmission [10]. However, the heterogeneous and multimodal nature of EHR data poses signifi- ∗ Corresponding author. 1 Source code can be found via the link: https://github.com/ cant challenges in the design of effective deep predictive models. Most existing studies [6,19,26,28] primarily focus on the design of hand-crafted model architectures for integrating multimodal EHR data. However, this approach necessitates considerable domain expertise, which may introduce the potential for human bias. To address these concerns, recent research [4, 27] has proposed the utilization of neural architecture search (NAS) techniques [5] to automatically search for suitable architectures for modeling multimodal EHR data, thereby eliminate the need for human intervention. Although these methods demonstrate improved performance compared to hand-crafted approaches, they still encounter certain issues: C1 – Diversifying the Search Space Current approaches [4, 27] typically employ a uniform search space across all modalities when conducting neural architecture search (NAS). However, EHR data encompasses diverse modalities, including tabular demographics, discrete medical codes, continuous monitoring data from ICU stays, and unstructured clinical notes. A uniform search space fails to adequately capture the heterogeneity of these modalities. Furthermore, existing methods primarily utilize simple operations like concatenation and addition within the fusion search space, which may not effectively capture the complex interactions among different EHR modalities. Therefore, it is crucial to explore more suitable search spaces for multimodal feature encoding and fusion that can better accommodate the diverse nature of EHR modalities. C2 – Customizing the Search Optimization Existing approaches utilize either evolutionary NAS [21] or differentiable architecture search (DARTS) [15] to find the optimal architecture within the defined search space. Although DARTS represents a significant efficiency improvement compared to evolutionary NAS, it often encounters issues of robustness [29] and may struggle to identify suitable architectures. Given the complexity of the search space in our specific task, directly SH-Src/AUTOMF Copyright © 2024 by SIAM Unauthorized reproduction of this article is prohibited" 2401.11258v1,"Adaptive Quantum Optimized Centroid Initialization Nicholas R. Allgood Ajinkya Borle University of Maryland Baltimore County Baltimore, Maryland USA allgood1@umbc.edu University of Maryland Baltimore County Baltimore, Maryland USA aborle1@umbc.edu Charles K. Nicholas University of Maryland Baltimore County Baltimore, Maryland USA nicholas@umbc.edu One of the major benefits of quantum computing is the potential to resolve complex computational problems faster than can be done by classical methods. There are many prototype-based clustering methods in use today, and selection of the starting nodes for the center points is often done randomly. For prototype-based clustering algorithms, this could lead to much slower convergence times. One of the causes of this may be prototype-based clustering accepting a local minima as a valid solution when there are possibly better solutions. Quantum computing, specifically quantum annealing, offers a solution to these problems by mapping the initial centroid problem to an Ising Hamiltonian where over time the lowest energy in the spectrum correlates to a valid, but better solution. A first approach to this problem utilizing quantum annealing was known as Quantum Optimized Centroid Initialization (QOCI), but this approach has some limitations both in results and performance. We will present a modification of QOCI known as Adaptive Quantum Optimized Centroid Initialization (AQOCI) which addresses many of the limitations in QOCI. The results presented are comparable to those obtained using classical techniques as well as being superior to those results found using QOCI. 1 Introduction Cluster analysis is the study of grouping related data together for classification and other purposes. There are many types of algorithms to cluster data, but we will be specifically focusing on prototypebased clustering. Prototype-based clustering relies on creating a prototype of what a cluster could look like, and then proceeding to converge until a final cluster is created. All clustering algorithms must start from somewhere, and one of the key differences in prototype-based clustering is they start from a given center point or centroid and proceed to cluster and update the centroid and the surrounding data incrementally. Well-known clustering algorithms such as k-means and k-medoids are prototype-based clustering algorithms and have been used with great success across multiple domains. In a detailed literature review on prototype-based clustering we have found that the largest majority of these algorithms are initialized with a random centroid. Sometimes a random centroid can be ideal but other times it is detrimental to the performance and accuracy of the clustering algorithm. To get the best and most accurate groups of related data, we must have accurate center points to formulate a cluster, whether it be a computed mean or a sample from the data. Many clustering methods employ an iterative verification of the selected center point to confirm it is the best candidate to be the centroid. [10] We could perhaps save some computational overhead if we begin the clustering algorithm with the better possible centroids computed prior to forming the cluster. In classical cases, this would be computationally expensive, more so than using a random process to select the starting nodes. With a superposition Submitted to: QPL 2024 © Allgood, Borle, and Nicholas This work is licensed under the Creative Commons Attribution License." 2401.11284v1,"ORIGINAL RESEARCH Evaluating Driver Readiness in Conditionally Automated Vehicles from Eye-Tracking Data and Head Pose Mostafa Kazemi Mahdi Rezaei Institute for Transport Studies, University of Leeds, Leeds, UK Correspondence Associate Professor Mahdi Rezaei Institute for Transport Studies, University of Leeds, Leeds, LS2 9JT, UK. Email: m.rezaei@leeds.ac.uk Mohsen Azarmi Abstract As automated driving technology advances, the role of the driver to resume control of the vehicle in conditionally automated vehicles becomes increasingly critical. In the SAE Level 3 or partly automated vehicles, the driver needs to be available and ready to intervene when necessary. This makes it essential to evaluate their readiness accurately. This article presents a comprehensive analysis of driver readiness assessment by combining head pose features and eye-tracking data. The study explores the effectiveness of predictive models in evaluating driver readiness, addressing the challenges of dataset limitations and limited ground truth labels. Machine learning techniques, including LSTM architectures, are utilised to model driver readiness based on the Spatio-temporal status of the driver’s head pose and eye gaze. The experiments in this article revealed that a Bidirectional LSTM architecture, combining both feature sets, achieves a mean absolute error of 0.363 on the DMD dataset, demonstrating superior performance in assessing driver readiness. The modular architecture of the proposed model also allows the integration of additional driverspecific features, such as steering wheel activity, enhancing its adaptability and real-world applicability. KEYWORDS Autonomous vehicles, Driver readiness, Head Pose Estimation, Gaze estimation, Eye-tracking understand road and traffic conditions, essentially situational awareness, becomes crucial in determining immediate actions. At this stage, the question arises whether the driver is ready to According to data published by the World Health Organisation take back control of the vehicle. (WHO) [1], over 1.35 million people lose their lives annually Prior to initiating a TOR, it is crucial to gather both internal due to road-related accidents, and millions more suffer severe injuries. Within these unfortunate events, it has been observed and external data regarding the driver’s condition and traffic that 90% of all accidents are attributed to human errors [2]. The context [7] to ensure a secure outcome [8]. This is especially development of technology has given rise to the hope that the important when dealing with take-over procedures necessitated concept of automated driving can address these challenges [3]. by sudden emergencies. Thus, the development of Driver Mon- Removing the driver from the driving process and transferring itoring Systems (DMS) becomes imperative [9]. These systems control of the vehicle to an automated driving function can be should possess the capability to assess the driver’s physical and mental condition and subsequently correlate this data with a step towards eliminating human error in accidents [4]. In L3 conditionally automated driving, the system tem- the specific road scenario [8]. To achieve this objective, the porarily takes the responsibility for steering, acceleration, DMS accumulates baseline metrics for various driver state inand braking, along with the vehicle-related duties, while the dicators, including factors like the driver’s gaze, posture, and driver has the option to engage in Non-Driving Related Tasks physiological measurements [10]. These baseline metrics are (NDRTs) like reading the news, watching a movie, or relaxing then employed to compute a measure of deviation, enabling the in the driver’s seat [5]. However, the human drivers must be system to evaluate the extent of the driver’s readiness. In this paper, we investigated the strengths and weaknesses of prepared to regain control in cases of emergencies, like when the existing models and datasets for assessing driver readiness the system malfunctions and prompts a Take-Over Request in conditionally automated vehicles. Building on this under- (TOR) or when the situation goes beyond the system’s capabilities [6]. During such instances, the ability to perceive and standing, we develop a non-intrusive computer vision-based 1 Page 1–15 INTRODUCTION © 2024 M. Kazemi, M. Rezaei, M. Azarmi 1" 2401.11286v1,"Data repairing and resolution enhancement using data-driven modal decomposition and deep learning Ashton Hetherington a , Daniel Serfaty Bayón b , Adrián Corrochano a , Julio Soria c , Soledad Le Clainche 1a a ETSI Aeronáutica y del Espacio, Universidad Politécnica de Madrid, Plaza Cardenal Cisneros, 3, Madrid, 28040, Spain b Mechanical and Aerospace Engineering Faculty, Technische Universität München, Boltzmannstraße 15, Garching, 85748, Germany c Laboratory for Turbulence Research in Aerospace and Combustion (LTRAC), Department of Mechanical and Aerospace Engineering, Monash University, Melbourne VIC 3800, Australia Abstract This paper introduces a new series of methods which combine modal decomposition algorithms, such as singular value decomposition and high-order singular value decomposition, and deep learning architectures to repair, enhance, and increase the quality and precision of numerical and experimental data. A combination of two- and three-dimensional, numerical and experimental dasasets are used to demonstrate the reconstruction capacity of the presented methods, showing that these methods can be used to reconstruct any type of dataset, showing outstanding results when applied to highly complex data, which is noisy. The combination of benefits of these techniques results in a series of data-driven methods which are capable of repairing and/or enhancing the resolution of a dataset by identifying the underlying physics that define the data, which is incomplete or under-resolved, filtering any existing noise. These methods and the Python codes are included in the first release of ModelFLOWs-app 1 . Keywords: data repairing, resolution enhancement, reduced order model, singular value decomposition, data analysis, data-driven methods, fluid dynamics, deep learning 1 1 Correspondence to: soledad.leclainche@upm.es The website of the software is available at https://modelflows.github.io/modelflowsapp/ Preprint submitted to XXX January 23, 2024" 2401.11289v1,"Seasonality of primary productivity affects coastal species more than its magnitude Carlota Muñiz 1 *, Christopher D. McQuaid 1 , Nicolas Weidberg 1,2 1 Department of Zoology and Entomology, Rhodes University, Grahamstown, 6140, South Africa. 2 present address: Facultade de Ciencias do Mar, Universidade de Vigo, Vigo, 36200, Spain, and Department of Biological Sciences, University of South Carolina, Columbia, 29208, USA. *Corresponding author; e-mail: carlota.fernandezmuniz@gmail.com Abstract While the importance of extreme conditions is recognised, patterns in species’ abundances are often interpreted through average environmental conditions within their distributional range. For marine species with pelagic larvae, temperature and phytoplankton concentration are key variables. Along the south coast of South Africa, conspicuous spatial patterns in recruitment rates and the abundances of different mussel species exist, with focal areas characterized by large populations. We studied 15 years of sea surface temperature (SST) and chlorophyll-a (chl-a) satellite data, using spectral analyses to partition their temporal variability over ecologically relevant time periods, including seasonal (101 to 365 days) and intra-seasonal cycles (20 to 100 days). Adult cover and mussel recruitment were measured at 10 sites along the south coast and regression models showed that about 70% of the variability in recruitment and adult cover was explained by seasonal variability in chl-a, while mean annual chl-a and SST only explained 30% of the recruitment, with no significant effect for adult cover. SST and chl-a at two upwelling centres showed less predictable seasonal cycles during the second half of the study period with a significant cooling trend during austral autumn, coinciding with one of the mussel reproductive peaks. This likely reflects recent changes in the Agulhas Current, 1" 2401.11294v1,"Exponentially slow thermalization and the robustness of Hilbert space fragmentation Yiqiu Han, 1 Xiao Chen, 1 and Ethan Lake 2, ∗ 2 1 Department of Physics, Boston College, Chestnut Hill, MA 02467, USA Department of Physics, University of California Berkeley, Berkeley, CA 94720, USA The phenomenon of Hilbert space fragmentation, whereby dynamical constraints fragment Hilbert space into many disconnected sectors, provides a simple mechanism by which thermalization can be arrested. However, little is known about how thermalization occurs in situations where the constraints are not exact. To study this, we consider a situation in which a fragmented 1d chain with pair-flip constraints is coupled to a thermal bath at its boundary. For product states quenched under Hamiltonian dynamics, we numerically observe an exponentially long thermalization time, manifested in both entanglement dynamics and the relaxation of local observables. To understand this, we study an analogous model of random unitary circuit dynamics, where we rigorously prove that the thermalization time scales exponentially with system size. Slow thermalization in this model is shown to be a consequence of strong bottlenecks in configuration space, demonstrating a new way of producing anomalously slow thermalization dynamics. Introduction: A central theme in quantum dynamics is the understanding of mechanisms which impede or arrest thermalization [1–5]. Many such mechanisms, most prominently many body localization [6, 7], rely crucially on some form of spatial disorder. A recent body of work has demonstrated that even without recourse to strong disorder, the imposition of certain dynamical constraints can be rigorously shown to prevent thermalization [8–22]. In these systems, thermalization is evaded by virtue of the dynamics being non-ergodic, with the space of product states splitting into exponentially many dynamicallydisconnected “fragments”, in a phenomenon known as Hilbert space fragmentation (HSF). Unfortunately, this from of ergodicity breaking relies on fine-tuning the dynamics to ensure that the dynamical constraints leading to HSF are exactly obeyed. What happens when the constraints are weakly broken is a relatively unexplored question, despite the fact that many experimental systems are close to fine-tuned points where the constraints are exact [23–29]. A natural question thus remains: how does the structure of HSF imprint itself on thermalization dynamics once its associated constraints are broken? In particular, can there exist models of constrained dynamics which display anomalous thermalization even in the presence of constraint-breaking, ergodicity-restoring perturbations? In this work, we answer this question affirmatively by studying what happens when a 1d spin chain with “pairflip” constraints is connected at its end to a chain undergoing generic unconstrained dynamics (Fig. 1 a). The coupling to the unconstrained system can be veiwed as a coupling to a thermal bath, and it renders the dynamics fully ergodic. Naively, one might expect the bath to initiate a thermalizing “avalanche” that spreads out and thermalizes the constrained region on the time scale needed for the influence of the bath to be felt across the system, viz. on a time of order L cons , where L cons is the size of the ∗ Electronic address: elake@berkeley.edu constrained region. We show that this intuition is in fact false, and that the thermalization time t th instead scales exponentially in L cons . This slowness is due to strong bottlenecks that the system encounters as it tries to explore Hilbert space, a phenomenon which arises from the type of constraints and the local nature of the coupling to the bath. We rigorously prove an exponentially large lower bound on t th in the setting where the system undergoes a constrained form of random unitary (RU) dynamics, and provide numerical evidence that t th for Hamiltonian dynamics is similarly long. Remarkably, the long approach to equilibrium can be diagnosed simply by measuring expectation values of certain local operators, which take exponentially long to reach their steady-state values. Slow thermalization in the pair-flip model: We begin by studying Hamiltonian dynamics. We consider a spin- (N − 1)/2 model of the form H = H 0 + H imp . Here the constrained Hamiltonian H 0 takes the form H 0 = N L−1 X X i=1 a,b=1 g i a,b |aa⟩⟨bb| i,i+1 , (1) with g i arbitrary N ×N Hermitian matrices. The “impurity” Hamiltonian H imp acts to break the constraints on sites L cons < i ≤ L, with L cons the size of the constrained region. H 0 only flips neighboring spins with identical values. As a result, it preserves the U (1) charges X Q a ≡ (−1) i |a⟩⟨a| i . (2) i When N > 2, which we will specify to unless explicitly noted otherwise, H 0 additionally possesses an exponentially large number of non-local conserved quantities [30]. Among these are the N (N − 1) L−1 “frozen” states of the form |a 1 , . . . , a L ⟩, a i ̸ = a i+1 , which are annihilated by H 0 . We will denote the space spanned by these states as H froz . To numerically study the robustness of the constrained dynamics with respect to H imp , we investigate quantum quenches performed on initial states in H froz . For" 2401.11305v1,"Progress in Privacy Protection: A Review of Privacy Preserving Techniques in Recommender Systems, Edge Computing, and Cloud Computing Syed Raza Bashir ∗ , Shaina Raza † , Vojislav Misic ‡ January 23, 2024 Abstract As digital technology evolves, the increasing use of connected devices brings both challenges and opportunities in the areas of mobile crowdsourcing, edge computing, and recommender systems. This survey focuses on these dynamic fields, emphasizing the critical need for privacy protection in our increasingly data-oriented world. It explores the latest trends in these interconnected areas, with a special emphasis on privacy and data security. Our method involves an in-depth analysis of various academic works, which helps us to gain a comprehensive understanding of these sectors and their shifting focus towards privacy concerns. We present new insights and marks a significant advancement in addressing privacy issues within these technologies. The survey is a valuable resource for researchers, industry practitioners, and policy makers, offering an extensive overview of these fields and their related privacy challenges, catering to a wide audience in the modern digital era. Keywords: Privacy; Security; Edge Computing, Location, Cloud Computing, Recommender Systems, Large Language Models. 1 Introduction The digital age is marked by an extraordinary growth in connected devices, leading to a massive influx of data through the Internet [12]. This data is primarily managed by cloud infrastructures. The proliferation of smart devices such as smartphones, tablets, smartwatches, and fitness trackers has transformed them into essential aspects of daily life [8]. These devices accumulate extensive contextual information about users, encompassing their location, activities, and environmental conditions [5]. This information is crucial for applications in predicting user behavior and providing personalized experiences. Mobile crowdsourcing has emerged as a significant phenomenon, where individuals collectively contribute data through various digital channels [32]. Applications in this domain, like traffic monitoring systems, utilize crowd-sourced data to offer real-time insights. However, the process often raises concerns about the privacy of individual contributors. The transparency in data usage and the potential risk of sensitive information being accessed by unauthorized entities are issues that need addressing [11, 26]. ∗ Toronto Metropolitan University; syedraza.bashir@torontomu.ca † University of Toronto; shaina.raza@utoronto.ca ‡ Toronto Metropolitan University; vmisic@cs.torontomu.ca 1" 2401.11313v1,"SUBMITTED TO THE IEEE JOURNAL OF OCEANIC ENGINEERING DISTRIBUTION A 1 Weakly-Supervised Semantic Segmentation of Circular-Scan, Synthetic-Aperture-Sonar Imagery Isaac J. Sledge, Member, IEEE, Dominic M. Byrne, Member, IEEE Jonathan L. King, Member, IEEE, Steven H. Ostertag, Member, IEEE, Denton L. Woods, Member, IEEE, James L. Prater, Member, IEEE, Jermaine L. Kennedy, Member, IEEE, Timothy M. Marston, Member, IEEE, and José C. Prı́ncipe, Life Fellow, IEEE Abstract —We propose a weakly-supervised framework for the semantic segmentation of circularscan synthetic-aperture-sonar (CSAS) imagery. The first part of our framework is trained in a supervised manner, on image-level labels, to uncover a set of semi-sparse, spatially-discriminative regions in each image. The classification uncertainty of each region is then evaluated. Those areas with the lowest uncertainties are then chosen to be weakly labeled segmentation seeds, at the pixel level, for the second part of the framework. Each of the seed extents are progressively resized according to an unsupervised, informationtheoretic loss with structured-prediction regularizers. This reshaping process uses multi-scale, adaptivelyweighted features to delineate class-specific transitions in local image content. Content-addressable memories are inserted at various parts of our framework so that it can leverage features from previously seen images to improve segmentation performance for related images. We evaluate our weakly-supervised framework using real-world CSAS imagery that contains over ten seafloor classes and ten target classes. We show that our framework performs comparably to nine fullysupervised deep networks. Our framework also outperforms eleven of the best weakly-supervised deep networks. We achieve state-of-the-art performance when pre-training on natural imagery. The average absolute performance gap to the next-best weakly-supervised network is well over ten percent for both natural imagery and sonar imagery. This gap is found to be statistically significant. Index Terms —Seabed segmentation, seabed classification, semantic segmentation, imaging sonar, convolutional networks, deep learning 1. Introduction The localization and classification of targets in sonar-derived imagery is crucial in many problems. Both processes can, however, be challenging to automate in a robust manner. Automation challenges arise because there is a strong functional relationship between seabed characteristics and the ability to both detect and label targets on the seafloor. Underwater environments with seafloor features like kelp fields, rocky outcroppings, and coral reefs complicate sonar-based target-recognition systems. This is because targets may be either partly or completely obscured and hence difficult to detect in the presence of distracting clutter. Conversely, environments with simplistic seafloor features, like flat, sandy bottoms, simplify target analysis. Proud targets are often easily located for this case. As a consequence of this relationship, knowledge of the seafloor conditions can promote more accurate automated target analyses [1]. Such knowledge can also aid in quantifying the uncertainty in the target analysis predictions and determine if the underlying target analysis models should be believed in certain circumstances. Moreover, seafloor segmentations can aid in the performance estimation of automated target analysis models. Isaac J. Sledge is the Senior Machine Learning Scientist with the Advanced Signal Processing and Automated Target Recognition Branch, Naval Surface Warfare Center, Panama City, FL, USA (email: isaac.j.sledge.civ@us.navy.mil). He is also the Principal Machine Learning Scientist with the Machine Intelligence Defense (MIND) lab at the Naval Sea Systems Command. Dominic M. Byrne is an Engineer with the Advanced Signal Processing and Automated Target Recognition Branch, Naval Surface Warfare Center, Panama City, FL, USA (email: dominic.m.byrne3.civ@us.navy.mil). Jonathan L. King is an Engineer with the Applied Sensing and Processing Branch, Naval Surface Warfare Center, Panama City, FL, USA (email: jonathan.l.king1.civ@us.navy.mil). Steven H. Ostertag is an Engineer with the Applied Sensing and Processing Branch, Naval Surface Warfare Center, Panama City, FL, USA (email: steven.h.ostertag.civ@us.navy.mil). Denton L. Woods is an Engineer with the Littoral Acoustics and Target Physics Branch, Naval Surface Warfare Center, Panama City, FL, USA (email: denton.l.woods.civ@us.navy.mil). James L. Prater is the Senior Acoustic Sensing Scientist with the Advanced Signal Processing and Automated Target Recognition Branch, Naval Surface Warfare Center, Panama City, FL, USA (email: james.l.prater.civ@us.navy.mil). Jermaine L. Kennedy is the Division Head of the Sensing Sciences and Systems Division, Naval Surface Warfare Center, Panama City, FL, USA (email: jermaine.l.kennedy.civ@us.navy.mil). Timothy M. Marston is a Principal Engineer with the Applied Physics Laboratory, University of Washington, Seattle, WA, USA (email: marston@apl.washington.edu). José C. Prı́ncipe is the Don D. and Ruth S. Eckis Chair and Distinguished Professor with both the Department of Electrical and Computer Engineering and the Department of Biomedical Engineering, University of Florida, Gainesville, FL, USA (email: principe@cnel.ufl.edu). He is the director of the Computational NeuroEngineering Laboratory (CNEL) at the University of Florida. The first and last authors were funded by grants N00014-19-WX-00636 (Marc Steinberg), N00014-21-WX-00476 (J. Tory Cobb), N00014-21-WX- 00525 (Thomas McKenna), and N00014-21-WX-01348 (Marc Steinberg) from the US Office of Naval Research. The first author was additionally supported by in-house laboratory independent research (ILIR) grant N00014-19-WX-00687 (Frank Crosby) from the US Office of Naval Research and a Naval Innovation in Science and Engineering (NISE) grant from NAVSEA." 2401.11314v1,"CodeAid: Evaluating a Classroom Deployment of an LLM-based Programming Assistant that Balances Student and Educator Needs Majeed Kazemitabaar Runlong Ye Xiaoning Wang Department of Computer Science, University of Toronto Toronto, Ontario, Canada majeed@dgp.toronto.edu Department of Computer Science, University of Toronto Toronto, Ontario, Canada harryye@dgp.toronto.edu Department of Computer Science, University of Toronto Toronto, Ontario, Canada xiaoningwang@dgp.toronto.edu Austin Z. Henley Paul Denny Michelle Craig Microsoft Research Redmond, Washington, USA austinhenley@microsoft.com The University of Auckland Auckland, New Zealand paul@cs.auckland.ac.nz Department of Computer Science, University of Toronto Toronto, Ontario, Canada mcraig@cs.toronto.edu Tovi Grossman Department of Computer Science, University of Toronto Toronto, Ontario, Canada tovi@dgp.toronto.edu ABSTRACT CCS CONCEPTS Timely, personalized feedback is essential for students learning programming, especially as class sizes expand. LLM-based tools like ChatGPT offer instant support, but reveal direct answers with code, which may hinder deep conceptual engagement. We developed CodeAid, an LLM-based programming assistant delivering helpful, technically correct responses, without revealing code solutions. For example, CodeAid can answer conceptual questions, generate pseudo-code with line-by-line explanations, and annotate student’s incorrect code with fix suggestions. We deployed CodeAid in a programming class of 700 students for a 12-week semester. A thematic analysis of 8,000 usages of CodeAid was performed, further enriched by weekly surveys, and 22 student interviews. We then interviewed eight programming educators to gain further insights on CodeAid. Findings revealed students primarily used CodeAid for conceptual understanding and debugging, although a minority tried to obtain direct code. Educators appreciated CodeAid’s educational approach, and expressed concerns about occasional incorrect feedback and students defaulting to ChatGPT. • Human-centered computing → Interactive systems and tools; • Social and professional topics → Computing education. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. CHI ’24, May 11–16, 2024, Honolulu, USA © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX ACM Reference Format: Majeed Kazemitabaar, Runlong Ye, Xiaoning Wang, Austin Z. Henley, Paul Denny, Michelle Craig, and Tovi Grossman. 2024. CodeAid: Evaluating a Classroom Deployment of an LLM-based Programming Assistant that Balances Student and Educator Needs. In Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems (CHI ’24), May 11–16, 2024, Honolulu, USA. ACM, New York, NY, USA, 20 pages. https://doi.org/XXXXXXX. XXXXXXX 1 INTRODUCTION An increasing number of students are learning to program, not just in traditional computer science and engineering degrees, but across a wide range of subject areas [20]. Numerous successful initiatives have been developed to broaden participation in computing, for example, by combining computing majors with disciplines in which there has traditionally been greater gender diversity [7]. However, this surge of interest is putting pressure on resources at many institutions and causing concern amongst administrators and educators [46]. A particularly challenging aspect involves delivering on-the-spot assistance when students need help. Traditional approaches, such as running scheduled office hours in which students can approach instructors and teaching assistants, are often poorly utilized [56]. Moreover, in-person support is not equitable as not all students feel comfortable seeking help from an instructor, and students who are bolder may receive help repeatedly while others wait [55]. There is an urgent need to develop more scalable, equitable and studentfriendly solutions for providing support in programming courses." 2401.11316v1,"PRILoRA: Pruned and Rank-Increasing Low-Rank Adaptation Nadav Benedek Tel Aviv University nadavbenedek@mail.tau.ac.il Abstract With the proliferation of large pre-trained language models (PLMs), fine-tuning all model parameters becomes increasingly inefficient, particularly when dealing with numerous downstream tasks that entail substantial training and storage costs. Several approaches aimed at achieving parameter-efficient fine-tuning (PEFT) have been proposed. Among them, Low-Rank Adaptation (LoRA) stands out as an archetypal method, incorporating trainable rank decomposition matrices into each target module. Nevertheless, LoRA does not consider the varying importance of each layer. To address these challenges, we introduce PRILoRA, which linearly allocates a different rank for each layer, in an increasing manner, and performs pruning throughout the training process, considering both the temporary magnitude of weights and the accumulated statistics of the input to any given layer. We validate the effectiveness of PRILoRA through extensive experiments on eight GLUE benchmarks, setting a new state of the art. 1 Introduction The current paradigm for natural language processing tasks is to exploit pre-trained models, which were trained using large amounts of data and expensive resources, and fine-tune them to various downstream tasks (Brown et al., 2020; Liu et al., 2019; Radford et al., 2019; He et al., 2021b; Devlin et al., 2019). Such fine-tuning was traditionally conducted by gradient update of all parameters of the model (Dodge et al., 2020; Raffel et al., 2020; Qiu et al., 2020). With the ever increasing size of models, such as Llama 7B-65B (Touvron et al., 2023), Palm 540B (Chowdhery et al., 2022), and others, trained with resources consisting of hundreds of GPUs in parallel, which are available only to some institutions and corporations, full finetuning can become prohibitive, lengthy, and with Lior Wolf Tel Aviv University wolf@cs.tau.ac.il high carbon footprint (Luccioni et al., 2022). Additionally, fully fine-tuning this way requires storing all parameters of the fine-tuned model for every downstream task. To tackle the aforementioned challenges, a few research directions for Parameter-Efficient Fine- Tuning (PEFT) were proposed. These directions aim to maintain or even improve the accuracy of a full fine-tuning approach, while training only a small fraction of the parameters. One approach is to add small modules to the base model, which is kept frozen throughout the training process. Such adapter tuning techniques (Rebuffi et al., 2017; Houlsby et al., 2019; Pfeiffer et al., 2020; He et al., 2022) add modules between the layers. The implication, due to increased model depth, is longer training time and higher latency during inference. Alternatively, prompt and prefix tuning (Lester et al., 2021; Li and Liang, 2021) attach trainable tokens to the beginning of layers in the model, thus potentially reducing its effective maximal token length. LoRA (Hu et al., 2022) fine-tunes linear layers by viewing each layer as a matrix of weights W 0 , freezing it, and adding to it a small rank matrix, with the same shape as the original weight matrix, that is obtained as a product of two low-rank matrices A and B. The low-rank r is chosen to be much smaller than the input dimension to the layer, thereby significantly reducing the number of trainable parameters. During LoRA training, only the two low-rank matrices are updated, which are usually 0.01% to 1.00% of the original parameter count, depending on the low-rank of the two matrices. In addition to being efficient and often exceeding the performance of full fine-tuning (Hu et al., 2022), this method has the advantage of being able to be merged back to the original matrix during inference, without increasing latency. LoRA has been used in various downstream tasks successfully (Schwartz et al., 2022; Lawton et al., 2023;" 2401.11317v1,"Third-Party Developers and Tool Development For Community Management on Live Streaming Platform Twitch JIE CAI, Pennsylvania State University, USA YA-FANG LIN, Pennsylvania State University, USA HE ZHANG, Pennsylvania State University, USA JOHN M. CARROLL, Pennsylvania State University, USA Community management is critical for community stakeholders to collaboratively build and maintain the community with socio- technical support. Existing work mainly focuses on the community members and the platform; little work explores the developers who mediate the relationship between the platform and community members and build the tools to support their community management. In this study, we focus on third-party developers (TPDs) for the live streaming platform Twitch and explore their tool development practices. In a mixed method with in-depth qualitative analysis, we found that TPDs maintain complex relationships with different stakeholders (streamers, viewers, platform, professional developers), and the multi-layered policy restricts their agency regarding idea innovation and tool development. We argue that HCI research should redirect the attention from tool users to tool developers regarding community management and propose close collaboration with the platform and professional developers and streamlining the development process with unified took kits and policy documentation. CCS Concepts: • Human-centered computing → Empirical studies in collaborative and social computing; Empirical studies in HCI. Additional Key Words and Phrases: Community Management, Discord, Twitch, Live Streaming, Third-Party Developers, Moderation Tools, Extension and Bot Development, Community management and moderation, Platform Governance ACM Reference Format: Jie Cai, Ya-Fang Lin, He Zhang, and John M. Carroll. 2024. Third-Party Developers and Tool Development For Community Management on Live Streaming Platform Twitch. In CHI ’24: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems, May 11–16, 2024, Honolulu, HI . ACM, New York, NY, USA, 27 pages. https://doi.org/XXXXXXX.XXXXXXX Prepint accepted by ACM CHI 2024 1 INTRODUCTION The advanced technological infrastructure reduces the barrier to content creators and facilitates user-generated content (UGC) to reach users worldwide on many online platforms. The increasing number of content creators and the exponential increase of multimodal content inevitably cause user and content management on many platforms because not all users and UGC follow the terms of services. Many platforms, on the one hand, promote good and civil behaviors to flourish the diverse online communities; on the other hand, curb destructive behaviors and punish violators breaking community rules. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Association for Computing Machinery. Manuscript submitted to ACM 1" 2401.11319v2,"Initialization-Free Lie-Bracket Extremum Seeking in R n⋆ Mahmoud Abdelgalil a , Jorge Poveda a a Department of Electrical and Computer Engineering, University of California, San Diego, La Jolla, 92093, California, USA Abstract Stability results for extremum seeking control in R n have predominantly been restricted to local or, at best, semi-global practical stability. Extending semi-global stability results of extremum-seeking systems to unbounded sets of initial conditions often demands a stringent global Lipschitz condition on the cost function, which is rarely satisfied by practical applications. In this paper, we address this challenge by leveraging tools from higher-order averaging theory. In particular, we establish a novel second-order averaging result with global (practical) stability implications. By leveraging this result, we characterize sufficient conditions on cost functions under which uniform global practical asymptotic stability can be established for a class of extremum-seeking systems acting on static maps. Our sufficient conditions include the case when the gradient of the cost function, rather than the cost function itself, satisfies a global Lipschitz condition, which covers quadratic cost functions. Our results are also applicable to vector fields that are not necessarily Lipschitz continuous at the origin, opening the door to non-smooth Lie-bracket ES dynamics. We illustrate all our results via different analytical and/or numerical examples. Keywords: Extremum Seeking, Second-Order Averaging, Adaptive Systems, Zeroth-Order Optimization 1. Introduction Extremum seeking (ES) systems are some of the most popular real-time derivative-free optimization algorithms developed during the last century [1]. The stability and robustness guarantees, simplicity of implementation, and model-agnostic nature of ES make it an attractive option for a large number of practical model-free control problems [2, 3, 4]. The classical tool for analyzing the stability of ES systems is a (first-order) combination of singular perturbation and averaging theory that enables local practical stability results [5]. These ideas have also been used to study ES systems that approximate Newton’s method rather than gradient descent [6, 7]. In addition, it has been shown that standard ES systems also have non-local stability properties [8, 9, 10], and different schemes have been developed to tackle control and optimization problems in more general systems, such as systems with delays [11], partial differential equations [12], as well as hybrid dynamical systems [13, 14, 15]. On the other hand, recent years have seen the emergence of an alternative approach for designing and analyzing the stability of ES systems based on higher-order averaging [16, 17]. Employing higher-order averaging techniques can offer some flexibility in the design and analysis of the exploration-exploitation mechanism of the system, which led to the discovery of ES algorithms with desirable properties such as bounded update rates [18], vanishing amplitudes [19, 20], and even local exponential/asymptotic stability [21]. Higher-order averaging is also better suited for geometric settings when ES is performed on ⋆ This work was supported in part by the grants NSF ECCS CAREER 2305756 and AFOSR YIP: FA9550-22-1-0211. Email addresses: mabdelgalil@ucsd.edu (Mahmoud Abdelgalil), jipoveda@ucsd.edu (Jorge Poveda) Preprint submitted to Elsevier manifolds [22, 23, 15, 24], or when additional structure is imposed on the exploration dynamics, e.g. when the exploration is done through a Levi-Civita connection associated with a mechanical system [25, 26, 27, 28]. Irrespective of the nature of the averaging tool used for the analysis and design of the algorithm, when the extremum seeking problem is defined on smooth compact boundaryless manifolds, achieving uniform global stability results (either practical or asymptotic) is in general not possible due to topological obstructions that apply to continuous-time systems evolving on such sets [29], a limitation that also applies to time-varying periodic systems, see [30, Sec. 4.1]. However, when the ES problem is defined in R n , such obstructions do not emerge, and, in principle, it might be possible to achieve global extremum seeking. Nevertheless, the majority of results on ES in R n have achieved, at best, semi-global practical asymptotic stability [6, 8, 16, 17, 18]. Such results enable convergence from arbitrarily large pre-defined compact sets of initial conditions by appropriately tuning the parameters of the controller. However, without further re-tuning of these parameters, solutions initialized (or pushed via perturbations) outside of these pre-defined compact sets might exhibit finite escape times. Recently, global practical convergence properties were studied in [31] using a normalized scheme, and also in [32] using tools from quasi-stochastic approximation theory. Nevertheless, results that assert uniform global practical asymptotic stability (characterized by, e.g., KL bounds) in ES controllers are still absent in the literature. Indeed, one of the main limitations that makes achieving such a result difficult using standard averaging theory stems from the global Lipschitz conditions that are usually required in the vector fields of the dynamics, see [33, Ch.10], [15, Sec. 6.1], a condition that is violated even in the simplest ES problems corresponding to cost functions charac- January 26, 2024" 2401.11326v1,"1 Navigating Cybersecurity Training: A Comprehensive Review Saif Al-Dean Qawasmeh, Ali Abdullah S. AlQahtani, Member, IEEE, Muhammad Khurram Khan, Senior Member, IEEE Abstract—In the dynamic realm of cybersecurity, awareness training is crucial for strengthening defenses against cyber threats. This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovative strategies. It evaluates the principles, efficacy, and constraints of each method, presenting a comparative analysis that highlights their pros and cons. The study also investigates emerging trends like artificial intelligence and extended reality, discussing their prospective influence on the future of cybersecurity training. Additionally, it addresses implementation challenges and proposes solutions, drawing on insights from realworld case studies. The goal is to bolster the understanding of cybersecurity awareness training’s current landscape, offering valuable perspectives for both practitioners and scholars. Index Terms—Cybersecurity Awareness, Training Methods, Traditional Training Methods, Innovative Training Methods, Challenges in Cybersecurity Training, Future of Cybersecurity Training. Introduction Methodology Background Comparative Analysis Emerging Trends Future Directions I. I NTRODUCTION As of early 2023, the global internet user base has soared to approximately 5.44 billion, accounting for 68% of the global population, up from 3.977 billion in 2018 [1]. This surge encompasses diverse sectors such as education, commerce, and social media, the latter boasting over 3 billion users [2]. The COVID-19 pandemic has further catalyzed the digital transition, with a notable pivot to online learning and remote working [3], and a boom in e-commerce [4]. However, this increased reliance on digital platforms has escalated the threat of cybercrime, with costs exceeding 945 billion USD in 2020, alongside a substantial investment in cyber defenses [5]. The pandemic-induced shift to remote work has opened new avenues for cybercriminals, intensifying the frequency and sophistication of attacks, especially through social engineering and phishing [6]–[10]. Despite technological strides in Artificial Intelligence (AI) and Machine Learning (ML) for combating such threats [11], [12], the human factor remains a critical vulnerability [13], [14]. Empirical evidence suggests that enhancing cybersecurity awareness significantly bolsters security behaviors and policy compliance [15]. Organizations employ a variety of training methods to educate employees about cybersecurity threats, ranging from tradi- S. Qawasmeh and A. AlQahtani are North Carolina A&T State University, Greensboro, NC, USA, 27411. E-mails: Qawasmeh.saif1@gmail.com, AlQahtani.aasa@gmail.com M.K. Khan is with the Center of Excellence in Information Assurance (CoEIA), King Saud University, Saudi Arabia. E-mail: mkhurram@ksu.edu.sa Conclusion Fig. 1: Paper Structure tional classroom settings to innovative Virtual Reality (VR) and Augmented Reality (AR) simulations [11], [14], [16]–[39]. Despite the variety of cybersecurity awareness training methods available, comprehensive studies discussing these methods and their effectiveness are limited. This paper aims to address this gap by providing a comprehensive survey of state-of-theart methods in cybersecurity awareness training. We conduct a diverse research methods, see Section II, to study the effectiveness of these methods and provide an overview of their advantages and disadvantages. Our goal is to guide organizations in selecting the most suitable training methods for their specific needs, ultimately enhancing their defense against cyber-attacks. This paper addresses key questions in the field of cybersecurity awareness training: 1) What methodologies are currently used, and how have they developed over time? 2) How do these methodologies compare in terms of strengths, weaknesses, and effectiveness? 3) What emerging trends are shaping the future of cybersecurity training, and what implementation challenges exist?" 2401.11332v2,"Mortality Modelling using Generalized Estimating Equations Reza Dastranj ∗ , Martin Kolář Department of Mathematics and Statistics, Masaryk University, Kotlářská 2, 611 37 Brno, Czech Republic Abstract This paper presents an application of Generalized Estimating Equations (GEE) for analyzing age-specific death rates (ASDRs), constituting a longitudinal dataset with repeated measurements over time. GEE models, known for their robustness in handling correlated data, offer a reliable solution when individual data records lack independence, thus violating the commonly assumed independence and identically distributed (iid) condition in traditional models. In the context of ASDRs, where correlations emerge among observations within age groups, two distinct GEE models for single and multipopulation ASDRs are introduced, providing robust estimates for regression parameters and their variances. We explore correlation structures, encompassing independence, AR(1), unstructured, and exchangeable structures, offering a comprehensive evaluation of GEE model efficiency in both single and multipopulation ASDRs. We critically examines the strengths and limitations of GEE models, shedding light on their applicability for mortality forecasting. Through detailed model specifications and empirical illustrations, the study contributes to an enhanced understanding of the nuanced capabilities of GEE models in predicting mortality rates. Keywords: Mortality forecasting, Quasi-likelihood, Generalized estimating equations, Longitudinal analysis, Random walks with drift. 1. Introduction ASDRs serve as vital indicators of mortality trends, collected sequentially over different years for various populations. Within the same age group, mortality rates ∗ Corresponding Author Email addresses: dastranj@math.muni.cz (Reza Dastranj), mkolar@math.muni.cz (Martin Kolář) Preprint submitted to ARXIV" 2401.11349v1,"Asynchronous Parallel Reinforcement Learning for Optimizing Propulsive Performance in Fin Ray Control Xin-Yang Liu a a,∗ , Dariush Bodaghi b,∗ , Qian Xue b,c , Xudong Zheng Wang a,d,e,∗∗ b,c,∗∗ , Jian-Xun Department of Aerospace and Mechanical Engineering, University of Notre Dame, Notre Dame, IN b Department of Mechanical Engineering, University of Maine, ME c Department of Mechanical Engineering, Rochester Institute of Technology d Lucy Family Institute for Data & Society, University of Notre Dame, Notre Dame, IN e Center for Sustainable Energy (ND Energy), University of Notre Dame, Notre Dame, IN Abstract Fish fin rays constitute a sophisticated control system for ray-finned fish, facilitating versa- tile locomotion within complex fluid environments. Despite extensive research on the kinemat- ics and hydrodynamics of fish locomotion, the intricate control strategies in fin-ray actuation remain largely unexplored. While deep reinforcement learning (DRL) has demonstrated poten- tial in managing complex nonlinear dynamics; its trial-and-error nature limits its application to problems involving computationally demanding environmental interactions. This study in- troduces a cutting-edge off-policy DRL algorithm, interacting with a fluid-structure interaction (FSI) environment to acquire intricate fin-ray control strategies tailored for various propulsive performance objectives. To enhance training efficiency and enable scalable parallelism, an in- novative asynchronous parallel training (APT) strategy is proposed, which fully decouples FSI environment interactions and policy/value network optimization. The results demonstrated the success of the proposed method in discovering optimal complex policies for fin- ray actua- tion control, resulting in a superior propulsive performance compared to the optimal sinusoidal actuation function identified through a parametric grid search. The merit and effectiveness of the APT approach are also showcased through comprehensive comparison with conventional ∗ ∗∗ Authors contributed equally Corresponding author. Tel: +1 574-631-5302 Email address: jwang33@nd.edu (Jian-Xun Wang )" 2401.11354v1,"Squared Wasserstein-2 Distance for Efficient Reconstruction of Stochastic Differential Equations Mingtao Xia ∗ xiamingtao@nyu.edu Courant Institute of Mathematical Sciences New York University New York, NY 10012, USA Xiangting Li ∗ xiangting.li@ucla.edu Department of Computational Medicine University of California Los Angeles Los Angeles, CA 90095, USA Qijing Shen qijing.shen@ndm.oxford.edu Nuffield Department of Medicine University of Oxford Oxford OX2 6HW, UK Tom Chou tomchou@ucla.edu Department of Mathematics, University of California Los Angeles Los Angeles, CA 90095, USA Abstract We provide an analysis of the squared Wasserstein-2 (W 2 ) distance between two probability distributions associated with two stochastic differential equations (SDEs). Based on this analysis, we propose the use of a squared W 2 distance-based loss functions in the reconstruction of SDEs from noisy data. To demonstrate the practicality of our Wasserstein distance-based loss functions, we performed numerical experiments that demonstrate the efficiency of our method in reconstructing SDEs that arise across a number of applications. Keywords: Wasserstein distance, stochastic differential equation, inverse problem, uncertainty quantification, optimal transport 1 Introduction Stochastic processes are mathematical models of random phenomena that evolve over time or space (Cinlar, 2011). Among stochastic processes, stochastic differential equations (SDE) of the form dX(t) = f (X(t), t)dt + σ(X(t), t)dB(t), t ∈ [0, T ] ∗. equal contribution ©2024 Mingtao Xia and Xiangting Li and Qijing Shen and Tom Chou. License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/. (1)" 2401.11373v1,"Finding a Needle in the Adversarial Haystack: A Targeted Paraphrasing Approach For Uncovering Edge Cases with Minimal Distribution Distortion Aly M. Kassem Sherif Saad School of Computer Science, University of Windsor {kassem6,sherif.saad}@uwindsor.ca Abstract Adversarial attacks against NLP Deep Learning models are a significant concern. In particular, adversarial samples exploit the model’s sensitivity to small input changes. While these changes appear insignificant on the semantics of the input sample, they result in significant decay in model performance. In this paper, we propose Targeted Paraphrasing via RL (TPRL), an approach to automatically learn a policy to generate challenging samples that most likely improve the model’s performance. TPRL leverages FLAN-T5, a language model, as a generator and employs a self-learned policy using a proximal policy gradient to generate the adversarial examples automatically. TPRL’s reward is based on the confusion induced in the classifier, preserving the original text meaning through a Mutual Implication score. We demonstrate & evaluate TPRL’s effectiveness in discovering natural adversarial attacks and improving model performance through extensive experiments on four diverse NLP classification tasks via Automatic & Human evaluation. TPRL outperforms strong baselines, exhibits generalizability across classifiers and datasets, and combines the strengths of language modeling and reinforcement learning to generate diverse and influential adversarial examples. 1 Introduction Disclaimer: This paper contains real-world cases which are offensive/hateful in nature. Deep learning models in NLP have made impressive advancements in classification, questionanswering, and machine translation. However, they are susceptible to adversarial attacks, which exploit their vulnerability to small input changes (Jia and Liang, 2017; Jin et al., 2020; Alzantot et al., 2018; Wallace et al., 2019; Jia et al., 2019; Cheng et al., 2019). These attacks introduce variations not encountered during training. Two approaches to address these vulnerabilities are data augmentationbased techniques (Liu et al., 2020; Wang and Yang, Figure 1: Components of our framework TPRL for Natural Adversarial Generation. (1) Employing Data filtering and then paraphraser fine-tuning. (2) Targetted paraphrasing through employing RL on classification Datasets. 2015; Kobayashi, 2018; Yu et al., 2018) and adversarial training-based approaches (Zhu et al., 2019; Yoo and Qi, 2021; Xu et al., 2019). Expanding training data using pre-designed samples generated by data augmentation methods can assist in classifier training. However, generated samples may lack an adversarial nature (Altinisik et al., 2022), leading to confusion and inaccurate classification. Adversarial training-based approaches (Xu et al., 2019; Le et al., 2022; Deng et al., 2022; Iyyer et al., 2018; Alzantot et al., 2018) address this limitation by generating challenging examples. This improves the model’s ability to handle difficult subsets of data, enhancing robustness and performance. Generating diverse and semantically meaningful adversarial examples is challenging due to limited operations like word addition, deletion, or substitution. This lack of diversity in word-level generation often results in generated sentences that have iden-" 2401.11376v1,"Self-supervised Contrastive Learning for 6G UM-MIMO THz Communications: Improving Robustness Under Imperfect CSI Rafid Umayer Murshed ∗ , Md Saheed Ullah † , Mohammad Saquib ∗ , and Moe Z. Win ‡ Email: rafidumayer.murshed@utdallas.edu, saheed@udel.edu, saquib@utdallas.edu, moewin@mit.edu ∗ Department of Electrical and Computer Engineering, The University of Texas at Dallas, Texas, USA † Department of Electrical and Computer Engineering, University of Delaware, Delaware, USA ‡ Laboratory for Information and Decision Systems, Massachusetts Institute of Technology, Massachusetts, USA Abstract—This paper investigates the potential of contrastive learning in 6G ultra-massive multiple-input multiple-output (UM- MIMO) communication systems, specifically focusing on hybrid beamforming under imperfect channel state information (CSI) conditions at THz. UM-MIMO systems are promising for future 6G wireless communication networks due to their high spectral efficiency and capacity. The accuracy of CSI significantly influences the performance of UM-MIMO systems. However, acquiring perfect CSI is challenging due to various practical constraints such as channel estimation errors, feedback delays, and hardware imperfections. To address this issue, we propose a novel self-supervised contrastive learning-based approach for hybrid beamforming, which is robust against imperfect CSI. We demonstrate the power of contrastive learning to tackle the challenges posed by imperfect CSI and show that our proposed method results in improved system performance in terms of achievable rate compared to traditional methods. Index terms— Contrastive Learning, Hybrid Beamforming, Imperfect CSI, NYUSIM, Rain Fade, THz, UM-MIMO, 6G. I. INTRODUCTION U LTRA-massive multiple-input multiple-output (UM- MIMO) systems are a promising solution to meet the increasing demand for high data rates and reliable communication in next-generation 6G wireless networks. By utilizing a large number of antennas at both the transmitter and receiver, UM-MIMO systems can achieve significant improvements in spectral efficiency (SE) and capacity [1]. However, these benefits come with the challenge of obtaining accurate channel state information (CSI) to design effective beamforming strategies. Hybrid beamforming, which combines digital and analog beamforming techniques, is a widely used approach in UM- MIMO systems to reduce hardware complexity and power consumption [2], [3]. By capitalizing on the strengths of digital and analog elements, hybrid beamforming adeptly manages the trade-off between performance and resource efficiency [4]. This strategic alignment not only enhances the overall SE of communication systems but also addresses the challenges arising from hardware limitations in emerging technologies. However, the performance of hybrid beamforming is highly dependent on accurate CSI [5]. In practice, acquiring perfect CSI is challenging due to various factors such as channel estimation errors [6], feedback delays [7], and quantization errors [8]. Therefore, there is a need for robust beamforming techniques that can perform well even with imperfect CSI. As the demand for high-performance wireless communication systems continues to grow, the refinement and better estimation of CSI data in conjunction with robust hybrid beamforming strategies become pivotal in enhancing the reliability and efficiency of communication networks. Harnessing the power of the NYUSIM channel model, an advanced simulation tool from New York University, we can accurately emulate the complexities of real-world wireless environments. NYUSIM allows for simulations with RF bandwidths up to 1 GHz and carrier frequencies reaching 150 GHz, exceeding the scope of 5G technologies [9]. It offers a versatile platform for testing diverse scenarios like urban microcell (UMi) and macrocell (UMa), as well as indoor hotspots (InH), through adjustable parameters such as spatial consistency and human blockage [10]. These features enable a detailed replication of the multifaceted nature of THz wireless communication environments, making NYUSIM an invaluable asset for researchers and engineers examining the intricacies of wireless systems [11]. Building on this foundation, our paper introduces a pioneering self-supervised contrastive learning-based approach for hybrid beamforming in UM-MIMO THz systems, particularly under the challenge of imperfect CSI. This method harnesses contrastive learning, a technique that has demonstrated remarkable success in diverse domains such as computer vision, natural language processing, and even seismology [12], to discern and exploit the subtle nuances in data. By utilizing this approach, we aim to develop a robust beamforming strategy that can deliver high performance even in the face of CSI inaccuracies, thereby meeting the demands for more resilient and efficient next-generation wireless communication systems. II. S YSTEM M ODEL AND P ROBLEM F ORMULATION This section presents the system model for UM-MIMO communications and formulates the hybrid beamforming problem under imperfect CSI conditions. We discuss the challenges associated with conventional hybrid beamforming techniques and motivate the use of contrastive learning to address these challenges. A. System Model Our single-user UM-MIMO network features a base station (BS) and user equipment (UE), each with a uniform linear array" 2401.11381v1,"Symmetric KL-divergence by Stein’s Method Liu-Quan Yao a , Song-Hao Liu b a Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, 100190, China b Department of Statistics and Data Science, Southern University of Science and Technology, Shenzhen, 518055, Guangdong, China Abstract In this paper, we consider the symmetric KL-divergence between the sum of independent variables and a Gaussian distribution, and obtain a convergence √ n ). The proof is based on Stein’s method. The convergence rate rate of O ( ln n of order O ( √ 1 n ) and O ( n 1 ) are also obtained under higher moment condition. Keywords: Stein’s method, Symmetric KL-divergence, Central Limit Theorem 1. Introduction The Central Limit Theorem (CLT), as one of the fundamental principles in probability theory, elucidates a pivotal truth. Specifically, it asserts that for a sequence of independent random variables X 1 , X 2 , ⋯, under the Lindeberg condition, the standardized partial sum: ∑ (X k − EX k ) k=1 W n = √ n ∑ k=1 Var(X k ) n (1.1) tends towards a Gaussian distribution. A classical proof of this theorem relies on the utilization of characteristic functions, while alternative methodologies are also capable of deriving the CLT, potentially leading to even stronger convergence. In this paper, we focus on the entropic central limit theorem. Email addresses: yaoliuquan20@mails.ucas.ac.cn (Liu-Quan Yao), liush@sustech.edu.cn (Song-Hao Liu) Preprint submitted to Elsevier" 2401.11389v1,"MedLM: Exploring Language Models for Medical Question Answering Systems Niraj Yagnik UC San Diego nyagnik@ucsd.edu Jay Jhaveri UC San Diego jjhaveri@ucsd.edu Asma Ben Microsoft Health AI abenabacha@microsoft.com Abstract In the face of rapidly expanding online medical literature, automated systems for aggregating and summarizing information are becoming increasingly crucial for healthcare professionals and patients. Large Language Models (LLMs), with their advanced generative capabilities, have shown promise in various NLP tasks, and their potential in the healthcare domain, particularly for Closed-Book Generative QnA, is significant. However, the performance of these models in domain-specific tasks such as medical Q&A remains largely unexplored. This study aims to fill this gap by comparing the performance of general and medicalspecific distilled LMs for medical Q&A. We aim to evaluate the effectiveness of fine-tuning domain-specific LMs and compare the performance of different families of Language Models. The study will address critical questions about these models’ reliability, comparative performance, and effectiveness in the context of medical Q&A. The findings will provide valuable insights into the suitability of different LMs for specific applications in the medical domain. 1 Introduction With the plethora of online information on medical literature and research topics, it becomes incredibly challenging to keep up with the latest findings . The need for ubiquitous automated systems for aggregating and summarizing essential information would make it easier for healthcare professionals to apply evidence-based knowledge to their decisionmaking processes productively. Similarly, from the patient’s perspective, there is an increasing demand for easily-accessible accurate, and reliable medical information for the general population. An automated system would help patients with the information they can trust based on established journals and research to equip them to make educated and informed decisions for their health. Vivek Sharma UC San Diego v7sharma@ucsd.edu Gabriel Pila UC San Diego ypilahuancachoque @ucsd.edu Jingbo Shang UC San Diego jshang@ucsd.edu The latest advancements in generative models have made Large Language Models ubiquitous on the internet (Zhao et al., 2023). The models are becoming increasingly large and complex, allowing them to learn intricate patterns available on the vast text available online to improve performance on a wide range of tasks. LLMs have achieved stateof-the-art results on various NLP tasks, including sentiment analysis, text summarization, and text generation. The capabilities of LLMs have been proven to extend beyond what was once considered challenging. This includes the creation of unique forms of text such as poems, code, scripts, musical compositions, emails, and letters (Sallam, 2023). The last year has also seen an increased availability of these language models to the general public allowing professionals from all backgrounds to access them via their interface or API services for their specific use-case. A lot of prior work on automated medical question answering is based on information retrieval systems, which work great for the task at hand but need to consider the specific context and nuances of the patients. There is a fundamental need for more personalization, which many modern automated medical systems need while trying to address patients. Large Language Models have presented themselves as reasons for considering the chain of thoughts and understanding the user context before answering the question. This makes it essential to leverage the strengths of generative language models and apply their power to the task of Closed- Book Generative QnA for the healthcare domain. The recent development in the NLP since the inception of transformers and attention mechanisms has seen the birth of multiple classes of language models to address and specialize different downstream tasks. There has been massive progress in the decoder-only family of models, with architectures like GPT-3 and GPT-4 (Radford et al., 2019) producing outstanding results on a plethora of gen-" 2401.11391v1,"1 Interactive AI with Retrieval-Augmented Generation for Next Generation Networking Ruichen Zhang*, Hongyang Du*, Yinqiu Liu*, Dusit Niyato, Fellow, IEEE, Jiawen Kang, Sumei Sun, Fellow, IEEE, Xuemin (Sherman) Shen, Fellow, IEEE, and H. Vincent Poor, Life Fellow, IEEE Abstract—With the advance of artificial intelligence (AI), the emergence of Google Gemini and OpenAI Q* marks the direction towards artificial general intelligence (AGI). To implement AGI, the concept of interactive AI (IAI) has been introduced, which can interactively understand and respond not only to human user input but also to dynamic system and network conditions. In this article, we explore an integration and enhancement of IAI in networking. We first comprehensively review recent developments and future perspectives of AI and then introduce the technology and components of IAI. We then explore the integration of IAI into the next-generation networks, focusing on how implicit and explicit interactions can enhance network functionality, improve user experience, and promote efficient network management. Subsequently, we propose an IAI-enabled network management and optimization framework, which consists of environment, perception, action, and brain units. We also design the pluggable large language model (LLM) module and retrieval augmented generation (RAG) module to build the knowledge base and contextual memory for decision-making in the brain unit. We demonstrate the effectiveness of the framework through case studies. Finally, we discuss potential research directions for IAI- based networks. Index Terms—IAI, networking, pluggable LLM module, AGI, RAG, problem formulation. I. I NTRODUCTION With the current development trajectory, artificial intelligence (AI) is moving towards an important stage of realizing artificial general intelligence (AGI). The evolution of AI from its original rule-based algorithms to the adoption of advanced learning models marks a significant shift in the field of computing technology. This process is driven by the increasing growth and complexity of data, requiring more sophisticated AI solutions. While early AI models provided the foundation for modern data-driven environments, their limitations in handling dynamic and large-scale data have prompted the development of more advanced and novel methods. Among these R. Zhang, H. Du, Y. Liu, and D. Niyato are with the School of Computer Science and Engineering, Nanyang Technological University, Singapore (e-mail: ruichen.zhang@ntu.edu.sg, hongyang001@e.ntu.edu.sg, yinqiu001@e.ntu.edu.sg, dniyato@ntu.edu.sg). J. Kang is with the School of Automation, Guangdong University of Technology, China (e-mail: kavinkang@gdut.edu.cn). S. Sun is with the Institute for Infocomm Research, Agency for Science, Technology and Research, Singapore (e-mail: sunsm@i2r.a-star.edu.sg). X. Shen is with the Department of Electrical and Computer Engineering, University of Waterloo, Canada (e-mail: sshen@uwaterloo.ca). H. V. Poor is with the Department of Electrical and Computer Engineering, Princeton University, Princeton, NJ08544, USA (e-mail: poor@princeton.edu). * means equal contribution. advancements, such as Google Gemini 1 and OpenAI Q* 2 , human-in-the-loop (HITL) systems highlight the importance of integrating human insights into AI decision-making [1]. These systems combine human feedback with the AI’s learning process, improving the accuracy and contextual understanding of AI results. For example, a 2018 Stanford study showed that AI combined with HITL outperformed human or AI analysis alone in healthcare 3 . However, HITL systems have limitations in adaptability and real-time responsiveness because they rely on human input, which can be limited, unpredictable, and erroneous. To address these challenges and effectively develop AGI, interactive AI (IAI) has been proposed. The primary difference between IAI and HITL lies in their interaction modes, i.e., IAI emphasizes immediate and direct interaction between AI and users, whereas HITL focuses on human participation and supervision in the AI decision-making process [1]. IAI systems are capable of instantaneously understanding user inputs, such as voice commands, text messages, or other interactive commands, and intelligently responding or executing tasks based on these inputs. This ability not only enhances user experience but also increases flexibility and effectiveness of AI applications in dynamic environments. Integrating IAI with technologies such as retrieval-augmented generation (RAG) and LangChain can further personalize network operations [2]. For example, RAG enables IAI systems to extract information from vast databases to enrich their responses and decisions. Combined with LangChain, which extends AI reasoning capabilities, IAI can provide more context-aware solutions based on the existing databases. The main advantages of IAI over the limitations of HITL systems, especially when augmented with RAG and LangChain, include: • Customizabilty and Personalizability: IAI, enhanced by RAG and LangChain, offers tailored solutions by aligning AI responses closely with user preferences and needs, resulting in more personalized and user-centric AI applications. • Better Flexibility: IAI’s direct user interaction, supported by LangChain’s extended reasoning, can offer more flexibility to adapt to different network scenarios and users’ requirements, enhancing the system’s versatility and satisfaction. 1 https://deepmind.google/technologies/gemini/#introduction 2 https://community.openai.com/t/what-is-q-and-when-we-will-hearmore/521343 3 https://scopeblog.stanford.edu/2018/05/08/artificial-intelligence-inmedicine-predicting-patient-outcomes-and-beyond/" 2401.11403v1,"MolTailor: Tailoring Chemical Molecular Representation to Specific Tasks via Text Prompts Haoqiang Guo, Sendong Zhao * , Haochun Wang, Yanrui Du, Bing Qin, Research Center for Social Computing and Information Retrieval, Harbin Institute of Technology, China {hqguo, sdzhao, hchwang, yrdu, bqing}@ir.hit.edu.cn Abstract Sulfonamide group Sulfon… Deep learning is now widely used in drug discovery, providing significant acceleration and cost reduction. As the most fundamental building block, molecular representation is essential for predicting molecular properties to enable various downstream applications. Most existing methods attempt to incorporate more information to learn better representations. However, not all features are equally important for a specific task. Ignoring this would potentially compromise the training efficiency and predictive accuracy. To address this issue, we propose a novel approach, which treats language models as an agent and molecular pretraining models as a knowledge base. The agent accentuates task-relevant features in the molecular representation by understanding the natural language description of the task, just as a tailor customizes clothes for clients. Thus, we call this approach MolTailor. Evaluations demonstrate MolTailor’s superior performance over baselines, validating the efficacy of enhancing relevance for molecular representation learning. This illustrates the potential of language model guided optimization to better exploit and unleash the capabilities of existing powerful molecular representation methods. Our codes and appendix are available at https://github.com/SCIR-HI/MolTailor. Carboxylic acid group Carbo… Trifluoromethyl group Triflu… Phenyl group Phen… Ether group Ether …… …… Molecular Pretraining Model Encode General Molecular Representation Tailor Lipo Task-Specific Molecular Representation Figure 1: Most existing molecular pretraining models (e.g. Grover, MolCLR) attempt to encode as much molecular information as possible (e.g. various functional groups and molecular weight) into a vector to obtain general molecular representation. However, for specific downstream tasks (e.g. Lipo, predicting lipophilicity of compounds), features are not equally important (e.g. Sulfonamide and Carboxylic acid groups significantly increase the hydrophilicity, being more critical than the remaining groups). By understanding task descriptions, MolTailor adjusts the weights of different features in the representation to obtain task-specific molecular representation. Introduction In recent years, AI technology has been widely applied to various stages of drug design, such as compound synthesis and screening, etc. (Mamoshina et al. 2016). This has greatly improved the efficiency and reduced the cost of drug development. Molecular representation learning serves as the cornerstone for AI techniques in drug design, empowering a wide range of downstream tasks such as molecular property prediction and drug-drug interaction judgment (Xia et al. 2023). Molecular representations are essentially vector embeddings for molecules, analogous to word embeddings in NLP. The idea of encoding molecules as mathematical vectors dates back to the 1940s (Wiener 1947). The development of molecular representation learning can be roughly divided into four phases. In the first phase, molecular representations were constructed through expert knowledge, which can be categorized into two types: descriptors (Wiener 1947) and fingerprints (Rogers and Hahn * Corresponding author Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. 2010). Descriptors focus on the inherent chemical characteristics of molecules, while fingerprints contain structural information. In the second phase, inspired by deep learning, some works (Gilmer et al. 2017; Yang et al. 2019; Song et al. 2020) started to learn molecular representations from labeled data using supervised learning. However, the scarcity of labeled data, due to the expensive experimental cost and time required, limits further improvements to model performance and generalization. The success of pretrained language models in NLP (Devlin et al. 2018) has demonstrated the potential of selfsupervised learning. Building upon this, in the third phase, some works pretrained sequence-based models to learn molecular representation by mimicking successful NLP pretrained language models. (Chithrananda, Grand, and Ramsundar 2020; Kim et al. 2021; Ross et al. 2022). Concurrently, others pretrained graph-based models (Hu et al. 2019; You et al. 2020). More recently, in the fourth phase, researchers are no longer limited to pretraining solely on the" 2401.11436v1,"Geometric Prior Guided Feature Representation Learning for Long-Tailed Classification Yanbiao Ma 1 , Licheng Jiao 1* , Fang Liu 1 , Shuyuan Yang 1 , Xu Liu 1 , Puhua Chen 1 1* School of Artificial Intelligence, Xidian University, Xi’an, 710071, China. 2 International Research Center for Intelligent Perception and Computation, Xi’an 710071, China. 3 Key Laboratory of Intelligent Perception and Image Understanding of the Ministry of Education. *Corresponding author(s). E-mail(s): lchjiao@mail.xidian.edu.cn; Contributing authors: ybmamail@stu.xidian.edu.cn; f63liu@163.com; syyang@xidian.edu.cn; xuliu361@163.com; phchen@xidian.edu.cn; Abstract Real-world data are long-tailed, the lack of tail samples leads to a significant limitation in the generalization ability of the model. Although numerous approaches of class re-balancing perform well for moderate class imbalance problems, additional knowledge needs to be introduced to help the tail class recover the underlying true distribution when the observed distribution from a few tail samples does not represent its true distribution properly, thus allowing the model to learn valuable information outside the observed domain. In this work, we propose to leverage the geometric information of the feature distribution of the well-represented head class to guide the model to learn the underlying distribution of the tail class. Specifically, we first systematically define the geometry of the feature distribution and the similarity measures between the geometries, and discover four phenomena regarding the relationship between the geometries of different feature distributions. Then, based on four phenomena, feature uncertainty representation is proposed to perturb the tail features by utilizing the geometry of the head class feature distribution. It aims to make the perturbed features cover the underlying distribution of the tail class as much as possible, thus improving the model’s generalization performance in the test domain. Finally, we design a three-stage training scheme enabling feature uncertainty modeling to be successfully applied. Experiments on CIFAR-10/100-LT, ImageNet-LT, and iNaturalist2018 show that our proposed approach outperforms other similar methods on most metrics. In addition, the experimental phenomena we discovered are able to provide new perspectives and theoretical foundations for subsequent studies. The code will be available at https://github.com/mayanbiao1234/Geometric-metrics-for-perceptual-manifolds-in-deep-neural-networks/ Keywords: Long-Tailed Classification, Representational learning, Geometric prior knowledge 1 Introduction not accurately represent its true distribution. We discuss two cases of the relationship between the observed and true distributions of the tail classes [5]. Deep learning has made significant progress in image classification, image segmentation, and other fields benefiting from artificially annotated large-scale datasets. However, real-world data tends to follow a long-tailed distribution [38], and unbalanced classes introduce bias into machine learning models. Numerous approaches have been proposed to mitigate the model bias, such as class re-balancing [6, 13, 24, 31, 32, 56], information augmentation [4, 19, 21, 50, 55] and network structure design [21, 51, 56]. However, the above approach does not work effectively in all cases, and the generalization ability of the model will be greatly limited when the samples of the tail class do • Case 1: The observed samples cover the true data distribution uniformly (As shown in Figure 1a). • Case 2: The observed samples cover only a small region of the true data distribution (As shown in Figure 2b). In case 1, although the sample size of the tail classes is small, these samples represent the true data distribution. The main reason for the degradation of the model performance is that at each sampling, samples from the tail class are used with a small probability to calculate loss and update parameters, resulting in inadequate learning of the tail class by the model. 1" 2401.11445v1,"PREPRINT 1 Towards Non-Robocentric Dynamic Landing of Quadrotor UAVs Li-Yu Lo 1,2 Student Member, IEEE, Boyang Li 3 , Chih-Yung Wen 1,2 , and Ching-Wei Chang 4† Planner Quadrotor Outer-loop Controller Inner-loop Controller Trajectory Planner Dyanmic Constraints Traj. Constraints LED Configuration State Estimation Iterated EKF Blob Tracker Camera Marker Detection RGB/Depth Image FoV Constraints Fig. 1: Hardware and software details of the proposed non-robocentric landing system. The system could be separately discussed in two main parts: state estimation and planner. Note that all modules above are located on the ground, with no exteroceptive sensors and computing units on the quadrotor. Abstract—In this work, we propose a dynamic landing solution without the need for onboard exteroceptive sensors and an expensive computation unit, where all localization and control modules are carried out on the ground in a non-inertial frame. Our system starts with a relative state estimator of the aerial robot from the perspective of the landing platform, where the state tracking of the UAV is done through a set of onboard LED markers and an on-ground camera; the state is expressed geometrically on manifold, and is returned by Iterated Extended Kalman filter (IEKF) algorithm. Subsequently, a motion planning module is developed to guide the landing process, formulating it as a minimum jerk trajectory by applying the differential flatness property. Considering visibility and dynamic constraints, the problem is solved using quadratic programming, and the final motion primitive is expressed through piecewise polynomials. Through a series of experiments, the applicability of this approach is validated by successfully landing 18 cm × 18 cm quadrotor on a 43 cm × 43 cm platform, exhibiting performance comparable to conventional methods. Finally, we provide comprehensive hardware and software details to the research community for future reference. Index Terms—Quadrotors, Dynamic Landing, Relative Pose Estimation, Motion Planning. 1 AIRo-LAB, Department of Aeronautical and Aviation Engineering, The Hong Kong Polytechnic University, Kowloon, Hong Kong. 2 Research Centre for Unmanned Autonomous System, The Hong Kong Polytechnic University, Kowloon, Hong Kong. 3 School of Engineering, The University of Newcastle, Callaghan, NSW 2308, Australia. 4 Hong Kong Center for Construction Robotics, The Hong Kong University of Science and Technology, New Territories, Hong Kong. E-mails: {patty.lo, boyang.li, chihyung.wen, ccw} @{connect.polyu.hk, newcastle.edu.au, polyu.edu.hk, ust.hk} † corresponding author S UPPLEMENTARY M ATERIAL Supporting video of this paper is available at https://youtu. be/7wiCh46MQmc. Hardware and software are detailed at: https://github.com/HKPolyU-UAV/alan.git I. I NTRODUCTION D UE to its high versatility and easy deployment, unmanned aerial systems, especially multirotor UAVs like quadrotors, have garnered significant attention in academia and industry over the past decade [1], [2]. Safe takeoff and landing capabilities are crucial for the success of aerial missions, particularly in scenarios involving frequent releasing and retracting of drones, as seen in large-scale deployments for tasks such as marine surveying [3] or drone-assisted parcel delivery [4]. The dynamic performance of landing tasks is often essential for efficiency despite introducing challenges and potential threats to mission reliability, making it a topic worthy of investigation. However, rather than adopting an on-board approach, we relocate most sensing and computing modules to the ground. Consequently, the airborne quadrotor is equipped solely with a low-cost flight controller unit, which we classify as a “nonrobocentric approach” in this study, where the aerial robot has no independent sensing and decision-making ability. The argument put forth is that this particular configuration has the potential to significantly reduce the payload of the UAV and simplify its avionics system, while maintaining a performance level comparable to that of a traditional autonomous landing system. Moreover, in cases where a UAV mission does not necessitate the utilization of computationally intensive perception" 2401.11467v1,"Over-Reasoning and Redundant Calculation of Large Language Models Cheng-Han Chiang National Taiwan University, Taiwan dcml0714@gmail.com Abstract Large language models (LLMs) can solve problems step-by-step. While this chainof-thought (CoT) reasoning boosts LLMs’ performance, it is unclear if LLMs know when to use CoT and whether those CoT are always necessary to answer the question. This paper shows that LLMs tend to generate redundant calculations and reasoning on a manually constructed math QA dataset, GSM8K-Zero. GSM8K-Zero is constructed such that the questions can be answered without any calculations, but LLMs, including Llama-2 models and Claude-2, tend to generate lengthy and unnecessary calculations to answer the questions. We also conduct experiments to explain why LLMs generate redundant calculations and reasonings. GSM8K-Zero is publicly available at https://github. com/d223302/Over-Reasoning-of-LLMs and https://huggingface.co./datasets/ dcml0714/GSM8K-Zero. 1 Introduction LLMs have shown impressive performance on various tasks (Brown et al., 2020; Ouyang et al., 2022; Touvron et al., 2023), and CoT reasonings (Wei et al., 2022; Kojima et al., 2022) further boost the LLMs’ performance. To make LLMs better learn to think step-by-step, it is common to enhance the CoT ability of LLMs by adding training samples that contain CoT reasoning in instruction tuning (Longpre et al., 2023). While step-by-step reasoning is useful, it lengthens the LLM’s output. Longer outputs imply longer inference latency and cost more money on commercial LLMs. Moreover, if LLMs give long answers to questions that can be easily solved without complex reasoning, this may confuse the users and make them falsely believe that the questions are difficult and must be solved step-by-step. It is thus more desirable that LLM only triggers CoT reasoning ability when necessary, but it is unclear if Hung-yi Lee National Taiwan University, Taiwan hungyilee@ntu.edu.tw A deep-sea monster rises from the waters once every hundred years to feast on a ship and sate its hunger. Over three hundred years, it has consumed 847 people. Ships have been built larger over time, so each new ship has twice as many people as the last ship. How many people were on the ship the monster ate in the first hundred years? How many people has it consumed over three hundred years? (a) Question in GSM8K-Zero To calculate the total number of people the deep-sea monster has consumed over three hundred years, we can sum up the number of people on each ship the monster has feasted on. The first ship had 1 person (since it has been a hundred years), the second ship had 2 people (since the new ship has twice as many people as the last ship), the third ship had 4 people, and so on. (...) The formula is as follows: S n = a * (r n - 1) / (r - 1) (...) Therefore, the deep-sea monster has consumed approximately 2.03 x 10 90 people over three hundred years. (b) ChatGPT output Figure 1: (a) A question in GSM8K-Zero. The blue parts are the known information, and the orange part is the original question in GSM8K and is removed in GSM8K-Zero. The green part is the new question in GSM8K-Zero. (b) The answer generated by ChatGPT. LLMs know when to think step-by-step and only generate step-by-step reasoning when necessary. Prior works on CoT mostly focus on the correctness of the CoT reasoning steps or whether the reasoning steps are faithful to the question and support the final answer (Ye and Durrett, 2022; Golovneva et al., 2023). However, no past study focuses on the redundancy in CoT reasonings. As an initiative to study the redundancy of LLM outputs, we aim to understand the following research question: Does LLM generate redundant reasonings when they clearly need not do so? To study this question, we construct a math QA dataset, GSM8K-Zero, which contains trivial questions that can be answered without any calculations and reasoning. Using this curated dataset, we can define the redundancy of output from LLMs. We evaluate seven LLMs trained with reinforcement learning with human feedback (RLHF) (Ouyang et al., 2022), and we find that LLMs tend to generate redundant calculations that complicate the responses and sometimes lead to the wrong answer. To ex-" 2401.11475v1,"Room Temperature Quantum Control of N-Donor Electrons at Si/SiO 2 Interface Soumya Chakraborty 1 , Arup Samanta* 1,2 1 Quantum/Nano-science and technology Lab, Department of Physics, Indian Institute of Technology Roorkee, Roorkee-247667, Uttarakhand, India 2 Centre for Nanotechnology, Indian Institute of Technology Roorkee, Roorkee-247667, Uttarakhand, India *arup.samanta@ph.iitr.ac.in Abstract: The manuscript theoretically discusses various important aspects for donor atom based single qubit operations in silicon (Si) quantum computer architecture at room temperature using a single nitrogen (N) deep-donor close to the Si/SiO 2 interface. Quantitative investigation of room temperature single electron shuttling between a single N-donor atom and the interface is the focus of attention under the influence of externally applied electric and magnetic field. To apprehend the realistic experimental configurations, central cell correction along with effective mass approach is adopted throughout the study. Furthermore, a detailed discussion currently explores the significant time scales implicated in the process and their suitability for experimental purposes. Theoretical estimates are also provided for all the external fields required to successfully achieve coherent single electron shuttling and their stable maintenance at the interface as required. The results presented in this work offer practical guidance for quantum electron control using N-donor atoms in Si at room temperature. 1. Introduction The revolutionary emergence of quantum computing has the potential to transform information processing to an enormous extent. Dopant atom based silicon (Si) devices have been extensively studied as a practical platform for quantum computing. [1-4] Silicon offers numerous advantages, including well-established fabrication techniques, [5] long coherence times, [6] and the potential for integration with existing complementary metal-oxide-semiconductor (CMOS) technology. These factors establish silicon-based devices as a promising avenue for developing spin or charge qubit architectures which, in a sense, are the backbone of quantum computers. The initial proposal for doped Si based quantum computer architecture was based on donor nuclear spins. [2] Further, single electronic spin as qubit is also being extensively studied. [7-9] Subsequently, donor based charge qubit has also been proposed. [ 10 ] Both of the nuclear and electronic spins in Si have large coherence time which is essential for practical quantum computing. The coherence times (T 2 ) in natural silicon for phosphorous-donor’s nuclear spins [11-12] and electronic spins [11,13,14] are in the order of few mili-second (ms) and micro-second (µs) respectively. Whereas, the same for electronic charge is a few µs. [15,16] These time scales can further be enhanced by a few fold with isotope purification. [ 17] Although having shorter T 2 , charge qubits are far easier to manipulate externally. Moreover, single electronic charge can easily be detected with state-of-theart single-electron tunneling (SET) devices [18-23] as compared to spin qubit detection. [24] In addition, charge-based quantum operations can be achieved using conventional gate designs [25] and standard CMOS processes, facilitating their integration into existing semiconductor technology which make them a suitable candidate for qubit operation. Interfacial double-donor system [26] or the donor-interface system plays an intriguing role towards single electron shuttling for charge qubit operations. [27-29] Meticulous theoretical studies regarding this context with phosphorous (P) single-donor [27,28] and different double-donors (e.g., Te, Se, and Bi) [29] have been performed in the last two decades. The donor within silicon crystal acts as a localized charge source whereas the interface, typically composed of a siliconsilicon dioxide (Si/SiO 2 ) structure in MOSFET or Fin-FET configuration, serves as a triangular potential well that allows confinement and manipulation of single electrons between the donor and the interface well. This donor-interface system facilitates controlled transfer and storage of quantum information encoded in charge qubits. [30-32] So far, such sophisticated electron shuttling had been limited only up to sub-Kelvin temperatures because achieving high-temperature single electron shuttling, pillars of room temperature quantum computers, presents significant challenges. Elevated temperatures introduce the additional effect of thermal energy, leading to higher thermal fluctuations and reduced coherence time of qubits. Maintaining stability and coherence of charge qubits at higher temperatures are crucial for practical quantum computing applications. Several studies have highlighted the difficulties associated with such hightemperature single electron shuttling. For instance, the deteriorating effect of increased thermal noise on the effective single electron tunneling rate and overall device performance, in silicon-based systems, at elevated temperature. [33-35] To address the challenges associated with high-temperature single electron shuttling, recent studies have explored various strategies. These include dielectric and quantum confinement, [36] multi-dopant cluster, [37] different double donors, [29,38] and donor-vacancy interaction to mitigate the impact of thermal noise. [39,40] But, all these enormous efforts have either been practically realized only up to few tens of Kelvin temperatures or have technologically nonviable for large scale fabrication. Here, we propose and theoretically investigate Nitrogen (N) deep-donor based device that will allow single electron shuttling between N-donor and Si/SiO 2 interface at room temperature. The valley-orbit interaction in Si due to the six valley degeneracy deepens the ground state (A 1 ) energy of N-donor almost around 190 meV below the conduction band. [41] For comparison, the same for P-donor in Si is only ̴ 45 meV below the conduction band in bulk systems. The T 2 and E states, for both of the P and N-donor, remains around thirty meV below the conduction band being donor independent. [42] The A 1 state energy can further be enhanced in nano-dimensional devices due to various confinement effects, [43-44] which is reported in our recent paper along with the suitability of N-donor for single electron transistor at room temperature. [41] This huge energy difference between the ground and excited states in N-donor will reduce the thermal fluctuation greatly leading towards increased thermal stability. Moreover, it was experimentally demonstrated that the" 2401.11506v1,"Enhancing Recommendation Diversity by Re-ranking with Large Language Models DIEGO CARRARO, Insight Centre for Data Analytics, School of Computer Science & IT, University College Cork, Ireland DEREK BRIDGE, Insight Centre for Data Analytics, School of Computer Science & IT, University College Cork, Ireland It has long been recognized that it is not enough for a Recommender System (RS) to provide recommendations based only on their relevance to users. Among many other criteria, the set of recommendations may need to be diverse in order to handle uncertainty and offer a meaningful choice. The literature reports many ways of measuring diversity and ways of improving the diversity of a set of recommendations, most notably by re-ranking and selecting from a larger set of candidate recommendations. Driven by promising insights from the literature on how to incorporate versatile Large Language Models (LLMs) into the RS pipeline, in this paper, we show how LLMs can be used for diversity re-ranking. We begin with an informal study that verifies that LLMs can be used for re-ranking tasks and do have some understanding of the concept of diversity. Then, we design a more rigorous methodology where LLMs are prompted to generate a diverse ranking from a candidate ranking using various prompt templates with different re-ranking instructions in a zero-shot fashion. We conduct comprehensive experiments testing state-of-the-art conversational LLMs from the GPT and Llama families. We compare their re- ranking capabilities with random re-ranking and various traditional re-ranking methods from the literature (MMR, xQuAD and RxQuAD). We find that LLM-based re-ranking outperforms random re-ranking across all the metrics that we use but does not perform as well as the traditional re-ranking methods. We gain insight into prompt design for this task (e.g. on the whole, it is better to prompt for diversity rather than a balance of diversity and relevance). Given that no special knowledge engineering is needed, we conclude that LLM-based re-ranking is a promising approach, and we highlight directions for future research. We open-source the code of our experiments for reproducibility. CCS Concepts: • Information systems → Information retrieval diversity; Language models; Recommender systems. Additional Key Words and Phrases: Recommender Systems, Large Language Models, Diversity, Re-ranking 1 INTRODUCTION Large Language Models (LLMs) have rapidly become a breakthrough technology since the advent of their popular pioneers GPT [39] and BERT [11], introduced in 2018. Since then, many more LLMs with enhanced capabilities have been proposed, such as ChatGPT, Bard and LLama. They can perform various language-related tasks, including, for example, translation, summarization and conversation; they give the appearance of understanding complex contexts and exhibiting reasoning and problem-solving capabilities. LLMs are typically pre-trained with large datasets of text Authors’ addresses: Diego Carraro, Insight Centre for Data Analytics, School of Computer Science & IT, University College Cork, Ireland, diego.carraro@ insight-centre.org; Derek Bridge, Insight Centre for Data Analytics, School of Computer Science & IT, University College Cork, Ireland, derek.bridge@ insight-centre.org. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). © 2024 Copyright held by the owner/author(s). Manuscript submitted to ACM Manuscript submitted to ACM 1" 2401.11509v1,"Simple Domain Adaptation for Sparse Retrievers Mathias Vast 1,2 , Yuxuan Zong 2 , Basile Van Cooten 1 , Benjamin Piwowarski 2 , and Laure Soulier 2 1 2 Sinequa Sorbonne Université, CNRS, ISIR, F-75005 Paris, France , {firstname.lastname}@isir.upmc.fr January 23, 2024 Abstract In Information Retrieval, and more generally in Natural Language Processing, adapting models to specific domains is conducted through fine-tuning. Despite the successes achieved by this method and its versatility, the need for human-curated and labeled data makes it impractical to transfer to new tasks, domains, and/or languages when training data doesn’t exist. Using the model without training (zero-shot) is another option that however suffers an effectiveness cost, especially in the case of first-stage retrievers. Numerous research directions have emerged to tackle these issues, most of them in the context of adapting to a task or a language. However, the literature is scarcer for domain (or topic) adaptation. In this paper, we address this issue of cross-topic discrepancy for a sparse first-stage retriever by transposing a method initially designed for language adaptation. By leveraging pre-training on the target data to learn domain-specific knowledge, this technique alleviates the need for annotated data and expands the scope of domain adaptation. Despite their relatively good generalization ability, we show that even sparse retrievers can benefit from our simple domain adaptation method. 1 1 Introduction Nowadays, most of the models that achieve state-of-the-art results in Natural Language Processing (NLP) rely on the ""pre-train then fine-tune"" pipeline [4, 22]. In this setup, a model is first trained with self-supervised objectives, such as Masked Language Modeling, on a large unlabeled corpus, before being finetuned on a labeled dataset for a specific task. In Information Retrieval (IR), this method has delivered huge improvements over the previous ""pre-BERT"" models and has given birth to a large variety of frameworks including, but not 1 This paper is a preprint that was accepted at ECIR 2024 1" 2401.11537v1,"A DDRESSING RESEARCHER DEGREES OF FREEDOM THROUGH MIN P ADJUSTMENT Maximilian M Mandl ∗1,5 , Andrea S Becker-Pennrich 1,2 , Ludwig C Hinske 2,3 , Sabine Hoffmann 4 , and Anne-Laure Boulesteix 1,5 1 Institute for Medical Information Processing, Biometry, and Epidemiology, Faculty of Medicine, LMU Munich, Germany 2 Department of Anaesthesiology, LMU University Hospital, LMU Munich, Germany 3 Institute for Digital Medicine, University Hospital of Augsburg, University of Augsburg, Germany 4 Department of Statistics, LMU Munich, Germany 5 Munich Center for Machine Learning (MCML), Germany A BSTRACT When different researchers study the same research question using the same dataset they may obtain different and potentially even conflicting results. This is because there is often substantial flexibility in researchers’ analytical choices, an issue also referred to as “researcher degrees of freedom”. Combined with selective reporting of the smallest p-value or largest effect, researcher degrees of freedom may lead to an increased rate of false positive and overoptimistic results. In this paper, we address this issue by formalizing the multiplicity of analysis strategies as a multiple testing problem. As the test statistics of different analysis strategies are usually highly dependent, a naive approach such as the Bonferroni correction is inappropriate because it leads to an unacceptable loss of power. Instead, we propose using the “minP” adjustment method, which takes potential test dependencies into account and approximates the underlying null distribution of the minimal p-value through a permutation-based procedure. This procedure is known to achieve more power than simpler approaches while ensuring a weak control of the family-wise error rate. We illustrate our approach for addressing researcher degrees of freedom by applying it to a study on the impact of perioperative paO 2 on post-operative complications after neurosurgery. A total of 48 analysis strategies are considered and adjusted using the minP procedure. This approach allows to selectively report the result of the analysis strategy yielding the most convincing evidence, while controlling the type 1 error—and thus the risk of publishing false positive results that may not be replicable. Keywords multiplicity · open science · replication crisis · researcher degrees of freedom · uncertainty ∗ e-mail: mmandl@ibe.med.uni-muenchen.de" 2401.11553v1,"The Version of Record of this manuscript has been published and is available in Expert Systems with Applications, Volume 122, pages 173–182, (2019) https://doi.org/10.1016/j.eswa.2019.01.001 Taxi Dispatching Strategies with Compensations Holger Billhardt a , Alberto Fernández a , Sascha Ossowski a , Javier Palanca b , and Javier Bajo c a Centre for Intelligent Information Technologies (CETINIA), Universidad Rey Juan Carlos, Móstoles 28933, Madrid, Spain (e-mail: holger.billhardt@urjc.es, alberto.fernandez@urjc.es, sascha.ossowski@urjc.es). b GTI-IA Research Group, Universitat Politècnica de Valencia, 40622 Valencia, Spain (e-mail: jpalanca@dsic.upv.es). c Department of Artificial Intelligence, Universidad Politécnica de Madrid, Spain (email: jbajo@fi.upm.es). Abstract Urban mobility efficiency is of utmost importance in big cities. Taxi vehicles are key elements in daily traffic activity. The advance of ICT and geo-positioning systems has given rise to new opportunities for improving the efficiency of taxi fleets in terms of waiting times of passengers, cost and time for drivers, traffic density, CO2 emissions, etc., by using more informed, intelligent dispatching. Still, the explicit spatial and temporal components, as well as the scale and, in particular, the dynamicity of the problem of pairing passengers and taxis in big towns, render traditional approaches for solving standard assignment problem useless for this purpose, and call for intelligent approximation strategies based on domain-specific heuristics. Furthermore, taxi drivers are often autonomous actors and may not agree to participate in assignments that, though globally efficient, may not be sufficently beneficial for them individually. This paper presents a new heuristic algorithm for taxi assignment to customers that considers taxi reassignments if this may lead to globally better solutions. In addition, as such new assignments may reduce the expected revenues of individual drivers, we propose an economic compensation scheme to make individually rational drivers agree to proposed modifications in their assigned clients. We carried out a set of experiments, where several commonly used assignment strategies are compared to three different instantiations of our heuristic algorithm. The results indicate that our proposal has the potential to reduce customer waiting times in fleets of autonomous taxis, while being also beneficial from an economic point of view. Keywords: Coordination, dynamic fleet management, dynamic optimization, multi-agent systems, open systems, taxi assignment. 1. Introduction Urban mobility is one of the main concerns that public managers face in big cities nowadays. Traffic congestions generate a high quantity of CO2 emissions and cause extra time spent by travelers. One of the main actors involved in the daily traffic activity in urban areas are taxi fleets. They consist of several thousands of vehicles in big cities (e.g. about 15,000 taxis in Madrid, Spain). They are usually affiliated to mediator services, which coordinate service calls and taxi dispatching. Lately, new mobility systems that benefit from the advances in information and communication technologies have emerged, such as Uber 1 , Lyft 2 or Liftago 3 among others. Two of the main goals of a taxi fleet are (i) to reduce the response time (e.g., the time between a customer call and the moment a taxi arrives at the customer’s location) and (ii) reduce costs of empty movements (e.g., movements taxis have to make in order to get to the location of customers). The provision of efficient methods for taxi assignment to customers is a challenge that can contribute to reducing distances of empty trips with the resulting decrease of traffic flow, pollution, time and so on. Typically, taxi fleet coordination companies apply the first-come first-serve strategy to assign taxis to customers. Once the taxi accepts the passenger, the dispatching is irreversible. This method is known to be inefficient (Egbelu & Tanchoco, 1984). 1 http://www.uber.com http://www.lyft.com 3 http://www.liftago.com 2" 2401.11568v1,"A note on the stability of Monotone Markov Chains Bar Light 1 January 23, 2024 Abstract: This note studies monotone Markov chains a subclass of Markov chains with extensive applications in operations research and economics. While the properties that ensure the global stability of these chains are well studied, their establishment often relies on the fulfillment of a certain splitting condition. We address the challenges of verifying the splitting condition, by introducing simple, applicable conditions that ensure global stability. The simplicity of these conditions is demonstrated through various examples including autoregressive processes and portfolio allocation problems. Keywords: Markov chains; Monotone Markov chains; Global stability. 1 School of Mathematical Sciences, Department of Statistics and Operations Research, Tel Aviv University, Israel. e-mail: barlight@tauex.tau.ac.il" 2401.11581v1,"Physical Origin of the Effective Parameters at Boundaries in Finite Difference Schemes Sameh Y. Elnaggar and Yahia M. M. Antar The Royal Military College of Canada, Email: S.Y.E (samehelnaggar@ieee.org), Y. M. M. A (antar-y@rmc.ca) z Abstract—Using the Observable form of Maxwell’s equations, we reveal that effective parameters at materials boundaries emerge naturally as anisotropic transfer functions. The complexity of the boundary dictates the order of these functions. Employing the residue-pole expansion, we describe the relation between field components as a system of ODEs solvable through the auxiliary differential equation approach. Not only can be used in Finite difference methods, the approach can be also employed to model complex surface structures. I. I NTRODUCTION Finite Difference (FD) approaches stand out as straightforward and intuitive methods for solving Maxwell’s equations and provide an excellent opportunity to introduce numerical methods to students. In the standard FD approach, the computational domain is discretized into staggered cells, known as Yee cells [1]. However, challenges arise when dealing with material objects that do not align perfectly with the cell faces. Sampling material parameters at cell centers, creating a staircase representation, is a common approach to model materials that, however, compromises solution accuracy. Various techniques have been proposed to address these limitations and better model material boundaries [2]–[4]. (For a comprehensive review, refer to Ref. [5].) However, many of these approaches appear (at first sight) mathematically complex, lack a direct connection to the underlying physics and hence make the introduction of the FD methods challenging to new students. In this article, we demonstrate that rigorously defining effective parameters at boundaries is achievable by adopting the observable formalism of Maxwell’s equations. Besides being easy to grasp, the observable formalism, as embraced by the authors [6] and discussed by other researchers [7], [8], offers an intuitive interpretation of finite difference methods. Furthermore, we present a straightforward procedure for describing effective parameters in the time domain using auxiliary differential equations. II. T HEORY z . Φ V x x (a) y y (b) Fig. 1: (a) Two staggered surfaces. E x is normal to the blue surface, which is at the same time tangential to one of the edges of the red surface. (b) Capacitance at face=Φ/V . primary purpose of a computational tool is to predict measurement results. In this context, the finiteness of a computational tool is regarded as a representation of the observable scale, rather than the underlying set of differential equations [8]. Maxwell’s equations lend themselves to an observable form, which reduces to the well-known differential form in the limit of infinitesimal dimensions. For example, the two circuital laws can be formulated in an observable form via the integration of the electromotive force (EMF) and magnetomotive force (MMF) over some time intervals [t 1 , t 2 ]: X X E = − (Ψ(t 2 ) − Ψ(t 1 )) , M = (Φ(t 2 ) − Φ(t 1 )) + Q f , P P where E ( M) represents the integration of the EMF (MMF) from t 1 to t 2 . Ψ(t) (Φ(t)) is the total magnetic (electric) flux crossing the surface at time t, and Q f is the total charge flowing through the surface over the time interval. It is noteworthy that the observable form allows for an intuitive interpretation of finite difference approaches and is linked to the physics [6]–[8]. A. Observable Formalism and Obsverable Quantities B. Observable effective parameters in Frequency Domain Material inclusion involves averaging over the microscopic scale to calculate macroscopic fields. This process spans dimensions large enough to encompass hundreds or thousands of atoms but remains infinitesimal from an observer’s standpoint. On the other hand, measurements are conducted using equipment that senses average quantities over a larger scale. A To establish a connection between the two circuital equations, a staggered configuration, as illustrated in Fig. 1, is implicitly assumed. It naturally leads to relating the electric flux (or its areal density hD x i s ) over the filled surface to the electromotive force (EMF) (or its linear density hE x i l ) along the line intersecting it. This relationship is a constitutive" 2401.11582v1,"Thermal Image Calibration and Correction using Unpaired Cycle-Consistent Adversarial Networks Hossein Rajoli, Pouya Afshin, Fatemeh Afghah Holcombe Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA Emails: hrajoli@clemson.edu, pafshin@clemson.edu, fafghah@clemson.edu Abstract—Unmanned aerial vehicles (UAVs) offer a flexible and cost-effective solution for wildfire monitoring. However, their widespread deployment during wildfires has been hindered by a lack of operational guidelines and concerns about potential interference with aircraft systems. Consequently, the progress in developing deep-learning models for wildfire detection and characterization using aerial images is constrained by the limited availability, size, and quality of existing datasets. This paper introduces a solution aimed at enhancing the quality of current aerial wildfire datasets to align with advancements in camera technology. The proposed approach offers a solution to create a comprehensive, standardized large-scale image dataset. This paper presents a pipeline based on CycleGAN to enhance wildfire datasets and a novel fusion method that integrates paired RGB images as attribute conditioning in the generators of both directions, improving the accuracy of the generated images. Index Terms—Wildfire management, image translation, GAN. I. I NTRODUCTION In recent years, due to climate changes, wildfire has emerged as a major area of research, drawing the attention of scholars worldwide. Researchers are focused on gaining a better understanding of the different types of wildfires, predicting their behavior, and incorporating fire-physics information to develop more effective strategies for fire management [1]. This increasing emphasis on wildfires is driven by their devastating impact on the natural environment and the global economy, resulting in significant financial losses and extensive damage to homes, businesses, wildlife, and the environment [2]. Advanced technologies such as drones improve fire management by offering swift deployment and adaptable imaging capabilities. Recent drone-based research focuses on solving various fire management challenges [3]–[7]. AI has become an indispensable technology in our daily lives, with numerous applications across various fields [8]–[11]. Within the realm of wildfire management, Deep Learning (DL) methods have taken precedence in existing aerial monitoring systems, providing a promising path for efficient wildfire assessment [12]. Leveraging DL techniques, these systems enable accurate flame detection [13], smoke characterization [14], and prediction of fire spread [15], marking a significant advancement in wildfire monitoring capabilities. However, while these systems rely heavily on visual processing through cameras, limitations in modern high-quality Infra-Red (IR) cameras pose challenges due to their high costs, distance restrictions, and lack of color information [16]. This material is based upon work supported by the Air Force Office of Scientific Research under award number FA9550-20-1-0090, the National Aeronautics and Space Administration (NASA) under award number 80NSSC23K1393, and the National Science Foundation under Grant Numbers CNS-2232048, and CNS-2204445. Obtaining comprehensive datasets is vital for the effectiveness of DL-based methods. However, the collection of dronebased fire data poses challenges in terms of cost and logistics. Existing datasets, collected by different cameras [5], [17], may exhibit variations in image quality that do not align with desired standards. This study addresses this issue by developing a pipeline that enhances existing datasets, aiming to create a unified large-scale image dataset that meets the benchmarks set by newer datasets collected with advanced cameras, known for their reduced artifacts and minimized drone wobbling. This enhancement facilitates streamlined data integration, fostering the creation of cohesive and consolidated datasets crucial for advancing DL-based methods. The proposed approach serves as a practical solution to overcome challenges associated with aerial data collection. Innovative contributions in image-to-image translation, specifically in Generative Adversarial Network (GAN) frameworks, presents potential directions for this purpose [12], [18]. These techniques offer a potential path to improve wildfire monitoring and temperature analysis by enhancing existing datasets. While previous studies focused on fusion-related research for infrared images, specifically thermal images [19], none have explicitly aimed to bridge the quality and standardrelated gap between new high-tech images and existing datasets by upgrading them. In this paper, we proposed a fire image calibration model based on CycleGAN noting its promising performance in different image-to-image translation tasks, its robustness to domain shifts in the data, and its ability to perform image translation without the need for paired training data. The contributions of this work are summarized as follows: A non-symmetric paired generator based on CycleGAN is developed for IR fire image calibration that can be used to enhance wildfire datasets, bringing them up to the standards of high-tech quality tools. • A novel multi-level architecture is proposed for generators, which enhances qualitative performance by injecting local features from various-level receptive fields into the global features pool. • A novel upsampling method is offered that can preserve the target domain resolution utilizing flexible convolution. • The subsequent sections of this paper are organized as follows. Section 2 provides an overview of the existing literature concerning image translation. Section 3 details the proposed framework, encompassing the network architecture, loss functions, and the training process. Section 4 presents and analyzes the experimental outcomes." 2401.11593v1,"ON THE STABILITY OF SECOND ORDER PARAMETRIC ORDINARY DIFFERENTIAL EQUATIONS AND APPLICATIONS Z. MAZGOURI 1,∗ , A. EL AYOUBI 2 1 Applied Mathematics Engineering Department, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Laboratory LAMA, 30000 Fez, Morocco 2 Department of Mathematics, Faculty of Sciences, Chouaib Doukkali University, El Jadida Morocco Abstract. This work deals with Lipschitz stability for a parametric version of the general second order Ordinary Differential Equation (ODE) initial-value Cauchy problem. We first establish a Lipschitz stability result for this problem under a partial variation of the data. Then, we apply our abstract result to second order differential equations governed by cocoercive operators. Furthermore, we discuss more concrete applications of the stability for two specific applied mathematical models inherent in electricity and control theory. Finally, we provide numerical tests based on the software source Scilab, which are done with respect to parametric linear control systems, illustrating henceforth the validity of our abstract theoretical result. Keywords. Cauchy problem; Differential equation initial-value problem; Parametric perturbation; Lipschitz stability; Perov inequality. 2020 Mathematics Subject Classification. 47D09, 34A12, 34D10, 34D20. 1. I NTRODUCTION Throughout this paper, unless otherwise is specified, the Euclidian space R n is equipped with the supremum norm ∥.∥. We denote by B(x 0 , r) the open ball of radius r > 0 centered at x 0 ∈ R n . Let T > 0 and ẋ 0 ∈ R n and let f : [0, T ] × B(x 0 , r) × B( ẋ 0 , r) −→ R n be a given function. We consider the following second order ordinary differential equation (ODE) initial-value Cauchy problem:    ẍ(t) = f (t, x(t), ẋ(t)), for a.e t ∈ [0, T ] S( f , x 0 , ẋ 0 ) x(0) = x 0 (1.1)   ẋ(0) = ẋ 0 , where T stands for the final time of the interval of interest and (x 0 , ẋ 0 ) ∈ R 2n is the initial-value condition. It is well known that the mathematical formulation of second order ODE plays a central role in modelling a variety of interesting problems inherent in optimal control systems, mechanics and quantum mechanics, dynamical systems subject to classical mechanical laws, damped simple harmonic motion, the motion of a particle in one dimensional box besides standard concrete applications to electric circuits, the charge of capacitors in related RLC series and many ∗ Corresponding author. E-mail addresses: zakariam511@gmail.com (Z. Mazgouri), abdellatifel2014@gmail.com (A. El Ayoubi). Received ; Accepted 1" 2401.11594v1,"On non-stability of one-dimensional non-periodic ground states Damian G lodkowski Institute of Mathematics Polish Academy of Sciences Śniadeckich 8, 00-656 Warsaw, Poland d.glodkowski@uw.edu.pl Jacek Miȩkisz Institute of Applied Mathematics and Mechanics University of Warsaw Banacha 2, 02-097 Warsaw, Poland miekisz@mimuw.edu.pl January 23, 2024 Abstract We address the problem of stability of one-dimensional non-periodic groundstate configurations with respect to finite-range perturbations of interactions in classical lattice-gas models. We show that a relevant property of non-periodic ground-state configurations in this context is their homogeneity. The so-called strict boundary condition says that the number of finite patterns of a configuration have bounded fluctuations on any finite subsets of the lattice. We show that if the strict boundary condition is not satisfied, then in order for non-periodic ground-state configurations to be stable, interactions between particles should not decay faster than 1/r α with α > 2. In the Thue-Morse ground state, number of finite patterns may fluctuate as much as the logarithm of the lenght of a lattice subset. We show that the Thue-Morse ground state is unstable for any α > 1 with respect to arbitrarily small two-body interactions favoring the presence of molecules consisting of two spins up or down. We also investigate Sturmian systems defined by irrational rotations on the circle. They satisfy the strict boundary condition but nevertheless they are unstable for α > 3. 1" 2401.11603v1,"This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics 1 Rotational Taylor dispersion in linear flows Zhiwei Peng† Department of Chemical and Materials Engineering, University of Alberta, Edmonton, Alberta T6G 1H9, Canada (Received xx; revised xx; accepted xx) The coupling between advection and diffusion in position space can often lead to enhanced mass transport compared to diffusion without flow. An important framework used to characterize the long-time diffusive transport in position space is the generalized Taylor dispersion theory. In contrast, the dynamics and transport in orientation space remains less developed. In this work, we develop a rotational Taylor dispersion theory that characterizes the long-time orientational transport of a spheroidal particle in linear flows that is constrained to rotate in the velocity-gradient plane. Similar to Taylor dispersion in position space, the orientational distribution of axisymmetric particles in linear flows at long times satisfies an effective advection-diffusion equation in orientation space. Using this framework, we then calculate the long-time average angular velocity and dispersion coefficient for both simple shear and extensional flows. Analytic expressions for the transport coefficients are derived in several asymptotic limits including nearly-spherical particles, weak flow, and strong flow. Our analysis shows that at long times the effective rotational dispersion is enhanced in simple shear and suppressed in extensional flow. The asymptotic solutions agree with full numerical solutions of the derived macrotransport equations and results from Brownian dynamics simulations. Our results show that the interplay between flow-induced rotations and Brownian diffusion can fundamentally change the long-time transport dynamics. Key words: colloids, suspensions 1. Introduction Transport and mixing of solutes or particles in the presence of hydrodynamics flows are important for various biological and industrial processes. For micron-sized particles immersed in flows, the coupling between advection and diffusion can often lead to enhanced mass transport as compared to diffusion without flow. A classical example of such a coupling effect is the Taylor dispersion of Brownian solutes in pressure-driven channel flows (Taylor 1953, 1954a,b; Aris 1956). Brownian motion allows the solute particles to migrate across streamlines, and then be advected downstream with different velocities. At long times, the coupling between transverse diffusion and longitudinal advection gives rise to diffusive transport of the solutes with an effective longitudinal dispersion coefficient that can be much larger than the bare diffusivity of the solute particle. Since the work of Taylor (1953), a generalized Taylor dispersion (GTD) framework (Frankel & Brenner 1989) has been developed to accommodate a wide range of transport problems including complex geometries, chemical reactions, spatial and/or time periodicity, and active particles (Brenner † Email address for correspondence: zhiwei.peng@ualberta.ca" 2401.11611v1,"Published as a conference paper at ICLR 2024 C ONTINUOUS F IELD R ECONSTRUCTION FROM S PARSE O BSERVATIONS WITH I MPLICIT N EURAL N ETWORKS Xihaier Luo, Wei Xu, Yihui Ren, Shinjae Yoo Brookhaven National Laboratory {xluo,xuw,yren,sjyoo}@bnl.gov Balasubramanya Nadiga Los Alamos National Laboratory {balu}@lanl.gov A BSTRACT Reliably reconstructing physical fields from sparse sensor data is a challenge that frequently arises in many scientific domains. In practice, the process generating the data often is not understood to sufficient accuracy. Therefore, there is a growing interest in using the deep neural network route to address the problem. This work presents a novel approach that learns a continuous representation of the physical field using implicit neural representations (INRs). Specifically, after factorizing spatiotemporal variability into spatial and temporal components using the separation of variables technique, the method learns relevant basis functions from sparsely sampled irregular data points to develop a continuous representation of the data. In experimental evaluations, the proposed model outperforms recent INR methods, offering superior reconstruction quality on simulation data from a stateof-the-art climate model and a second dataset that comprises ultra-high resolution satellite-based sea surface temperature fields. 1 I NTRODUCTION Achieving accurate and comprehensive representation of complex physical fields is pivotal for tasks spanning system monitoring and control, analysis, and design. However, in a multitude of applications, encompassing geophysics (Reichstein et al., 2019), astronomy (Gabbard et al., 2022), biochemistry (Zhong et al., 2021), fluid mechanics (Deng et al., 2023), and others, using a sparse sensor network proves to be the most practical and effective solution. In meteorology and oceanography, variables such as atmospheric pressure, temperature, salinity/humidity, and wind/current velocity must be reconstructed from sparsely sampled observations. Currently, two distinct approaches are used to reconstruct full fields from sparse observations. Traditional physics model-based approaches are based on partial differential equations (PDEs). These approaches draw upon theoretical techniques to derive PDEs rooted in conservation laws and fundamental physical principles (Hughes, 2012). Yet, in complex systems such as weather (Brunton et al., 2016) and epidemiology (Massucci et al., 2016), deriving comprehensive models that are both sufficiently accurate and computationally efficient remains elusive. Moreover, integrating field data into these derived PDEs for validation and calibration poses significant challenges (Raissi et al., 2019). Concurrently, machine-learning-based approaches emerge as an alternative avenue for nonlinear field reconstruction (Mescheder et al., 2019; Sitzmann et al., 2020; Mildenhall et al., 2021). In contrast to standard image and video data, scientific data describing complex physical systems present unique challenges. For example, sparse seismic networks (sparse spatial coverage) can lead to smaller earthquakes being unnoticed or their epicenters being misestimated (Myers & Schultz, 2000). Meanwhile, fluid dynamics in turbulent flows, an example of high nonlinearity, exhibit nonlinear behavior due to interactions between vortices and eddies (Stachenfeld et al., 2021). Other examples include sensor mobility, e.g., ocean waves and currents that transport floating buoys (Rodrigues et al., 2021), and on-off dynamics, e.g., cloud cover impacting solar panels that cause power fluctuations and grid instability (Paletta et al., 2022). These factors are driving the advancement of novel machine learning models, aiming to enhance and refine current approaches for field reconstruction. In this work, we introduce the first implicit neural representation (INR)-based model for global field reconstruction of scientific data from sparse observations with the following contributions: 1" 2401.11614v1,"Technical Article August 2016. Lightweight Self-Driven Deformable Organ Animations Lightweight Self-Driven Deformable Organ Animations Autonomous Procedural Rhythmic Tissue Ben Kenwright Southampton Solent University School of Media Arts and Technology United Kingdom benjamin.kenwright@solent.ac.uk Kanida Sinmai Thaksin University Department of Computer and Information Technology Thailand kanida@tsu.ac.th Abstract—The subject of simulating internal organs is a valuable and important topic of research to multiple fields from medical analysis to education and training. This paper presents a solution that utilizes a graphical technique in combination with a Stochastic method for tuning an active physics-based model. We generate responsive interactive organ animations with regional properties (i.e., areas of the model oscillating with different harmonic frequencies) to reproduce and capture real-world characteristics. Our method builds upon biological and physical discoveries to procedurally generate internally controlled rhythmic motions but also enable the solution to be interactive and adaptive. We briefly review deformation models for medical simulations and investigate the impediments to combining ‘computer-graphics’ representations with biomechanical models. Finally, we present a lightweight solution that is scalable and able to procedurally generate large organ animations. In particular, simplified geometric representations of deformable structures that use periodic coupled forces to drive themselves. Keywords-animation, soft-bodies, rhythmic, internal, organs, medical, oscillatory, real-time, biomechanics, computer graphics, tissue, autonomous, motions, self-driven, physics-based, tunable, customizable I. I NTRODUCTION Simulating Large Internal Organs A virtual system for visualizing the properties of large internal organs (e.g., lungs, heart, and kidneys) would facilitate a safe and efficient training tool. This tool would allow surgical trainees a virtual medium to visualize and repeatedly perform surgical procedures on a wide variety of cases. For instance, the influence of external disturbances during surgical procedures on the organ’s elastic tissue properties or oscillatory signal patterns. Hence, a simulation solution that is able to capture these physical-properties while being interactive and dynamic would be valuable and important. Not to mention, the ability to customize the virtual simulation to different situations (e.g., sizes and signal patterns). Of course, the creation of plausible tissue deformation animations requires the combination of a variety of techniques (e.g., physicallaws and numerical simulation concepts). While biomechan- ical research has developed detailed mathematical models to produce large amounts of experimental data that accurately representing these soft tissue deformations, we on the other hand follow a lightweight graphical method, for real-time computation of the animations by simplifying the structure based on low-dimensional approximations (e.g., ignoring intricate internal structures and vessels, blood flow and pressure, twisting and stretching of internal flesh) [1, 2]. Physical Complexity A low-dimensional model reduces the computational bottleneck while allowing the reproduction of correlating data. As the body’s internal organs (e.g., heart and lungs) are complex systems (that perform a large number of activities) and would be difficult, if not impossible, to simulate in all their glory. For example, our heart is both incredibly powerful and delicate, the muscles in a typical human heart are able to create enough energy to drive a truck for 20 miles and keep beating even if it is separated from the body because it has its own electrical impulse signals (see Figure 6). These internal organs are driven by an assortment of physical-properties, such as, conservation of energy, coupled interaction, and fluid mechanics (flow and pressure). Not to mention, the organs have internal muscles that contract and expand in rhythmic oscillatory patterns (coordinated synergistic motion to achieve optimal performance while conserving energy). To capture these life-like characteristics while being physically correct and interactive is an interesting and challenging problem that we address by focusing on a specific component (i.e., animation). Deformable Models The muscles and organs in our body are soft-body mechanisms. This is made easier, knowing the fact that, during the past decade many researchers have contributed to the forefront of deformable 3D objects research [3, 4] and cloth animation systems [5, 6]. These techniques originally developed in other areas have been exploited in the medical and biological field - enabling the synthesize of physical attributes seen in real-world flesh and muscle. While a number of these techniques are" 2401.11638v1,"Chiral perturbation theory with vector mesons and the pion form factors Tae-Sun Park Center for Exotic Nuclear Studies, Institute for Basic Science, Daejeon 34126, Korea Abstract The chiral perturbation theory (ChPT) of pions is extended to include vector mesons as well as pertinent degrees of freedom. By counting the typical momentum scale of vector mesons as order of Q and vector meson masses as of order of Λ χ , a consistent theory could be obtained. The explicit renormalization procedure of the theory is presented for the form factors of the pion up to one-loop accuracy. The resulting theory prediction for the form factors is in good agreement with the experimental data for a wide range of momentum transfers. The vector-meson dominance mechanism is also discussed in the systematic framework of ChPT. Keywords: chiral perturbation theory, vector mesons, pion form factor 1. Introduction Chiral perturbation theory (ChPT) [1, 2, 3, 4, 5] is a well-proven lowenergy effective field theory (EFT) of QCD, and usually consists of only pions and nucleons (for the cases where Delta(1232) isobars are also included, see, for example, Refs. [6, 7, 8]). All other massive degrees of freedom are integrated out. Integrating out heavy fields is one of the key aspects that make ChPT a consistent and powerful expansion scheme with respect to powers of Q/Λ χ , where Q stands for the typical momentum scale of the process and/or the pion mass, which is treated as “light” compared to the chiral scale Λ χ ≃ 4πf π ≃ 1 GeV. Promoting some of those integrated-out fields as pertinent degrees of freedom corresponds to a reassessment of a certain class of contributions, and Email address: tspark@ibs.re.kr (Tae-Sun Park) Preprint submitted to Elsevier January 23, 2024" 2401.11643v1,"The Astrophysical Journal, 960:51 (19pp), 2024 January 1 https://doi.org/10.3847/1538-4357/ad03eb © 2023. The Author(s). Published by the American Astronomical Society. Coronal Heating and Solar Wind Generation by Flux Cancellation Reconnection 1 D. I. Pontin 1 , E. R. Priest 2 , L. P. Chitta 3 , and V. S. Titov 4 School of Information and Physical Sciences, University of Newcastle, Callaghan, NSW 2308, Australia; david.pontin@newcastle.edu.au 2 School of Mathematics and Statistics, University of St Andrews, St Andrews, KY16 9SS, UK 3 Max Planck Institute for Solar System Research, Justus-von-Liebig-Weg 3, D-37077, Göttingen, Germany 4 Predictive Science Inc., 990 Mesa Rim Road, Suite 170, San Diego, CA 92121, USA Received 2023 August 4; revised 2023 October 5; accepted 2023 October 15; published 2023 December 21 Abstract In this paper, we propose that flux cancellation on small granular scales (1000 km) ubiquitously drives reconnection at a multitude of sites in the low solar atmosphere, contributing to chromospheric/coronal heating and the generation of the solar wind. We analyze the energy conversion in these small-scale flux cancellation events using both analytical models and three-dimensional, resistive magnetohydrodynamic (MHD) simulations. The analytical models—in combination with the latest estimates of flux cancellation rates—allow us to estimate the energy release rates due to cancellation events, which are found to be on the order 10 6 –10 7 erg cm −2 s −1 , sufficient to heat the chromosphere and corona of the quiet Sun and active regions, and to power the solar wind. The MHD simulations confirm the conversion of energy in reconnecting current sheets, in a geometry representing a smallscale bipole being advected toward an intergranular lane. A ribbon-like jet of heated plasma that is accelerated upward could also escape the Sun as the solar wind in an open-field configuration. We conclude that through two phases of atmospheric energy release—precancellation and cancellation—the cancellation of photospheric magnetic flux fragments and the associated magnetic reconnection may provide a substantial energy and mass flux contribution to coronal heating and solar wind generation. Unified Astronomy Thesaurus concepts: Solar coronal heating (1989); Solar chromospheric heating (1987); Solar magnetic reconnection (1504); Solar wind (1534); Solar physics (1476); Solar magnetic fields (1503) resolution of 0 15 and revealed magnetic flux emerging and canceling on granular scales. Smitha et al. (2017) tracked magnetic features in the quiet Sun with fluxes of 10 15 –10 18 Mx and discovered a flux emergence and cancellation rate an order of magnitude higher than previous estimates, namely, 1100 Mx cm −2 day −1 . Reconnection driven by magnetic flux cancellation has long been associated with a wide range of phenomena, such as X-ray bright points (Martin et al. 1985; Priest et al. 1994; Archontis & Hansteen 2014) and X-ray jets (Shibata et al. 1992; Shimojo et al. 2007) in the corona; Hα Ellerman bombs in the low chromosphere near sunspots or in the quiet Sun (Rouppe van der Voort et al. 2016; Hansteen et al. 2017); UV bursts in the active-region chromosphere (Peter & Dwivedi 2014); and explosive events in the transition region (Brueckner & Bartoe 1983; Innes et al. 1997). However, it is only with the realization from SUNRISE that flux cancellation is much more common that it has been thought to be a viable mechanism for heating the whole corona (Priest et al. 2018), and this is supported by a range of other observations. There are clear examples of flux cancellation triggering brightening in coronal loops (Tiwari et al. 2014; Huang et al. 2018), some in an active region associated also with a UV burst and bidirectional jets (Chitta et al. 2017b). Furthermore, flux cancellation in regions of complex mixed polarity has been observed in association with brightenings in the cores of active regions (Chitta et al. 2018, 2020). Also, evidence has been presented that most of the small-scale campfires are formed by magnetic reconnection driven by flux cancellation (Panesar et al. 2021), which occurs either between two main footpoints of a bipolar feature or between one of those footpoints and a nearby magnetic fragment of opposite polarity (Kahil et al. 2022). 1. Introduction Recent observations from the Solar Orbiter and Parker Solar Probe missions have shed new light on the important role of small-scale magnetic reconnection in coronal heating and in the generation of the solar wind. Reconnection is thought to produce two newly identified phenomena. The first are smallscale extreme ultraviolet (EUV) brightenings termed “camp- fires” in the low corona at heights of 1000–5000 km above the solar surface (Berghmans et al. 2021; Zhukov et al. 2021). The second, observed far from the solar surface out in the solar wind, are ubiquitous apparent reversals of the radial magnetic field, termed “switchbacks,” with potential origins from supergranular- to granular-scale reconnection dynamics in the low corona (Bale et al. 2021, 2023). Reconnection between closed–closed or closed–open magnetic fields are commonly invoked drivers of both the campfires and switchbacks (Chen et al. 2021; Tripathi et al. 2021; Raouafi et al. 2023). Here, we propose a unified model (Figure 1) for coronal heating and solar wind generation that builds on these recent studies. We suggest that flux cancellation on small granular scales of 1000 km (Smitha et al. 2017) ubiquitously drives reconnection at a multitude of sites. This work extends previous studies by analyzing flux cancellation reconnection in detail, including the release of energy and its dependence on the fluxes involved. Importantly, photospheric flux cancellation is now known to be very much more common than thought previously. Observations from the SUNRISE balloon mission (Solanki et al. 2017) revealed the photospheric magnetic field at a spatial Original content from this work may be used under the terms of the Creative Commons Attribution 4.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. 1" 2401.11645v1,"STREAMING BILINGUAL END-TO-END ASR MODEL USING ATTENTION OVER MULTIPLE SOFTMAX Aditya Patil 1 , Vikas Joshi, Purvi Agrawal, Rupesh Mehta adityapatil@umass.edu Microsoft Corporation, India {vikas.joshi, agrawalpurvi, rupesh.mehta}@microsoft.com ABSTRACT Even with several advancements in multilingual modeling, it is challenging to recognize multiple languages using a single neural model, without knowing the input language and most multilingual models assume the availability of the input language. In this work, we propose a novel bilingual end-to-end (E2E) modeling approach, where a single neural model can recognize both languages and also support switching between the languages, without any language input from the user. The proposed model has shared encoder and prediction networks, with language-specific joint networks that are combined via a self-attention mechanism. As the language-specific posteriors are combined, it produces a single posterior probability over all the output symbols, enabling a single beam search decoding and also allowing dynamic switching between the languages. The proposed approach outperforms the conventional bilingual baseline with 13.3%, 8.23% and 1.3% word error rate relative reduction on Hindi, English and code-mixed test sets, respectively. Index Terms— bilingual ASR, self-attention, RNN-T, end-to-end, streaming ASR. 1. INTRODUCTION Conversations among humans often involve using more than one language (multilingual) and mixing one language with another (code-mixing). The phenomenon is more predominant in multilingual regions like southern Asia where codemixing and code-switching is observed in many scenarios including call center conversations, voice assistants and others. Also, with increasing adoption of voice assistants, users now expect a truly multilingual experience, where they can interact with voice assistants in any language, interchangeably, without explicitly setting the language of the conversation. Therefore, addressing the problem of multilingual and code-mixed speech recognition is increasingly becoming important. With the increasing demand of voice assistants in gadgets, the on-device ASR models are becoming popular as they alleviate the privacy concerns, can work without internet connectivity, and have low latency. However, providing a truly 1 The work was done when Aditya was working at Microsoft 978-1-6654-7189-3/22/$31.00 ©2023 IEEE multilingual experience or handling code-mixing is especially challenging for on-device models. In the conventional hybrid systems, multilingual experience is provided by having multiple monolingual models in tandem and choosing the output of one of these models based on the decision of the language identifier (LID) [1]. Such an approach is not feasible for ondevice models as the model size increases with the number of languages, while most of the on-device applications demand ASR models to have small memory footprint often restricted to 50 − 100Mb. Moreover, such an approach is unable to handle code-mixed utterances effectively. Another approach to do multi-lingual modeling is by simply pooling data and symbols from multiple languages and training the model [2]. However, such a model has inferior performance compared to their monolingual counterparts, as reported in [1, 3]. A prior effort in this direction proposed a MultiSoftmax model to improve the on-device recurrent neural network transducer (RNN-T) model performance, by having language-specific softmax, joint and embedding layers, while sharing rest of the parameters [1]. The authors also extended the MultiSoftmax model to work without knowing the input language, by integrating a language identification (LID) model, that estimates the LID on-the-fly and also does the recognition at the same time. Such class of multilingual models that do not require language input apriori are referred to as LID-free multilingual models. However, the LID-free MultiSoftmax model have the following two drawbacks: • Needs multiple beam search decoding (one per language) to be run in tandem, making it computationally expensive. • Does not support code-mixed speech recognition as separate beam search is run for each language and there is no mechanism to switch from one language to another. In this work, we propose a novel on-device bilingual model, with a single beam search that can recognize both languages and also support switching/mixing between the languages. This is achieved without any language input from the user and hence is a LID-free model. We propose multiple softmax with attention model with the following key" 2401.11656v1,"Agent-Based Modeling of C. Difficile Spread in Hospitals: Assessing Contribution of High-Touch vs. Low-Touch Surfaces and Inoculations’ Containment Impact Sina Abdidizaji 1 , Ali Khodabandeh Yalabadi 1 , Mehdi Yazdani-Jahromi 2 , Ozlem Ozmen Garibay 1 , and Ivan Garibay 1 1 Industrial Engineering and Management Systems, University of Central Florida, Orlando FL 32816, USA 2 Computer Science, University of Central Florida, Orlando FL 32816, USA {sina.abdidizaji, yalabadi, yazdani, ozlem, igaribay}@ucf.edu Abstract. Health issues and pandemics remain paramount concerns in the contemporary era. Clostridioides Difficile Infection (CDI) stands out as a critical healthcare-associated infection with global implications. Effectively understanding the mechanisms of infection dissemination within healthcare units and hospitals is imperative to implement targeted containment measures. In this study, we address the limitations of prior research by Sulyok et al., where they delineated two distinct categories of surfaces as high-touch and low-touch fomites, and subsequently evaluated the viral spread contribution of each surface utilizing mathematical modeling and Ordinary Differential Equations (ODE). Acknowledging the indispensable role of spatial features and heterogeneity in the modeling of hospital and healthcare settings, we employ agent-based modeling to capture new insights. By incorporating spatial considerations and heterogeneous patients, we explore the impact of high-touch and low-touch surfaces on contamination transmission between patients. Furthermore, the study encompasses a comprehensive assessment of various cleaning protocols, with differing intervals and detergent cleaning efficacies, in order to identify the most optimal cleaning strategy and the most important factor amidst the array of alternatives. Our results indicate that, among various factors, the frequency of cleaning intervals is the most critical element for controlling the spread of CDI in a hospital environment. Keywords: Clostridioides Difficile Infection · agent-based modeling · high-touch surfaces · low-touch surfaces · cleaning strategies 1 Introduction In the contemporary landscape, combating pandemics and health-related challenges necessitates a profound comprehension of contamination transmission and the implementation of appropriate intervention measures to curb infection" 2401.11684v1,"Generating magnon Bell states via parity measurement Jia-shun Yan 1 and Jun Jing 1, ∗ 1 School of Physics, Zhejiang University, Hangzhou 310027, Zhejiang, China (Dated: January 23, 2024) We propose a scheme to entangle two magnon modes based on parity measurement. In particular, we consider a system that two yttrium-iron-garnet spheres are coupled to a V -type superconducting qutrit through the indirect interactions mediated by cavity modes. An effective parity-measurement operator that can project the two macroscopic spin systems to the desired subspace emerges when the ancillary qutrit is projected to the ground state. Consequently, conventional and multi-excitation magnon Bell states can be generated from any separable states with a nonvanishing population in the desired subspace. The target state can be distilled with a near-to-unit fidelity only by several rounds of measurements and can be stabilized in the presence of decoherence. In addition, a singleshot version of our scheme is obtained by shaping the detuning in the time domain. Our scheme that does not rely on any nonlinear effect brings insight to the entangled-state generation in massive ferrimagnetic materials via quantum measurement. I. INTRODUCTION As a promising candidate for quantum control, quantum measurement is highly efficient in holding the measured system at an eigenstate or in a subspace [1] and engineering the system to the target states [2–5]. A projective measurement or postselection on the ancillary system could give rise to a positive operator-valued measure (POVM) on the target system [6], which was used to cool down a resonator to its ground state [7–11] or prepare a high-ergotropy state [12, 13]. A popular kind of projective measurement in quantum error correction [14, 15] is called parity measurement [16]. On mapping the parity information of the interested system to the ancillary system, parity measurement can be used to entangle double or multiple qubits [17–19]. In continuous-variable systems, schemes based on parity measurement were proposed to detect quantum states in the Wigner representation without use of tomographic reconstruction [20– 22] and test the Einstein-Podolsky-Rosen state for the Bell’s inequality violation [23]. It is not clear, however, whether or not parity measurement is efficient in generating a highly entangled state rather than witnessing the entanglement in continuous-variable systems or even macroscopic quantum systems. Quantum magnonics is a rapidly advancing field for a macroscopic quantum system that attracts a significant amount of attention [24–26]. By virtue of the magnon to couple with microwave photons [27–30], mechanical phonons [31, 32], and superconducting qubits [33–35], the hybrid magnonic systems become excellent platforms to investigate macroscopic nonclassical states and even entangled states, which are potential resources for diverse quantum technologies. In generating entanglement of magnonic systems, conventional schemes centred around nonlinear Hamiltonian or external nonlinear effect. A microwave field in the squeezed vacuum state ∗ Email address: jingjun@zju.edu.cn can be used to prepare an entangled magnon pair inside a common cavity [36] or across two cavities [37]. Magnon Kerr effect [38], magnetostrictive effect [39], magneto-optical effects [40], and anti-ferromagnetic couplings [41, 42] are also meaningful to witness magnon entanglement measured by logarithmic negativity. Recently, a single-photon state is distilled from the unwanted vacuum and two-photon components with parity measurement induced by detecting a desired atomic state [43]. It inspires us to create magnon Bell states by suppressing the populations in subspaces with a distinct parity from the target state. In this work, we transform two magnon modes from separable states to entangled states via effective parity measurement. In our system, two yttrium-iron-garnet (YIG) spheres (macroscopic spin systems) and a V -type three-level atom are placed in a common two-mode cavity. Each cavity mode interacts individually with one magnon mode and one of the atomic transitions, that builds up the effective coupling between magnons and atom in the dispersive regime. Repeatedly projecting the ancillary atom onto its ground state induces parity measurement on the magnon modes. If the initial state of the magnon modes has a nonvanishing population in the subspace with a desired parity, then the induced parity measurement can create a magnon Bell state. Our scheme demonstrates robustness against decoherence in preparing and stabilizing the Bell state with a high fidelity. Also it can be optimized to be a single-shot version adapting to a limited lifetime of the magnons. The rest of this paper is structured as follows. In Sec. II A, we briefly recall the mechanism about preparing a qubit Bell state by parity measurement. And in Sec. II B, we provide a detailed derivation about the indirect couplings between the magnons and the ancillary atom mediated by cavity modes. Then an effective parity-measurement operator is constructed on the magnon modes. In Sec. III A and Sec. III B, a magnon Bell state is generated from a separable superposed state and a separable coherent state, respectively. In Sec. IV, we present a single-shot measurement scheme. Finally," 2401.11697v1,"A risk-based approach to assessing liability risk for AI-driven harms considering EU liability directive Self-assessment of liability risk for AI-driven harms Sundaraparipurnan N, University of Bordeaux, sundar.narayanan@aitechethics.com Mark Potkewitz, BROOKLYN LAW SCHOOL, mark.potkewitz@brooklaw.edu Abstract Artificial intelligence (AI) can cause inconvenience, harm, or other unintended consequences in various ways, including those that arise from defects or malfunctions in the AI system itself or those caused by its use or misuse. Responsibility for AI harms or unintended consequences must be addressed to hold accountable the people who caused such harms and ensure that victims are made whole concerning any damages or losses they may have sustained. Historical instances of harm caused by AI have led to the EU establishing an AI liability directive. This directive aims to lay down a uniform set of rules for access to information, delineate the duty and level of care required for AI development and use, and clarify the burden of proof for damages or harms caused by AI systems, establishing broader protection for victims. The future ability of the provider to contest a product liability claim will rely on good practices adopted in designing, developing, deploying, and maintaining AI systems in the market. This paper provides a risk-based approach to examining liability for AI-driven injuries. It also provides an overview of existing liability approaches, insights into limitations and complexities in these approaches, and a detailed selfassessment questionnaire to assess the risk associated with liability for a specific AI system from a provider’s perspective. CCS CONCEPTS • AI_harms • liability • risk 1 I NTRODUCTION Using AI alongside other technologies, we could enable machines to make decisions faster than humans and perform actions more quickly. AI-based systems can also make more objective, consistent, and trustworthy decisions than humans. Artificial intelligence (AI), which has the potential to generate value and create risks, has seen its potential exponentially increase in recent years. AI systems’ characteristics include complexity, transparency, and autonomy during operation. Currently, AI systems operate autonomously and will continue to do so. This means that it is essential to provide incentives for human participants in AI systems so they can reduce AI-related harm [1]. Artificial intelligence can cause harm in various ways, including those arising out of defects or malfunctions in the AI system itself or the unintended consequences of its use. Without the appropriate safeguards, AI can exercise or exacerbate racial or gender-and-sex-based biases, social discrimination, human job losses, and, in extreme cases, physical harm. Responsibility for AI injuries and harms is essential to ensure that the people who caused them are held accountable and that victims receive compensation for any damages or losses they may have sustained. Historical instances of harm caused by AI have led to the European Union (EU) establishing an AI liability directive. Manufacturers and sellers may not be motivated to ensure that AI products are reliable and safe for consumers or end-users. Victims may only have limited recourse to seek compensation." 2401.11713v1,"PREPRINT, VOL. XX, NO. XX, XXXX 2024 Medical Image Debiasing by Learning Adaptive Agreement from a Biased Council Luyang Luo, Member, IEEE, Xin Huang, Minghao Wang, Zhuoyue Wan, and Hao Chen, Senior Member, IEEE Abstract— Deep learning could be prone to learning shortcuts raised by dataset bias and result in inaccurate, unreliable, and unfair models, which impedes its adoption in real-world clinical applications. Despite its significance, there is a dearth of research in the medical image classification domain to address dataset bias. Furthermore, the bias labels are often agnostic, as identifying biases can be laborious and depend on post-hoc interpretation. This paper proposes learning Adaptive Agreement from a Biased Council (Ada-ABC), a debiasing framework that does not rely on explicit bias labels to tackle dataset bias in medical images. Ada-ABC develops a biased council consisting of multiple classifiers optimized with generalized cross entropy loss to learn the dataset bias. A debiasing model is then simultaneously trained under the guidance of the biased council. Specifically, the debiasing model is required to learn adaptive agreement with the biased council by agreeing on the correctly predicted samples and disagreeing on the wrongly predicted samples by the biased council. In this way, the debiasing model could learn the target attribute on the samples without spurious correlations while also avoiding ignoring the rich information in samples with spurious correlations. We theoretically demonstrated that the debiasing model could learn the target features when the biased model successfully captures dataset bias. Moreover, to our best knowledge, we constructed the first medical debiasing benchmark from four datasets containing seven different bias scenarios. Our extensive experiments practically showed that our proposed Ada-ABC outperformed competitive approaches, verifying its effectiveness in mitigating dataset bias for medical image classification. The codes and organized benchmark datasets will be released via https://github. This work was supported by the Pneumoconiosis Compensation Fund Board, HKSARS (Project No. PCFB22EG01), Hong Kong Innovation and Technology Fund (Project No. ITS/028/21FP), Shenzhen Science and Technology Innovation Committee Fund (Project No. SGDX20210823103201011), and the Project of Hetao Shenzhen-Hong Kong Science and Technology Innovation Cooperation Zone (HZQB- KCZYB-2020083). (Corresponding author: Hao Chen.) Luyang Luo and Xin Huang are with the Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China (e-mail: cseluyang@ust.hk). Minghao Wang is with the Department of Chemical and Biological Engineering, The Hong Kong University of Science and Technology, Hong Kong, China. Zhuoyue Wan is with Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China. Hao Chen is with the Department of Computer Science and Engineering and Department of Chemical and Biological Engineering, The Hong Kong University of Science and Technology, Hong Kong, China. Hao Chen is also affiliated with HKUST Shenzhen-Hong Kong Collaborative Innovation Research Institute, Futian, Shenzhen, China. (e-mail: jhc@cse.ust.hk). Fig. 1: Dataset bias in medical image classification could lead to inaccurate and untrustworthy results. Here, the source of data and whether the patient contains pneumonia are spuriously correlated. A biased model would make decisions based on the data source while ignoring the patterns of the lesions. Our goal is to learn a robust model that can make bias-invariant decisions from the biased training set. com/LLYXC/PBBL. Index Terms— Shortcut Learning, Dataset Bias, Trustworthy Artificial Intelligence, Deep Learning I. I NTRODUCTION Artificial intelligence (AI), typically represented by deep learning, has achieved expert-level performance in many domains of medical image analysis [1]. However, the trustworthiness of deep learning models is challenged by their preference of learning from spurious correlations caused by shortcuts, or dataset biases [2], [3]. Concerns have also been raised in the medical image classification domain that deep models could learn biases other than the targeted features [3]–[7], leading to misdiagnosis and unfairness for the less-represented groups. Consequently, there are rising calls to include more evaluation procedures to ensure that a deep learning model is unbiased before deployment as a medical product [8], [9]. Hence, mitigating dataset bias to develop trustworthy medical models plays a significant role in facilitating the integration of deep learning into real-world clinical applications. Specifically, dataset biases, or shortcuts, are often referred to the features that spuriously correlate to the target patterns. 1" 2401.11725v1,"Speak It Out: Solving Symbol-Related Problems with Symbol-to-Language Conversion for Language Models Yile Wang 1 Sijie Cheng 1,2 Zixin Sun 2 Peng Li B1,3 Yang Liu B1,2,3 1 Institute for AI Industry Research (AIR), Tsinghua University, Beijing, China 2 Dept. of Comp. Sci. & Tech., Institute for AI, Tsinghua University, Beijing, China 3 Shanghai Artificial Intelligence Laboratory, Shanghai, China {wangyile,lipeng}@air.tsinghua.edu.cn, liuyang2011@tsinghua.edu.cn A BSTRACT Symbols (or more broadly, non-natural language textual representations) such as numerical sequences, molecular formulas, and table delimiters widely exist, playing important roles in various tasks such as abstract reasoning, chemical property prediction, and table question answering. Despite the impressive natural language comprehension capabilities of large language models (LLMs), their reasoning abilities for symbols remain inadequate, which could attributed to the difference between symbol representations and general natural languages. We propose symbol-to-language (S2L), a tuning-free method that enables large language models to solve symbol-related problems with information expressed in natural language. Specifically, S2L first converts the symbols involved to language-based representations, which can be implemented by prompting LLMs or leveraging external tools, then these language-based representations are integrated into the original problem via direct substitution or concatenation, serving as useful input information for LLMs. We evaluate the S2L method using both API-based (GPT-4, ChatGPT) and open-source (OpenChat) models over eight symbol-related tasks, ranging from symbol-only abstract reasoning to sentiment analysis in social media. Experimental results show that S2L consistently leads to superior performance. For example, by employing S2L for GPT- 4, there can be average significant improvements of +21.9% and +9.5% for subtasks in 1D-ARC and Dyck language, respectively. Codes and data are available at https: //github.com/THUNLP-MT/symbol2language. Symbol-Based Representation ? ( Dyck Language [ ] Language-Based Representation (Ours) 0, 1, 0, 0, 0 0, 0, 1, 0, 0 One 0;One 1;Three 0 Two 0;One 1;Two 0 0, 0, 6, 0, 0 0, 0, 0, 6, 0 Two 0;One 6;Two 0 Three 0;One 6;One 0 ) 0, 2, 2, 0, 0 0, 2, 2, 2, 0 One 0;Two 2;Two 0 Two 0;Two 2;One 0 Property Prediction Emotion of Emojis U+1F62D CCCO Table Question Answering Rank|Nation|Gold\n1|Sweden|15\n Sentiment lmaooo all day ‼️ open square bracket; close square bracket Propionylol Sweden is ranked first with 15 gold medals. crying face laughing my ass off all day! Figure 1: Top: This illustration presents a symbol-related problem (move 1 pixel forward) from the 1D-ARC benchmark, comparing the responses of large language models using both conventional symbol-based and our language-based representations with symbol-to-language (S2L) conversion. Bottom: The S2L conversion has broad applicability across various scenarios involving diverse types of symbols." 2401.11733v1,"IMA Journal of Applied Mathematics (2024) 00, 1–14 https://doi.org/DOI HERE Approximate solutions to a nonlinear functional differential equation N ICHOLAS H ALE * Department of Mathematical Sciences, Stellenbosch University, Stellenbosch, 7600, South Africa E NRIQUE T HOMANN Department of Mathematics, Oregon State University, Corvallis, OR 97331, USA AND JAC W EIDEMAN Department of Mathematical Sciences, Stellenbosch University, Stellenbosch, 7600, South Africa [Received on Date Month Year; revised on Date Month Year; accepted on Date Month Year] A functional differential equation related to the logistic equation is studied by a combination of numerical and perturbation methods. Parameter regions are identified where the solution to the nonlinear problem is approximated well by known series solutions of the linear version of the equation. The solution space for a certain class of functions is then mapped out using a continuation approach. Keywords: Functional differential equation, bifurcation, continuation, Laguerre spectral collocation 1. Introduction The functional differential equation u ′ (t) + a u(t) = b u( α t), t > 0, (1.1) with a, b, and α > 0 constants, was the topic of two major papers, (Fox et al., 1971) and (Kato and McLeod, 1971), both dating back about half a century. An application mentioned in the former of these references is the dynamics of an overhead current collection system for an electric locomotive. Even earlier papers derived the equation as a probabilistic model of absorption processes (Ambartsumian, 1944; Gaver, 1964). In later years the equation has re-appeared in mathematical biology, such as in the modeling of cell growth (Hall and Wake, 1989; van Brunt and Vlieg-Hulstman, 2010a). In this paper we present results for a nonlinear version of this equation, u ′ (t) + u(t) = u 2 ( α t), t > 0, (1.2) considered by (Athreya, 1985) and more recently by (Dascaliuc et al., 2019). The latter paper, in which the term α -Riccati equation is coined, discusses an application to cascading processes in Fourier space representations of some nonlinear PDEs (including the Navier–Stokes equations). The two references cited both approach the nonlinear problem from a probabilistic viewpoint, in particular a stochastic branching process. Here, the tool is numerical computation supported by a perturbation analysis. For α = 1, both (1.1) and (1.2) reduce to well-known equations that will not be considered here. For α < 1, the equations are delay differential equations with proportional or ‘pantograph-type’ delay. This regime was investigated in (Fox et al., 1971) and (Kato and McLeod, 1971) in the linear case, * Corresponding author. Email: nickhale@sun.ac.za © The Author(s) 2024." 2401.11758v1,"Qubit fidelity under stochastic Schrödinger equations driven by colored noise R.J.P.T. de Keijzer, 1, 2 L.Y. Visser, 3, 2 O. Tse, 3, 2 and S.J.J.M.F. Kokkelmans 1, 2 1 Department of Applied Physics, Eindhoven University of Technology, P. O. Box 513, 5600 MB Eindhoven, The Netherlands 2 Eindhoven Hendrik Casimir Institute, Eindhoven University of Technology, P. O. Box 513, 5600 MB Eindhoven, The Netherlands ∗ 3 Department of Mathematics and Computer Science, Eindhoven University of Technology, P. O. Box 513, 5600 MB Eindhoven, The Netherlands (Dated: January 23, 2024) Environmental noise on a controlled quantum system is generally modeled by a dissipative Lindblad equation. This equation describes the average state of the system via the density matrix ρ. One way of deriving this Lindblad equation is by introducing a stochastic operator evolving under white noise in the Schrödinger equation. However, white noise, where all noise frequencies contribute equally in the power spectral density, is not a realistic noise profile as lower frequencies generally dominate the spectrum. Furthermore, the Lindblad equation does not fully describe the system as a density matrix ρ does not uniquely describe a probabilistic ensemble of pure states {ψ j } j . In this work, we introduce a method for solving for the full distribution of qubit fidelity driven by important stochastic Schrödinger equation cases, where qubits evolve under more realistic noise profiles, e.g. Ornstein-Uhlenbeck noise. This allows for predictions of the mean, variance, and higher-order moments of the fidelities of these qubits, which can be of value when deciding on the allowed noise levels for future quantum computing systems, e.g. deciding what quality of control systems to procure. Furthermore, these methods will prove to be integral in the optimal control of qubit states under (classical) control system noise. I. INTRODUCTION For quantum computers to become important tools in highly complex simulation/optimization problems, they should be able to perform many successive operations faithfully, i.e. be able to manipulate the qubits with high fidelity. In the current noisy intermediate-scale quantum (NISQ) era [1], quantum computers suffer from noise stemming from both uncontrollable sources such as radiative decay, and from sources in control systems, such as frequency and intensity noises [2–4]. One way of addressing the latter is by designing control operations that are robust against these types of noise [5, 6]. Alternatively, these controllable noise sources can be diminished by increasing the quality of the systems, which often comes at both monetary and technological complexity costs. It is therefore important to know in what way noise is determinantal to the fidelity of the qubit operations. A model that predicts fidelities based on noise spectra can be used to ensure that a system meets certain criteria for qubit fidelities, before being acquired. Furthermore, such a model can be used to control qubit systems [7–9], where the noise affecting each state preparation is accounted for. Commonly, noisy quantum systems can be regarded as open quantum systems, and are often modeled by the Lindblad master equation [10]. These equations describe the effective Markovian behavior of a quantum state and can be derived by various approaches [11] (cf. Sec. II for ∗ Corresponding author: r.j.p.t.d.keijzer@tue.nl an example). However, Markovianity is in general an unrealistic assumption for a quantum system subjected to control noise, where lower frequencies often dominate the power spectral density (PSD) [12]. Moreover, a density matrix does not completely characterize the state of the system, as two ensembles of states {ψ j } j might share a common density matrix ρ. For example, consider two ensembles {{ψ 1 = |0⟩, p 1 = 1/2}, {ψ 2 = |1⟩, p 2 = 1/2}} and {{ψ 1 = |+⟩, p 1 = 1/2}, {ψ 2 = |−⟩, p 2 = 1/2}} (where |+⟩ and |−⟩ are the eigenstates of the Pauli X operator, then these would be described by the same density matrix ρ but would behave differently in subsequent evolution. Therefore, one might not only be interested in the effective (or average) state of the system but also in the variances of the evolution, which indicate the variety of states being prepared. Because of these shortcomings in the Lindblad equation, we instead consider the stochastic Schrödinger equation (SSE) as a starting point for our analysis, allowing us to model the evolution of a quantum state under more general noise profiles. Using this model, we derive stochastic ODE systems for the qubit fidelity distribution F of qubit states under (classical) control system noise that we verify numerically with Monte-Carlo methods. These ODE systems are substantially simpler and less computationally demanding than their Monte Carlo counterparts. In line with this work, other studies have been performed to understand the influence of noise on qubit fidelity [2, 13, 14], where the Lindblad equation is considered primarily in the small noise regime, without providing the full qubit fidelity distribution. Similarly, past works on the SSE for quantum computing [15–19] only provide lower bounds or approximations on the achievable fideli-" 2401.11771v1,"Advancing Accessibility: Voice Cloning and Speech Synthesis for Individuals with Speech Disorders Vinotha R 1 , Hepsiba D 2* , L. D. Vijay Anand 3 , Deepak John Reji 4 1 Department of Robotics Engineering 1 2 vinothar@karunya.edu.in Department of Biomedical Engineering 2 3 Department of Robotics Engineering 3 4 hepsiba@karunya.edu vijayanand@karunya.edu Environmental Resources Management 4 deepak.reji@erm.com Abstract Neural Text-to-speech (TTS) synthesis is a powerful technology that can generate speech using neural networks. One of the most remarkable features of TTS synthesis is its capability to produce speech in the voice of different speakers. This paper introduces voice cloning and speech synthesis https://pypi.org/project/voice-cloning/ an open-source python package for helping speech disorders to communicate more effectively as well as for professionals seeking to integrate voice cloning or speech synthesis capabilities into their projects. This package aims to generate synthetic speech that sounds like the natural voice of an individual, but it does not replace the natural human voice. The architecture of the system comprises a speaker verification system, a synthesizer, a vocoder, and noise reduction. Speaker verification system trained on a varied set of speakers to achieve optimal generalization performance without relying on transcriptions. Synthesizer is trained using both audio and transcriptions that generate Mel spectrogram from a text and vocoder which converts the generated Mel Spectrogram into corresponding audio signal. Then the audio signal is processed by a noise reduction algorithm to eliminate unwanted noise and enhance speech clarity. The performance of synthesized speech from seen and unseen speakers are then evaluated using subjective and objective evaluation such as Mean Opinion Score (MOS), Gross Pitch Error" 2401.11805v1,"Simultaneous Blind Demixing and Super-resolution via Vectorized Hankel Lift Haifeng Wang ∗ , Jinchi Chen † , Hulei Fan ∗ , Yuxiang Zhao ‡ , Li Yu ‡ ∗ China Mobile (Zhejiang) Research & Innovation Institute, Hangzhou, China {wanghaifeng40, fanhulei}@zj.chinamobile.com † School of Mathematics, East China University of Science and Technology, Shanghai, China {jcchen.phys}@gmail.com ‡ China Mobile Research Institute, Beijing, China {zhaoyuxiang, yuliyf}@chinamobile.com Abstract—In this work, we investigate the problem of simultaneous blind demixing and super-resolution. Leveraging the subspace assumption regarding unknown point spread functions, this problem can be reformulated as a low-rank matrix demixing problem. We propose a convex recovery approach that utilizes the low-rank structure of each vectorized Hankel matrix associated with the target matrix. Our analysis reveals that for achieving exact recovery, the number of samples needs to satisfy the condition n ≳ Ksr log(sn). Empirical evaluations demonstrate the recovery capabilities and the computational efficiency of the convex method. Index Terms—Blind dimixing, blind super-resolution, vectorized Hankel lift. arbitrary values of K. We utilize the vectorized Hankel lift technique as introduced in [4] to leverage the low-dimensional structures within the target matrices. This approach enables a convex framework for reconstruction, and the exact recovery guarantees based on standard assumptions are established. II. P ROBLEM FORMULATION AND PROPOSED METHOD A. Problem Formulation Consider a set of K point source signals denoted as {x k (t)} K k=1 , where the k-th signal can be expressed in the following form: I. I NTRODUCTION The simultaneous blind demixing and super-resolution of point sources refers to the problem of concurrently achieving blind super-resolution [1]–[4] for K point source signals within their superimposed mixture. This problem arises in a range of applications, including but not limited to joint radarcommunications [5], multi-user multi-channel estimation [6]. It is well-established that blind super-resolution is intrinsically ill-posed without additional assumptions [1]–[4]. The problem under consideration can be viewed as an extension of blind super-resolution, which exacerbates its complexity. Consequently, we introduce a subspace assumption and reformulate the problem of simultaneous blind demixing and superresolution as a structured low-rank matrix demixing problem. Recent research efforts, as demonstrated in [5], [7]–[9], have harnessed the inherent structure of data matrices to develop various convex relaxation techniques for addressing this problem. Specifically, in [5], inspired by joint radar and communication systems, the authors proposed an atomic norm minimization (ANM) approach for simultaneous blind demixing and super-resolution with K = 2. Furthermore, in [7], a nuclear norm minimization method was designed for the same problem. Additionally, [9] extended ANM to address this problem for arbitrary K, but the theoretical analysis is lacking. In this paper, our focus centers on addressing the simultaneous blind demixing and super-resolution problem for Corresponding authors: Jinchi Chen and Li Yu. Jinchi Chen was partially supported by National Science Foundation of China under Grant No. 12001108. x k (t) = r k X d k,ℓ δ(t − τ k,ℓ ), ℓ=1 where δ(·) represents the Dirac function, r k indicates the k k number of spikes, and {τ k,ℓ } r ℓ=1 and {d k,ℓ } r ℓ=1 represent the locations and amplitudes of the point source signals, respectively. Let y(t) be the summation of point source signals convolved with unknown point spread functions, given by y(t) = K X x k (t) ∗ g k (t) = r k K X X d k,ℓ g k (t − τ k,ℓ ). (II.1) k=1 ℓ=1 k=1 By taking the Fourier transform of (II.1) and subsequently sampling, we obtain that for j = 0, · · · , n − 1, y[j] = r k K X X d k,ℓ e −ı2π(j−1)τ k,ℓ ĝ k [j], (II.2) k=1 ℓ=1   T where g k := ĝ k [0] · · · ĝ k [n − 1] ∈ C n are unknown. The goal of the simultaneous blind demixing and superresolution problem is to jointly recover both {d k,ℓ , τ k,ℓ } and {g k } from (II.2). As previously mentioned, simultaneous blind demixing and super-resolution is an ill-posed problem without any additional assumptions. In alignment with prior research [5], [7]–[9], we adopt a similar approach and make the assumption that each point spread function g k lies within a known subspace defined by B k ∈ C n×s k , such that: g k = B k h k , k = 1, · · · , K," 2401.11819v1,"SuperCLUE-Math6: Graded Multi-Step Math Reasoning Benchmark for LLMs in Chinese Liang Xu, Hang Xue, Lei Zhu, Kangkang Zhao Abstract We introduce SuperCLUE-Math6(SC-Math6), a new benchmark dataset to evaluate the mathematical reasoning abilities of Chinese language models. SC-Math6 is designed as an upgraded Chinese version of the GSM8K dataset with enhanced difficulty, diversity, and application scope. It consists of over 2000 mathematical word problems requiring multi-step reasoning and providing natural language solutions. We propose an innovative scheme to quantify the reasoning capability of large models based on performance over problems with different reasoning steps. Experiments on 12 representative Chinese models demonstrate a clear stratification of reasoning levels, with top models like GPT-4 showing superior performance. SC-Math6 fills the gap in Chinese mathematical reasoning benchmarks and provides a comprehensive testbed to advance the intelligence of Chinese language models. 1 . 1 Introduction Recent advances in large language models like GPT-4 [1] have sparked great interest in evaluating their proficiency in solving reasoning problems. While benchmarks like GSM8K [2] have been influential, they are limited to English and do not sufficiently test multi-step inference. To overcome these limitations and systematically assess the mathematical reasoning of Chinese models, we introduce SC- Math6 as an upgraded Chinese version of GSM8K. SC-Math6 has 1072 unique problems covering a diverse range of grade school math topics. Each problem is presented in a native Chinese context and accompanied by a detailed natural language solution walkthrough. Moreover, SC-Math6 provides a follow-up question for each initial query to assess the model’s continuous reasoning ability during interaction with users (As shown in Figure 1. For more examples, please refer to the appendix A). We also propose a novel scoring scheme that combines performance over problems with different reasoning steps and overall accuracy to produce interpretable and fair reasoning levels from 1 to 5. Disparities and Correlations of SC-Math6 and GSM8K is presented in Table 1 Preprint. 1 Our benchmark CLUEbenchmarks.com can be found at https://www. Comparison Item SC-Math6 Mathematical Logic Reasoning Natural Language Solutions Elementary Mathematical Knowledge Multi-step Reasoning Native Chinese Context Multi-round In-depth Reasoning Reasoning Steps in Problems Interpretable Reasoning Level for LLMs Number of Test Questions YES YES YES YES YES YES YES YES 2144 (1072 Pairs) GSM8K YES YES YES YES NO NO NO NO 1300 Table 1: SC-Math6 and GSM8K: Disparities and Correlations Our experiments on 12 major Chinese models demonstrate a clear stratification of reasoning capabilities. Advanced models like GPT-4 exhibit remarkably high accuracy on multi-step problems, while lower-level models show large performance gaps. The diversified grading scheme provides a reference for model selection and evaluation. SC-Math6 thus contributes the first comprehensive Chinese benchmark to assess and improve the mathematical reasoning abilities of Chinese language models. iew 6_Prev _4_110 GPT-4 GPT 0 -Bot 4. ERNIE 80 LM3-6B ChatG Likely trained on GSM8k 60 GSM8k Score SuperCLUE team clues@cluebenchmarks.com rbo o rb GLM .5 -tu Ch G at PT -3 -tu -Chat 4B -1 en w B-Chat 2-13 ichuan Ba Xinghuo Pretrained Q 3.0 40 rbo -3.5-tu ERNIE 20 Chines B a-2-13 e-Alpac 0 0 20 40 60 Comprehensive Score in Math6 80 Figure 2: Trend analysis between GSM8k and SC-Math6. SC-Math6 aligns with GSM8K yet demands in-depth reasoning, whereas some models may struggle with SC-Math6." 2401.11834v1,"End-to-end Multi-Instance Robotic Reaching from Monocular Vision Zheyu Zhuang 1 , Xin Yu 2 , Robert Mahony 1 Abstract— Multi-instance scenes are especially challenging for end-to-end visuomotor (image-to-control) learning algorithms. “Pipeline” visual servo control algorithms use separate detection, selection and servo stages, allowing algorithms to focus on a single object instance during servo control. End-toend systems do not have separate detection and selection stages and need to address the visual ambiguities introduced by the presence of arbitrary number of visually identical or similar objects during servo control. However, end-to-end schemes avoid embedding errors from detection and selection stages in the servo control behaviour, are more dynamically robust to changing scenes, and are algorithmically simpler. In this paper, we present a real-time end-to-end visuomotor learning algorithm for multi-instance reaching. The proposed algorithm uses a monocular RGB image and the manipulator’s joint angles as the input to a light-weight fully-convolutional network (FCN) to generate control candidates. A key innovation of the proposed method is identifying the optimal control candidate by regressing a control-Lyapunov function (cLf) value. The multiinstance capability emerges naturally from the stability analysis associated with the cLf formulation. We demonstrate the proposed algorithm effectively reaching and grasping objects from different categories on a table-top amid other instances and distractors from an over-the-shoulder monocular RGB camera. The network is able to run up to ∼160 fps during inference on one GTX 1080 Ti GPU. I. INTRODUCTION Scenes that contain multi-instances are common in our daily life, for example; cutlery sets on dining tables, books and stationary on desks, fruit hanging on trees, etc. As robotic systems transition into more real-world and shared autonomy environments, the ability to reach and grasp objects amid distracters and in the presence of visually similar objects becomes critical. Pipeline approaches follow the “detect, decide, then servo” paradigm. Grasping algorithms such as [1], [2] first detect objects and estimate 6DoF poses for each detected object. The selection module chooses which object to grasp and the estimated grasp pose is provided to the servo module. The grasp action is undertaken using the standard pose control for robotic manipulators. Such a pipeline can be run in real-time if the computational requirements can be met and a heuristic is used to ensure the algorithm does not jump between different grasp targets unintentionally. Convolutional neural networks have become the default algorithm for detection and pose estimation from visual data. This research was supported by the Australian Research Council through the “Australian Centre of Excellence for Robotic Vision” CE140100016. 1 Zheyu Zhuang, Robert Mahony are with “Australian Centre for Robotic Vision”, Research School of Engineering, The Australian National University. first.last@anu.edu.au 2 Xin Yu is with School of Computer Science, The University of Technology Sydney. first.last@uts.edu.au Network Input Non-optimal Suppression 7x1x1 FCN RGB Frame Joint Angles Coordinate Tensor Control Proposals b min u V b Execute Control u b , and Update Scene Fig. 1: Architecture of the proposed closed-loop reaching algorithm. A fully-convolutional network densely predicts b and control u a control Lyapunov function (cLf) value V b associated to each foreground image grid cell. Non-optimal suppression is achieved by selecting the control associated with the grid cell corresponding to the lowest cLf value. The control is updated in real-time as the image and joint angles are updated. The reaching trajectory terminates when the regressed Lyapunov value is lower than a threshold. Algorithms that first regress an intermediate representation, such as image keypoints, and then compute object pose by solving a PnP problem [3], [4], [5], have achieved impressive performance on popular monocular pose estimation datasets including LINEMOD [6] and Occlusion LINEMOD [7]. However, existing algorithms are trained on single instance datasets and it is unclear how the underlying architecture will adapt to multi-instance. Tremblay et al. [8] propose a realtime pose estimation network with multi-instance capability and showcase repeatable experiments of robotic grasping. To authors understanding, this work [8] is the state-of-theart result in multi-instance visual reaching and grasping. While separating the computer vision pose estimation from servo control is conceptually simple, this approach can lead to undesirable error propagation between modules [8]. Furthermore, in dynamic scenes, the decision module needs to associate and track the estimated poses between frames [9]. In contrast, end-to-end approaches are known to be robust to dynamic scene changes and model errors [10]. Levine et al. [11] demonstrate a robot accomplishing real-world tasks such as hanging clothes and screwing on a bottle cap by executing control learnt from RGB inputs. James et al. [12] transfer a recurrent network that learns a multi-stage task from simulation to real-world with no real-samples. This work shows the robot sequentially reach, grasp and place a red cube amid distracters. Zhang et al. [13] achieve closed-" 2401.11838v1,"The Conversation is the Command: Interacting with Real-World Autonomous Robot Through Natural Language Linus Nwankwo linus.nwankwo@unileoben.ac.at Chair of Cyber-Physical Systems, Montanuniversität Leoben, Austria ABSTRACT In recent years, autonomous agents have surged in real-world environments such as our homes, offices, and public spaces. However, natural human-robot interaction remains a key challenge. In this paper, we introduce an approach that synergistically exploits the capabilities of large language models (LLMs) and multimodal vision-language models (VLMs) to enable humans to interact naturally with autonomous robots through conversational dialogue. We leveraged the LLMs to decode the high-level natural language instructions from humans and abstract them into precise robot actionable commands or queries. Further, we utilised the VLMs to provide a visual and semantic understanding of the robot’s task environment. Our results with 99.13% command recognition accuracy and 97.96% commands execution success show that our approach can enhance human-robot interaction in real-world applications. The video demonstrations of this paper can be found at https://osf.io/wzyf6 and the code is available at our repository 1 . CCS CONCEPTS • Human-centered computing → Human computer interaction (HCI); Interaction paradigms; Natural language interfaces; KEYWORDS Human-robot interaction, LLMs, VLMs, ChatGPT, ROS, autonomous robots, natural language interaction. ACM Reference Format: Linus Nwankwo and Elmar Rueckert. 2024. The Conversation is the Command: Interacting with Real-World Autonomous Robot Through Natural Language. In Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction (HRI ’24 Companion), March 11–14, 2024, Boulder, CO, USA. ACM, New York, NY, USA, 5 pages. https://doi.org/10.1145/ 3610978.3640723 1 INTRODUCTION The exploration of human-robot interaction (HRI) [29], [32] and its advancement into real-world applications has been a topic of significant research over the past decades [30]. Current approaches for controlling and interacting with autonomous robots in the real 1 https://github.com/LinusNEP/TCC_IRoNL.git This work is licensed under a Creative Commons Attribution International 4.0 License. HRI ’24 Companion, March 11–14, 2024, Boulder, CO, USA © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0323-2/24/03. https://doi.org/10.1145/3610978.3640723 Elmar Rueckert Chair of Cyber-Physical Systems, Montanuniversität Leoben, Austria world have been dominated by complex teleoperation controllers [13], teach pendants [2], and rigid command protocols [16], where the robots execute predefined tasks based on specialized programming languages. As the challenges we present to these robots become more intricate and the environments they operate in grow more unpredictable [18], there arises an unmistakable need for more natural and intuitive interaction mechanisms. Prior works have seen a tilt towards techniques like reinforcement [21] and imitation learning [2]. By leveraging iterative learning and human demonstrations, these strategies have shown a capacity for fostering nuanced robot behaviours, as demonstrated in [28]. However, the often computational burdens [15], and the high costs associated with reward specification [25], task-specific training, or fine-tuning, commonly observed in the reinforcement and imitation learning frameworks, have limited the practical applicability of these methods, especially for simpler robotic tasks. Prompted by these challenges, we turned our focus to the recent advancement in large language models (LLMs) [23], [6] and multi-modal vision-language models (VLMs) [22], [24] to foster an intuitive human-robot collaboration. This paper introduces an innovative approach that exploits the inherent natural language capabilities of pre-trained LLMs and VLMs to enable humans to interact with autonomous robots through natural language dialogues. As demonstrated in Figure 1, we aim to realize a new approach to human-robot interactions—one where the conversation is the command (refer to Sections 3 & 4 for more details). Our contributions are therefore threefold: (a) we introduced a framework that can leverage independent pre-trained LLMs (e.g., OpenAI GPT-2 [23] & GPT-3 [6], Google BERT [8], Meta AI LLaMA [31], etc), and VLMs (e.g., CLIP[22]) to enable real-world autonomous robots to interact with humans or other entities using natural language dialogues. (b) we performed real-world experiments with our developed framework to ensure that the robot’s actions are always aligned with the user’s instructions, thereby reducing the likelihood of erroneous operations. (c) we have made our code and associated resources available to the public. This allows for easy reproducibility of our results. 2 RELATED WORK The recent rise of natural language processing (NLP) [33], marked by large language models (LLMs) like OpenAI GPT-3 [6], Google BERT [8], HuggingFace distilBERT [26], EleutherAI GPTNeoX [3], Meta AI LLaMA [31], Facebook RoBERTa [14], multi-modal visionlanguage models (VLMs) e.g., CLIP [22], DALL-E [24], and their successors, has opened new avenues for human-robot interaction. The inherent capacity of these models to understand and generate" 2401.11849v1,"Self-Labeling the Job Shop Scheduling Problem Andrea Corsini 1 , Angelo Porrello 1 , Simone Calderara 1 and Mauro Dell’Amico 1 1 University of Modena and Reggio Emilia {andrea.corsini, angelo.porrello, simone.calderara, mauro.dellamico}@unimore.it Abstract In this work, we propose a Self-Supervised training strategy specifically designed for combinatorial problems. One of the main obstacles in applying supervised paradigms to such problems is the requirement of expensive target solutions as groundtruth, often produced with costly exact solvers. Inspired by Semi- and Self-Supervised learning, we show that it is possible to easily train generative models by sampling multiple solutions and using the best one according to the problem objective as a pseudo-label. In this way, we iteratively improve the model generation capability by relying only on its self-supervision, completely removing the need for optimality information. We prove the effectiveness of this Self-Labeling strategy on the Job Shop Scheduling (JSP), a complex combinatorial problem that is receiving much attention from the Reinforcement Learning community. We propose a generative model based on the well-known Pointer Network and train it with our strategy. Experiments on two popular benchmarks demonstrate the potential of this approach as the resulting models outperform constructive heuristics and current stateof-the-art Reinforcement Learning proposals. 0 1 Introduction The Job Shop Problem is a classic optimization problem with many practical applications in industry and academia [Zhang et al., 2019]. At its core, the JSP involves scheduling a set of jobs onto a set of machines, where each job has to be processed on the machines following a specific order. The goal of this problem is generally to minimize the makespan, i.e., the time required to complete all jobs [Pinedo, 2016]. Over the years, various approaches have been developed to tackle the JSP. A common one is adopting exact methods such as Mixed Integer Programming solvers (MIP). However, these methods often fail to provide either optimal or high-quality solutions on medium and large instances [Ku and 0 The code is available at: https://github.com/ AndreaCorsini1/SelfLabelingJobShop Beck, 2016]. As a remedy, metaheuristics have been extensively investigated [Nowicki and Smutnicki, 1996; Cheng et al., 1999; Huang and Liao, 2008], and constitute the de-facto alternative to exact methods. Although state-of-the-art metaheuristics like [Nowicki and Smutnicki, 2005] can provide quality solutions in a fair amount of time, typically minutes, they are rather complex to implement and are hard to reproduce results [Blum and Roli, 2003]. Therefore, due to their lower complexity, and under tighter time constraints, Priority Dispatching Rules (PDR) [Pinedo, 2016] are often preferred, despite their lower quality. The main issue of PDRs is their tendency to perform well in some cases and poorly in others, primarily due to their blind prioritization schema based on rigid hardcoded and hand-crafted rules [Haupt, 1989]. Therefore, recent works have started to investigate Machine Learning (ML) to enhance or replace some of these approaches, primarily focusing on PDRs. ML-based approaches, specifically Reinforcement Learning (RL) ones, demonstrated to deliver higher-quality solutions than PDRs at the cost of a small increase in execution time [Mazyavkina et al., 2021]. Despite the potential demonstrated by RL [Zhang et al., 2020; Iklassov et al., 2022], training RL agents is a complex task [Sutton and Barto, 2018; Mnih et al., 2016], is sensitive to hyper-parameters [Schulman et al., 2017], and has reproducibility issues [Henderson et al., 2018]. Contrary, supervised learning is less affected by these issues but heavily relies on expensive annotations [Liu et al., 2023]. This is particularly problematic in combinatorial problems, where annotations in the form of (near-) optimal information are generally produced with expensive (exact) solvers. To contrast labeling cost and also improve generalization, Semi-Supervised [Van Engelen and Hoos, 2020] and Self- Supervised [Liu et al., 2023] are recently gaining popularity due to their ability to learn from unlabeled data. Despite this premise, little to no application of these paradigms can be found in the JSP and the combinatorial optimization literature [Bengio et al., 2021; Cappart et al., 2021]. Motivated by these observations, we introduce a novel selfsupervised training strategy that is less complex than most RL algorithms, does not require the formulation of the Markov Decision Process, and relies only on model-generated information, thus removing the need for expensive annotations. Our proposal is based on two assumptions: i) we suppose to be able to generate multiple solutions for a problem, a com-" 2401.11853v1,"Fast measurement of group index variation with ultimate precision using Hong-Ou-Mandel interferometry Sandeep Singh, 1, 2 Vimlesh Kumar, 1 and G. K. Samanta 1 1) Photonic Sciences Laboratory, Physical Research Laboratory, Navarangpura, Ahmedabad, 380009 Gujarat, India 2) Indian Institute of Technology-Gandhinagar, Ahmedabad 382424, Gujarat, India (*Electronic mail: sandeep@prl.res.in) (Dated: 23 January 2024) Hong-Ou-Mandel (HOM) interferometry has emerged as a valuable tool for quantum sensing applications, particularly in measuring physical parameters that influence the relative optical delay between pair photons. Unlike classical techniques, HOM-based quantum sensors offer higher resolution due to their intrinsic dispersion cancellation property. Despite this advantage, achieving precise measurements of optical delay crucial for practical applications often involves time-consuming integration and post-processing with traditional statistical methods. To address this challenge, our recent work focused on optimizing optical delay measurements in a time-efficient manner. By carefully selecting the length of a 1 mm periodically-poled KTP (PPKTP) crystal for pair photon generation, we achieved a remarkable group index measurement precision of ∼ 6.75 × 10 −6 per centimeter of sample length, surpassing the previous maximum precision by over 400%. These current measurements maintain fast detection and high photon counts, which are essential for practical quantum sensing applications. The HOM-based method, while limiting the measurement range, can be extended by compensating for photon delay using an optical delay stage. As a proof-of-principle, we measured the group index variation of PPKTP over a temperature range up to 200 ◦ C with a precision in the range of one part per million (∼10 −6 ). This advancement not only contributes to quantum sensing but also holds promising implications for high-precision and long-range measurements in quantum optical coherence tomography. I. INTRODUCTION Quantum optical coherence tomography (QOCT) represents a non-invasive imaging modality primarily employed to generate three-dimensional cross-sectional visualizations of transparent or reflective materials, specifically focusing on the microstructural surface morphology of biological tissues 1,2 . In QOCT, unlike conventional optical coherence tomography with classical light, the utilization of entangled photon pairs allows probing of the sample surface with an axial resolution enhanced by a factor of 2 even for the same spectral bandwidth source in both scenarios, showcasing the quantum advantage in precision imaging. On the other hand, the immunity against the dispersion effects owing to the frequency-entangled pair photons enables QOCT to access higher resolution of surface morphology at sub-micron scales 1 through the use of a broader spectrum of photons compared to classical counterparts. The conventional QOCT relies on the Hong-Ou-Mandel (HOM) interference, where two indistinguishable photons coalesce at a balanced beam splitter, with one photon traversing a reference delay line and the other probing the sample surface, encoding its features in the relative temporal delay between the pair photons 3 . Since the change in temporal delay results in the variation in coincidence counts and the temporal delay results from the surface morphology of the specimen, one can map the surface morphology by recording the coincidence counts in the transverse plane. However, the axial resolution is constrained by the coherence length of indistinguishable photons and, thus, the width of the HOM interference dip. For example, in the case of a stratified specimen, the probe photon acquires data pertaining to the opti- cal thickness across the distinct layers. As a result, the precise determination of the thickness profile of individual layers demands a meticulous understanding of their corresponding group indices. Even in quantum optical coherence microscopy (QOCM), achieving an accurate three-dimensional reconstruction of the specimen necessitates a precise determination of the group index variations within the transverse plane of the sample. Unfortunately, these group index variations, in general, are exceedingly small, and conventional methodologies for group index measurement lack the necessary precision to measure those subtle changes. Nevertheless, while HOM interference has been applied for measuring group index through the assessment of optical delay 4 introduced by the sample and has enabled high-precision measurements in quantum microscopy 5 , QOCT 6 , and vibration sensing 7 without adequately addressing the crucial requirement to improve the precision of HOM interferometry. In most cases, high precision is achieved by exploring the stringent prerequisites, including the long interaction length of the specimen and subsequent post-processing of large data accumulated iteratively 8 . As a result, such approaches suffer from the common drawback of long measurement time and limited kinds of samples. For example, the measurement of group index variation of the nonlinear crystals due to the temperature-dependent dispersion properties is of paramount interest for designing various experiments, including the optimization of phase-matching for high nonlinear conversion efficiency and optimum phase-compensation of the entangled state generated by the nonlinear crystal. However, the precision measurement using the existing HOM interferometerbased group index measurement techniques demands long interaction lengths. Unfortunately, in many cases, nonlinear crystals exhibit" 2401.11863v1,"Superdiffusive limits for Bessel-driven stochastic kinetics Miha Brešar ∗ Conrado da Costa † Aleksandar Mijatović ∗‡ Andrew Wade † 23rd January 2024 Abstract We prove anomalous-diffusion scaling for a one-dimensional stochastic kinetic dynamics, in which the stochastic drift is driven by an exogenous Bessel noise, and also includes endogenous volatility which is permitted to have arbitrary dependence with the exogenous noise. We identify the superdiffusive scaling exponent for the model, and prove a weak convergence result on the corresponding scale. We show how our result extends to admit, as exogenous noise processes, not only Bessel processes but more general processes satisfying certain asymptotic conditions. Key words: Stochastic kinetic dynamics; anomalous diffusion; superdiffusivity; Bessel process; additive functional. AMS Subject Classification: 60J60 (Primary), 60K50 (Secondary). 1 Introduction and main results The subject of this work is the long-term behaviour of an Itô process X = (X t ) t∈R + in R + := [0, ∞) with a representation Z t X t = X 0 + f (s, Y s ) ds + B t , X s 0 X 0 > 0, (1.1) where the process Y = (Y t ) t∈R + is adapted to the same filtration as the Brownian motion (BM) B = (B t ) t∈R + . Under suitable assumptions on the function f : R + × R + → R + and the exogenous noise process Y , which drives the stochastic drift of X, the process X will exhibit anomalous diffusion (see YouTube [8] for a short overview of our results). Physical motivation includes dynamics of particles interacting with an external field or medium, or with an internal relaxation mechanism; see e.g. [6, 15, 16] and §2 below for further discussion of motivation and related literature. Assume the function f has the following asymptotic behaviour at large times. (A f ) Let the continuous function f : R + × R + → R + satisfy f (t, y) ∼ ρt γ y α as t, y → ∞ for some constant ρ ∈ (0, ∞) and exponents α ∈ R + and γ ∈ (−α, ∞), i.e. α + γ > 0. More precisely, for every ε > 0, there is some r ε ∈ R + such that f (t, y)t −γ y −α − ρ ≤ ε. sup (1.2) (t,y)∈[1,∞)×R + : t+y≥r ε ∗ Department of Statistics, University of Warwick, Coventry, CV4 7AL, UK. Email: miha.bresar@warwick.ac.uk, a.mijatovic@warwick.ac.uk † Department of Mathematical Sciences, Durham University, Upper Mountjoy, Durham, DH1 3LE, UK. Email: conrado.da-costa@durham.ac.uk, andrew.wade@durham.ac.uk. ‡ The Alan Turing Institute. 1" 2401.11868v1,"Self-Balancing Semi-Hierarchical PCNs for CBDCs Marco Benedetti, Francesco De Sclavis, Marco Favorito, Giuseppe Galano, Sara Giammusso, Antonio Muci, Matteo Nardelli ∗ Technical Report CFC.CRYPTO.CS/2024/1 Applied Research Team (ART) - IT Department - Bank of Italy † Abstract—We introduce a family of PCNs (Payment Channel Networks) characterized by a semi-hierarchical topology and a custom set of channel rebalancing strategies. This family exhibits two interesting benefits, if used as a platform for large-scale, instant, retail payment systems, such as CBDCs: Technically, the solution offers state-of-the-art guarantees of fault-tolerance and integrity, while providing a latency and throughput comparable to centralized systems; from a business perspective, the solution perfectly suits the 3-tier architecture of the current banking ecosystem (central banks / commercial banks / retail users), assigning a pivotal and peculiar role to the members of each tier. Furthermore, the cryptographic privacy of payments for retail users—typical of PCNs such as the public Lightning Network— is largely (possibly fully) retained. We study the system by simulating a scaled-down version of a hypothetical European CBDC, exploring the trade-offs among liquidity locked by market operators, payment success rate, throughput, latency, and load on the underpinning blockchain. I. I NTRODUCTION Retail instant payment systems—such as credit/debit card circuits or Central Bank Digital Currencies (CBDCs)— manage a very high load of transactions, in the order of 10 4 –10 5 TPS (see Sect. V-A). Centralized systems are often deployed to ingest and settle all such transactions timely. Performance is not all though: In the special case of CBDCs, further business and technical requirements are put into place 1 , such as the possibility to set a cap on the amount of liquidity users can amass (wallet cap), strong privacy guarantees for all payment data, small or no fees for citizens (“free for basic use”), and the possibility to be usable by unbanked people. Finally, retail instant payment systems have to be embedded into—and play nice with—the pre-defined, multi-tier structure of the existing banking and payment infrastructure: a pyramid that sees the Central Bank(s) at the top, a set of authorized intermediaries (such as commercial banks and similar financial institutions) in the middle, and retail users (such as citizens and merchants) at the bottom—providing each actor with clear and strong incentives to adopt and use the system itself 2 . We ask: Can a blockchain-based payment system address all these concerns and requirements while bringing to the table tangible benefits in comparison to a centralized solution? * E-mail address of the authors are in the form [firstname].[lastname]@bancaditalia.it, except for giuseppe.galano2@bancaditalia.it. † The views expressed in this paper are those of the authors and do not necessarily reflect those of the Bank of Italy. 1 For the case of the digital euro, see e.g. [1], [2] 2 For an introduction to this three-tier structure, see [3]. In this work, we move the first steps towards tentatively answering such a question in the positive (for a CBDC). First essential point: Most blockchains are well-known for their limited throughput, so on-chain settlement of retail payments is very difficult to achieve. We forgo such a perspective entirely and embrace the off-ledger paradigm, whereby scalability is achieved by an additional “payment channel network”, or PCN (called 2 nd layer) built on top of the actual blockchain (see Sect. II). In the wild, 2 nd layer networks—e.g., the Lightning Network [4]—evolve freely, as peer-to-peer systems: They are unstructured and adopt besteffort payment routing strategies. Unfortunately, their anatomy (i) is not coherent with the 3-tier structure of the monetary system, (ii) is oblivious to most of the business requirements of a CBDC, and (iii) provides a level of scalability that— albeit significant w.r.t. the underpinning blockchains—is still insufficient for a large-scale retail instant payment system. We address these issues by devising a family of PCNs with a partially constrained topology, called “Semi-Hierarchical Payment Channel Networks”, or SH-PCNs (Sect. III), endowed with a set of custom balancing strategies (Sect. IV). SH-PCNs are designed to play nice with the financial ecosystem and to exhibit performances akin to a retail payment system. Assuming SH-PCNs allow us to achieve the required throughput and latency with sufficient reliability (a question we ponder in Sect. VI-B), we can shift our attention to the benefits of using a distributed, blockchain-based, 2-layer solution: Blockchains introduce tools capable of increasing integrity, availability, fault-tolerance, and verifiability of monetary exchanges; at the 2 nd (retail) layer, they (i) accommodate, by design, levels of privacy similar to that of cash; (ii) naturally handle wallet caps; (iii) give the central bank (CB) and the market control on the transaction fees for retail users. We do not model a full-scale SH-PCN system just yet, but a scaled-down version. This reduced model is still capable of exhibiting the key dynamics we want to investigate, such as the trade-offs among the liquidity locked in channels, the success rate of payments, their latency, and the transactional demand on the underlying 1 st -layer blockchain (see Sect. VIII). Our preliminary results suggest that the performance of SH- PCN is satisfactory for retail payments; that SH-PCNs map naturally onto the banking/payment ecosystem; and that the most typical CBDC-specific requirements are naturally met. In the following sections, we provide a description of the solution that carefully combines the technical, PCN-oriented angle with the business, CBDC-oriented perspective." 2401.11882v1,"Fully Differentiable Ray Tracing via Discontinuity Smoothing for Radio Network Optimization Jérome Eertmans, Laurent Jacques, Claude Oestges ICTEAM, Université catholique de Louvain, Louvain-la-Neuve, Belgium, jerome.eertmans@uclouvain.be Abstract—Recently, Differentiable Ray Tracing has been successfully applied in the field of wireless communications for learning radio materials or optimizing the transmitter orientation. However, in the frame of gradient-based optimization, obstruction of the rays by objects can cause sudden variations in the related objective functions or create entire regions where the gradient is zero. As these issues can dramatically impact convergence, this paper presents a novel Ray Tracing framework that is fully differentiable with respect to any scene parameter, but also provides a loss function continuous everywhere, thanks to specific local smoothing techniques. Previously non-continuous functions are replaced by a smoothing function, that can be exchanged with any function having similar properties. This function is also configurable via a parameter that determines how smooth the approximation should be. The present method is applied on a basic one-transmitter-multi-receiver scenario, and shows that it can successfully find the optimal solution. As a complementary resource, a 2D Python library, DiffeRT2d, is provided in Open Access, with examples and a comprehensive documentation. Index Terms—Ray Tracing, Differentiability, Wireless Communications, Optimization. I. I NTRODUCTION The field of radiocommunications has witnessed unprecedented growth over the past few decades, largely fueled by the increase of data-intensive applications, as well as the need to access the Internet from nearly everywhere. This accessibility constraint, in addition to the other constraints faced by telecom operators, makes the task of placing antennas even more complicated. With the emergence of dynamic scenarios, such as vehicule-to-vehicule communications, it is also important to understand how to update the current configuration, e.g., the orientation of the transmitting antenna, with respect to object displacements. Traditionally, the design, analysis, and optimization of communication networks have relied on mathematical models, simulations, and measurements. Channel models are mainly either deterministic or stochastic. Based on measurements, empirical models often try to capture the general impact of the scene parameters on a given metric. For example, one could use the COST 231 Hata model [1] to estimate the path loss between two nodes in an urban environment. This model only needs a limited amount of inputs, and considers a very general urban scenario, with no specific assumption on how the buildings are placed. Conversely, deterministic models, like Ray Tracing (RT) or the Method of Moments, require a very precise input model, e.g., the location of every building in the scene, to provide a very accurate simulation of how radio waves propagate. While these approaches have been invaluable in the development of modern communication systems, they face limitations in simulating evolving environments, such as iteratively searching for the best antenna location or analyzing a radio link involving mobile objects like cars. Empirical models, owing to their simplicity, cannot be used for site-specific network optimization. Deterministic channel models, on the other hand, often have such a large computational cost that performing a simulation for each small variation in scene parameters could be incredibly time-consuming. In optimization problems, it is increasingly common to utilize gradient descent methods, particularly since the emergence of automatic differentiation (AD) libraries like JAX [2]. This enables differentiation of nearly every programmable function in relation to one or multiple input parameters. As such, applying AD to RT may lead to the development of a Differentiable Ray Tracing (DRT) program, hence enabling network parameter optimization. However, the convergence of an optimizer can be dramatically impacted by the properties of the computed gradient; for instance, if it vanishes in certain regions of the parameter space, the optimization can be stuck in a suboptimal solution. In DRT, this phenomenon is directly connected to the geometry of the scene, e.g., object occlusion can create discontinuous parameter transitions or zero-gradient regions. This paper proposes to address this problem by introducing a novel smoothing technique that, when applied to RT, enables to programmatically avoid those issues. This paper is organized as follows. First, Sec. II summarizes the work in DRT and the main challenges. Next, Sec. III provides a mathematical and precise definition of the problem addressed by this work. After having motivated the use of smoothing techniques in RT in Sec. IV, we present in Sec. V our DRT framework, published under the DiffeRT2d Python package 1 . Finally, in Sec. VII, we demonstrate the capacity of our framework to improve the convergence rate of network optimization problems, before providing a few research perspectives in the concluding Sec. VIII. II. R ELATED W ORK In computer graphics (CG), DRT is a widely studied topic, particularly in the context of reconstructing scene parameters 1 GitHub repository: https://github.com/jeertmans/DiffeRT2d." 2401.11905v1,"Considerations on Approaches and Metrics in Automated Theorem Generation/Finding in Geometry Pedro Quaresma * Pierluigi Graziani † CISUC / Department of Mathematics, University of Coimbra, Portugal pedro@mat.uc.pt Department of Pure and Applied Sciences, University of Urbino, Italy pierluigi.graziani@uniurb.it Stefano M. Nicoletti ‡ Formal Methods and Tools, University of Twente, Enschede, the Netherlands s.m.nicoletti@utwente.nl The pursue of what are properties that can be identified to permit an automated reasoning program to generate and find new and interesting theorems is an interesting research goal (pun intended). The automatic discovery of new theorems is a goal in itself, and it has been addressed in specific areas, with different methods. The separation of the “weeds”, uninteresting, trivial facts, from the “wheat”, new and interesting facts, is much harder, but is also being addressed by different authors using different approaches. In this paper we will focus on geometry. We present and discuss different approaches for the automatic discovery of geometric theorems (and properties), and different metrics to find the interesting theorems among all those that were generated. After this description we will introduce the first result of this article: an undecidability result proving that having an algorithmic procedure that decides for every possible Turing Machine that produces theorems, whether it is able to produce also interesting theorems, is an undecidable problem. Consequently, we will argue that judging whether a theorem prover is able to produce interesting theorems remains a non deterministic task, at best a task to be addressed by program based in an algorithm guided by heuristics criteria. Therefore, as a human, to satisfy this task two things are necessary: an expert survey that sheds light on what a theorem prover/finder of interesting geometric theorems is, and—to enable this analysis— other surveys that clarify metrics and approaches related to the interestingness of geometric theorems. In the conclusion of this article we will introduce the structure of two of these surveys —the second result of this article— and we will discuss some future work. 1 Introduction In Automated Reasoning: 33 Basic Research Problems, Larry Wos, wrote about the problems that computer programs that reason face. Problem 31 is still open and object of active research [56, 57]: Wos’ Problem 31—What properties can be identified to permit an automated reasoning program to find new and interesting theorems, as opposed to proving conjectured theorems? Two problems in a single sentence: new and interesting theorems. The automatic discovery of new theorems is a goal in itself, it has been addressed in specific areas, with different methods. The separation * Partially supported by FCT – Foundation for Science and Technology, I.P., within the scope of the project CISUC – UID/CEC/00326/2020 and by European Social Fund, through the Regional Operational Program Centro 2020. † Partially supported by Italian Ministry of Education, University and Research through the PRIN 2017 project “The Manifest Image and the Scientific Image” prot. 2017ZNWW7F 004. ‡ Funded by ERC Consolidator Grant 864075 (CAESAR). P. Quaresma and Z. Kovács (Ed.): Automated Deduction in Geometry 2023 (ADG 2023). EPTCS 398, 2024, pp. 85–100, doi:10.4204/EPTCS.398.12 © P. Quaresma, P. Graziani & S.M. Nicoletti This work is licensed under the Creative Commons Attribution License." 2401.11906v1,"Solving with GeoGebra Discovery an Austrian Mathematics Olympiad Problem: Lessons Learned Belén Ariño-Morera Departamento de Economía Financiera y Contabilidad, Universidad Rey Juan Carlos, Madrid, Spain belen.arino@urjc.es Zoltán Kovács The Private University College of Education of the Diocese of Linz, Austria* zoltan.kovacs@ph-linz.at Tomás Recio Escuela Politécnica Superior, Universidad Antonio de Nebrija, Madrid, Spain trecio@nebrija.es Piedad Tolmos Departamento de Economía Financiera y Contabilidad, Universidad Rey Juan Carlos, Madrid, Spain piedad.tolmos@urjc.es We address, through the automated reasoning tools in GeoGebra Discovery, a problem from a regional phase of the Austrian Mathematics Olympiad 2023. Trying to solve this problem gives rise to four different kind of feedback: the almost instantaneous, automated solution of the proposed problem; the measure of its complexity, according to some recent proposals; the automated discovery of a generalization of the given assertion, showing that the same statement is true over more general polygons than those mentioned in the problem; and the difficulties associated to the analysis of the surprising and involved high number of degenerate cases that appear when using the LocusEquation command in this problem. In our communication we will describe and reflect on these diverse issues, enhancing its exemplar role for showing some of the advantages, problems, and current fields of development of GeoGebra Discovery. 1 Introduction In the past years we have been developing and including, both in the standard version of GeoGebra 1 as well as in the fork version GeoGebra Discovery 2 , different automated reasoning tools (ART) [1]. Mathematics Olympiads problems provide an interesting benchmark for testing the performance of such instruments. Interesting, from multiple perspectives: by itself, as a source of challenging mathematical questions that our ART should be able to deal with; as a test to measure and compare the performance of humans and machines on the same problems [2],[3]; as a test on the suitability of the recently proposed intrinsic measure of complexity of a geometric statement [4]. In this communication we will focus on how our ART behave concerning some of these issues, when addressing an interesting problem recently proposed in a regional phase of the Austrian Mathematics * The work was partially supported by the grant PID2020-113192GB-I00 from the Spanish MICINN. 1 www.geogebra.org 2 https://kovzol.github.io/geogebra-discovery/ P. Quaresma and Z. Kovács (Ed.): Automated Deduction in Geometry 2023 (ADG 2023). EPTCS 398, 2024, pp. 101–109, doi:10.4204/EPTCS.398.13 © B. Ariño-Morera et al. This work is licensed under the Creative Commons Attribution License." 2401.11908v1,"The Locus Story of a Rocking Camel in a Medical Center in the City of Freistadt Anna Käferböck The Private University College of Education of the Diocese of Linz, Austria anna.kaeferboeck@gmx.at Zoltán Kovács The Private University College of Education of the Diocese of Linz, Austria zoltan.kovacs@ph-linz.at We give an example of automated geometry reasoning for an imaginary classroom project by using the free software package GeoGebra Discovery. The project is motivated by a publicly available toy, a rocking camel, installed at a medical center in Upper Austria. We explain how the process of a false conjecture, experimenting, modeling, a precise mathematical setup, and then a proof by automated reasoning could help extend mathematical knowledge at secondary school level and above. 1 Introduction Automated reasoning in geometry is available in various software tools for several years, mostly in prover packages. In this paper we pay our attention to a non-trivial presence of a geometry prover in the software tool GeoGebra Discovery [4, 5] that aims at reaching secondary schools with its intuitive user interface. Most importantly, we give a report on a STEM/STEAM project that was discussed in a group of prospective mathematics teachers at the Private University College of Education of the Diocese of Linz in Upper Austria during the winter semester 2022/23, in the frame of a course that focuses on exploiting technology in mathematics education (36 students in 2 working groups). This project consisted of several other experiments that were already communicated by the second author. The discussed activity, a detailed study of the movement of a rocking camel, is however, completely new. Also, some major improvements in the underlying software tool (implemented by the second author with a substantial help of the students’ feedback), makes it much easier to model similar project setups and conclude mathematical knowledge in an automated way. 2 GeoGebra Discovery and its Automated Reasoning Tools GeoGebra Discovery is a fork of GeoGebra, 12 a de facto standard tool that supports mathematics education at various levels of learners. GeoGebra 5.0 and above come with a built-in automated reasoning subsystem. The supported commands: Prove, ProveDetails, LocusEquation and Envelope are further developed in GeoGebra Discovery by an addition of various other commands like Discover, Compare and RealQuantifierElimination. Also, several improvements of the existing commands are included. 1 GeoGebra is an interactive geometry, algebra, statistics and calculus application, intended for learning and teaching math- ematics and science from primary school to university level, available at https://geogebra.org. 2 GeoGebra Discovery is available at https://kovzol.github.io/geogebra-discovery. P. Quaresma and Z. Kovács (Ed.): Automated Deduction in Geometry 2023 (ADG 2023). EPTCS 398, 2024, pp. 132–141, doi:10.4204/EPTCS.398.16 © A. Käferböck & Z. Kovács This work is licensed under the Creative Commons Attribution License." 2401.11932v1,"Accelerating Causal Algorithms for Industrial-scale Data: A Distributed Computing Approach with Ray Framework Vishal Verma Vinod Reddy Jaiprakash Ravi vishal.verma@dream11.com Dream11 Mumbai, India vinod.reddy@dream11.com Dream11 Mumbai, India jaiprakash.r@dream11.com Dream11 Mumbai, India ABSTRACT The increasing need for causal analysis in large-scale industrial datasets necessitates the development of efficient and scalable causal algorithms for real-world applications. This paper addresses the challenge of scaling causal algorithms in the context of conducting causal analysis on extensive datasets commonly encountered in industrial settings. Our proposed solution involves enhancing the scalability of causal algorithm libraries, such as EconML, by leveraging the parallelism capabilities offered by the distributed computing framework Ray. We explore the potential of parallelizing key iterative steps within causal algorithms to significantly reduce overall runtime, supported by a case study that examines the impact on estimation times and costs. Through this approach, we aim to provide a more effective solution for implementing causal analysis in large-scale industrial applications. CCS CONCEPTS • Computer systems organization → Cloud computing; Machine Learning; • General and reference → Performance. KEYWORDS strategies. However, while traditional AB testing [21, 24] is helpful, many user-related questions cannot be answered since it is not possible to intervene with users in many of these, making them even more crucial to the company’s success. Several libraries have been introduced for causal discovery and inference (Kalainathan and Goudet, 2019; Sharma and Kiciman, 2020; Beaumont et al., 2021)[10, 11, 20] due to the importance of this issue. Nevertheless, these libraries have certain restrictions and limitations when it comes to large-scale of data having hundreds of covariates and confounders. In this study, we show how we employ a distributed computing framework to create our own causal inference platform (NEXUS), which helps us overcome these difficulties and accomplish the following objectives: • A substantial parallelism • Scalable and quick tweaking of the hyperparameters • Cost optimizations The purpose of this study is to illustrate and investigate the extent to which such objectives are feasible. We also present a prototype Orthogonal Machine Learning implementation by scaling the EconML Orthogonal ML algorithm with Ray. causal machine learning, distributed computing, observational study ACM Reference Format: Vishal Verma, Vinod Reddy, and Jaiprakash Ravi. 2023. Accelerating Causal Algorithms for Industrial-scale Data: A Distributed Computing Approach with Ray Framework. In Proceedings of The Third International Conference on Artificial Intelligence and Machine Learning Systems (AIMLSystems 2023). ACM, New York, NY, USA, 6 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION The industry has shown increasing interest in the field of causal inference in recent years, as it offers the potential to make datadriven decisions that can significantly impact a business. This is particularly relevant for large companies like Dream11 [8], which operate on a complex scale of data, and thus relying solely on AB [12] testing for causal inference is not always feasible. As a result, causal studies have become essential in the data-driven decisionmaking process, as they help companies shape their future business Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. AIMLSystems 2023, October 25–28, 2023, Bangalore, India © 2023 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX 2 PRELIMINARIES 2.1 Observational Causal Inference (OCI) : Setup and Assumptions For ease of exposition, we consider a situation where our treatment (𝑡 𝑖 ) is binary. Let {𝑥 𝑖 , 𝑡 𝑖 , 𝑌 𝑖 } represent the data of user 𝑖, where 𝑥 𝑖 is a multidimensional vector of confounders, 𝑡 𝑖 ∈ {0, 1} is a binary treatment and 𝑦 𝑖 is the corresponding outcome of interest. Let 𝑌 (𝑡 𝑖 = 𝑡) represent the outcome of user 𝑖 under the treatment 𝑡. If 𝑡 is the actual treatment received by 𝑖 then 𝑌 (𝑡 𝑖 = 𝑡) is the actual outcome, otherwise it is the potential (counterfactual) outcome of user 𝑖 under the treatment. Of course, the fundamental problem in causal inference is that for each user, we only observe either 𝑌 (𝑡 𝑖 = 0) or 𝑌 (𝑡 𝑖 = 1) 1 . For the sake of exposition, we consider two widely used estimands of interest, the Average Treatment Effect (ATE), and Conditional Average Treatment Effect (CATE). 𝜏 𝑡 1 ,𝑡 0 = 𝐴𝑇 𝐸 (𝑡 1 , 𝑡 0 ) = 𝐸 [𝑌 (𝑡 𝑖 = 𝑡 1 ) − 𝑌 (𝑡 𝑖 = 𝑡 0 )] (1) 𝜏 𝑡 1 ,𝑡 0 (𝑥) = 𝐶𝐴𝑇 𝐸 (𝑥, 𝑡 0 , 𝑡 1 ) = 𝐸 [𝑌 (𝑡 𝑖 = 𝑡 1 ) − 𝑌 (𝑡 𝑖 = 𝑡 0 )|𝑋 = 𝑥] (2) Note: 𝜏 𝑡 1 ,𝑡 0 = 𝐸 𝑋 [𝜏 𝑡 1 ,𝑡 0 (𝑥)|𝑋 = 𝑥] Of course, as mentioned before, for any user 𝑖 we will only be able to observe one of the potential outcomes, and therefore the two equations above are not estimable in their current format[Table 1 We work under the Rubin Causal Model for now" 2401.11934v1,"Systematic Performance Evaluation Framework for LEO Mega-Constellation Satellite Networks Yu Wang, Chuili Kong, Xian Meng, Hejia Luo, Ke-Xin Li, and Jun Wang Huawei Technologies Co., Ltd., Hangzhou, China. Email: wangyu207@huawei.com Abstract—Low Earth orbit (LEO) mega-constellation satellite networks have shown great potential to extend the coverage capability of conventional terrestrial networks. How to systematically define, quantify, and assess the technical performance of LEO mega-constellation satellite networks remains an open issue. In this paper, we propose a comprehensive key performance indicator (KPI) framework for mega-constellation based LEO satellite networks. An efficient LEO constellation oriented performance evaluation methodology is then carefully designed by resorting to the concept of interfering area and spherical geographic cell. We have carried out rigorous system-level simulations and provided numerical results to assess the KPI framework. It can be observed that the achieved area traffic capacity of the reference LEO constellation is around 4 Kbps/km 2 , with service availability ranging from 0.36 to 0.39. Besides, the average access success probability and handover failure rate is approximate to 96% and 10%, respectively, in the nearest satellite association scheme. Index Terms—LEO satellite constellation, KPI, performance evaluation, quasi-earth-fixed, beam hopping, 3GPP NTN. I. I NTRODUCTION Next generation communication era is expected to assure three-dimensional global wireless connectivity and bridge the digital divide through seamlessly integrating non-terrestrial networks (NTNs) [1]–[3]. To accomplish the ambitious vision, innovative standardization endeavors have been sponsored by the Third Generation Partnership Project (3GPP) to study a set of necessary adaptations enabling the operation of 5G New Radio (NR) protocol in the NTN context [4], [5]. Specifically, LEO mega-constellation satellite networks (LMCSNs) represent a burgeoning frontier scenario for NTN, and thus have recently attracted substantial academical and industrial interests. Composed by a large number of inter-connected LEO satellites (typically several thousands or even more), LMCSNs can provide increased network coverage, improved broadband capacity, and reduced end-to-end delay. Numerous commercial solutions have been envisaged to provide broadband Internet access by deploying LEO satellite mega-constellations, e.g., Oneweb, Kuiper, Starlink and AST SpaceMobile. Before delving into LMCSN, we should first address the fundamental issue of what critical capability the network can provide. As such, it is requisite to define and characterize the corresponding key performance indicators (KPIs) therein. On one hand, a well known KPI framework has been put forward in authoritative standard organizations such as International Telecommunication Union (ITU) [6] and 3GPP [7]. However, the baseline KPI framework can not fully reflect the distinct characteristic for LMCSNs in terms of access, mobility, and Figure 1. Beam layout in existing single-satellite simulation. constellation-specific networking performance. On the other hand, there are some pioneering efforts devoted to investigating LMSCN-specific KPIs. More specifically, satellite handover (HO) related KPIs (e.g., time-of-stay, and radio link failures) [8] are evaluated based on system-level simulation for earth-moving LEO satellite networks. In [9], the LEO constellation design problem is studied to optimize constellation KPIs such as service availability and scalability. A new performance metric, i.e., service coverage, defined as the ratio of traffic density to service requirement per unit area is introduced in [10] to describe the coverage capability for LMSCNs. Besides, by resorting to stochastic geometry, the downlink coverage probability and average data rate are theoretically analyzed for LEO constellations. To sum up, state-of-the-art studies only concentrate on partial aspects of the KPI system, and a systematic KPI framework for LEO mega-constellations is still missing in the literature. Accordingly, to evaluate the aforementioned KPI system for the emerging LMCSN scenario, an efficient performance assessment methodology is necessary. Considering the distinct satellite network feature such as frequency/polarization reuse and beam layout configurations, an extension of conventional wrap-around mechanism with additional surrounding beams is applied in case of single-satellite interference modeling [4], [6]. However, the above approach is only effective in the specific case of central beams at satellite nadir (i.e., around 90 ◦ elevation angle), and cannot be directly extended to the multi-satellite simulation case. This is because the beam layout is defined by hexagonal mapping of the beam bore sight directions on UV plane, and the generated beams in the geodetic plane exhibit severe distortion especially at the edge" 2401.11954v1,"RUMBoost: Gradient Boosted Random Utility Models Nicolas Salvadé a,∗ , Tim Hillel a a Department of Civil, Environmental and Geomatic Engineering, University College London, Gower Street, London, WC1E 6BT, United Kingdom Abstract This paper introduces the RUMBoost model, a novel discrete choice modelling approach that combines the interpretability and behavioural robustness of Random Utility Models (RUMs) with the generalisation and predictive ability of deep learning methods. We obtain the full functional form of non-linear utility specifications by replacing each linear parameter in the utility functions of a RUM with an ensemble of gradient boosted regression trees. This enables piece-wise constant utility values to be imputed for all alternatives directly from the data for any possible combination of input variables. We introduce additional constraints on the ensembles to ensure three crucial features of the utility specifications: (i) dependency of the utilities of each alternative on only the attributes of that alternative, (ii) monotonicity of marginal utilities, and (iii) an intrinsically interpretable functional form, where the exact response of the model is known throughout the entire input space. Furthermore, we introduce an optimisation-based smoothing technique that replaces the piece-wise constant utility values of alternative attributes with monotonic piece-wise cubic splines to identify non-linear parameters with defined gradient. We demonstrate the potential of the RUMBoost model compared to various ML and Random Utility benchmark models for revealed preference mode choice data from London. The results highlight both the great predictive performance and the direct interpretability of our proposed approach. Furthermore, by analysing the non-linear utility functions, we can identify complex behaviours associated with different transportation modes which would not have been possible with conventional approaches. The smoothed attribute utility functions allow for the calculation of various behavioural indicators such as the Value of Time (VoT) and marginal utilities. Finally, we demonstrate the flexibility of our methodology by showing how the RUMBoost model can be extended to complex model specifications, including attribute interactions, correlation within alternative error terms (Nested Logit model) and heterogeneity within the population (Mixed Logit model). Keywords: Discrete Choice, Mode Choice, Machine Learning, Random Utility, Ensemble Learning 1. Introduction and literature review Discrete choice models (DCMs), based on Random Utility theory, have been used extensively to model choices over the last 50 years (Ben-Akiva and Lerman, 1985; Train, 2009), including the choice of travel mode. DCMs have many desirable qualities: most crucially, their parametric form is directly interpretable and allows for the integration of expert knowledge consistent with behavioural theory. For example, with a DCM, it is possible to: (i) ensure marginal utilities in the model are monotonic (e.g. that increasing the cost of an alternative will always decrease its utility); (ii) restrict the utilities of each alternative to be dependent only on the attributes (or features) of that alternative; and (iii) define arbitrary interactions of socio-economic characteristics and alternative-specific attributes. These three points are essential to derive key behavioural indicators, such as elasticities and Value of Time (VoT), used to inform transport policies and investment decisions. However, the parametric form of DCMs is not without disadvantages. Crucially, the linear-in-parameters utility functions are relatively inflexible and must be specified in advance by the modeller. As such, these models may fail to capture complex phenomena and non-linear effects in human behaviour. Among DCMs, one of the best-known and most widely used models is the Multinomial Logit model (MNL) derived by McFadden et al. (1973). The model assumes that the error term is a type 1 extreme value ∗ Corresponding author Email addresses: nicolas.salvade.22@ucl.ac.uk (Nicolas Salvadé), tim.hillel@ucl.ac.uk (Tim Hillel) Preprint submitted to Transportation Research Part C: Emerging Technologies January 23, 2024" 2401.11957v1,"Gravitational collapse of matter in the presence of non-minimally coupled Quintessence and Phantom-like scalar fields Priyanka Saha ∗ Department of Physics, Indian Institute of Technology, Kanpur, Kanpur-208016, India Dipanjan Dey † Department of Mathematics and Statistics, Dalhousie University, Halifax, Nova Scotia, Canada B3H 3J5. Kaushik Bhattacharya ‡ Department of Physics, Indian Institute of Technology, Kanpur, Kanpur-208016,India This paper explores the evolution of the over-dense region of dark matter in the presence of a nonminimally coupled scalar field which is used to model quintessence and phantom-like dark energy. We focus on algebraic coupling, where the interaction Lagrangian is independent of the derivatives of the scalar field. To make our model more relativistic, like the minimal coupling scenario we studied earlier, we consider a spacetime structure that is internally closed Friedmann-Lemaitre-Robertson- Walker (FLRW) spacetime and externally the generalized Vaidya spacetime. This structure allows non-zero matter flux at the boundary of the over-dense region. Our investigation reveals that an increment of the coupling strength causes dark energy to cluster with dark matter at a certain cosmological scale where the influence of dark energy cannot be ignored. This phenomenon arises from the specific nature of the non-minimal coupling considered in this paper. While the evolution of matter’s energy density remains unchanged, the scalar field’s Klein-Gordon equation is modified, causing dark energy to deviate from its homogeneous state and cluster with dark matter. Similar to minimal coupling scenarios, closed spherical regions do not collapse within certain parameter ranges, exhibiting eternal expansion within the spatially flat FLRW spacetime—acting as voids with decreasing matter density. The study extends our understanding of the cosmological scenarios where the virialization of the over-dense regions of dark matter is influenced by the non-minimally coupled dark energy. I. INTRODUCTION The exploration of the emergence of structures in a homogeneous and isotropic universe is an intriguing topic in astrophysics and cosmology, rooted in linear perturbation theory in cosmology [1, 2]. As we know, after recombination, perturbation modes deviate from linearity, serving as the pillars for future structural formations. Before entering into the non-linear regime, phenomena such as Jeans instability play an important role in growing the primordial perturbations [1, 2]. Gravitationally bound structures, from galaxy clusters to smaller scales, are believed to originate from nonlinear instabilities, with the dark matter sector playing a central role [3–6]. Since dark matter seems to be weekly interacting, it decouples from the ‘primordial matter soup’ long before baryonic matter, initiating a collapse to form structures. Consequently, these over-dense regions are conventionally believed to predominantly consist of dark matter. When the baryonic matter decouples, it accumulates inside the over-dense regions of dark matter and eventually forms galaxies, galaxy clusters, etc. As an initial approximation, the primordial over-dense patches of dark matter are considered to be spherically ∗ priyankas21@iitk.ac.in † deydipanjan7@gmail.com ‡ kaushikb@iitk.ac.in symmetric, and their evolution is commonly modeled using the ‘top-hat collapse model’ [7]. In this model, these over-dense regions are described using a spherically symmetric closed Friedmann-Lemaitre-Robertson- Walker (FLRW) metric. On the cosmological scale, the universe is nearly flat, and therefore, the background of the over-dense regions is described by a spatially flat FLRW metric. According to the top-hat collapse model, the over-dense regions of dark matter initially expand in an isotropic, homogeneous manner along with the background flat FLRW spacetime. The fluid within these spherically symmetric over-dense regions is considered to be homogeneous and pressure-less. Eventually, the dynamics of these over-dense regions detach from the background cosmic expansion, and these regions begin to behave like sub-universes. These over-dense subuniverses start to collapse under gravity after reaching a turnaround. However, within general relativity (GR), it is well-known that the outcome of a collapse involving a homogeneous pressure-less fluid (dust) is always a black hole [8]. Consequently, using the top-hat collapse model alone, it is impossible to relativistically obtain desired small-scale equilibrium configurations as the eventual end-states of the gravitational collapse of over-dense regions. To address this limitation, Newtonian virialization techniques are employed to obtain such equilibrium states, providing an explanation for galaxy formation. Virialization is a process wherein a system of N particles attains an equilibrium state at a large system time," 2401.11967v1,"Exploring descriptors for titanium microstructure via digital fingerprints from variational autoencoders Michael D. White 1,∗ , Gowtham Nimmal Haribabu 1,3 , Jeyapriya Thimukonda Jegadeesan 3 , Bikramjit Basu 3 , Philip J. Withers 1,2 and Chris P. Race 2,4 1 Department of Materials, University of Manchester, Manchester, UK, M13 9PL 2 3 4 Henry Royce Institute, University of Manchester, Manchester, UK, M13 9PL Materials Research Centre, Indian Institute of Science, Bangalore, India, 560012 Department of Materials Science and Engineering, University of Sheffield, Sheffield, UK, S1 3JD 23rd January 2024 Abstract Microstructure is key to controlling and understanding the properties of metallic materials, but traditional approaches to describing microstructure capture only a small number of features. To enable data-centric approaches to materials discovery, to allow efficient storage of microstructural data and to assist in quality control in metals processing, we require more complete descriptors of microstructure. The concept of microstructural fingerprinting, using machine learning (ML) to develop quantitative, low-dimensional descriptors of microstructures, has recently attracted significant attention. However, it is difficult to interpret conclusions drawn by ML algorithms, which are often referred to as “black boxes”. For example, convolutional neural networks (CNNs) can be trained to make predictions about a material from a set of microstructural image data, but the feature space that is learned is often used uncritically and adopted without any validation. Here we explore the use of variational autoencoders (VAEs), comprising a pair of CNNs, which can be trained to produce microstructural fingerprints in a continuous latent space. The VAE architecture also permits the reconstruction of images from fingerprints, allowing us to explore how key features of microstructure are encoded in the latent space of fingerprints. We develop a VAE architecture based on ResNet18 and train it on two classes of Ti-6Al-4V optical micrographs (bimodal and lamellar) as an example of an industrially important alloy where microstructural control is critical to performance. The latent/feature space of fingerprints learned by the VAE is explored in several ways, including by supplying interpolated and randomly perturbed fingerprints to the trained decoder and via dimensionality reduction to explore the distribution and correlation of microstructural features within the latent space of fingerprints. We show that the fingerprints generated via the trained VAE exhibit smooth, interpolable behaviour with stability to local perturbations, supporting their suitability as general ∗ Corresponding author Email address: michael.white-3@postgrad.manchester.ac.uk (M.D. White) 1" 2401.11993v1,"Expert-Driven Monitoring of Operational ML Models Joran Leest Claudia Raibulet Ilias Gerostathopoulos Patricia Lago Vrije Universiteit Amsterdam The Netherlands j.g.leest@vu.nl Vrije Universiteit Amsterdam The Netherlands c.raibulet@vu.nl Vrije Universiteit Amsterdam The Netherlands i.g.gerostathopoulos@vu.nl Vrije Universiteit Amsterdam The Netherlands p.lago@vu.nl ABSTRACT We propose Expert Monitoring, an approach that leverages domain expertise to enhance the detection and mitigation of concept drift in machine learning (ML) models. Our approach supports practitioners by consolidating domain expertise related to concept drift-inducing events, making this expertise accessible to on-call personnel, and enabling automatic adaptability with expert oversight. ACM Reference Format: Joran Leest, Claudia Raibulet, Ilias Gerostathopoulos, and Patricia Lago. 2024. Expert-Driven Monitoring of Operational ML Models. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 5 pages. https://doi.org/10.1145 1 INTRODUCTION The ubiquitous integration of machine learning (ML) in modern software systems marks a shift from deterministic behavior of software to behavior derived from stochastic processes. This transition brings a significant challenge: ensuring the consistent performance of ML models that are subject to changes in the data distribution, due to external events and data integrity issues [12]. This phenomenon, known as data drift, encompasses feature drift (changes in the input distribution, 𝑃 (𝑋 )) and concept drift (changes in the conditional probability distribution of the target variable given an input, 𝑃 (𝑌 |𝑋 )) [29]. Notably, concept drift has a substantial influence on model performance and necessitates mitigative action [6, 14]. The growing use of ML underscores the importance of addressing concept drift, particularly in sensitive areas like credit card fraud detection, to prevent discriminatory actions [21]. We must scrutinize concept drift mitigation solutions, including insights from data mining [6, 17], and integrate them into the emerging ML operations (MLOps) framework used by practitioners [13]. In this paper, we explore MLOps practices and challenges, highlighting the inherent limitations of automated concept drift detection and mitigation, and motivate the the necessity of domain expertise (Section 2). Based on this understanding, we outline an approach to integrate expert knowledge into a monitoring system (Section 3). Finally, we discuss the key aspects of our approach (Section 4), and conclude by outlining our future plans (Section 5). Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145 2 NAVIGATING THE DARKNESS: CONCEPT DRIFT IN PRACTICE This section discusses the challenge of detecting and mitigating concept drift, and how domain expertise is utilized to address it. 2.1 The Practical Challenges of Concept Drift Detection – Where the Shadows Lie We see the challenges in detecting and deciphering concept drift’s latent aspects, often leaving practitioners ""wandering in the dark"". 2.1.1 Concept Drift Detection Without Labeled Data. Unlike feature drift, which can be readily observed in input data and its effects on model performance inferred through various estimation methods [3, 7, 10, 22, 23, 26], concept drift detection depends on monitoring metrics such as accuracy [6, 12]. This is challenging in real-world scenarios, as labeled data is often delayed or completely absent [12]. For example, in e-commerce churn prediction, churn determination only occurs after a specified time frame (e.g., a month or year) [1]. In the absence of labeled data, practitioners typically rely on detecting drift in the model’s predictions and features, such as through the use of a Kolmogorov-Smirnov test, which can act as a proxy to infer the presence of concept drift and its effect on model performance [2, 12, 14]. This strategy makes sense because it leverages the common co-occurrence of feature drift and concept drift [6, 14, 16]. In real-world scenarios, events impact how data is generated, collected, and managed, leading to changes in our models that capture these processes [9]. Feature drift can act as a visible signal of these changes. Nonetheless, inferring concept drift from feature drift remains challenging, as their presence or severity does not always correlate [14]. As a result, triggering alerts for every instance of feature drift generates many false alarms [25–27]. To illustrate the challenge of concept drift detection without labeled data, let us consider a model that predicts whether a customer will churn based on the customer age and recent page visits (Fig. 1). Figure 1: Data drift in a customer churn prediction model." 2401.11995v1,"Nonequlibrium Third Law of Thermodynamics Faezeh Khodabandehlou E-mail: faezeh.khodabandehlou@kuleuven.be Department of Physics and Astronomy, KU Leuven, Belgium Abstract. The extended Third Law for nonequilibrium jump processes is studied in [1, 2], where the nonequilibrium heat capacity and the excess heat with corresponding quasipotential are introduced. The extended Third Law states that under two conditions, the nonequlibrium heat capacity vanishes as the temperature approaches zero. In this paper, we present a concise overview of key papers addressing the nonequilibrium Nernst postulate (the nonequilibrium Third Law of thermodaynamics) and nonequilibrium calorimetry. The new result presented in this work include an interpretation of quasipotential in terms of the mean time taken by the Markov jump process, starting from a given state, to reach other states for the first time. 1. Introduction The Third Law of Thermodynamics, initially formulated by Nernst and Planck, examines fundamental questions about entropy and heat capacity at low temperatures [3, 4]. Nernst’s version suggests that entropy becomes a constant at zero temperature, independent of external parameters, and that heat capacity vanishes as temperature approaches zero [5, 6]. However, the Third Law or the Nernst postulate is not universally applicable to all substances and requires nontrivial conditions [7, 8]. Over time, the emphasis has been on developing calorimetry and establishing a general structure for studying thermodynamic processes in nonequilibrium systems [9, 10, 11]. The objective is not solely to extend the formal definition of entropy. Instead, it aims to obtain quantitative measures of heat changes during quasistatic relaxations in small open systems under new nonequilibrium conditions. If the change is induced by modifying the temperature of the environment, the excess heat per change in temperature is appropriately termed nonequilibrium heat capacity [12, 13, 14]. This need not be restricted to the context of linear irreversible thermodynamics or close-to-equilibrium processes. The present paper specifically delves into the low-temperature behavior of excess heat resulting from changes in system parameters during such quasistatic relaxations [9, 10, 11, 15, 16]. Our main result indicates that, for a large and physically motivated class of nonequilibrium systems modeled as Markov jump processes, the excess heat vanishes at absolute zero. Similar to its equilibrium version, this result requires two conditions for extending the Third Law: the uniqueness of the ground state and the sufficient accessibility of states to each other. For the second condition we will show that in low temperature, it is crucial that the maximum mean time for the random walker starting from any state to reach other states remains finite." 2401.12006v2,"Draft version January 24, 2024 Typeset using L A TEX twocolumn style in AASTeX631 A comprehensive correction of the Gaia DR3 XP spectra Bowen Huang (黄博闻) , 1, 2 Haibo Yuan (苑海波) , 1, 2 Maosheng Xiang (向茂盛) , 3 Yang Huang (黄样) Kai Xiao (肖凯) , 1, 2, 4 Shuai Xu (徐帅) , 1, 2 Ruoyi Zhang (张若羿) , 1, 2 Lin Yang (杨琳) , 5 Zexi Niu (牛泽茜) , 4, 3 and Hongrui Gu (顾弘睿) 6, 4 , 4 1 Institute for Frontiers in Astronomy and Astrophysics, Beijing Normal University, Beijing, 102206, China 2 Department of Astronomy, Beijing Normal University No.19, Xinjiekouwai St, Haidian District, Beijing, 100875, China 3 National Astronomical Observatories, Chinese Academy of Sciences, 20A Datun Road, Chaoyang District, Beijing, China 4 School of Astronomy and Space Science, University of Chinese Academy of Sciences, Beijing, 100049, China 5 Department of Cyber Security, Beijing Electronic Science and Technology Institute, Beijing, 100070, China 6 CAS Key Laboratory of Optical Astronomy, National Astronomical Observatories, Chinese Academy of Sciences, Beijing 100101, China (Received October 10, 2023; Revised December 21, 2023; Accepted December 22, 2023) ABSTRACT By combining spectra from the CALSPEC and NGSL, as well as spectroscopic data from the LAM- OST Data Release 7 (DR7), we have analyzed and corrected the systematic errors of the Gaia DR3 BP/RP (XP) spectra. The errors depend on the normalized spectral energy distribution (simplified by two independent “colors”) and G magnitude. Our corrections are applicable in the range of approximately −0.5 < BP −RP < 2, 3 < G < 17.5 and E(B−V ) < 0.8. To validate our correction, we conduct independent tests by comparing with the MILES and LEMONY spectra. The results demonstrate that the systematic errors of BP − RP and G have been effectively corrected, especially in the near ultraviolet. The consistency between the corrected Gaia XP spectra and the MILES and LEMONY is better than 2 per cent in the wavelength range of 336 − 400 nm and 1 per cent in redder wavelengths. A global absolute calibration is also carried out by comparing the synthetic Gaia photometry from the corrected XP spectra with the corrected Gaia DR3 photometry. Our study opens up new possibilities for using XP spectra in many fields. A Python package is publicly available to do the corrections (https://doi.org/10.12149/101375 or https://github.com/HiromonGON/GaiaXPcorrection). Keywords: catalogs —instrumentation: spectroscopy – extinction – methods: data analysis – surveys – techniques: imaging, spectroscopic 1. INTRODUCTION Gaia Data Release 3 (DR3; Gaia Collaboration et al. 2022) has made an extensive and novel data-set available, including about 220 million flux-calibrated lowresolution BP/RP (XP; Blue Photometer and Red Photometer) spectra that cover the wavelength range of 336 − 1020 nm with a measured spectral resolution of R ∼ 20 − 70. It provides one of the best data-sets and a unique opportunity to measure stellar parameters of enormous number of stars, to probe interstellar extinction and investigate Galactic structure and formation Corresponding author: Yuan Haibo (苑海波) yuanhb@bnu.edu.cn history in great detail, and to perform high-precision photometric calibration of other surveys. Despite their huge potential, Gaia XP spectra have been found to suffer systematic errors that depend on color and G magnitude (Montegriffo et al. 2022). For instance, color-dependent errors between red and blue sources have been observed to exceed 50 per cent in the 336 − 400 nm range. Systematic errors, characterized by a discontinuity, have also been noticed in the wavelength range of 640 − 680 nm, where the imperfect conjunction between BP and RP spectra can be observed. These errors have limited the optimal usage of the XP spectra in various areas, such as the determination of stellar parameters (Zhang et al. 2023), extinction curves, and synthetic magnitudes (Gaia Collaboration et al. 2022)." 2401.12008v1,"Four Gluon Vertex from Lattice QCD Manuel Colaço, ∗ Orlando Oliveira, † and Paulo J. Silva ‡ CFisUC, Departamento de Física, Faculdade de Ciências e Tecnologia, Universidade de Coimbra, 3004-516 Coimbra, Portugal A lattice QCD calculation for the four gluon one-particle irreducible Green function in the Landau gauge is discussed. Results for some of the associated form factors are reported for kinematical configurations with a single momentum scale. Our results show that the computation of this Green function requires large statistical ensembles with 10K or larger number of gauge configurations. The simulations considered herein have a clear Monte Carlo signal for momenta up to ∼ 1 GeV. The form factors show an hierarchy, with the form factor associated with the tree level Feynman rule being dominant and essentially constant for the range of momenta accessed. The remaining form factors seem to increase as the momentum decreases, suggesting that a possible log divergence may occur. The computed form factors are, at least, in qualitative agreement with the results obtained with continuum approaches to this vertex, when available. Contents I. Introduction 1 II. The Four Gluon Vertex A. An orthogonal set of operators B. Full Green function and lattice form factors C. Lattice form factors F (i) and 1-PI form factors 2 6 6 7 III. Lattice setup and choice of momenta 7 IV. Lattice form factors 8 V. Summary and Conclusions 11 Acknowledgments 14 A. Three gluon contributions for proportional momenta 14 B. Implementation of color-Lorentz projectors to measure F (i) 14 References 17 I. INTRODUCTION The dynamical content of the QCD Green functions is of upmost importance to all hadronic physics, specially its nonperturbative contents. Indeed, among other phenomena, the interpretation of the hadron spectra, the comprehension of dynamical chiral symmetry breaking and of the quark and gluon confinement mechanisms are outside the scope of the perturbative solution of the theory. The analysis of the QCD Green functions started looking at those functions with smaller number of external legs, namely the propagator or two point correlation functions. Their tensorial structure is simpler, as it requires smaller tensor basis, and can be guided with the help of the Slavnov-Taylor identities. All the two point QCD correlation functions have been studied in detail with non-perturbative methods and a fairly good understanding of these functions has been achieved [1–7]. A good and coherent picture of the two point QCD correlation functions, obtained with ∗ Electronic address: manuel.sc.colaco@gmail.com † Electronic address: orlando@uc.pt ‡ Electronic address: psilva@uc.pt" 2401.12014v1,"Robustness to distribution shifts of compressed networks for edge devices Lulan Shen, Ali Edalati, Brett Meyer, Warren Gross, James J. Clark McGill University Montreal, Quebec, Canada lulan.shen@mail.mcgill.ca, james.j.clark@mcgill.ca Abstract imation [13–15] and compact network design [16, 17]. However, it is challenging to make compressed neural networks perform well in the target domain. Typically, the original networks are trained on a source domain, e.g., ImageNet dataset [18], but compressed networks execute new tasks in a target domain, which has the same classes as the source domain but lacks labeled training data. Therefore, there is always a distribution shift between the source and target domains due to various factors, e.g., pose positions, image quality, sensor noise, domain-specific characteristics, etc. [19]. In this paper, we specifically define data distribution shifts as situations where data samples used for training and testing are sourced from different datasets or domains. Iofinova et al. [20] investigated the transfer performance of pruned convolutional neural networks (CNNs) by evaluating the image classification accuracy of these networks in transfer learning tasks. Specifically, they fine-tuned pretrained and compressed models on ImageNet on different downstream tasks, which contained classes different from those in ImageNet. However, the study did not evaluate the performance of pruned CNNs or other types of compressed models under distribution shifts between training and application distributions with the same classes. Further research is required to investigate the performance of compressed models under distribution shifts, particularly when target domain data is scarce and unlabeled. In such cases, it is challenging to train a standalone network, which emphasizes the need to address distribution shifts to ensure the model’s performance in the target domain. Furthermore, deploying neural networks on edge devices is prevalent in real-life scenarios, and the effect of distribution shifts on compressed neural networks cannot be ignored. Therefore, it is crucial to study the effect of different compression techniques on neural network robustness to distribution shifts, enabling people to prioritize a compression technique that prioritizes model robustness. We empirically investigate the robustness of compressed object classification networks to input data distribution shift, using three commonly-used network compression techniques: filter pruning, KD, and post-training quantiza- It is necessary to develop efficient DNNs deployed on edge devices with limited computation resources. However, the compressed networks often execute new tasks in the target domain, which is different from the source domain where the original network is trained. It is important to investigate the robustness of compressed networks in two types of data distribution shifts: domain shifts and adversarial perturbations. In this study, we discover that compressed models are less robust to distribution shifts than their original networks. Interestingly, larger networks are more vulnerable to losing robustness than smaller ones, even when they are compressed to a similar size as the smaller networks. Furthermore, compact networks obtained by knowledge distillation are much more robust to distribution shifts than pruned networks. Finally, post-training quantization is a reliable method for achieving significant robustness to distribution shifts, and it outperforms both pruned and distilled models in terms of robustness. 1. Introduction Over the past few years, the field of deep learning has witnessed a remarkable surge in the development of largescale models [1, 2]. The deeper and wider architectures of neural networks improve their performance but demand considerable storage and computational resources, preventing them from being deployed on edge devices [3, 4], e.g., mobile phones, smartwatches, IoT devices, etc. This is because these devices often have limited resources in terms of memory, processing power, and energy consumption, which makes it challenging to run large models efficiently. To overcome this challenge, various network compression methods have been developed to reduce the memory footprint and computational complexity while preserving the model’s accuracy. These techniques can be categorized into different main approaches, including network pruning (i.e., weight pruning [5], filter pruning [6, 7]), knowledge distillation (KD) [8], quantization [9–12], low-rank approx- 1" 2401.12024v1,"Multimodal Visual-Tactile Representation Learning through Self-Supervised Contrastive Pre-Training Vedant Dave * , Fotios Lygerakis * , Elmar Rueckert Cyber-Physical-Systems Lab at Montanuniversität Leoben, Austria Abstract— The rapidly evolving field of robotics necessitates methods that can facilitate the fusion of multiple modalities. Specifically, when it comes to interacting with tangible objects, effectively combining visual and tactile sensory data is key to understanding and navigating the complex dynamics of the physical world, enabling a more nuanced and adaptable response to changing environments. Nevertheless, much of the earlier work in merging these two sensory modalities has relied on supervised methods utilizing datasets labeled by humans. This paper introduces MViTac, a novel methodology that leverages contrastive learning to integrate vision and touch sensations in a self-supervised fashion. By availing both sensory inputs, MViTac leverages intra and inter-modality losses for learning representations, resulting in enhanced material property classification and more adept grasping prediction. Through a series of experiments, we showcase the effectiveness of our method and its superiority over existing state-of-the-art self-supervised and supervised techniques. In evaluating our methodology, we focus on two distinct tasks: material classification and grasping success prediction. Our results indicate that MViTac facilitates the development of improved modality encoders, yielding more robust representations as evidenced by linear probing assessments. https://sites.google.com/ view/mvitac/home I. INTRODUCTION In the realm of robotics, visual perception has traditionally served as a central modality extensively leveraged for acquiring nuanced environmental representations, a role emphasized in a range of studies [1, 2]. However, this approach harbors intrinsic limitations in fully encapsulating the dynamic and intricate state of the surrounding environment [3]. Conversely, tactile sensing excels in delineating fine-grained attributes that are beyond the grasp of visual modalities, effectively capturing the subtleties that evade visual systems. Thus, a synergic integration of both visual and tactile modalities offers a more robust and comprehensive world representation, wherein the visual systems predominantly decipher global features while tactile sensing augments this with enriched local feature representations [4, 5]. However, the fusion of these modalities is far from trivial, given the disparate information density each conveys over time. Especially in manipulation task settings, the reliance on vision remains high until the robot engages physically with an object or surface; following this interaction, the tactile modality often becomes the principal source of nuanced data, particularly in scenarios involving occlusion by the robotic arm. * These authors contributed equally to this work. Corresponding Author: vedant.dave@unileoben.ac.at Recent endeavors are increasingly focusing on the efficient fusion of vision and tactile representations to navigate the challenges delineated above [6–10]. This is further propelled by the significant advancements in self-supervised learning (SSL) approaches, catalyzed by the lack of labeled tactile and visuotactile datasets [9–12]. In contrast to visual data, where simulations and virtual environments can often provide substantial and rich datasets, tactile data collection requires physical interaction with a wide array of materials and objects to encapsulate a rich diversity of tactile experiences. This not only escalates the complexity but also significantly extends the time needed for data collection. Recognizing these challenges, researchers are turning towards the SSL strategy to leverage unlabeled data, which is easier and quicker to collect [10–12]. SSL facilitates the learning of useful representations from this unlabeled data, potentially accelerating the development of sophisticated visuotactile systems by reducing the dependency on labor-intensive labeled datasets, thus presenting a promising avenue to mitigate the hurdles in tactile data collection. In recent years, contrastive learning (CL) has risen as a prominent subfield of self-supervised learning (SSL), establishing itself as the predominant methodology for pretraining visual encoders [13–18]. In this study, we propose a Multi-modal Visual-Tactile (MViTac) representation learning algorithm for effectively fusing the two modalities. Our methodology facilitates the learning of both intra and inter-modal representations, leveraging the richness of visual and tactile observations. We use two sets of encoders to compute the InfoNCE loss for the two ranges of losses. We employ the within-modality (intra) loss to maximize the agreement of the representations of similar modality instances. Similarly, we employ the across-modality (inter) loss to maximize the similarity of representations of different modalities across the same sample. Utilizing the Touch-and-Go [11] and Calandra [4] datasets for training the encoders, we undertake an exhaustive evaluation across diverse downstream tasks, including material property identifications and robot grasp prediction. We thereby substantiate the efficacy of our approach in transcending the performance benchmarks set by previous state-of-the-art frameworks. II. RELATED WORK The integration of visual and tactile modalities in robotic systems is a growing research area, with numerous studies delving into its complexities. This section highlights key contributions in this field." 2401.12028v1,"Quantum Characteristics Near Event Horizons , 1, ∗ S. Al-Kuwari A. Ali 1 , 1, † M. Ghominejad , 2, ‡ M. T. Rahim , 1, § and S. Haddadi 2, ¶ Qatar Centre for Quantum Computing (QC2), College of Science and Engineering, Hamad Bin Khalifa University, Qatar Foundation, Doha, Qatar 2 Faculty of Physics, Semnan University, P.O. Box 35195-363, Semnan, Iran We investigate the genuine multipartite entanglement, global entanglement, and quantum coherence among different configurations of a penta-partite system involving particles inside and outside the event horizon of a Schwarzschild black hole. We consider and analyze different scenarios based on how many particles are accessible. In each scenario, we evaluate first-order coherence, concurrence fill, and global concurrence under varying Hawking temperature and Dirac particle mode frequency. For the fully accessible scenario with all particles outside the event horizon, the measures exhibit non-monotonic behavior with a discernible trade-off. In the partially accessible scenarios with one particle inside the event horizon, monotonic variations and clear trade-offs are observed. Finally, in the scenario when two particles are inside the event horizon, concurrence fill becomes complex, attributed to the violation of the entanglement polygon inequality in curved space-time. This result reveals intricate relationships between entanglement and coherence around the event horizon of Schwarzchild black holes. Our findings suggest reevaluating entanglement polygon inequalities and concurrence fill for applicability in flat and curved space-times. These insights contribute to our understanding of quantum information dynamics and gravitational impacts on entanglement in extreme environments. Keywords: First-order coherence, concurrence fill, global concurrence, Schwarzchild black hole I. INTRODUCTION Black holes (BHs), stemming from Schwarzschild’s solution to Einstein’s general relativity, have captivated scientific inquiry since 1916 [1]. The groundbreaking release of the first BH image in 2019 by the Event Horizon Telescope marked a milestone [2]. BHs, according to the no-hair theorem, appear to conceal information beyond their mass, charge, and angular momentum [3]. However, the discovery of Hawking radiation by Stephen Hawking suggests a gradual evaporation of BH, raising questions about unitarity [4–6]. This phenomenon involves the creation of particle pairs near the event horizon, with one escaping and the other contributing to the BH’s eventual disappearance [7]. The event horizon of a BH is a boundary in space beyond which nothing, not even light, can escape the BH’s gravitational pull. When an object or light crosses this boundary, it is inevitably pulled into the BH and its information is lost to external observers. Even now, understanding the intricate interplay between quantum theory, general relativity, and the profound mysteries surrounding BH physics is a formidable challenge that has captivated the curiosity of physicists for decades [8–18]. This study embarks on a journey to investigate the qualitative migration and transformation of quantum resources in curved space-times, specifically focusing on quantifying genuine multipartite entanglement (GME), global entanglement, and quantum ∗ asal68826@hbku.edu.qa † smalkuwari@hbku.edu.qa ‡ mghominejad@semnan.ac.ir § mura68827@hbku.edu.qa ¶ haddadi@semnan.ac.ir coherence in the context of Dirac fields interacting with a Schwarzschild BH. Quantum information theory provides a unique lens for investigating foundational puzzles in relativistic quantum physics. Some basic concepts such as entanglement and coherence have proven instrumental in elucidating quantum effects in the perplexing environments near BHs [19– 23]. The enigma of the BH information paradox, revolving around the potential loss of information as matter crosses the event horizon, has been a focal point of inquiry. Hawking’s initial calculations suggested information loss [4, 5], but in later work, Hawking proposed the escape of information through subtle quantum correlations in Hawking radiation [24]. The study of entanglement between partitions around BHs has been extensive [19–22], but global entanglement may reveal richer multipartite correlations [25]. Global concurrence (GC) [25–27] emerges as a quantifier that encapsulates both bipartite and multipartite contributions, providing a comprehensive measure of total entanglement between all parties involved. Additionally, examining first-order coherence (FOC) becomes crucial in capturing quantum superpositions within the local states of individual particles [28–30]. As particles approach the BH, FOC may transition into global entanglement through interactions as a trade-off. Hence, the GME measures are essential to specifically address irreducible multiparty inseparable correlations [31, 32]. These measures quantify quantum correlations that are not reducible to any subset of particles and may offer a nuanced understanding of the intricate quantum fabric surrounding BHs. This study examines how Dirac field particles behave near a Schwarzschild BH, focusing on the average superposition of all the particles through FOC, GME through concurrence fill (CF), and global entanglement through" 2401.12031v1,"M ULTI - OBJECTIVE OPTIMISATION USING EXPECTED QUANTILE IMPROVEMENT FOR DECISION MAKING IN DISEASE OUTBREAKS A P REPRINT Daria Semochkina * Alexander I. J. Forrester † David C Woods † January 23, 2024 A BSTRACT Optimization under uncertainty is important in many applications, particularly to inform policy and decision making in areas such as public health. A key source of uncertainty arises from the incorporation of environmental variables as inputs into computational models or simulators. Such variables represent uncontrollable features of the optimization problem and reliable decision making must account for the uncertainty they propagate to the simulator outputs. Often, multiple, competing objectives are defined from these outputs such that the final optimal decision is a compromise between different goals. Here, we present emulation-based optimization methodology for such problems that extends expected quantile improvement (EQI) to address multi-objective optimization. Focusing on the practically important case of two objectives, we use a sequential design strategy to identify the Pareto front of optimal solutions. Uncertainty from the environmental variables is integrated out using Monte Carlo samples from the simulator. Interrogation of the expected output from the simulator is facilitated by use of (Gaussian process) emulators. The methodology is demonstrated on an optimization problem from public health involving the dispersion of anthrax spores across a spatial terrain. Environmental variables include meteorological features that impact the dispersion, and the methodology identifies the Pareto front even when there is considerable input uncertainty. Keywords emulation, Gaussian processes, (quantile) expected improvement, stochastic optimization 1 Introduction Many applications of product, system or process design, including for public health interventions, require solutions to optimization problems that have multiple, usually competing, goals. Assuming the goal of simultaneous minimization, such a problem may be described as: min f i (x c ) subject to: lb k ≤ x c,k ≤ ub k for i = 1, . . . , n for k = 1, . . . , v, (1) where f i are the n black-box objective functions, x c = (x c,1 , . . . , x c,v ) T represent the values of controllable variables, and lb k and ub k are bounds on the input x c,k . In addition, various constraints might be present, restricting the solution space. We focus on multi-objective optimization on a Pareto front Fonseca and Fleming [1995], a collection of optimal solutions for each f i such that no single objective can be improved without making at least one of the remaining objectives worse Giagkiozis and Fleming [2014]. We assume the computational expense of the functions f i is such that only a limited number of evaluations are possible (without corresponding evaluation of derivatives). Hence, we adopt Bayesian optimization methodology Frazier [2018] that assumes no particular knowledge about the functions f i (e.g. convexity or linearity Boyd and Vandenberghe [2004], Bertsimas and Tsitsiklis [1997]) except continuity and (some degree of) smoothness with respect to x c . ∗ † University of Southampton, UK (d.semochkina@soton.ac.uk , d.woods@soton.ac.uk ). Nottingham Trent University, UK (alexander.forrester@ntu.ac.uk )" 2401.12033v1,"M OMENTUM -SAM: S HARPNESS A WARE M INIMIZATION WITHOUT C OMPUTATIONAL O VERHEAD Marlon Becker Frederick Altrock Benjamin Risse Department for Computer Science & Institute for Geoinformatics University of Muenster, Germany {marlonbecker,f.altrock,b.risse}@uni-muenster.de A BSTRACT The recently proposed optimization algorithm for deep neural networks Sharpness Aware Minimization (SAM) suggests perturbing parameters before gradient calculation by a gradient ascent step to guide the optimization into parameter space regions of flat loss. While significant generalization improvements and thus reduction of overfitting could be demonstrated, the computational costs are doubled due to the additionally needed gradient calculation, making SAM unfeasible in case of limited computationally capacities. Motivated by Nesterov Accelerated Gradient (NAG) we propose Momentum-SAM (MSAM), which perturbs parameters in the direction of the accumulated momentum vector to achieve low sharpness without significant computational overhead or memory demands over SGD or Adam. We evaluate MSAM in detail and reveal insights on separable mechanisms of NAG, SAM and MSAM regarding training optimization and generalization. Code is available at https://github.com/MarlonBecker/MSAM. 1 I NTRODUCTION While artificial neural networks (ANNs) are typically trained by Empirical Risk Minimization (ERM), i.e., the minimization of a predefined loss function on a finite set of training data, the actual purpose is to generalize over this dataset and fit the model to the underlying data distribution. Due to heavy overparameterization of state-of-the-art ANN models (Nakkiran et al., 2021), the risk of assimilating the training data increases. As a consequence, a fundamental challenge in designing network architectures and training procedures is to ensure the objective of ERM to be an adequate proxy for learning the underlying data distribution. One strategy to tackle this problem is to exploit the properties of the loss landscape of the parameter space on the training data. A strong link between the sharpness in this loss landscape and the models generalization capability has been proposed by Hochreiter & Schmidhuber (1994) and further analyzed in the work of Keskar et al. (2017). Following these works, Foret et al. (2021) proposed an algorithm to explicitly reduce the sharpness of loss minima and thereby improve the generalization performance, named Sharpness Aware Minimization (SAM). Built on top of gradient based optimizers such as SGD or Adam (Kingma & Ba, 2015), SAM searches for a loss maximum in a limited parameter vicinity for each optimization step and calculates the loss gradient at this ascended parameter position. To construct a computationally feasible training algorithm, SAM approximates the loss landscape linearly so that the maximization is reduced to a single gradient ascent step. Moreover, this step is performed on a single batch rather than the full training set. Unfortunately, the ascent step requires an additional forward and backward pass and therefore doubles the computational time, limiting the applications of SAM severely. Even though the linear approximation of the loss landscape poses a vast simplification and Foret et al. (2021) showed that searching for the maximum with multiple iterations of projected gradient ascent steps indeed yields higher maxima, these maxima, however, do not improve the generalization, suggesting that finding the actual maximum in the local vicinity is not pivotal. Instead, it appears to be sufficient to alter the parameters to find an elevated point and perform the gradient calculation from there. Following this reasoning, the ascent step can be understood as a temporary parameter perturbation, 1" 2401.12038v1,"A Skew-Symmetric Energy Stable Almost Dissipation Free Formulation of the Compressible Navier-Stokes Equations Jan Nordström a,b a Department of Mathematics, Applied Mathematics, Linköping University, SE-581 83 Linköping, Sweden b Department of Mathematics and Applied Mathematics, University of Johannesburg, P.O. Box 524, Auckland Park 2006, Johannesburg, South Africa Abstract We show that a specific skew-symmetric formulation of the nonlinear terms in the compressible Navier- Stokes equations leads to an energy rate in terms of surface integrals only. No dissipative volume integrals contribute to the energy rate. We also discuss boundary conditions that bounds the surface integrals. Keywords: Initial boundary value problems, skew-symmetric formulation, compressible Navier-Stokes equations, energy stability, summation-by-parts, nonlinear boundary conditions 1. Introduction Stability of numerical approximations to nonlinear initial boundary value problems (IBVPs) continuous to be a challenge. The energy method [1, 2] applied to linear IBVPs provides energy estimates in an L 2 equivalent norm together with well posed boundary conditions [3, 4]. These estimates normally require certain symmetry properties of the matrices involved. For nonlinear IBVPs, these requirements limit the use of the energy method and promted interest in entropy and kinetic energy estimates. Entropy estimates [5, 6] occasionally provide L 2 estimates and boundary conditions [7], kinetic energy estimates [8, 9] do not. We have in a series of papers [10, 11, 12] addressed the difficulties that limit the use of the energy method for nonlinear IBVPs. One difficulty relates to the nonlinear terms which must be on skew-symmetric form for Greens formula to be applicable. To address this issue, the shallow water and compressible Euler equations were transformed to skew-symmetric form in [10, 11]. Another difficulty relates to the nonlinear boundary terms which was considered in [12] where energy stable boundary conditions were derived. Once the continuous analysis leading to an energy bound is completed, one can mimic the continuous analysis discretely [13] if one can formulate the numerical procedure on summation-by-parts form [14, 15]. In [10, 11, 12], the influence of the skew-symmetric transformation on the viscous parabolic terms were disregarded. In this short note we include these terms and analyse the compressible Navier-Stokes equations. 2. The skew-symmetric form of the compressible Euler equations The two-dimensional compressible Euler equations in primitive form using the ideal gas law is ρ t + u i (ρ) x i + ρ(u i ) x i = 0 u t + u i (u 1 ) x i + p x 1 /ρ = 0 v t + u i (u 2 ) x i + p x 2 /ρ = 0 (2.1) p t + u i (p) x i + γp(u i ) x i = 0 ∗ Corresponding author Email address: jan.nordstrom@liu.se (Jan Nordström) Preprint submitted to Elsevier January 23, 2024" 2401.12046v1,"Published as a conference paper at ICLR 2024 F OURIER T RANSPORTER : B I -E QUIVARIANT R OBOTIC M ANIPULATION IN 3D Haojie Huang 1 , Owen Howell 2,⋆ , Dian Wang 1,⋆ , Xupeng Zhu 1,⋆ , Robert Platt 1,† , Robin Walters 1,† ∗ Khoury College of Computer Sciences 1 , Department of Electrical and Computer Engineering 2 Northeastern University, Boston MA, 02115, USA {huang.latehaoj; howell.o; wang.dian; zhu.xup; r.walters; r.platt}@northeastern.edu A BSTRACT Many complex robotic manipulation tasks can be decomposed as a sequence of pick and place actions. Training a robotic agent to learn this sequence over many different starting conditions typically requires many iterations or demonstrations, especially in 3D environments. In this work, we propose Fourier Transporter (F OUR T RAN ) which leverages the two-fold SE(d) × SE(d) symmetry in the pick-place problem to achieve much higher sample efficiency. F OUR T RAN is an open-loop behavior cloning method trained using expert demonstrations to predict pick-place actions on new environments. F OUR T RAN is constrained to incorporate symmetries of the pick and place actions independently. Our method utilizes a fiber space Fourier transformation that allows for memory-efficient construction. We test our proposed network on the RLbench benchmark and achieve state-of-the-art results across various tasks. 1 I NTRODUCTION Imitation learning for manipulation tasks in SE(3) has emerged as a key topic in robotic learning. Imitation learning is attractive because of its practicality. In contrast to reinforcement learning wherein training happens via a period of autonomous interaction with the environment (which can potentially damage the robot and the environment), imitation learning requires only human demonstrations of the task to be performed which is often safer and easier to provide. Sample efficiency is critical here; the robot needs to learn to perform a task without requiring the human to provide an undue number of demonstrations. Unfortunately, many current state-of-the-art methods are not sample efficient. For example, even after training with one hundred demonstrations, methods like PerAct and RVT still struggle to solve standard RLBench tasks like S TACK W INE or S TACK C UPS (Shridhar et al., 2023; Goyal et al., 2023). Why is sample efficiency such a challenge in three dimensions? A big reason is that these tasks are defined over SE(3) action spaces where the learned policy must output both a 3D position and SO(3) orientation. The orientation component here is a particular challenge for robot learning because SO(3) is not Euclidean and standard convolutional layers are not a good fit. Discretization is also not ideal. For example, a grid sampling 1000 different orientations in SO(3) still only realizes ◦ an angular resolution of 36 , which is insufficient for many manipulation tasks. Instead, existing methods, e.g. Shridhar et al. (2023); Goyal et al. (2023), often fall back on generic self-attention layers that do not take advantage of the geometry of SO(3). One approach to this problem is to leverage neural network policy models that are symmetric in SO(2) or SO(3). This has been explored primarily in SO(2) and SE(2) settings, e.g. Wang et al. (2021) and Jia et al. (2023), where significant gains in sample efficiency have been made using policy networks that incorporate steerable convolution kernels (Cohen & Welling, 2017). In SO(3), symmetric models have been mainly applied to pose or descriptor inference, e.g. Klee et al. (2023) and Ryu et al. (2022), but not directly to policy learning. Moreover, these works do not address the ∗ ⋆ denotes equal contribution, † denotes equal advising 1" 2401.12051v1,"CloSe: A 3D Clothing Segmentation Dataset and Model Dimitrije Antić 1 1 Garvita Tiwari 2,3,4 Batuhan Ozcomlekci 2 University of Amsterdam, Netherlands 4 2 Riccardo Marin 2,3 University of Tübingen, Germany 3 Gerard Pons-Moll 2,3,4 Tübingen AI Center, Germany Max Planck Institute for Informatics, Saarland Informatics Campus, Germany d.antic@uva.nl, gtiwari@mpi-inf.mpg.de, batuhan.oezcoemlekci@student.uni-tuebingen.de, {riccardo.marin, gerard.pons-moll}@uni-tuebingen.de GT Input CloSe-Net Figure 1. Left: We present CloSe-D, a large-scale dataset of people in clothing with fine-grained segmentation labels. We use this dataset to train our clothing segmentation model, CloSe-Net, tailored to segment clothing from 3D scans. Right: We show results of CloSe-Net on the diverse set of scans, where each instance represents GT, Input, and Prediction. Abstract 3D Clothing modeling and datasets play crucial role in the entertainment, animation, and digital fashion industries. Existing work often lacks detailed semantic understanding or uses synthetic datasets, lacking realism and personalization. To address this, we first introduce CloSe-D: a novel large-scale dataset containing 3D clothing segmentation of 3167 scans, covering a range of 18 distinct clothing classes. Additionally, we propose CloSe-Net, the first learning-based 3D clothing segmentation model for fine-grained segmentation from colored point clouds. CloSe-Net uses local point features, body-clothing correlation, and a garment-class and point features-based attention module, improving performance over baselines and prior work. The proposed attention module enables our model to learn appearance and geometry-dependent clothing prior from data. We further validate the efficacy of our approach by successfully segmenting publicly available datasets of people in clothing. We also introduce CloSe-T, a 3D interactive tool for refining segmentation labels. Combining the tool with CloSe-Net in a continual learning setup demonstrates improved generalization on real-world data. Dataset, model, and tool can be found at https:// virtualhumans.mpi-inf.mpg.de/ close3dv24/ . 1. Introduction Clothing plays a vital role in shaping our identity. Our dressing choices contribute to our representation, conveying cultural traits, religious beliefs, geographical origin, or mood. In light of the recent attention on the expressiveness of avatarization processes, Computer Vision scholars dedicate tremendous efforts in acquiring, modeling, and comprehending digital clothing, enabling uncountable applications: from digital fashion to AR/VR; from home entertainment to industrial-scale content creation. Semantic understanding of humans in clothing from 2D images has seen significant progress [16, 17, 40, 57], but the lack of geometrical information is an obstacle for AR/VR" 2401.12076v1,"Di Fu, Fares Abawi, Philipp Allgeuer, and Stefan Wermter. 2024. Human Impression of Humanoid Robots Mirroring Social Cues. In Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction (HRI ’24 Companion), March 11-14, 2024, Boulder, CO, USA. https://doi.org/10.1145/3610978.3640580. Human Impression of Humanoid Robots Mirroring Social Cues Di Fu ∗ Fares Abawi ∗ di.fu@uni-hamburg.de University of Hamburg Hamburg, Germany fares.abawi@uni-hamburg.de University of Hamburg Hamburg, Germany Philipp Allgeuer Stefan Wermter philipp.allgeuer@uni-hamburg.de University of Hamburg Hamburg, Germany stefan.wermter@uni-hamburg.de University of Hamburg Hamburg, Germany A B C D Figure 1: A participant performing the four mirroring tasks in random order: A) The iCub robot mirroring facial expressions; B) The Pepper robot affectively signaling through LED color changes; C) The iCub robot mirroring head movement based on an inertial measurement unit (IMU) readings. The red circle shows the IMU; D) The iCub robot mirroring head movement according to a vision-based model. The red circle shows the camera. ABSTRACT Mirroring non-verbal social cues such as affect or movement can enhance human-human and human-robot interactions in the real world. The robotic platforms and control methods also impact people’s perception of human-robot interaction. However, limited studies have compared robot imitation across different platforms and control methods. Our research addresses this gap by conducting two experiments comparing people’s perception of affective mirroring between the iCub and Pepper robots and movement mirroring between vision-based iCub control and Inertial Measurement Unit (IMU)-based iCub control. We discovered that the iCub robot was perceived as more humanlike than the Pepper robot when mirroring affect. A vision-based controlled iCub outperformed the IMU-based ∗ Both authors contributed equally to this research. This work is licensed under a Creative Commons Attribution International 4.0 License. HRI ’24 Companion, March 11–14, 2024, Boulder, CO, USA © 2024 Copyright held by the owner/author(s). ACM ISBN 979-8-4007-0323-2/24/03 https://doi.org/10.1145/3610978.3640580 controlled one in the movement mirroring task. Our findings suggest that different robotic platforms impact people’s perception of robots’ mirroring during HRI. The control method also contributes to the robot’s mirroring performance. Our work sheds light on the design and application of different humanoid robots in the real world. CCS CONCEPTS • Human-centered computing → User studies; Interaction design theory, concepts and paradigms. KEYWORDS affective mirroring, movement mirroring, gaze and head movement, human-robot interaction ACM Reference Format: Di Fu, Fares Abawi, Philipp Allgeuer, and Stefan Wermter. 2024. Human Impression of Humanoid Robots Mirroring Social Cues. In Companion of the 2024 ACM/IEEE International Conference on Human-Robot Interaction (HRI ’24 Companion), March 11–14, 2024, Boulder, CO, USA. ACM, New York, NY, USA, 5 pages. https://doi.org/10.1145/3610978.3640580" 2401.12078v1,"Temporal Blind Spots in Large Language Models Jonas Wallat Adam Jatowt Avishek Anand L3S Research Center Hannover, Germany jonas.wallat@l3s.de University of Innsbruck Innsbruck, Austria adam.jatowt@uibk.ac.at Delft University of Technology Delft, The Netherlands avishek.anand@tudelft.nl ABSTRACT Which film won seven Oscars in 1994? Large language models (LLMs) have recently gained significant attention due to their unparalleled ability to perform various natural language processing tasks. These models, benefiting from their advanced natural language understanding capabilities, have demonstrated impressive zero-shot performance. However, the pretraining data utilized in LLMs is often confined to a specific corpus, resulting in inherent freshness and temporal scope limitations. Consequently, this raises concerns regarding the effectiveness of LLMs for tasks involving temporal intents. In this study, we aim to investigate the underlying limitations of general-purpose LLMs when deployed for tasks that require a temporal understanding. We pay particular attention to handling factual temporal knowledge through three popular temporal QA datasets. Specifically, we observe low performance on detailed questions about the past and, surprisingly, for rather new information. In manual and automatic testing, we find multiple temporal errors and characterize the conditions under which QA performance deteriorates. Our analysis contributes to understanding LLM limitations and offers valuable insights into developing future models that can better cater to the demands of temporally-oriented tasks. The code is available 1 . a temporal intent. A few examples of temporally-induced errors on our datasets are shown in Table 1. To the best of our knowledge, our study is the first to inspect LLMs, their temporal blind spots, and their abilities in navigating over time. 1 1.1 INTRODUCTION Autoregressive large language models (LLMs) like [8, 56] are versatile and a general-purpose solution to many natural language processing tasks. These models, benefiting from advanced natural language understanding capabilities, have demonstrated impressive zero-shot and few-shot performance. However, both pre-training and instruction-tuning data utilized in LLMs are often confined to a specific corpus and instruction demonstrations. However, there is a poor understanding of how much these large language models exhibit temporal knowledge and orientation in time. Consequently, this raises concerns regarding the effectiveness of LLMs for a range of tasks involving temporal intents like question answering and search over historical sources [60], QA over legal and personal temporal collections [23, 43], or fact checking [38]. Extensive research work towards understanding the capabilities and limitations of LLMs has focussed on knowledge probing [34, 42], adversarial examples [20], and risk analysis [16] among others. Probing methods have focussed on factual [34, 63], commonsense [55], social [67], numerical [37] and spatial [13] knowledge. However, most of the probing methods utilize bi-directional and non-instruction-tuned models. We do not focus on adversarial examples [20] but on natural questions that are incorrectly answered due to a lack of temporal understanding. Unlike the existing work, we analyze the temporal knowledge blind spots and temporal understanding of instruction-tuned LLMs for natural questions with 1 https://github.com/jwallat/temporalblindspots ChatGPT Correct Forrest Gump Schindler’s List ✗ Temporal shift: F.G. won Oscars in 1995 Who lost the WBA boxing title, refusing to fight Tony Tucker in March 1995? Alpaca Correct Mike Tyson George Foreman ✗ Time invariant: time disregarded Tom Brady played for which team in 2020? Alpaca Correct New England Patriots Tampa Bay Buccaneers ✗ Temporal inertia: Brady joined Buccaneers in 2020 Table 1: Examples of temporal blindspots in LLMs. Aim of this study In this study, we aim to investigate the underlying limitations of general-purpose LLMs when deployed for tasks that require temporal knowledge and temporal understanding. Our research focuses on evaluating the abilities of LLMs in the context of temporal knowledge retrieval and processing and involves comprehensive testing over three temporal question-answering datasets: TemporalQuestions [58], ArchivalQA [60], and TempLAMA [18]. We pay particular attention to the handling of factual temporal knowledge and the processing of complex temporal information. Specifically, we experiment with different time-referencing schemes (absolute and relative), as well as experiment with the corruption of time references. Through this examination, we hope to shed light on the extent to which LLMs can effectively address the challenges associated with temporal knowledge management. 2 RELATED WORK 2.1 Temporal Aspects of Text Several NLP and IR tasks have benefited from utilizing either of the two key temporal dimensions of texts (be it documents or queries), which are: creation time and focus time (aka. content time) [33]. The former refers to when a text was created (e.g., document timestamp or query issuing time), while the latter is the time mentioned or implicitly referred to in text, e.g., a document about WWII has the focus time of 1939 − 1945. Similarly, the focus time of a query ""Winter Olympics 1988"" would refer to when this sports event took" 2401.12116v1,"Dynamic control of active droplets using light-responsive chiral liquid crystal environment Vanessa Jirón a,b , Mojtaba Rajabi a,c , Hao Wang a,b , Oleg D. Lavrentovich a,b,c, * a Advanced Materials and Liquid Crystal Institute, Kent State University, Kent, Ohio 44242, USA b Materials Science Graduate Program, Kent State University, Kent, Ohio 44242, USA c Department of Physics, Kent State University, Kent, Ohio 44242, USA *Author to whom correspondence should be addressed: olavrent@kent.edu ABSTRACT Microscopic active droplets are of interest since they can be used to transport matter from one point to another. The challenge is to control the trajectory. In this work, we demonstrate an approach to control the direction of active droplet propulsion by a photoresponsive cholesteric liquid crystal environment. The active droplet represents a water dispersion of bacterial B. subtilis microswimmers. When placed in a cholesteric, a surfactant-stabilized active droplet distorts the local director field, producing a point defect-hedgehog, which breaks the fore-aft symmetry. The chaotic motion of the bacteria inside the droplet is rectified into directional motion by the asymmetric director field outside the droplet. When the pitch of the cholesteric is altered by visible light irradiation, the asymmetry axis and thus the droplet trajectory realign along a new direction. Droplets realign counterclockwise on exposure to light of 535 nm, and clockwise on exposure to light of 450 nm, as dictated by the photoinduced change in the handedness of the cholesteric. The strategy allows for a non-contact dynamic control of active droplets 1" 2401.12121v1,"Improving Genetic Algorithms Performance via Deterministic Population Shrinkage Juan Luis Jiménez Laredo ∗ Juan Julián Merelo ‡ Carlos Fernandes † Christian Gagné § Abstract Despite the intuition that the same population size is not needed throughout the run of an Evolutionary Algorithm (EA), most EAs use a fixed population size. This paper presents an empirical study on the possible benefits of a Simple Variable Population Sizing (SVPS) scheme on the performance of Genetic Algorithms (GAs). It consists in decreasing the population for a GA run following a predetermined schedule, configured by a speed and a severity parameter. The method uses as initial population size an estimation of the minimum size needed to supply enough building blocks, using a fixed-size selectorecombinative GA converging within some confidence interval toward good solutions for a particular problem. Following this methodology, a scalability analysis is conducted on deceptive, quasi-deceptive, and non-deceptive trap functions in order to assess whether SVPS-GA improves performances compared to a fixed-size GA under different problem instances and difficulty levels. Results show several combinations of speed-severity where SVPS-GA preserves the solution quality while improving performances, by reducing the number of evaluations needed for success. Note: This paper is a pre-print version of the following paper that you can cite as: Juan Luis J. Laredo, Carlos Fernandes, Juan Julián Merelo, and Christian Gagné. 2009. Improving genetic algorithms performance via deterministic population shrinkage. In Proceedings of the 11th Annual conference on Genetic and evolutionary computation (GECCO ’09). Association for Computing Machinery, New York, NY, USA, 819–826. https://doi.org/10.1145/1569901.1570014 ∗ Corresponding author: juanlu@ugr.es Department of Architecture and Computer Technology, University of Granada, Spain † LASEEB-ISR/IST. University of Lisbon, Portugal ‡ Department of Architecture and Computer Technology, University of Granada, Spain § Laboratoire de vision et systèmes numériques, Laval University, Canada 1" 2401.12126v1,"Biological species delimitation based on genetic and spatial dissimilarity: a comparative study Gabriele d’Angella ∗ , Christian M. Hennig † January 22, 2024 Abstract The delimitation of biological species, i.e., deciding which individuals belong to the same species and whether and how many different species are represented in a data set, is key to the conservation of biodiversity. Much existing work uses only genetic data for species delimitation, often employing some kind of cluster analysis. This can be misleading, because geographically distant groups of individuals can be genetically quite different even if they belong to the same species. This paper investigates the problem of testing whether two potentially separated groups of individuals can belong to a single species or not based on genetic and spatial data. Various approaches are compared (some of which already exist in the literature) based on simulated metapopulations generated with SLiM and GSpace - two software packages that can simulate spatially-explicit genetic data at an individual level. Approaches involve partial Mantel testing, maximum likelihood mixed-effects models with a population effect, and jackknife-based homogeneity tests. A key challenge is that most tests perform on genetic and geographical distance data, violating standard independence assumptions. Simulations showed that partial Mantel tests and mixed-effects models have larger power than jackknife-based methods, but tend to display type-I-error rates slightly above the significance level. Moreover, a multiple regression model neglecting the dependence in the dissimilarities did not show inflated type-I-error rate. An application on brassy ringlets concludes the paper. 1 Introduction The delimitation of biological species consists in using empirical data to determine “which groups of individual organisms constitute different populations of a single species and which constitute different species” (Rannala and Yang, 2020). Species delimitation is crucial to preserve biodiversity and has applications in several areas, such as ecology and medicine (Burbrink and Ruane, 2021). It is closely related to species conceptualization (De Queiroz, 2007; Hausdorf, 2011), a long-standing problem that goes beyond the scope of this work. The empirical data employed to delimit species can be molecular (see, e.g., Rannala and Yang (2020) for a review), morphological (Gratton et al., 2016), behavioural (Scapini et al., 2002), ecological (Raxworthy et al., 2007; Rissler and Apodaca, 2007), etc., and integrative approaches using different types of data (Edwards and Knowles, 2014) and methods (Carstens et al., 2013) are recommended. ∗ Alma Mater Studiorum - University of Bologna, Via Belle Arti, 41 - 40126 Bologna (BO), Italy. E-mail address: gabriele.dangella2@unibo.it † Alma Mater Studiorum - University of Bologna, Via Belle Arti, 41 - 40126 Bologna (BO), Italy. E-mail address: christian.hennig@unibo.it 1" 2401.12138v1,"Gradient Preserving Operator Inference: Data-Driven Reduced-Order Models for Equations with Gradient Structure Yuwei Geng a , Jasdeep Singh a , Lili Ju a , Boris Kramer b , Zhu Wang a,∗ a b Department of Mathematics, University of South Carolina, Columbia, SC 29208, USA Department of Mechanical and Aerospace Engineering, University of California San Diego, La Jolla, CA 92093, USA Abstract Hamiltonian Operator Inference has been introduced in [Sharma, H., Wang, Z., Kramer, B., Physica D: Nonlinear Phenomena, 431, p.133122, 2022] to learn structure-preserving reduced-order models (ROMs) for Hamiltonian systems. This approach constructs a low-dimensional model using only data and knowledge of the Hamiltonian function. Such ROMs can keep the intrinsic structure of the system, allowing them to capture the physics described by the governing equations. In this work, we extend this approach to more general systems that are either conservative or dissipative in energy, and which possess a gradient structure. We derive the optimization problems for inferring structure-preserving ROMs that preserve the gradient structure. We further derive an a priori error estimate for the reduced-order approximation. To test the algorithms, we consider semi-discretized partial differential equations with gradient structure, such as the parameterized wave and Korteweg-de-Vries equations in the conservative case and the one- and twodimensional Allen-Cahn equations in the dissipative case. The numerical results illustrate the accuracy, structure-preservation properties, and predictive capabilities of the gradient-preserving Operator Inference ROMs. Keywords: dissipative and conservative systems, gradient-flow equation, Operator Inference, reduced-order modeling, data-driven modeling 2020 MSC: 65P99, 65M15 1. Introduction Consider evolutionary partial differential equations (PDEs) of the following form ∂y(x, t; µ) δH[y; µ] = L , ∂t δy (1) where the state variable y depends on the spatial variable x ∈ Ω ⊂ R d (d = 1, 2 or 3), time variable t ∈ I ⊂ [t 0 , ∞) and parameter µ ∈ P ⊂ R p , p ≥ 1. Moreover, L represents a constant linear differential operator, and δH δy is the variational derivative of the functional H[y; µ] := Z Ω H(y, y x , y xx , . . . ; µ) dx ∗ Corresponding author Email addresses: ygeng@email.sc.edu (Yuwei Geng), singhj72004@gmail.com (Jasdeep Singh), ju@math.sc.edu (Lili Ju), bmkramer@ucsd.edu (Boris Kramer), wangzhu@math.sc.edu (Zhu Wang) Preprint submitted to Elsevier January 23, 2024" 2401.12148v1,"remote sensing Article Review on the Role of GNSS Meteorology in Monitoring Water Vapor for Atmospheric Physics Javier Vaquero-Martinez 1,2, * and Manuel Anton 1,2 1 2 *    Citation: Vaquero-Martinez, J.; Anton, M. Review on the Role of Department of Physics, Universidad de Extremadura; mananton@unex.es Instituto Universitario de Investigacion del Agua, Cambio Climatico y Sostenibilidad (IACYS), Universidad de Extremadura Correspondence: javier_vm@unex.es Abstract: After 30 years since the beginning of the Global Positioning System (GPS), or more generally Global Navigation Satellite System (GNSS) meteorology, this technique has proven to be a reliable method for retrieving atmospheric water vapor; it is low-cost, weather independent, with high temporal resolution and is highly accurate and precise. GNSS ground-based networks are becoming denser, and the first stations installed now have quite long time-series that allows for the study of the temporal features of water vapor and its relevant role inside the climate system. In this review, the different GNSS methodologies to retrieve atmospheric water vapor content are examined, such as tomography, conversion of GNSS tropospheric delay to water vapor estimates, analyses of errors, and combinations of GNSS with other sources to enhance water vapor information. Moreover, the use of these data in different kinds of studies is discussed. For instance, the GNSS technique is commonly a reference tool for validating other water vapor products (e.g., radiosounding, radiometers onboard satellite platforms, ground-based instruments). Additionally, GNSS retrievals are largely used in order to determine the high spatio-temporal variability and long-term trends of atmospheric water vapor or in models with the goal of determining its notable influence on the climate system (e.g., assimilation in numerical prediction, as input to radiative transfer models, study of circulation patterns, etc.). GNSS Meteorology in Monitoring Water Vapor for Atmospheric Physics. Remote Sens. 2021, 1, 0. https://dx.doi.org/ Keywords: GNSS; GPS; water vapor; ground-based; methodology; validation; spatio-temporal; time-series; meteorology; climate Academic Editor: Received: Accepted: Published: Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affili- ations. Copyright: © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// 1. Introduction Water vapor is a trace gas of the Earth’s atmosphere. Despite its relatively low concentration, it is of paramount importance to the Earth’s climate. Firstly, water vapor is the major contributor to the natural greenhouse effect and, therefore, in global warming, presents positive climate feedback [1,2]. It also has an obvious role in the hydrological cycle, and plays a key role in energy transport. Water is evaporated at low latitudes, and its vapor is transported to higher latitudes where, by condensation, it releases high amounts of heat [3]. Water vapor can be quantified using different methods. One of the most common is the integrated water vapor (IWV), which is also known by other names in the literature, such as precipitable water vapor (PWV), precipitable water (PW), integrated precipitable water vapor (IPWV), and so forth. This quantity represents the integral of the concentration of water vapor along the vertical path, and can also be pictured as the height that, in a vessel of a unit cross-section, the water vapor in a column of the same cross-section would reach if all of it condensed to liquid water. The density of liquid water allows the establishment of the equivalence between the superficial concentration (in kg m − 2 ) and the height in the vessel (in mm). creativecommons.org/licenses/by/ 4.0/). Remote Sens. 2021, 1, 0. https://doi.org/10.3390/rs1010000 https://www.mdpi.com/journal/remotesensing" 2401.12174v1,"GEOPHYSICAL PROSPECTING 1 IoT-Based Wireless Networking for Seismic Applications Hadi Jamali-Rad ∗ , and Xander Campman Abstract There is growing pressure from regulators on operators to adhere to increasingly stricter regulations related to the environment and safety. Hence operators are required to predict and contain risks related to hydrocarbon production and their infrastructure in order to maintain their license to operate. A deeper understanding of production optimization and production-related risk requires strengthened knowledge of reservoir behavior and overburden dynamics. To accomplish this, sufficient temporal and spatial resolution is required as well as an integration of various sources of measurements. At the same time, tremendous developments are taking place in sensors, networks, and data analysis technologies. Sensors and accompanying channels are getting smaller and cheaper and yet they offer high fidelity. New ecosystems of ubiquitous wireless communications including Internet of Things (IoT) nowadays allow anyone to affordably connect to the Internet at any time and anywhere. Recent advances in cloud storage and computing combined with data analytics allow fast and efficient solutions to handle considerable amounts of data. This paper is an effort to pave the way for exploiting these three fundamental advances to create IoT-based wireless networks of seismic sensors. To this aim, we propose to employ a recently developed IoT-based wireless technology, so called low- power wide-area networks (LPWANs), to exploit their long range, low power, and inherent compatibility to cloud storage and computing. We create a remotely-operated minimum-maintenance wireless solution for four major seismic applications of interest. By proposing appropriate network architecture and data coordination (aggregation and transmission) designs we show that neither the low data-rate nor the low duty-cycle of LPWANs impose fundamental issues in handling a considerable amount of data created by complex seismic scenarios as long as the application is delay-tolerant. In order to confirm this claim, we cast our ideas into a practical large-scale networking design for simultaneous seismic monitoring and interferometry and carry out an analysis on the data generation and transmission rates. Finally, we The authors are with Shell Global Solutions International B.V., 2288 GS Rijswijk, The Netherlands. e-mails:{hadi.jamali- rad, xander.campman}@shell.com. Corresponding author: Hadi Jamali-Rad, phone: (+31)704473185, e-mail: hadi.jamali- rad@shell.com. Part of this work has been filed as a patent in Jamali-Rad and Campman (2017). January 23, 2024 DRAFT" 2401.12193v1,"Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization Hanqiu Wang Max Panoff Zihao Zhan ECE Department, University of Florida Gainesville, FL 32611 USA wanghanqiu@ufl.edu ECE Department, University of Florida Gainesville, FL 32611 USA m.panoff@ufl.edu ECE Department, University of Florida Gainesville, FL 32611 USA zhan.zihao@ufl.edu Shuo Wang Christophe Bobda Domenic Forte ECE Department, University of Florida Gainesville, FL 32611 USA shuo.wang@ece.ufl.edu ECE Department, University of Florida Gainesville, FL 32611 USA cbobda@ece.ufl.edu ECE Department, University of Florida Gainesville, FL 32611 USA dforte@ece.ufl.edu Abstract—Side-channel analysis has been proven effective at detecting hardware Trojans in integrated circuits (ICs). However, most detection techniques rely on large external probes and antennas for data collection and require a long measurement time to detect Trojans. Such limitations make these techniques impractical for run-time deployment and ineffective in detecting small Trojans with subtle side-channel signatures. To overcome these challenges, we propose a Programmable Sensor Array (PSA) for run-time hardware Trojan detection, localization, and identification. PSA is a tampering-resilient integrated on-chip magnetic field sensor array that can be re-programmed to change the sensors’ shape, size, and location. Using PSA, EM sidechannel measurement results collected from sensors at different locations on an IC can be analyzed to localize and identify the Trojan. The PSA has better performance than conventional external magnetic probes and state-of-the-art on-chip single-coil magnetic field sensors. We fabricated an AES-128 test chip with four AES Hardware Trojans. They were successfully detected, located, and identified with the proposed on-chip PSA within 10 milliseconds using our proposed cross-domain analysis. Index Terms—EM sensor, side-channel, Hardware Trojan I. I NTRODUCTION Hardware Trojans (HTs) are malicious modifications inserted into ICs by adversaries during the fabrication or design process. These alterations can disrupt system functionality, causing security and privacy issues such as privacy leakage, denial-of-service and privilege escalation, etc. As the reliance on third-party designs and manufacturing continues to grow, the threat posed by HTs becomes more alarming. Over the years, researchers have discovered that HTs often produce detectable anomalies through side-channels like power consumption and electromagnetic (EM) emanations. The anomalies in side-channels can be detected after the chip is fabricated, either during the test phase or in run time, but often require costly external sensing setups and a golden model, a Trojan-free circuit used as a reference. This makes deploying some of these approaches in run time not applicable. Moreover, many side-channel oriented techniques suffer from low resolution of the collected traces. As a result, on-chip sensors have gained attraction as a preferred solution. These sensors can intrinsically collect traces from EM side-channels through magnetic field coupling at run time with higher resolutions, thus ruling out the need for external measurement equipment (e.g., external probes, moving stages, etc.). Previous research by Jiaji et al. [1] used a single coil covering the entire chip area, which has low signal-to-noise ratio (SNR) issues. Consequently, this approach couldn’t detect small HTs with few gates and required over 10,000 measurements to detect larger HTs. Its long mean time to detect (MTTD) limits its practical effectiveness. In this paper, we propose a Programmable Sensor Array (PSA) to address the limitations of Jiaji’s work. Our improved design, shown in Figure 1a, consists of a crossbar-like structure. The PSA can be programmed to different sizes and shapes, allowing it to cover or uncover specific parts of the chip for better SNR and HT localization. At each crossing point in the wire grid, a transmission gate (T-gate) controls the node’s connectivity. This allows the sensor array to have different shapes, locations, and sizes. The size of a single sensor within the PSA can also be programmed to approximately match the size of a HT, ensuring the highest magnetic field emanations from HTs are captured. The improved SNR of PSA enables almost instant runtime detection, reducing MTTD significantly. The contributions of this paper can be summarized as follows: A novel on-chip PSA for EM side-channel measurement with big advantages over existing techniques was proposed, developed and validated. • A silicon demonstration of the proposed PSA to detect and localize active HTs on an AES design implemented with TSMC 65nm technology. • Significant SNR improvements with the proposed PSA compared to prior work. • Experimental validation of the PSA’s capability to detect, locate, and identify digital HTs within 10 ms with the proposed novel cross-domain analysis technique. •" 2401.12203v1,"MNRAS 000, 1–21 (2022) Preprint 23 January 2024 Compiled using MNRAS L A TEX style file v3.0 Unsupervised Machine Learning for the Classification of Astrophysical X-ray Sources Víctor Samuel Pérez-Díaz 1,2★ , Juan Rafael Martínez-Galarza 1 , Alexander Caicedo 3,4 and Raffaele D’Abrusco 1 1 Center for Astrophysics | Harvard & Smithsonian, 60 Garden Street, Cambridge, MA 02138, USA 2 School of Engineering, Science and Technology, Universidad del Rosario, Cll. 12C No. 6-25, Bogotá, Colombia 3 Department of Electronics Engineering, Pontificia Universidad Javeriana, Cra. 7 No. 40-62, Bogotá, Colombia 4 Ressolve, Cra. 42 # 5 Sur - 145, Medellín, Colombia Accepted XXX. Received YYY; in original form ZZZ ABSTRACT The automatic classification of X-ray detections is a necessary step in extracting astrophysical information from compiled catalogs of astrophysical sources. Classification is useful for the study of individual objects, statistics for population studies, as well as for anomaly detection, i.e., the identification of new unexplored phenomena, including transients and spectrally extreme sources. Despite the importance of this task, classification remains challenging in X-ray astronomy due to the lack of optical counterparts and representative training sets. We develop an alternative methodology that employs an unsupervised machine learning approach to provide probabilistic classes to Chandra Source Catalog sources with a limited number of labeled sources, and without ancillary information from optical and infrared catalogs. We provide a catalog of probabilistic classes for 8,756 sources, comprising a total of 14,507 detections, and demonstrate the success of the method at identifying emission from young stellar objects, as well as distinguishing between small-scale and large-scale compact accretors with a significant level of confidence. We investigate the consistency between the distribution of features among classified objects and well-established astrophysical hypotheses such as the unified AGN model. This provides interpretability to the probabilistic classifier. Code and tables are available publicly through GitHub. We provide a web playground for readers to explore our final classification at https://umlcaxs-playground.streamlit.app. Key words: methods: statistical – methods: data analysis – catalogues – X-rays: binaries – galaxies: active – X-rays: stars 1 INTRODUCTION X-ray astronomy is embarking on a promising era for discovery, facilitated by cutting-edge missions like eROSITA. This mission, which scans the entire X-ray sky, has already made its initial data release accessible to the scientific community (Predehl et al. 2021; Merloni et al. 2012). Prospective missions such as Athena and Lynx offer enhanced capabilities. Specifically, Athena combines the sensitivity of Chandra with the expansive coverage area of eROSITA (Nandra et al. 2013). Meanwhile, Lynx plans to surpass Chandra in terms of sensitivity and resolution (Gaskin et al. 2019). These missions will provide a wealth of new data and detections, catalyzing the identification of previously unrecognized sources. The Chandra X-ray Observatory is one of the NASA’s great observatories and its flagship mission for X-ray astronomy. Since it was launched to space in 1999, the telescope has observed several sources with two instruments, the Advanced CCD Imaging Spectrometer (ACIS) and the High Resolution Camera (HRC) (Wilkes & Tucker 2019). Accreting black holes in the center of galaxies, supernova remnants, X-ray binaries, and young, rapidly rotating magnetic stars are some of the most common targets that Chandra has identi- ★ E-mail: samuelperez.di@gmail.com © 2022 The Authors fied. As one of NASA’s Great Observatories, Chandra has contributed to numerous groundbreaking discoveries in high-energy astrophysics over its 23-year lifespan. The Chandra Source Catalog (CSC) collects the X-ray sources detected by the Chandra X-ray Observatory through its history (Evans et al. 2010). It represents a fertile background for discovery, since many of this sources have not been studied in detail. A significant proportion of these sources, which range from young stellar objects (YSO) and binary systems (XB) to distant active galaxies housing supermassive black holes (AGN), remain largely unexplored. Furthermore, Chandra’s data contains traces of exceptional phenomena like extrasolar planet transits, tidal disruption events, and compact object mergers. Despite the potential scientific wealth within Chandra’s data, only a fraction of CSC sources have been classified. In order to conduct a thorough investigation of CSC sources, and to gear up for forthcoming large-scale X-ray surveys, we need to classify as many catalog sources as possible. As larger astronomical surveys become available, researchers are increasingly adopting more sophisticated statistical models, including machine learning and data science methods, for classification tasks. A comparison of various supervised and unsupervised learning methods for the statistical identification of XMM-Newton sources was presented in Pineau et al. (2010). This study employed a probabilistic cross-correlation of the XMM-Newton Serendipitous Source" 2401.12208v1,"CheXagent: Towards a Foundation Model for Chest X-Ray Interpretation Zhihong Chen 1∗ Maya Varma 1∗ Louis Blankemeier 1 Joseph Paul Cohen 1† Jean-Benoit Delbrouck 1∗ Dave Van Veen 1 Jeya Maria Jose Valanarasu 1 Eduardo Pontes Reis 1 Cameron Olsen 1 Magdalini Paschali 1 Emily B. Tsai 1 Tanishq Mathew Abraham 2 Akshay S. Chaudhari 1 Alaa Youssef 1 Andrew Johnston 1 Sergios Gatidis 1 Curtis Langlotz 1 1 Stanford University 2 Stability AI {zhihongc,mvarma2,jbdel,paschali,akshaysc,langlotz}@stanford.edu Abstract Chest X-rays (CXRs) are the most frequently performed imaging test in clinical practice. Recent advances in the development of vision-language foundation models (FMs) give rise to the possibility of performing automated CXR interpretation, which can assist physicians with clinical decision-making and improve patient outcomes. However, developing FMs that can accurately interpret CXRs is challenging due to the (1) limited availability of large-scale vision-language datasets in the medical image domain, (2) lack of vision and language encoders that can capture the complexities of medical data, and (3) absence of evaluation frameworks for benchmarking the abilities of FMs on CXR interpretation. In this work, we address these challenges by first introducing CheXinstruct - a large-scale instruction-tuning dataset curated from 28 publicly-available datasets. We then present CheXagent - an instruction-tuned FM capable of analyzing and summarizing CXRs. To build CheXagent, we design a clinical large language model (LLM) for parsing radiology reports, a vision encoder for representing CXR images, and a network to bridge the vision and language modalities. Finally, we introduce CheXbench - a novel benchmark designed to systematically evaluate FMs across 8 clinically-relevant CXR interpretation tasks. Extensive quantitative evaluations and qualitative reviews with five expert radiologists demonstrate that CheXagent outperforms previouslydeveloped general- and medical-domain FMs on CheXbench tasks. Furthermore, in an effort to improve model transparency, we perform a fairness evaluation across factors of sex, race and age to highlight potential performance disparities. Our project is at https://stanford-aimi.github.io/chexagent.html. Preprint." 2401.12214v1,"1 Quality-Aware Hydraulic Control in Drinking Water Networks via Controllability Proxies Salma M. Elsherif †,¶ , Mohamad H. Kazma † , and Ahmad F. Taha †,∗∗ Abstract—The operation of water distribution networks is a complex procedure aimed at efficiently delivering consumers with adequate water quantity while ensuring its safe quality. An added challenge is the dependency of the water quality dynamics on the system’s hydraulics, which influences the performance of the water quality controller. Prior research has addressed either solving the optimum operational hydraulic setting problem or regulating the water quality dynamics as separate problems. Additionally, there have been efforts to couple these two problems and solve one compact problem resulting in trade-offs between the contradictory objectives. In contrast, this paper examines the dependency and influence from a control-theoretic standpoint. More specifically, we explore the influence of accountability for water quality controllability improvement when addressing the pump scheduling problem. We examine its effects on the cumulative cost of the interconnected systems as well as the subsequent performance of the water quality controller. To achieve this, we develop a framework that incorporates different controllability metrics within the operational hydraulic optimization problem; its aim is attaining an adequate level of water quality control across the system. We assess the aforementioned aspects’ performance on various scaled networks with a wide range of numerical scenarios. Index Terms—Optimal pump schedule, hydraulics and water quality regulation and control, controllability metrics, model predictive control. I. I NTRODUCTION AND L ITERATURE R EVIEW HE real-time management and operation of water distribution networks (WDNs) have been one of the most researched topics in the field of water systems. The objective is to fulfill consumers’ and end-users’ needs and deliver clean water in a cost-effective manner while meeting water quality (WQ) mandates. Taking into account network-wide operational flows, pressures, and WQ, achieving the aforementioned objective involves addressing multiple conflicting objectives. These objectives include minimizing the costs associated with pumping and disinfectant usage, meeting water demand, maintaining adequate levels, and satisfying quality requirements. For decision-makers (i.e., water utilities), these conflicting objectives formulate challenges to be addressed utilizing control algorithms that are built and applied in WDNs. The regulation and control of WDNs primarily revolve around two aspects: quantity and quality. For the quantity aspect, the energy required to operate pumps constitutes the main T † Department of Civil and Environmental Engineering, Vanderbilt University, Nashville, TN, USA. Emails: salma.m.elsherif@vanderbilt.edu, mohamad.h.kazma@vanderbilt.edu, ahmad.taha@vanderbilt.edu ¶Secondary appointment: Department of Irrigation and Hydraulics Engineering, Faculty of Engineering, Cairo University. ∗∗ Corresponding author. This work is supported by the National Science Foundation under Grant 2151392. component of the operational cost to be minimized while achieving the target head levels and flows [1]. As for WQ, the objective of the control problem is to maintain desired disinfectant levels all over the WDN with minimum injections at treatment plants and booster stations [2]. The vintage approach to study WQ dynamics starts with first running hydraulic simulations that generate schedules of pumps with their resulting heads and flows through a WDN. This is then followed by investigating quality via booster station control. This is due to the fact that hydraulic control has a slower time-constant. This paper pursues a new approach: jointly investigating quality-quantity control via a unified approach based on systems science and controllability metrics of quality dynamics. Controllability, in this context, refers to the ability to effectively steer, regulate, and maintain disinfectant levels within the network to consistently meet the established water health standards. In short, the paper attempts to answer this research questions: Can quality-aware pump control significantly improve water quality dynamics in WDN? What are the quality controllability metrics that can be appended to a hydraulic control problem? When is it meaningful to integrate the timescales of quality and quantity? To the best of our knowledge, this is the first attempt to explore this particular topic from a system and control theoretic perspectives. The next section delves into the corresponding literature. A. Literature Review The literature on the regulation and control of WDNs to deliver clean water to the end-users is rich and briefly summarized next. The literature on this topic is divided into (i) studies focusing on determining the optimal operational settings for pumps and/or control valves to attain the desired water flows and levels specified by network topology and characteristics, and consumers demands; (ii) studies that cover the regulation of WQ dynamics to ensure meeting the standard disinfectant (i.e., chlorine) residuals throughout the network while minimizing the source and booster stations’ injections; and (iii) studies that propose integrating/coupling controlling water quantity and quality, therefore considering the interdependencies between them. In this section, we survey these areas and afterward, we end this section by highlighting the research gaps that drive the contributions of this work. Hydraulic Control. The operational control of WDNs depends on several factors including network topology, demand cycle, tank dynamics, head loss model, pumps type, valves type, etc. In addition, the resulting control problem is inherently nonlinear and nonconvex in nature. Many studies have covered some or many of the aforementioned factors" 2401.12217v1,"Exploring Simple Open-Vocabulary Semantic Segmentation Zihang Lai University of Oxford Figure 1. S-Seg result on a web image. Our goal is to segment everything, including fictional characters like minions. Abstract Open-vocabulary semantic segmentation models aim to accurately assign a semantic label to each pixel in an image from a set of arbitrary open-vocabulary texts. In order to learn such pixel-level alignment, current approaches typically rely on a combination of (i) image-level VL model (e.g. CLIP), (ii) ground truth masks, and (iii) custom grouping encoders. In this paper, we introduce S-Seg, a novel model that can achieve surprisingly strong performance without depending on any of the above elements. S-Seg leverages pseudo-mask and language to train a MaskFormer, and can be easily trained from publicly available imagetext datasets. Contrary to prior works, our model directly trains for pixel-level features and language alignment. Once trained, S-Seg generalizes well to multiple testing datasets without requiring fine-tuning. In addition, S-Seg has the extra benefits of scalability with data and consistently improvement when augmented with self-training. We believe that our simple yet effective approach will serve as a solid baseline for future research. Our code will be released at https://github.com/zlai0/S-Seg. Mask supervision Pseudo-mask generator A yellow rubber duck sits in water. Language model tiger Image-text pair minions Language feature Semantic supervision Figure 2. Our S-Seg framework leverages pseudo-mask and language to train a MaskFormer. We show that our method of directly training for pixel-level feature and language alignment yields superior results. Maoi zihang.lai@eng.ox.ac.uk One common tactic is adapting existing Vision-Language (VL) models, which are initially trained for image-level alignment (e.g., CLIP [46]), to perform at the pixel level. Another strategy involves training models on ground truth masks that are annotated for a select number of seen classes, thereby encouraging the model to extrapolate its learning to novel unseen classes. Furthermore, specialized models such as GroupViT [57] and OVSegmentor [58], which are explicitly designed for open-vocabulary segmentation, are being explored. These models typically group similar pixels within the image encoder based on their features, employing a hierarchical approach, enhancing the model’s ability to understand the image at multiple granularities. In this paper, we report a model that can work surprisingly well with none of the above strategies. Our approach, named S-Seg, is built on top of a standard MaskFormer model. Our model directly trains for pixel-level feature and language alignment, using neither existing large image-level alignment models like CLIP [46] nor manually annotated segmentation or classification labels. One of the biggest challenges we face is finding the right 1. Introduction Open-vocabulary semantic segmentation presents a unique challenge as it requires assigning accurate semantic labels to each pixel in an image using arbitrary open-vocabulary texts, rather than a fixed set of classes. This means that the model must be able to segment and classify any arbitrary categories expressed in language. Achieving this requires a robust, pixel-level alignment between images and textual descriptions, which enables accurate association of each pixel with the most relevant class from a dynamically provided set of textual categories. A primary obstacle in this domain is that it is impossible to construct datasets that provide pixel-level annotations for all possible labels. This limitation often results in the adoption of weakly-supervised or semi-supervised learning approaches. Current methods typically rely on a combination of strategies to learn the required pixel-level alignment. 1" 2401.12221v1,"Impact of Information Technology in Cyberwars: Systematic Literature Review Santhosh, Pogaku Student – MSIT School of Information Technology, University of Cincinnati, Pogakush @mail.uc.edu 1 ABSTRACT Different types of warfare have evolved between nations and states in the modern era, each with its technological breakthroughs and use of cutting-edge technologies. With the help of the latest innovations, technologies and ideas emerging and contributing more to the It sector, making it more advanced and resulting in different technologies used for cyber warfare, information technology has a stronghold, power, and control over many other integrated automated technologies. To identify the various technologies that are primarily used in cyber warfare. This exploratory study used a systematic review technique and a theme analysis approach to examine prior works in information technology relevant to cyber warfare. Key Words: Cyber War, Cyber Attack , Malware, Cyber Threat. 2 INTRODUCTION In this study, we explore the societal phenomenon of how information technology is used in cyber warfare and how it plays a vital role using a systematic literature review method. Specific studies in the digital databases such as IEEE and ACM about IT playing a crucial role in the cyber ware fare. In recent times, cyber-attacks have been made on the defence system and organizations, which led to huge losses [1]. The Author observed the use of IT in Cyber-warfare after noticing the widespread use of information technology in combat. Cyber assaults or attacks are unwelcome attempts to steal, expose, alter, disable, or destroy information by gaining unauthorized access to computer systems. [2], and there is a specific factor of losses such as time, data, and resources if an organization has been cyber-attacked. The Author discussed a study by Thierry Mbah and Barry Dwolatzky [3] about the threat to the banking system in South Africa. The growth of cyber-crimes is becoming a serious economic issue for South African organizations and the country. This paper begins by analyzing the various cyber threats involved in cyberbanking. A study by Jabber Ahmed and Quddus [4] examines the cyber-attacks during a covid-19 pandemicFrom a cyber-crime aspect, specific cyberattacks occurred globally during the COVID-19 pandemic, illustrating the broad breadth of cyber-attacks that occurred worldwide during the epidemic. A finding by A. Salih, S. T. Zeebaree, S. Ameen, A. Alkhyyat and H. M. Shukur [5] related to the growing technology in the markets the various tools such as Artificial intelligence and machine learning play a vital role to launch the cyberwar, and this article is very much related to our research study. The study by Puchong li and Qinghui Liu [6] examines and reviews the usual advances in cyber security and looks at the challenges, shortcomings, and benefits of the various approaches. The many types of new descendant attacks are thoroughly addressed.. The article by C. Iwendi et al. [7] protects against cyber-attacks, and one article published by zero watermarking algorithms. The study by Sylvain P. Leblanc [8] provides an overview of the current state of the art in cyber-attack simulation and modeling, as well as defensive countermeasures. It encompasses a wide range of cyber warfare simulations, including realistic, virtual, and constructive scenarios. As per James P and Rafal [9], the discovery in June 2010 that a computer worm is known as 'Stuxnet' had attacked Iran's nuclear plant at Natanz hinted that the future of cyber warfare was today. The political and strategic framework in which new cyber threats emerge and the consequences the worm has had in this regard are even more critical. The study by Adam and Andrew [10] on cyber security information sharing enumerates a long number of possible benefits for both public and private sector companies. Despite the apparent benefits, successful cyber security information exchange has proven difficult. Some articles explained the automated cyber threat sensing and acting towards it, and one is by Peter Amthor, Daniel Fischer, Winfried E and Dirk Stelzer [11]. This research proposes a conceptual design for threat reaction methodologies, security architectures and processes, data representation requirements, and the first steps toward integrating threat intelligence sharing platforms with security-policy-controlled systems [11]. Overall, the above articles match the search criteria which Author is looking for. This research investigates the role of information Technology in cyberwar. The research question is as follows: RQ: In what ways does information technology play a role in cyberwarfare? 3 METHODOLOGY In this exploratory study. The Author perfoemed systematic literature review as presented in the guidelines by Amjad Abu Hassan, Mohammad Alshayeb and Lahouari Ghouti and was implemented [12]. A systematic Literature Review is an report that distinguishes, assesses, unites, and gathers the primary studies on specific research issues [15]. By doing a ressearch in light of past important examinations, a precise systematic Literature Review turns into a helpful way of acquiring a solution. The objective of a" 2401.12225v1,"Multimodal Data Curation via Object Detection and Filter Ensembles Tzu-Heng Huang ∗† Changho Shin ∗† † Sui Jiet Tay † Dyah Adila † Frederic Sala † University of Wisconsin-Madison {thuang273, cshin23, adila, fredsala}@wisc.edu, jiet9000@gmail.com January 24, 2024 Abstract We propose an approach for curating multimodal data that we used for our entry in the 2023 DataComp competition filtering track 1 . Our technique combines object detection and weak supervision-based ensembling. In the first of two steps in our approach, we employ an out-of-the-box zero-shot object detection model to extract granular information and produce a variety of filter designs. In the second step, we employ weak supervision to ensemble filtering rules. This approach results in a 4% performance improvement when compared to the best-performing baseline, producing the top-ranking position in the small scale track at the time of writing. Furthermore, in the medium scale track, we achieve a noteworthy 4.2% improvement over the baseline by simply ensembling existing baselines with weak supervision. 1 Introduction Multimodal models, such as CLIP [1], DALL-E [2], Stable Diffusion [3], Flamingo [4], and FLAVA [5] have shown unprecedented performance in many vision-language tasks. Massive datasets collected from the web play a crucial role in these successes. As a result, there is renewed interest in data-centric approaches [6, 7] to machine learning, focusing on data rather than models, architectures, training approaches, etc. An important part of this data-centric approach involves community efforts to curate enormous open-source vision-language datasets via large crawls of the web [8, 9]. While offering impressive scale, raw web-crawled data can be noisy and lack appropriate selection. Data curation is therefore crucial. However, there are many questions on what might be the right approach for curation in the context of training large-scale models. In order to shed light on these, the DataComp competition 2 invites users to propose a variety of data curation approaches while fixing model architectures, training procedures, and a raw data pool [10]. In this work, we document our data curation framework and report performance results for the DataComp filtering track at small and medium scale 3 . Our approach is predominantly based on object detection and filter ensembles. In the small scale case, we include various additional rules generated from higher-order granular information via object detection, which yields 4.0% improvement over the best-performing existing baseline (CLIP score (L/14 30%)). Additionally, in the medium scale case, we ensemble baseline filters, which provides 4.2% improvement over the top-performing baseline (Image-based ∩ CLIP score (L/14 30%)). 2 Data Curation Framework Our curation approach mainly focuses on filtering and ensembling. We provide an overall workflow of the proposed framework in Figure 1 and discuss each component in-depth. Broadly, our framework involves two steps. First, we design individual filters by considering multiple filtering sources such as existing Datacomp baselines with human heuristics, provided CLIP scores, and an additional component, object detection filters. Next, we tune the thresholds in filters to establish refining rules by evaluating the performance with downstream tasks in the * Equal contribution to this work 1 Appeared in the Workshop of Towards the Next Generation of Computer Vision Datasets (TNGCV) on ICCV 2023. 2 https://www.datacomp.ai/ 3 https://www.datacomp.ai/leaderboard.html 1" 2401.12234v1,"A Lightweight FPGA-based IDS-ECU Architecture for Automotive CAN Shashwat Khandelwal & Shanker Shreejith Department of Electronic & Electrical Engineering, Trinity College Dublin Dublin, Ireland Email: {khandels, shankers}@tcd.ie Abstract—Recent years have seen an exponential rise in complex software-driven functionality in vehicles, leading to a rising number of electronic control units (ECUs), network capabilities, and interfaces. These expanded capabilities also bring-in new planes of vulnerabilities making intrusion detection and management a critical capability; however, this can often result in more ECUs and network elements due to the high computational overheads. In this paper, we present a consolidated ECU architecture incorporating an Intrusion Detection System (IDS) for Automotive Controller Area Network (CAN) along with traditional ECU functionality on an off-the-shelf hybrid FPGA device, with near-zero overhead for the ECU functionality. We propose two quantised multi-layer perceptrons (QMLP’s) as isolated IDSs for detecting a range of attack vectors including Denial-of-Service, Fuzzing and Spoofing, which are accelerated using off-the-shelf deep-learning processing unit (DPU) IP block from Xilinx, operating fully transparently to the software on the ECU. The proposed models achieve the state-of-the-art classification accuracy for all the attacks, while we observed a 15× reduction in power consumption when compared against the GPU-based implementation of the same models quantised using Nvidia libraries. We also achieved a 2.3× speed up in permessage processing latency (at 0.24 ms from the arrival of a CAN message) to meet the strict end-to-end latency on critical CAN nodes and a 2.6× reduction in power consumption for inference when compared to the state-of-the-art IDS models on embedded IDS and loosely coupled IDS accelerators (GPUs) discussed in the literature. Index Terms—Controller Area Network, Intrusion Detection System, Machine Learning, Field Programmable Gate Arrays I. I NTRODUCTION Automotive networks are continually increasing in size and complexity as advanced electronic systems like driver assistance systems (ADAS) and high-bandwidth sensors are becoming increasingly common on most production vehicles. Furthermore, such systems are offering increased connectivity to the outside world to enable new waves of safety and comfort applications. Such increased connectivity of various electronic control units (ECUs) (and the vehicular networks these communicate over) allows remote monitoring and control of critical systems for diagnostics, software services and over-the-air upgrades. However, while they enable constant upgrade and upkeep of vehicles to improve their longevity, such interfaces also opened new avenues for attackers to deploy both invasive and non-invasive schemes to inject malicious content on these previously siloed internal networks [1]–[3]. Attacks that involve taking control of the vehicular network leading to control its critical functions have been demonstrated by multiple research groups [4]. These attacks have been made possible because of the inherent lack of security features in legacy networks like Controller Area Network (CAN) [5] that are used in vehicular networks for critical information exchange among ECUs. With wireless networks and vehicleto-X communication becoming increasingly common, more pathways emerge for attackers to launch multi-vehicle attacks without requiring physical access or tampered ECUs. Multiple mitigation strategies have been proposed to address these challenges, prominent among which are intrusion detection systems (IDSs). These systems integrate as an ECU on the network and analyse the flow of network traffic including the message contents in vehicle networks looking for unusual network activities or discrepancies. Any unusual behaviour is flagged as a possible threat, the severity of which is evaluated by critical systems to determine appropriate actions ranging from alerting the user to falling back to a minimal ‘safe operating mode’. Early IDSs relied on rules/specifications [6], [7] that captured parameters of network and messages under standard operating mode or detected signatures of previously known attacks based [8] to determine unusual activities. However, these IDSs suffered from multiple issues including higher false positive and false negative detection, inability to scale to newer attack and memory overheads for each new rule or signature. Recently, machine learning (ML) based IDSs have shown as a viable alternative with their higher detection accuracy, adaptability to newer attack modes and their generalisable nature [9]–[14]. Despite the performance, their deployment in electric/electronic (E/E) systems continues to be non-trivial due to a combination of complex multistandard network architecture (automotive Ethernet, CAN, FlexRay and other network protocols), complex ML models for IDS with provisions for over-the-air updates, tight power budget restricting the use of powerful GPUs for near-line-rate detection of threats and the weight/cabling overheads due to the preferred integration architecture of standalone IDS ECUs. The lack of functional consolidation stems from the inability to achieve clean resource partition between (critical) tasks on automotive (multicore) processor-based ECUs; however, loosely coupled accelerators (like GPUs) have been explored to cater to the complexity of adaptive systems like ADAS although these incur much higher power consumption and interfacing complexities." 2401.12248v1,"A two-circuit approach to reducing quantum resources for the quantum lattice Boltzmann method Sriharsha Kocherla, 1 Austin Adams, 2 Zhixin Song, 3 Alexander Alexeev, 4 and Spencer H. Bryngelson 1, 5, ∗ 1 School of Computational Science & Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA 2 School of Computer Science, Georgia Institute of Technology, Atlanta, GA 30332, USA 3 School of Physics, Georgia Institute of Technology, Atlanta, GA 30332, USA 4 George W. Woodruff School of Mechanical Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA 5 Daniel Guggenheim School of Aerospace Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA (Dated: January 24, 2024) Computational fluid dynamics (CFD) simulations often entail a large computational burden on classical computers. At present, these simulations can require up to trillions of grid points and millions of time steps. To reduce costs, novel architectures like quantum computers may be intrinsically more efficient at the appropriate computation. Current quantum algorithms for solving CFD problems use a single quantum circuit and, in some cases, lattice-based methods. We introduce the a novel multiple circuits algorithm that makes use of a quantum lattice Boltzmann method (QLBM). The two-circuit algorithm we form solves the Navier–Stokes equations with a marked reduction in CNOT gates compared to existing QLBM circuits. The problem is cast as a stream function–vorticity formulation of the 2D Navier–Stokes equations and verified and tested on a 2D lid-driven cavity flow. We show that using separate circuits for the stream function and vorticity lead to a marked CNOT reduction: 35% in total CNOT count and 16% in combined gate depth. This strategy has the additional benefit of the circuits being able to run concurrently, further halving the seen gate depth. This work is intended as a step towards practical quantum circuits for solving differential equation-based problems of scientific interest. I. INTRODUCTION Quantum computers can achieve complexity improvements by leveraging quantum mechanics principles such as superposition and entanglement. One example of quantum computing overcoming the limitations of computation on classical computers is Shor’s algorithm [1], which computes the prime factorization of integers in logarithmic time, providing an exponential speedup. Efforts are being made to explore the possibility of using quantum resources to speed up other important tasks. Example tasks include linear systems solvers [2, 3], Code available at: https://github.com/comp-physics/QLBM-frugal ∗ Corresponding author: shb@gatech.edu" 2401.12249v1,"Electronic Commerce Research and Applications 58 (2023) 101244 Contents lists available at ScienceDirect Electronic Commerce Research and Applications journal homepage: www.elsevier.com/locate/elerap Understanding users’ negative emotions and continuous usage intention in short video platforms Xusen Cheng a , Xiaowei Su a , Bo Yang a, * , Alex Zarifis b , Jian Mou c a School of Information, Renmin University of China, China Cambridge Centre for Alternative Finance, University of Cambridge, UK; School of Business, University of Nicosia, Cyprus c School of Business, Pusan National University, Republic of Korea b A R T I C L E I N F O A B S T R A C T Keywords: Short video Flow theory Illusion of control theory Mixed research Negative emotion Continuous usage intention While short videos bring a lot of information and happiness to users, they also occupy users’ time and short videos gradually change people’s living habits. This paper studies the negative effects and negative emotions of users caused by using short video platforms, as well as the users’ intention to continue using the short video platform when they have negative emotions. Therefore, this study uses flow theory and illusion of control theory to construct a research hypothesis model and preliminarily confirms six influencing factors, and uses sequential mixed research method to conduct quantitative and qualitative research. The results show that users’ use of short video platforms will have negative emotions and negative emotions will affect users’ intention to continue to use short video platforms. This study expands the breadth and depth of research on short videos and enriches the research of negative emotions on the intention to continue using human–computer interaction software. Addi­ tionally, illusion of control theory is introduced into the field of human–computer interaction for the first time, which enriches the application scenarios of control illusion theory. 1. Introduction The Internet has changed the way people interact and reshaped traditional communication media such as film, television, music and the telephone (Statista, 2022). The emergence of new digital technology created a new medium – short video. Compared with news reports and long video, short video is fragmented, intuitive and concise (Li and Ji, 2020; Wu et al., 2021). The short video platform economy has entered a stage of rapid development recently, at the same time as the outbreak of the COVID-19 epidemic around the world (QuestMobile, 2020b). New short video platforms keep emerging, such as the entertainment and social short video platforms “Kuai shou”, “Dou yin”, “Little Red Book”, “bilibili” and “Tencent video”. According to the 50th “China Statistical Report on Internet Development” released by the China Internet Network Infor­ mation Center (CNNIC), as of June 2022, the number of short video users in China reached 962 million, an increase of 28.05 million compared with 2021, accounting for 91.5% of the total number of Internet users"" with ""the number of short video users in China accounted for 91.5% of the total number of Internet users, an increase of 28.05 million from 2021, reaching 962 million (CNNIC, 2022). And, short videos attract users of different ages (QuestMobile, 2020a). As an emerging form of entertainment, a short video platform constantly stimulates users to accept new content and entertainment (Nam and Jung, 2021). Users can get into a flow experience by using short video platforms. Flow experience as a spiritual reward entices them to continue to watch short videos, so users’ use may develop into problematic use (Huang et al., 2022). For example, the use of short video platforms will lead to user distraction, poor time management and a waste of time that could be used for learning (Hong et al., 2014; Gao et al., 2017), thus forming a barrier in users’ life (Zhang et al., 2019). At the same time, users also experience some physical and mental health problems, such as anxiety and depression (Kitazawa et al., 2018; Fumero et al., 2018). Especially in the context of the COVID-19 epidemic, users with problematic Internet use may develop more serious mental illness (Gecaite-Stonciene et al., 2021). The outbreak of the COVID-19 epidemic has had a considerable impact on people’s mental health, and many people feel fear and anxiety (WHO, 2020). Furthermore, short video addiction can negatively affect students’ learning (Ye et al., 2022). Short video platforms also use recommendation algorithms to effectively and timely push content of interest to users, which improves users’ perceived value and flow experience of short video applications (Cong * Corresponding author. E-mail address: yangbo@ruc.edu.cn (B. Yang). https://doi.org/10.1016/j.elerap.2023.101244 Received 23 September 2022; Received in revised form 9 January 2023; Accepted 9 February 2023 Available online 14 February 2023 1567-4223/© 2023 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)." 2401.12255v1,"Instructional Fingerprinting of Large Language Models Fei Wang ∗ Jiashu Xu Pang Wei Koh Mingyu Derek Ma ∗ Chaowei Xiao Harvard USC Muhao Chen UCLA UW Seattle UW-Madison UC Davis jxu1@g.harvard.edu https://cnut1648.github.io/Model-Fingerprint Abstract (a) The exorbitant cost of training Large language models (LLMs) from scratch makes it essential to fingerprint the models to protect intellectual property via ownership authentication and to ensure downstream users and developers comply with their license terms (e.g. restricting commercial use). In this study, we present a pilot study on LLM fingerprinting as a form of very lightweight instruction tuning. Model publisher specifies a confidential private key and implants it as an instruction backdoor that causes the LLM to generate specific text when the key is present. Results on 11 popularly-used LLMs showed that this approach is lightweight and does not affect the normal behavior of the model. It also prevents publisher overclaim, maintains robustness against fingerprint guessing and parameter-efficient training, and supports multi-stage fingerprinting akin to MIT License. 1 Introduction Despite large language models (LLMs) showing impressive performance across diverse tasks, training LLMs from scratch requires considerable costs in both time and money. 1 Therefore, models represent valuable intellectual properties (IP) of their publishers. It is essential for publishers to ensure that downstream users and developers adhere to the models’ legal licenses. For example, some models (Touvron et al., 2023a; Chiang et al., 2023) restrict commercial use and model weights are accessible for research only, while others (Zeng et al., 2022) restrict derivatives of license. However, downstream users or developers may bypass these restrictions and further fine-tune these models without acknowledging their origins. Consider an original model M(θ). Users’ fine-tuning ∗ Equal contribution. E.g., training LLaMA (Touvron et al., 2023a) used 2048 A100 GPUs in 23 days on 1.4T tokens. 1 (b) As a language models ... Distill via API Fine-tune (c) Is this text generated by AI? Model Watermark Is this model distilled from my API? API Watermark Is this model fine-tuned from my model? Model Fingerprint Figure 1: Difference between (a) model watermark (b) API watermark and (c) model fingerprint, which is what this paper explores. See §2.3 and Appx. §A for details. produces a modified model M(θ U ) whose modified parameters θ U will be significantly different from θ, rendering it challenging for publisher to verify ownership (§2.4). To protect the model ownership, model fingerprinting (not to confuse with watermarking; see §2.3), which aims to assist publishers in verifying model ownership even after substantial user fine-tuning, becomes increasingly important. Prior works (Gu et al., 2022) leverage poisoning attacks (Kurita et al., 2020; Xu et al., 2023c) such that ownership verification is reduced to checking for the presence of the “poison” within the model. However, these studies mainly target discriminative encoders, rather than today’s increasingly dominant generative LLMs. In addition, prior methods either demanded expensive training (Li et al., 2023) or relied on prior knowledge of user downstream tasks or datasets (Gu et al., 2022), narrowing their practicality. Moreover, existing methods overlook important and necessary criteria, such as resilience against fine-tuning and robustness to fingerprint guessing. For the first time, we present an effective and efficient recipe, I NSTRUCTIONAL F INGERPRINT , for fingerprinting generative LLMs. We identify six vital criteria for designing model fingerprints (Table 1) and show that our approach satisfies all six criteria. Specifically, the model publisher spec-" 2401.12259v1,"The Version of Record of this manuscript has been published and is available in Applied Sciences, Volume 8, Issue 5 (2018) https://doi.org/10.3390/app8050816 Feature Paper Agreement Technologies for Coordination in Smart Cities Holger Billhardt 1 , Alberto Fernández 1 , Marin Lujak 2 and Sascha Ossowski 1, * CETINIA, Univ. Rey Juan Carlos, Spain; {holger.billhardt, alberto.fernandez, sascha.ossowski@urjc.es} IMT Lille Douai, France; marin.lujak@imt-lille-douai.fr * Correspondence: sascha.ossowski@urjc.es; Tel.: +34 916.647.485 1 2 Academic Editor: name Received: date; Accepted: date; Published: date Abstract: Many challenging problems in today’s society can be tackled by distributed open systems. This is particularly true for domains that are commonly perceived under the umbrella of Smart Cities, such as intelligent transportation, smart energy grids, or participative governance. When designing computer applications for these domains, it is necessary to account for the fact that the elements of such systems, often called software agents, are usually made by different designers and act on behalf of particular stakeholders. Furthermore, it is unknown at design time when such agents will enter or leave the system, and what interests new agents will represent. To instil coordination in such systems is particularly demanding, as usually only part of them can be directly controlled at runtime. Agreement Technologies refer to a sandbox of tools and mechanisms for the development of such open multiagent systems, which are based on the notion of agreement. In this paper, we argue that Agreement Technologies are a suitable means for achieving coordination in Smart Cities domains, and back our claim through examples of several real-world applications. Keywords: Agreement Technologies, Coordination Models, Multiagent Systems, Smart Cities 1. Introduction The transactions and interactions among people in modern societies are increasingly mediated by computers. From email, over social networks, to virtual worlds, the way people work and enjoy their free time is changing dramatically. The resulting networks are usually large in scale, involving huge numbers of interactions, and are open for the interacting entities to join or leave at will. People are often supported by software components of different complexity to which some of the corresponding tasks can be delegated. In practice, such systems cannot be built and managed based on rigid, centralised client-server architectures, but call for more flexible and decentralised means of interaction. The field of Agreement Technologies (AT) [1] envisions next-generation open distributed systems, where interactions between software components are based on the concept of agreement, and which enact two key mechanisms: a means to specify the “space” of agreements that the agents can possibly reach, and an interaction model by means of which agreements can be effectively reached. Autonomy, interaction, mobility and openness are key characteristics that are tackled from a theoretical and practical perspective. Coordination in Distributed Systems is often seen as governing the interaction among distributed processes, with the aim of “gluing together” their behaviour, so that the resulting ensemble shows desired characteristics or functionalities [2]. This notion has also been applied to Distributed Systems made up of software agents. Initially, the main purpose of such multiagent systems was to efficiently perform problem-solving in a distributed manner: both the agents and their rules of interaction were designed together, often in a top-down manner and applying a divide-and- Appl. Sci. 2017, 7, x; doi: FOR PEER REVIEW www.mdpi.com/journal/applsci" 2401.12265v1,"Assessment of the maintenance cost and analysis of availability measures in a finite life cycle for a system subject to competing failures N. C. Caballé a , I. T. Castro 1,∗ a Department of Mathematics, University of Extremadura, Spain Abstract This paper deals with the assessment of the performance of a system under a finite planning horizon. The system is subject to two dependent causes of failure: internal degradation and sudden shocks. We assume that internal degradation follows a gamma process. When the deterioration level of the degradation process exceeds a predetermined value, a degradation failure occurs. Sudden shocks arrive at the system following a doubly stochastic Poisson process (DSPP). A sudden shock provokes the total breakdown of the system. A condition-based maintenance (CBM) with periodic inspection times is developed. To evaluate the maintenance cost, recursive methods combining numerical integration and Monte Carlo simulation are developed to evalute the expected cost rate and its standard deviation. Also, recursive methods to calculate some transient measures of the system are given. Numerical examples are provided to illustrate the analytical results. Keywords: Availability, condition based maintenance, degradation threshold shock model, interval reliability, gamma process, reliability. Acronyms C p : preventive maintenance cost. CBM: condition-based maintenance. CM: corrective maintenance. DSPP: doubly stochastic Poisson process. DTS: degradation-threshold-shock. d.u.: degradation units. HPP: homogeneous Poisson process. m.u.: monetary units. NHPP: non-homogeneous Poisson process. PM: preventive maintenance. t.u.: time units. C(t 1 , t 2 ): maintenance cost in (t 1 , t 2 ]. Notation A M T (t): availability of the system at time t with time between inspections T and preventive threshold M . M à M T (t): estimation of A T (t). α, β: shape and scale parameters of the gamma process. α (v i %) , β (v j %) : gamma process parameters modified under the i-th and j-th positions for the vector v. C c : corrective maintenance cost. C d : downtime cost. C I : inspection cost. C(t f ): maintenance cost in the life cycle. C ∞ (T, M ): expected cost rate for a time between inspections T and preventive threshold M . D j : length of the j-th renewal cycle.   E C T M (t) : expected transient cost at time t with time between inspections T and preventive threshold M .     Ẽ C T M (t) : estimation of E C T M (t) .   E C T M (t) 2 : expected square cost at time t with time between inspections T and preventive threshold M .     Ẽ C T M (t) 2 : estimation of E C T M (t) 2 . h i M (t ) : minimal expected transient cost Ẽ ∗ C T,α f (vi %) ,β (vj %) varying gamma process parameters. h i M (t f ) : minimal expected transient cost Ẽ ∗ C T,λ 1,(vi %) ,λ 2,(vj %) varying sudden shock process parameters.   E W T M (t 1 , t 2 ) : expected downtime in (t 1 , t 2 ] for a time between inspections T and preventive threshold M .     Ẽ W T M (t 1 , t 2 ) : estimation of E W T M (t 1 , t 2 ) . f αt,β : density function of the gamma process. F σ z : distribution function of σ z . ∗ Corresponding author. Email address: inmatorres@unex.es (I. T. Castro) Preprint submitted to ArXiv F̄ σ z 2 −σ z 1 : survival function of σ z 2 − σ z 1 . January 24, 2024" 2401.12322v1,"The Version of Record of this manuscript has been published and is available in Applied Sciences, Volume 11, Issue 20 (2021) https://doi.org/10.3390/app11209654 Article Smart Recommendations for Renting Bikes in Bike Sharing Systems Holger Billhardt 1 , Alberto Fernández 1, * and Sascha Ossowski 1 CETINIA, Univ. Rey Juan Carlos, Spain; {holger.billhardt, alberto.fernandez, sascha.ossowski@urjc.es} * Correspondence: alberto.fernandez@urjc.es 1 Citation: Lastname, F.; Lastname, F.; Lastname, F. Title. Appl. Sci. 2021, 11, Abstract: Vehicle sharing systems, such as bike, car or motorcycle sharing systems, are becoming increasingly popular in big cities in the last years. On one hand, they provide a cheaper and environmental friendlier way of transportation than private cars and, on the other hand, they satisfy the individual mobility demands of citizens better than traditional public transport systems. One of their advantages in this regard is their availability; e.g. the possibility to take (or leave) a vehicle almost anywhere in a city. This availability obviously depends on different strategic and operational management decisions and policies, like the dimension of the fleet or the (re-)distribution of vehicles. Agglutination problems, where due to usage patterns available vehicles concentrate in certain areas whereas no vehicles are available in others, are quite common in such systems and need to be dealt with. Research works have been dedicated to this problem, specifying different techniques to reduce imbalanced situations. In this paper, we present and compare strategies for recommending stations to users who wish to rent or return bikes in station-based bike sharing systems. Our first contribution is a novel recommendation strategy based on queuing theory, that recommends stations based on the utility of the user in terms of lower distance and higher probability of finding a bike or slot. Then we go one step further and define a strategy that recommends stations by combining the utility of a particular user with the utility of the global system, measured in terms of the improvement of the distribution of bikes and slots regarding the expected future demand, with the aim of implicitly avoiding or alleviating balancing problems. We present several experiments to evaluate our proposal with real data from the bike sharing system BiciMAD in Madrid. x. https://doi.org/10.3390/xxxxx Academic Editor: Firstname Last- Keywords: Bike sharing; Agent-based coordination; Smart transportation; Smart mobility; Multiagent systems name Received: date Accepted: date 1. Introduction Published: date Publisher’s Note: MDPI stays neu- tral with regard to jurisdictional claims in published maps and institu- Due to the growing need for reducing air pollution and, at the same time, offering mobility services of satisfactory quality to citizens, in many big cities around the world new ways of urban mobility are being explored. Bike sharing systems (BSS) are just one of the many solutions that have been proposed and implemented in recent years. In some tional affiliations. Copyright: © 2021 by the authors. Submitted for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/license s/by/4.0/). Appl. Sci. 2021, 11, x. https://doi.org/10.3390/xxxxx www.mdpi.com/journal/applsci" 2401.12324v1,"The Version of Record of this manuscript has been published and is available in Neurocomputing, Volume 438, Pages 386-397 (2022) https://doi.org/10.1016/j.neucom.2021.10.085 Streamlining Advanced Taxi Assignment Strategies based on Legal Analysis Holger Billhardt, José-Antonio Santos, Alberto Fernández, Mar Moreno, Sascha Ossowski, José A. Rodríguez CETINIA, Universidad Rey Juan Carlos, Madrid, Spain {holger.billhardt, joseantonio.santos, alberto.fernandez, mar.rebato, sascha.ossowski, joseantonio.rodriguez}@urjc.es Abstract. In recent years many novel applications have appeared that promote the provision of services and activities in a collaborative manner. The key idea behind such systems is to take advantage of idle or underused capacities of existing resources, in order to provide improved services that assist people in their daily tasks, with additional functionality, enhanced efficiency, and/or reduced cost. Particularly in the domain of urban transportation, many researchers have put forward novel ideas, which are then implemented and evaluated through prototypes that usually draw upon AI methods and tools. However, such proposals also bring up multiple non-technical issues that need to be identified and addressed adequately if such systems are ever meant to be applied to the real world. While, in practice, legal and ethical aspects related to such AI-based systems are seldomly considered in the beginning of the research and development process, we argue that they not only restrict design decisions, but can also help guiding them. In this manuscript, we set out from a prototype of a taxi coordination service that mediates between individual (and autonomous) taxis and potential customers. After representing key aspects of its operation in a semi-structured manner, we analyse its viability from the viewpoint of current legal restrictions and constraints, so as to identify additional non-functional requirements as well as options to address them. Then, we go one step ahead, and actually modify the existing prototype to incorporate the previously identified recommendations. Performing experiments with this improved system helps us identify the most adequate option among several legally admissible alternatives. Keywords: taxi fleet management, legal and ethical implications of AI, collaborative economy, agreement technologies 1 Introduction With the advent of new Information and Communication Technologies (ICT), over the last decade new economic models have emerged that are based on sharing or exchanging underused assets and services among customers. Terms like “sharing economy”," 2401.12326v1,"Fine-tuning Large Language Models for Multigenerator, Multidomain, and Multilingual Machine-Generated Text Detection Feng Xiong 1 and Thanet Markchom 2 and Ziwei Zheng 1 and Subin Jung 1 and Varun Ojha 1 and Huizhi Liang 1 1 School of Computing, Newcastle University, Newcastle upon Tyne, UK 2 Department of Computer Science, University of Reading, Reading, UK xf199912@163.com, t.markchom@pgr.reading.ac.uk, {z.zheng21, s.jung4, varun.ojha, huizhi.liang}@newcastle.ac.uk Abstract SemEval-2024 Task 8 introduces the challenge of identifying machine-generated texts from diverse Large Language Models (LLMs) in various languages and domains. The task comprises three subtasks: binary classification in monolingual and multilingual (Subtask A), multi-class classification (Subtask B), and mixed text detection (Subtask C). This paper focuses on Subtask A & B. Each subtask is supported by three datasets for training, development, and testing. To tackle this task, two methods: 1) using traditional machine learning (ML) with natural language preprocessing (NLP) for feature extraction, and 2) fine-tuning LLMs for text classification. The results show that transformer models, particularly LoRA- RoBERTa, exceed traditional ML methods in effectiveness, with majority voting being particularly effective in multilingual contexts for identifying machine-generated texts. 1 Introduction Large Language Models (LLMs) are sophisticated natural language processing (NLP) models extensively trained on vast textual datasets (Wang et al., 2023). These models demonstrate an impressive proficiency in generating human-like text based on the input they receive. Whether completing sentences, generating paragraphs, or even crafting entire articles, LLMs showcase unparalleled proficiency in mimicking natural languages (Mitchell et al., 2023). However, using LLMs for generating texts has raised concerns about potential misuse, such as disseminating misinformation and disruptions in the education system (Wang et al., 2023). Therefore, there is an urgent need to develop automated systems for detecting machine-generated texts (Mitchell et al., 2023; Wang et al., 2023). Recently, several LLMs have been developed such as ChatGPT 1 (Brown et al., 2020), Cohere 2 , 1 https://chat.openai.com/ 2 https://cohere.com Davinci 3 , BLOOMZ 4 (Muennighoff et al., 2022), and Dolly 5 (Conover et al., 2023). The versatility of these models extends across various domains, such as news, social media, educational platforms, and academic contexts, in multiple languages not only English (Wang et al., 2023). This wide application poses a challenge in developing an automated system capable of detecting machinegenerated texts from various generators, across multiple domains and languages. To tackle this challenge, SemEval-2024 Task 8: Multigenerator, Multidomain, and Multilingual Black-Box Machine-Generated Text Detection (Wang et al., 2023) introduces the task of detecting machine-generated texts obtained from different LLMs, in various domains and languages. This task consists of three subtasks: Subtasks A, B, and C. Subtask A involves binary classification of text as either human-written or machine-generated, with two tracks: monolingual (English only) and multilingual. Subtask B focuses on multi-class classification of machine-generated text, aiming to identify the source of generation, whether human or a specific language model. Subtask C addresses the detection of human-machine mixed text, requiring the determination of the boundary where the transition from human-written to machine-generated occurs in a mixed text. This paper focuses on Subtasks A and B. To tackle these tasks, we propose two approaches: (1) classical machine learning, leveraging NLP techniques for feature extraction, and (2) fine-tuning LLMs for the classification of human-written and machine-generated texts. 2 Related Work In the realm of distinguishing texts generated by large language models (LLMs) from those authored 3 https://platform.openai.com/docs/models/gpt-base https://huggingface.co./bigscience/bloomz 5 https://huggingface.co./databricks/dolly-v2-12b 4" 2401.12329v1,"The Version of Record of this manuscript has been published and is available in Electronics, Volume 11, Issue 4 (2022) https://doi.org/10.3390/electronics11040576 Article Towards a prioritised use of transportation infrastructures: the case of vehiclespecific dynamic access restrictions to city centres Holger Billhardt 1 , Alberto Fernández 1, *, Pasqual Martí 2 , Javier Prieto Tejedor 3 and Sascha Ossowski 1 CETINIA, Univ. Rey Juan Carlos, 28933 Móstoles, Madrid, Spain; holger.billhardt@urjc.es (H.B.); sascha.ossowski@urjc.es (S.O.) 2 Valencian Research Institute for Artificial Intelligence (VRAIN), Universitat Politècnica de València, Spain; pasmargi@vrain.upv.es 3 BISITE Research Group, University of Salamanca. Edificio Multiusos I+D+i, 37007, Salamanca, Spain; javierp@usal.es * Correspondence: alberto.fernandez@urjc.es 1 Citation: Lastname, F.; Lastname, F.; Lastname, F. Title. Electronics 2021, 10, x. https://doi.org/10.3390/xxxxx Academic Editor: Firstname Last- name Abstract: One of the main problems that local authorities of large cities have to face is the regulation of urban mobility. They need to provide the means to allow efficient movement of people and distribution of goods. However, the provisioning of transportation services should take into account general global objectives, like reducing emissions and having more healthy living environments, which may not always be aligned with individual interests. Urban mobility is usually provided through a transport infrastructure that includes all the elements that support mobility. In many occasions, the capacity of using elements of this infrastructure is lower than the actual demand and thus, different transportation activities compete for using them. In this paper, we argue that scarce transport infrastructure elements should be assigned dynamically and in a prioritised manner to transport activities that have a higher utility from the point of view of the society, for example, activities that produce less pollution and provide more value to society. In this paper, we define a general model for prioritizing the use of a particular type of transportation infrastructure elements, called time-unlimited elements, whose usage time is unknown a priori, and illustrate its dynamics through two use cases: vehicle-specific dynamic access restriction to city centres i) based on the usage levels of available parking spaces and ii) to assure sustained admissible air quality levels in the centre. We carry out several experiments using the SUMO traffic simulation tool, to evaluate our proposal. Keywords: traffic management; prioritized resource allocation; urban mobility; agreement technologies Received: date Accepted: date Published: date 1. Introduction Publisher’s Note: MDPI stays neu- tral with regard to jurisdictional claims in published maps and institu- tional affiliations. Copyright: © 2021 by the authors. Submitted for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/license s/by/4.0/). The organization of urban mobility and transportation is a field that has received tremendous changes, as well as a remarkable interest in the last years. Not only the desire of people to move freely within the cities, but also the transformation of customer habits towards an increasingly online acquisition of goods and the subsequent logistic requirements, tend to increase the traffic in big cities. At the same time the consciousness and sensibility has grown regarding environmental pollution and its effects on public health and the quality of life of citizens. In this context, authorities of big cities all over the world are faced with the problem of providing efficient transportation solutions reducing at the same time traffic-related problems like traffic jams or environmental pollution. In parallel to this trend, both research and industry, have proposed and provided new innovative solutions for more environment-friendly means of transportations. Examples of this trend are new types of vehicles (e.g., electric cars, scooters, bikes and so on) or new transportation services that are based on the concept of “collaborative economy” or “collaborative Electronics 2021, 10, x. https://doi.org/10.3390/xxxxx www.mdpi.com/journal/electronics" 2401.12344v1,"OCT-SelfNet: A Self-Supervised Framework with Multi-Modal Datasets for Generalized and Robust Retinal Disease Detection Fatema-E- Jannat, Sina Gholami, Minhaj Nur Alam, Hamed Tabkhi Dept. of Electrical and Computer Engineering University of North Carolina at Charlotte Charlotte, North Carolina, USA {fjannat, sgholami, minhaj.alam, htabkhiv}@charlotte.edu Abstract—Despite the revolutionary impact of AI and the development of locally trained algorithms, achieving widespread generalized learning from multi-modal data in medical AI remains a significant challenge. This gap hinders the practical deployment of scalable medical AI solutions. Addressing this challenge, our research contributes a self-supervised robust machine learning framework, OCT-SelfNet, for detecting eye diseases using optical coherence tomography (OCT) images. In this work, various data sets from various institutions are combined enabling a more comprehensive range of representation. Our method addresses the issue using a two-phase training approach that combines self-supervised pretraining and supervised finetuning with a mask autoencoder based on the SwinV2 backbone by providing a solution for real-world clinical deployment. Extensive experiments on three datasets with different encoder backbones, low data settings, unseen data settings, and the effect of augmentation show that our method outperforms the baseline model, Resnet-50 by consistently attaining AUC-ROC performance surpassing 77% across all tests, whereas the baseline model exceeds 54%. Moreover, in terms of the AUC-PR metric, our proposed method exceeded 42%, showcasing a substantial increase of at least 10% in performance compared to the baseline, which exceeded only 33%. This contributes to our understanding of our approach’s potential and emphasizes its usefulness in clinical settings Index Terms—AI, Self-supervised, Supervised, Transformer, SwinV2, ViT, MAE, Autoencoder, OCT, classification, Multimodal I. I NTRODUCTION Within the realm of medical artificial intelligence (AI), there is a significant gap between the progress made in AI technology resulting in the development of various locally trained AI algorithms and the challenge of using these models on a varied patient population on a large scale. This limits the practical deployment of scalable medical AI solutions in real-world scenarios. In our research, we have addressed two main issues. Firstly, robust machine learning (ML) tools can detect eye diseases using optical coherence tomography (OCT) images in managing the eye. Secondly, we addressed the challenge of creating a model that can learn generalized features from diverse unlabeled data to make it widely applicable in realworld scenarios. Age-related macular degeneration (AMD) is one of the leading causes of irreversible blindness and vision impairment (VI) globally. VI affects nearly 2.2 billion people globally, among which almost 1 billion cases could be prevented with early diagnosis and intervention [52]. Therefore, it is essential to identify individuals at risk of disease onset or progression from early to more advanced stages since timely intervention can prevent or slow progression, thus preventing irreversible VI [41]. Individuals with a high risk for VI would benefit from more frequent ophthalmic examinations, monitoring, and treatment [57]. ML and deep learning (DL) techniques have demonstrated significant promise in automated ophthalmic diagnosis [2], [13], [40], [50]. However, using similar datasets during training often hinders their real-world effectiveness, resulting in challenges when deployed in clinical settings. To optimize their effectiveness in clinical workflow, they require access to diverse datasets from multiple institutions with varying demographics, OCT image-capturing devices, or protocols to improve their adaptability, versatility, and scalability. This work is one of the first to bring and evaluate recent advances in large pre-trained transformers to enhance the detection and diagnosis in biomedical imaging, focusing on automated ophthalmic diagnosis. We have developed a largescale, self-supervised model with random masking inspired by masked autoencoder [17] with SwinV2 [33] backbone, explicitly for classifying AMD using OCT images. More specifically, we focus on the binary classification of distinguishing normal cases from those with AMD. By leveraging self-supervised learning (SSL), this model aims to reduce the need for extensive manual annotations by experts, easing the workload and facilitating broader clinical AI applications from retinal imaging data. Our model can learn versatile and generalizable features from unlabeled retinal OCT datasets, which is crucial for creating AI systems that require fewer labeled examples to adapt to various diagnostic tasks. In contrast to previous works [4], [28], [30], [36], [48] which studies one dataset in isolation, our study is distinct and intrinsically more challenging as we examine the domain" 2401.12354v1,"Draft version January 24, 2024 Typeset using L A TEX default style in AASTeX631 The Gravitational Wave AfterglowPy Analysis (GWAPA) webtool R. A. J. Eyles-Ferris , 1 H. van Eerten, 2 E. Troja , 3 and P. T. O’Brien 1 1 School of Physics and Astronomy, University of Leicester University Road Leicester, LE1 7RH, UK 2 Department of Physics, University of Bath Claverton Down Bath, BA2 7AY , UK 3 Dipartimento di Fisica, Università Degli Studi di Roma - Tor Vergata via della Ricera Scientifica 1 00100 Rome, IT ABSTRACT We present the first release of the Gravitational Wave AfterglowPy Analysis (GWAPA) webtool a) . GWAPA is designed to provide the community with an interactive tool for rapid analysis of gravitational wave afterglow counterparts and can be extended to the general case of gamma-ray burst afterglows seen at different angles. It is based on the afterglowpy package and allows users to upload observational data and vary afterglow parameters to infer the properties of the explosion. Multiple jet structures, including top hat, Gaussian and power laws, in addition to a spherical outflow model are implemented. A Python script for MCMC fitting is also available to download, with initial guesses taken from GWAPA. Keywords: Gamma-ray bursts (629) — Astronomy data analysis (1858) — Astronomy data modeling (1859) 1. INTRODUCTION The Laser Interferometer Gravitational-Wave Observatory (LIGO), Virgo interferometer and Kamioka Gravitational Wave Detector (KAGRA) have begun their fourth observing run (O4), enabling us to search for electromagnetic (EM) counterparts of gravitational wave sources. During O4, it is crucial for the community to have tools to rapidly respond to and analyse possible EM counterparts. To that end, we introduce the first release of the Gravitational Wave AfterglowPy Analysis (GWAPA v0.9.17b) webtool. This first release of GWAPA is designed to allow users to easily analyse the afterglows of gravitational wave counterparts and gamma-ray bursts (GRBs), and infer properties of the explosion and its environment. Such analysis can also aid in the rapid identification of kilonovae superimposed on the standard afterglow signal (e.g. Troja 2023). To achieve these aims, GWAPA provides a data repository for GW and GRB afterglows and a web-based interactive access to the afterglowpy Python package (Ryan et al. 2020) and incorporate five jet structures and a spherical outflow 1 model into this release of GWAPA. GWAPA includes an intuitive interface powered by the Bokeh Python package (Bokeh Development Team 2023) allowing interactive plotting and comparison of models and observed data. 2. WEBTOOL DESIGN 2.1. Backend Corresponding author: R. A. J. Eyles-Ferris raje1@leicester.ac.uk a) Available at https://gwapa.web.roma2.infn.it/ 1 Referred to as a cocoon in earlier releases of afterglowpy." 2401.12364v1,"Guiding the Search Towards Failure-Inducing Test Inputs Using Support Vector Machines Lev Sorokin Niklas Kerscher fortiss, Research Institute of the Free State of Bavaria Munich, Germany sorokin@fortiss.org Technische Universität München Munich, Germany niklas.kerscher@tum.de KEYWORDS t rin In this paper, we present NSGA-II-SVM (Non-dominated Sorting Genetic Algorithm with Support Vector Machine Guidance), a novel learnable evolutionary and search-based testing algorithm that leverages Support Vector Machine (SVM) classification models to direct the search towards failure-revealing test inputs. Supported by genetic search, NSGA-II-SVM creates iteratively SVM-based models of the test input space, learning which regions in the search space are promising to be explored. A subsequent sampling and repetition of evolutionary search iterations allow to refine and make the model more accurate in the prediction. Our preliminary evaluation of NSGA-II-SVM by testing an Automated Valet Parking system shows that NSGA-II-SVM is more effective in identifying more critical test cases than a state of the art learnable evolutionary testing technique as well as naïve random search. Search-based Software Engineering, Scenario-based testing, Automated Driving, Machine Learning, Support-vector Machines Figure 1: Illustration of difference between boundary identification by a Decision Tree and Support Vector Machine for data from two classes (circle/triangle positive/negative data). enrich testing by 1) predicting simulation results to avoid executing the SUT in the simulator [3, 13], or 2) by employing machinelearning (ML) models to predict most likely failure-revealing regions of the test inputs space to evolve the search using those [5]. Abdessalam et al. [5] presented NSGA-II-DT, a surrogate-assisted testing technique, which is in particular a Learnable Evolutionary Algorithm (LEM) [22]. This approach combines search with the evolutionary algorithm NSGA-II with model fitting, i.e., Decision Tree (DT) classification models. While NSGA-II allows to optimize fitness functions to find promising test cases, DTs support the search by dividing the search space into most likely failure-revealing or not failure-revealing regions to direct the subsequent search with NSGA-II into promising areas and to identify new failing tests. However, DTs impose decision boundaries that are orthogonal to the considered features, i.e., search variables, thus achieving a coarse prediction of failure-inducing regions. In particular, DTs are likely defining regions as failure-revealing even when those contain spaces without any sampled tests or non-failing tests (Figure 1). We present therefore the novel LEM-based approach Non-dominated Sorting Genetic Algorithm with Support Vector Machine Guidance (NSGA-II-SVM), which uses support vector machines (SVMs), a well applied ML-technique for classification tasks. In contrast to DTs, SVMs can learn non-linear boundaries (Figure 1) by transforming the original problem into a higher dimensional space using so-called kernel functions, thus allowing to separate accurately failing from non-failing test cases. Our presented algorithm performs the search as follows: after several iterations with NSGA-II, an SVM model is trained on all so far evaluated test cases to predict failure-revealing regions, followed by sampling in identified regions. Sampled test cases are then evaluated using a simulator and fitness values are assigned indicating whether the test cases are failure-revealing or not. From all identified test cases so far, the best test cases are chosen to form the seed population for the genetic search with NSGA-II in the subsequent iteration of NSGA-II-SVM. Pr ep ABSTRACT 1 INTRODUCTION Search-based software testing (SBST) is an effective approach for testing systems with large and complex input spaces, such as learningenabled automated driving or avionic systems [21, 23, 27, 36] to avoid expensive and dangerous real-world testing. SBST relies on meta-heuristics, such as evolutionary algorithms [7, 14, 15, 27] which consider the testing problem as a multi-objective optimization (MOO) problem, where system-level safety requirements are modeled by different objectives to be optimized, such as time-tocollision or safety distance. To execute SBST, the system-under-test (SUT) is in general run in a simulation environment [12, 28] and exposed to different scenarios, defined by behaviors of other actors or environmental conditions. However, executing a SUT in a simulator can take minutes to hours, making testing with multiple scenario parameters and large parameter spaces computationally expensive [24]. One promising approach to make the search more efficient is combining evolutionary search with surrogate models [3, 24]. Surrogate models can Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ICSE ’24, April 14–20, 2024, Lisbon, Portugal © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX" 2401.12368v1,"Bubble Universe from Flat Spaces Eduardo Guendelman ∗ Department of Physics, Ben-Gurion University of the Negev, Beer-Sheva, Israel Frankfurt Institute for Advanced Studies, Giersch Science Center, Campus Riedberg, Frankfurt am Main, Germany Bahamas Advanced Studies Institute and Conferences, 4A Ocean Heights, Hill View Circle, Stella Maris, Long Island, The Bahamas Jacov Portnoy † Bahamas Advanced Studies Institute and Conferences, 4A Ocean Heights, Hill View Circle, Stella Maris, Long Island, The Bahamas (Dated: January 24, 2024) Abstract We show by matching two flat spaces one in Minkowski coordinates ( empty space) and the other in Minkowski coordinates after a special conformal transformation (also empty space) through a bubble with positive and constant surface tension, that the motion of the bubble is hyperbolic. If the surface tension is very big the initial size of the bubble is as small as we wish, so that we can indeed obtain an infinite universe out of empty spaces. The induced space in the bubble is de Sitter type. ∗ Electronic address: guendel@bgu.ac.il † Electronic address: jacovportnoy@gmail.com 1" 2401.12379v1,"Analyzing the Effectiveness of Large Language Models on Text-to-SQL Synthesis Richard Roberson 1 , Gowtham Kaki 1 , Ashutosh Trivedi 1 1 University of Colorado Boulder, Boulder, Colorado, USA richard.roberson@colorado.edu, gowtham.kaki@colorado.edu, ashutosh.trivedi@colorado.edu Abstract This study investigates various approaches to using Large Language Models (LLMs) for Text-to-SQL program synthesis, focusing on the outcomes and insights derived. Employing the popular Text-to-SQL dataset, spider, the goal was to input a natural language question along with the database schema and output the correct SQL SELECT query. The initial approach was to fine-tune a local and open-source model to generate the SELECT query. After QLoRa fine-tuning WizardLM’s WizardCoder-15B model on the spider dataset, the execution accuracy for generated queries rose to a high of 61%. With the second approach, using the fine-tuned gpt- 3.5-turbo-16k (Few-shot) + gpt-4-turbo (Zero-shot error correction), the execution accuracy reached a high of 82.1%. Of all the incorrect queries, most can be categorized into a seven different categories of what went wrong: selecting the wrong columns or wrong order of columns, grouping by the wrong column, predicting the wrong values in conditionals, using different aggregates than the ground truth, extra or too few JOIN clauses, inconsistencies in the Spider dataset, and lastly completely incorrect query structure. Most if not all of the queries fall into these categories and it is insightful to understanding where the faults still lie with LLM program synthesis and where they can be improved. 1 Introduction Text-to-SQL program synthesis involves converting natural language (NL) questions into SQL queries for database interaction. Historically, this task has been approached using smaller sequence-to-sequence (seq2seq) pre-trained models, which, until recently, represented the forefront of Text-to- SQL methodologies (Li et al. 2023). Recent advancements in large parameter pre-trained language models, such as gpt- 3.5-turbo and gpt-4, have shifted the paradigm in Text-to- SQL research (Dong et al. 2023; Gao et al. 2023). The introduction of the spider 1 dataset by Yale researchers in 2019 marked a significant milestone in Text-to-SQL research (Yu et al. 2019). These models have not only outperformed traditional seq2seq approaches but have also established new benchmarks on the spider leaderboard. Open-source LLMs are characterized by their publicly available model weights and the ability to undergo finetuning. The resulting model, named Spider Skeleton Wizard 1 https://yale-lily.github.io/spider Coder, demonstrated competitive zero-shot Text-to-SQL capabilities, rivaling those of ChatGPT (gpt-3.5-turbo). Then, in response to challenges encountered, our research pivoted towards closed-source models. This shift was also when OpenAI introduced fine-tuning capabilities for gpt- 3.5-turbo in their API. The ability to train state-of-the-art LLMs opened new avenues for Text-to-SQL program synthesis. This paper aims to detail the strategies employed using both open and closed-source models, evaluate the results from each, and extract key insights crucial for advancing research in this field. 2 Open Source Models For our first set of experiments, we chose to fine-tune WizardLM’s WizardCoder, a 15B parameter model renowned for its proficiency in programming tasks (Luo et al. 2023). This decision was driven by the need for a coding model, especially pertinent to the spider dataset in Text-to-SQL program synthesis. The fine-tuned model, named Spider Skeleton Wizard Coder, attained an execution accuracy of 61% On the spider development set comprising 1,034 entries. The model is publicly available on the HuggingFace Transformers Library 2 . Fine-tuning With the goal of minimizing costs, LoRA fine-tuning, denoting low-rank adapters, modifies only a fraction of the total model weights. This results in a reduced memory footprint during training. The compact LoRA is then integrated with the complete model weights, tailoring the model closer to the training data. QLoRA further minimizes the memory footprint by employing quantized weights for LoRA training, a method nearly as effective as full model fine-tuning (Dettmers et al. 2023). Data The enhanced spider dataset for fine-tuning includes the database schema for each entry, along with the skeleton format in the responses. Figure 1 illustrates an example from this dataset. The training data response encompasses both the skeleton and the actual SQL query, prompting the model to generate responses in a similar format. Challenges While Spider Skeleton Wizard Coder demonstrates commendable zero-shot execution accuracy, it still 2 https://huggingface.co./richardr1126/spider-skeleton-wizardcoder-merged" 2401.12382v1,"Longitudinal Sentiment Classification of Reddit Posts Fabian Nwaoha Ziyad Gaffar Ho Joon Chun Marina Sokolova University of Ottawa {fnwao011, cazgaff021, hchun043 , sokolova}@uottawa.ca Abstract. We report results of a longitudinal sentiment classification of Reddit posts written by students of four major Canadian universities. We work with the texts of the posts, concentrating on the years 2020-2023. By finely tuning a sentiment threshold to a range of [-0.075,0.075], we successfully built classifiers proficient in categorizing post sentiments into positive and negative categories. Noticeably, our sentiment classification results are consistent across the four university data sets. 1 Motivation and Related Work Our current study focuses on sentiment classification of Reddit posts written by university students. Survey conducted by National College Health Assessment shows that 67% of Canadian university students have grappled with overwhelming anxiety (Abdi, 2023). Those results coincide with earlier results of the Household Pulse Survey which reported that more than 56% of the young adults, 18- 24 years old, have reported the symptoms of depression during the Covid-19 pandemic. It is the highest rate among adult age categories, followed by 48.9% in the 25- 49 years old category (Panchal et al., 2021). However, the above studies did not include sentiment classification of texts posted social networks favored by the student population. We, on other hand, classify the posts into positive, negative, and neutral sentiments. We work with online posts posted on Reddit 1 , a social media platform widely used by the students. Specifically, we work with posts from students of four universities: Waterloo, University of Toronto (UofT), McGill, University of British Columbia (UBC). With over 52 million daily active users (Backlinko, 2023), Reddit is one of the most used social media platforms. Ability to categorize data through different subreddits enhances a focused sentiment analysis (Chen & Sokolova, 2021). The authors use topic modelling and sentiment classification to study positive and negative sentiments in posts united by content of depression. Several recent studies were able to successfully utilize sentiment analysis, albeit focusing on microblogs such as Weibo and X (formerly Twitter). Those studies include (Xie et al,2020), with the focus on public response to COVID-19 on Weibo, a Chinese microblog platform, (Qi & Shabrina, 2023) that compares the effectiveness of lexicon-based and machine learning methods for sentiment analysis of Twitter data and presents a comparative study of different lexicon combinations, while also exploring the importance of feature generation and selection processes for machine learning sentiment classification. Several publications reported on a longitudinal sentiment analysis of Twitter data, e.g. day-to-day sentiment shifts in tweets posted in a three-month period (Valdez et al, 2020). Longitudinal studies of Reddit posts concentrated on mental health and substance use (Alambo et al, 2021; Yang et al, 2023). Our longitudinal study differs from the above in that i) we work with the text of the posts; ii) we employ advanced analytics tools for in-depth text studies; iii) we use four year-long time intervals: 2020, 2021, 2022, and 2023. We apply sentiment classification to extracted texts from the Reddit posts. We work with four year-long intervals: 2020, 2021, 2022, and 2023. Those years cover significant changes in public life caused first by COVID-19 pandemic, then easing the restrictions, and finally lifting all the remaining restrictions. The first instance of COVID-19 emerged in January 2020. Consequently, our investigation encompasses the entire period spanning from 2020 to 2022. Given the commencement date of our research, our emphasis is on data gathered from January to November 2023. We collected 1 https://www.reddit.com/" 2401.12392v1,"1 Evaluating Roadside Perception for Autonomous Vehicles: Insights from Field Testing Rusheng Zhang, Depu Meng, Shengyin Shen, Tinghan Wang, Tai Karir, Michael Maile, Henry X. Liu Abstract—Roadside perception systems are increasingly crucial in enhancing traffic safety and facilitating cooperative driving for autonomous vehicles. Despite rapid technological advancements, a major challenge persists for this newly arising field: the absence of standardized evaluation methods and benchmarks for these systems. This limitation hampers the ability to effectively assess and compare the performance of different systems, thus constraining progress in this vital field. This paper introduces a comprehensive evaluation methodology specifically designed to assess the performance of roadside perception systems. Our methodology encompasses measurement techniques, metric selection, and experimental trial design, all grounded in real-world field testing to ensure the practical applicability of our approach. We applied our methodology in Mcity 1 , a controlled testing environment, to evaluate various off-the-shelf perception systems. This approach allowed for an in-depth comparative analysis of their performance in realistic scenarios, offering key insights into their respective strengths and limitations. The findings of this study are poised to inform the development of industrystandard benchmarks and evaluation methods, thereby enhancing the effectiveness of roadside perception system development and deployment for autonomous vehicles. We anticipate that this paper will stimulate essential discourse on standardizing evaluation methods for roadside perception systems, thus pushing the frontiers of this technology. Furthermore, our results offer both academia and industry a comprehensive understanding of the capabilities of contemporary infrastructure-based perception systems. Index Terms—Roadside Perception Systems, Automated Vehicles, Standardized Evaluation Method, Roadside Perception System Benchmarks I. I NTRODUCTION A key component of autonomous driving is the perception system, which enables the vehicle to sense and understand its surroundings. However, the onboard perception system, which This research was partially funded by the U.S. Department of Transportation (USDOT) Advanced Transportation and Congestion Management Technologies Deployment Award (693JJ32150006) and Mcity of the University of Michigan. Corresponding authors: Rusheng Zhang and Henry X. Liu. R. Zhang, D. Meng, and H.X. Liu are with the Department of Civil and Environmental Engineering, University of Michigan, Ann Arbor, MI, 48109, USA (email: {rushengz, depum, henryliu}@umich.edu) S. Shen is with the University of Michigan Transportation Research Institude, 2901 Baxer Rd, Ann Arbor, MI, 48109, USA. (email: shengyin@umich.edu) T. Wang is with the Department of Mechanical Engineering, University of Michigan, 2350 Hayward St, Ann Arbor, MI 48109, USA. (email: tinghanw@umich.edu) T. Karir is with Huron High School, Ann Arbor, Michigan, USA. (email: tai.karir@gmail.com) M. Maile is with Ivie Communications, (Email: michael.a.maile@gmail.com) H. X. Liu is also with Mcity of the University of Michigan. 1 https://mcity.umich.edu/ relies on sensors mounted on the vehicle, such as cameras, LiDARs and radars, may face limitations in complex scenarios, harsh weather, and lighting conditions, due to occlusions, blind spots, sensor noise and environmental diversity. Therefore, a complementary roadside perception system is needed to enhance the onboard perception and provide more systematic and reliable scene information. Roadside perception leverages sensors installed on the roadside infrastructure to detect and track vehicles and other objects in the region of interest, and communicate the perception results to the onboard system via vehicle-to-infrastructure (V2I) communication technologies [1], [2]. Roadside perception is a rising field that has attracted increasing attention from both academia and industry in recent years. Several off-the-shelf products have been introduced to the market, which provide roadside perception solutions based on camera, radar and LiDAR sensors. For example, Derq [3] offers AI-driven roadside perception software that can detect and predict road users’ behavior and prevent collisions. Ouster [4] produces high-resolution digital LiDAR sensors that can be used for roadside perception and V2X communication. These examples represent only a small fraction of the burgeoning market of off-the-shelf products aimed at enhancing roadside perception for autonomous driving. There are numerous other companies, as detailed in [1], [2], contributing innovative solutions in this sector. Together, they illustrate both the immense potential this field holds for the future of autonomous driving. Despite the burgeoning market of roadside perception systems, there currently exists a notable deficit in this field: the absence of a standardized, fair comparison between these diverse systems. Various off-the-shelf products, each with their unique features and performance claims, are currently operating without a clear means of direct, fair comparison. This could result in an unregulated landscape, where the absence of fair competition hampers innovation and quality assurance in roadside perception systems. In response to this pressing need, this paper presents an evaluation methodology specifically devised for a systematic assessment of roadside perception systems. The proposed methodology encompasses aspects such as measurement techniques, metrics selection, and experimental trial design, all derived from field testing experience. Importantly, these components are deeply rooted in real-world conditions, making this evaluation methodology not only practical but also readily implementable. The focus on real-world application ensures that our proposed system can serve as a useful tool in" 2401.12405v1,"Learning Recovery Strategies for Dynamic Self-healing in Reactive Systems Mateo Sanabria, 1 Ivana Dusparic, 2 Nicolás Cardozo 1 1 Systems and Computing Engineering Department, Universidad de los Andes, Colombia 2 School of Computer Science and Statistics, Trinity College Dublin, Ireland 1 {m.sanabriaa,n.cardozo}@uniandes.edu.co, 2 ivana.dusparic@tcd.ie Abstract—Self-healing systems depend on following feasibility and effectiveness of our framework through a set of predefined instructions to recover from a known a prototypical reactive application for tracking mouse failure state. Failure states are generally detected based movements, and the DeltaIoT exemplar for self-healing on domain specific specialized metrics. Failure fixes systems. Our results demonstrate that with just the def- are applied at predefined application hooks that are inition of monitors, the system is effective in detecting not sufficiently expressive to manage different failure and recovering from failures between 55% − 92% of types. Self-healing is usually applied in the context the cases in the first application, and at par with the of distributed systems, where the detection of failures predefined strategies in the second application. is constrained to communication problems, and resolu- tion strategies often consist of replacing complete com- Index Terms—Self-healing systems, Context-oriented Programming, Functional-reactive programming, RL ponents. However, current complex systems may reach failure states at a fine granularity not anticipated by developers (for example, value range changes for data streaming in IoT systems), making them unsuitable for existing self-healing techniques. To counter these I. Introduction Self-healing properties enable systems to au- tonomously recover from failure states. To enable problems, in this paper we propose a new self-healing self-healing in a software system there are four framework that learns recovery strategies for healing challenges [22] to address: (1) build the means to fine-grained system behavior at run time. Our proposal monitor the system state, (2) use fault analysis to de- targets complex reactive systems, defining monitors as predicates specifying satisfiability conditions of system properties. Such monitors are functionally expressive tect the root cause of faults based on the monitored state, (3) make a decision about the detected fault (i.e., and can be defined at run time to detect failure states decide whether the fault is blocking), and (4) exe- at any execution point. Once failure states are detected, cute the recovery actions to take the system back we use a Reinforcement Learning-based technique to to a correct state. To execute the aforementioned learn a recovery strategy based on users’ corrective sequences. Finally, to execute the learned strategies, we extract them as Context-oriented Programming vari- process, software systems must be equipped with the tools and capabilities for each of the tasks. To ations that activate dynamically whenever the failure capture the system state and to detect faults therein, state is detected, overwriting the base system behavior self-healing systems specify hooks in the system with the recovery strategy for that state. We validate the as control points to observe the system state. Such January 24, 2024 DRAFT" 2401.12427v1,"ORDER CONDITIONS FOR NONLINEARLY PARTITIONED RUNGE–KUTTA METHODS BRIAN K. TRAN † , BEN S. SOUTHWORTH † , AND TOMMASO BUVOLI ‡ Abstract. Recently a new class of nonlinearly partitioned Runge–Kutta (NPRK) methods was proposed for nonlinearly partitioned systems of ordinary differential equations, y ′ = F (y, y). The target class of problems are ones in which different scales, stiffnesses, or physics are coupled in a nonlinear way, wherein the desired partition cannot be written in a classical additive or componentwise fashion. Here we use rooted-tree analysis to derive full order conditions for NPRK M methods, where M denotes the number of nonlinear partitions. Due to the nonlinear coupling and thereby mixed product differentials, it turns out the standard node-colored rooted-tree analysis used in analyzing ODE integrators does not naturally apply. Instead we develop a new edge-colored rootedtree framework to address the nonlinear coupling. The resulting order conditions are enumerated, provided directly for up to 4th order with M = 2 and 3rd-order with M = 3, and related to existing order conditions of additive and partitioned RK methods. 1. Introduction Nonlinearly partitioned Runge-Kutta (NPRK) methods [5] are a newly-proposed family of time integrators for solving the initial value problem (1.1) y ′ = F (y, y), y(t 0 ) = y 0 . NPRK methods can treat each argument of F (y, y) with a different level of implicitness, and may be interpreted as nonlinear generalizations of additive Runge-Kutta (ARK) methods [2; 14; 15]. An s-stage NPRK method is Y i = y n + h (1.2) y n+1 = y n + h s s X X j=1 k=1 s X s X a ijk F (Y j , Y k ), i = 1, . . . , s, b ij F (Y i , Y j ), i=1 j=1 where Y i are stage values, the rank three tensor a ijk takes the place of the classical Runge-Kutta matrix a ij , and the matrix b ij replaces the classical weight vector b i . The NPRK framework facilitates efficient integration of equations with stiff terms that cannot be isolated additively or component-wise. Specifically, any unpartitioned system y ′ = f (y) can be converted into eq. (1.1) by selecting a function F (y, y) that satisfies f (y) = F (y, y); if integrated with an IMEX-NPRK method (i.e. a ijk = 0 for j > i and k ≥ i), then implicit solves are only required over the first argument of F . This approach has been previously applied to solve a number of problems using the related, though less general family of semi-implicit integrators [3; 4; 24]. In [5] we had success applying NPRK methods to nonlinear partitions of challenging thermal radiative † Los Alamos National Laboratory, Theoretical Division, Los Alamos, New Mexico 87545 Tulane University, Department of Mathematics, New Orleans, Louisiana 70118 E-mail addresses: btran@lanl.gov, southworth@lanl.gov, tbuvoli@tulane.edu. ‡ 1" 2401.12438v1,"Secure Federated Learning Approaches to Diagnosing COVID-19 Rittika Adhikari Christopher Settles University of Illinois at Urbana-Champaign Urbana, Illinois, United States of America rittika2@illinois.edu University of Illinois at Urbana-Champaign Urbana, Illinois, United States of America csettl2@illinois.edu ABSTRACT The recent pandemic has delivered a desire for understanding COVID-19 diagnoses among patients in hospitals. Currently, hospitals have difficulty diagnosing this novel respiratory illness from a patient’s chest X-Ray to another, simply because it is difficult to compare COVID chest X-Ray between patients due to HIPAA compliance. In this paper, we aim to build a model to assist in the diagnosis of COVID-19 while being HIPAA compliant through federated learning, a distributed machine learning technique used to train an algorithm across multiple decentralized devices with local data samples without sharing them [8]. Our model extends on existing work in the chest X-Ray diagnostic model space; we analyze the best performing models in the CheXpert [15] competition and build our own models that work effectively for our hospital data. Given that this model is being iterated upon in a federated setting, we consider the possibility of our model being updated using biased data and analyze its effect on the model’s final performance. Additionally, in order to provide the respective hospitals with more insight into how the learned federated model makes its decision, and to ensure that the model is not learning some arbitrary unimportant features, we utilize Grad-CAM [27]to visually emphasize which features on a patient leads to a positive COVID diagnosis. ACM Reference Format: Rittika Adhikari and Christopher Settles. 2020. Secure Federated Learning Approaches to Diagnosing COVID-19. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/ 1122445.1122456 1 INTRODUCTION Since the novel COVID-19 virus first came to light in Wuhan Province, China, doctors and researchers alike have been searching for a solution to easily diagnose patients with COVID. Currently, COVID is typically detected using the reverse-transcription polymerase chain reaction (RT-PCR), as per the guidelines set by WHO [30]. However, this form of testing is both time consuming and risky for patients who are actually suffering from COVID-19, so this is typically prefaced with medical imaging, such as X-Rays and CT scans, to ensure that there are signs of COVID before continuing with the RT-PCR test. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2020 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/1122445.1122456 Our paper proposes building a model through federated learning to automatically diagnose COVID from patient chest X-Rays efficiently and accurately. This model would aid as a useful supplement to doctors who are trying to quickly determine whether a patient needs to continue with the RT-PCR test from their chest X-Ray results. Initially, one might question why the model needs to be trained in a federated setting – wouldn’t it be enough to train separate models per hospital? However, our concern is that the data at a single hospital may be severely biased and would not be an accurate representation of all patient chest X-Rays across hospitals [33]. Thus, we utilize federated learning techniques to ensure that the model will be able to generalize well to samples from the other hospitals. Additionally, since it is inherently possible for an attacker to learn personally identifiable information from a model, as can be seen in [7, 11, 29], we propose a methodology of secure aggregation which is robust to such privacy attacks. The model architecture we utilize references existing work in the chest X-Ray diagnostic space; specifically we refer to ensembled model architectures [24, 35] 1 that were the most performant in the CheXpert [15] competition. As a preprocessing step, we cleanse our data of any additional artifacts on the images, which may get into the way of the classification. For the purposes of training the global model, we utilize a publicly available dataset known as COVIDGR [32] 2 . This dataset was pre-processed using a segmentation-based cropping methodology. While building our model, we also consider and analyze the possibility of the hospital data being heavily biased, leading to biased global model updates. We also utilize Grad-CAM[27] to create heatmaps using the intermittent global models to demonstrate and emphasize the features that were heavily weighted during classification. We hope that this layer of interpretability will allow doctors and other researchers to gain further insights into what might be relevant when looking for COVID-19 symptoms & potential treatment options. To summarize, our contributions in this paper are as follows: (1) Extend existing model architectures used in the chest X-Ray diagnosing problem space to diagnose the novel COVID-19. (2) Create an end-to-end secure federated learning system which utilizes the aforementioned model architecture to diagnose COVID-19. (3) Utilize a novel local post-process interpretability method for distributed machine learning, which will allow users to better visualize important features. 2 RELATED WORK This paper builds off of existing work in the medical image diagnostic space and in the secure federated learning space. In this section, we discuss the most relevant papers in these respective ares. 1 https://github.com/jfhealthcare/Chexpert 2 https://github.com/ari-dasci/OD-covidgr" 2401.12445v1,"Session-level Normalization and Click-through Data Enhancement for Session-based Evaluation Haonan Chen Zhicheng Dou Jiaxin Mao Gaoling School of Artificial Intelligence, Renmin University of China Beijing, China hnchen@ruc.edu.cn Gaoling School of Artificial Intelligence, Renmin University of China Beijing, China dou@ruc.edu.cn Gaoling School of Artificial Intelligence, Renmin University of China Beijing, China maojiaxin@ruc.edu.cn ABSTRACT Since a user usually has to issue a sequence of queries and examine multiple documents to resolve a complex information need in a search session, researchers have paid much attention to evaluating search systems at the session level rather than the single-query level. Most existing session-level metrics evaluate each query separately and then aggregate the query-level scores using a session-level weighting function. The assumptions behind these metrics are that all queries in the session should be involved, and their orders are fixed. However, if a search system could make the user satisfied with her first few queries, she may not need any subsequent queries. Besides, in most real-world search scenarios, due to a lack of explicit feedback from real users, we can only leverage some implicit feedback, such as users’ clicks, as relevance labels for offline evaluation. Such implicit feedback might be different from the real relevance in a search session as some documents may be omitted in the previous query but identified in the later reformulations. To address the above issues, we make two assumptions about session-based evaluation, which explicitly describe an ideal session-search system and how to enhance click-through data in computing session-level evaluation metrics. Based on our assumptions, we design a sessionlevel metric called Normalized U-Measure (NUM). NUM evaluates a session as a whole and utilizes an ideal session to normalize the result of the actual session. Besides, it infers session-level relevance labels based on implicit feedback. Experiments on two public datasets demonstrate the effectiveness of NUM by comparing it with existing session-based metrics in terms of correlation with user satisfaction and intuitiveness. We also conduct ablation studies to explore whether these assumptions hold. 1 INTRODUCTION With the development of search engines, researchers increasingly focus on building better evaluation methods. In the early years, the Cranfield paradigm [4] was the dominant approach in evaluating the search results of a single query. However, when a user is trying to complete a complex search task, she may issue multiple queries Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. WSDM ’24, February 27-March 3, 2024, Mexico © 2023 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/xx.xxxx/xxxxxxx.xxxxxxx and browse a series of documents to obtain sufficient information in a search session [2, 34, 35]. Many works have emerged to design session-based evaluation metrics. Some of them have already been used in some evaluation tasks, e.g., Session-based DCG [9] in the TREC Session Track [13] and Recency-aware Session-based Metric [33] in the recent NTCIR Session Search (SS) Task [3]. However, there are still some remaining challenges for session-based evaluation. In this work, we identify two major challenges of sessionbased evaluation as some existing session-based metrics are based on oversimplified or problematic assumptions. The first challenge is that most existing session-level metrics (e.g., the metrics used in these tasks) evaluate each query in a session based on an existing query-level metric, and then aggregate those query-level scores with some session-level discount factors or weighting schema to evaluate systems at the session level. For example, sDCG [9] is based on the cascade hypothesis, which gives lower-ranked search results and later-issued queries smaller weights, and RSMs [33] gives larger weights to the recently issued queries. While previous studies show that these aggregation metrics correlate well with users’ session-level satisfaction feedback [33], these metrics all implicitly assume that a user’s query sequence in a search session will not be altered by the systems. However, it would be expected that if a user is satisfied with the information retrieved by the present and past queries, she may not need any subsequent queries. (Following [11, 29], we assume that in the same session, the queries that may represent different sub-topics serve the same primary information need.) To put it another way, we presume that an ideal search system would return all relevant documents in a session before all irrelevant documents, so the user can spend the least effort in completing the search task. For example, a user issues a query “Java” and clicks “What is Java Language”. After a minute, she issues another query “Java Project”, and clicks “Java Projects for Beginners”. We assume the user would prefer a system if it could predict that she is seeking the second clicked document (e.g., using a personalized search model) and place it at the beginning of this session. However, none of the existing session-level evaluation metrics can fully take this reduction in effort into consideration and give a maximum score to such an ideal search system. Note that it is true that a user may learn something in the session which triggers her to seek new pieces of information. However, we believe that an ideal system can predict the change of her interest, lead her to discover all information needs as soon as possible, and rank all the documents that serve her needs high in the session. Another challenge that may hinder the computation of sessionlevel evaluation metrics is that in real-world search scenarios," 2401.12459v1,"Towards Socially and Morally Aware RL agent: Reward Design With LLM Zhaoyue Wang zhaoyue.wang@mail.utoronto.ca Abstract When we design and deploy an Reinforcement Learning (RL) agent, reward functions motivates agents to achieve an objective. An incorrect or incomplete specification of the objective can result in behavior that does not align with human values - failing to adhere with social and moral norms that are ambiguous and context dependent, and cause undesired outcomes such as negative side effects and exploration that is unsafe. Previous work have manually defined reward functions to avoid negative side effects, use human oversight for safe exploration, or use foundation models as planning tools. This work studies the ability of leveraging Large Language Models (LLM)’ understanding of morality and social norms on safe exploration augmented RL methods. This work evaluates language model’s result against human feedbacks and demonstrates language model’s capability as direct reward signals. 1 Introduction Reinforcement Learning (RL) is is widely applied in decision-making problems. An agent, the AI system, is trained to find an optimal policy towards satisfying certain objective by maximizing a reward signal by when interacting with the environment through trial and error [10]. The learnt policy may have issues aligning with human values[6] and may cause side effects[1], and the exploration in finding this policy may be inefficient or unsafe[2]. As it is difficult to manually specify reward signals for all the things the agent should do and not do while pursuing its goal. Prior approaches to tackle these problems includes using human demonstration[4], human intervention [9] and using language models [5, 7]. This work establishes a simple 2D Grid World 3.1 with various items unrelated to the goal but may have undesired or even catastrophic consequences according to moral and social values. This work outlines and implements an approach that allows the RL agent to prompt a language model for auxiliary rewards, explore with precaution and reflect on it’s past trajectories. This work provide an empirical analysis to ascertain if and when the proposed approach allows the RL agent to align to human values, avoids negative side effects and explore safely. Experiment 1 3.3.1 reflects the agent’s ability to avoid side effects and explore with precaution. Experiment 2 3.3.2 aim at providing a demonstration of language model’s understanding of moral values where experiment 3 3.3.3 highlights language model’s understanding of social norms. 1 1 . Code is available at https://github.com/Inputrrr0/LLM-reward-RL 37th Conference on Neural Information Processing Systems (NeurIPS 2023)." 2401.12472v1,"Contrastive Learning in Distilled Models Valerie Lim Kai Wen Ng Kenneth Lim vlim31@gatech.edu kng71@gatech.edu klim83@gatech.edu Abstract Yet, a problem often associated with BERT and the contrastive loss models derived off it is their large size. There is an increasing need to build machine learning systems that can operate on the edge, instead of calling a cloud API, in order to build privacy respecting systems and prevent having users send sensitive information to servers [1]. Thus, there is a growing impetus for lightweight and responsive models. However, most of the pre-trained models [6] [19] with contrastive loss are still relatively large and computationally heavy, making it hard to deploy on the edge. Deployment on the edge would also allow for reduced time and network latency, which could be critical in certain use cases such as when there is a high QOS (Quality of Service) requirement [1]. A common solution for creating lighter models is via knowledge distillation, where a trained, complex teacher model trains a lighter, shallower student model to generalise [15]. Hence, our goal was to address this joint problem of lack of lightweight models that can perform well on semantic textual similarity tasks, by creating an unsupervised pretrained model that combines knowledge distillation and contrastive learning to address their respective problems. To do this, we first adopt the architecture and pre-trained checkpoints of a knowledge distillation based model, DistilBERT, start off with a lightweight model. We then adapt from authors who successfully implemented contrastive learning on sentence embeddings via unsupervised learning [6], by feeding samples, termed as x, into the pre-trained encoder twice: by applying standard dropout twice to obtain two different sets of embeddings termed as x+. Then we take other sentences in the same mini-batch as x− and the model predicts the positive sample among the negatives. We subsequently experiment with different pooling layers, automatic mixed precision, quantization and hyperparameter tuning to enhance performance. Natural Language Processing (NLP) models like BERT can provide state of the art word embeddings for downstream NLP tasks. However, these models: (1) yet to perform well on Semantic Textual Similarity (STS), and (2) may be too large to be deployed as lightweight edge applications. We seek to apply a suitable contrastive learning method based on the SimCSE paper, to a model architecture adapted from a knowledge distillation based model, DistilBERT, to address these two issues. Our final lightweight model DistilFACE achieves an average of 72.1 in Spearman’s correlation on STS tasks, a 34.2% improvement over BERTbase with default parameters. 1 Introduction 1.1 Problem Statement Pre-trained word embeddings are a vital part of natural language processing (NLP) systems, providing state of the art results for many NLP tasks as the pre-trained embedding-based models frequently outperform alternatives such as the embedding-layer-based Word2Vec [5]. Accurate word embeddings have huge downstream benefits for tasks related to information retrieval and semantic similarity comparison [19], especially in a typical industrial setting where labelled data is scarce. As a result, in recent years, word embeddings from pre-trained models such as BERT (Bidirectional Encoder Representations from Transformers) have been gaining traction in many NLP works. However, studies [6] [19] have shown that BERT does not produce good enough embeddings for semantic textual similarity tasks. As a result, recent breakthroughs [6] [13] have found that a contrastive objective is able to address the anisotropy issue of BERT. At a high level, contrastive learning is a technique where given two aug- 1.2 Who Cares? The Implications mented samples of x, x+ (positive sample), x− (negative sample), we’d like for x+ to be close to x and for x− to Our group believes there is significant value in experbe far away from x. This improves the quality of BERT imenting with whether a traditional knowledge distillasentence representation. tion method like DistilBERT, can be directly adapted to 1" 2401.12473v1,"BOOSTING UNKNOWN-NUMBER SPEAKER SEPARATION WITH TRANSFORMER DECODER-BASED ATTRACTOR Younglo Lee 1 , Shukjae Choi 1 , Byeong-Yeol Kim 1 , Zhong-Qiu Wang 2 , Shinji Watanabe 2 1 2 42dot Inc., Seoul, Korea Language Technologies Institute, Carnegie Mellon University, Pittsburgh, USA younglo.lee@42dot.ai ABSTRACT We propose a novel speech separation model designed to separate mixtures with an unknown number of speakers. The proposed model stacks 1) a dual-path processing block that can model spectrotemporal patterns, 2) a transformer decoder-based attractor (TDA) calculation module that can deal with an unknown number of speakers, and 3) triple-path processing blocks that can model inter-speaker relations. Given a fixed, small set of learned speaker queries and the mixture embedding produced by the dual-path blocks, TDA infers the relations of these queries and generates an attractor vector for each speaker. The estimated attractors are then combined with the mixture embedding by feature-wise linear modulation conditioning, creating a speaker dimension. The mixture embedding, conditioned with speaker information produced by TDA, is fed to the final triple-path blocks, which augment the dual-path blocks with an additional pathway dedicated to inter-speaker processing. The proposed approach outperforms the previous best reported in the literature, achieving 24.0 and 23.7 dB ∆SI-SDR on WSJ0-2 and 3mix respectively, with a single model trained to separate 2- and 3-speaker mixtures. The proposed model also exhibits strong performance and generalizability at counting sources and separating mixtures with up to 5 speakers. Index Terms— Speech separation, transformer, deep learning. 1. INTRODUCTION Speech separation (SS) is the task of separating concurrent speech sources in a mixture signal recorded when multiple speakers talk simultaneously into individual speech signals. Although humans exhibit a remarkable capability of perceiving any target sound of interest from a mixture of multiple sound sources, researchers have found it challenging to enable machines to have the same hearing capability, especially in monaural conditions [1]. Thanks to the strong modeling capabilities of deep neural networks (DNN), significant advances have been made in SS. Since deep clustering [2– 4], deep attractor network [5, 6], and permutation invariant training (PIT) [7, 8] successfully solved the label-permutation problem in talker-independent speaker separation, many subsequent studies [9–18] have developed more efficient DNN architectures to improve the separation performance. Through years of effort, the current state-of-the-art performance on the WSJ0-2mix dataset [2, 3], which is a popular benchmark designed for two-speaker separation, has reached an impressive scale-invariant signal-to-distortion ratio (SI- SDR) improvement of 23.5 dB over the mixture [16, 17]. In many early studies, it is commonly assumed that the number of speakers within each mixture is known and fixed, which drastically limits the application range of their developed systems. In order to overcome this limitation, [19–23] have proposed recursive Encoder Separator ⋮ Decoder ⋮ Fig. 1: High-level system illustration of SepTDA. multi-pass source separation schemes. Meanwhile, [24–26] have proposed alternative approaches by training individual components for all conceivable numbers of speakers and at run time selecting one of the trained components, corresponding to the right number of speakers, to produce target estimates. However, their works require extra speaker identity information [20, 23], recursive separation steps [19, 21, 22], or multiple models [24–26]. Recently, encoder-decoder attractor (EDA) calculation-based methods have emerged, which are originally designed to handle an unknown number of speakers in speaker diarization [27], and demonstrated strong performance in SS [28–30]. Inspired by the above successful achievements, we propose SepTDA, a speech separation model that combines the strengths of the triple-path approach [28, 30] and an LSTM-augmented selfattention block (denoted as LSTM-attention), which can more efficiently capture local and global contextual information. In addition, a TDA calculation module is proposed with modifications to the original EDA [27] to effectively handle the undetermined count of speakers. We show that SepTDA outperforms the previous best reported in the literature by achieving state-of-the-art results on all the WSJ0-mix benchmark datasets [2, 3, 24], which consist of mixtures with two to five speakers. We share the separation samples 1 . 2. PROPOSED METHOD The proposed SepTDA, illustrated in Fig. 1, is based on a timedomain encoder-decoder separation P framework T [10]. Given a timedomain T -sample mixture x = C with C speakers, c=1 y c ∈ R a separation model is trained to estimate each speaker source y c . SepTDA consists of an encoder, a separator, and a decoder. This section describes each of them. 2.1. Encoder The encoder is a one-dimensional (1D) convolutional layer with a kernel size of L samples and a stride size of L/2 samples. It maps the mixture signal x to a D e -dimensional latent representation E ∈ ′ R T ×D e , where T ′ = ⌈2 × T /L⌉ with proper zero-padding: E = GELU(Conv1D(x)), (1) where GELU(·) denotes the Gaussian error linear unit activation function [31]. 1 https://42speech.github.io/septda" 2401.12517v1,"Published as a conference paper at ICLR 2024 DDMI: D OMAIN -A GNOSTIC L ATENT D IFFUSION M ODELS FOR S YNTHESIZING H IGH -Q UALITY I M - PLICIT N EURAL R EPRESENTATIONS Dogyun Park, Sihyeon Kim, Sojin Lee, Hyunwoo J. Kim ∗ Department of Computer Science Korea University Seoul, South Korea {gg933,sh bs15,sojin lee,hyunwoojkim}@korea.ac.kr A BSTRACT Recent studies have introduced a new class of generative models for synthesizing implicit neural representations (INRs) that capture arbitrary continuous signals in various domains. These models opened the door for domain-agnostic generative models, but they often fail to achieve high-quality generation. We observed that the existing methods generate the weights of neural networks to parameterize INRs and evaluate the network with fixed positional embeddings (PEs). Arguably, this architecture limits the expressive power of generative models and results in low-quality INR generation. To address this limitation, we propose Domain-agnostic Latent Diffusion Model for INRs (DDMI) that generates adaptive positional embeddings instead of neural networks’ weights. Specifically, we develop a Discrete-to-continuous space Variational AutoEncoder (D2C-VAE), which seamlessly connects discrete data and the continuous signal functions in the shared latent space. Additionally, we introduce a novel conditioning mechanism for evaluating INRs with the hierarchically decomposed PEs to further enhance expressive power. Extensive experiments across four modalities, e.g., 2D images, 3D shapes, Neural Radiance Fields, and videos, with seven benchmark datasets, demonstrate the versatility of DDMI and its superior performance compared to the existing INR generative models. Code will be released soon. 1 I NTRODUCTION Implicit neural representation (INR) is a popular approach for representing arbitrary signals as a continuous function parameterized by a neural network. INRs provide great flexibility and expressivity even with a simple neural network like a small multi-layer perceptron (MLP). INRs are virtually domain-agnostic representations that can be applied to a wide range of signals domains, such as image (Müller et al., 2022; Tancik et al., 2020; Sitzmann et al., 2020), shape/scene model (Mescheder et al., 2019; Peng et al., 2020; Park et al., 2019), video reconstruction (Nam et al., 2022b; Chen et al., 2022), and novel view synthesis (Mildenhall et al., 2021; Martin-Brualla et al., 2021; Park et al., 2021; Barron et al., 2021). Also, INR enables the continuous representation of signals at arbitrary scales and complex geometries. For instance, given an INR of an image, applying zoom-in/out or sampling an arbitrary-resolution image is readily achievable, leading to superior performance in super-resolution (Chen et al., 2021; Xu et al., 2021). Lastly, INR represents signals with high quality leveraging the recent advancements in parametric positional embedding (PE) (Müller et al., 2022; Cao & Johnson, 2023). Recent research has expanded its attention to INR generative models using Normalizing Flows (Dupont et al., 2022a), GANs (Chen & Zhang, 2019; Skorokhodov et al., 2021; Anokhin et al., 2021), and Diffusion Models (Dupont et al., 2022a; Zhuang et al., 2023). Especially, Dupont et al. (2022a); Zhuang et al. (2023); Du et al. (2021); Dupont et al. (2022b) have focused on developing a generic framework that can be applied across different signal domains. This is primarily ∗ Corresponding author. 1" 2401.12523v1,"ON POLYNOMIAL AUTOMORPHISMS OF NAGATA TYPE HUARCAYA, JORGE A. C. 1 AND PALACIOS, JOE 2,3 Abstract. We define a family of polynomial ring homomorphisms generalising the Nagata automorphism, and relate the condition of non-vanishing of their Jacobian determinant with a certain linear partial differential equation. We also give a condition on that family to get wild automorphisms. Contents 1. Introduction 2. Nagata polynomial map 3. Statement of the main results 4. Proof of the main results 5. Conclusions References 1 2 6 11 12 12 1. Introduction In what follows F will be a field of characteristic 0 unless otherwise stated. The polynomials: f (x, y, z) = x − 2y(zx + y 2 ) − z(zx + y 2 ) 2 , g(x, y, z) = y + z(zx + y 2 ), h(x, y, z) = z. define an automorphism on F [x, y, z] called Nagata automorphism [1]. The determinant of the Jacobian matrix of this automorphism es 1. In the following paragraph we recall the notion of tame automorphisms of polynomials. Let 1 ≤ i ≤ n, the ith elementary automorphism Φ (i) : F n → F n is the automorphism defined as   Φ (i) (x 1 , . . . , x n ) = x 1 , . . . , x i−1 , x i + f (x 1 , . . . , x i−1 , x i+1 , . . . , x n ), x i+1 , . . . , x n and its inverse is the automorphism   −1 Φ (i) (x 1 , . . . , x n ) = x 1 , . . . , x i−1 , x i −f (x 1 , . . . , x i−1 , x i+1 , . . . , x n ), x i+1 , . . . , x n . 1 Universidad Nacional Mayor de San Marcos, UNMSM 2 Universidad Nacional de Ingenierı́a, UNI 3 Instituto de Matemática y Ciencias Afines, IMCA E-mail addresses: jcoripacoh@unmsm.edu.pe, jpalacios@imca.edu.pe. 2010 Mathematics Subject Classification. 14R10, 13B25, 13F20, 35F05. Key words and phrases. polynomial automorphisms, Nagata automorphism, wild automorphisms, linear PDE. 1" 2401.12537v1,"Motion-enhanced Holography Zhenxing Dong 1 , Yuye Ling 1* , Yan Li 1 , Yikai Su 2 1 Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai 200240, China 2 State Key Lab of Advanced Optical Communication Systems and Networks, Shanghai Jiao Tong University, Shanghai 200240, China * Corresponding author: yuye.ling@sjtu.edu.cn January 24, 2024 Abstract Holographic displays, which enable pixel-level depth control and aberration correction, are considered the key technology for the next-generation virtual reality (VR) and augmented reality (AR) applications. However, traditional holographic systems suffer from limited spatial bandwidth product (SBP), which makes them impossible to reproduce realistic 3D displays. Time-multiplexed holography creates different speckle patterns over time and then averages them to achieve a speckle-free 3D display. However, this approach requires spatial light modulators (SLMs) with ultra-fast refresh rates, and current algorithms cannot update holograms at such speeds. To overcome the aforementioned challenge, we proposed a novel architecture, motion-enhanced holography, that achieves realistic 3D holographic displays without artifacts by continuously shifting a special hologram. We introduced an iterative algorithm to synthesize motion-enhanced holograms and demonstrated that our method achieved a 10 dB improvement in the peak signal-to-noise ratio (PSNR) of 3D focal stacks in numerical simulations compared to traditional holographic systems. Furthermore, we validated this idea in optical experiments utilizing a high-speed and high-precision programmable three-axis displacement stage to display fullcolor and high-quality 3D focal stacks. Our code and data are available at https://github.com/Zhenxing-Dong/Motion-enhanced-Holography. 1 Introduction Holographic displays are considered the ideal candidate for the next-generation virtual reality (VR) and augmented reality (AR) displays [1], thanks to their 1" 2401.12543v1,"Under consideration for publication in J. Fluid Mech. 1 Banner appropriate to article type will appear here in typeset article Deep reinforcement transfer learning for active flow control of a 3D square cylinder under state dimension mismatch Lei Yan 1 , Gang Hu 1,2 †, Wenli Chen 3 , and Bernd R. Noack 4 1 Artificial Intelligence for Wind Engineering (AIWE) Lab, School of Civil and Environmental Engineering, Harbin Institute of Technology, Shenzhen 518055, China 2 Guangdong Provincial Key Laboratory of Intelligent and Resilient Structures for Civil Engineering, Harbin Institute of Technology, Shenzhen, 518055, China 3 Key Laboratory of Smart Prevention and Mitigation of Civil Engineering Disasters, the Ministry of Industry and Information Technology, Harbin Institute of Technology, Harbin, 150090, China 4 School of Mechanical Engineering and Automation, Harbin Institute of Technology, Shenzhen 518055, China (Received xx; revised xx; accepted xx) This paper focuses on developing a deep reinforcement learning (DRL) control strategy to mitigate aerodynamic forces acting on a three dimensional (3D) square cylinder under high Reynolds number flow conditions. Four jets situated at the corners of the square cylinder are used as actuators and pressure probes on the cylinder surface are employed as feedback observers. The Soft Actor-Critic (SAC) algorithm is deployed to identify an effective control scheme. Additionally, we pre-train the DRL agent using a two dimensional (2D) square cylinder flow field at a low Reynolds number (𝑅𝑒 = 1000), followed by transferring it to the 3D square cylinder at 𝑅𝑒 = 22000. To address the issue of state dimension mismatch in transfer learning from 2D to 3D case, a state dimension mismatch transfer learning method is developed to enhance the SAC algorithm, named SDTL-SAC. The results demonstrate transfer learning across different state spaces achieves the same control policy as the SAC algorithm, resulting in a significant improvement in training speed with a training cost reduction of 51.1%. Furthermore, the SAC control strategy leads to a notable 52.3% reduction in drag coefficient, accompanied by substantial suppression of lift fluctuations. These outcomes underscore the potential of DRL in active flow control, laying the groundwork for efficient, robust, and practical implementation of this control technique in practical engineering. Key words: Authors should not enter keywords on the manuscript, as these must be chosen by the author during the online submission process and will then be added during the typesetting process (see Keyword PDF for the full list). Other classifications will be added at the same time. † Email address for correspondence: hugang@hit.edu.cn Abstract must not spill onto p.2" 2401.12546v1,"On Building Myopic MPC Policies using Supervised Learning Christopher A. Orrico, Bokan Yang, Dinesh Krishnamoorthy ∗ Department of Mechanical Engineering, Eindhoven University of Technology, 5600 MB, Eindhoven, The Netherlands. (email: d.krishnamoorthy@tue.nl) Abstract: The application of supervised learning techniques in combination with model predictive control (MPC) has recently generated significant interest, particularly in the area of approximate explicit MPC, where function approximators like deep neural networks are used to learn the MPC policy via optimal state-action pairs generated offline. While the aim of approximate explicit MPC is to closely replicate the MPC policy, substituting online optimization with a trained neural network, the performance guarantees that come with solving the online optimization problem are typically lost. This paper considers an alternative strategy, where supervised learning is used to learn the optimal value function offline instead of learning the optimal policy. This can then be used as the cost-to-go function in a myopic MPC with a very short prediction horizon, such that the online computation burden reduces significantly without affecting the controller performance. This approach differs from existing work on value function approximations in the sense that it learns the cost-to-go function by using offlinecollected state-value pairs, rather than closed-loop performance data. The cost of generating the state-value pairs used for training is addressed using a sensitivity-based data augmentation scheme. Keywords: model predictive control, value function approximation, parametric sensitivity 1. INTRODUCTION AND MOTIVATION Model predictive control (MPC) is a popular approach where an optimization problem is solved iteratively online at each sampling instant, taking into account the current state of the system. The resulting optimal trajectory provides the first control input, which is implemented in the system, leading to an implicit control policy. However, the need for online computation can be a limiting factor for embedded systems, since computational resources are often limited and decisions have to be made with fast sampling times. One popular approach to address this issue is to pre-compute optimal actions offline that can be stored and accessed online without the need for online optimization. This approach was first explored under the context of explicit MPC by Bemporad et al. (2002), which was limited to linear time-invariant systems with very few states (typically less than 10). More recently, supervised learning and reinforcement learning techniques have been used to directly learn a parameterized control policy π(x, ϑ). The parameters ϑ can be learned by reinforcement learning to optimize some measure of performance w.r.t. ϑ. That is, ϑ is updated to optimize a suitable closed-loop cost under the policy π(·, ϑ), e.g., using policy gradient or cross-entropy methods. See for example (Bertsekas, 2019, Section 5.7.1) and the references therein. Alternatively, the parameterized policy can also be trained offline using supervised learning, under the context of expert-assisted supervised learning (Bertsekas, 2019, Sec- tion 5.7.2), also referred to as imitation learning or behavioral cloning (Esmaili et al., 1995). The key idea behind direct MPC policy approximation using supervised learning is as follows: The MPC problem is solved offline for different state realizations {x i } to obtain the corresponding optimal action π mpc (x i ) (i.e., the software “expert”). The MPC actions are then learned using supervised learning with the labeled training data set {x i , π mpc (x i )} to obtain an approximate policy π(·, ϑ). By learning the optimal control actions, one can then replace the online optimization with the trained function approximator π(·, ϑ), which would tell us what action to take given the current state of the system. The idea of using neural networks to approximate the MPC policy was first proposed in the mid 90s by Parisini and Zoppoli (1995). With the promises of deep learning techniques, and the need to build computationally cheap MPC policies for embedded applications, the idea of approximating the MPC policy using deep learning gained renewed interest in the last few years (Chen et al., 2018; Hertneck et al., 2018; Zhang et al., 2019; Drgoňa et al., 2018; Karg and Lucia, 2020; Paulson and Mesbah, 2020; Kumar et al., 2021; Åkesson and Toivonen, 2006; Cao and Gopaluni, 2020), with several applications ranging from energy (Drgoňa et al., 2018), automotive (Zhang et al., 2020; Quan and Chung, 2019), chemical processing (Kumar et al., 2021), robotics (Nubert et al., 2020), aerospace (Sánchez-Sánchez et al., 2016), and healthcare (Bonzanini et al., 2020)." 2401.12562v1,"Learning the cost-to-go for mixed-integer nonlinear model predictive control Christopher A. Orrico ∗,∗∗ W.P.M.H. Heemels ∗ Dinesh Krishnamoorthy ∗ ∗ Eindhoven University of Technology, 5600 MB Eindhoven, The Netherlands (e-mail: c.a.orrico@tue.nl, w.p.m.h.heemels@tue.nl, d.krishnamoorthy@tue.nl). ∗∗ DIFFER - Dutch Institute for Fundamental Energy Research, 5612 AJ Eindhoven, The Netherlands (e-mail: c.orrico@differ.nl) Abstract: Application of nonlinear model predictive control (NMPC) to problems with hybrid dynamical systems, disjoint constraints, or discrete controls often results in mixed-integer formulations with both continuous and discrete decision variables. However, solving mixedinteger nonlinear programming problems (MINLP) in real-time is challenging, which can be a limiting factor in many applications. To address the computational complexity of solving mixed integer nonlinear model predictive control problem in real-time, this paper proposes an approximate mixed integer NMPC formulation based on value function approximation. Leveraging Bellman’s principle of optimality, the key idea here is to divide the prediction horizon into two parts, where the optimal value function of the latter part of the prediction horizon is approximated offline using expert demonstrations. Doing so allows us to solve the MINMPC problem with a considerably shorter prediction horizon online, thereby reducing the online computation cost. The paper uses an inverted pendulum example with discrete controls to illustrate this approach. Keywords: Mixed integer model predictive control of hybrid systems, inverse optimization Model predictive control has emerged as a powerful tool to control dynamic systems in a wide range of application areas, due to its ability to explicitly handle constraints and optimize desired performance criterion. This is done by formulating the control problem as a discrete time finite horizon optimal control problem, which is repeatedly solved online at each sampling instant, given the current state of the system. the first control input from the optimal trajectory is implemented in the system and the process is repeated. As the domain of MPC application expands to new class of problems, this requires more complex optimization problem formulations. Problem classes that commonly arises in many application domains include, discrete actuators (where the controls only take values from a finite set), switching systems (where the system dynamics are discontinuous and non-smooth), problems with disjoint constraint sets, avoidance constraints in path planning, or problems with specified logics etc (Richards and How, 2005). MPC framework can be applied to such problem classes by formulating the optimal control problem with both continuous and integer decision variables. The resulting nonlinear MPC framework with discrete decision variables require the online solution of mixed integer nonlinear programming (MINLP) problems at each sampling instant. However, MINLP problems in general are N P- hard, which makes it challenging for real-time control. Model predictive control, as the name suggests, uses a model to predict the effect of the control actions over a finite rolling horizon, and chooses an optimal control sequence that optimizes a given performance criterion. Ideally, we want a sufficiently long prediction horizon, since this would help the controller to consider the effect of the control actions far into the future, resulting in a better control policy. However, the size of the optimization problem, and in turn the computational cost, increases with the length of the prediction horizon. This is only further amplified in the presence of discrete decision variables, where the number of nodes in the branch and bound algorithms increases. Using a short prediction horizon naively on the other hand leads to myopic policies that can result in performance degradation. This paper argues that in want for very short prediction horizons all is not lost, and that value function approximations enable us to leverage Bellaman’s principle of optimality, such that the online controller can be reduced to even as small as a one-step-look-ahead controller without jeopardizing the control performance. The prediction horizon in the original MINMPC problem can be divided into two parts, where the optimal value function of the tail part of the prediction horizon is replaced by a cost-togo function. Since the optimal cost-to-go function is not known exactly, this can be approximated offline, and the online controller is solved with the approximate value function as its cost-to-go. Replacing the optimal value function with approximate cost-to-go functions are also commonly referred to as approximate dynamic programming (ADP) Bertsekas (2011)." 2401.12563v1,"Pitfalls of Exchange-Correlation Functionals in Descriptions of Magnetism: Cautionary Tale of the FeRh Alloy Shishir Kumar Pandey a , Saikat Debnath b , Zhanghao Zhouyin a,c , Qiangqiang Gu a,d a AI for Science Institute, Beijing, China b M. V. College, Buxar, Bihar, India c College of Intelligence and Computing, Tianjin University, Tianjin, 300350, Bihar, China d School of Mathematical Science, Peking University, Beijing, 100871, China Abstract The magnetic ground state of FeRh is highly sensitive towards the lattice constant. This, in addition to partially filled d-shells of Fe and Rh, posed a significant challenge for Density Functional Theory (DFT) calculations in the past. Here, we have investigated the performance of various exchange-correlation (XC) functionals within the DFT formalism for this challenging binary alloy. We have employed Local Spin Density Approximation (LSDA), various Generalized Gradient Approximations (GGAs), and newly developed Strongly Constrained and Appropriately Normed (SCAN) meta-GGA functional. Our results show the limitations of any single functional in capturing the intricate interplay of structural, electronic, and magnetic properties in FeRh. While SCAN can accurately describe some magnetic features and phonon dispersion, it significantly overestimates the Fe-Fe magnetic interactions, leading to an unreasonable magnetic ordering temperature. Conversely, the Perdew-Burke-Ernzerhof (PBE) GGA exhibits the opposite behavior. These findings highlight the challenges in simulating materials with partially filled d-shells using DFT, underscoring the crucial need for developing a versatile XC functional that can effectively account for the multifaceted nature of such systems. Keywords: Magnetostructural transition, DFT, Phonon, Monte-Carlo simulations, Binary alloy 1. Introduction Transition metal compounds have become a focal point of intense research due to their remarkable and exotic properties. Some examples include various forms of magnetism Middey et al. (2012); Mahana et al. (2020); Gu et al. (2023); Pandey et al. (2023, 2022); Pandey and Feng (2022); Pandey et al. (2021); Zhou et al. (2021) and superconductivity Liu et al. (2022); Lee et al. (2006) and different kinds of phase transitions driven by external perturbations such as doping Pandey et al. (2017); Lee et al. (2006) and temperature. Magnetic transitions in these compounds are typically second-order, characterized by a continuous evolution from one magnetic state to another without any discontinuous changes in structural parameters. While first-order transitions can occur, their presence remains relatively rare. In these magnetostructural first-order phase transitions, a simultaneous change in the magnetic and structural phase of the material with external stimuli like temperature, magnetic fields, or strain originates from a strong coupling between lattice and magnetic degrees of freedom. The purported technological potential of these first-order magnetic transitions in magnetic recording Thiele et al. (2003) magnetocalorics Liu et al. (2016), spintronics Wang et al. (2020), magnetorestrictions O’Handley et al. (2000), heat-assisted magnetic Email addresses: shishir.kr.pandey@gmail.com (Shishir Kumar Pandey), guqq@pku.edu.cn (Qiangqiang Gu) Preprint submitted to Elsevier recording Challener et al. (2009), antiferromagnetic (AFM) spintronics Yan et al. (2020); Feng et al. (2019), and roomtemperature AFM memory resistor Marti et al. (2014) makes them even more fascinating. One particularly interesting example of such magnetostructural phase transition occurs for a transition metal binary alloy, FeRh Fallot and Hocart (1939); Kouvel and Hartelius (2004). BCC-based (CsCl-type) ordered phase of FeRh, upon lowering the temperature, first goes through a paramagnetic to ferromagnetic (FM) second-order phase transition at ∼ T C = 670 K. Further lowering of temperature then leads to an FM to AFM transition at ∼ T N = 370 K. A sudden increase in resistivity and ∼ 1% volume collapse with lowering of temperature in AFM phase reveals first-order nature of the AFM-FM transition Kouvel and Hartelius (2004). The reversible nature of this phase transition has also been investigated with the application of an external magnetic field both in bulk and thin films Kouvel (2004); Maat et al. (2005). What makes this material particularly interesting in the context of device applications is its AFM-FM transition being close to the room temperature. Efforts to investigate phase transitions in FeRh have yielded conflicting perspectives, with some researchers suggesting simultaneous structural and magnetic changes Radu et al. (2010); Derlet (2012) while others contend that the magnetic transition precedes unit cell expansion Gruner et al. (2003a); Ju et al. (2004); Mryasov (2005); Gu and Antropov (2005a); Quirin et al. (2012). To gain a deeper understanding of such scenar- January 24, 2024" 2401.12575v2,"This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics 1 Linear stability and spectral modal decomposition of three-dimensional turbulent wake flow of a generic high-speed train Xiao-Bai Li 1,2 , Simon Demange 2 , Guang Chen 1 , Jia-Bin Wang 1 , Xi-Feng Liang 1 , Oliver T. Schmidt 3 and Kilian Oberleithner 2 † 1 Key Laboratory of Traffic Safety on Track of Ministry of Education, School of Traffic & Transportation Engineering, Central South University, 410075 Changsha, PR China 2 Laboratory for Flow Instability and Dynamics, Technische Universität Berlin, 10623 Berlin, Germany 3 Department of Mechanical and Aerospace Engineering, University of California San Diego, La Jolla, CA, USA (Received xx; revised xx; accepted xx) This work investigates the spatio-temporal evolution of coherent structures in the wake of a generic high-speed train, based on a three-dimensional database from large eddy simulation. Spectral proper orthogonal decomposition is used to extract energy spectra and energy ranked empirical modes for both symmetric and antisymmetric components of the fluctuating flow field. The spectrum of the symmetric component shows overall higher energy and more pronounced low-rank behavior compared to the antisymmetric one, with the most dominant symmetric mode at ω = 3.437 characterized by vortex shedding in the near wake and constant streamwise wavenumber structures in the far wake. The mode bispectrum further reveals the dominant role of self-interaction of the symmetric component, leading to first harmonic and subharmonic triads of the fundamental frequency, with remarkable deformation of the mean field. Then, the stability of the three dimensional wake flow is analyzed based on two-dimensional local linear stability analysis. Temporal stability analysis is first performed for both the near wake and the far wake regions, showing a more unstable condition in the near wake region. The absolute frequency of the near-wake eigenmode is determined based on spatio-temporal analysis, then tracked along the streamwise direction to find out the global mode growth rate and frequency, which indicate a marginally stable global mode oscillating at a frequency very close to the most dominant SPOD mode. The global mode wavemaker is then located, and the structural sensitivity is calculated based on the direct and adjoint modes derived from a local spatial analysis, with the maximum value localized within the recirculation region close to the train tail. Finally, the global mode shape is computed by tracking the most spatially unstable eigenmode in the far wake, and the alignment with the SPOD mode is computed as a function of streamwise location. By combining data-driven and theoretical approaches, the mechanisms of coherent structures in complex wake flows are well identified and isolated. Key words: Keywords † Email address for correspondence: oberleithner@tu-berlin.de" 2401.12576v1,"LLMCheckup: Conversational Examination of Large Language Models via Interpretability Tools Qianli Wang 1,2 Tatiana Anikina ∗1,3 Nils Feldhus ∗1 Josef van Genabith 1,3 Leonhard Hennig 1 Sebastian Möller 1,2 1 German Research Center for Artificial Intelligence (DFKI) 2 Technische Universität Berlin, Germany 3 Saarland Informatics Campus, Saarbrücken, Germany {firstname.lastname}@dfki.de Abstract Interpretability tools that offer explanations in the form of a dialogue have demonstrated their efficacy in enhancing users’ understanding (Slack et al., 2023; Shen et al., 2023), as oneoff explanations may occasionally fall short in providing sufficient information to the user. Current solutions for dialogue-based explanations, however, require many dependencies and are not easily transferable to tasks they were not designed for. With LLMC HECKUP 1 , we present an easily accessible tool that allows users to chat with any state-of-the-art large language model (LLM) about its behavior. We enable LLMs to generate all explanations by themselves and take care of intent recognition without fine-tuning, by connecting them with a broad spectrum of Explainable AI (XAI) tools, e.g. feature attributions, embedding-based similarity, and prompting strategies for counterfactual and rationale generation. LLM (self-) explanations are presented as an interactive dialogue that supports follow-up questions and generates suggestions. LLMC HECKUP provides tutorials for operations available in the system, catering to individuals with varying levels of expertise in XAI and supports multiple input modalities. We introduce a new parsing strategy called multi-prompt parsing substantially enhancing the parsing accuracy of LLMs. Finally, we showcase the tasks of fact checking and commonsense question answering. 1 Introduction To unravel the black box nature of deep learning models for natural language processing, a diverse range of explainability methods have been developed (Ribeiro et al., 2016; Madsen et al., 2022; *Equal contribution Code: https://github.com/DFKI-NLP/LLMCheckup Demo: https://youtu.be/ZwN8ZQSXoOU 1 Figure 1: LLMC HECKUP dialogue with data augmentation and rationalization operations on a commonsense question answering task (ECQA). Boxes (not part of the actual UI) indicate the original instance from the dataset as well as its prediction (cyan) and the explanation requested by the user (orange). Wiegreffe et al., 2022). Nevertheless, practitioners often face difficulties in effectively utilizing explainability methods, as they may not be aware of which techniques are available or how to interpret results provided. There has been a consensus within the research community that moving beyond one-off explanations and embracing conversations to provide explanations is more effective for model understanding (Lakkaraju et al., 2022; Feldhus et al., 2023; Zhang et al., 2023) and helps" 2401.12594v1,"SCORPION Cyber Range: Fully Customizable Cyberexercises, Gamification and Learning Analytics to Train Cybersecurity Competencies Pantaleone Nespoli a,b,∗ , Mariano Albaladejo-González a , José Antonio Pastor Valera a , José A. Ruipérez-Valiente a , Joaquin Garcia-Alfaro b , Félix Gómez Mármol a a Department of Information and Communications Engineering, University of Murcia, 30100 Murcia, Spain b SAMOVAR, Télécom SudParis, Institut Polytechnique de Paris, 91120 Palaiseau, France Abstract It is undeniable that we are witnessing an unprecedented digital revolution. However, recent years have been characterized by the explosion of cyberattacks, making cybercrime one of the most profitable businesses on the planet. That is why training in cybersecurity is increasingly essential to protect the assets of cyberspace. One of the most vital tools to train cybersecurity competencies is the Cyber Range, a virtualized environment that simulates realistic networks. The paper at hand introduces SCORPION, a fully functional and virtualized Cyber Range, which manages the authoring and automated deployment of scenarios. In addition, SCORPION includes several elements to improve student motivation, such as a gamification system with medals, points, or rankings, among other elements. Such a gamification system includes an adaptive learning module that is able to adapt the cyberexercise based on the users’ performance. Moreover, SCORPION leverages learning analytics that collects and processes telemetric and biometric user data, including heart rate through a smartwatch, which is available through a dashboard for instructors. Finally, we developed a case study where SCORPION obtained 82.10% in usability and 4.57 out of 5 in usefulness from the viewpoint of a student and an instructor. The positive evaluation results are promising, indicating that SCORPION can become an effective, motivating, and advanced cybersecurity training tool to help fill current gaps in this context. Keywords: Cyber Range, cybersecurity, gamification, educational technology ∗ Corresponding author Email addresses: pantaleone.nespoli@um.es (Pantaleone Nespoli), mariano.albaladejog@um.es (Mariano Albaladejo-González), japv@um.es (José Antonio Pastor Valera), jruiperez@um.es (José A. Ruipérez-Valiente), joaquin.garcia_alfaro@telecom-sudparis.eu (Joaquin Garcia-Alfaro), felixgm@um.es (Félix Gómez Mármol) Preprint submitted to Expert Systems with Applications January 24, 2024" 2401.12616v1,"The stability and instability of the language control network: a longitudinal resting-state functional magnetic resonance imaging study Zilong Li a, † , Cong Liu b, † , Xin Pan a , Guosheng Ding c* , Ruiming Wang a, * a Key Laboratory of Brain, Cognition and Education Sciences, Ministry of Education, & Guangdong Provincial Key Laboratory of Mental Health and Cognitive Science, Center for Studies of Psychological Application, School of Psychology, South China Normal University, Guangzhou, China b Department of Psychology, Normal College & School of Teacher Education, Qingdao University, Qingdao, China c State Key Laboratory of Cognitive Neuroscience and Learning & IDG/McGovern Institute for Brain Research, Beijing Normal University, Beijing, China † Zilong Li and Cong Liu contributed equally to this study. * Address for correspondence: Ruiming Wang, PhD Guosheng Ding, PhD School of Psychology Faculty of Psychology South China Normal University Beijing Normal University 510631 Guangzhou, P. R. China. 100875 Beijing, P. R. China. E-mail: wangrm@scnu.edu.cn E-mail: dinggsh@bnu.edu.cn 1" 2401.12625v1,"Benders decomposition for congested partial set covering location with uncertain demand Alice Calamita 1 1 Ivana Ljubić 2 Laura Palagi 1 Department of Computer, Control and Management Engineering, Sapienza University of Rome, Via Ariosto 25, 00185 Rome, Italy {alice.calamita, laura.palagi}@uniroma1.it 2 Department of Information Systems, Decision Sciences and Statistics, ESSEC Business School of Paris, 3 Avenue Bernard Hirsch, 95000 Cergy, France ivana.ljubic@essec.edu Abstract In this paper, we introduce a mixed integer quadratic formulation for the congested variant of the partial set covering location problem, which involves determining a subset of facility locations to open and efficiently allocating customers to these facilities to minimize the combined costs of facility opening and congestion while ensuring target coverage. To enhance the resilience of the solution against demand fluctuations, we address the case under uncertain customer demand using Γ-robustness. We formulate the deterministic problem and its robust counterpart as mixed-integer quadratic problems. We investigate the effect of the protection level in adapted instances from the literature to provide critical insights into how sensitive the planning is to the protection level. Moreover, since the size of the robust counterpart grows with the number of customers, which could be significant in real-world contexts, we propose the use of Benders decomposition to effectively reduce the number of variables by projecting out of the master problem all the variables dependent on the number of customers. We illustrate how to incorporate our Benders approach within a mixed-integer second-order cone programming (MISOCP) solver, addressing explicitly all the ingredients that are instrumental for its success. We discuss single-tree and multi-tree approaches and introduce a perturbation technique to deal with the degeneracy of the Benders subproblem efficiently. Our tailored Benders approaches outperform the perspective reformulation solved using the state-of-the-art MISOCP solver Gurobi on adapted instances from the literature. 1 Introduction The partial set covering location problem (PSCLP) belongs to the class of facility location problems that incorporate a notion of coverage. Coverage is defined by a proximity measure, often the distance or the 1" 2401.12628v1,"Berezinskii - Kosterlitz - Thouless transition in rhenium nitride films Kosuke Takiguchi, ∗ Yoshiharu Krockenberger, Yoshitaka Taniyasu, and Hideki Yamamoto NTT Basic Research Laboratories, NTT Corporation, 3-1 Morinosato-Wakamiya, Atsugi, Kanagawa 243-0198, Japan (Dated: January 24, 2024) The quest to manipulate and understand superconductivity demands exploring diverse materials and unconventional behaviors. Here, we investigate the BKT transition in synthesized ReN x thin films, demonstrating their emergence as a compelling platform for studying this pivotal phenomenon. By systematically varying synthesis parameters, we achieve ReN x films exhibiting a BKT transition comparable or even surpassing the archetypal NbN x system. Detailed current-voltage measurements unlock the intrinsic parameters of the BKT transition, revealing the critical role of suppressed superconducting volume in pushing ReN x towards the two-dimensional limit. Utilizing this two-dimensional electron system, we employ Beasley-Mooij-Orlando (BMO) theory to extract the vortex unbinding transition temperature and superelectron density at the critical point. Further confirmation of the BKT transition is obtained through temperature-dependent resistivity, current-voltage, and magnetoresistance measurements. Our findings suggest that native disorder and inhomogeneity within ReN x thin films act to suppress long-range coherence, ultimately driving the system towards the BKT regime. This work establishes ReN x as a promising material for exploring BKT physics and paves the way for tailoring its properties for potential applications in superconducting devices. I. INTRODUCTION The pursuit of understanding and manipulating superconductivity continues to drive innovation across physics and material science. In this realm, superconducting thin films offer fertile ground for exploring diverse phenomena due to their controllable geometry and sensitivity to external factors. Among these, the Berezinskii-Kosterlitz- Thouless (BKT) transition [1–3] holds a unique position, unveiling the interplay between order and disorder within the vortex condensate. In essence, the BKT transition marks a crucial shift from a state with quasi-long-range order in the vortex world to a fully disordered regime as temperature increases. This transition, originally conceptualized for two-dimensional (2D) systems, finds profound relevance in thin films where finite thickness creates an effective 2D superconducting layer. Studying the BKT transition in these systems unlocks valuable insights into fundamental aspects of vortex dynamics, phase fluctuations, and the interplay between dimensionality and superconductivity. The importance of the BKT transition stems from its multifaceted influence on superconducting properties. Its influence extends beyond a simple phase change, impacting a variety of observable characteristics. Regarding electronic transport, the characteristic discontinuities in resistivity near the BKT temperature T BKT unveil the breakdown of phase coherence and the emergence of dissipative processes. The magnetization behavior of the BKT transition leaves its footprint in the hysteresis behavior of magnetization, reflecting the collective dynamics of unbound vortices. Furthermore, the BKT transition plays a pivotal role in understanding the interplay ∗ kosuke.takiguchi@ntt.com between superconductivity and other phase transitions, particularly the superconductor-to-insulator transition. By tuning film thickness, disorder, and external fields, researchers can manipulate the BKT transition and explore this intriguing interplay, paving the way for novel device functionalities [4–11]. In light of these multifaceted implications, a meticulous investigation of the BKT transition in superconducting thin films remains an active and impactful area of research. This manuscript delves into the intricacies of this fascinating phenomenon, shedding light on its mechanisms, consequences, and potential applications. Through detailed analysis of experimental data and theoretical frameworks, we aim to deepen our understanding and pave the way for further exploration of this remarkable transition in the fascinating world of superconducting thin films. For this purpose, the choice of the experimental platform is crucial. Homogeneously disordered superconducting thin film materials are widely studied for the BKT physics though a clear distinction between threedimensional superconductivity and 2D BKT transitions appears to be challenging. In fact, truly long-range homogeneously disordered thin film materials without superconducting domains are a major issue for experimental characterization of the BKT transition. The NbN x system is a favorite to investigate the BKT phase transition. Yet, several shortcomings associated to it need to be addressed. One of the major issues is that NbN x can be synthesized with long-range crystalline coherence using standard synthesis techniques such as radio frequency (RF) sputter [12]. As such long-range coherence of crystalline phases is not desirable for the investigation of the BKT transition, the films have to extremely thin (< 3 nm) [4–8] or subject to Ar ion bombardment [9]. After subjecting NbN x to Ar ion plasma, NbN x may" 2401.12649v1,"SPACE-TIME UNFITTED FINITE ELEMENTS ON MOVING EXPLICIT GEOMETRY REPRESENTATIONS SANTIAGO BADIA 1,2 , PERE A. MARTORELL 3,∗ , AND FRANCESC VERDUGO 4 Abstract. This work proposes a novel variational approximation of partial differential equations on moving geometries determined by explicit boundary representations. The benefits of the proposed formulation are the ability to handle large displacements of explicitly represented domain boundaries without generating body-fitted meshes and remeshing techniques. For the space discretization, we use a background mesh and an unfitted method that relies on integration on cut cells only. We perform this intersection by using clipping algorithms. To deal with the mesh movement, we pullback the equations to a reference configuration (the spatial mesh at the initial time slab times the time interval) that is constant in time. This way, the geometrical intersection algorithm is only required in 3D, another key property of the proposed scheme. At the end of the time slab, we compute the deformed mesh, intersect the deformed boundary with the background mesh, and consider an exact transfer operator between meshes to compute jump terms in the time discontinuous Galerkin integration. The transfer is also computed using geometrical intersection algorithms. We demonstrate the applicability of the method to fluid problems around rotating (2D and 3D) geometries described by oriented boundary meshes. We also provide a set of numerical experiments that show the optimal convergence of the method. Keywords: Unfitted finite elements, embedded finite elements, computer-aided design, computational geometry, immersed boundaries, boundary representations, space-time discretizations, large displacements. 1. Introduction Space-time formulations for finite element methods (FEMs) are valuable techniques for solving transient numerical problems. Unlike standard time stepping schemes, which employ different discretizations for space and time, space-time formulations discretize the problem simultaneously in both space and time. However, generating 4D space-time body-fitted meshes becomes extremely challenging on moving complex geometries. There are no general-purpose tools to generate 4D meshes. Besides, the re-meshing process due to moving domains introduces projection errors when transferring between meshes. The bottleneck of mesh generation can be addressed by employing unfitted FEMs. Unfitted FEMs, also known as embedded or immersed FEMs, offers a solution that eliminates the need for body-fitted mesh generation, relying instead on a simple background grid, such as a uniform or adaptive Cartesian grid. For large-scale simulations on distributed-memory platforms, one can replace expensive (both in terms of computational time and memory) unstructured mesh partitioning [1] by efficient tree-mesh partitioners with load balancing [2, 3]. Unfitted FEMs have 1 School of Mathematics, Monash University, Clayton, Victoria, 3800, Australia. 2 Centre Internacional de Mètodes Numèrics a l’Enginyeria, Campus Nord, 08034, Barcelona, Spain. 3 Department of Civil and Environmental Engineering, Universitat Politècnica de Catalunya, Edifici C1, Campus Nord UPC, Jordi Girona 1-3, 08034 Barcelona, Spain. 4 Department of Computer Science, Vrije Universiteit Amsterdam, De Boelelaan 1111, 1081 HV Amsterdam, The Netherlands. ∗ Corresponding author. E-mails: santiago.badia@monash.edu (SB), pmartorell@cimne.upc.edu (PM), f.verdugo.rojano@vu.nl (FV) . 1" 2401.12656v2,"MoodLoopGP: Generating Emotion-Conditioned Loop Tablature Music with Multi-Granular Features Wenqian Cui ⋆ , Pedro Sarmento, and Mathieu Barthet Queen Mary University of London, School of Electronic Engineering and Computer Science, 327 Mile End Rd, Bethnal Green, London E1 4NS, United Kingdom cuiwenqian.app@gmail.com, p.p.sarmento@qmul.ac.uk, m.barthet@qmul.ac.uk Abstract. Loopable music generation systems enable diverse applications, but they often lack controllability and customization capabilities. We argue that enhancing controllability can enrich these models, with emotional expression being a crucial aspect for both creators and listeners. Hence, building upon LooperGP, a loopable tablature generation model, this paper explores endowing systems with control over conveyed emotions. To enable such conditional generation, we propose integrating musical knowledge by utilizing multi-granular semantic and musical features during model training and inference. Specifically, we incorporate song-level features (Emotion Labels, Tempo, and Mode) and barlevel features (Tonal Tension) together to guide emotional expression. Through algorithmic and human evaluations, we demonstrate the approach’s effectiveness in producing music conveying two contrasting target emotions, happiness and sadness. An ablation study is also conducted to clarify the contributing factors behind our approach’s results. Keywords: Controllable Music Generation · Symbolic Music Generation · Deep Learning · Transformers · Guitar Tablatures · Guitar Pro. 1 Introduction The significance of repetitive, loopable aspects in music structures is evident, especially in loop-centric genres like electronic dance music [12]. Prior works have explored loop generation in both symbolic [1,12,13] and audio domains [17,40], with some having specific focuses, such as drum instruments [2,36]. However, increasing the degree of control in loop-based music generation systems is needed to address creative requirements, with agency over the emotions conveyed by the music standing out due to their direct influence on the listener’s experience and engagement. Emotion-controllable music offers potential applications in live performances, soundtracks, gaming [18,20], virtual/augmented reality (VR/AR), and even in personalized music generation and the data-driven musification in the context of smart cities [28]. ⋆ Corresponding author" 2401.12658v1,"A length scale for non-local multi-scale gradient interactions in isotropic turbulence Miguel P. Encinar 1† 1 Department of Mechanical Engineering, Johns Hopkins University, Baltimore, Maryland 21218, USA Abstract—Three-dimensional turbulent flows enhance velocity gradients via strong non-linear interactions of the rate-of-strain tensor with the vorticity vector, and with itself. For statistically homogeneous flows, their total contributions to gradient production are related to each other by conservation of mass, and so are the total enstrophy and total dissipation. However, locally they do not obey this relation and have different (often extreme) values, and for this reason both production mechanisms have been subject to numerous studies, often decomposed in multiscale interactions. In general lines, their dynamics and contributions to the cascade processes and turbulent kinetic dissipation are different, which posses a difficulty for turbulence modelling. In this paper, we explore the consequence of the ‘Betchov’ relations locally, and show that they implicitly define a length scale. This length scale is found to be about three times the size of the turbulent structures and their interactions. It is also found that while the non-locality of the dissipation and enstrophy at a given scale comes mostly from larger scales that do not cancel, the non-local production of strain and vorticity comes from multiscale interactions. An important consequence of this work is that isotropic cascade models need not distinguish between vortex stretching and strain self-amplification, but can instead consider both entities part of a more complex transfer mechanism, provided that their detailed point-value is not required and a local average of reasonable size is sufficient. 1 Introduction Non-locality is an essential feature of turbulent flows. The term ‘non-local’ or ‘non-local interactions’ is used in turbulence research to refer to two distinct phenomena, non-local interactions in physical space, and in Fourier space. This paper focuses on the former. The ultimate source of non-locality is the incompressibility assumption, which forces the velocity field to be solenoidal at each instant of time and point of space. Incompresibility acts through the pressure gradient term in the Navier–Stokes equation and thus it can be said that the pressure is responsible for non-locality. The only way for the velocity field to be able to satisfy the incompressibility condition is to communicate the movement of each fluid particle to all other particles instantly through the pressure. For this reason it seems that the most straight-forward way of studying non-locality is studying the characteristics of the pressure field. Indeed, some works explore the characteristics of the isotropic pressure field directly (Batchelor 1953; Pumir 1994; Tsuji & Ishihara 2003), although often they are not concerned about non-locality in particular, although exceptions do exist (Wilczek & Meneveau 2014; Vlaykov & Wilczek 2019). Non-locality is instead typically studied in the context of enstrophy and dissipation amplification. These quantities evolve through strain–vorticity interactions, which are non-local, and through the pressure Hessian in the rate-of-strain evolution equation, which is also non-local. Both terms have been extensively studied, particularly in the context † Email address for correspondence: miguel.pencinar@upm.es" 2401.12662v1,"Integrating Human Expertise in Continuous Spaces: A Novel Interactive Bayesian Optimization Framework with Preference Expected Improvement Nikolaus Feith 1 and Elmar Rueckert 1 Abstract— Interactive Machine Learning (IML) seeks to integrate human expertise into machine learning processes. However, most existing algorithms cannot be applied to Realworld Scenarios because their state spaces and/or action spaces are limited to discrete values. Furthermore, the interaction of all existing methods is restricted to deciding between multiple proposals. We therefore propose a novel framework based on Bayesian Optimization (BO). Interactive Bayesian Optimization (IBO) enables collaboration between machine learning algorithms and humans. This framework captures user preferences and provides an interface for users to shape the strategy by hand. Additionally, we’ve incorporated a new acquisition function, Preference Expected Improvement (PEI), to refine the system’s efficiency using a probabilistic model of the user preferences. Our approach is geared towards ensuring that machines can benefit from human expertise, aiming for a more aligned and effective learning process. In the course of this work, we applied our method to simulations and in a real world task using a Franka Panda robot to show human-robot collaboration. Fig. 1. Shows the architecture of Interactive Bayesian Optimization. The black arrows indicate the baseline data flow, the red arrows are additionally necessary for PEI. In blue BO is marked without interaction and representation model. I. INTRODUCTION Interactive Machine Learning (IML) is a field within artificial intelligence that seeks to incorporate human expertise directly into machine learning processes via a feedback loop. This approach is notably suitable for reinforcement learning (RL) scenarios. Two primary concerns arise within IML: First, there is a challenge of presenting the machine learning model to a human decision maker (DM). Second, what’s the best method to convey human feedback to the algorithm, and what type of input is most beneficial? It’s essential to address these questions, especially considering the different ways humans and machines interpret data. Efforts should be made to bridge this understanding gap, ensuring a more harmonious interaction between the two. In our research, we’re taking a new approach to address the complex questions we’ve identified. We view our reinforcement learning challenge as an optimization task, where humans and algorithms collaborate to refine the agent’s actions. Our research introduces a novel framework, grounded in Bayesian Optimization, which facilitates a smoother integration of human feedback into reinforcement learning. Central to our approach is a unique acquisition function, designed to enhance the efficiency of the learning process and better capture user preferences. A distinctive feature of our framework is its dual capability: it gathers user preferences and also permits users to adjust the 1 Chair of Cyber-Physical Systems, Montanuniversität, 8700 Leoben, Austria, corresponding author: nikolaus.feith@unileoben.ac.at RL agent’s policy via an intuitive graphical interface. We’ve further enhanced our system with a new acquisition function named ’Preference Expected Improvement’, building upon the foundational ’Expected Improvement’(EI) concept. Anticipating real-world robotics applications, our system is developed as a ROS2 application. Data flow between Bayesian Optimization, RL, and our web interface is managed through ROS2 Topics. This modular design offers flexibility to adapt the components to the specific problem. Very close related to our method is Preference Reinforcement Learning [1], [2], [3], where in each iteration two or more solutions are shown to the user and the user chooses one. Based on this, the preferences are learned and it is adjusted which new solutions are generated. For this, the preference must be considered as a probabilistic model as shown in [4], [5]. The goal is to guide the exploration in such a way that it proceeds in the sense of the user. In contrast, we show the DM the current best policy, which is then modified by the decision maker and the user’s preferences are queried. Consequently, the human gradually changes the best solution, so that the policy is shaped progressively to the user’s ideas. Initially, we’ll explore existing interactive machine learning frameworks, highlighting their relevance and connection to our approach. Subsequently, we’ll introduce our framework and delve into the experiments we’ve conducted, analyzing the outcomes. Concluding our study, we’ll provide definitive answers to our research questions." 2401.12667v1,"Feature Selection via Robust Weighted Score for High Dimensional Binary Class-Imbalanced Gene Expression Data Zardad Khan 1∗ , Amjad Ali 1 , Saeed Aldahmani 1 1 Department of Statistics and Business Analytics, United Arab Emirates University, Al Ain, UAE E-mail: Zardad Khan: zaar@uaeu.ac.ae; Saeed Aldahmani: saldahmani@uaeu.ac.ae June 2023 Abstract. In this paper, a robust weighted score for unbalanced data (ROWSU) is proposed for selecting the most discriminative feature for high dimensional gene expression binary classification with class-imbalance problem. The method addresses one of the most challenging problems of highly skewed class distributions in gene expression datasets that adversely affect the performance of classification algorithms. First, the training dataset is balanced by synthetically generating data points from minority class observations. Second, a minimum subset of genes is selected using a greedy search approach. Third, a novel wieghted robust score, where the weights are computed by support vectors, is introduced to obtain a refined set of genes. The highest scoring genes based on this approach are combined with the minimum subset of genes selected by the greedy search approach to form the final set of genes. The novel method ensures the selection of the most discriminative genes, even in the presence of skewed class distribution, thus improving the performance of the classifiers. The performance of the proposed ROWSU method is evaluated on 6 gene expression datasets. Classification accuracy and sensitivity are used as performance metrics to compare the proposed ROWSU algorithm with several other state-of-the-art methods. Boxplots and stability plots are also constructed for a better understanding of the results. The results show that the proposed method outperforms the existing feature selection procedures based on classification performance from k nearest neighbours (kNN) and random forest (RF) classifiers. Keywords: Gene Expression Data, Unbalanced Class Distribution, Features Selection, Robust Score, Support Vectors. 1. Introduction Gene expression datasets have an important role in enabling researchers to diagnose diseases and investigate the complexities of biological processes. These datasets," 2401.12668v1,"Wavelength dependence of nitrogen-vacancy center charge cycling A. A. Wood, 1, ∗ A. Lozovoi, 2 R. M. Goldblatt, 1 C. A. Meriles, 2 and A. M. Martin 1 1 School of Physics, University of Melbourne, Victoria 3010, Australia 2 CUNY-The City College of New York, New York 10031, USA (Dated: January 24, 2024) Optically-active spin qubits in wide-bandgap semiconductors exist in several charge states, though typically only specific charge states exhibit desirable spin or photonic properties. An understanding of how interconversion between different charge states occurs is important for most applications seeking to employ such defects in quantum sensing and information processing, and additionally serves as a means of testing and verifying models of the defect electronic structure. Here, we use charge-sensitive confocal imaging to study the wavelength dependence of optical carrier generation in diamonds hosting nitrogen-vacancy (NV) centers, silicon vacancy (SiV) centers and substitutional nitrogen (N). We study the generation of distinctive charge-capture patterns formed when photogenerated charge carriers are captured by photoluminescent defects, using light spanning 405-633 nm (1.96-3.06 eV). We observe distinct regimes where one- or two-photon ionization or recombination processes dominate, and a third regime where anti-Stokes mediated recombination drives weak NV charge cycling with red light. We then compare red-induced charge cycling to fast charge carrier transport between isolated single NV centers driven with green and blue light. This work reports new optically-mediated charge cycling processes of the NV centers, and has consequences for schemes using charge transfer to identify non-luminescent defects and photoelectric detection, where ambiguity exists as to the source of photocurrent. I. INTRODUCTION While many optically-active and spin-addressable defects exist in materials such as diamond [1, 2], silicon carbide [3] and hexagonal boron nitride [4, 5], the spin and photonic properties that are sought are often only associated with a particular charge state of the defect, which may in turn exhibit instability under optical addressing [6]. For instance, the neutral charge state of the nitrogen-vacancy (NV) center in diamond (NV 0 ) with a zero-phonon line (ZPL) at 575 nm exhibits neither the spin-dependent fluorescence or long ground-state coherence times of the negatively-charged NV − (ZPL at 637 nm) that features prominently as a platform for quantum sensing and information processing [7]. Besides the NV center, many other defects exist with various charge states that exhibit photochromism, like the silicon-vacancy SiV − , SiV 0 and SiV 2− charge states [8– 10]. On the other hand, other defects that are optically inactive, such as substitutional nitrogen which exists in N 0 , N + and N − states [11] have important consequences for the charge stability and spin coherence of nearby color centers [12–14] due to their abundance. Charge state measurement and control represents a powerful tool to augment and improve existing quantum measurement techniques [15] as well as facilitating new applications [16–23], in particular, photoelectric detection of NV magnetic resonance [24–26]. It is in photoelectric detection that knowledge of the charge interconversion processes are most important, such as the role of other defects that contribute to the photocur- ∗ alexander.wood@unimelb.edu.au rent [27, 28], particularly under varied excitation wavelengths [29]. Similarly, the role of freely diffusing charges generated by optical excitation has been examined in observation and control of the space-charge potentials accompanying the generation and diffusion of free carriers [30], identification of charge carriers from optical illumination of different defect species [31, 32], transport of charge carriers between single NV defects [32–34] and control over the charge environment-limited spin coherence of NV centers [13, 14, 35] In this work, we investigate the photogeneration and capture of charge carriers in three diamond samples containing varying densities of nitrogen, NV centers, and SiV centers as a function of excitation wavelength. We study the formation of characteristic ‘halo’ patterns of carriers diffusing into charge environments tailored to specific defect concentrations via multi-wavelength scanning confocal microscopy. The range of excitation wavelengths we use span 405-633 nm, sufficient to observe single-photon mediated photoionization and recombination of NV centers in the blue (405-480 nm), two-photon charge cycling of the NV charge state (515-594 nm), and weak twophoton recombination of NV 0 and near-resonant ionization of NV − (594, 633 nm), which we ascribe to phononassisted anti-Stokes excitation of the NV 0 zero-phonon line (ZPL) transition. We do not find any evidence that SiV defects alone undergo charge cycling under optical illumination, even under red excitation, with silicon-free diamonds exhibiting essentially the same charge carrier generation as SiV-rich samples. We then show that red excitation of a single NV center mediates hole generation and capture by a second nearby single NV center, and compare this with carrier generation under blue and green light, observing carrier generation and transport rates an order of magnitude faster than previously re-" 2401.12682v1,"Probing superconducting gap in CeH 9 under pressure Zi-Yu Cao, 1,* Seokmin Choi, 1, * Liu-Cheng Chen, 2,3 Philip Dalladay-Simpson, 3 Harim Jang, 1 Federico Aiace Gorelli, 3,4,5 Jia-Feng Yan, 6 Soon-Gil Jung, 7 Ge Huang, 3 Lan Yu, 3 Yongjae Lee, 8 Jaeyong Kim, 6 Tuson Park, 1, † and Xiao-Jia Chen 2,3,9,† 1 Center for Quantum Materials and Superconductivity (CQMS) and Department of Physics, Sungkyunkwan University, Suwon 16419, Republic of Korea 2 3 School of Science, Harbin Institute of Technology, Shenzhen 518055, China Center for High Pressure Science Technology Advanced Research (HPSTAR), 1690 Cailun Road, Shanghai 201203, P. R. China 4 Shanghai Advanced Research in Physical Sciences (SHARPS), Pudong, Shanghai 201203, P. R. China 5 6 Istituto Nazionale di Ottica, Consiglio Nazionale delle Ricerche (CNR-INO), Florence 50125, Italy Department of Physics, HYU-HPSTAR-CIS High Pressure Research Center, Hanyang University, Seoul 04763, Republic of Korea 7 Department of Physics Education, Sunchon National University, Suncheon 57922, Republic of Korea 8 9 Department of Earth System Sciences, Yonsei University, Seoul 03722, Republic of Korea Department of Physics and Texas Center for Superconductivity (TcSUH), University of Houston, Houston, TX 77204, USA * These authors contributed equally to this work. † Correspondence should be addressed to TP (tp8701@skku.edu) and XJC (xjchen2@gmail.com) 1" 2401.12691v1,"Converging Many-Body Perturbation Theory for Ab Initio Nuclear Structure: II. Brillouin-Wigner Perturbation Series for Open-Shell Nuclei Zhen Li 1, ∗ and Nadezda A. Smirnova 1, † 1 LP2IB (CNRS/IN2P3 – Université de Bordeaux), 33170 Gradignan, France (Dated: January 24, 2024) Brillouin-Wigner (BW) perturbation theory is developed for both ground and excited states of open-shell nuclei. We show that with optimal partitioning of the many-body Hamiltonian proposed earlier by the authors [Z. Li and N. Smirnova, arXiv:2306.13629], one can redefine the BW perturbation series for a given state of the effective Hamiltonian in a small -space to be converging under the condition that the energy of this state is below the lowest eigenvalue of the Hamiltonian matrix block belonging to the complement of the -space, characterized by the same good quantum numbers as the state under consideration. Specifically, the BW perturbative calculations for the lowest J π states are always converging due to the variational principle. This property does hold for both soft and hard internucleon interactions in the harmonic oscillator basis. To illustrate this method and check the convergence behavior, we present numerical studies of low-energy spectra of 5,6,7 Li using the Daejeon16 and bare N 3 LO potentials. P P I. INTRODUCTION Solving the many-body Schrödinger equation for atomic nuclei is the key to the ab initio study of nuclear structure. The last two decades have witnessed huge progress in the developments of nuclear ab initio manybody methods [1], accompanied by the success of chiral effective field theory (EFT) potentials [2, 3] and renormalization techniques [4]. For few-nucleon systems and very light nuclei, Faddeev equations [5, 6], hyperspherical harmonics method [7, 8] and quantum Monte Carlo methods [9] are able to provide very accurate calculations. The full configuration interaction method, no-core shell model (NCSM) [10], gives very detailed information on nuclear states and transitions at low energies, by diagonalizing the Hamiltonian matrix calculated in a sufficiently large model space spanned by many-body states. However, with the current computing power NCSM can only reach nuclei to oxygen or so at the moment, due to the rapid growth of the model-space dimension as the nucleon number increases. For nuclei heavier than oxygen, specific approximations need to be applied in the calculation, which has led to a variety of many-body methods, such as many-body perturbation theory (MBPT) [11, 12], coupled cluster method [13], in-medium similarity renormalization group [14], self-consistent Green’s function [15], etc. These methods have achieved a lot of success in the ab initio study of intermediate-mass nuclei [1] and even heavy nuclei like lead [16]. Initiated from the 1950s [17–20], MBPT has been extensively applied to the calculation of the nuclear groundstate energy [12] and to the construction of the effective Hamiltonian used in the valence-space nuclear shell model calculation [11, 21–23]. Furthermore, MBPT has also become a precious tool for the solution of atomic ∗ lizhen@cenbg.in2p3.fr; physzhenli@outlook.com † nadezda.smirnova@u-bordeaux.fr and molecular problems [24–30]. In spite of extensive applications, MBPT is brought into doubt by the issue of order-by-order convergence in powers of interactions, especially for atomic nuclear systems, where (strong) internucleon interactions are used. Previously most attention has been attracted to the Rayleigh-Schrödinger (RS) formulation of MBPT, because of its energy-independence feature and a convenient implementation via a diagrammatic approach [20, 30–32]. However, a huge number of diagrams required at higher orders limited the application of this diagrammatic approach up to usually 3rd order in nuclear structure calculations [11, 12, 22, 33–37], which makes it impossible for the study of order-by-order convergence within this diagrammatic framework. The study of the convergence properties became possible with the implementation of the algebraic recursive calculation of the RS perturbation series terms [38, 39]. Extensive calculations for molecular systems with various partitioning schemes reported cases of converging or diverging series [40]. Similar calculations have also been performed for atomic nuclei [41–43], to which we focus our attention in the present paper. Although the recursive method was still restricted to relatively light nuclei, some convergence properties were addressed in those studies after numerical calculations. With the use of softened chiral EFT potentials, the authors [41–43] concluded that the perturbative calculation of nuclear ground and excited states typically diverges in the HO basis, and only converges in the Hartree-Fock (HF) basis. However, harder potentials can still spoil the convergence in the HF basis [43]. In our recent work [44], we chose to explore the energydependent BW perturbation series for ground states of closed-shell nuclei. We showed that the with an optimal Hamiltonian partitioning, the convergence criterion of a perturbative expansion for the ground-state energy can always be satisfied. This property holds due to the variational principle and does not depend on the choice of the (HO or HF) basis or the choice of the (hard or soft) internucleon interaction. In the present work, we general-" 2401.12698v1,"Noname manuscript No. (will be inserted by the editor) Genetic algorithm for multi-objective optimization of container allocation in cloud architectures Carlos Guerrero · Isaac Lera · Carlos Juiz Received: date / Accepted: date Abstract The use of containers in cloud architectures has become widespread because of advantages such as limited overhead, easier and faster deployment and higher portability. Moreover, they are a suitable architectural solution for deployment of applications created using a microservices development pattern. Despite the large number of solutions and implementations, open issues have not been addressed in container automation and management. Container resource allocation influences system performance and resource consumption so it is a key factor for cloud providers. We propose a genetic algorithm approach, using the Non-dominated Sorting Genetic Algorithm-II (NSGA-II), to optimize container allocation and elasticity management due to the good results obtained with this algorithm in other resource management optimization problems in cloud architectures. The optimization has been focused on a tight use of the resources and a reduction of the network overhead and system failure rate. A model for cloud cluster, containers, microservices and four optimization objectives is presented. Experimental results have shown that our approach is a suitable solution to address the problem of container allocation and elasticity and it obtains better objectives values than the container management policies implemented in Kubernetes. Keywords Cloud containers · Microservices · Resource allocation · Genetic algorithm · Multi-objective optimization · Performance evaluation C. Guerrero (Corresponding author), I. Lera, C. Juiz Computer Science Department, University of Balearic Islands, Crta. Valldemossa km 7.5, E07122 Palma, Spain Tel.: +34-971172965 Fax: +34-971173003 C. Guerrero E-mail: carlos.guerrero@uib.es I. Lera E-mail: isaac.lera@uib.es C. Juiz E-mail: cjuiz@uib.es ." 2401.12699v1,"Noname manuscript No. (will be inserted by the editor) A Lightweight Decentralized Service Placement Policy for Performance Optimization in Fog Computing Carlos Guerrero · Isaac Lera · Carlos Juiz Received: date / Accepted: date Abstract A decentralized optimization policy for service placement in fog computing is presented. The optimization is addressed to place most popular services as closer to the users as possible. The experimental validation is done in the iFogSim simulator and by comparing our algorithm with the simulator’s built-in policy. The simulation is characterized by modeling a microservicebased application for different experiment sizes. Results showed that our decentralized algorithm places most popular services closer to users, improving network usage and service latency of the most requested applications, at the expense of a latency increment for the less requested services and a greater number of service migrations. Keywords Fog computing · Service placement · Performance optimization 1 Introduction The emerging of application development for Internet of Things (IoT) has revitalized the popularity of wearables, logistics, smart cities, or e-health environments (Atzori et al, 2010; Li et al, 2015; Ko et al, 2016; Darwish et al, 2017). This research was supported by the Spanish Government (Agencia Estatal de Investigación) and the European Commission (Fondo Europeo de Desarrollo Regional) through grant number TIN2017-88547-P (MINECO/AEI/FEDER, UE). C. Guerrero (Corresponding author), I. Lera, C. Juiz Computer Science Department, University of Balearic Islands, Crta. Valldemossa km 7.5, E07122 Palma, Spain Tel.: +34-971172965 Fax: +34-971173003 C. Guerrero E-mail: carlos.guerrero@uib.es I. Lera E-mail: isaac.lera@uib.es C. Juiz E-mail: cjuiz@uib.es" 2401.12768v1,"What Can Self-Admitted Technical Debt Tell Us About Security? A Mixed-Methods Study Nicolás E. Díaz Ferreyra Hamburg University of Technology Hamburg, Germany nicolas.diaz-ferreyra@tuhh.de Mojtaba Shahin RMIT University Melbourne, Australia mojtaba.shahin@rmit.edu.au Sodiq Quadri Hamburg University of Technology Hamburg, Germany sodiq.quadri@tuhh.de Mansooreh Zahedi The University of Melbourne Melbourne, Australia mansooreh.zahedi@unimelb.edu.au Riccardo Scandariato Hamburg University of Technology Hamburg, Germany riccardo.scandariato@tuhh.de ABSTRACT CCS CONCEPTS Self-Admitted Technical Debt (SATD) encompasses a wide array of sub-optimal design and implementation choices reported in software artefacts (e.g., code comments and commit messages) by developers themselves. Such reports have been central to the study of software maintenance and evolution over the last decades. However, they can also be deemed as dreadful sources of information on potentially exploitable vulnerabilities and security flaws. Objective: This work investigates the security implications of SATD from a technical and developer-centred perspective. On the one hand, it analyses whether security pointers disclosed inside SATD sources can be used to characterise vulnerabilities in Open-Source Software (OSS) projects and repositories. On the other hand, it delves into developers’ perspectives regarding the motivations behind this practice, its prevalence, and its potential negative consequences. Method: We followed a mixed-methods approach consisting of (i) the analysis of a preexisting dataset containing 94,455 SATD instances and (ii) an online survey with 222 OSS practitioners. Results: We gathered 201 SATD instances through the dataset analysis and mapped them to different Common Weakness Enumeration (CWE) identifiers. Overall, 25 different types of CWEs were spotted across commit messages, pull requests, code comments, and issue sections, from which 8 appear among MITRE’s Top-25 most dangerous ones. The survey shows that software practitioners often place security pointers across SATD artefacts to promote a security culture among their peers and help them spot flaky code sections, among other motives. However, they also consider such a practice risky as it may facilitate vulnerability exploits. Implications: Our findings suggest that preserving the contextual integrity of security pointers disseminated across SATD artefacts is critical to safeguard both commercial and OSS solutions against zero-day attacks. • Security and privacy → Human and societal aspects of security and privacy; Software security engineering; • Software and its engineering → Maintaining software. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. MSR 2024, April 2024, Lisbon, Portugal © 2024 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX KEYWORDS self-admitted technical debt, software security, software engineering, technical debt identification ACM Reference Format: Nicolás E. Díaz Ferreyra, Mojtaba Shahin, Mansooreh Zahedi, Sodiq Quadri, and Riccardo Scandariato. 2024. What Can Self-Admitted Technical Debt Tell Us About Security? A Mixed-Methods Study. In Proceedings of 21st International Conference on Mining Software Repositories (MSR 2024). ACM, New York, NY, USA, 12 pages. https://doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION Software developers often face complex technical challenges that, for diverse reasons, they circumvent with spurious design workarounds and sub-optimal implementations [11]. Such compromises are likely to result in a significant amount of Technical Debt (TD), namely low-quality artefacts that can impair the future maintenance and evolution of the system being developed. Different types of TD have been reported in the current literature, including code, design, requirements, and documentation. If not identified timely and properly managed, TD can incur extra work in the longterm, not to mention additional costs. Hence, it is deemed a critical issue for software development and considered ubiquitous to most software projects across all industry segments [11]. Motivation. Security issues are closely related to TD as they are often grounded in quality compromises in the software being built [30, 36]. Simple coding mistakes and design flaws can lead to exploitable vulnerabilities that are time- and effort-intensive to repair later on [1, 4]. Moreover, similar to TD, security incurs extra costs as it is frequently seen as an “after-thought” instead of an actual priority in the software development life cycle [27]. Therefore, recent studies have started looking at the intersection between TD and security with the aim of detecting and managing vulnerabilities in both code and the core architecture of information systems (e.g., [1, 30, 36, 37]). That is, to leverage TD as a security indicator [30] and for the automatic detection of code vulnerabilities [37]." 2401.12789v1,"MULTILINGUAL AND FULLY NON-AUTOREGRESSIVE ASR WITH LARGE LANGUAGE MODEL FUSION: A COMPREHENSIVE STUDY W. Ronny Huang, Cyril Allauzen, Tongzhou Chen, Kilol Gupta, Ke Hu, James Qin, Yu Zhang, Yongqiang Wang, Shuo-Yiin Chang, Tara N. Sainath Google Research ABSTRACT In the era of large models, the autoregressive nature of decoding often results in latency serving as a significant bottleneck. We propose a non-autoregressive LM-fused ASR system that effectively leverages the parallelization capabilities of accelerator hardware. Our approach combines the Universal Speech Model (USM) and the PaLM 2 language model in per-segment scoring mode, achieving an average relative WER improvement across all languages of 10.8% on FLEURS and 3.6% on YouTube captioning. Furthermore, our comprehensive ablation study analyzes key parameters such as LLM size, context length, vocabulary size, fusion methodology. For instance, we explore the impact of LLM size ranging from 128M to 340B parameters on ASR performance. This study provides valuable insights into the factors influencing the effectiveness of practical large-scale LM-fused speech recognition systems. Index Terms— large language model, multilingual speech recognition 1. INTRODUCTION Large-scale models have showcased impressive results across applications, especially in multilingual speech models [1, 2, 3, 4, 5] and multilingual large language models (LLMs) [6, 7, 8]. The next evolution is the fusion of these large multilingual models to enhance accuracy. However, their size brings latency issues, notably in autoregressive decoding, as seen with shallow fusion [9]. Applications like voice assistants and live captioning face challenges from these models’ latency. Recognizing this concern, our study presents a non-autoregressive LM-fused ASR system. This approach streams utterances at 8-second intervals using the Universal Speech Model (USM) [10] and the PaLM 2 language model [11]. Both the USM and PaLM 2 process each 8-second chunk with full audio context, leading to enhanced accuracy, and they are also able process it quickly to by parallelizing across the sequence for smooth user experience. In particular, hypotheses are generated nonautoregressively by attaching a CTC decoder to the USM, and the hypotheses are scored non-autoregressively by the LM by passing in the entire hypothesis sequence in teacher forcing mode [12]. Our methodology yields an average double-digit gain of 10.8% on relative word error rate (WER) on the public multilingual FLEURS testset. On a challenging internal YouTube captioning testset, we observe an average gain of 3.6%, across all available languages. Our study further delves into factors like LM size (up to 340B), vocabulary, context length, segmentation, n-best list size, and scoring method. For instance, we find that though LLMs display emergent behaviors with increasing size [13], their impact on WER is more muted— but larger models can reduce the sensitivity to fusion weight. 2. RELATED WORK Leveraging large language models to enhance ASR systems has emerged as a natural and promising direction, leading to significant advancements in recent research. Several studies have focused on integrating LLMs with ASR models, exploiting their vast linguistic knowledge and contextual understanding. [14] combined T5 [15] and PaLM 1 [16] with a Conformer RNN-T model, enhancing ASR performance for English and code-switched data. Our work builds on this by using LLMs for large-scale ASR models with a nonautoregressive CTC head. [9] improved recognition of rare words in short voice queries using shallow fusion. In contrast, our focus lies in long-form tasks like YouTube captioning, where LLMs’ contextual understanding is crucial. Given the limitations of shallow fusion for long tasks and mismatched vocabularies, we explore scoring as a more efficient fusion technique. [17] integrated a Listen Attend Spell Once model [18] with BERT [19] using n-best scoring. We expand upon this idea by deploying larger-scale, multilingual models. Other research, such as [20], has explored various fusion methods between LLMs and ASR systems. Their surprising finding was the comparable performance of simple shallow fusion to deeper techniques. Similarly, [21] used two fusion methods with LLaMa LLM and found minimal difference in WER outcomes, supporting the conclusions of [20]. Building on these findings, our study emphasizes scor-" 2401.12794v1,"Benchmarking LLMs via Uncertainty Quantification Fanghua Ye † 1,2 Mingming Yang † 1 Jianhui Pang 1,3 Longyue Wang * 1 Derek F. Wong 3 Emine Yilmaz 2 Shuming Shi 1 Zhaopeng Tu 1 1 2 3 Tencent AI Lab University College London University of Macau fanghua.ye.19@ucl.ac.uk, nlp2ct.pangjh3@gmail.com derekfw@um.edu.mo, emine.yilmaz@ucl.ac.uk {shanemmyang, vinnylywang, shumingshi, zptu}@tencent.com Abstract The proliferation of open-source Large Language Models (LLMs) from various institutions has highlighted the urgent need for comprehensive evaluation methods. However, current evaluation platforms, such as the widely recognized HuggingFace open LLM leaderboard, neglect a crucial aspect – uncertainty, which is vital for thoroughly assessing LLMs. To bridge this gap, we introduce a new benchmarking approach for LLMs that integrates uncertainty quantification. Our examination involves eight LLMs (LLM series) spanning five representative natural language processing tasks. Additionally, we introduce an uncertainty-aware evaluation metric, UA CC , which takes into account both prediction accuracy and prediction uncertainty. Our findings reveal that: I) LLMs with higher accuracy may exhibit lower certainty; II) Largerscale LLMs may display greater uncertainty compared to their smaller counterparts; and III) Instruction-finetuning tends to increase the uncertainty of LLMs. By taking uncertainty into account, our new UAcc metric can either amplify or diminish the relative improvement of one LLM over another and may even change the relative ranking of two LLMs. These results underscore the significance of incorporating uncertainty in the evaluation of LLMs. 1 1 Introduction Large Language Models (LLMs) have gained significant traction within both academia and industry in recent two years, with numerous organizations and companies open-sourcing their versions of LLMs (Chang et al., 2023; Zhao et al., 2023; Kaddour et al., 2023; Yang et al., 2023a). LLMs are highly versatile, demonstrating capabilities in various tasks such as question answering, document summarization, and dialogue systems. Given * Corresponding Author † Equal Contribution 1 Our implementation available at https://github.com/ smartyfh/LLM-Uncertainty-Bench Figure 1: An illustration of two LLMs accurately predicting the true answer (with option A possessing the highest probability), but showing different levels of uncertainty. Note that when both LLMs predict a wrong answer, they may also display different uncertainties. the growing interest and advancements in LLMs, it is crucial to establish appropriate methods for evaluating their performance (Liang et al., 2022; Ye et al., 2023; Chang et al., 2023). However, conducting a comprehensive evaluation of LLMs remains a challenging endeavor (Guo et al., 2023). To address this challenge, several open leaderboards such as the popular HuggingFace open LLM leaderboard 2 , OpenCompass (Contributors, 2023), Chatbot Arena (Zheng et al., 2023), and FlagEval (BAAI, 2023) have emerged, providing a comparative analysis of LLM performance. Despite their usefulness, these leaderboards possess a significant limitation: They do not take into account the uncertainty of LLMs. For example, the HuggingFace open LLM leaderboard only utilizes accuracy as the evaluation metric. However, as demonstrated in Figure 1, two LLMs may achieve identical ac- 2 https://huggingface.co./spaces/HuggingFaceH4/ open_llm_leaderboard" 2401.12835v1,"JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 SGTR+: End-to-end Scene Graph Generation with Transformer Rongjie Li , Songyang Zhang , and Xuming He Abstract—Scene Graph Generation (SGG) remains a challenging visual understanding task due to its compositional property. Most previous works adopt a bottom-up, two-stage or point-based, one-stage approach, which often suffers from high time complexity or suboptimal designs. In this work, we propose a novel SGG method to address the aforementioned issues, formulating the task as a bipartite graph construction problem. To address the issues above, we create a transformer-based end-to-end framework to generate the entity and entity-aware predicate proposal set, and infer directed edges to form relation triplets. Moreover, we design a graph assembling module to infer the connectivity of the bipartite scene graph based on our entity-aware structure, enabling us to generate the scene graph in an end-to-end manner. Based on bipartite graph assembling paradigm, we further propose a new technical design to address the efficacy of entity-aware modeling and optimization stability of graph assembling. Equipped with the enhanced entity-aware design, our method achieves optimal performance and time-complexity. Extensive experimental results show that our design is able to achieve the state-of-the-art or comparable performance on three challenging benchmarks, surpassing most of the existing approaches and enjoying higher efficiency in inference. Code is available: https://github.com/Scarecrow0/SGTR Index Terms—Computer Vision, Deep Learning, Scene Graph Generation, Scene Understanding, Visual Relationship Detection ✦ 1 I I NTRODUCTION NFERRING structural properties of a scene, such as the relationships between visual entities, is a fundamental scene understanding task. A visual relationship between two entities typically consists of a triple . Given such relationships, a scene can be represented as a graph structure with the entities as nodes and the predicates as edges, which is referred to as a scene graph. The scene graph provides a compact structural representation for a visual scene with potential applications in many vision tasks such as visual question answering [1], [2], [3], [4], image captioning [5], [6] and image retrieval [7]. Different from the traditional vision tasks focusing on visual entities (e.g., object detection), the problem of scene graph generation (SGG) requires jointly modeling the subject/object entities and their relations. The compositional property of visual relationships induces large variations in their appearance and relatively complex prediction space. Therefore, it is challenging to learn an efficient model to effectively localize and classify a variety of relationship concepts. Most previous works attempt to tackle this problem using two distinct design patterns: bottom-up two-stage methods [8], [9], [10], [11], [12], [13], [14], [15] and point-based one-stage • • • • Scene Graph Rongjie Li and Songyang Zhang are with ShanghaiTech University, Shanghai 201210, China (e-mail: lirj2@shanghaitech.edu.cn; zhangsongyang@pjlab.org.cn). Xuming He is with the ShanghaiTech University, Shanghai Engineering Research Center of Intelligent Vision and Imaging, Pudong, Shanghai 201210, China. (e-mail: hexm@shanghaitech.edu.cn). The corresponding author is Xuming He. This work was supported by Shanghai Science and Technology Program 21010502700, Shanghai Frontiers Science Center of Human-centered Artificial Intelligence, and the National Nature Science Foundation of China under Grant 62350610269. Man-1 Hold Man-2 Man-3 Ride Next None Horse-1 Man-1 Hold Man-2 Next Man-3 Ride Horse-1 None Graph Assembling Entity-aware Predicate Node Hold Man-1 Man-2 Man-3 Horse-1 Entity Node Hold Ride Predicate Semantic Next Horse-1 Bipartite Scene Graph Entity Indicators Fig. 1: An overview of SGTR pipeline for scene graph generation. We formulate SGG as a bipartite graph construction process. First, the entity and predicate nodes are generated, respectively. Then we assemble the bipartite scene graph from two types of nodes. methods [16], [17]. The former typically first detects N entity proposals, followed by predicting the predicate categories of those entity combinations. While this strategy achieves high recalls in discovering relation instances, its O(N 2 ) predicate proposals not only incur considerable computation cost but also produce substantial noise in context modeling. The one-stage methods, on the other hand, extract entities and predicates separately from the images in order to reduce the size of relation proposal set. Nonetheless, they rely on a strong assumption of the non-overlapping property of interaction regions, which severely restricts their application in modeling complex scenes 1 . 1. Such limitations, e.g., two different relationships cannot share a similar image region, are also discussed in the related literature [18], [19]." 2401.12846v1,"How well can large language models explain business processes? ⋆ Dirk Fahland a , Fabiana Fournier b , Lior Limonad b , Inna Skarbovsky b , Ava J.E. Swevels a a Eindhoven University of Technology, Eindhoven, Netherlands b IBM Research, Haifa, Israel Abstract Large Language Models (LLMs) are trained on a vast amount of text to interpret and generate human-like textual content. They are becoming a vital vehicle in realizing the vision of the autonomous enterprise, with organizations today actively adopting LLMs to automate many aspects of their operations. LLMs are likely to play a prominent role in future AI- augmented business process management systems (ABPMSs) catering functionalities across all system lifecycle stages. One such system’s functionality is Situation-Aware eXplainability (SAX), which relates to generating causally sound and yet human-interpretable explanations that take into account the process context in which the explained condition occurred. In this paper, we present the SAX4BPM framework developed to generate SAX explanations. The SAX4BPM suite consists of a set of services and a central knowledge repository. The functionality of these services is to elicit the various knowledge ingredients that underlie SAX explanations. A key innovative component among these ingredients is the causal process execution view. In this work, we integrate the framework with an LLM to leverage its power to synthesize the various input ingredients for the sake of improved SAX explanations. Since the use of LLMs for SAX is also accompanied by a certain degree of doubt related to its capacity to adequately fulfill SAX along with its tendency for hallucination and lack of inherent capacity to reason, we pursued a methodological evaluation of the quality of the generated explanations. To this aim, we developed a designated scale and conducted a rigorous user study. Our findings show that the input presented to the LLMs aided with the guard-railing of its performance, yielding SAX explanations having better-perceived fidelity. This improvement is moderated by the perception of trust and curiosity. More so, this improvement comes at the cost of the perceived interpretability of the explanation. Keywords: Business Process, Methodologies and Tools, AI, Explainability, Large Language Models ⋆ This project has received funding from the European Union’s Horizon research and innovation programme under grant agreements no 101092639 (FAME), 101094905 (AI4GOV), and 101092021 (AutoTwin). Email addresses: d.fahland@tue.nl (Dirk Fahland), fabiana@il.ibm.com (Fabiana Fournier), liorli@il.ibm.com (Lior Limonad), inna@il.ibm.com (Inna Skarbovsky), a.j.e.swevels@tue.nl (Ava J.E. Swevels) Preprint submitted to Data and Knowledge Engineering January 24, 2024" 2401.12864v1,"Threshold Quantum State Tomography Daniele Binosi, 1, ∗ Giovanni Garberoglio, 1, † Diego Maragnano, 2, ‡ Maurizio Dapor, 1, § and Marco Liscidini 2, ¶ 1 European Centre for Theoretical Studies in Nuclear Physics and Related Areas (ECT*, Fondazione Bruno Kessler); Villa Tambosi, Strada delle Tabarelle 286, I-38123 Villazzano (TN), Italy 2 Dipartimento di Fisica, Università di Pavia, via Bassi 6, 27100 Pavia, Italy (Dated: January 22, 2024) Quantum state tomography (QST) aims at reconstructing the state of a quantum system. However in conventional QST the number of measurements scales exponentially with the number of qubits. Here we propose a QST protocol, in which the introduction of a threshold allows one to drastically reduce the number of measurements required for the reconstruction of the state density matrix without compromising the result accuracy. In addition, one can also use the same approach to reconstruct an approximated density matrix depending on the available resources. We experimentally demonstrate this protocol by performing the tomography of states up to 7 qubits. We show that our approach can lead to the same accuracy of QST even when the number of measurements is reduced by more than two orders of magnitudes. I. INTRODUCTION In the last few years, the race for quantum technologies has favoured the realization of large and complex quantum states in various platforms, including superconducting [1], atomic [2, 3], and photonic systems [4–9]. Such advances are an important resource for the implementation of useful quantum computers and an extraordinary opportunity for fundamental studies in quantum mechanics. Ideally, one would like to know the complete state of a quantum system, for this is sufficient to compute the value of any other observable. However, as the dimension of the quantum system increases, this task is not trivial at all. For example, consider quantum state tomography (QST) [10], which is arguably the most famous approach for quantum state reconstruction. The idea is to obtain the density matrix of the system from the measurements of a set of observables on a large enough ensemble of identical copies of the state. This method is general and does not make any a priori hypothesis on the state. However, a system composed of n qudits requires determining the expectation value of at least d 2n observables, that is the number of independent entries of the density matrix. Such an exponential growth of the number of measurements with the number of qudits can make the experimental implementation of QST unfeasible even for just three or four qudits, depending on the quantum system under investigation. Over the years, strategies have been developed to decrease the number of required measurements, usually by leveraging certain assumptions about the state or the anticipated outcome. For example, the efficiency of compressed sensing QST depends on the rank of the density ∗ binosi@ectstar.eu † garberoglio@ectstar.eu ‡ diego.maragnano01@universitadipavia.it § dapor@ectstar.eu ¶ marco.liscidini@unipv.it matrix, with the state characterization done via a certain number of random Pauli measurements [11]. Further improvements of this approach have reduced the number of necessary measurement sets significantly [12, 13]. In QST via reduced density matrices, one requires the state to be uniquely determined by local reduced density matrices or the hypothesis that the global state is pure [14]. In Bayesian QST, one defines conditional probabilities starting from measurement results and a suitable a priori distribution over the space of possible states [15]. In self-guided QST one addresses tomography through optimization rather than estimation, iteratively learning the quantum state by treating tomography as a projection measurement optimization problem [16–18]. Other strategies avoid the reconstruction of the density matrix by focusing only on some relevant information about the state. For instance, in shadow tomography, one can estimate the value of a large number of observables with a few copies of the unknown state [19–21]. Finally, quantum witnesses are useful to verify some crucial properties of a quantum state, such as its degree of entanglement and the kind of quantum correlation [22]. While these last two approaches are extremely useful and applicable to states of large dimensions, it is somewhat disappointing that, after all the efforts to implement a state, one cannot look at it as a whole. In this work, we introduce threshold Quantum State Tomography (tQST), a protocol that allows one to reconstruct the density matrix of a quantum state, even of large dimension, by allowing an efficient trade-off between the number of measurements and the accuracy of the state reconstruction through the presence of a threshold parameter. We show that tQST can drastically reduce the resources required for state reconstruction, but it can also be used to obtain an approximated density matrix by further reducing the number of measurements and the experimental efforts. The protocol can be applied to any quantum system and does not make any assumption about the state to be characterized. First, we outline the tQST procedure and discuss its implementations in the case of n-qubits. Second, we experimentally verify the" 2401.12866v1,"sensors Article Evaluating Collaborative and Autonomous Agents in Data-Stream-Supported Coordination of Mobile Crowdsourcing Ralf Bruns 1,† , Jeremias Dötterl 1,† , Jürgen Dunkel 1, * ,† 1 2 * † and Sascha Ossowski 2,† Computer Science Department, Hannover University of Applied Sciences and Arts, 30459 Hannover, Germany; ralf.bruns@hs-hannover.de (R.B.); doetterlj@gmail.com (J.D.) CETINIA , University Rey Juan Carlos, Móstoles, 28933 Madrid, Spain; sascha.ossowski@urjc.es Correspondence : juergen.dunkel@hs-hannover.de These authors contributed equally to this work. Abstract: Mobile crowdsourcing refers to systems where the completion of tasks necessarily requires physical movement of crowdworkers in an on-demand workforce. Evidence suggests that in such systems, tasks often get assigned to crowdworkers who struggle to complete those tasks successfully, resulting in high failure rates and low service quality. A promising solution to ensure higher quality of service is to continuously adapt the assignment and respond to failure-causing events by transferring tasks to better-suited workers who use different routes or vehicles. However, implementing task transfers in mobile crowdsourcing is difficult because workers are autonomous and may reject transfer requests. Moreover, task outcomes are uncertain and need to be predicted. In this paper, we propose different mechanisms to achieve outcome prediction and task coordination in mobile crowdsourcing. First, we analyze different data stream learning approaches for the prediction of task outcomes. Second, based on the suggested prediction model, we propose and evaluate two different approaches for task coordination with different degrees of autonomy: an opportunistic approach for crowdshipping with collaborative, but non-autonomous workers, and a market-based model with autonomous workers for crowdsensing. Keywords: crowdsourcing; data stream learning; multiagent systems; collaborative coordination; market-based coordination Citation: Bruns, R.; Dötterl, J.; Dunkel, J.; Ossowski, S. Evaluating Collaborative and Autonomous Agents in Data-Stream-Supported 1. Introduction Coordination of Mobile Explicit crowdsourcing is a problem-solving paradigm in which tasks are outsourced to an on-demand workforce of private individuals. Mobile crowdsourcing is often considered as a specific case of explicit crowdsourcing, where the outsourced tasks are spatial in character, and interested individuals use their personal mobile devices to temporarily join the crowd, find nearby tasks, complete the tasks, and earn rewards [1–3]. Mobile crowdsourcing has been used for a wide range of purposes: Crowdsourcing. Sensors 2023, 23, 614. https://doi.org/10.3390/s23020614 Academic Editor: Marco Picone Received: 28 October 2022 Revised: 13 December 2022 Accepted: 30 December 2022 • Published: 5 January 2023 Copyright: © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/). • Crowdsensing systems [4,5] recruit crowdworkers to gather sensor data at locations of interest. There are many applications of crowdsensing in the social sector, the environmental sector, and the infrastructure sector, among others. Examples include measurements of air quality [6] and noise pollution [7,8], monitoring of road traffic [9] and road surface conditions [10–12], as well as photo acquisition [13]. In these scenarios, data are obtained from many different locations and then used to analyze, maintain, and improve the monitored infrastructure or environment. Crowdshipping systems [14] tackle the problem of last-mile parcel delivery by a crowdsourcing approach, i.e., to service the delivery leg from the logistics company’s parcel hub to the recipients’ home. Interested individuals can join to act as couriers. The aim is to use spare capacities in private vehicles and piggyback on trips that are made by private citizens anyway. In exchange for monetary rewards, the interested individuals Sensors 2023, 23, 614. https://doi.org/10.3390/s23020614 https://www.mdpi.com/journal/sensors" 2401.12868v1,"www.nature.com/scientificdata A database of physical therapy Data Descriptor exercises with variability of execution collected by wearable sensors OPEN Sara García-de-Villa ✉ , Ana Jiménez-Martín & Juan Jesús García-Domínguez This document introduces the PHYTMO database, which contains data from physical therapies recorded with inertial sensors, including information from an optical reference system. PHYTMO includes the recording of 30 volunteers, aged between 20 and 70 years old. A total amount of 6 exercises and 3 gait variations were recorded. The volunteers performed two series with a minimum of 8 repetitions in each one. PHYTMO includes magneto-inertial data, together with a highly accurate location and orientation in the 3D space provided by the optical system. The files were stored in CSV format to ensure its usability. The aim of this dataset is the availability of data for two main purposes: the analysis of techniques for the identification and evaluation of exercises using inertial sensors and the validation of inertial sensor-based algorithms for human motion monitoring. Furthermore, the database stores enough data to apply Machine Learning-based algorithms. The participants’ age range is large enough to establish age-based metrics for the exercises evaluation or the study of differences in motions between different groups. Background & Summary Home health care is becoming more and more necessary, and not only for patients that have to follow a particular therapy after a surgical procedure, but also for people that require long-term therapies for a comprehensive strengthening, as happens with older adults. This is one of the pillars of active aging, where a set of exercises is prescribed to slow down the effects of frailty 1 and improve patients’ functional ability 2 . Patients achieve the benefits of performing these therapies only when they remain consistent 3 . There is evidence that regular follow-up by health-care professionals keep patients active over the long term 4 . However, it is difficult to have a carer at the patient’s disposal. This explains why virtual coaches are increasingly needed as an alternative to health staff, that could contribute to patients’ adherence to physical exercise-based treatments 5 . In the absence of a personal supervisor, the system that works as a virtual coach has to perform three main tasks. Firstly, it has to get information about human motion, based on sensory systems, such as optical or inertial ones, among others. Secondly, it has to monitor physical activity and evaluate the performance of the exercises 6,7 , what requires the development of particular algorithms adapted to physical therapy exercises 8–10 , some of them based on Machine Learning (ML) methods 10,11 , which relate parameters of human motions with the performance. And finally, the virtual coach has to provide feedback to the patient 5 . For the evaluation and optimization of algorithms, it is necessary particular datasets adapted to the exercises to be analysed. In this way, recent research efforts have focused on the creation of datasets by using different sensory systems. Video-based and portable technologies are the main alternatives in the monitoring of human activities 12 , so databases obtained with both systems are of great interest. However, video-based technologies entail occlusions and patients’ privacy concerns 13,14 . Conversely, wearable systems, such as inertial measurement units (IMUs), are becoming increasingly popular because of its practicality and its everywhere usable potential 15 . IMU-based databases of human motion monitoring commonly focus on the study and assessment of gait 16 or the study of activities of daily living 17 , and they usually also include depth and RGB sensors. This data descriptor aims to contribute to the research of the monitoring and evaluation of the performance of prescribed physical therapy exercises through inertial wearable sensors. This database, called PHYTMO (from University of Alcala, Department of Electronics, Alcalá de Henares, 28801, Spain. ✉ e-mail: sara.garciavilla@uah.es Scientific Data | (2022) 9:266 | https://doi.org/10.1038/s41597-022-01387-2 1" 2401.12884v1,"PIRASHVILI–RICHTER-TYPE THEOREMS FOR THE REFLEXIVE AND DIHEDRAL HOMOLOGY THEORIES DANIEL GRAVES Abstract. Reflexive homology and dihedral homology are the homology theories associated to the reflexive and dihedral crossed simplicial groups respectively. The former has recently been shown to capture interesting information about C 2 -equivariant homotopy theory and its structure is related to the study of “real” objects in algebraic topology. The latter has long been of interest for its applications in O(2)-equivariant homotopy theory and connections to Hermitian algebraic K-theory. In this paper, we show that the reflexive and dihedral homology theories can be interpreted as functor homology over categories of non-commutative sets, after the fashion of Pirashvili and Richter’s result for the Hochschild and cyclic homology theories. Introduction Functor homology plays an important role in modern homological algebra. The subject was pioneered by Connes ([Con83]) who described the cyclic homology theory as derived functors over the cyclic category. This was extended to incorporate dihedral structure by Loday ([Lod87]) and Krasauskas, Lapin and Solov’ev ([KLS87]). Collectively, this work led to the notion of a crossed simplicial group (see [FL91] and [Kra87]). Crossed simplicial groups extended the notion of cyclic homology to detect other structure that is compatible with a unital, associative multiplication, such as an order-reversing involution. A great many homology theories for algebras have interpretations in terms of functor homology: Hochschild homology ([Lod98, 6.2.2]); cyclic homology ([Con83], [Lod98, 6.2.8]); dihedral homology ([Lod87], [KLS87]); reflexive homology ([Gra23b]); symmetric homology ([Aul10], [Fie]); hyperoctahedral homology ([Gra22], [Fie]); higher-order Hochschild homology ([Pir00]); gamma homology ([PR00]); André-Quillen homology ([Pir03]); E n - homology ([LR11]); and Leibniz homology ([HV15]). The reflexive crossed simplicial group and the dihedral crossed simplicial group are two of the fundamental crossed simplicial groups. The associated homology theories, reflexive homology and dihedral homology, are defined as functor homology over their respective indexing categories ∆R op and ∆D op . The dihedral homology theory has long been of interest for its applications to O(2)- equivariant homotopy theory and Hermitian algebraic K-theory (see [Lod87], [KLS87], [Dun89], [Lod90], [Lod93], [Cor93a], [Cor93b], [Lod96]). By comparison, the study of the reflexive homology theory is a modern venture. Recent work of the author has studied the applications of the reflexive crossed simplicial group to C 2 -equivariant homotopy theory and notes that the structure of the reflexive crossed simplicial group is used in the study of real objects in algebraic topology ([Gra23b]). Lifelong Learning Centre, University of Leeds, Woodhouse, Leeds, LS2 9JT, UK E-mail address: dan.graves92@gmail.com. 2020 Mathematics Subject Classification. 18G15, 18G90, 16E40, 16E30. Key words and phrases. reflexive homology, dihedral homology, functor homology, crossed simplicial group, involutive non-commutative sets, involutive algebra. 1" 2401.12885v1,"Astronomy & Astrophysics manuscript no. manu_multi_elliptic January 24, 2024 ©ESO 2024 Damped kink motions in a system of two solar coronal tubes with elliptic cross-sections Mijie Shi 1 , Bo Li 1 , Shaoxia Chen 1 , Hui Yu 1 , and Mingzhe Guo 1, 2 1 Shandong Provincial Key Laboratory of Optical Astronomy and Solar-Terrestrial Environment, Institute of Space Sciences, Shandong University, Weihai 264209, China e-mail: bbl@sdu.edu.cn 2 Centre for Mathematical Plasma Astrophysics, Department of Mathematics, KU Leuven, Celestijnenlaan 200B, B-3001 Leuven, Belgium Received ......... / Accepted ......... ABSTRACT Aims. This study is motivated by observations of coordinated transverse displacements in neighboring solar active region loops, addressing specifically how the behavior of kink motions in straight two-tube equilibria is impacted by tube interactions and tube cross-sectional shapes. Methods. We work with linear, ideal, pressureless magnetohydrodynamics. Axially standing kink motions are examined as an initial value problem for transversely structured equilibria involving two identical, field-aligned, density-enhanced tubes with elliptic crosssections (elliptic tubes). Continuously nonuniform layers are implemented around both tube boundaries. We numerically follow the system response to external velocity drivers, largely focusing on the quasi-mode stage of internal flows to derive the pertinent periods and damping times. Results. The periods and damping times we derive for two-circular-tube setups justify available modal results found with the T-matrix approach. Regardless of cross-sectional shapes, our nonuniform layers feature the development of small-scale shears and energy accumulation around Alfvén resonances, indicative of resonant absorption and phase-mixing. As with two-circular-tube systems, our configurational symmetries make it still possible to classify lower-order kink motions by the polarization and symmetric properties of the internal flows; hence such mode labels as S x and A x . However, the periods and damping times for two-elliptic-tube setups further depend on cross-sectional aspect ratios, with A x motions occasionally damped less rapidly than S x motions. We find uncertainties up to ∼ 20% (∼ 50%) for the axial Alfvén time (the inhomogeneity lengthscale) if the periods (damping times) computed for twoelliptic-tube setups are seismologically inverted with canonical theories for isolated circular tubes. Conclusions. The effects of loop interactions and cross-sectional shapes need to be considered when the periods and particularly the damping times are seismologically exploited for coordinated transverse displacements in adjacent coronal loops. Key words. magnetohydrodynamics (MHD) — Sun: corona — Sun: magnetic fields — waves 1. Introduction Cyclic transverse displacements of solar coronal loops are arguably the most extensively observed collective motion in modern solar coronal seismology (see e.g., Nakariakov & Kolotkov 2020; Nakariakov et al. 2021, for recent reviews). Two regimes have been established. The decayless regime is such that the displacements show little damping and their magnitudes are usually substantially smaller than visible loop widths, with both features already clear when this regime was first identified in measurements with Hinode (Tian et al. 2012) and the Solar Dynamics Observatory/Atmospheric Imaging Assembly (SDO/AIA; Wang et al. 2012; Nisticò et al. 2013; Anfinogentov et al. 2013). This regime is known not to be connected with eruptive events but ubiquitous in active region (AR) loops, as evidenced by a statistical survey of the SDO/AIA data (Anfinogentov et al. 2015) and by the recent series of analyses of the measurements with the Extreme Ultraviolet Imager (EUI) on board the Solar Orbiter (e.g., Zhong et al. 2022; Petrova et al. 2023; Zhong et al. 2023). Decaying loop displacements, on the other hand, typically damp over several cycles and are of larger amplitudes as revealed by their first imaging observations by the Transition Region and Coronal Explorer (TRACE; Schrijver et al. 1999; Aschwanden et al. 1999; Nakariakov et al. 1999). These decaying motions are usually associated with lower coronal eruptions (Zimovets & Nakariakov 2015). Regardless, there exist ample detections of decaying displacements, an inexhaustive list being those by Hinode (Ofman & Wang 2008; Van Doorsselaere et al. 2008a; Erdélyi & Taroyan 2008), the Solar TErrestrial RElations Observatories (STEREO; Verwichte et al. 2009), and by SDO/AIA (Aschwanden & Schrijver 2011; White & Verwichte 2012). Statistical studies therefore prove possible either through compiling published results (e.g., Verwichte et al. 2013) or via directly cataloging the SDO/AIA events (Goddard et al. 2016; Nechaeva et al. 2019). Decaying cyclic displacements were specifically established to be nearly exclusively axial fundamentals (e.g., Fig.9 in Goddard et al. 2016 and Fig.5 in Nechaeva et al. 2019). Seismological applications of cyclic transverse displacements typically start with their identification as trapped fast kink motions. Practically, this identification largely relies on the scheme for classifying collective motions in straight, static, field-aligned Article number, page 1 of 29" 2401.12893v1,"INR-TH-2024-001 NICA prospects in searches for light exotics from hidden sectors: the cases of hidden photons and axion-like particles Dmitry Gorbunov a,b , Dmitry Kalashnikov a,b a Institute for Nuclear Research of Russian Academy of Sciences, 117312 Moscow, Russia b Moscow Institute of Physics and Technology, 141700 Dolgoprudny, Russia Abstract We present first estimates of NICA sensitivity to Standard Model extensions with light hypothetical particles singlet under the known gauge transformations. Our analysis reveals that NICA can explore new regions in the parameter spaces of models with a hidden vector and models with an axion-like particle of masses about 30-500 MeV. Some of these regions seem unreachable by other ongoing and approved future projects. NICA has good prospects in discovery (5σ) of the new physics after 1 year of data taking. 1. Nuclotron based Ion Collider fAcility (NICA) 1 is a new accelerator complex designed at Joint Institute for Nuclear Research in Dubna, Moscow region. The construction took about 10 years with active participation of thousands scientists and technicians from several tens of institutions all over the World. NICA plans operaion with colliding beams of p, Au, Zn and the ion energy per nucleon will vary in the range 4-11 GeV. Being a circular collider, NICA will operate with two collision points where two different instruments, Multi-Purpose Detector (MPD) [1] and Spin Physics Detector (SPD) [2] are installed. While its main goal is investigating the hadronic matter — nucleus structure, quark-gluon plasma, high baryonic density, etc — it can be used for probing fundamental new physics which can show up in the heavy ion collisions. The kinematics implies that the most promising mass range for the new hypothetical particles to be produced by collisions at NICA is subGeV. The new physics, needed to explain neutrino oscillations, dark matter, baryon asymmetry of the Universe, inflation, etc, can indeed be at such low energy scale, provided by only feeble interaction with known ingredients of the Standard Model of particle physics (SM), for examples see correspondingly Refs. [3–6]. Likewise, the large electric charge of the colliding ions favors models with the light particles coupled to photons as models to be explored to a larger extent. Email addresses: gorby@ms2.inr.ac.ru (Dmitry Gorbunov), kalashnikov.d@phystech.edu (Dmitry Kalashnikov) 1 NICA website nica.jinr.ru Preprint submitted to Elsevier" 2401.12895v1,"ESC: Edge-attributed Skyline Community Search in Large-scale Bipartite Graphs Fangda Guo †*B , Xuanpu Luo †§* , Yanghao Liu †§ , Guoxin Chen †§ , Yongqing Wang † , Huawei Shen † , Xueqi Cheng † † CAS Key Laboratory of AI Security, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China § University of Chinese Academy of Sciences, Beijing, China {guofangda, luoxuanpu21s, liuyanghao19s, chenguoxin22s, wangyongqing, shenhuawei, cxq}@ict.ac.cn Abstract—Due to the ability of modeling relationships between two different types of entities, bipartite graphs are naturally employed in many real-world applications. Community Search in bipartite graphs is a fundamental problem and has gained much attention. However, existing studies focus on measuring the structural cohesiveness between two sets of vertices, while either completely ignoring the edge attributes or only considering onedimensional importance in forming communities. In this paper, we introduce a novel community model, named edge-attributed skyline community (ESC), which not only preserves the structural cohesiveness but unravels the inherent dominance brought about by multi-dimensional attributes on the edges of bipartite graphs. To search the ESCs, we develop an elegant peeling algorithm by iteratively deleting edges with the minimum attribute in each dimension. In addition, we also devise a more efficient expanding algorithm to further reduce the search space and speed up the filtering of unpromising vertices, where a upper bound is proposed and proven. Extensive experiments on real-world large-scale datasets demonstrate the efficiency, effectiveness, and scalability of the proposed ESC search algorithms. A case study was conducted to compare with existing community models, substantiating that our approach facilitates the precision and diversity of results. I. I NTRODUCTION Numerous real-world networks are composed of community structures, making their discovery an essential problem in network analysis. Community search is a query-dependent community discovery problem aimed at finding the densest connected subgraphs containing several input queries. Due to the ever-growing number of applications, it has attracted significant attention from database professionals in recent years. In traditional community search, the focus is primarily on the network’s topological structure. However, in realworld applications, it is important not only to consider the connections between entities but also to take into account the attribute features of the entities. This is because attribute information can enhance the cohesiveness of the communities identified. Therefore, the task of community search on attributed graphs becomes particularly significant. Currently, most research can adequately address community constraints in terms of structure and attributes in scenarios involving only a single type of entity [1]–[10]. Nevertheless, when dealing with scenarios involving two different types of entities, such as collaboration networks [11], customer-product networks * Equal contribution. U 1 U 2 e 12 e 13 U 3 e 21 e 14 e 22 e 41 e 42 e 23 e 11 e 31 V 1 U 4 V 2 e 24 e 32 e 33 V 3 V 4 e 11 d=1 4 attribute d=2 17 d=3 9 e 12 3 18 19 e 13 2 16 13 e 14 1 7 11 e 21 9 6 4 e 22 8 10 10 e 23 e 24 7 2 14 6 13 15 e 31 14 9 2 e 32 e 33 13 12 19 11 6 16 e 41 e 42 19 18 1 4 5 3 e Fig. 1: Example of communities containing the query. [12] and user-location networks [13], the resulting community tends to focus exclusively on structural cohesiveness, often disregarding the attributes. This is exemplified in approaches like the (α, β)-core [14]–[16], bitruss [17]–[19], and biclique [20]–[22], which primarily concentrate on structure. Some researchers later proposed some methods by additionally integrating attribute information, but they only consider one-dimensional importance [23]–[25]. Generally speaking, interactions between different entities in a graph are often associated with multiple importances (i.e., weights). These methodologies overlook the multidimensional aspects of such networks and cannot capture all the cohesive communities. We aim to develop a model that can utilize both structural information and multi-dimensional attribute information to identify all cohesive communities containing the queries. For example, As illustrated in Fig 1, given a bipartite graph composed of two types of entities and a query U 2 , the algorithm identifies two cohesive communities that include U 2 : {U 2 , U 3 , V 1 , V 2 } and {U 1 , U 2 , U 3 , V 1 , V 2 , V 3 , V 4 }. These communities are mutually exclusive and both represent the largest connected subgraphs. In this study, we aim to design a comprehensive method that takes into account the structural information of the graph, the multi-dimensional attribute information on the edges, and the graph’s cohesiveness. The objective is to identify vertices in the bipartite graph that are structurally closest to the query and have the most similar attribute values, along with the corresponding edges, in order to obtain all the high-importance communities that meet the criteria. Refining the foundation laid by previous research and informed by our analytical insights, we characterize the issue at hand as the Community Search Problem within Bipartite Graphs Featuring Multidimensional Edge Attributes. The communities delineated" 2401.12919v1,"IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, VOL. X, NO. X, NOVEMBER 2022 1 Inertial Sensors for Human Motion Analysis: A Comprehensive Review Sara Garcı́a-de-Villa, David Casillas-Pérez, Ana Jiménez-Martı́n Member, IEEE, and Juan Jesús Garcı́a-Domı́nguez Senior Member, IEEE Abstract—Inertial motion analysis is having a growing interest during the last decades due to its advantages over classical optical systems. The technological solution based on inertial measurement units allows the measurement of movements in daily living environments, such as in everyday life, which is key for a realistic assessment and understanding of movements. This is why research in this field is still developing and different approaches are proposed. This presents a systematic review of the different proposals for inertial motion analysis found in the literature. The search strategy has been carried out in eight different platforms, including journal articles and conference proceedings, which are written in English and published until August 2022. The results are analyzed in terms of the publishers, the sensors used, the applications, the monitored units, the algorithms of use, the participants of the studies and the validation systems employed. In addition, we delve deeply into the machine learning techniques proposed in recent years and in the approaches to reduce the estimation error. In this way, we show an overview of the research carried out in this field, going into more detail in recent years, and providing some research directions for future work. Index Terms—Human motion, motion analysis, kinematic analysis, inertial measurement units, IMU, inertial sensors. I. I NTRODUCTION Human motion analysis is an essential support tool for the assessment of the parameters of movements, which is specially important in the evaluation of workout routines, clinical rehabilitation and preventive treatments [1]. It is also becoming very popular for the physical activity monitoring in the elderly. Indeed, as the population of developed countries ages, the demand for home-based rehabilitation and the need to obtain quantitative exercise data remotely will increase [2]. Optical methods are considered the gold standard in the motion analysis field because of their accurate measurements November 2 nd , 2022. Financial support acknowledgment. This work was supported in part by Junta de Comunidades de Castilla La Mancha (FrailAlert project, SBPLY/21/180501/000216), the Spanish Ministry of Science and Innovation (INDRI project, PID2021-122642OB-C41) , Comunidad de Madrid (RACC project, CM/JIN/2021-016) and NEXTPERCEPTION European Union project funded by ECSEL Joint Undertaking (JU), under grant agreement No.876487 (ECSEL-2019-2-RIA). S. G. V. was with the Department of Electronics, University of Alcala, Alcalá de Henares, 28805, Spain and in the Center of Automation and Robotics (CSIC-UPM), Arganda del Rey, 28500, Spain (e-mail: sara.garciavilla@uah.es). She is now with the Department of Signal Theory and Communications, Rey Juan Carlos University, Fuenlabrada, 28942, Spain. (e-mail: sara.garcia.devilla@urjc.es). A. J. M. and J. J. G. D. are with the Department of Electronics, University of Alcala, Alcalá de Henares, 28805, Spain. (A. J. M. e-mail: ana.jimenez@uah.es; J. J. G. D. e-mail: jjesus.garcia@uah.es). D. C. P. is with the Department of Signal Theory and Communications, Rey Juan Carlos University, Fuenlabrada, 28942, Spain. (e-mail: david.casillas@urjc.es). of kinematic and spatio-temporal parameters [3]. However, these systems entail several disadvantages, such as the high cost of equipment, the need for trained personnel to use the equipment, the required large spaces for installation and their restricted margin of maneuverability, that limits their use to controlled indoor environments. The inertial motion analysis has emerged as a promising alternative to optical methods attracting a great scientific interest. Inertial systems are portable and can be used everywhere, what means an advantage to the optical systems, which are commonly constraint to a limited space. That makes the Inertial Measurement Units (IMUs) an affordable and friendly use alternative for the estimation of human kinematics. These devices allow continuous monitoring of human motions in daily environments, which is crucial in order to obtain more reliable information than the obtained in sporadic laboratory tests. For these reasons, the use of IMUs has increased in the last few decades for continuous monitoring of human motions, as reported in [4]. Previous works extensively review the use of portable sensors. A recent review analyzes the integration of portable sensors in clothes to obtain physiological and motion information [5]. However, inertial sensors are not considered in the analysis, in spite of their frequent use in this field. Reviews that take into account the use of inertial sensors are focused on applications, such as sign languages or motion analysis [3], [6]. Works about the inertial motion analysis, as [3], address the motion monitoring and kinematic feature extraction, but only considering the specific area of sportrelated exercises evaluation and their analysis is up to April 2017. A lower-limb focused study is carried out in [7], but it does not provide a complete overview of the literature on inertial motion analysis. For the best of our knowledge, the last in-depth and generic systematic review on inertial sensors for human motion analysis is reported in [4], published in 2016. Since the number of publications about human motion analysis increases over time, as shown in Fig. 1, we consider there is a need to update the literature review on this topic. According to Fig. 1, the number of existing publications on the inertial motion analysis field has considerably increased since the previous review was published [4]. Furthermore, during the last years, Machine Learning (ML) methods have arisen and they have been applied to the inertial motion analysis. Consequently, it is required an update to provide an overview of the algorithms analyzed in [4], as the Kalman filters, complementary filters, integration, vector observation and others, but in combination with the novel ML-" 2401.12928v1,"1 Accepted for publication in Space Science Reviews https://doi.org/10.1007/s11214-024-01047-4 Dynamical phenomena in the Martian atmosphere through Mars Express imaging A. Sánchez-Lavega 1 , T. del Río-Gaztelurrutia 1 , A. Spiga 2 , J. Hernández-Bernal 2 , E. Larsen 1 , D. Tirsch 3 , A. Cardesin-Moinelo 4-6 , P. Machado 6 1 Universidad del País Vasco UPV/EHU, Escuela de Ingeniería de Bilbao, Departamento Física Aplicada, Bilbao, Spain 2 Sorbonne Université, Centre National de la Recherche Scientifique, École Normale Supérieure, École Polytechnique Laboratoire de Météorologie Dynamique (LMD/IPSL), Paris, France 3 German Aeroespace Center (DLR), Institute of Planetary Research, Berlin, Germany 4 Aurora Technology for European Space Agency, ESA-ESAC, European Space Astronomy Centre, Madrid, Spain 5 Instituto de Astrofísica de Andalucía, CSIC, Granada, Spain 6 Institute of Astrophysics and Space Sciences, Observatório Astronómico de Lisboa, Lisbon, Portugal Corresponding author: agustin.sanchez@ehu.eus ID = 0000-0001-7234-7634 Special issue: Mars Express 20 years Keywords: Mars atmosphere, Mars Express, Atmosphere dynamics Abstract This review describes the dynamic phenomena in the atmosphere of Mars that are visible in images taken in the visual range through cloud formation and dust lifting. We describe the properties of atmospheric features traced by aerosols covering a large range of spatial and temporal scales, including dynamical interpretations and modelling when available. We present the areographic distribution and the daily and seasonal cycles of those atmospheric phenomena. We rely primarily on images taken by cameras on Mars Express. 1. Introduction Since the invention of the telescope, the visual observation of the planet Mars has attracted the attention of astronomers and has lead to the identification of phenomena such as albedo features, polar caps and hoods, dust storms (""yellow clouds"", e.g. Gifford 1964) and white & blue clouds (James et al. 2017). Early visual observations were registered with hand-drawn images, and from the late 19th century and throughout the 20th century, photography allowed the classification of the nature of the different" 2401.12931v1,"manuscript submitted to Journal of Geophysical Research - Planets Accepted in Journal of Geophysical Research-Planets https://doi.org/10.1029/2022JE007480 Mars 2020 Perseverance rover studies of the Martian atmosphere over Jezero from pressure measurements A. Sánchez-Lavega 1 , T. del Rio-Gaztelurrutia 1 , R. Hueso 1 , M. de la Torre Juárez 2 , G. M. Martínez 3 , A.-M. Harri 4 , M. Genzer 4 , M. Hieta 4 , J. Polkko 4 , J. A. Rodríguez-Manfredi 5 , M. T. Lemmon 6 , J. Pla-García 5 , D. Toledo 5 , A. Vicente-Retortillo 5 , Daniel Viúdez-Moreiras 5 , A. Munguira 1 , L. K. Tamppari 2 , C. Newman 7 , J. Gómez-Elvira 8 , S. Guzewich 9 , T. Bertrand 10 , V. Apéstigue 8 , I. Arruego 8 , M. Wolff 11 , D. Banfield 12 , I. Jaakonaho 4 , T. Mäkinen 4 1 UPV/EHU, Bilbao, Spain (e-mail lead author: agustin.sanchez@ehu.eus) Jet Propulsion Laboratory/California Institute of Technology, Pasadena, CA, USA 3 Lunar and Planetary Institute, Houston, TX, USA 4 Finnish Meteorological Institute, Helsinki, Finland 5 Centro de Astrobiología (INTA-CSIC), Madrid, Spain 6 Space Science Institute, Boulder, CO 80301, USA 7 Aeolis Research, Pasadena, CA, USA 8 Instituto Nacional de Técnica Aeroespacial, INTA, Madrid, Spain 9 NASA Goddard Space Flight Center, Greenbelt, MD, USA 10 Observatoire Paris Meudon, Paris, France 11 Space Science Institute, Brookfield, WI, USA 12 Cornell University, NY, USA 2 Corresponding author: first and last name (agustin.sanchez@ehu.eus) Key Points: • We study the pressure measurements performed on the first 460 sols by the rover Perseverance M2020 • The daily and seasonal cycles and the evolution of six tidal components and their relationship to dust content are presented. • We characterize long-period waves (sols), short-period gravity waves (min.), rapid pressure fluctuations and a regional dust storm impact." 2401.12937v1,"Running head: SIGNS OF FACTOR LOADINGS 1 Are the Signs of Factor Loadings Arbitrary in Confirmatory Factor Analysis? Problems and Solutions Dandan Tang, Steven M. Boker, Xin Tong Department of Psychology, University of Virginia Author Note This research was supported by the National Institutes of Health under Award Number 4R37HD058305-27. Correspondence concerning this article should be addressed to Dandan Tang, Department of Psychology, University of Virginia. Email: gux8df@virginia.edu" 2401.12954v1,"Meta-Prompting: Enhancing Language Models with Task-Agnostic Scaffolding Adam Tauman Kalai OpenAI ∗ adam@kal.ai Abstract We introduce meta-prompting, an effective scaffolding technique designed to enhance the functionality of language models (LMs). This approach transforms a single LM into a multi-faceted conductor, adept at managing and integrating multiple independent LM queries. By employing high-level instructions, meta-prompting guides the LM to break down complex tasks into smaller, more manageable subtasks. These subtasks are then handled by distinct “expert” instances of the same LM, each operating under specific, tailored instructions. Central to this process is the LM itself, in its role as the conductor, which ensures seamless communication and effective integration of the outputs from these expert models. It additionally employs its inherent critical thinking and robust verification processes to refine and authenticate the end result. This collaborative prompting approach empowers a single LM to simultaneously act as a comprehensive orchestrator and a panel of diverse experts, significantly enhancing its performance across a wide array of tasks. The zero-shot, task-agnostic nature of meta-prompting greatly simplifies user interaction by obviating the need for detailed, task-specific instructions. Furthermore, our research demonstrates the seamless integration of external tools, such as a Python interpreter, into the meta-prompting framework, thereby broadening its applicability and utility. Through rigorous experimentation with GPT-4, we establish the superiority of meta-prompting over conventional scaffolding methods: When averaged across all tasks, including the Game of 24, Checkmate-in-One, and Python Programming Puzzles, meta-prompting— augmented with a Python interpreter functionality—surpasses standard prompting by 17.1%, expert (dynamic) prompting by 17.3%, and multipersona prompting by 15.2%. 1 Game of 24 100 Task Accuracy (%) Mirac Suzgun Stanford University ∗ msuzgun@stanford.edu Sonnet Writing Checkmate-in-One 100 100 80 80 80 60 60 60 40 40 40 20 20 20 0 Std 0-CoT Ex-St Ex-Dy MP Meta 0 Std 0-CoT Ex-St Ex-Dy MP Meta 0 Std 0-CoT Ex-St Ex-Dy MP Meta Figure 1: Enhancing GPT-4 with meta-prompting. In this study, we introduce and examine the effectiveness of metaprompting, contrasting it with a range of zero-shot prompting techniques, including standard zero-shot (Std), zero-shot chain-of-thought (0-CoT; Kojima et al. (2022)), generic and dynamic expert (Ex-St and Ex-Dy; Xu et al. (2023)), and multipersona (MP; Wang et al. (2023)). Our research demonstrates that meta-prompting, particularly when combined with a Python interpreter, significantly improves overall accuracy and robustness in GPT-4 across a variety of tasks. ∗ Work done while at Microsoft Research New England. 1 The data, prompts, and the model outputs are all available at https://github.com/suzgunmirac/meta-prompting. 1" 2401.12957v1,"Symmetry Duality: Exploring Exotic Oscillators And Dissipative Dynamics Through The Glass Of Newton-Hooke Sayan Kumar Pal 1∗ and Partha Nandi 2† 1 Physics and Applied Mathematics Unit, Indian Statistical Institute, Kolkata, 203 B.T. Road, West Bengal 700108, India. and 2 Department of Physics, University of Stellenbosch, Stellenbosch-7600, South Africa. Motivated by the symmetry in the non-relativistic limit of anti-de Sitter geometry, we employ planar dynamical models featuring exotic (deformed) harmonic oscillators, presented through direct and indirect Lagrangian representations. The latter introduces Bateman dissipative oscillator system. Analyzing these dynamic systems with a first-order Lagrangian scheme, our phase-space-based approach utilizes the moment map components to reveal the underlying symmetry algebra. This obtained algebra, interpreted as an extended version of Newton-Hooke (NH) cosmological symmetry algebras, has the potential to cast an augmented non-relativistic shadow over the expanding universe, offering an insightful perspective on extended NH spacetime in 2+1 dimensions through our dynamical realizations. I. INTRODUCTION Studies in nonrelativistic spacetimes with a special emphasis on their associated symmetries have particularly gained importance and popularity due to some exciting discoveries in recent times. These studies have provided a foundation for studies of transport phenomena in nonrelativistic fluids [1], Chern-Simons gravity theories [2], phonons moving in a perfect nonrelativistic fluid [3], nonrelativistic Nambu-Goldstone modes [4], Newton-Cartan gravity and supergravity theories [5, 6], Dirac fermions in curved space-times [7], etc. All these studies are broadly directed towards one of the two major themes: the AdS-CFT correspondence [8] and the analogue gravity theories [9, 10]. At this point, we would want to clarify to the readers that by space-times, we may mean here even a degenerate metric between space and time, which is typically the case in nonrelativistic scenarios. As a matter of fact, nonrelativistic spacetimes of relevance in the present context such as Newton-Hooke spacetimes or the similar Galilei-Maxwell spacetime serve as examples of non-metric but curved spacetimes as their canonical connections have non-vanishing Riemann curvature tensors, in contrast to the Galilean space-time. Associated with these nonrelativistic spacetimes, one has the corresponding symmetry groups which have become a major thrust of research in recent times due to their cosmological and statistical mechanical applications [11–14], of which the Newton-Hooke group in (2+1) dimension (N H 3 ) becomes important in our present context. In fact, the Newton-Hooke (NH) group in n+1 dimensions is the symmetry group of the n-dimensional harmonic oscillator (H.O.) and can be obtained by a group contraction of the anti-de Sitter group in n+1 dimensions, AdS n [15–18]. Newton-Hooke spacetimes have been interpreted as flat and torsionless Newton- Cartan spacetime with a quadratic Newtonian potential and have also been described as a non-relativistic FLRW geometry with flat spatial slices [19]. They are therefore considered as cosmological nonrelativistic groups, and as such may be regarded as dynamical groups of (free and nonrelativistic) Galilean systems, where the frequency of the system plays the role of a Hubble’s constant in an accelerated expanding/contracting universe [20, 21]. Just recently in [22], using intuitive arguments from Newton-Hooke theory and subsequently invoking numerical solutions of Einstein’s equations, the existence of static black hole binaries has been reported in de Sitter spacetime thereby providing the first four-dimensional example of nonuniqueness in general relativity without matter. A classification of systems in (2+1)D, both classical and quantum, having Newton Hooke symmetry has been presented in [23], which has also discussed the exotic central extensions of the group in (2+1) dimensional context. Here we aim to provide a dynamical realization of the extended Newton-Hooke group N H 3 , where we borrow the notation from [23] mentioned just above. This extended Newton-Hooke group N H 3 will be a nine-dimensional group containing three central extensions. In addition to that, the extended N H 3 resembles partly the reduced Galilei-Maxwell group corresponding to the magnetic Landau group limit [24, 25]. In [26], a study of (1+1)D Newton-Hooke group for the simple and the damped H.O. has been carried out within the framework of the orbit method, while here we present a study corresponding to the more physical and interesting (2+1)D case using moment maps [27, 28] which, roughly speaking, are generalizations of the notion of Noether charges in a symplectic manifold. ∗ Electronic address: pal.sayan566@gmail.com † Electronic address: pnandi@sun.ac.za" 2401.12963v1,"A UTO RT: E MBODIED F OUNDATION M ODELS FOR L ARGE S CALE O RCHESTRATION OF R OBOTIC A GENTS Michael Ahn, Debidatta Dwibedi, Chelsea Finn, Montse Gonzalez Arenas, Keerthana Gopalakrishnan, Karol Hausman, Brian Ichter, Alex Irpan, Nikhil Joshi, Ryan Julian, Sean Kirmani, Isabel Leal, Edward Lee, Sergey Levine, Yao Lu, Isabel Leal, Sharath Maddineni, Kanishka Rao, Dorsa Sadigh, Pannag Sanketi, Pierre Sermanet, Quan Vuong, Stefan Welker, Fei Xia, Ted Xiao, Peng Xu, Steve Xu, Zhuo Xu Google Deepmind ∗ A BSTRACT Foundation models that incorporate language, vision, and more recently actions have revolutionized the ability to harness internet scale data to reason about useful tasks. However, one of the key challenges of training embodied foundation models is the lack of data grounded in the physical world. In this paper, we propose AutoRT, a system that leverages existing foundation models to scale up the deployment of operational robots in completely unseen scenarios with minimal human supervision. AutoRT leverages vision-language models (VLMs) for scene understanding and grounding, and further uses large language models (LLMs) for proposing diverse and novel instructions to be performed by a fleet of robots. Guiding data collection by tapping into the knowledge of foundation models enables AutoRT to effectively reason about autonomy tradeoffs and safety while significantly scaling up data collection for robot learning. We demonstrate AutoRT proposing instructions to over 20 robots across multiple buildings and collecting 77k real robot episodes via both teleoperation and autonomous robot policies. We experimentally show that such “in-the-wild” data collected by AutoRT is significantly more diverse, and that AutoRT’s use of LLMs allows for instruction following data collection robots that can align to human preferences. 1 I NTRODUCTION One of the central goals of autonomous robotics research is to enable independent and broadly capable robotic agents: systems that can be tasked with some high-level goals (“keep the kitchen clean”), formulate plans for addressing these goals, and then carry out those plans with the skills and resources available to them. While current robotic learning methods offer appealing solutions for acquiring individual robotic skills, and large language models (LLMs), vision-language models (VLMs) and large multimodal models offer the ability to reason over such abstract tasks (Ahn et al., 2022; Rana et al., 2023), truly open-ended tasks still present major challenges. Performing innumerable number of tasks in diverse settings requires a grounded and generalist agent that can robustly adapt to scenarios outside where robots are trained. The bottleneck for achieving these goals, however, is the need for large amounts of robotic experience in the real world – much larger than robot datasets collected in lab settings with well-defined environments. In this paper, we study how we can design agents to gather robotic experience for themselves at scale. Central to our work is leveraging knowledge contained in foundation models to drive realworld robots. We specifically focus on diverse robotic data acquisition: when a robot is placed in a new environment, potentially with a user command to collect data around some theme (e.g. office Authors in alphabetical order, contributions listed in Author Contributions Website: https://auto-rt.github.io/ Corresponding emails: {keerthanapg, alexirpan}@google.com. Equal contribution. 1" 2401.12965v1,"Workspace Optimization Techniques to Improve Prediction of Human Motion During Human-Robot Collaboration Yi-Shiuan Tung Matthew B. Luebbers yi-shiuan.tung@colorado.edu University of Colorado Boulder Boulder, USA matthew.luebbers@colorado.edu University of Colorado Boulder Boulder, USA Alessandro Roncone Bradley Hayes alessandro.roncone@colorado.edu University of Colorado Boulder, Lab0 Inc. Boulder, USA bradley.hayes@colorado.edu University of Colorado Boulder Boulder, USA ABSTRACT Understanding human intentions is critical for safe and effective human-robot collaboration. While state of the art methods for human goal prediction utilize learned models to account for the uncertainty of human motion data, that data is inherently stochastic and high variance, hindering those models’ utility for interactions requiring coordination, including safety-critical or close-proximity tasks. Our key insight is that robot teammates can deliberately configure shared workspaces prior to interaction in order to reduce the variance in human motion, realizing classifier-agnostic improvements in goal prediction. In this work, we present an algorithmic approach for a robot to arrange physical objects and project “virtual obstacles” using augmented reality in shared human-robot workspaces, optimizing for human legibility over a given set of tasks. We compare our approach against other workspace arrangement strategies using two human-subjects studies, one in a virtual 2D navigation domain and the other in a live tabletop manipulation domain involving a robotic manipulator arm. We evaluate the accuracy of human motion prediction models learned from each condition, demonstrating that our workspace optimization technique with virtual obstacles leads to higher robot prediction accuracy using less training data. CCS CONCEPTS • Computing methodologies → Robotic planning; Planning under uncertainty; • Human-centered computing → Mixed / augmented reality. ACM Reference Format: Yi-Shiuan Tung, Matthew B. Luebbers, Alessandro Roncone, and Bradley Hayes. 2024. Workspace Optimization Techniques to Improve Prediction of Human Motion During Human-Robot Collaboration. In Proceedings of the 2024 ACM/IEEE International Conference on Human-Robot Interaction (HRI ’24), March 11–14, 2024, Boulder, CO, USA. ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/3610977.3635003 Figure 1: Workspace configuration affects the robot’s ability to correctly predict the human’s goal – the blue square cube. Left: The legible path (dotted) requires the human to take a circuitous route while the natural path (solid) is not legible. Right: Our approach generates a workspace configuration by arranging physical objects and projecting “virtual obstacles” in AR (cyan and red barriers), in order to induce naturally legible paths from the human. KEYWORDS motion prediction, human-robot collaboration, environment adaptation, augmented reality, legibility Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. HRI ’24, March 11–14, 2024, Boulder, CO, USA © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 979-8-4007-0322-5/24/03. . . $15.00 https://doi.org/10.1145/3610977.3635003 1 INTRODUCTION In human-robot collaborative tasks, shared mental models between agents enable the awareness and joint understanding required for effective teamwork [32]. With no shared notion of the task to be completed, the inherent stochasticity and opacity of human decision-making makes robot planning difficult [30]. To this end, prior research efforts have focused on developing robots that can predict human behavior [15, 19, 29], generating motion plans to safely interact in a shared environment [11, 26]. However, these methods are limited by the quality of robot predictions of a human collaborator’s intention and resultant behavior. With inaccurate human models or unexpected human behavior diverging from past" 2401.12979v1,"GALA: Generating Animatable Layered Assets from a Single Scan Taeksoo Kim 1 * 1 Shunsuke Saito 2 Byungjun Kim 1 * 2 Seoul National University Hanbyul Joo 1 Codec Avatars Lab, Meta {taeksu98, byungun.kim, hbjoo}@snu.ac.kr shunsukesaito@meta.com https://snuvclab.github.io/gala/ Layered Decomposition and Canonicalization Reposing Novel Human Avatars via Composition Figure 1. GALA. Given a single-layer 3D mesh of a clothed human (left), our approach enables Generation of Animatable Layered Assets for 3D garment transfer and avatar customization in any poses by decomposing and inpainting the geometry and texture of each layer with a pretrained 2D diffusion model in a canonical space. Abstract we propose to leverage the general knowledge of a pretrained 2D diffusion model as geometry and appearance prior for humans and other assets. We first separate the input mesh using the 3D surface segmentation extracted from multi-view 2D segmentations. Then we synthesize the missing geometry of different layers in both posed and canonical spaces using a novel pose-guided Score Distillation Sampling (SDS) loss. Once we complete inpainting high-fidelity 3D geometry, we also apply the same SDS loss to its texture to obtain the complete appearance including the initially occluded regions. Through a series of decomposition steps, we obtain multiple layers of 3D assets in a shared canonical space normalized in terms of poses and human shapes, hence supporting effortless composition to novel identities and reanimation with novel poses. Our experiments demonstrate the effectiveness of our approach for decomposition, canonicalization, and composition tasks compared to existing solutions. We present GALA, a framework that takes as input a single-layer clothed 3D human mesh and decomposes it into complete multi-layered 3D assets. The outputs can then be combined with other assets to create novel clothed human avatars with any pose. Existing reconstruction approaches often treat clothed humans as a single-layer of geometry and overlook the inherent compositionality of humans with hairstyles, clothing, and accessories, thereby limiting the utility of the meshes for down-stream applications. Decomposing a single-layer mesh into separate layers is a challenging task because it requires the synthesis of plausible geometry and texture for the severely occluded regions. Moreover, even with successful decomposition, meshes are not normalized in terms of poses and body shapes, failing coherent composition with novel identities and poses. To address these challenges, * Equal contribution 1" 2401.12993v1,"Estimating the severity of dental and oral problems via sentiment classification over clinical reports Sare Mahdavifar 1 , Seyed Mostafa Fakhrahmad 2* , Elham Ansarifard 3 1 Dept. of Computer Science and Engineering and IT, Shiraz University, Shiraz, Iran, sare.mahdavifar@hafez.shirazu.ac.ir 2 Dept. of Computer Science and Engineering and IT, Shiraz University, Shiraz, Iran, fakhrahmad@shirazu.ac.ir 3 Dept. of Prosthodontics, School of Dentistry, Shiraz University of Medical Sciences, Shiraz, Iran, ansarifard@sums.ac.ir Abstract—Analyzing authors' sentiments in texts as a technique for identifying text polarity can be practical and useful in various fields, including medicine and dentistry. Currently, due to factors such as patients' limited knowledge about their condition, difficulties in accessing specialist doctors, or fear of illness, particularly in pandemic conditions, there might be a delay between receiving a radiology report and consulting a doctor. In some cases, this delay can pose significant risks to the patient, making timely decision-making crucial. Having an automatic system that can inform patients about the deterioration of their condition by analyzing the text of radiology reports could greatly impact timely decision-making. In this study, a dataset comprising 1,134 cone-beam computed tomography (CBCT) photo reports was collected from the Shiraz University of Medical Sciences. Each case was examined, and an expert labeled a severity level for the patient's condition on each document. After preprocessing all the text data, a deep learning model based on Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) network architecture, known as CNN-LSTM, was developed to detect the severity level of the patient's problem based on sentiment analysis in the radiologist's report. The model's performance was evaluated on two datasets, each with two and four classes, in both imbalanced and balanced scenarios. Finally, to demonstrate the effectiveness of our model, we compared its performance with that of other classification models. The results, along with one-way ANOVA and Tukey's test, indicated that our proposed model (CNN-LSTM) performed the best according to precision, recall, and f-measure criteria. This suggests that it can be a reliable model for estimating the severity of oral and dental diseases, thereby assisting patients. radiography are diverse, including informing attending physicians of hidden teeth, diagnosing joint disorders, precisely placing implants, examining the condition of the jaw, sinuses, and nerve canals, diagnosing tumors in the jaw and mouth, assessing bone structure, identifying the source and origin of pain, and guiding surgical interventions. As a result, CBCT imaging, unlike other methods, can reveal a broad spectrum of oral, jaw, and facial issues. Some of these issues require urgent attention, such as the presence of malignant tumors in the mouth and jaw areas, necessitating swift treatment to prevent endangering the person's life. In other cases, there are significant issues that require follow-up and treatment, but the urgency may not be as high, and a delay may not pose a serious risk. The third scenario arises when a problem is identified in CBCT images, which an individual can choose to correct, but there is no compulsion or necessity to do so. For instance, in the upper jaw, the bone depth near the nerve canals and sinus cavities may be low. If the individual decides to implant in that area later on, a sinus lift would be necessary to create more depth and distance. However, since this is not considered a problem or a disease, and the person may choose not to undergo implantation, addressing this matter is not particularly urgent. The fourth scenario is when conditions are entirely normal, and there is no problem requiring treatment or correction. Fig. 1 demonstrates a sample of CBCT images. Keywords—Sentiment Classification, Deep Learning, Document Classification, Machine Learning. I. I NTRODUCTION CBCT radiography is a type of dental imaging that captures three-dimensional images of the teeth, as well as all the bones and soft tissues within the mouth. Analyzing threedimensional CBCT images has become an indispensable procedure for the diagnosis and treatment planning of orthodontic patients [1]. The applications of CBCT * Corresponding author Figure 1. Sample of CBCT images Factors such as patients' lack of knowledge about their conditions, the unavailability of specialist doctors, unfavorable financial conditions, work-related issues, or the fear associated with being in a medical environment" 2401.13026v1,"Liquid-crystal-like dynamic transition in ferroelectric/dielectric superlattices Fernando Gómez-Ortiz, 1, ∗ Mónica Graf, 2, † Javier Junquera, 1 Jorge Íñiguez-González, 2, 3 and Hugo Aramberri 2, ‡ 1 Departamento de Ciencias de la Tierra y Fı́sica de la Materia Condensada, Universidad de Cantabria, Avenida de los Castros s/n 39005 Santander. Spain. 2 Materials Research and Technology Department, Luxembourg Institute of Science and Technology (LIST), Avenue des Hauts-Fourneaux 5, L-4362 Esch/Alzette, Luxembourg 3 Department of Physics and Materials Science, University of Luxembourg, Rue du Brill 41, L-4422 Belvaux, Luxembourg (Dated: January 25, 2024) Nanostructured ferroelectrics display exotic multidomain configurations resulting from the electrostatic and elastic boundary conditions they are subject to. While the ferroelectric domains appear frozen in experimental images, atomistic second-principles studies suggest that they may become spontaneously mobile upon heating, with the polar order melting in a liquid-like fashion. Here we run molecular dynamics simulations of model systems (PbTiO 3 /SrTiO 3 superlattices) to study the unique features of this transformation. Most notably, we find that the multidomain state looses its translational and orientational orders at different temperatures, resembling the behavior of liquid crystals and yielding an intermediate hexatic-like phase. Our simulations reveal the mechanism responsible for the melting and allow us to characterize the stochastic dynamics in the hexatic-like phase: we find evidence that it is thermally activated, with domain reorientation rates that grow from tens of gigahertzs to terahertzs in a narrow temperature window. In ferroelectric/dielectric junctions the development of a homogeneous polarization state is often precluded by the electrostatic penalty associated to the bound charges at the interfaces [1, 2]. A plethora of phases have been observed and predicted in these frustrated systems [3], such as flux-closure domains [4], polar vortices [5], skyrmions [6], merons [7] or the so-called supercrystals [8]. The stabilization of one of them over the others depends on a delicate balance among elastic, electrostatic and gradient energies, which can be finely tuned with the substrate-imposed strain [9, 10], the thickness ratio between the ferroelectric and dielectric layers [1, 11– 14], external electric fields [15], and temperature [16]. The most studied systems in this field are PbTiO 3 /SrTiO 3 superlattices. At high temperatures, they present thermally disordered local dipoles, resembling a liquid phase with no long-range order [17]. Upon cooling, they undergo a phase transition to a multidomain configuration with regions of opposite polarization in order to reduce uncompensated depolarization fields at the interface [18–20]. At low-temperatures these domains are well-defined static regions mediated by domain walls [21], and present long-range order (Fig. 1). Interestingly, at moderate temperatures these domain walls become mobile. The mobility of the domain walls has been previously predicted [17, 22, 23] and is experimentally supported by x-ray diffraction data [17]. In this ∗ gomezortizf@unican.es † Present address: Institute of Physics, Czech Academy of Sciences; Prague, 182 21, Czech Republic ‡ hugo.aramberri@list.lu FIG. 1. (a) Schematic representation of the (PbTiO 3 ) 9 /(SrTiO 3 ) 3 simulation supercell used for the calculations. The domain periodicity, d, amounts to eight unit cells. Green and magenta regions represent positive and negative polarization domains oriented along z as indicated by the solid arrows. (b) (x, z) planar view of the local dipole pattern in a cross-section of the infinite stripes. Two replicas of the supercell along z are shown. Arrows in the dipole patterns represent the projection of the dipoles onto the (x, z) plane, whereas colors refer to the perpendicular dipole component along y. intermediate phase the domain walls adopt meandering patterns [22, 24] and present spontaneous stochastic motion. This phase thus lacks long-range translational order in the plane [25]. At the same time, experimentally reported structure factors of PbTiO 3 ferroelectric films subject to opencircuit-like electrostatic boundary conditions present four- or two-fold symmetry at high temperatures [26, 27], indicating a possible underlying long-range orientational order (i.e. long-range correlations of domain orientation), even in the absence of long-range translational order. Intermediate phases with long-range orientational or-" 2401.13081v1,"Free Form Medical Visual Question Answering in Radiology Abhishek Narayanan 1 Rushabh Musthyala 1 Rahul Sankar 1 Anirudh Prasad Nistala 1 Pranav Singh 2 Jacopo Cirrone 2 3 4 1 Department of Computer Science, Courant Institute of Mathematical Sciences, New York University, New York, USA 2 Center for Data Science, New York University, New York, USA 3 Colton Center for Autoimmunity, NYU Grossman School of Medicine, New York, USA 4 Corresponding Author (E-mail: cirrone@courant.nyu.edu) Abstract medical knowledge. Synthetically generating questionimage pairs is typically inappropriate due to the need for clinical relevance and domain-specific expertise. Additionally, generic VQA models struggle to adapt to medical images. These models require further specialization and the ability to focus on finer details, such as microscopic lesions, crucial for diagnosis. The unrestricted and frequently highly technical nature of the input questions, which may contain medical terminology not adequately represented by generic language models trained on expansive databases like Wikipedia, further increases the complexity of medical VQA. Visual Question Answering (VQA) in the medical domain presents a unique, interdisciplinary challenge, combining fields such as Computer Vision, Natural Language Processing, and Knowledge Representation. Despite its importance, research in medical VQA has been scant, only gaining momentum since 2018. Addressing this gap, our research delves into the effective representation of radiology images and the joint learning of multimodal representations, surpassing existing methods. We innovatively augment the SLAKE dataset, enabling our model to respond to a more diverse array of questions, not limited to the immediate content of radiology or pathology images. Our model achieves a top-1 accuracy of 79.55% with a less complex architecture, demonstrating comparable performance to current state-of-theart models. This research not only advances medical VQA but also opens avenues for practical applications in diagnostic settings. Medical VQA holds immense potential in healthcare, offering valuable support where clinician availability is limited. Given the vast number of queries and the operational scale, it is often challenging for clinicians to address each query promptly. This can lead to delays in addressing critical health inquiries, potentially slowing down the diagnosis of severe conditions with significant consequences. Furthermore, search engine responses, while abundant, tend to be generic, error-prone, irrelevant, and sometimes misleading. This underscores the necessity for an AI system capable of analyzing medical images and providing specific answers to related questions. Such a system could also assist clinicians by offering a secondary opinion on interpreting complex images. 1. Introduction Recent advancements in Visual Question Answering (VQA) in the medical and healthcare sectors have garnered significant interest, building upon extensive research in general, free-form, and open-ended VQA (Lin et al., 2023). Unlike traditional AI agents in medicine, often constrained to specific organs or diseases, a medical VQA system should adeptly handle natural language questions, comprehend medical imagery, and provide diagnostically accurate and reliable responses. In our work, we introduce an enhanced radiology dataset used for the pretraining of domain-specific visual encoders. Our experiments with various deep learning models focus on efficient image and text representation learning. We demonstrate that intra-domain transfer learning is more effective than inter-domain transfer learning for medical VQA tasks. Our proposed method not only matches benchmark accuracy but also has a simpler architectural design. Nevertheless, medical VQA faces unique challenges compared to its generic counterpart. For example, while large-scale annotated datasets like VQA (Al-Sadi et al., 2019) exist for general VQA, medical VQA datasets are smaller, requiring costly expert annotation and specialized 1" 2401.13082v1,"PlaceFormer: Transformer-based Visual Place Recognition using Multi-Scale Patch Selection and Fusion Shyam Sundar Kannan and Byung-Cheol Min Abstract— Visual place recognition is a challenging task in the field of computer vision, and autonomous robotics and vehicles, which aims to identify a location or a place from visual inputs. Contemporary methods in visual place recognition employ convolutional neural networks and utilize every region within the image for the place recognition task. However, the presence of dynamic and distracting elements in the image may impact the effectiveness of the place recognition process. Therefore, it is meaningful to focus on task-relevant regions of the image for improved recognition. In this paper, we present PlaceFormer, a novel transformer-based approach for visual place recognition. PlaceFormer employs patch tokens from the transformer to create global image descriptors, which are then used for image retrieval. To re-rank the retrieved images, PlaceFormer merges the patch tokens from the transformer to form multi-scale patches. Utilizing the transformer’s self-attention mechanism, it selects patches that correspond to task-relevant areas in an image. These selected patches undergo geometric verification, generating similarity scores across different patch sizes. Subsequently, spatial scores from each patch size are fused to produce a final similarity score. This score is then used to re-rank the images initially retrieved using global image descriptors. Extensive experiments on benchmark datasets demonstrate that PlaceFormer outperforms several state-of-the-art methods in terms of accuracy and computational efficiency, requiring less time and memory. I. I NTRODUCTION Visual Place Recognition (VPR) is a critical task for localizing autonomous vehicles and robots navigating through dynamic environments, relying on visual input such as images or videos. Visual place recognition is defined as an image retrieval problem [1], where a query image from an unknown location is compared with a database of reference images from known locations in order to localize the query image. The location of the query image is estimated by identifying the closest matching image in the reference image database. This task is challenging due to variations in seasons, illumination, viewpoint, and occlusions. Typically, two types of image representations are used in VPR tasks: global and patch-level descriptors. Global descriptors [2]–[4] provide a succinct image representation in a single vector, facilitating efficient large-scale searches. Patch-level or local descriptors [5]–[7] encode details about specific regions or key points of the image and are used for performing geometric verification between image pairs. To enhance performance, VPR is commonly executed in two distinct phases. Initially, a global retrieval is conducted The authors are with SMART Lab, Department of Computer and Information Technology, Purdue University, West Lafayette, IN 47907, USA kannan9@purdue.edu | minb@purdue.edu The code for PlaceFormer will be made publicly available after it is published. Query Image Reference Image Fig. 1. PlaceFormer leverages patches of varying scales achieved through the fusion of patch tokens in the vision transformer. From these fused patches, key patches (boxes of different colors) are selectively chosen based on the attention scores from the transformer corresponding to that patch. The model then estimates correspondences between key patches of different scales in both the query and reference images which is used for the image retrieval process. by employing a nearest-neighbor search between the query image’s global descriptors and those of the reference images. Subsequently, using the patch descriptors, re-ranking is conducted on the top-k candidate images acquired during the global retrieval process. Re-ranking is typically achieved through cross-matching the patch descriptors of both the query and the reference images, followed by a subsequent geometric verification step. However, the larger size of patch descriptors, which usually encode all regions of an image, can slow down and prolong the re-ranking process. Therefore, it is crucial to extract only the task-relevant regions to facilitate the re-ranking step efficiently. Contemporary VPR methods rely on Convolutional Neural Networks (CNNs) to extract both global and local image descriptors. In VPR applications, the visual characteristics of a location can undergo significant changes over the long term, including alterations caused by factors such as daynight illumination, falling leaves, and snow. Therefore, a comprehensive grasp of the image’s global context is crucial for successful VPR. Nevertheless, CNNs, with their limited receptive fields, are not inherently adept at capturing this global context. Vision Transformers [8], on the contrary, addresses this CNN limitation by introducing pair-wise attention mechanisms that can capture relationships between any pair of locations within an image. This innovative approach allows the transformer’s patch tokens to encode not only local information but also vital global context, enhancing its suitability for VPR tasks. In this paper, we propose PlaceFormer, a novel approach that harnesses the potential of vision transformers to extract robust image representations specifically designed for visual place recognition. The global retrieval process" 2401.13083v1,"Generalized Models for Inflationary Preheating: Oscillations and Symmetries Leia Barrowes, 1, ∗ Fred C. Adams, 1, 2, † Anthony M. Bloch, 3, ‡ and Scott Watson 4, § 1 2 3 Physics Department, University of Michigan, Ann Arbor, MI 48109, USA Astronomy Department, University of Michigan, Ann Arbor, MI 48109, USA Mathematics Department, University of Michigan, Ann Arbor, MI 48109, USA 4 Department of Physics, Syracuse University, Syracuse, NY 13244, USA Abstract The paradigm of the inflationary universe provides a possible explanation for several observed cosmological properties. In order for such solutions to be successful, the universe must convert the energy stored in the inflaton potential into standard model particles through a process known as reheating. In this paper, we reconsider the reheating process for the case where the inflaton potential respects an approximate (but spontaneously broken) conformal symmetry during the reheating epoch. After reviewing the Effective Field Theory of Reheating, we present solutions for the nonlinear oscillations of the inflaton field, derive the corresponding Hill’s equation for the coupled reheating field, and determine the stability diagram for parametric resonance. For this class of models — the simplest realization being a scalar field with a quartic term — the expansion of the universe drives the coupled field toward a more unstable part of parameter space, in contrast to the standard case. We also generalize this class of models to include quadratic breaking terms in the potential during the reheating epoch and address the process of stability in that universality class of models. ∗ Electronic address: barrowes@umich.edu † Electronic address: fca@umich.edu ‡ Electronic address: abloch@umich.edu § Electronic address: gswatson@syr.edu 1" 2401.13085v1,"IndiText Boost: Text Augmentation for Low Resource India Languages Onkar Litake ∗ , Niraj Yagnik ∗ and Shreyas Labhsetwar ∗ Department of Computer Science and Engineering University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, USA {olitake, nyagnik, slabhsetwar}@ucsd.edu Abstract Text Augmentation is an important task for lowresource languages. It helps deal with the problem of data scarcity. A data augmentation strategy is used to deal with the problem of data scarcity. Through the years, much work has been done on data augmentation for the English language. In contrast, very less work has been done on Indian languages. This is contrary to the fact that data augmentation is used to deal with data scarcity. In this work, we focus on implementing techniques like Easy Data Augmentation, Back Translation, Paraphrasing, Text Generation using LLMs, and Text Expansion using LLMs for text classification on different languages. We focus on 6 Indian languages namely: Sindhi, Marathi, Hindi, Gujarati, Telugu, and Sanskrit. According to our knowledge, no such work exists for text augmentation on Indian languages. We carry out binary as well as multi-class text classification to make our results more comparable. We get surprising results as basic data augmentation techniques surpass LLMs. 1 been done over the years on data augmentation for the English language. Indian languages, on the other hand, have received very little research. In this project, we are going to work on data augmentation for Indian languages. This project stems from the motivation that no such work is carried out in the past. We are going to implement existing approaches for data augmentation like Easy Data Augmentation, Back Translation, Paraphrasing, Document Generation, etc. We plan on making some changes to these existing methods to tailor them specifically for Indian languages. This work will be helpful in a lot of NLP tasks like News Classification, Hate Detection, Emotion Analysis, Sentiment Analysis, and Spam Classification. All these tasks currently face the problem of data scarcity, which will be solved by our project. We aim to provide different methods for Data Augmentation. The user can implement different techniques and select what works best for the given use case. Hence the outcome of our research work is: • Implementing different data augmentation techniques. Introduction Data Augmentation is a process in NLP that enables us to artificially increase the training data size by generating various versions of the real data. Different downstream tasks require different data augmentation methods. We focus on data augmentation for text classification. To perform better on the classification task, the data must be changed such that it maintains the class categories. The size of the training data is expanded through data augmentation, which enhances model performance. The model performs better the more data we have. The distribution of the generated augmented data should neither be too similar nor too different from the original. The problem of data scarcity is addressed using the data augmentation strategy. A lot of work has ∗ * indicates equal contribution • Comparing all the methods to establish a baseline. 2 Related Work Data augmentation has been extensively researched in the field of Natural Language Processing (NLP) as a valuable approach to address the lack of training data (Feng et al., 2021). One prominent technique, introduced by (Sennrich et al., 2015), is back translation, which enhances the performance of machine translation (MT) measured by BLEU scores (Papineni et al., 2002). This method involves translating sentences into a different language and then translating them back into the original language, thereby augmenting the original text. (Fadaee et al., 2017) present a data augmentation method specifically designed for low-frequency" 2401.13094v1,"Submitted to Bernoulli On cross-validated estimation of skew normal model J I A N Z H A NG 1,a and TO NG WA NG 2,b 1 School of Mathematics, Statistics and Actuarial Science, University of Kent, Canterbury, Kent CT2 7NF, United Kingdom, a J.Zhang-79@kent.ac.uk 2 Novatis Pharmaceuticals UK, The WestWorks, London W12 7FQ, United Kingdom , b ianwang1009@gmail.com Skew normal model suffers from inferential drawbacks, namely singular Fisher information in the vicinity of symmetry and diverging of maximum likelihood estimation. To address the above drawbacks, Azzalini and Arellano- Valle (2013) introduced maximum penalised likelihood estimation (MPLE) by subtracting a penalty function from the log-likelihood function with a pre-specified penalty coefficient. Here, we propose a cross-validated MPLE to improve its performance when the underlying model is close to symmetry. We develop a theory for MPLE, where an asymptotic rate for the cross-validated penalty coefficient is derived. We further show that the proposed cross-validated MPLE is asymptotically efficient under certain conditions. In simulation studies and a real data application, we demonstrate that the proposed estimator can outperform the conventional MPLE when the model is close to symmetry. Keywords: multifold cross-validation; skew normal distribution; maximum penalised likelihood estimator; asymptotics 1. Introduction Skewness, which measures the asymmetry of a distribution, is an important data feature to characterise. Change of data skewness can serve as a basis for detecting an attack upon a sensor network, for providing an early warning for abrupt climate changes, for estimating aggregates of small domain business, for modelling equity excess returns, for characterising sensitivity of anti-cancer drugs, among others (Buttyan et al., 2006, Colacito. et al., 2016, Dhar et al., 1996, Ferrante and Pacei, 2017, He et al., 2013). For example, in cancer research, people are interested in charaterising drug sensitivity and development of novel therapeutics. The data considered in this study consist of the measurements of median inhibition concentrations, IC50s, of 227 drugs in 111 cancer cell lines (Iorio et al., 2016). IC50 is a measure of how much drug is needed to inhibit the multiplication of that cell line by 50%. The log-IC50 informs the drug sensitivity against cancer cells. The location, dispersion and skewness parameters of the log-IC50 can be used to search for a combined drug therapy. For example, histogram plots for log- IC50s of drugs Erlotinib and Paclitaxel in Figure 1 demonstrate that these two drugs have contrasting data features, one has positive drug response and the other has negative response (i.e., drug resistance). Erlotinib is an inhibitor of the epidermal growth factor receptor (EGFR) tyrosine kinase pathway while Paclitaxel is a chemotherapy drug. Cancer stem cells are often enriched after chemotherapy and induce tumor recurrence, which poses a significant clinical challenge. Combining Erlotinib with Paclitaxel can overcome paclitaxel-resistant cervical cancer (Lv et al., 2019). By introducing a shape parameter 𝛼 in a normal distribution, the skew-normal and more generally, skew symmetry distributions, can provide a better fit for asymmetric data than does the normal ((Azzalini, 1985)). Because of their appealing mathematical properties and usefulness in practice, skewnormal distributions have received considerable attention in the past two decades. Extensions have been made in various directions, including multivariate skew-normal, skew 𝑡- and skew elliptical distributions and finite mixtures of skew normals (Azzalini and Capitanio, 1999, 2003, 2014, Lin, 2009, 1" 2401.13127v1,"Generalization of Heterogeneous Multi-Robot Policies via Awareness and Communication of Capabilities † Pierce Howell 1∗ , Max Rudolph 2∗ , Reza Torbati 1 , Kevin Fu 1 , Harish Ravichandar 1 1 Georgia Institute of Technology, 2 University of Texas at Austin Email: pierce.howell@gatech.edu Abstract: Recent advances in multi-agent reinforcement learning (MARL) are enabling impressive coordination in heterogeneous multi-robot teams. However, existing approaches often overlook the challenge of generalizing learned policies to teams of new compositions, sizes, and robots. While such generalization might not be important in teams of virtual agents that can retrain policies on-demand, it is pivotal in multi-robot systems that are deployed in the real-world and must readily adapt to inevitable changes. As such, multi-robot policies must remain robust to team changes – an ability we call adaptive teaming. In this work, we investigate if awareness and communication of robot capabilities can provide such generalization by conducting detailed experiments involving an established multi-robot test bed. We demonstrate that shared decentralized policies, that enable robots to be both aware of and communicate their capabilities, can achieve adaptive teaming by implicitly capturing the fundamental relationship between collective capabilities and effective coordination. Videos of trained policies can be viewed at https://sites.google.com/view/cap-comm. Keywords: Heterogeneity, Multi-Robot Teaming, Generalization 1 Introduction Heterogeneous robot teams have the potential to address complex real-world challenges that arise in a wide range of domains, such as precision agriculture, defense, warehouse automation, supply chain optimization, and environmental monitoring. However, a key hurdle in realizing such potential is the challenge of ensuring effective communication, coordination, and control. Existing approaches to address the challenges of multi-robot systems can be crudely categorized into two groups. First, classical approaches use well-understood controllers with simple local interaction rules, giving rise to complex global emergent behavior [1]. Indeed, such controllers have proven extraordinarily useful in diverse domains. However, designing them requires both significant technical expertise and considerable domain knowledge. Second, recent learning-based approaches alleviate the need for expertise and domain knowledge by leveraging advances in learning frameworks and computational resources. Learning has been successful in many domains, such as video games [2], autonomous driving [3], disaster response [4], and manufacturing [5]. However, learning approaches are not without their fair share of limitations. First, the majority of existing methods focus on homogeneous teams and, as such, cannot handle heterogeneous multi-robot teams. Second, and more importantly, even existing methods designed for heterogeneous teams are often solely concerned with the challenge of learning to coordinate a given team, entirely ignoring the challenge of generalizing the learned behavior to new teams. Given the potentially prohibitive cost of retraining coordination policies after deployment in real-world settings, it is imperative that multi-robot policies generalize learned behaviors to inevitable changes to the team. In this work, we focus on the challenge of generalizing multi-robot policies to team changes. In particular, we focus on generalization of trained policies to teams of new compositions, sizes, and ∗ Equal Contribution. † This work was supported in part by the Army Research Lab under Grants W911NF- 17-2-0181 and W911NF-20-2-0036 7th Conference on Robot Learning (CoRL 2023), Atlanta, USA." 2401.13133v1,"Proc. of the International Conference on Computing and Advances in Information Technology (ICCAIT 2023) 21-23 November 2023, Ahmadu Bello University, Zaria, Nigeria Analyzing COVID-19 Vaccination Sentiments in Nigerian Cyberspace: Insights from a Manually Annotated Twitter Dataset Ibrahim Said Ahmad Lukman Jibril Aliyu Auwal Abubakar Khalid Saminu Muhammad Aliyu Northeastern University Boston, USA isab7070@gmail.com HausaNLP Kano, Nigeria lukman.j.aliyu@gmail.com Bayero University Kano, Nigeria aka2000078.mcs@buk.edu.ng Bayero University Kano, Nigeria smaliyu.cs@buk.edu.ng Shamsuddeen Hassan Muhammad University of Porto Porto, Portugal shamsuddeen2004@gmail.com Idris Abdulmumin Ahmadu Bello University Zaria, Nigeria iabdulmumin@abu.edu.ng Bala Mairiga Abduljalil Bello Shehu Bello University Of Maiduguri Borno, Nigeria ballaabduljalil@gmail.com Bayero University Kano, Nigeria bsbello.cs@buk.edu.ng Amina Imam Abubakar University of Abuja Abuja, Nigeria aminaImamabubakar@gmail.com Abstract—Numerous successes have been achieved in combating the COVID-19 pandemic, initially using various precautionary measures like lockdowns, social distancing, and the use of face masks. More recently, various vaccinations have been developed to aid in the prevention or reduction of the severity of the COVID-19 infection. Despite the effectiveness of the precautionary measures and the vaccines, there are several controversies that are massively shared on social media platforms like Twitter. In this paper, we explore the use of state-of-the-art transformer-based language models to study people’s acceptance of vaccines in Nigeria. We developed a novel dataset by crawling multi-lingual tweets using relevant hashtags and keywords. Our analysis and visualizations revealed that most tweets expressed neutral sentiments about COVID- 19 vaccines, with some individuals expressing positive views, and there was no strong preference for specific vaccine types, although Moderna received slightly more positive sentiment. We also found out that fine-tuning a pre-trained LLM with an appropriate dataset can yield competitive results, even if the LLM was not initially pre-trained on the specific language of that dataset. Index Terms—Covid-19, Vaccination, Sentiment Analysis, Natural Language Processing, Large Language Models I. I NTRODUCTION Over the last decade, social media has provided abundant data that researchers often utilized to derive insights into people’s sentiments. As such, several research areas have emerged relying on social media data, including sentiment analysis, emotion detection, stance detection and social network analysis [1]. In this research, we explored the use of tweets in Nigerian cyberspace for the prediction of people’s opinions towards the COVID-19 vaccine. This approach is Funding received from HausaNLP and Arewa Data Science Academy. practical because it allows for real-time feedback, is costeffective, provides a large reach, offers unfiltered opinions, and enables trend analysis. The COVID-19 pandemic is a global health crisis caused by the spread of the novel coronavirus SARS-CoV-2 [2]. It has had far-reaching and profound impacts on societies, economies, healthcare systems, and daily life worldwide. The pandemic had a significant impact on public health and society at large, necessitating the rapid development and distribution of vaccines to combat the virus. While the availability of vaccines is crucial, so too is public sentiment towards them [3]–[5]. In Nigeria, social media platforms such as Twitter have played a crucial role in shaping public discourse around COVID-19 [6], [7]. As such, the discussions on Twitter provide crucial data that can be used to study COVID-19 vaccination in Nigeria. Therefore, we crawl tweets in the Nigerian cyberspace using the discontinued Twitter Academic API 1 from 1st November 2020 to 30th June 2022 using COVID-19 vaccine keywords. A total of 5200 tweets were collected. We preprocessed the tweets by removing URLs, tweets with less than three words, and tweets not in Latin characters, so the tweets were reduced to 4320. Therefore 4,320 tweets were manually annotated by three (3) independent annotators. We conducted exploratory data analysis to derive insights from the dataset. The results of the analysis reveal that the majority of Nigerians either believe that vaccines are secure and life-saving or hold a neutral stance on the vaccines, while a smaller fraction of Nigerians have expressed con- 1 https://www.cnn.com/2023/04/05/tech/academic-researchers-blast-Twitter-paywall/ index.html" 2401.13151v1,"Splitting Instability in Superalloys: A Phase-Field Study Tushar Jogi a,d,∗ , Saurav Shenoy a,e , R. Sankarasubramanian b , Abhik Choudhury c , Saswata Bhattacharyya a,∗ a Department of Materials Science and Metallurgical Engineering, Indian Institute of Technology Hyderabad, Kandi, Sangareddy, Telangana, India - 502285 b Defence Metallurgical Research Laboratory, Kanchanbagh, Hyderabad, India - 500058 c Department of Materials Engineering, Indian Institute of Science, Bangalore, Karnataka, India - 560012 d Materials Informatics and Data Science, Interdisciplinary Centre for Advanced Materials Simulations, Ruhr-Universität Bochum, Universitätstrasse 150, 44809 Bochum, Germany e Department of Materials Science and Engineering and the Materials Research Institute, The Pennsylvania State University, University Park, PA 16802, USA Abstract Precipitation-strengthened alloys, such as Ni-base, Co-base and Fe-base superalloys, show the development of dendrite-like precipitates in the solid state during aging at near-γ ′ solvus temperatures. These features arise out of a diffusive instability wherein, due to the point effect of diffusion, morphological perturbations over a growing sphere/cylinder are unstable. These dendrite-like perturbations exhibit anisotropic growth resulting from anisotropy in interfacial/elastic energies. Further, microstructures in these alloys also exhibit “split” morphologies wherein dendritic precipitates fragment beyond a critical size, giving rise to a regular octet or quartet pattern of near-equal-sized precipitates separated by thin matrix channels. The mechanism of formation of such morphologies has remained a subject of intense investigation, and multiple theories have been proposed to explain their occurrence. Here, we developed a phase-field model incorporating anisotropy in elastic and interfacial energies to investigate the evolution of these split microstructures during growth and coarsening of dendritic γ ′ precipitates. Our principal finding is that the reduction in elastic energy density drives the development of split morphology, albeit a concomitant increase in the surface energy density. We also find that factors such as supersaturation, elastic misfit, degree of elastic anisotropy and interfacial energy strongly modulate the formation of these microstructures. We analyze our simulation results in the light of classical theories of elastic stress effects on coarsening and prove that negative elastic interaction energy leads to the stability of split precipitates. Keywords: phase-field, superalloy, microstructural evolution 1. Introduction Solid-state precipitation of elastically coherent phases gives rise to interesting dynamical patterns with an inherent self-organization of the precipitates during microstructure evolution. This phenomenon is due to the ∗ Corresponding authors Email addresses: tushar.jogi@rub.de (Tushar Jogi), saswata@msme.iith.ac.in (Saswata Bhattacharyya) Preprint submitted to Acta Materialia January 25, 2024" 2401.13168v1,"Policies for multiplexed quantum repeaters: theory and practical performance analysis Stav Haldar, 1, ∗ Pratik J. Barge, 1, † Xiang Cheng, 2, ‡ Kai-Chi Chang, 2, § Brian T. Kirby, 3, 4, ¶ Sumeet Khatri, 5, ∗∗ Chee Wei Wong, 2, †† and Hwang Lee 1, ‡‡ 1 Hearne Institute for Theoretical Physics, Department of Physics and Astronomy, Louisiana State University, Baton Rouge, Louisiana 70803, USA 2 Fang Lu Mesoscopic Optics and Quantum Electronics Laboratory, Department of Electrical and Computer Engineering, University of California, Los Angeles, California 90095, USA 3 DEVCOM Army Research Laboratory, Adelphi, MD 20783, USA 4 Tulane University, New Orleans, LA 70118, USA 5 Dahlem Center for Complex Quantum Systems, Freie Universität Berlin, 14195 Berlin, Germany (Dated: January 25, 2024) Future quantum networks will have nodes equipped with multiple quantum memories, providing the possibility to perform multiplexing and distillation strategies in order to increase fidelities and reduce waiting times for end-to-end entanglement distribution. In this paper, we introduce two policies that adapt the well-known swap-as-soon-as-possible (swap-asap) policy to multiplexed quantum repeater chains. Unlike the usual, fully local swap-asap policy, these policies are “quasi-local”, making effective use of knowledge of the states of the repeaters along the chain to optimize waiting times and end-to-end fidelities. Our policies also make use of entanglement distillation. We demonstrate via simulations one of our key findings, which is that these policies can outperform the well-known and widely studied nested purification and doubling swapping policy in practically relevant parameter regimes. Our work also provides the tools to carefully examine the role of entanglement distillation. We identify the parameter regimes in which performing distillation makes sense and is useful. In these regimes, we also address the question: “Should we distill before swapping, or vice versa?” We thus formalize the trade-off between the advantages of adding distillation capabilities to quantum networks against their technological and practical challenges. Finally, to provide further practical guidance, we propose an experimental implementation of a multiplexing-based linear network, and experimentally demonstrate the key element, a high-dimensional biphoton frequency comb (BFC). We then evaluate the anticipated performance of our multiplexing-based policies in such a real-world network through simulation results for two concrete memory platforms, namely rare-earth ions and diamond vacancies. I. INTRODUCTION The quantum internet [1–3] has the potential to revolutionize current computation, communication, and sensing technologies by enabling exchange of quantum data. Numerous significant applications have already been recognized, encompassing areas such as secure quantum communication [4, 5], distributed quantum computation [6, 7], and distributed quantum sensing [8–10], to name a few. However, enormous hardware improvements are needed before a practical quantum internet is realized [11, 12]. Currently, a significant challenge lies in effectively distributing entanglement amongst network nodes, particularly over significant distances. Recent, state-of-the-art experiments have been performed for only a handful of nodes over short distances [13, 14]. This challenge stems from the delicate nature of quantum systems, leading to issues like photon losses, imperfect measurements, and quantum memories with short coherence times. Since comprehensive, fault-tolerant ∗ hstav1@lsu.edu † pbarge1@lsu.edu ‡ chengxiang@ucla.edu § uclakcchang@g.ucla.edu ¶ brian.t.kirby4.civ@army.mil ∗∗ sumeet.khatri@fu-berlin.de †† cheewei.wong@ucla.edu ‡‡ hwlee@lsu.edu quantum error correction has yet to be realized to overcome these obstacles, it becomes important to explore how much we can overcome these limitations through other means. This problem of designing effective protocols for entanglement distribution using noisy, imperfect quantum hardware has been addressed in multiple analytical [15–33] and numerical [34–43] studies, among others; see also Refs. [44–50] for reviews. In the context of entanglement distribution in quantum repeater chains, the “single-channel” approach has been commonly studied. In the single-channel setting, every repeater is connected via a single channel to each of its two neighbors, with a single quantum memory at the endpoint of each channel. These channels are used to create elementary links of entangled qubit pairs between the neighboring nodes. Then, using a particular policy for performing probabilistic entanglement-swapping operations [51, 52], the elementary links are transformed into a virtual link between the two end nodes of the repeater chain, which can be further used for exchanging quantum information via the quantum teleportation protocol [51]. Noise and loss along the channels, along with quantum memories with short coherence times, result in long waiting times and/or low fidelities of the end-to-end entangled links. In this work, we look at the multiplexing approach [17] as a potential method for reducing the overall waiting time for entanglement generation in linear networks and increasing the fidelity of end-to-end entangled links; see Fig. 1. In a multiplexing protocol, every repeater contains multiple memories, which are connected by multiple channels, as shown in" 2401.13169v1,"A Repository-Level Dataset For Detecting, Classifying and Repairing Software Vulnerabilities Xinchen Wang Ruida Hu Cuiyun Gao 200111115@stu.hit.edu.cn Harbin Institute of Technology, Shenzhen China 200111107@stu.hit.edu.cn Harbin Institute of Technology, Shenzhen China gaocuiyun@hit.edu.cn Harbin Institute of Technology, Shenzhen China Xin-Cheng Wen Yujia Chen Qing Liao xiamenwxc@foxmail.com Harbin Institute of Technology, Shenzhen China yujiachen@stu.hit.edu.cn Harbin Institute of Technology, Shenzhen China liaoqing@hit.edu.cn Harbin Institute of Technology, Shenzhen China ABSTRACT KEYWORDS Open-Source Software (OSS) vulnerabilities bring great challenges to the software security and pose potential risks to our society. Enormous efforts have been devoted into automated vulnerability detection, among which deep learning (DL)-based approaches have proven to be the most effective. However, the performance of the DL-based approaches generally relies on the quantity and quality of labeled data, and the current labeled data present the following limitations: (1) Tangled Patches: Developers may submit code changes unrelated to vulnerability fixes within patches, leading to tangled patches. (2) Lacking Inter-procedural Vulnerabilities: The existing vulnerability datasets typically contain function-level and file-level vulnerabilities, ignoring the relations between functions, thus rendering the approaches unable to detect the inter-procedural vulnerabilities. (3) Outdated Patches: The existing datasets usually contain outdated patches, which may bias the model during training. To address the above limitations, in this paper, we propose an automated data collection framework and construct the first repository-level high-quality vulnerability dataset named ReposVul. The proposed framework mainly contains three modules: (1) A vulnerability untangling module, aiming at distinguishing vulnerabilityfixing related code changes from tangled patches, in which the Large Language Models (LLMs) and static analysis tools are jointly employed. (2) A multi-granularity dependency extraction module, aiming at capturing the inter-procedural call relationships of vulnerabilities, in which we construct multiple-granularity information for each vulnerability patch, including repository-level, file-level, function-level, and line-level. (3) A trace-based filtering module, aiming at filtering the outdated patches, which leverages the file path trace-based filter and commit time trace-based filter to construct an up-to-date dataset. The constructed repository-level ReposVul encompasses 6,134 CVE entries representing 236 CWE types across 1,491 projects and four programming languages. Thorough data analysis and manual checking demonstrate that ReposVul is high in quality and alleviates the problems of tangled and outdated patches in previous vulnerability datasets. Open-Source Software, Software Vulnerability Datasets, Data Quality Xinchen Wang and Ruida Hu contributed equally to this work. Corresponding author: Cuiyun Gao. 1 INTRODUCTION In recent years, with the increasing size and complexity of Open- Source Software (OSS), the impact of OSS vulnerabilities has also amplified and can cause great losses to our society. For example, Cisco discovered a security vulnerability in the WebUI, identified as CVE-2023-20198 [1] in 2023. This vulnerability allowed unauthorized remote attackers to gain elevated privileges. Currently, over 41,000 related devices have been compromised, resulting in great losses for enterprises. Identifying vulnerabilities in an accurate and timely manner is beneficial for mitigating the potential risks, and has gained intense attention from industry and academia. The existing vulnerability detection methods can be coarsely grouped into two categories: program analysis-based methods [2–5] and deep learning (DL)-based methods [6–9], among which DL-based methods have proven to be more effective. Despite the success of the DL-based methods, their performance tends to be limited by the trained vulnerability datasets. For example, Croft et al. [10] find that the widely-used vulnerability datasets such as Devign [11] and BigVul [12] contain noisy, incomplete and outdated data. The lowquality data may bias the model training and evaluation process. Therefore, a high-quality real-world vulnerability dataset is important yet under-explored for the vulnerability detection task. In the paper, we focus on building the high-quality dataset by mitigating the following limitations of the existing datasets: (1) Tangled Patches: Vulnerability patches may contain vulnerabilityfixing unrelated code changes, resulting in tangled patches. Existing datasets [11–13] generally consider all the code changes in one patch submission related to the vulnerabilities, introducing natural data noise. For the example shown in Figure 1(a), the patch from CVE-2012-0030 includes the code change about path modification, in which the request path parameter of the function webob.Request.blank() has been changed (Lines 2-3). Such vulnerability-unrelated changes may be concerned with code refactoring or new feature implementation, and are hard to be distinguished. Therefore, identifying vulnerability-fixing related files from multiple files in one patch presents a challenge." 2401.13171v1,"Published as a conference paper at ICLR 2024 C OMPOSITIONAL G ENERATIVE I NVERSE D ESIGN Tailin Wu 1∗† , Takashi Maruyama 2∗ , Long Wei 1∗ , Tao Zhang 1∗ , Yilun Du 3∗ , Gianluca Iaccarino 4 , Jure Leskovec 5 1 Dept. of Engineering, Westlake University, 2 NEC Laboratories Europe, 3 Dept. of Computer Science, MIT, 4 Dept. of Mechanical Engineering, Stanford University, 5 Dept. of Computer Science, Stanford University wutailin@westlake.edu.cn, Takashi.Maruyama@neclab.eu, weilong@westlake.edu.cn,zhangtao@westlake.edu.cn, yilundu@mit.edu jops@stanford.edu, jure@cs.stanford.edu A BSTRACT Inverse design, where we seek to design input variables in order to optimize an underlying objective function, is an important problem that arises across fields such as mechanical engineering to aerospace engineering. Inverse design is typically formulated as an optimization problem, with recent works leveraging optimization across learned dynamics models. However, as models are optimized they tend to fall into adversarial modes, preventing effective sampling. We illustrate that by instead optimizing over the learned energy function captured by the diffusion model, we can avoid such adversarial examples and significantly improve design performance. We further illustrate how such a design system is compositional, enabling us to combine multiple different diffusion models representing subcomponents of our desired system to design systems with every specified component. In an N-body interaction task and a challenging 2D multi-airfoil design task, we demonstrate that by composing the learned diffusion model at test time, our method allows us to design initial states and boundary shapes that are more complex than those in the training data. Our method outperforms state-of-theart neural inverse design method by an average of 41.5% in prediction MAE and 14.3% in design objective for the N-body dataset and discovers formation flying to minimize drag in the multi-airfoil design task. Project website and code can be found at https://github.com/AI4Science-WestlakeU/cindm. 1 I NTRODUCTION The problem of inverse design – finding a set of high-dimensional design parameters (e.g., boundary and initial conditions) for a system to optimize a set of specified objectives and constraints, occurs across many engineering domains such as mechanical, materials, and aerospace engineering, with important applications such as jet engine design (Athanasopoulos et al., 2009), nanophotonic design (Molesky et al., 2018), shape design for underwater robots (Saghafi & Lavimi, 2020), and battery design (Bhowmik et al., 2019). Such inverse design problems are extremely challenging since they typically involve simulating the full trajectory of complicated physical dynamics as an inner loop, have high-dimensional design space, and require out-of-distribution test-time generalization. Recent deep learning has made promising progress for inverse design. A notable work is by Allen et al. (2022), which addresses inverse design by first learning a neural surrogate model to approximate the forward physical dynamics, and then performing backpropagation through the full simulation trajectory to optimize the design parameters such as the boundary shape. Compared with standard sampling-based optimization methods with classical simulators, it shows comparable and sometimes better performance, establishing deep learning as a viable technique for inverse design. However, an underlying issue with backpropagation with surrogate models is over-optimization – as learned models have adversarial minima, excessive optimization with respect to a learned forward model leads to adversarial design parameters which lead to poor performance (Zhao et al., 2022). ∗ Equal contribution. † Corresponding author. 1" 2401.13184v1,"Research Article Kai Schwennicke, Noel C. Giebink, and Joel Yuen-Zhou* Extracting accurate light-matter couplings from disordered polaritons Abstract: The vacuum Rabi splitting (VRS) in molecular polaritons stands as a fundamental measure of collective light-matter coupling. Despite its significance, the impact of molecular disorder on VRS is not fully understood yet. This study delves into the complexities of VRS amidst various distributions and degrees of disorder. Our analysis provides precise analytical expressions for linear absorption, transmission, and reflection spectra, along with a “sum” rule, offering a straightforward protocol for extracting accurate collective light-matter coupling values from experimental data. Importantly, our study cautions against directly translating large VRS to the onset of ultrastrong coupling regime. Furthermore, for rectangular disorder, we witness the emergence of narrow side bands alongside a broad central peak, indicating an extended coherence lifetime even in the presence of substantial disorder. These findings not only enhance our understanding of VRS in disordered molecular systems but also open avenues for achieving prolonged coherence lifetimes between the cavity and molecules via the interplay of collective coupling and disorder. Keywords: molecular polaritons; strong light-matter coupling; disorder 1 Introduction In the realm of molecular polaritons, the phenomenon of vacuum Rabi splitting (VRS) stands as an established metric for gauging the strength of collective light-matter coupling. Traditionally, this interaction is classified into several regimes: weak, strong, ultra- *Corresponding author: Joel Yuen-Zhou, Department of Chemistry and Biochemistry, University of California San Diego, La Jolla, CA 92093, USA, E-mail: joelyuen@ucsd.edu. https://orcid.org/0000-0002-8701-8793 Kai Schwennicke, Department of Chemistry and Biochemistry, University of California San Diego, La Jolla, CA 92093, USA, E- mail: kschwenn@ucsd.edu. Noel C. Giebink, Department of Electrical Engineering and Computer Science, and Physics, University of Michigan, Ann Arbor, Michigan, 48109, USA, E-mail: ngiebink@umich.edu. https://orcid.org/0000-0002-3798-5830 strong, and deep-strong [1]. In particular, molecular polaritons are often observed in the realm of strong coupling, with a wide range of potential applications such as catalysis [2–5], exciton transport [6–11], and Bose-Einstein condensation [12–14]. While reaching the ultrastrong coupling regime remains experimentally challenging, there are a number of experiments that have pushed the limits of molecular systems into this intriguing regime [15–18]. In the idealized scenario of 𝑁 identical molecules strongly coupled to a single photonic √ mode, the magnitude of VRS scales linearly with 𝑁 [19, 20]. However, the inherent complexity of molecular ensembles introduces a compelling challenge, as molecular disorder becomes an inescapable feature. Molecular disorder exerts a profound influence on various aspects of polariton physics, including transport [7, 8, 10, 21–25], photoconductivity [26], photoreactivity [27], and vibropolaritonic chemistry [28]. Surprisingly, even though the effects of disorder where theoretically studied early on [29–32], the effects of disorder on VRS splitting are still a debate within the community. Early explorations by Houdré et al. [31] suggested that disorder (or inhomogeneous broadening) should have no impact on the size of the splitting. However, these conclusions have been contested in recent investigations [8, 33–38] which note that disorder can both enhance and suppress the VRS. In this article, we revisit the problem of VRS and disorder, embarking on a comprehensive study of linear absorption 𝐴, transmission 𝑇 , and reflection 𝑅 properties of molecular polaritons, considering various distributions and magnitudes of disorder. Our aim is not only to elucidate the intricate interplay between molecular disorder and VRS, but also to provide a robust method for accurately extracting light-matter coupling parameters. Our findings align with recent reports, demonstrating that VRS tends to increase with disorder, reaches a saturation point, and eventually decreases to zero for a wide range of disorder distributions. Note that 𝐴, 𝑇, 𝑅 do not in general give the same value of VRS [30]. Hence, while some of the results are" 2401.13185v1,"RESEARCH ARTICLE Cross-Validation Algorithms Shortcutting Cross-Validation: Efficiently Deriving Column-Wise Centered and Scaled Training Set X T X and X T Y Without Full Recomputation of Matrix Products or Statistical Moments Ole-Christian Galbo Engstrøm 1,2,3 1 FOSS Analytical A/S, Denmark. 2 Department of Computer Science (DIKU), Cross-validation is a widely used technique for assessing the University of Copenhagen, Denmark. performance of predictive models on unseen data. Many pre- 3 Department of Food Science (UCPH dictive models, such as Kernel-Based Partial Least-Squares FOOD), University of Copenhagen, Denmark. (PLS) models, require the computation of X T X and X T Y us- ing only training set samples from the input and output ma- Correspondence Ole-Christian Galbo Engstrøm, Department of Computer Science, University of Copenhagen Faculty of Science, Universitetsparken 1, 2100 Copenhagen, Denmmark. Email: ocge@foss.dk Present address R&D, Foss Analytical A/S, Nils Foss Allé 1, 3400 Hillerød, Denmark. trices, X and Y, respectively. In this work, we present three algorithms that efficiently compute these matrices. The first one allows no column-wise preprocessing. The second one allows column-wise centering around the training set means. The third one allows column-wise centering and column-wise scaling around the training set means and standard devia- tions. Demonstrating correctness and superior computational complexity, they offer significant cross-validation speedup Funding information FOSS Analytical A/S; Innovation Fund Denmark, Grant Number: 1044-00108B. compared with straight-forward cross-validation and previ- ous work on fast cross-validation - all without data leakage. Their suitability for parallelization is highlighted with an open- source Python implementation combining our algorithms with Improved Kernel PLS. Keywords — fast, cross-validation, cross validation, par- tial least squares, autoscaling. Abbreviations: IKPLS, Improved Kernel Partial Least Squares; NIPALS, Nonlinear Iterative Partial Least Squares; PLS, Partial Least Squares; PLS-DA, Partial Least Squares Discriminant Analysis; PLS-R, Partial Least Squares Regression; SG, Savitzky-Golay; SNV, Standard Normal Variate. 1" 2401.13199v1,"Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions Asangi Jayatilaka ∗† , Nalin Asanka Gamagedara Arachchilage ‡ , Muhammad Ali Babar ∗ ∗ Centre for Research on Engineering Software Technologies (CREST), The University of Adelaide, Australia {asangi.jayatilaka, ali.babar}@adelaide.edu.au † School of Computing Technologies, RMIT University, Australia asangi.jayatilaka@rmit.edu.au ‡ School of Computer Science, The University of Auckland, New Zealand nalin.arachchilage@auckland.ac.nz Abstract—Despite technical and non-technical countermeasures, humans continue to be tricked by phishing emails. How users make email response decisions is a missing piece in the puzzle to identifying why people still fall for phishing emails. We conducted an empirical study using a think-aloud method to investigate how people make ‘response decisions’ while reading emails. The grounded theory analysis of the in-depth qualitative data has enabled us to identify different elements of email users’ decision-making that influence their email response decisions. Furthermore, we developed a theoretical model that explains how people could be driven to respond to emails based on the identified elements of users’ email decision-making processes and the relationships uncovered from the data. The findings provide deeper insights into phishing email susceptibility due to people’s email response decision-making behavior. We also discuss the implications of our findings for designers and researchers working in anti-phishing training, education, and awareness interventions. I. I NTRODUCTION Phishing is one of the most prominent and influential cyber attacks, as it is a precursor for many other attacks, including identity theft, which is among the worst [16], [28]. Phishing attacks have sharply risen recently, partly driven by COVID- 19 and supply chain uncertainty [1]. Phishing activity trends report of the Anti-Phishing Working Group reports more than 4.7 million attacks for 2022. This report also highlights that since the beginning of 2019, the number of phishing attacks has grown by more than 150% per year. Phishing attacks are most commonly launched through emails as they are difficult to detect [60], [70]. Often phishing email attacks target banks, defense organizations, and private companies, as they curate a wide variety of data, including personal and financial data [9]. Generally, clicking on links, downloading attachments, or replying to phishing emails can be considered unsafe response decisions [39], [54]. CISCO’s 2021 Cybersecurity threat trends report states that at least one person has clicked a phish- Symposium on Usable Security and Privacy (USEC) 2024 26 February 2024, San Diego, CA, USA ISBN 979-8-9894372-5-2 https://dx.doi.org/10.14722/usec.2024.23xxx www.ndss-symposium.org, https://www.usablesecurity.net/USEC/ ing link in around 86% of organizations [15]. A successful phishing attack can trick users into unintentionally disclosing their valuable information, compromising their devices or accounts [67]. Additionally, phishing attacks are also used for installing malware (i.e., malicious software), which can disturb the normal operations of a computer system, contributing to significant financial losses and reputation damages. Technology alone is insufficient to combat phishing email attacks; therefore, transforming users from the weakest line of defense to the most robust line of defense is essential [21], [29], [57]. An active community of practitioners and researchers focuses on phishing education, training, and awareness (e.g., phishing alerts) to support users in correctly identifying phishing [18]. However, these efforts are with limited success [4], [21]. A major challenge in designing effective anti-phishing interventions is the lack of attention to reasons why people still fall for phishing [21], [37], [50], [75]. Understanding why people still fall for phishing emails will provide underpinning science to design effective future anti-phishing tools and educational interventions. Although prior literature largely focuses on analyzing the personality and demographics of people who fall for phishing emails [43], [66], how people make email responses and the thought process a user goes through when deciding how to respond to their emails is often overlooked [21], [34], [37], [50], [75]. Only a limited number of studies have attempted to conduct qualitative user studies to explain people’s email decisionmaking processes [34], [57], [75]–[77]. Although qualitative studies, compared to quantitative studies, allow us to obtain more detailed and holistic insights into users’ email response decision-making behaviors and the reasons for those behaviors, even such prior work does not interpret the different elements of people’s email response decision-making processes and their relationships influencing their email response behavior. To address this research gap, we conducted an empirical investigation through a “think-aloud” role-play experiment and follow-up interviews to better understand people’s decisionmaking behavior when responding to emails. We developed a theoretical model that explains how people are driven to respond to emails by clicking on links, replying, and downloading attachments based on the identified elements of the" 2401.13202v1,"PAC Learnability for Reliable Communication over Discrete Memoryless Channels Jiakun Liu, Wenyi Zhang H. Vincent Poor Department of Electronic Engineering and Information Science University of Science and Technology of China, Hefei, China liujk@mail.ustc.edu.cn, wenyizha@ustc.edu.cn Department of Electrical Engineering Princeton University, Princeton, NJ, USA poor@princeton.edu Abstract—In practical communication systems, knowledge of channel models is often absent, and consequently, transceivers need be designed based on empirical data. In this work, we study data-driven approaches to reliably choosing decoding metrics and code rates that facilitate reliable communication over unknown discrete memoryless channels (DMCs). Our analysis is inspired by the PAC learning theory and does not rely on any assumptions on the statistical characteristics of DMCs. We show that a naive plug-in algorithm for choosing decoding metrics is likely to fail for finite training sets. We propose an alternative algorithm called the virtual sample algorithm and establish a non-asymptotic lower bound on its performance. The virtual sample algorithm is then used as a building block for constructing a learning algorithm that chooses a decoding metric and a code rate using which a transmitter and a receiver can reliably communicate at a rate arbitrarily close to the channel mutual information. Therefore, we conclude that DMCs are PAC learnable. I. I NTRODUCTION The application of machine learning techniques in communications has gained broad interest in recent years [1]–[5]. An advantage of machine learning techniques is that they help address channel uncertainty. If the statistical characteristics of a channel are known perfectly, then an encoder and a decoder can be optimized accordingly to communicate at a rate close to the channel capacity. However, perfect channel knowledge is unavailable in practice. Instead, the encoder and decoder are designed based on some empirical data about the channel. In this paper, we show it is possible to use empirical data to choose decoding metrics and code rates that facilitate reliable communication over unknown discrete memoryless channels (DMCs). We analyze two algorithms for choosing decoding metrics: a naive plug-in algorithm and a proposed virtual sample algorithm. The plug-in algorithm is straightforward and intuitive, but is likely to fail for finite training sets. On the contrary, the virtual sample algorithm returns a desired decoding metric with a high probability as long as the size of the training set is no less than a certain finite value which does not depend on the channel. Our analysis does not rely on any assumptions on the statistical characteristics of the channel, much like that in the PAC (probably approximately correct) learning theory [6], [7]. We use the virtual sample algorithm as a building block to construct a learning algorithm that reliably chooses a decoding metric and a code rate using which an encoder and a decoder can communicate reliably at a rate arbitrarily close to the channel mutual information. This leads to a conclusion that DMCs are PAC learnable. In the language of PAC learning, a chosen decoding metric is a hypothesis and a risk of the hypothesis can be defined using the maximum communication rate supported by the metric. Some other PAC learning problems for communications have been studied in [8]–[11]. In [8, Sections II and III] and [9], the hypotheses are constellations and/or their decoders, and the risks are error probabilities or expectations of a hinge-type loss. In [8, Section V], the hypothesis is an input distribution of a channel and the risk is the negative of the channel mutual information. In [10], learning-based channel codes are defined and data-dependent achievability and converse bounds are established. In [11], input-output samples of an unknown DMC are used to construct a compound channel that includes the DMC with a high probability. Based on the construction, a sampling strategy is proposed to find PAC bounds on the capacity and the corresponding input distributions. The paper is organized as follows. In the remaining part of Introduction, we introduce our notation and the considered communication model. In Section II we formulate the problem of how to choose decoding metrics and code rates, and show its connection with the PAC learning problem. In Section III we present our theoretical results, which lead to the PAC learnability of DMCs. We conduct some numerical study to show the results in Section IV. Section V outlines the proofs of the theoretical results and Section VI concludes the paper. A. Notation The sets of real numbers, integers, non-negative integers and positive integers are denoted by R, Z, Z ≥0 and Z >0 respectively. A finite sequence (x 1 , x 2 , · · · , x n ) is written as {x i } ni=1 or the boldface letter x. The number |{i ∈ Z|1 ≤ i ≤ n, x i = x}| of the occurrences of a symbol x in x is written as N (x|x). Throughout the paper, X and Y are non-empty finite sets. For every probability mass function (PMF) p on X and transition function w P from X to Y, pw is the PMF on Y defined by pw(y) = x∈X p(x)w(y|x), p × w is the PMF on X × Y defined by (p × w)(x, y) = p(x)w(y|x) and I(p, w) is the mutual information between X and Y when (X, Y ) ∼ p × w. All entropies and mutual information are in bits." 2401.13219v1,"IEEE TRANSACTIONS AND JOURNALS TEMPLATE 1 TEPI: Taxonomy-aware Embedding and Pseudo-Imaging for Scarcely-labeled Zero-shot Genome Classification Index Terms—Genome Classification, Taxonomic Classification, Zero-shot learning I. I NTRODUCTION The genome sequence of an organism offers valuable insights into disease susceptibility (e.g., cancer in humans and animals) and quantitative traits like milk production in animals [1] or crop yield in plants [2]. Recent technological advancements have made nucleic acid sequencing (DNA or RNA sequencing) of animals, plants, and microbes affordable and commonplace [3]. In microbiology, whole and partial genome sequencing is frequently used to study the origins, pathogenicity, and phylogenetic relationships of bacterial and viral organisms [4]. Genome sequencing is crucial for phylogenetic classification and determining virulence potential, such as toxin production, antibiotic resistance, or invasive abilities, in bacterial organisms [5]. Submitted on 08 June, 2023. Revised on 27 September, 2023. This research was supported in part by the US Department of Agriculture (USDA) grants AP20VSD and B000C011. Sathyanarayanan N. Aakur and Vishalini R. Laguduva are with the Department of Computer Science and Software Engineering, Auburn University, Auburn, AL 36849 (e-mail: {san0028,vlr0013}@auburn.edu. Work was partially done while they were at OSU. Priyadharsini Ramamurthy is with the Department of Computer Science at Oklahoma State University, Stillwater, OK 74078 USA. Akhilesh Ramachandran is with the Oklahoma Animal Disease Diagnostics Laboratory, College of Veterinary Medicine, Oklahoma State University, Stillwater, OK 74078 (e-mail: rakhile@okstate.edu) Corresponding authors: SN Aakur, A. Ramachandran Training Abstract—A species’ genetic code or genome encodes valuable evolutionary, biological, and phylogenetic information that aids in species recognition, taxonomic classification, and understanding genetic predispositions like drug resistance and virulence. However, the vast number of potential species poses significant challenges in developing a general-purpose whole genome classification tool. Traditional bioinformatics tools have made notable progress but lack scalability and are computationally expensive. Machine learning-based frameworks show promise but must address the issue of large classification vocabularies with longtail distributions. In this study, we propose addressing this problem through zero-shot learning using TEPI, Taxonomy-aware Embedding and Pseudo-Imaging. We represent each genome as pseudo-images and map them to a taxonomy-aware embedding space for reasoning and classification. This embedding space captures compositional and phylogenetic relationships of species, enabling predictions in extensive search spaces. We evaluate TEPI using two rigorous zero-shot settings and demonstrate its generalization capabilities qualitatively on curated, large-scale, publicly sourced data. Testing Sathyanarayanan N. Aakur, Member, IEEE, Vishalini R. Laguduva, and Priyadharsini Ramamurthy, and Akhilesh Ramachandran Reference Genomes Whole Genome Pseudo-Imaging Genome to Taxonomy Embedding Reference Genome Taxonomies Hierarchical Taxonomy Graph Construction Graph-based Embedding Function Taxonomy-aware Embedding Space Query Genome Whole Genome Pseudo-Imaging Genome to Taxonomy Embedding Species-level Prediction Fig. 1. Illustration of the Overall Workflow of the proposed framework. We learn a taxonomy-aware embedding space during training that is used to predict taxonomies of query genomes during testing. Dotted red lines indicate learning. However, nucleic acid sequencing generates large amounts of microbial genome data. Traditional bioinformatic pipelines for genome analysis, particularly for whole-genome-based phylogenetic studies, are computationally intensive and timeconsuming [3], [6]. Developing efficient computational frameworks for processing whole genomes is essential to enable epidemiological, diagnostic, source attribution, and phylogenetic applications. Machine learning approaches, driven by advances in deep learning, offer promising avenues for genomic data analysis. However, successful machine learning applications face two key challenges. Machine learning approaches, particularly those based on deep learning, have been successful in handling classification problems where the label space is in the order of thousands (under an extreme classification problem setup [7]). They require thousands of examples per class to achieve reasonable performance. Genome classification, however, involves an enormous number of classes, with estimates placing the number of bacterial species between 10 7 and 10 9 [8]. Hence, scaling machine learning to such a large label space requires robust representation learning [9]. Additionally, the distribution of labeled data is highly imbalanced, i.e., not all species are equally represented in the training and test data. This imbalance poses a critical challenge to capturing the entire spectrum of species and hence scaling deep learning algorithms to this important problem. In this study, we address these challenges through zeroshot learning with limited labeled data. Zero-shot learning [10] aims to recognize classes that may not have been seen during training. Given the large number of species, we adopt a deductive reasoning approach by mapping a species’ whole genome to a learned, compositional representation within a" 2401.13222v2,"It’s About Time: Incorporating Temporality in Retrieval Augmented Language Models Anoushka Gade Jorjeta Jetcheva anoushka.gade@sjsu.edu San Jose State University San Jose, CA, USA jorjeta.jetcheva@sjsu.edu San Jose State University San Jose, CA, USA ABSTRACT The web serves as a global repository of knowledge, used by billions of people to search for information. Ensuring that users receive the most relevant and up-to-date information, especially in the presence of multiple versions of web content from different time points remains a critical challenge for information retrieval. This challenge has recently been compounded by the increased use of question answering tools trained on Wikipedia or web content and powered by large language models (LLMs) [13] which have been found to make up information (or hallucinate), and in addition have been shown to struggle with the temporal dimensions of information. Even Retriever Augmented Language Models (RALMs) which incorporate a document database to reduce LLM hallucination are unable to handle temporal queries correctly. This leads to instances where RALMs respond to queries such as ""Who won the Wimbledon Championship?"", by retrieving document passages related to Wimbledon but without the ability to differentiate between them based on how recent they are. In this paper, we propose and evaluate, TempRALM, a temporallyaware Retriever Augmented Language Model (RALM) with fewshot learning extensions, which takes into account both semantically and temporally relevant documents relative to a given query, rather than relying on semantic similarity alone. We show that our approach results in up to 74% improvement in performance over the baseline RALM model, without requiring model pre-training, recalculating or replacing the RALM document index, or adding other computationally intensive elements. KEYWORDS Information Retrieval, Natural Language Processing, Large Language Models 1 INTRODUCTION The web serves as an ever-expanding reservoir of real-world knowledge, with textual documents constituting a significant fraction of its content. Moreover, information changes over time, leading to updates to existing documents, or the addition of new documents. This leads to multiple versions of information from various time frames to co-exist and grow over time. A major challenge in information retrieval is ensuring that users get access to the most relevant and up-to-date knowledge at any time. This challenge has recently been compounded by the increased use of question answering tools powered by large language models (LLMs), which have gained popularity as a result of the release of chatGPT [13]. LLMs have been shown to absorb and serve immense quantities of information from textual data [14]. This information is typically derived from a static snapshot of a large number of documents scraped from the web at a specific point in time. However, real-world information changes continuously, frequently on a daily, hourly or even real-time basis. To address the challenge of frequently changing data, language models must expand or update their memory on a regular basis, which involves significant computational, financial and environmental costs. In recent years, there has been an increasing interest in using Retrieval Augmented Language Models (RALMs) as a way of addressing the problem of frequently evolving information, and also reducing the tendency of LLMs to make up information known as hallucinations. RALMs use an external document corpus as a knowledge source rather than relying solely on parametric memory like standard LLMs. This corpus, stored in the form of a document index (a format which makes document retrieval efficient), can be augmented and updated to reflect current versions of documents stored in it, for e.g., Wikipedia documents, and web pages. For a given text-based query, RALM uses its retriever component to obtain a ranked list of the most relevant documents from the document index and gives them to its language model component (also known as a reader), which uses the ranked documents as context to generates a response to the query. RALMS have been shown to generate more specific and factual responses to queries in knowledge intensive tasks such as question answering and fact checking than stand-alone LLMs [12]. These models have also shown to perform well in few-shot training scenarios [8] using as few as 64 examples to achieve a good performance. Although RALMs perform well in factual question answering, they typically use a document index, which contains a single version of each document. However, in many real-world applications, new information continues to be generated, without invalidating or replacing existing information, which results in multiple versions of documents to be present in the document index. For example, scientific and medical journals continuously publish new academic papers which are additions and enhancements to the body of knowledge that has been published previously, for e.g., new Natural Language Processing (NLP) research papers are posted to the arxiv platform [1] almost daily. This challenge is further compounded when trying to build a question answering system that supports time-sensitive queries such as ""Which language model is the state-of-the-art on the latest summarization benchmark?"", because standard RALM models would retrieve numerous papers, each stating it has established a new state of the art in document summarization. This is a direct result of the fact that standard LLMs and the LLM components of RALMs do not take into account temporal metadata [5]." 2401.13223v1,"TAT-LLM: A Specialized Language Model for Discrete Reasoning over Tabular and Textual Data Fengbin Zhu 1,3 , Ziyang Liu 3 , Fuli Feng 2 , Chao Wang 3 , Moxin Li 1 , Tat-Seng Chua 1 1 National University of Singapore, Singapore 2 University of Science and Technology of China, China 3 6Estates Pte Ltd, Singapore ABSTRACT In this work, we address question answering (QA) over a hybrid of tabular and textual data that are very common content on the Web (e.g. SEC filings), where discrete reasoning capabilities are often required. Recently, large language models (LLMs) like GPT-4 have demonstrated strong multi-step reasoning capabilities. We then consider harnessing the amazing power of LLMs to solve our task. We abstract a Step-wise Pipeline for tabular and textual QA, which consists of three key steps, including Extractor, Reasoner and Executor, and initially design an instruction to instantiate the pipeline and validate that GPT-4 outperforms all existing methods. However, utilizing an online LLM like GPT-4 holds various challenges in terms of cost, latency, and data security risk, which motivates us to specialize smaller LLMs in this task. We develop a TAT-LLM language model by fine-tuning LLaMA 2 with the training data generated automatically from existing expert-annotated datasets following the Step-wise Pipeline. The experimental results have verified that our TAT-LLM model can outperform all baseline models, including the previous best fine-tuned models and very large-scale LLMs like GPT-4 on FinQA, TAT-QA and TAT-DQA benchmarks. We hope our work can serve as a pioneering example of specializing smaller language models for specific tasks. CCS CONCEPTS • Information systems → Question answering; • Computing methodologies → Natural language processing. KEYWORDS Question Answering, Large Language Model, Tabular and Textual Data, Discrete Reasoning, Natural Language Processing ACM Reference Format: Fengbin Zhu 1,3 , Ziyang Liu 3 , Fuli Feng 2 , Chao Wang 3 , Moxin Li 1 , Tat-Seng Chua 1 . 2018. TAT-LLM: A Specialized Language Model for Discrete Reasoning over Tabular and Textual Data. In Proceedings of Make sure to enter the correct conference title from your rights confirmation emai (Conference acronym ’XX). ACM, New York, NY, USA, 16 pages. https://doi.org/ XXXXXXX.XXXXXXX Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference acronym ’XX, June 03–05, 2018, Woodstock, NY © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX Revenue from external customers, classified by significant product and service offerings, was as follows: (in millions) Year Ended June 30, Server products and cloud services Office products and cloud services Windows Gaming Search advertising LinkedIn Enterprise Services Devices Other Total 2019 2018 2017 32,622 31,769 20,395 11,386 7,628 6,754 6,124 6,095 3,070 125,843 26,129 28,316 19,518 10,353 7,012 5,259 5,846 5,134 2,793 110,360 21,649 25,573 18,593 9,051 6,219 2,271 5,542 5,062 2,611 96,571 Our commercial cloud revenue, which includes Office 365 Commercial, Azure, the commercial portion of LinkedIn, Dynamics 365, and other commercial cloud properties, was $38.1 billion, $26.6 billion and $16.2 billion in fiscal years 2019, 2018, and 2017, respectively. These amounts are primarily included in Office products and cloud services, Server products and cloud services, and LinkedIn in the table above. Question 1: What was the percentage change in gaming between 2018 and 2019? Discrete Reasoning Type: Arithmetic Calculation Answer: (11,386 - 10,353) / 10,353 = 9.98% Question 2: Did the total revenue in 2019 exceed that of 2018? Discrete Reasoning Type: Comparison Answer: 125,843 > 110,360 = Yes Question 3: How many revenue items are between 6,000 million and 6,500 million in 2019? Discrete Reasoning Type: Counting Answer: Count(Enterprise Services#Devices) = 2 Figure 1: Examples of QA with discrete reasoning over a hybrid of tabular and textual data. 1 INTRODUCTION Nowadays the Web inundates its users with vast and intricate content, necessitating content analysis techniques. In this work, we focus on analyzing a prevalent category of Web content: documents containing tables and text, including but not limited to SEC filings, financial statements, academic papers, and medical reports. These documents often feature extensive numerical data in both tabular and textual formats, demanding discrete reasoning for intelligent comprehension. Recent research [7, 53, 54] investigates the intelligent comprehension of such documents through question answering (QA) tasks, as exemplified in Figure 1. The model, provided with a table and relevant text as the context, needs to perform various types of discrete reasoning, such as arithmetic calculations, making comparisons, and counting, to answer the question." 2401.13237v1,"Quantum natural gradient without monotonicity Toi Sasaki and Hideyuki Miyahara ∗ Graduate School of Information Science and Technology, Hokkaido University, Sapporo, Hokkaido, 060-0814, Japan (Dated: January 25, 2024) Natural gradient (NG) is an information-geometric optimization method that plays a crucial role, especially in the estimation of parameters for machine learning models like neural networks. To apply NG to quantum systems, the quantum natural gradient (QNG) was introduced and utilized for noisy intermediate-scale devices. Additionally, a mathematically equivalent approach to QNG, known as the stochastic reconfiguration method, has been implemented to enhance the performance of quantum Monte Carlo methods. It is worth noting that these methods are based on the symmetric logarithmic derivative (SLD) metric, which is one of the monotone metrics. So far, monotonicity has been believed to be a guiding principle to construct a geometry in physics. In this paper, we propose generalized QNG by removing the condition of monotonicity. Initially, we demonstrate that monotonicity is a crucial condition for conventional QNG to be optimal. Subsequently, we provide analytical and numerical evidence showing that non-monotone QNG outperforms conventional QNG based on the SLD metric in terms of convergence speed. I. INTRODUCTION Continuous optimization is prevalent in scientific and industrial problem-solving, with a plethora of methods proposed [1]. Natural gradient (NG) stands out as a novel continuous optimization method rooted in information geometry (IG) [2–4]. The field of machine learning has gained significant attention recently, with neural networks (NNs) holding paramount importance [5–7]. NG is frequently employed in the optimization of NNs, demonstrating numerical effectiveness [8]. In the realm of physics, the era of quantum computing has dawned, prompting investigations into the hidden potential of noisy intermediate-scale quantum (NISQ) devices [9]. For NISQ devices, the parameter estimation of quantum circuits is imperative [10–12]. In addition to quantum circuit learning, estimating parameters of quantum states is essential in various contexts, including the variational Monte Carlo method [13], and tensor networks [14]. Quantum natural gradient (QNG), introduced as the quantum counterpart of NG, has recently garnered attention for its promising performance in applications [15, 16]. A mathematically equivalent method to QNG, known in condensed matter physics, is the stochastic reconfiguration (SR) algorithm [17–21]. Furthermore, quantum metrics find applications in classical machine learning contexts [22–25]. It is noteworthy that both conventional QNG and the SR method are grounded in the symmetric logarithmic derivative (SLD) metric, which is one of the monotone quantum Fisher metrics and a fundamental concept in quantum information geometry (QIG). In this paper, we present a generalization of QNG based on QIG. Monotonicity implies that information is ∗ Electronic address: miyahara@ist.hokudai.ac.jp, hara512@gmail.com; corresponding author. hmiya- not gained via completely positive and trace-preserving (CPTP) maps; so it has been believed to be a guiding principle for constructing a geometry in physics. However, from the viewpoint of optimization, it has not been clear whether it is necessary. Initially, we establish that monotonicity is a prerequisite for the SLD metric to optimize the speed of QNG. Subsequently, we theoretically demonstrate that QNG utilizing non-monotone quantum Fisher metrics exhibits faster performance than its SLD- based counterpart. Furthermore, in practical numerical simulations for both classical and quantum cases, the diagonal approximation of the Fisher metric is often employed to mitigate the computational costs associated with inverting the Fisher metric. We show that even under this approximation, the aforementioned findings remain valid. Lastly, we provide numerical simulations to illustrate that non-monotone quantum Fisher metrics outperform the SLD metric in terms of speed. II. NATURAL GRADIENT In the derivation of NG, the Fisher metric and Kullback-Leibler (KL) divergence play an essential role. Then, we first explain the Fisher metric. Assume that we have p θ (·), which is a probability distribution pan rameterized tangent vectors as P n by i θ ∈ R . We define ∂ := X := X ∂ , where ∂ for i = 1, 2, . . . , n. i i i i=1 ∂θ Then, the Fisher metric between X and Y is defined as g p θ (·) (X, Y ) := N X X p m θ (·) (x)Y p e θ (·) (x). (1) x=1 where the e- and the m-representations of X at p θ (·) are given, respectively, by X p m θ (·) (·) := Xp θ (·), (2a) X p e θ (·) (·) := X ln p θ (·). (2b)" 2401.13242v1,"Companion points and locally analytic socle conjecture for Steinberg case Yiqin He ∗ Abstract In this paper, we modify the Breuil-Hellmann-Schraen’s (more generally, resp., Breuil-Ding’s) local model for the trianguline variety (resp., paraboline deformation variety) to certain semistable (resp., potentially semistable) non-crystalline point with regular Hodge-Tate weights. Then we prove the existence of expected companion points on the (definite) eigenvariety and locally analytic socle conjecture for certain semistable non-crystalline Galois representations (in other words, the so-called Steinberg case), under some wild hypothesis and the usual Taylor-Wiles assumptions. Contents 1 Introduction 2 2 Preliminaries 10 3 (ϕ, Γ)-module over R E,L with special Ω [1,k] -filtration 13 3.1 (ϕ, Γ)-module over R E,L with special Ω [1,k] -filtration . . . . . . . . . . . . . . . . . . . . . . 13 3.2 Deformations of special (ϕ, Γ)-modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 4 Some preliminaries on potentially semistable deformation ring 18 5 Local models on special Ω [1,k] -case 20 5.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 5.2 Local models for the special points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 5.2.1 Almost de Rham (ϕ, Γ)-modules with Ω [1,k] -filtrations . . . . . . . . . . . . . . . . . 22 5.2.2 Groupoids . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 5.3 Main constructions and representability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 5.4 Local geometry of Bernstein paraboline varieties at special point . . . . . . . . . . . . . . . 34 5.5 Galois cycles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 5.6 Locally analytic ”Breuil-Mezard type” conjecture . . . . . . . . . . . . . . . . . . . . . . . . 38 5.7 Partially de Rham cycles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 ∗ Morningside Center of Mathematics, Chinese Academy of Science, No. 55, Zhongguancun East Road, Haidian District, Beijing 100190, P.R.China, E-mail address: heyiqin@amss.ac.cn 1" 2401.13243v1,"1 Continuous Variable Based Quantum Communication in the Ocean R AMNIWAS M EENA 1,* AND S UBHASHISH B ANERJEE 2,+ 1,2 Department of Physics, Indian Institute of Technology, Jodhpur, India-342030 * meena.53@iitj.ac.in + subhashish@iitj.ac.in Compiled January 25, 2024 Continuous Variable-Based Quantum Cryptography (CV-QKD) is an emerging field in quantum information science, offering unprecedented security for communication protocols by harnessing the principles of quantum mechanics. However, ocean environments pose unique challenges to quantum communication due to their distinct properties and characteristics. This work investigates the impact of turbulence on the transmission of Gaussian light beams used in a continuous variable-based quantum key distribution system for underwater quantum communication. The objective is to quantitatively analyze the induced losses and propose methodologies to mitigate their effects. To achieve this, we adopt the widely accepted ABCD matrix formalism, which provides a comprehensive framework for characterizing the propagation of optical beams through different media. Moreover, a numerical simulation framework is developed to assess the resulting losses and evaluate the performance of the proposed system. The implications of these numerical simulation frameworks for the design and optimization of quantum communication systems for oceanic environments are thoroughly discussed. http://dx.doi.org/10.1364/ao.XX.XXXXXX 1. INTRODUCTION The field of underwater optical wireless communication (UOWC) has gained significant attention due to its potential for obtaining high data rates compared to acoustic, radio, magnetic, or electric fields [1–3]. Lasers, LEDs, and small LED arrays are suitable photon emitters for underwater optical communications. Due to its excellent beam collimation, laser-based communication has a higher range and signal-to-noise ratio than conventional optical transmitters. Unlike LEDs, the phase may be employed for transmission and receiving on both ends. Additionally, bandwidth is much higher than other techniques. The latency is much lower than auditory transmission, therefore implementation may be small and lightweight. Underwater optical wireless communication (UOWC) is limited by distance, absorption, and intensity scattering. These restrictions depend on aquatic quality. Despite the increased deployment of underwater sensor networks (USNs) and the expanding body of research on the subject, there has been a lack of emphasis on the cyber security elements. In marine applications, secure communication is essential for monitoring harbors, ports, offshore oil rigs, and undersea pipelines. It is also necessary for border security. Secure communication aims to protect data confidentiality, integrity, and authentication. The advent of quantum computing has led to the need for ""quantum-secure"" cryptography techniques [4– 6]. Quantum cryptography offers a level of security that is not dependent on untested mathematical principles, but rather on the hard rules of physics. This makes it a promising solution for ensuring unconditional security in a range of naval activities [7]. Continuous Variable-Based Quantum Cryptography (CV- QKD) is a notable technique [8, 9] within the realm of quantum key distribution (QKD) owing to its exploitation of continuousvariable quantum systems. Considerable advancements have been achieved in the advancement of CV-QKD protocols [10–13]. However, the implementation of these systems in intricate settings, especially underwater communication channels, presents several problems. Similar to quantum communication in free space [14–18], underwater free space quantum key distribution (QKD) likewise encounters two inevitable challenges: saltwater attenuation and turbulence. The phenomenon of absorption and multiple scattering has a significant role in underwater environments [19, 20]. These variables give rise to both power decrease and temporal dispersion, commonly known as intersymbol-interference (ISI). Consequently, this leads to a decline in the performance of the link and constraints on the lengths over which transmission can occur, often limited to approximately 100 meters. This assertion is supported by multiple sources found in the existing body of literature (e.g., [21–25])." 2401.13246v1,"S EER : Facilitating Structured Reasoning and Explanation via Reinforcement Learning Guoxin Chen †§ , Kexin Tang, Chao Yang † , Fuying Ye, Yu Qiao †B , Yiming Qian ‡B † Shanghai Artificial Intelligence Laboratory § Institute of Computing Technology, Chinese Academy of Sciences ‡ Agency for Science, Technology and Research (A*STAR) chenguoxin22s@ict.ac.cn, {tkx94china, fuyingye.work}@gmail.com, {yangchao,qiaoyu}@pjlab.org.cn, qiany@ihpc.a-star.edu.sg Abstract Elucidating the reasoning process with structured explanations from question to answer is fundamentally crucial, as it significantly enhances the interpretability and trustworthiness of question-answering (QA) systems. However, structured explanations demand models to perform intricate structured reasoning, which poses great challenges. Most existing methods focus on single-step reasoning through supervised learning, ignoring logical dependencies between steps. Meanwhile, existing reinforcement learning (RL)-based methods overlook the structured relationships, impeding RL’s potential in structured reasoning. In this paper, we propose S EER , a novel method that maximizes a structure-based return to facilitate structured reasoning and explanation. Our proposed structure-based return precisely describes the hierarchical and branching structure inherent in structured reasoning, effectively capturing the intricate relationships between states. We also introduce a fine-grained reward function to meticulously delineate diverse reasoning steps. Extensive experiments show that S EER significantly outperforms state-of-the-art methods, achieving an absolute improvement of 6.9% over RL-based methods on EntailmentBank, a 4.4% average improvement on STREET benchmark, and exhibiting outstanding efficiency and cross-dataset generalization performance. 1 Introduction Navigating machines to reason and explain the reasoning process from question to answer is a long-term pursuit in the AI community (McCarthy, 1959; Yu et al., 2023). While existing QA systems adeptly furnish brief supporting evidence (Rajani et al., 2019; DeYoung et al., 2020), they often fail to clarify the reasoning process from prior knowledge to the answer. This means that it is difficult to understand how the answer is reached. However, by elucidating the reasoning process of predicted answers, we can observably improve interpretabil- Q: Which natural material is best for making a table? A: sturdy wood Facts ℎ: sturdy wood would be the best for making a table Corpus 𝑥𝑥 1 : wood is usually sturdy 𝑥𝑥 2 : a table is a kind of furniture 𝑥𝑥 3 : making furniture requires sturdy materials or 𝑥𝑥 4 : wood is a kind of natural material Structured Explanation ℎ 𝑖𝑖 1 𝑥𝑥 1 𝑖𝑖 2 : making a table requires sturdy materials Reasoning Steps 𝑖𝑖 2 𝑥𝑥 4 Intermediate Conclusions 𝑖𝑖 1 : wood is usually a sturdy natural material 𝑥𝑥 2 𝑥𝑥 3 𝑥𝑥 1 & 𝑥𝑥 4 𝑖𝑖 1 𝑖𝑖 1 & 𝑖𝑖 2 ℎ 𝑥𝑥 2 & 𝑥𝑥 3 𝑖𝑖 2 Figure 1: An example of structured explanation. Given a hypothesis h (a declarative sentence derived from a question-answer pair) and a set of facts (or corpus), the goal is to generate a structured explanation, which delineates the reasoning process from facts to the hypothesis. ity, trustworthiness, and debuggability in QA systems (Dalvi et al., 2021; Ribeiro et al., 2023). As illustrated in Figure 1, when answering the question ""Which natural material is best for making a table?"", the reasoning process with structured explanations, such as entailment trees (Dalvi et al., 2021) or reasoning graphs (Ribeiro et al., 2023), can explain why ""sturdy wood"" is the predicted answer, which in turn increases trustworthiness. However, deriving those complex structured explanations poses a great challenge. Previous methods (Dalvi et al., 2021; Tafjord et al., 2021) consider them as linearized sequences and generate the entire reasoning process at once. However, these methods lack controllability and may hallucinate unreliable reasoning steps. To address these concerns, recent studies (Hong et al., 2022;" 2401.13251v1,"On rips and cosmological singularities in a universe merging with baby universes Oem Trivedi 1∗ and Maxim Khlopov 2,3,4† , 1 International Centre for Space Sciences and Cosmology, Ahmedabad University, Ahmedabad 380009, India 2 Research Institute of Physics, Southern Federal University, 344090 Rostov-on-Don, Russia 3 Virtual Institute of Astroparticle Physics, 75018 Paris, France 4 Center for Cosmoparticle Physics Cosmion, National Research Nuclear University “MEPHI”, 115409 Moscow, Russia January 25, 2024 Abstract Understanding the late-time acceleration of the universe and its subtleties is one of the biggest mysteries in cosmology. A lot of different approaches have been put forward to deal with this, ranging from the conventional cosmological constant to various models of dark energy and beyond. Recently one very interesting approach to explaining the late time acceleration has been put forward, where the the expansion of the universe is driven by mergers with other ”baby” universes and has been shown to be quite viable as well from the point of view of recent observational data. So in this work we examine the possibility of various rip scenarios and other future cosmological singularities in such ”multiversal” scenario, probing such singularities for the first time in a multi universe scenario. We examine two models of such a baby universe merging cosmology, and show that remarkably no rip scenario or future cosmological singularity is possible in such models. 1 Introduction The surprising revelation of the late-time acceleration of the Universe posed a significant challenge for the field of cosmology [1]. Since this discovery, extensive investigations have been undertaken to unravel the mystery behind this unexpected expansion phenomenon. Scientists have approached the cosmological expansion problem from diverse perspectives, employing traditional methods such as the Cosmological constant [2–4] and venturing into more unconventional theories like Modified Gravity [5–7]. Additionally, scenarios involving scalar fields driving late-time cosmic acceleration have been explored [8–14]. Quantum gravity approaches have also played a role in addressing the cosmic acceleration puzzle, spanning from Braneworld cosmology in string theory to theories like loop quantum cosmology and asymptotically safe cosmology [15–25]. However, these endeavors have uncovered certain inconsistencies, underscoring the limitations of our current understanding of the universe. One of the most prominent challenges is the Hubble tension, indicating discrepancies in the values of the Hubble constant derived from detailed Cosmic Microwave Background (CMB) maps, combined with Baryon Acoustic Oscillations data and Supernovae Type Ia (SNeIa) data [26–29]. Therefore, the present epoch of the universe has presented us with a broad spectrum of questions and appears poised to become a domain where advanced gravitational physics will pave the way for a deeper comprehension of cosmology. Various approaches to Quantum gravity have come forward in recent times and more often than not, they have also been shown to be of some insight into tackling the issues of late time cosmology and one such exciting approach to quantum gravity is that of Causal dynamical Triangulations or CDTs, which represent curved spacetimes with Lorentzian signature and serve as regularized lattice configurations in contemporary ∗ oem.t@ahduni.edu.in † khlopov@apc.in2p3.fr 1" 2401.13264v1,"ENHANCING CROSS-DOMAIN DETECTION: ADAPTIVE CLASS-AWARE CONTRASTIVE TRANSFORMER Ziru Zeng, Yue Ding, Hongtao Lu ∗ Department of computer science and engineering, Shanghai Jiao Tong University, China ABSTRACT Recently, the detection transformer has gained substantial attention for its inherent minimal post-processing requirement. However, this paradigm relies on abundant training data, yet in the context of the cross-domain adaptation, insufficient labels in the target domain exacerbate issues of class imbalance and model performance degradation. To address these challenges, we propose a novel class-aware cross domain detection transformer based on the adversarial learning and mean-teacher framework. First, considering the inconsistencies between the classification and regression tasks, we introduce an IoU- aware prediction branch and exploit the consistency of classification and location scores to filter and reweight pseudo labels. Second, we devise a dynamic category threshold refinement to adaptively manage model confidence. Third, to alleviate the class imbalance, an instance-level class-aware contrastive learning module is presented to encourage the generation of discriminative features for each class, particularly benefiting minority classes. Experimental results across diverse domain-adaptive scenarios validate our method’s effectiveness in improving performance and alleviating class imbalance issues, which outperforms the state-of-the-art transformer based methods. Index Terms— Unsupervised Domain Adaptation, Object Detection, Adaptive Threshold, Class-Aware Contrastive Learning, Transfer learning 1. INTRODUCTION In recent years, the object detection model based on transformer architecture has become a very potential detector with its complete end-to-end characteristics, no post-processing and better generalization performance [14, 31]. However, when testing in a scenario with domain gaps, its performance will still be significantly degraded due to different data distributions and domain shifts, such as weather changes and stylistic variations. This motivates us to explore the unsupervised domain adaptation based on transformer detector. Unsupervised domain adaptation aims to align a labeled source domain’s detector with an unlabeled target domain, bridging the domain gap [2, 30].In cross-domain detection, we have the whole training images and complete labels of the source domain, while only have the image of the target domain. Almost all existing transformerbased detectors for domain adaptation apply adversarial learning to extract common features between different domains [8, 11]. Nevertheless, owing to the absence of instance labels for target domain, method based adversarial learning fails to exploit the latent category ∗ Corresponding author: Hongtao Lu, also with MOE Key Lab of Artificial Intelligence, AI Institute, Shanghai Jiao Tong University, Shanghai, China, htlu@sjtu.edu.cn. This paper is supported by NSFC (No.62176155), Shanghai Municipal Science and Technology Major Project (2021SHZDZX0102). Fig. 1: We quantify the count of the distinct objects in the foggy cityscapes training set and display the ratio between pseudo labels and ground truth under our adaptive class-aware threshold and unified static threshold respectively. information in the target domain, still manifesting an obvious performance gaps compared to the fully supervised models. Inspired by the success of recent study [9, 33, 32] using self-training method, we link mean-teacher mechanism [15] with adversarial learning to generate pseudo labels for target domain, thus mining the information inside the data of target domain. Despite this effort, there still exists some obstacles in mean-teacher framework hindering the enhancement of detection performance. Existing work [9] based on vanilla mean-teacher architecture filters the pseudo labels only using their classification scores with a unified static threshold. However, it ignores the inconsistency [17] between classification and regression task in object detection, which means high confidence score do not always guarantee the localization accuracy [18]. Simply using classification scores to filter pseudo labels may leave the inaccurate pseudo boxes, which inevitably introduces bias into the detection model and leads to performance degradation. Besides, the prior study overlooked the bias issue introduced by class imbalance. Owing to the imbalance data distribution, the model tends to predict the majority classes while assigning lower confidence scores to minority classes. As shown in Fig 1, taking foggy cityscapes [28] dataset as an example, there is a serious category imbalance issue in data distribution. Using uniform threshold across all categories will increase the false positives as the number of pseudo labels in majority classes, like car and person, far surpasses the count of ground truth. As a result, it will lead to inefficient training and biased supervision, amplifying the class imbalance issue. To overcome these obstacles, we propose the adaptive classaware contrastive transformer model. To deal with inaccurate localization for pseudo boxes, we introduce an IoU prediction branch to refine and reweight pseudo-labels by leveraging both classification and localization scores. Furthermore, to address the issue of class imbalance, a Gaussian Mixture Model (GMM) [19, 17] is implemented to generate adaptive threshold for each category, utilizing" 2401.13268v1,"This article has been accepted for publication in IEEE Transactions on Industry Applications. This is the author's version which has not been fully edited and content may change prior to final publication. Citation information: DOI 10.1109/TIA.2021.3113894 Loss Allocation in Submarine Armored Three-core HVAC Power Cables Juan Carlos del-Pino-López Dpto. Ingeniería Eléctrica Escuela Politécnica Superior Virgen de África 7 41011, Sevilla, Spain vaisat@us.es Pedro Cruz-Romero Dpto. Ingeniería Eléctrica Escuela Técnica Superior de Ingeniería Avda. de los Descubirmientos s/n 41092, Sevilla, Spain plcruz@us.es Abstract— Loss allocation of the three different components (conductor, sheaths and armor) of solidly bonded three-core separated lead-sheathed armored cables, frequently employed in offshore wind farms, is challenging due to the lack of accurate enough analytical expressions in the IEC standard. Also, loss allocation through experimental tests leads to inaccurate results since it is based on questionable assumptions. This paper improves both the IEC formulae and experimental methods by means of different analytical corrections in the conductor and sheath loss expressions. To this aim, an ad hoc application interface (Virtual Lab) based on 3D numerical simulations (finite element method) has been developed. This tool virtualizes and automates different test setups to emulate, in few seconds, the most employed experimental procedures in this type of cable. The analytical corrections have been derived from an in-depth analysis of a first set of 368 cables, ranging from 30 to 275 kV. The new loss expressions were successfully applied to a second set of 645 armored cables of quite diverse features (voltages from 10 to 275 kV, sections and dimensional parameters), hence bringing a general framework for any kind of three-core armored cable. Keywords—3D, armor, circulating currents, eddy currents, sheath, finite element method, losses, three-core cable. I. I NTRODUCTION One of the major requirements in the project of a power cable is to avoid overheating it during its operating life. This fact is even more critical in the case of submarine cables due to their cost and difficulties to repair [1]-[7]. This topic was dealt with by the authors in a previous paper [1], largely improved in this paper with additional findings and results, as outlined throughout the text. In this kind of cable three metallic parts are the sources of power losses [1]-[6]: conductors (𝑃𝑃 𝑐𝑐 ), metallic sheaths (𝑃𝑃 𝑠𝑠 ) and armor (𝑃𝑃 𝑎𝑎 ) (Fig. 1), so a correct thermal rating estimation requires a proper allocation of losses in these three heat sources. To this purpose a lumped-parameter thermal model is customarily used [2]-[4], where the three loss components are employed as inputs. This is the approach of the IEC (International Electrotechnical Commission) standard [2], where the allocation of power losses is carried out by means of analytic expressions of loss factors 𝜆𝜆 1 and 𝜆𝜆 2 :: 𝜆𝜆 1 = 𝑃𝑃 𝑠𝑠 , 𝑃𝑃 𝑐𝑐 𝜆𝜆 2 = 𝑃𝑃 𝑎𝑎 . 𝑃𝑃 𝑐𝑐 (1) The induced currents in sheaths and armor can just close themselves as eddy currents inside each of the three sheaths and the armor (bonded at a single point SP) or also circulate outside each sheath/armor (bonded at both ends, solid This work was supported by research grants ENE2017-89669-R (AEI/FEDER, UE) and 2018/00000740 (VI PPIT-US). Luis Carlos Sánchez-Díaz Dpto. Ingeniería Eléctrica Escuela Politécnica Superior Virgen de África 7 41011, Sevilla, Spain lsanchezd@us.es bonding SB). In [2], 𝜆𝜆 1 is expressed as the sum of circulatingcurrents ( 𝜆𝜆′ 1 ) and eddy-currents ( 𝜆𝜆′′ 1 ) loss subfactors. However, and focusing on wire-armored separated-lead sheathed three-core cables, [2] assumes that 𝜆𝜆′′ 1 is neglectable when sheaths are in SB (preferred configuration in submarine applications [6]). Having this in mind, [2] provides the following expressions for 𝜆𝜆 1 and 𝜆𝜆 2 : 𝜆𝜆 1 = 𝜆𝜆′ 1 = 𝑅𝑅 𝑠𝑠 𝑅𝑅 𝑐𝑐 1.5 2 ; 𝑅𝑅 1 + � 𝑠𝑠 � 𝑋𝑋 𝑋𝑋 = 2𝜔𝜔10 −7 ln 2𝑠𝑠 , 𝑑𝑑 𝑅𝑅 1 − 𝑐𝑐 𝜆𝜆′ 1 𝑅𝑅 𝑎𝑎 2𝑐𝑐 2 𝑅𝑅 𝑠𝑠 𝜆𝜆 2 = 1.23 � � , 2 𝑅𝑅 𝑐𝑐 𝐷𝐷 𝑎𝑎 2.77𝑅𝑅 𝑎𝑎 10 6 � � +1 𝜔𝜔 (2) (3) being 𝑅𝑅 𝑠𝑠 and X the AC resistance and reactance of each sheath (Ω/m), respectively, 𝑅𝑅 𝑐𝑐 the AC resistance of each conductor (Ω/m), 𝑠𝑠 the distance between conductor axes (mm), 𝑑𝑑 the mean diameter of each sheath (mm), 𝑅𝑅 𝑎𝑎 the armor resistance (Ω/m), 𝑐𝑐 the distance between the center of a conductor and the cable axis (mm), 𝐷𝐷 𝑎𝑎 the mean diameter of armor (mm) and 𝜔𝜔 the angular frequency of the system. Fig.1. Main components of an armored lead-sheathed three-core cable, power losses distribution and magnetic flux lines. Nonetheless, these expressions ignore the influence of the relative twisting of power cores and armor wires (Fig. 1), giving rise to calculated armor losses higher than expected from the field experience [8]-[11]. In this sense, to better characterize P a , two experimental procedures have been introduced [12], [13], both based on experimentally measuring the total power dissipated by the SB cable either or not with armor. Given that it is not possible to measure the power losses in each cable element separately, both procedures obtain the sheath and conductor losses by [2], following several simplifying assumptions (to be described in the next section), what entails inaccurate results in the experimental evaluation of P a . The underlaying reason for these results is found by using numerical simulations based © 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information." 2401.13303v1,"MaLA-500: Massive Language Adaptation of Large Language Models Peiqin Lin ∗1,2 , Shaoxiong Ji ∗3 , Jörg Tiedemann 3 , André F. T. Martins 4,5,6 , Hinrich Schütze 1,2 1 Center for Information and Language Processing, LMU Munich 2 Munich Center for Machine Learning 3 University of Helsinki 4 Instituto Superior Técnico (Lisbon ELLIS Unit) 5 Instituto de Telecomunicações 6 Unbabel linpq@cis.lmu.de, shaoxiong.ji@helsinki.fi Abstract Large language models have advanced the state of the art in natural language processing. However, their predominant design for English or a limited set of languages creates a substantial gap in their effectiveness for low-resource languages. To bridge this gap, we introduce MaLA-500, a novel large language model designed to cover an extensive range of 534 languages. To train MaLA-500, we employ vocabulary extension and continued pretraining on LLaMA 2 with Glot500-c. Our experiments on SIB-200 show that MaLA-500 achieves state-of-the-art in-context learning results. We release MaLA-500 at https:// huggingface.co/MaLA-LM. 1 Introduction Large Language Models (LLMs), e.g., LLaMA (Touvron et al., 2023a,b), Mistral (Jiang et al., 2023, 2024), and ChatGPT, 1 have shown remarkable performance in natural language understanding and generation. Follow-up studies (Bang et al., 2023; Lai et al., 2023; Ahuja et al., 2023a,b) observe that these English-centric LLMs, such as LLaMA with mainly English as the training data, are capable of handling some high-resource non-English languages, benefiting from the inclusion of non- English language data during pretraining. However, their applicability to low-resource languages is still limited due to data scarcity and model capability in terms of model size. Recently, several generative multilingual LLMs, such as XGLM (Lin et al., 2021), mGPT (Shliazhko et al., 2022), and BLOOM (Scao et al., 2022), have emerged. Notably, the current language coverage for these LLMs is limited to up to 60 languages, highlighting the remaining need for further work on massively multilingual LLMs. * 1 Equal contribution. https://openai.com/blog/chatgpt ImaniGooghari et al. (2023) have achieved a significant milestone in the realm of massive language adaptation by extending the language coverage of a small-scale multilingual language model, XLM-R (Conneau et al., 2020) - an auto-encoding model with 278M parameters, from 100 languages to an impressive number of 534 languages, and introducing an extended model, Glot500-m with 395M parameters. ImaniGooghari et al. (2023) introduce the Glot500-c corpora spanning 534 languages from 47 language families, and then apply vocabulary extension and continued pretraining to create Glot500-m. The introduction of Glot500-c significantly mitigates the challenge of data scarcity for low-resource languages. Moreover, the adaptation method is more favorable than training from scratch, as it requires fewer computational resources and emits a smaller carbon footprint. This success serves as a strong motivation for our exploration into the massive language adaptation of LLMs. This work aims to extend the capabilities of LLMs to encompass a wider range of languages. Existing works on language adaptation of pretrained models provide extended coverage across a wide linguistic spectrum but are limited to relatively small model sizes - mostly at the hundred million scale. Our study pushes the boundaries by exploring language adaptation techniques for LLMs with model parameters scaling up to 10B. Our investigation delves into generative LLMs with a substantial increase in model parameters and their in-context learning capabilities that enhance contextual and linguistic relevance across a diverse range of languages. We address the challenges of adapting LLMs to low-resource languages, such as data sparsity, domain-specific vocabulary, and linguistic diversity. We study continued pretraining of open LLM (i.e., LLaMA 2 (Touvron et al., 2023b)), vocabulary extension, and adaptation techniques (i.e., LoRA low-rank reparameterization (Hu et al.," 2401.13312v1,"Electric Power Systems Research 213 (2022) 108701 Contents lists available at ScienceDirect Electric Power Systems Research journal homepage: www.elsevier.com/locate/epsr Evaluation of the power frequency magnetic field generated by three-core armored cables through 3D finite element simulations Juan Carlos del-Pino-López a , ∗ , Pedro Cruz-Romero b , Juan Carlos Bravo-Rodríguez a a Department of Electrical Engineering, Universidad de Sevilla, Virgen de África 7, Sevilla, 41011, Spain b Department of Electrical Engineering, Universidad de Sevilla, Camino de los Descubrimientos s/n, 41092, Sevilla, Spain ARTICLE INFO Keywords: Magnetic field Three-core cable Finite element method Armor Experimental measurements ABSTRACT The great expansion in offshore power plants is raising the concern regarding the cumulative effect of the electromagnetic field emissions caused by submarine power cables. In this sense, owners are required to predict these emissions during the permitting and consenting process of new power plants. This is a challenging task, especially in the case of HVAC three-core armored cables due to their complex geometry. Customarily, 2D approaches based on the finite element method (FEM) have been employed for evaluating the magnetic field emissions caused by these cables. However, inaccurate results are obtained since the phase conductors and armor twisting is omitted. This work develops, for the first time in the literature, an in-depth analysis of the magnetic field caused by this type of cable through an ultra-shortened 3D-FEM model, which is also faced to experimental measurements taken on an actual 132 kV, 800 mm 2 three-core armored cable. Relevant conclusions are derived regarding the impact of the cable design on the magnetic field emissions, including material properties, as well as single and double-layer armors, presenting the proposed model not only as a valuable tool for predicting purposes, but also for optimizing cable design in terms of magnetic field emissions. 1. Introduction The expansion of offshore wind power plants (OWPPs) worldwide has significantly increased in the last decades, and is expected to continue in the coming years [1,2]. The cumulative effect derived from the increasing number of submarine power cables (SPC) is giving rise to new scenarios with higher electromagnetic field (EMF) emissions over a wider area [3]. This situation causes disturbances to marine life and habitats, although there is a poor understanding of the long-term effects that EMF emissions have on the marine environment, specifically those created by SPC [4–6]. Presently, HVAC cables are the most extended EMF sources in marine applications [2], although the main concern is regarding the magnetic field (MF) emissions [7,8], since the electric field can be shielded by grounding techniques. In this sense, it is a challenging process to calculate the MF emitted by HVAC cables [8–10], especially in the case of three-core armored cables (TCACs) due to their complex geometry, the material properties and, consequently, the electromagnetic interactions that take place inside them (induced sheath currents, flux shunting into the armor wires and eddy currents), where the relative twisting of power cores and armor wires has a key role. These complex interactions have been customarily tackled through 2D numerical simulations, mainly based on the finite element method (FEM) [11–14]. However, 2D approaches have inherent limitations that strongly influence the results. First, they assume the power cores (and the armor wires) as laid in parallel, although it is well-known that this configuration leads to higher MF emissions than the twisted case [15,16]. Second, they omit the longitudinal component of the MF, so the mitigation effect caused by the armor twisting is not properly evaluated. Consequently, 3D geometries are required for a proper evaluation of the MF emitted by TCACs. Analytically there have been proposals, but without considering the effect of sheaths and armor [17]. Regarding numerical methods, 3D-FEM simulations are customarily high demanding due to the need of large computational resources [18–21]. This worsens especially when trying to evaluate the MF emissions far from the cable, since this strongly increases the size of the geometry to be simulated. In this sense, the ultra-shortened 3D-FEM model (USM) presented in [22] has drastically reduced these resources, with an overall simulation time of about 1 min. This USM has been faced with experimental measurements at power and harmonic frequencies, providing accurate results regarding the cable sequence impedances, the induced sheath current and total losses [23,24]. Thus, in this study, two real TCACs are considered for developing, for the first time in the literature, an in-depth assessment on the ∗ Corresponding author. E-mail address: vaisat@us.es (J.C. del-Pino-López). https://doi.org/10.1016/j.epsr.2022.108701 Received 2 April 2022; Received in revised form 15 July 2022; Accepted 29 July 2022 Available online 10 August 2022 0378-7796/© 2022 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)." 2401.13313v1,"InstructDoc: A Dataset for Zero-Shot Generalization of Visual Document Understanding with Instructions Ryota Tanaka 1,2 , Taichi Iki 1 , Kyosuke Nishida 1 , Kuniko Saito 1 , Jun Suzuki 2 1 NTT Human Informatics Laboratories, NTT Corporation 2 Tohoku University {ryota.tanaka, taichi.iki, kyosuke.nishida, kuniko.saito}@ntt.com, jun.suzuki@tohoku.ac.jp Abstract We study the problem of completing various visual document understanding (VDU) tasks, e.g., question answering and information extraction, on real-world documents through human-written instructions. To this end, we propose Instruct- Doc, the first large-scale collection of 30 publicly available VDU datasets, each with diverse instructions in a unified format, which covers a wide range of 12 tasks and includes open document types/formats. Furthermore, to enhance the generalization performance on VDU tasks, we design a new instruction-based document reading and understanding model, InstructDr, that connects document images, image encoders, and large language models (LLMs) through a trainable bridging module. Experiments demonstrate that InstructDr can effectively adapt to new VDU datasets, tasks, and domains via given instructions and outperforms existing multimodal LLMs and ChatGPT without specific training. Introduction Building document artificial intelligence (Document AI) capable of reading and comprehending real-world documents, including webpages, office documents, mobile UIs, etc., has been a long-cherished goal. Toward this goal, numerous works on visual document understanding (VDU) have addressed a wide range of tasks, such as document question answering (QA) (Mathew, Karatzas, and Jawahar 2021) and information extraction (Jaume, Ekenel, and Thiran 2019). Document data contain both textual and visual objects, with content spread structurally across various locations depending on diverse document types and formats. To address this complexity, previous works have proposed models that aim to improve interactions among text/layout/visual modalities (Xu et al. 2021; Appalaraju et al. 2021). However, the diversity of documents and tasks poses a challenge in developing a unified model that can comprehend intricate relationships between text and visual objects across a wide range of document types, formats, and tasks. To improve the generalizability and adaptivity of unseen vision-language tasks, visual instruction tuning (Xu, Shen, and Huang 2023; Liu et al. 2023a) has been introduced. This approach involves training multimodal large language models (MLLMs) on a collection of images, task inputs, and in- Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. structions. However, according to (Liu et al. 2023b), most of the previous visual instruction tuning datasets have primarily focused on understanding visual (non-textual) objects in scene images and existing models struggle with accomplishing tasks that require visual document understanding abilities. While recent works (Zhang et al. 2023; Ye et al. 2023a) attempt to deal with the issue, they still exhibit limitations when generalizing to unseen tasks and documents. In this paper, we propose InstructDoc 1 , the first largescale visual instruction tuning dataset that covers a wide range of VDU tasks and datasets (12 diverse tasks created from 30 openly available datasets). Each dataset has diverse instructions annotated by experts, following a unified instruction schema, composed of user’s intent and answer style, for VDU tasks. As shown in Figure 1, InstructDoc requires a rich set of abilities, including understanding document layout, visual representations of texts, and relation extraction of objects (e.g., graphs and charts) over open document types/formats with handcrafted instructions. Furthermore, to enhance the generalization performance on VDU tasks, we present a Instruction-based Document reading and understanding model, InstructDr, which unifies the visual, text, and layout modalities of documents by bridging the gap between a vision encoder and a large language model (LLM) through a new bridging module called Document-former. The Document-former converts documents into a useful feature for the LLM. Experiments show that InstructDr achieves the highest zero-shot performance among existing MLLMs and outperforms ChatGPT on a wide range of VDU datasets with instructions. Related Work Visual document understanding. Visual documents are ubiquitous and used in diverse applications, including QA on business documents (Mathew, Karatzas, and Jawahar 2021), information extraction on receipts (Jaume, Ekenel, and Thiran 2019), and classification over large document collections (Harley, Ufkes, and Derpanis 2015). Due to this diversity, previous works have generally been domain/taskspecific, lacking the sharing of underlying data, model architectures, and objectives (Xu et al. 2020; Appalaraju 1 Our dataset and codes are publicly available at https://github. com/nttmdlab-nlp/InstructDoc" 2401.13316v1,"On the supporting quasi-hyperplane and separation theorem of geodesic convex sets with applications on Riemannian manifolds Li-wen Zhou a,b , Ling-ling Liu a,b , Chao Min a,b , Yao-jia Zhang a,b and Nan-Jing Huang c∗ a b School of Sciences, Southwest Petroleum University, Chengdu, 610500, P.R. China Institute for Artificial Intelligence, Southwest Petroleum University, Chengdu 610500, Sichuan, P. R. China c Department of Mathematics, Sichuan University, Chengdu, Sichuan 610064, P.R. China Abstract. In this paper, we first establish the separation theorem between a point and a locally geodesic convex set and then prove the existence of a supporting quasi-hyperplane at any point on the boundary of the closed locally geodesic convex set on a Riemannian manifold. As applications, some optimality conditions are obtained for optimization problems with constraints on Riemannian manifolds. Keywords: Generalized optimization problem; quasi-hyperplane; separation theorem; manifold optimization problem. 2020 AMS Subject Classifications: 49J40; 47J20. 1 Introduction In recent years, some large-scale, high-dimensional, nonconvex and nonsmooth optimization problems from artificial intelligence machine learning need to be solved. However, traditional iterative algorithms used to solve these problems is not satisfactory. In order to solve these optimization problems in engineer- ing applications and theoretical research, researchers try to embed the original complex problems from Euclidean space to the differential manifold by selecting appropriate metrics, linearizing the nonlinear problem, transforming the nonconvex programming into geodesic convex programming, and reducing the dimension of high-dimensional big data through isometric mapping, so as to simplify the problem. In general, the main difference between the manifold optimization problem and the classical optimization problem is that the differential manifold is not a linear space. The natural idea is to extend the related concepts and methods of linear space to Riemannian manifolds by using geodesics (see [1,3,5,8] for more details). Actually, the concepts and techniques in the last decades, which fit in Euclidean spaces, have extended to the nonlinear framework of Riemannian manifolds (see, for example, [3,9–21,23–25], and the references therein). Generally speaking, convexity plays a very important role in optimization theory and related prob- ∗ E-mail address: njhuang@scu.edu.cn; nanjinghuang@hotmail.com 1" 2401.13328v1,"Rank-decreasing transductions Mikołaj Bojańczyk and Pierre Ohlmann ABSTRACT We propose to study transformations on graphs, and more generally structures, by looking at how the cut-rank (as introduced by Oum) of subsets is affected when going from the input structure to the output structure. We consider transformations in which the underlying sets are the same for both the input and output, and so the cut-ranks of subsets can be easily compared. The purpose of this paper is to give a characterisation of logically defined transductions that is expressed in purely structural terms, without referring to logic: transformations which decrease the cut-rank, in the asymptotic sense, are exactly those that can be defined in monadic second-order logic. This characterisation assumes that the transduction has inputs of bounded treewidth; we also show that the characterisation fails in the absence of any assumptions. such as infinite words [8, Thm 1], or finite [21, Thm 17] and infinite trees [18, Thm 1.7]. The logic that appears in such theorems is usually some variant of monadic second-order logic mso. In words and trees, there are usually natural automata models, and the challenges are mainly about dealing with infinity. In graphs, the challenge is different – it is not clear how a graph should be parsed by an automaton. The study of recognisability and logic for graphs started in the late 1980’s, mainly with the work of Courcelle. The resulting theory, see the book [12] for a reference, is technically difficult, and is tightly connected to structural graph theory, in particular to treewidth. (One can consider more general structures, such as ternary relations, or even hypergraphs, but graphs contain already many of the important difficulties. We will talk about more general structures later in the paper. ) As was the case for words or trees, a central theme in this theory is CCS CONCEPTS • Mathematical logic and formal languages; KEYWORDS Cut-rank, transductions, monadic second-order logic ACM Reference Format: Mikołaj Bojańczyk and Pierre Ohlmann. 2024. Rank-decreasing transductions. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 22 pages. https://doi.org/10.1145/nnnnn. nnnn 1 INTRODUCTION One of the central themes of logic in computer science is the equivalence of recognisability (by automata, or algebras) and definability in logic, see [22] and [3] for surveys. This equivalence was proved originally for strings by Büchi [7, Thms 1 and 2], Elgot [14, Thm 5.3] and Trakhtenbrot [23, Thms 1 and 2]. It has been extended to many other structures, Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM https://doi.org/10.1145/nnnnn.nnnn definable in mso ⇔ recognisable. The ⇒ implication is known as Courcelle’s Theorem [9, Thm 4.4]. This is a highly influential result, especially due to its application to linear time mso model checking on graphs of bounded treewidth, which initiated the field of algorithmic meta-theorems [16]. The implication ⇐ is known to fail in general, but has been proved for various kinds of tree-decomposable graphs, such as graphs of bounded treewidth [6, Theorem 2.10] or graphs of bounded linear cliquewidth [5, Theorem 3.5]. It is conjectured that the ⇐ implication holds for all tree-decomposable graphs [4, Conjecture 5.3]. The equivalence of definability and recognisability explains the importance of mso logic, by describing it in an alternative way that does not refer to logic. This way we know that mso is not just some fluke of the syntax. In this paper, we initiate a similar apologetic project, except that instead of languages we consider transductions. Transductions, as considered in this paper, are transformations that input graphs and output other graphs, in a nondeterministic fashion (one input may yield several outputs). The importance of transductions, and especially those that can be defined in mso, was observed independently by all early authors in this topic, namely by Arnborg et al. [1, Sec 4], Engelfriet [15, Def 6] and Courcelle [10, Def 2.2]. The goal of this paper is to prove that mso transductions are the canonical choice of graph transformation, by characterising them in a way that does not use logic, and refers only to the" 2401.13334v1,"Explainable Bayesian Optimization Tanmay Chakraborty 1,2 , Christin Seifert 1 , Christian Wirth 2 1 Philipps-Universität Marburg, Marburg, Germany 2 Continental AG, Germany tanmay.chakraborty@continental-corporation.com, christin.seifert@uni-marburg.de, christian.2.wirth@continental-corporation.com 1 Abstract Optimization problem In industry, Bayesian optimization (BO) is widely applied in the human-AI collaborative parameter tuning of cyber-physical systems. However, BO’s solutions may deviate from human experts’ actual goal due to approximation errors and simplified objectives, requiring subsequent tuning. The black-box nature of BO limits the collaborative tuning process because the expert does not trust the BO recommendations. Current explainable AI (XAI) methods are not tailored for optimization and thus fall short of addressing this gap. To bridge this gap, we propose TNTRules (TUNE- NOTUNE Rules), a post-hoc, rule-based explainability method that produces high quality explanations through multiobjective optimization. Our evaluation of benchmark optimization problems and real-world hyperparameter optimization tasks demonstrates TNTRules’ superiority over state-ofthe-art XAI methods in generating high quality explanations. This work contributes to the intersection of BO and XAI, providing interpretable optimization techniques for real-world applications. Bayesian Optimization Introduction The manual parameterization of cyber-physical systems is labor-intensive and heavily relies on domain experts, posing significant challenges in industrial settings [Neumann-Brosig et al., 2019; Nagataki et al., 2022]. Bayesian Optimization (BO), a model-based sequential optimization technique, has emerged as a solution, systematically exploring the parameter space to find an optimal setting [Shahriari et al., 2015]. However, BO’s solution may not perfectly match the experts’ actual goal due to approximation errors and a simplified objective model, requiring human experts to tune parameters based on personal preferences and expert knowledge [Sundin et al., 2022; Farrell and Peschka, 2020]. For example, using BO to set laser parameters involves using a simple laser simulator. However, the experts’ actual goal for the laser may differ from the BO results. Finally, the expert tunes the parameters based on their knowledge and BO’s recommendations. The lack of interpretability in BO limits trust in BO recommendations among domain experts, similar to challenges in AAACMHicbVBNSyNBEO1RV2N21ex69GBjWIgiYUZ03WNAD15EBaNCJoSaTk3S2NMzdPeIYZijv8ab6H/Rk3j1J3iyJ87BrwcNj/eqqqtekAiujes+OBOTUz+mZyqz1Z+/5uYXar//nOg4VQzbLBaxOgtAo+AS24YbgWeJQogCgafB+U7hn16g0jyWx2aUYDeCgeQhZ2Cs1Kst+6AGEZe97NLnkvoRmCEDke3mOQ0bl6u9Wt1tumPQr8QrSZ2UOOzVXvx+zNIIpWECtO54bmK6GSjDmcC86qcaE2DnMMCOpRIi1N1sfEhO/1qlT8NY2ScNHavvOzKItB5Fga0sFtWfvUL8zuukJvzfzbhMUoOSvX0UpoKamBap0D5XyIwYWQJMcbsrZUNQwIzNrurvor1F4b6de5CgAhOrtaxMLre3Dfz1gtmwvM/RfCUnG03vX3PraLPeapSxVcgSWSEN4pFt0iJ75JC0CSNX5Jrckjvnxrl3Hp2nt9IJp+xZJB/gPL8CDq2qWg== arg min f (x) x2D Actionable explanations of local minima tune Parameter 1 Parameter 2 Parameter 3 Parameter 4 range not tune Figure 1: Explainable Bayesian Optimization with actionable explanations, showing parameter ranges and highlighting parameters that need tuning. AI that led to the rise of explainable AI (XAI) [Rudin, 2022]. While various techniques have been developed to explain AI decisions, explanations for optimization algorithms are rare. Explainable Bayesian optimization (XBO) should i) identify optimal solution, ii) provide insights into solution boundaries, and iii) identify and provide insights into potential alternative solutions (in the case of local minima). Current XAI methods do not meet the aforementioned requirements i)-iii) of XBO. We address this gap by introducing TNTRules (Figure 1), a post-hoc rule-based explanation algorithm for BO. TNTRules offers local explanations through visual graphs and actionable rules, indicating which parameters should be adjusted or remain unchanged to improve results. For global explanations, TNTRules generates a ranked “IF- THEN” rule list. We rely on hierarchical agglomerative clustering (HAC) to uncover rules within the optimization space, including their associated uncertainties[Ran et al., 2023] 1 . Unlike many XAI methods, TNTRules is controllable, allowing adjustments for high quality explanations or adapting to new use cases. We provide high quality explanations through multiobjective optimization, aiming to maximize explanation quality by tuning a threshold t s , balancing various quality metrics. Contributions 1. We present a method for explaining Bayesian Optimization as a set of global rules and local actionable explanations. 2. We introduce a novel variance based pruning technique for HAC to encode uncertainty. 3. We introduce a novel method based on multiobjective 1 Code: https://github.com/tanmay-ty/TNTRules" 2401.13337v1,"A Vortex Dynamic Equation for Sediment Transport. Ngatcha Ndengna Arno Roland* 1 1 National Higher Polytechnic school of Douala, university of Douala, BP 2107, Douala, Cameroun. Corresponding author(*): arnongatcha@gmail.com. Abstract This work presents a new vortex dynamic equation for quasi-geostrophic flows over strongly variable sediment bottoms. The equation considers erosion/deposition exchanges near the bottom and the geometrical changes of the bed interface, extending some of the most commonly used vortex dynamic equations in the literature. This new equation shows promise for further coastal engineering applications. The derivation of the vortex equation is presented in detail, including all physical and hydrodynamic mechanisms involved. Various variants of the vortex dynamic equation are also presented, which are particularly useful for multiphase turbulent flows. The advantages of our model are explained, and several observations are made. 1. Introduction The vortex dynamic for ideal incompressible fluid, has been introduced in 1858 by Helmholtz’s [1] and extended in 1869 in theory of atoms by Thomsom (Lord Kelvin) [2]. To model sediment dynamics in multiphase turbulent flows, it is crucial to consider the relevant mechanisms for turbulence evolution, such as vortices. The existence of a universal 3D structure of vortices in quasi-geostrophic flows remains an open problem. In shallow environments, the interaction between vortices of different sizes is an essential mechanism for the evolution of turbulent coastal flows. The question of the creation of a vortex remains open and relevant for certain fluid dynamic applications [3], [4], [5], [6], [7]. In sediment transport, the question of vortexinduced sediment suspension is a topic of debate. Specifically, how is the vortex created over an erodible bottom, and which physical mechanisms are involved? Additionally, what role do the bed interface and the erosion/deposition exchanges play in the creation of the vortex? Several papers address the creation and destruction of vortices by considering the mechanism created by the variation in velocity [7], [5] either by the friction and sediment exchanges [4], either by only the bed interface geometrical changes and diffusion and friction terms (see the model developed by ). When the sediment at the bottom moves, sediment exchanges occur, inducing sediment suspension in the suspended layer. The vortex equations developed above, and even more vortex equations, are not applicable to address the creation or destruction of a" 2401.13344v1,"Accuracy and Performance Evaluation of Low Density Internal and External Flows using CFD and DSMC Surya Kiran Peravali a,b,c , Vahid Jafari b , Amit K. Samanta c,e , Jochen Küpper c,d,e , Philipp Neumann b , Michael Breuer a,∗ a Professur für Strömungsmechaik, Helmut-Schmidt-Universität / Universität der Bundeswehr Hamburg, 22043 Hamburg, Germany b Professur für High Performance Computing, Helmut-Schmidt-Universität / Universität der Bundeswehr Hamburg, 22043 Hamburg, Germany c Center for Free-Electron Laser Science CFEL, Deutsches Elektronen-Synchrotron DESY, 22603 Hamburg, Germany d Department of Physics, Universität Hamburg, 22761 Hamburg, Germany e Center of Ultrafast Imaging, Universität Hamburg, 22761 Hamburg, Germany Abstract The Direct Simulation Monte Carlo (DSMC) method was widely used, among others, to simulate low density gas flows with large Knudsen numbers. However, DSMC has its drawbacks when the lower Knudsen number regime (Kn < 0.1) is considered. In this case, approaches from classical computational fluid dynamics (CFD) relying on the continuum assumption are the methods of choice, providing accurate solutions at acceptable computational costs. Here, we analyzed the advantages and drawbacks of DSMC/CFD simulations of internal and external flow fields in terms of accuracy and computational effort: We used DSMC and CFD simulations to calculate the flow inside a convergent-divergent nozzle (internal flow) and the flow around a conical body (external flow). CFD simulations utilized the software OpenFOAM and the DSMC solution was obtained using the software SPARTA. The results of these simulation techniques were evaluated in terms of (1) comparison with experimental results, (2) time-to-solution, (3) energy consumption, and (4) feasibility of hybrid CFD-DSMC approaches. Keywords: DSMC; SPARTA; Continuum assumption; Transition regime; Rarefied flow; high-performance computing ∗ Corresponding author Email address: breuer@hsu-hh.de (Michael Breuer ) Preprint submitted to Elsevier 2024-01-25" 2401.13349v1,"Astronomy & Astrophysics manuscript no. paper_ga January 25, 2024 ©ESO 2024 Using multiobjective optimization to reconstruct interferometric data (II): polarimetry and time dynamics Alejandro Mus 1, 2 , Hendrik Müller 3⋆ , Ivan Martí-Vidal 1, 2 , and Andrei Lobanov 3 1 Departament d’Astronomia i Astrofísica, Universitat de València, C. Dr. Moliner 50, 46100 Burjassot ,València, Spain e-mail: alejandro.mus@uv.es 2 Observatori Astronòmic, Universitat de València, Parc Científic, C. Catedràtico José Beltrán 2, 46980 Paterna, València, Spain 3 Max-Planck-Institut für Radioastronomie, Auf dem Hügel 69, D-53121 Bonn (Endenich), Germany e-mail: hmueller@mpifr-bonn.mpg.de Received / Accepted ABSTRACT Context. In Very Long Baseline Interferometry (VLBI), signals from multiple antennas combine to create a sparsely sampled virtual aperture, its effective diameter determined by the largest antenna separation. The inherent sparsity makes VLBI imaging an ill-posed inverse problem, prompting the use of algorithms like the Multiobjective Evolutionary Algorithm by Decomposition (MOEA/D), as proposed in the first paper of this series. Aims. This study focuses on extending MOEA/D to polarimetric and time dynamic reconstructions, particularly relevant for the VLBI community and the Event Horizon Telescope Collaboration (EHTC). MOEA/D’s success in providing a unique, fast, and largely unsupervised representation of image structure serves as the basis for exploring these extensions. Methods. The extension involves incorporating penalty terms specific to total intensity imaging, time-variable, and polarimetric variants within MOEA/D’s multiobjective, evolutionary framework. The Pareto front, representing nondominated solutions, is computed, revealing clusters of proximities. Testing MOEA/D with synthetic datasets representative of EHTC’s main targets demonstrates successful recovery of polarimetric and time-dynamic signatures despite sparsity and realistic data corruptions. Results. MOEA/D’s extension proves effective in the anticipated EHTC setting, offering an alternative and independent claim to existing methods. It not only explores the problem globally but also eliminates the need for parameter surveys, distinguishing it from Regularized Maximum Likelihood (RML) methods. MOEA/D emerges as a novel and useful tool for robustly characterizing polarimetric and dynamic signatures in VLBI datasets with minimal user-based choices. Conclusions. Future work aims to address the last remaining limitation of MOEA/D, specifically regarding the number of pixels and numerical performance, to firmly establish it within the VLBI data reduction pipeline. Key words. Techniques: interferometric - Techniques: image processing - Techniques: high angular resolution - Methods: numerical - Galaxies: jets - Galaxies: nuclei 1. Introduction For Very Long Baseline Interferometry (VLBI) multiple antennas in a radio-interferometric array are combined to achieve unmatched astronomical resolutions. The source is simultaneously observed by an array of radio antennas. As described by the van-Cittert-Zernike theorem (Thompson et al. 2017), the correlated products of the signals recorded by pairs of antennas are approximately the Fourier transform of the true sky brightness distribution with a Fourier frequency determined by the baseline separating the two antennas on the sky plane. Image reconstruction deals with the problem of recovering the sky brightness distribution from these measurements. With a full sampling of the Fourier domain (commonly referred to as the u, v plane), the original image could be retrieved by an inverse Fourier transform. However, due to the limited number of antennas and the limited amount of observing time, only a sparse subset of all ⋆ Both first authors have contributed equally to this work. Fourier coefficients is measured (the subset of all observed spatial Fourier frequencies is commonly referred to as the u, v-coverage). Moreover, the observations are corrupted by additional thermal noise and instrumental calibration effects. Hence, the imaging problem is an ill-posed inverse problem. Particularly global VLBI at mm-wavelengths pose a number of additional challenges: The number of antennas is small, the visibilities are less well calibrated (in fact typically the phases are poorly constrained) and the signal-tonoise ratio is worse compared to denser arrays operating at longer wavelengths. All in all, the reconstruction problem is under-constrained and, due to missing data and the need for self-calibration, nonconvex and possibly multimodal. Thus, the imaging relies on strong prior information, and a different selection of the regularization terms or prior distributions may produce significantly different image features. CLEAN and its variants (Högbom 1974; Clark 1980; Bhatnagar & Cornwell 2004; Cornwell 2008; Rau & Cornwell 2011) are the de-facto standard method for imaging Article number, page 1 of 23" 2401.13358v1,"Sequential solution strategies for the Cahn-Hilliard-Biot model Erlend Storvik ∗1 , Cedric Riethmüller 2 , Jakub W. Both 3 , and Florin A. Radu 3 1 Department of Computer science, Electrical engineering and Mathematical sciences, Western Norway University of Applied sciences, Norway 2 Institute of Applied Analysis and Numerical Simulation, University of Stuttgart, Germany 3 Centre for Modeling of Coupled Subsurface Dynamics, Department of Mathematics, University of Bergen, Norway Abstract This paper presents a study of solution strategies for the Cahn-Hilliard-Biot equations, a complex mathematical model for understanding flow in deformable porous media with changing solid phases. Solving the Cahn-Hilliard-Biot system poses significant challenges due to its coupled, nonlinear and non-convex nature. We explore various solution algorithms, comparing monolithic and splitting strategies, focusing on both their computational efficiency and robustness. 1 Introduction The Cahn-Hilliard-Biot model introduced in [1] is a three-way coupled system that features the interplay of solid phase separation, fluid dynamics, and elastic deformations in porous media. Recently, well-posedness of the model was discussed in [2], whereas the analysis for a similar model was performed in [3]. The present paper explores numerical solution strategies where we delve into both monolithic and splitting methods to solve the discretized equations. We investigate both computational efficiency and robustness with respect to material parameters. The monolithic approach, applying Newton’s method in an implicit time-discretization, showcases efficiency in convergence but faces challenges in robustness. In contrast, the splitting strategy sequentially addresses the Cahn-Hilliard subsystem, the elasticity subsystem, and the flow subsystem, offering flexibility and adaptability in managing the unique dynamics of each component. The Cahn-Hilliard-Biot system presents particular challenges due to its coupled, nonlinear, and nonconvex characteristics. In this paper, we focus on handling the couplings in the system by comparing a decoupling method with a monolithic solution approach. This system’s nonlinearities are predominantly manifested in its coupling terms. Therefore, by implementing a three-way decoupling strategy, we essentially introduce a method that serves not only to decouple but also to partially linearize the system. Comprehensive research specifically dedicated to solution strategies for the Cahn-Hilliard-Biot equations appears to be relatively limited. This work intends to contribute to this area, acknowledging that there is much yet to be explored and understood. Relevant to this context, there have been some studies on related models. These include [4] on time-discretization for the Cahn-Larché equations, a sequential accelerated approach for phase-field fracture modeling discussed in [5], strategies for optimal stabilization in decoupling the Biot equations in [6], and considerations of solution strategies for splitting schemes in soft material poromechanics as explored in [7]. The paper is structured as follows. In Section 2 we introduce the mathematical model, in Section 3 we discuss the discretization in time and space and present the splitting schemes. Section 4 is devoted to illustrative numerical results. The paper ends with a concluding section. ∗ Corresponding author: erlend.storvik@hvl.no 1" 2401.13378v1,"www.nature.com/scientificreports OPEN Tunable circular dichroism through absorption in coupled optical modes of twisted triskelia nanostructures Javier Rodríguez‑Álvarez 1,2* , Antonio García‑Martín 3 , Arantxa Fraile Rodríguez 1,2 , Xavier Batlle 1,2 & Amílcar Labarta 1,2 We present a system consisting of two stacked chiral plasmonic nanoelements, so-called triskelia, that exhibits a high degree of circular dichroism. The optical modes arising from the interactions between the two elements are the main responsible for the dichroic signal. Their excitation in the absorption cross section is favored when the circular polarization of the light is opposite to the helicity of the system, so that an intense near-field distribution with 3D character is excited between the two triskelia, which in turn causes the dichroic response. Therefore, the stacking, in itself, provides a simple way to tune both the value of the circular dichroism, up to 60%, and its spectral distribution in the visible and near infrared range. We show how these interaction-driven modes can be controlled by finely tuning the distance and the relative twist angle between the triskelia, yielding maximum values of the dichroism at 20° and 100° for left- and right-handed circularly polarized light, respectively. Despite the three-fold symmetry of the elements, these two situations are not completely equivalent since the interplay between the handedness of the stack and the chirality of each single element breaks the symmetry between clockwise and anticlockwise rotation angles around 0°. This reveals the occurrence of clear helicity-dependent resonances. The proposed structure can be thus finely tuned to tailor the dichroic signal for applications at will, such as highly efficient helicity-sensitive surface spectroscopies or single-photon polarization detectors, among others. Chiral structures play a key role in the working mechanism of a wide variety of biological processes and biochemical interactions, and thus hold promise for several technological applications. The term “chiral” refers to structures which are not superimposable with their mirror image. Therefore, any chiral structure can be found in two different handedness formed of the same building blocks. One of the most relevant properties of chiral structures is that the two versions of the system react differently under the illumination of left-handed (LCP) and right-handed (RCP) circularly polarized light. This chiroptical activity has been extensively used in many fields, such as ­chemistry 1,2 , ­pharmaceuticals 3 , and ­optics 4,5 . For a given chiroptical system, the differences in the signal of the optical functions f of the system under the two circular polarizations is usually named circular dichroism (CD) and can be quantified by the dimensionless figure of merit (FOM) CD f = f LCP − f RCP , f LCP + f RCP (1) where f stands for any of the studied optical cross-sections (CS), namely, the absorption, scattering, and the extinction, recorded under either LCP or RCP light. Although there are other alternatives, Eq. (1) is a common definition in the l ­ iterature 6,7 to ascertain the significance of any dichroism present in the spectra of the optical functions of a system. Due to the versatility of plasmonic metamaterials, several plasmonic chiral systems have been proposed in the last years in response to a growing interest in the experimental realization of such chiral nanostructures. The approaches to their manufacture comprehend the realization of three-dimensional (3D) s ­ tructures 8 , the manipulation of nanoparticle a ­ ssemblies 9,10 or the stacking of pseudo-planar s ­ tructures 11,12 , among others. Even 1 Departament de Física de la Matèria Condensada, Universitat de Barcelona, 08028 Barcelona, Spain. 2 Institut de Nanociència i Nanotecnologia (IN2UB), 08028 Barcelona, Spain. 3 Instituto de Micro y Nanotecnología IMN-CNM, CSIC, CEI UAM + CSIC, Isaac Newton 8, 28760 Tres Cantos, Madrid, Spain. * email: javier.rodriguez@ub.edu Scientific Reports | (2022) 12:26 | https://doi.org/10.1038/s41598-021-03908-2 1 Vol.:(0123456789)" 2401.13388v2,"UNIMO-G: Unified Image Generation through Multimodal Conditional Diffusion Wei Li ∗ , Xue Xu ∗ , Jiachen Liu, Xinyan Xiao Baidu Inc., Beijing, China {liwei85.2023}@gmail.com {xuxue,xiaoxinyan,liujiachen}@baidu.com https://unimo-ptm.github.io/ Abstract Existing text-to-image diffusion models primarily generate images from text prompts. However, the inherent conciseness of textual descriptions poses challenges in faithfully synthesizing images with intricate details, such as specific entities or scenes. This paper presents UNIMO-G, a simple multimodal conditional diffusion framework that operates on multimodal prompts with interleaved textual and visual inputs, which demonstrates a unified ability for both text-driven and subject-driven image generation. UNIMO-G comprises two core components: a Multimodal Large Language Model (MLLM) for encoding multimodal prompts, and a conditional denoising diffusion network for generating images based on the encoded multimodal input. We leverage a two-stage training strategy to effectively train the framework: firstly pre-training on largescale text-image pairs to develop conditional image generation capabilities, and then instruction tuning with multimodal prompts to achieve unified image generation proficiency. A welldesigned data processing pipeline involving language grounding and image segmentation is employed to construct multi-modal prompts. UNIMO-G excels in both text-to-image generation and zero-shot subject-driven synthesis, and is notably effective in generating high-fidelity images from complex multimodal prompts involving multiple image entities. 1 Introduction Recent advancements in text-to-image (T2I) diffusion models have yielded impressive results in the generation of high-fidelity images from textual descriptions. Various methods, including DALLE- 2 (Ramesh et al., 2022), Imagen (Saharia et al., 2022), Stable Diffusion (Rombach et al., 2022), and SD-XL (Podell et al., 2023), have been successful in producing photo-realistic and contextually * These authors contributed equally to this work. relevant images based on textual prompts. Nevertheless, a fundamental challenge persists due to the inherent brevity of textual descriptions, particularly when intricate details, specific entities, or nuanced scenes are involved. Thus, faithfully generating images from general vision-language (VL) inputs is essential to improve the controllability of image generation. Numerous studies have explored VL-to-image generation techniques. Methods such as Dream- Booth (Ruiz et al., 2023), Imagic (Kawar et al., 2023), SuTI (Chen et al., 2023) and BLIP- Diffusion (Li et al., 2023a) emphasize subjectdriven generation, where they use both subject images and textual descriptions as inputs to recontextualize the subject in a newly described setting. They either fine-tune specific models for a given subject or employ pre-trained subject representations. However, their specific training design and input templates hinder their scalability, especially in complex scenarios with multiple entities. Additionally, studies like FastComposer (Xiao et al., 2023) and Subject-Diffusion (Ma et al., 2023) focus on multiple-entity image generation, integrating image embeddings from image encoders with the standard text conditioning in pre-trained diffusion models. Nevertheless, these approaches lack the capacity to efficiently process generalized visionlanguage inputs that comprise a mix of textual and visual information in free forms. In this paper, we propose UNIMO-G, a simple multimodal conditional diffusion framework that operates on multimodal prompts comprising freeform interleaved vision-language inputs. Unlike traditional text-only prompts, multimodal prompts encompass various combinations of image entities and textual elements, as demonstrated in Figure 1. UNIMO-G is designed to faithfully reproduce all image entities, render textual content, and follow the instructions in multimodal prompts. Specifically, we leverage the perception capabilities of" 2401.13395v1,"www.nature.com/scientificreports OPEN Geometric frustration in ordered lattices of plasmonic nanoelements Ana Conde-Rubio 1,2 , Arantxa Fraile Rodríguez 1,2 , André Espinha 3 , Agustín Mihi Francesc Pérez-Murano 4 , Xavier Batlle 1,2 & Amílcar Labarta 1,2 Received: 15 October 2018 Accepted: 11 February 2019 Published: xx xx xxxx 3 , Inspired by geometrically frustrated magnetic systems, we present the optical response of three cases of hexagonal lattices of plasmonic nanoelements. All of them were designed using a metal-insulatormetal configuration to enhance absorption of light, with elements in close proximity to exploit near-field coupling, and with triangular symmetry to induce frustration of the dipolar polarization in the gaps between neighboring structures. Both simulations and experimental results demonstrate that these systems behave as perfect absorbers in the visible and/or the near infrared. Besides, the numerical study of the time evolution shows that they exhibit a relatively extended time response over which the system fluctuates between localized and collective modes. It is of particular interest the echoed excitation of surface lattice resonance modes, which are still present at long times because of the geometric frustration inherent to the triangular lattice. It is worth noting that the excitation of collective modes is also enhanced in other types of arrays where dipolar excitations of the nanoelements are hampered by the symmetry of the array. However, we would like to emphasize that the enhancement in triangular arrays can be significantly larger because of the inherent geometric incompatibility of dipolar excitations and three-fold symmetry axes. Frustration has largely been studied in magnetism where the term refers to situations in which one or more spins in the magnetic unit cell do not find a proper orientation to fully satisfy all the interactions with the neighboring spins, either by the existence of competing interactions or by the actual geometry of the structure itself 1,2 . For example, this phenomenon typically occurs in systems with hexagonal-based lattices and short range antiferromagnetic interactions, where geometric frustration yields slow dynamics and ageing effects both caused by an intricate energy landscape with lots of quasi-degenerate states 3,4 . This article aims at exploiting the concept of geometric frustration in the field of plasmonics. We introduced this term in a recent paper, referring to situations in which the geometry of a plasmonic lattice does not favor a complete ferroelectric polarization of the gaps between neighboring elements 5 . In particular, we showed the case of a hexagonal lattice of asterisks that contained three sub-lattices of gaps with different orientations with respect to the incident field, in such a way that the interactions among the gap dipoles destabilize the mode corresponding to the full polarization of all the gaps. Here, we take a leap forward and address the issue of the actual underlying mechanism behind the effect. In particular, we focus on the study of other arrays of Au nanoelements in which near-field dipolar polarizations of neighboring elements are geometrically frustrated. Our goal is to favor the excitation of collective modes at the expense of the low energy modes corresponding to near-field interactions with prevailing dipolar character. We show that the key ingredients in settling the degree of geometric frustration of these lattices depend on the complexity of the system, that is, the number of sublattices of gaps with different spatial orientations, together with the strength of the interactions among them. The former is related to the symmetry properties of both the lattice and the elements of the array. For instance, the characteristic three-fold rotation axes of triangular arrays of nanoelements are incompatible with the two-fold symmetry of the dipolar excitations among the gaps. Note that additional frustration may be introduced in the system when the nanoelements themselves have three-fold symmetry as well. Furthermore, since the strength of the interactions among neighboring gaps depends on their areal density and inter-distances, the effect of the geometric frustration on the optical response of the array can also be modulated by changing both the size of the nanoelements and the pitch of the array. 1 Universitat de Barcelona, Departament de Física de la Matèria Condensada, Barcelona, 08028, Spain. 2 Universitat de Barcelona, Institut de Nanociència i Nanotecnologia (IN2UB), Barcelona, 08028, Spain. 3 Institut de Ciència de Materials de Barcelona (ICMAB, CSIC), Bellaterra, 08193, Spain. 4 Institut de Microelectrònica de Barcelona (IMB- CNM, CSIC), Bellaterra, 08193, Spain. Correspondence and requests for materials should be addressed to A.L. (email: amilcar.labarta@ub.edu) Scientific Reports | (2019) 9:3529 | https://doi.org/10.1038/s41598-019-40117-4 1" 2401.13436v1,"Further Improvements on Waring’s Problem Li An-Ping Beijing 100085, P.R. China apli0001@sina.com Abstract In the paper, we will continue the investigation of Waring’s problem, and give further improvements on the estimations of G ( k ) .* Keywords: Waring’s Problem, Hardy-Littlewood method, recursive algorithm ________________________________________ * The article is first posted in the web of NSTL in 2019, https://preprint.nstl.gov.cn/preprint/" 2401.13459v1,"Variational Quantum Eigensolvers with Quantum Gaussian Filters for solving ground-state problems in quantum many-body systems Yihao Liu, 1 Min-Quan He, 1, ∗ and Z. D. Wang 1, † 1 Guangdong-Hong Kong Joint Laboratory of Quantum Matter, Department of Physics, and HK Institute of Quantum Science & Technology, The University of Hong Kong, Pokfulam Road, Hong Kong, China We present a novel quantum algorithm for approximating the ground-state in quantum many-body systems, particularly suited for Noisy Intermediate-Scale Quantum (NISQ) devices. Our approach integrates Variational Quantum Eigensolvers (VQE) with Quantum Gaussian Filters (QGF), utilizing an iterative methodology that discretizes the application of the QGF operator into small, optimized steps through VQE. Demonstrated on the Transverse Field Ising models, our method shows improved convergence speed and accuracy, particularly under noisy conditions, compared to conventional VQE methods. This advancement highlights the potential of our algorithm in effectively addressing complex quantum simulations, marking a significant stride in quantum computing applications within the NISQ era. I. INTRODUCTION The eigenstate problem in quantum many-body systems stands as a key challenge with profound implications in fields ranging from quantum chemistry [1, 2] to material science [3] and the energy industry [4, 5]. The inherent complexity of these problems, characterized by exponentially growing computational dimensions, has historically rendered exact solutions elusive. In this context, quantum computing, leveraging the principles of quantum mechanics, emerges as a promising avenue for more efficiently addressing these challenges compared to classical approaches. Over the past decades, a plethora of quantum algorithms have been proposed to tackle the quantum manybody eigenstate problem. Notably, Quantum Phase Estimation (QPE) [6], a cornerstone in this domain, offers the ability to accurately determine eigenenergy spectra and prepare corresponding eigenstates. However, the practical application of QPE is hindered by its substantial resource requirements, involving numerous controlled unitary operations and an inverse quantum Fourier transform, which exceed the capabilities of near-term quantum devices [7, 8]. In response, various adaptations of QPE have been developed to mitigate resource demands [9–13]. Despite these advancements, the requirements remain formidable for current quantum technologies. This leads to the exploration of alternative approaches, particularly for problems centered around a specific eigenstate. Here, quantum filtering algorithms emerge as a more resourceefficient solution [14]. These algorithms operate by applying a non-unitary operator to an initial state, effectively filtering out undesired states while retaining the target state, especially the ground state. The construction of such non-unitary operators, derived from functions of the target Hamiltonian. Examples include imag- inary time evolution [15–22], QGF algorithms [23–26], cosine filter algorithms [27, 28], sine filter algorithms [29], powered Hamiltonian operator algorithms [30, 31], and quantum inverse iteration method [32, 33]. The nontrivial implementation of these non-unitary operators on quantum computers has prompted methods like linear combination of unitaries [27], energy sequential estimation [32], and variational techniques [15]. In the era of NISQ devices [34], where circuit depth is constrained by the presence of noise, VQE [35–38] have gained prominence. VQE employs a shallow circuit depth, utilizing the variational principle to optimize the parameters of a parametrized state, thereby solving the ground-state problem. The VQE framework, comprising a trial state evolved through a parametrized circuit, also known as ansatz, and classical optimization of parameters to minimize a cost function, aligns well with the implementation of quantum filtering operators in the NISQ era. This paper introduces a novel method for preparing the ground state of many-body systems using a shallow circuit. Our approach discretizes the QGF operator into a series of small-step evolutions. Each step involves using VQE to simulate the evolution process, updating the parameters so that the quantum state approximates the evolved state after each small step. Starting from an initial state represented by initial parameters, the iterative updating of parameters enables the approximation of the QGF-evolved state, ultimately converging to the ground state of the target Hamiltonian. The paper is structured as follows: Section II details the principles and procedures of our quantum algorithm. The algorithm’s efficacy in solving the ground-state problem is demonstrated numerically in Section III. Finally, Section IV concludes the paper and discusses future implications. II. ∗ minquan@hku.hk † zwang@hku.hk QUANTUM ALGORITHM In this section, we introduce a novel quantum algorithm leveraging the QGF method to address ground-" 2401.13462v1,"Growing from Exploration: A self-exploring framework for robots based on foundation models Shoujie Li 1 ∗ , Ran Yu 1 ∗ , Tong Wu 1 ∗ , JunWen Zhong 2 , Xiao-Ping Zhang 1 3 , Wenbo Ding 1 4 † , 1 Tsinghua Shenzhen International Graduate School, Tsinghua University, Shenzhen 518055, China. 2 Department of Physics and Chemistry, Faculty of Science and Technology, University of Macau, Avenida da Universidade, Taipa, Macau 999078, China. 3 Department of Electrical, Computer, and Biomedical Engineering, Ryerson University, Toronto ON M5B 2K3, Canada. 4 RISC-V International Open Source Laboratory, Tsinghua-Berkeley Shenzhen Institute, Shenzhen 518055, China. ∗ These authors contributed equally to this work. †Corresponding authors: Wenbo Ding. {lsj20, yur23}@mails.tsinghua.edu.cn, sympathischmann35@gmail.com, junwenzhong@um.edu.mo, xzhang@ee.ryerson.ca, ding.wenbo@sz.tsinghua.edu.cn, Abstract Intelligent robot is the ultimate goal in the robotics field. Existing works leverage learning-based or optimization-based methods to accomplish humandefined tasks. However, the challenge of enabling robots to explore various environments autonomously remains unresolved. In this work, we propose a framework named GExp, which enables robots to explore and learn autonomously without human intervention. To achieve this goal, we devise modules including self-exploration, knowledgebase-building, and close-loop feedback based on foundation models. Inspired by the way that infants interact with the world, GExp encourages robots to understand and explore the environment with a series of self-generated tasks. During the process of exploration, the robot will acquire skills from beneficial experiences that are useful in the future. GExp provides robots with the ability to solve complex tasks through self-exploration. GExp work is independent of prior interactive knowledge and human intervention, allowing it to adapt directly to different scenarios, unlike previous studies that provided in-context examples as few-shot learning. In addition, we propose a workflow of deploying the real-world robot system with self-learned skills as an embodied assistant. Project website: GExp.com. 1 Introduction Not only for humans[Hacques et al., 2021; Ivaldi et al., 2013], autonomous exploration and learning are equally important for robots[Balsells et al., 2023], which is a sign of robot intelligence[Wahde, 2012]. Autonomous robots can not only liberate people from hard or dangerous labor but also complete some daily and ubiquitous tasks, such as searching, cooking, and cleaning. However, the design of robots with autonomy is very challenging. While robots can complete some tasks with the help of reinforcement learning[Deng et al., 2019], imitation learning[Hussein et al., 2017], and other methods, they are only capable of dealing with related tasks and cannot learn by themselves. Despite these methods have achieved outstanding results, they constrain the automatic learning ability of robots and it is difficult to achieve real intelligence only with these methods. Recently, the birth of Large Language Models (LLMs), such as GPT-4 [OpenAI, 2023] and Llama 2 [Touvron et al., 2023], provides new paths to intelligence. LLMs have not only propelled the development of artificial intelligence technology but have also significantly enhanced the decisionmaking and task-planning capabilities of robots. There is a growing body of research utilizing LLMs to address existing robotics challenges, as evidenced in studies including[Huang et al., 2023; Liang et al., 2023; Brohan et al., 2023; Wang et al., 2023b]. However, most existing methods rely heavily on detailed, complete prior information and the provision of human-specific in-context examples. This dependency often limits the robots’ generalization capabilities across diverse environments. On the other hand, there are studies demonstrating the potential of creating autonomous agents based on LLMs, which are capable of independently and continuously resolving problems [Zhu et al., 2023; Wang et al., 2023a]. A notable example is Voyager [Wang et al., 2023a], which presents an embodied agent operating within a Minecraft virtual environment. These agents, built upon LLMs, interact with their environment through textual feedback, which hinders practical applications in robotics. The recent advancements in vision-language models have been particularly significant, showcasing the potential for general object recognition and understanding of spatial relationships [Hu et al., 2023;" 2401.13479v1,"Under consideration for publication in J. Fluid Mech. 1 Drag reduction utilizing a wall-attached ferrofluid film in turbulent channel flow, Marius M. Neamtu-Halic 1,2 †, Markus Holzner 1,3,4 and Laura M. Stancanelli 5 1 Swiss Federal Institute of Forest, Snow and Landscape Research WSL, 8903 Birmensdorf, Switzerland 2 Institute of Environmental Engineering, ETH Zürich, 8039 Zürich, Switzerland 3 Swiss Federal Institute of Aquatic Science and Technology Eawag, 8600 Dübendorf, Switzerland 4 Institute of Hydraulic Engineering and River Research, University of Natural Resources and Life Sciences, BOKU Wien, 1190 Vienna, Austria 5 Department of Hydraulic Engineering, Delft University of Technology, TU Delft, 2628CN Delft, The Netherlands This study explores the application of a wall-attached ferrofluid film to decrease skin friction drag in turbulent channel flow. We conduct experiments using water as a working fluid in a turbulent channel flow setup, where one wall is coated with a ferrofluid layer held in place by external permanent magnets. Depending on the flow conditions, the interface between the two fluids is observed to form unstable travelling waves. While ferrofluid coating has been previously employed in laminar and moderately turbulent flows to reduce drag by creating a slip condition at the fluid interface, its effectiveness in fully developed turbulent conditions, particularly when the interface exhibits instability, remains uncertain. Our primary objective is to assess the effectiveness of ferrofluid coating in reducing turbulent drag with particular focus on scenarios when the ferrofluid layer forms unstable waves. To achieve this, we measure flow velocity using two-dimensional particle tracking velocimetry (2D-PTV), and the interface contour between the fluids is determined using an interface tracking algorithm. Our results reveal the significant potential of ferrofluid coating for drag reduction, even in scenarios where the interface between the surrounding fluid and ferrofluid exhibits instability. In particular, waves with an amplitude significantly smaller than a viscous length scale positively contribute to drag reduction, while larger waves are detrimental, because of induced turbulent fluctuations. However, for the latter case, slip out-competes the extra turbulence so that drag is still reduced. 1. Introduction Over the last decades, a considerable research effort has been dedicated to the reduction of drag in turbulent flows. This interest stems primarily from the goal of decreasing energy consumption in various applications, such as fluid transportation through pipes or the movement of a vessel through a fluid. Drag reduction techniques are commonly classified into passive and active, the later requiring external energy to be fed into the system (Gad-el Hak 1996; Quadrio & Ricco 2004). † Email address for correspondence: nemarius@ethz.ch" 2401.13481v1,"How AI Ideas Affect the Creativity, Diversity, and Evolution of Human Ideas: Evidence From a Large, Dynamic Experiment JOSHUA ASHKINAZE, University of Michigan, USA JULIA MENDELSOHN, University of Michigan, USA LI QIWEI, University of Michigan, USA CEREN BUDAK, , USA University of Michigan ERIC GILBERT, University of Michigan, USA Exposure to large language model output is rapidly increasing. How will seeing AI-generated ideas affect human ideas? We conducted an experiment (800+ participants, 40+ countries) where participants viewed creative ideas that were from ChatGPT or prior experimental participants and then brainstormed their own idea. We varied the number of AI-generated examples (none, low, or high exposure) and if the examples were labeled as “AI” (disclosure). Our dynamic experiment design—ideas from prior participants in an experimental condition are used as stimuli for future participants in the same experimental condition—mimics the interdependent process of cultural creation: creative ideas are built upon prior ideas. Hence, we capture the compounding effects of having LLMs “in the culture loop”. We find that high AI exposure (but not low AI exposure) did not affect the creativity of individual ideas but did increase the average amount and rate of change of collective idea diversity. AI made ideas different, not better. There were no main effects of disclosure. We also found that self-reported creative people were less influenced by knowing an idea was from AI, and that participants were more likely to knowingly adopt AI ideas when the task was difficult. Our findings suggest that introducing AI ideas into society may increase collective diversity but not individual creativity. CCS Concepts: • Human-centered computing → Human computer interaction (HCI); Empirical studies in HCI; Labo- ratory experiments; Empirical studies in collaborative and social computing; Computer supported cooperative work; Collaborative content creation. Additional Key Words and Phrases: creativity, large language models, generative artificial intelligence, chatgpt, co-creation, experiments ACM Reference Format: Joshua Ashkinaze, Julia Mendelsohn, Li Qiwei, Ceren Budak, and Eric Gilbert. 2023. How AI Ideas Affect the Creativity, Diversity, and Evolution of Human Ideas: Evidence From a Large, Dynamic Experiment. In tbd. ACM, New York, NY, USA, 42 pages. https: //doi.org/XXXXXXX.XXXXXXX 1 INTRODUCTION If we think of culture as a “loop” where individuals and societies shape each other through exchanges of ideas and practices [8, 55], then a fundamental question emerges: What happens when generative AI joins the “culture loop?” This question is not hypothetical. Exposure to LLMs (large language models) is increasing rapidly: When released, ChatGPT was the fastest-growing consumer application in history [25]. Moreover, we are likely exposed to even more AI content than we realize: Humans overestimate their ability to distinguish AI from human content [28]. This exposure likely Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2023 Association for Computing Machinery. Manuscript submitted to ACM 1" 2401.13492v1,"Event-triggered adaptive consensus of heterogeneous multi-agent system under communication and actuator faults Leyi Zheng a , Yimin Zhou a a Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China and the University of Chinese Academy of Sciences, Beijing, China Abstract In this paper, a heterogeneous leader-followers multiagent system is studied under simultaneous time-varying communication faults and actuator faults. First, the state of the leader is modelled as the closed-loop reference model where the states of the direct-connected followers are fed to the leader to improve the leader-followers tracking capability. An event-triggered communication mechanism is then designed for the agent information sharing among its neighbors so as to reduce the communication burden. Considering the time-varying communication link failure, a new distributed event-triggered observer is designed for each follower to estimate the whole system states so as to reduce the state error, whereas an adaptive distributed event-triggered estimator is further designed for the nondirect connected followers to estimate the coefficient matrix of the leader system. Further, an estimator is designed for the actuator fault estimation to reduce their impact on the system consistency. Hence, an adaptive event-triggered control strategy is proposed to ensure the consistency of the leader-follower system under the time-varying communication link faults and actuator faults. It is also shown that Zeno behavior is excluded for each agent and the effectiveness of the proposed adaptive event-triggered control strategy is verified on the heterogeneous multi-agent system. Keywords: Closed-loop reference model, Event-triggered, Time-varying communication faults, Actuator faults, Heterogeneous multi-agent system. 1. Introduction Multi-agent distributed cooperative control has received extensive attention in the past decades with its wide applications in smart grid, multi-robot system, intelligent transportation and other fields [1][2][3]. In practice, multiple agents with limited perception capability should cooperate with each other to complete the task with specific formation [4]. An interesting problem in multi-agent cooperative control is consistency [5], such as trajectory tracking [6], formation control[7], distributed estimation [8], motion planning [9]. As the development of multi-agent systems, the system security has received more and more attention [10], [11]. If the communication network is attacked, the communication links among the agents would be failed resulting in the inconsistency even failure of the task implementation [12]. At present, many studies have analyzed the resilience of multi-agent systems against system faults and malicious attacks. In [13], a discrete control strategy is designed to solve the consistency problem of linear multi-agent systems under random link failures and communication noise. A random malicious node state estimation problem is discussed, where an orthogonal complement method is proposed to distinguish between malicious nodes and faulty agents [14]. Then, the adverse effects on the attacked distributed multiple agents are analyzed to illustrate how the attack of a single node would spread to the entire network. A control method to mitigate the sensor attacks and actuator attacks is proposed in [15] via the estimates of the expected behavior of the normal nodes. A distributed H ∞ controller has been proposed and a distributed adaptive compensator is designed to reduce the interference of the attacks so as to tackle the problem of sensor and actuator failures [16]. Most existing distributed controllers would lose function during communication interruption caused by the attacks. To solve this problem, a new hybrid distributed control strategy is proposed with the latest cached data to enhance the robustness of the multi-agent system [17]. As the number of agents grows, the system would experience a concomitant escalation in communication demands, thereby increasing the vulnerability to the communication link failures. Since the event-triggered mechanism uses discrete communication, it can effectively reduce the communication burden. For sensor and actuator attacks Email addresses: ly.zheng@siat.ac.cn (Leyi Zheng), ym.zhou@siat.ac.cn (Yimin Zhou) Preprint submitted to Nuclear Physics B January 25, 2024" 2401.13539v1,"Dynamic Risk Management in Cyber Physical Systems Daniel Schneider, Jan Reich, Rasmus Adler and Peter Liggesmeyer 1 Fraunhofer IESE, Fraunhofer-Platz 1, 67663 Kaiserslautern, Germany name.surname@iese.fraunhofer.de Abstract. Cyber Physical Systems (CPS) enable new kinds of applications as well as significant improvements of existing ones in numerous different application domains. A major trait of upcoming CPS is an increasing degree of automation up to the point of autonomy, as there is a huge potential for economic success as well as for ecologic and societal improvements. However, to unlock the full potential of such (cooperative and automated) CPS, we first need to overcome several significant engineering challenges, where safety assurance is a particularly important one. Unfortunately, established safety assurance methods and standards do not live up to this task, as they have been designed with closed and less complex systems in mind. This paper structures safety assurance challenges of cooperative automated CPS, provides an overview on our vision of dynamic risk management and describes already existing building blocks. Keywords: Safety, Cyber-Physical Systems, Runtime Safety, Dynamic Risk Management. 1 Introduction Over the last decades we witnessed a very strong trend of computerization and digitization. As a consequence, people’s daily lives and ways of working have been undergoing significant transformations. For the future we are anticipating these trends to continue, maybe even further accelerate, and thus digital systems to be even more ubiquitous in everybody’s daily lives. We expect them to permeate every facet of it, to support humans in any way imaginable, be it with respect to information, health, mobility or work. At the same time, work life will undergo further transformation as systems are increasingly assuming tasks that today are exclusively addressed by humans. Corresponding visions are being developed and pursued for many years now and a pretty impressive range of corresponding umbrella terms have been coined along the way, such as Ubiquitous Computing, Pervasive Computing, Ambient Intelligence, Internet of Things or Cyber-Physical Systems. In addition, there are domain specific umbrella terms such as Industry 4.0, Autonomous Driving, Connected Automated Mobility, Operating Room of the Future, Ambient Assisted Living, and so on. All these visions of future systems are essentially enabled by a trinity of technological characteristics – automation, interconnection, and AI, where automation is the end and interconnection and AI are the indispensable means." 2401.13552v1,"1 On the Constrained CAV Platoon Control Problem MirSaleh Bahavarnia † , Junyi Ji †¶ Ahmad F. Taha † , and Daniel B. Work †¶ Abstract—The main objective of the connected and automated vehicle (CAV) platoon control problem is to regulate CAVs’ position while ensuring stability and accounting for vehicle dynamics. Although this problem has been studied in the literature, existing research has some limitations. This paper presents two new theoretical results that address these limitations: (i) the synthesis of unrealistic high-gain control parameters due to the lack of a systematic way to incorporate the lower and upper bounds on the control parameters, and (ii) the performance sensitivity to the communication delay due to inaccurate Taylor series approximation. To be more precise, taking advantage of the wellknown Padé approximation, this paper proposes a constrained CAV platoon controller synthesis that (i) systematically incorporates the lower and upper bounds on the control parameters, and (ii) significantly improves the performance sensitivity to the communication delay. The effectiveness of the presented results is verified through conducting extensive numerical simulations. The proposed controller effectively attenuates the stop-and-go disturbance—a single cycle of deceleration followed by acceleration— amplification throughout the mixed platoon (consisting of CAVs and human-driven vehicles). Modern transportation systems will benefit from the proposed CAV controls in terms of effective disturbance attenuation as it will potentially reduce collisions. Index Terms—Car-following models, connected and automated vehicles, H ∞ control, local stability, string stability, time-delay systems. I. I NTRODUCTION AND P APER C ONTRIBUTIONS T RAFFIC oscillations, also known as stop-and-go disturbances, in congested traffic have attained an increasing amount of attention in recent years (see [1] and the relevant references therein). The term stop-and-go disturbance refers to a single cycle of deceleration followed by acceleration. Various approaches have been developed to mostly control humandriven vehicles. One promising approach is via variable speed limit (VSL) control [2], [3]. Another one utilizes the emerging connected and automated vehicle (CAV) technology which facilitates the effective control of CAVs leading to significant enhancements in traffic flow capacity and stability [1], [4]–[6]. Specifically, the main objective of the CAV platoon control problem is to regulate CAVs’ position while ensuring stability and accounting for vehicle longitudinal dynamics [1]. CAV control strategies can mainly be classified into two controller types: (i) model predictive control (MPC) [5], [7]– [10], and (ii) linear controller [1], [6], [11]–[13]. Tab. I reflects the pros and cons corresponding to such controller types in terms of their ability to incorporate two crucial features: † The authors are with the Department of Civil and Environmental Engineering, Vanderbilt University, 2201 West End Avenue, Nashville, TN 37235, USA. ¶ Institute for Software Integrated Systems. Emails: mirsaleh.bahavarnia@vanderbilt.edu, junyi.ji@vanderbilt.edu, ahmad.taha@vanderbilt.edu, dan.work@vanderbilt.edu. This work is supported by the National Science Foundation, United States under grants ECCS 2151571, CMMI 2152450 and 2152928, and CNS 2135579. TABLE I T HE GENERAL SCHEMATIC STRUCTURE OF FEATURE INCORPORATION FOR TWO MAIN CONTROLLER TYPES IN THE CAV CONTROL STRATEGIES : (i) MPC, AND (ii) L INEAR C ONTROLLER . Controller Type Feature Local Stability and String Stability Explicit Constraints MPC Linear Controller ✗ ✓ ✓ ✗ (i) local stability and string stability (two main stability constraints to be thoroughly detailed in Section II-A), and (ii) explicit constraints (e.g., lower and upper bounds on the control parameters). Inspired by Tab. I, in the current study, we choose linear controller as the controller type and propose a systematic procedure to effectively incorporate both (i) local stability and string stability (as stability constraints) and (ii) box constraints (i.e., the lower and upper bounds) on the control parameters (as a main subclass of explicit constraints). In CAV-centered studies, vehicle platooning [14] emerges as a pivotal application with significant potential in both the immediate and distant future. This technology, crucial for enhancing road safety and efficiency, heavily relies on the efficacy of vehicle-to-everything (V2X) communication systems. Research, including findings from [15], underscores that both dedicated short-range communications and cellular vehicle-to-everything technologies can competently support safety applications necessitating end-to-end latency around 100 milliseconds, provided that vehicle density remains within manageable limits. However, a critical challenge arises as traffic density escalates, leading to a marked increase in V2X communication delay due to the communication channel congestion, as noted in several studies [16]–[18]. This surge in latency, particularly in congested scenarios, is a matter of concern. As highlighted in [18], effective vehicle platooning must accommodate maximum latencies ranging from 10 to 500 milliseconds. This necessitates the development of advanced control systems capable of adapting to these varying delay conditions, thereby ensuring the reliability and safety of vehicle platooning in diverse traffic environments. This research aims to address the escalating delays in high-density traffic scenarios, emphasizing the need for advanced controller synthesis that can effectively manage these challenges in vehicle platooning applications. Paper Objectives and Contributions. The main objective of the CAV platoon control problem is to regulate CAVs’ position while ensuring stability and accounting for vehicle longitudinal dynamics [1]. Although such a problem has been studied thoroughly in the literature, the existing research work [1] has some limitations. Two main limitations include (i) the synthesis of unrealistic high-gain control parameters due to the" 2401.13553v1,"Prototype study of 0.1% X 0 and MHz/cm 2 tolerant Resistive Plate Chamber with Diamond-Like Carbon electrodes Kei Ieki b , Weiyuan Li a , Atsuhiko Ochi c , Rina Onda a , Wataru Ootani b , Atsushi Oya a,∗ , Masato Takahashi c , Kensuke Yamamoto a a Department of Physics, The University of Tokyo, Bunkyo-ku, Tokyo 113-0033, Japan b International Center for Elementary Particle Physics, The University of Tokyo, Bunkyo-ku, Tokyo 113-0033, Japan c Department of Physics, Kobe University, Kobe 657-8501 Japan Abstract A novel Resistive Plate Chamber (RPC) was designed with Diamond-Like Carbon (DLC) electrodes and performance studies were carried out for 384 µm gap configuration with a 2 cm × 2 cm prototype. The use of thin films coated with DLC enables an ultra-low mass design of < 0.1% X 0 with up to a four-layer configuration. At the same time, 42% MIP efficiency, and 180 ps timing resolution per layer were achieved in a measurement performed under a 1 MHz/cm 2 non-MIP charged particle beam. In addition, we propose a further improved design for a 20 cm-scale detector that can achieve 90% four-layer efficiency in an even higher 4 MHz/cm 2 beam. In this paper, we describe the detector design, present the results of performance measurements, and characterize the rate capability of the DLC-based RPCs with a performance projection for an improved design. Keywords: RPC 1. Introduction In the MEG II experiment searching for the µ → eγ decay, the reduction of background photons plays an important role in having a high sensitivity. One of the main sources of such photons is the radiative muon decay (RMD, µ → eνν̄γ), which can be reduced in the analysis by detecting the coincident positrons typically with < 5 MeV. With the magnetic field of the spectrometer, about 90% acceptance can be covered for the RMD positrons with 20 cm diameter detectors placed at both ends of the MEG II apparatus, upstream and downstream (Fig. 77 of [1]). Though the downstream detector is already installed as presented in [2], the upstream part is still under development. This paper focuses on the development of the upstream detector, which is required to detect the RMD positrons in the high-rate low-momentum muon beam. To be operational in the environment where the low-momentum (28 MeV/c) muon beam penetrates the detector, the material budget is limited below 0.1% X 0 , and the rate capability up to 4 MHz/cm 2 is required. In addition, > 90% MIP efficiency and < 1 ns timing resolution are required to identify the RMD photons efficiently. The detector candidate is a new type of Resistive Plate Chamber (RPC) with electrodes based on Diamond-Like Carbon (DLC, amorphous carbon material with controllable resistivity [3]) sputtered on thin polyimide foils. This paper presents measured performances of a 2 cm × 2 cm prototype with DLC. This design overcame the limitation on the rate capability and the material budget of the conventional glass-based RPCs while taking advantage of good efficiency and timing resolution. ∗ Corresponding author Email address: atsushi@icepp.s.u-tokyo.ac.jp (Atsushi Oya) Preprint submitted to Journal of L A TEX Templates Figure 1: Concept of Resistive Plate Chamber with DLC-based electrodes for the MEG II experiment. The high voltages are applied independently to each layer. The number of layers is limited because of the < 0.1% X 0 requirement. The concept of the detector design is described in Sec. 2 with an explanation of the prototype configuration. The measured performances with the prototype detector in several different conditions are presented in Sec. 3, and the results are discussed in Sec. 4 with a suggestion on the final detector design. 2. Design of RPC with DLC coated electrodes The basic structure of the detector is similar to the conventional glass-based RPCs with a uniform electric field between the parallel plate resistive electrodes (Fig. 1). The difference is that the resistive electrodes consist of 50 µm polyimide films coated with DLC (Fig. 2). This offers the advantage of low mass design, and the < 0.1% X 0 requirement can be fulfilled with up to four layers of configuration. Another unique characteristic can be found in the high-voltage (HV) supply, particularly in multi-layer configurations. As polyimide is insulating, the January 25, 2024" 2401.13561v1,"Pricing of Short Circuit Current in High IBR-Penetrated System Zhongda Chu, Jingyi Wu, Fei Teng Department of Electrical and Electronic Engineering Imperial College London, London, UK {z.chu18, jingyi.wu19, fei.teng}@imperial.ac.uk Abstract—With the growing penetration of Inverter-Based Resources (IBRs) in power systems, stability service markets have emerged to incentivize technologies that ensure power system stability and reliability. Among the various challenges faced in power system operation and stability, a prominent issue raised from the increasing integration of large-scale IBRs is the significant reduction of the Short-Circuit Current (SCC) level in the system, which poses a considerable threat to system voltage stability and protection. Thus, a proper market mechanism to incentivize the provision of SCC as a stability service is desired. However, the pricing of this service within the future stability market has not yet been fully developed, due to the nonconvex nature of SCC constraints and the locational property of SCC. To address these problems, this work aims to explore, for the first time, a pricing model for SCC service by incorporating a linearized SCC constraint into the Unit Commitment (UC) problem, to achieve the desired SCC level and extract the shadow price for SCC through different pricing methods. Index Terms—short-circuit current, ancillary service pricing, unit commitment. I. I NTRODUCTION Growing awareness and acknowledgment of environmental issues like global warming and escalating pollution have motivated policymakers worldwide to commit to ambitious decarbonization targets [1]. In recent years, there has been a profound transformation in the composition of the power generation mix. Particularly in Europe, electric systems are undergoing a shift towards a Renewable Energy Sources (RESs) dominated architecture [2] [3]. Interfaced with the grid through power electronic devices, IBRs provide much less SCC compared with traditional Synchronous Generators (SGs) due to their limited overloading capability [4]. Therefore, with the increasing penetration of IBRs and the retirements of SGs, a decreasing trend of SCC levels in power systems is anticipated. CIRED Workshop predicts a reduction in SCC level for rural nodes in Germany [5]. Also, according to System Operability Framework Document by National Grid ESO, an overall decline of around 15% in the national SCC level from 2019 to 2023 is expected [6]. The reduction of SCC levels in power systems leads to threads in various aspects. Protection devices may take longer or even not be able to detect faults in the system, posing risks to system operation and stability [7]. Additionally, inadequacy in SCC may cause unsettled voltage oscillations in the network and would further cause loss of synchronization of the Phase-Locked Loop (PLL) [8] and transient voltage stability issues. Therefore, enhancing the SCC and addressing the related issues have been an important procedure in high IBR- penetrated systems. Various attempts have been proposed on this, including physically improving the overloading capabilities of semiconductors by inserting phase-change material into chips [9], and allocating additional synchronous condensers in the system to maintain the system minimum SCC [10]. However, these approaches bring additional cost to either IBR manufacturers or system operators, and therefore how to incentivize the provision of SCC in the system becomes an essential element for the future SCC market development. European Union Emissions Trading Scheme (EUETS) classifies the typical ancillary services procured by Transmission System Operators (TSOs) into frequency control services (regulation, load following, operating reserves) and non-frequency control services (voltage control, ramp limit, SCC, etc.) [11], which are considered as the main ancillary services in existing electricity markets [12]. Although some of these markets have been well established based on duality theory, difficulties still exist. In order to determine the price of SCC in the system, it is necessary to integrate the SCC constraint into the system scheduling model. However, due to the complicated SCC calculation, proper linearization methods such as [13], [14] to relax the nonlinearity and nonconvexity in the SCC constraint have to be incorporated. Another key challenge lies in determining the marginal costs of uplift payment, which is associated with the inherent nonconvexity in power systems: the binary nature of the commitment decision for thermal units. This makes it impractical to apply duality theory directly, even when pricing energy in energy markets [15]. Some approaches have been proposed to address this issue. The dispatchable method relaxes the commitment decisions of thermal units from binary variables to continuous ones. This approach converts the original MILP formulation of the UC problem into an LP problem where the dual variables can be defined properly [16]. Nevertheless, it has a limitation in capturing the complete technical characteristics of generators, therefore prices computed through this method might not correspond to feasible operating points for power systems [17]. The restricted pricing method, on the other hand, computes the SCC price by solving the UC problem twice. In the first time, the original 23rd Power Systems Computation Conference Paris, France — June 4 – 7, 2024 PSCC 2024" 2401.13571v1,"Gaseous Diffusion as a Correlated Random Walk Santos Bravo Yuste, ∗ Rubén Gómez González, † and Vicente Garzó ‡ Departamento de Fı́sica and Instituto de Computación Cientı́fica Avanzada (ICCAEx), Universidad de Extremadura, E-06006 Badajoz, Spain (Dated: January 25, 2024) The mean square displacement per collision of a molecule (also referred to as a random walker or intruder) immersed in a gas at equilibrium is given by its mean square displacement between two consecutive collisions (mean square free path) corrected by a prefactor in the form of a series. The (n+1)-th term of the series is directly proportional to the mean value of the projection of r i over r i−n , being r i the displacement of the intruder between the (i − 1)-th and i-th collision. In this article, we provide simple arguments to derive an accurate approximate expression for each term of the series. Summation of this series enables the determination of both the mean square displacement and the diffusion coefficient, which are expressed exclusively in terms of two quantities: the mean square free path and the mean persistence ratio (a quantity related to the correlation between velocities before and after a collision). The key result in this random walk approach is that the ratio of two consecutive terms of the corrective series is well approximated by the mean persistence ratio. We consider exact expressions for the terms of this series and calculate the ratio of several consecutive terms for the case of hard spheres. We find that these ratios are indeed very well approximated by the mean persistence ratio, which supports our approach. These theoretical results are confirmed with Monte Carlo simulations of the Boltzmann equation. A simple and an improved expression for the diffusion coefficient D are derived. They are compared with the so-called first and second Sonine approximations to D as well as with computer simulations of the Boltzmann equation. It is found that the improved random walk diffusion coefficient exhibits a very good agreement with simulation results across all intruder and molecule mass ranges. In particular, when the intruder’s mass is smaller than that of the gas molecules, the improved random walk formula outperforms even the first Sonine approximation. I. INTRODUCTION The Chapman–Enskog solution of the Boltzmann equation is the most successful and well-known method for determining the transport coefficients of molecular gases [1]. This well-studied procedure assumes the existence of a normal solution where all the space and time dependence of the velocity distribution function f occurs only through a functional dependence on the hydrodynamic fields. This functional dependence can be made more explicit when the spatial gradients are small. In this situation, f is written as a series expansion in powers of the spatial gradients of the hydrodynamic fields (density, mean flow velocity and temperature): f = f (0) + f (1) + f (2) + · · · . Here, f (0) is the local version of the Maxwell-Boltzmann distribution function (zeroth-order in gradients), f (1) is of first-order in gradients (Navier–Stokes order), f (2) is of second-order in gradients (Burnett order), . . . . Unfortunately, within the Chapman–Enskog procedure, one has to be ready to pay the price of dealing with a mathematically complex and not very intuitive method. On the other hand, since the beginning of the kinetic theory of gases with Maxwell, Stefan, Boltzmann, ∗ santos@unex.es; https://fisteor.cms.unex.es/investigadores/ santos-bravo-yuste/ † ruben@unex.es ‡ vicenteg@unex.es; https://fisteor.cms.unex.es/investigadores/ vicente-garzo-puertos/ and Meyer [2], there has been a primary approach to address the study of transport properties of gases, namely, the mean free path (MFP) theory. This theory is much simpler and more intuitive than the Chapman–Enskog theory. This explains its use in many textbooks as an introductory method for studying transport properties in gases [3, 4] and why is sometimes referred to as the elementary kinetic theory of gases. In the elementary kinetic theory, the molecules are treated as masses of negligible volume (point particles) in constant random motion. They experience negligible intermolecular forces except during collisions, which justifies the concept of a free path between collisions. However, this approach suffers from some shortcomings: (i) its results are not always accurate; (ii) its arguments are in many occasions qualitative and highly debatable, and (iii) there is no general systematic way to improve its approximations [1, 5]. Notwithstanding, numerous researchers have shown that many of these limitations can be lessened and that a free path approach can yield good predictions on the diffusion of gases while retaining its ability to offer insights into the underlying physical mechanisms [5–9]. In this paper we consider the problem of diffusion of an intruder in a dilute gas at equilibrium (intruder and particles of the gas are in general mechanically different, i.e., they can differ in mass and size). In our approach, we treat the diffusion process of a molecule (or intruder) in the gas as a random walk problem. In other words, we view this diffusion problem as the result of a random process in which the molecule is, or behaves like, a" 2401.13584v1,"1 Securing the Invisible Thread: A Comprehensive Analysis of BLE Tracker Security in Apple AirTags and Samsung SmartTags Hosam Alamleh, Michael Gogarty, David Ruddell, and Ali Abdullah S. AlQahtani, Abstract—This study presents an in-depth analysis of the security landscape in Bluetooth Low Energy (BLE) tracking systems, with a particular emphasis on Apple AirTags and Samsung SmartTags, including their cryptographic frameworks. Our investigation traverses a wide spectrum of attack vectors such as physical tampering, firmware exploitation, signal spoofing, eavesdropping, jamming, app security flaws, Bluetooth security weaknesses, location spoofing, threats to owner devices, and cloud-related vulnerabilities. Moreover, we delve into the security implications of the cryptographic methods utilized in these systems. Our findings reveal that while BLE trackers like AirTags and SmartTags offer substantial utility, they also pose significant security risks. Notably, Apple’s approach, which prioritizes user privacy by removing intermediaries, inadvertently leads to device authentication challenges, evidenced by successful AirTag spoofing instances. Conversely, Samsung SmartTags, designed to thwart beacon spoofing, raise critical concerns about cloud security and user privacy. Our analysis also highlights the constraints faced by these devices due to their design focus on battery life conservation, particularly the absence of secure boot processes, which leaves them susceptible to OS modification and a range of potential attacks. The paper concludes with insights into the anticipated evolution of these tracking systems. We predict that future enhancements will likely focus on bolstering security features, especially as these devices become increasingly integrated into the broader IoT ecosystem and face evolving privacy regulations. This shift is imperative to address the intricate balance between functionality and security in nextgeneration BLE tracking systems. Index Terms—Bluetooth Low Energy, Security Analysis, Apple AirTags, Samsung SmartTags, Digital Authentication, Signal Spoofing, BLE. I. I NTRODUCTION Since its advent in 2010, Bluetooth Low Energy (BLE) technology has significantly evolved, catalyzing the development of a myriad of products, notably BLE trackers like Apple’s AirTag and Samsung’s Galaxy SmartTag [1]. These innovative devices assist users in locating misplaced or lost items by pairing with smartphones and leveraging a network of devices to relay location information when out of range, functionality encapsulated in the ’Lost Mode’. This paper was produced by the IEEE Publication Technology Group. They are in Piscataway, NJ. Manuscript received April 19, 2021; revised August 16, 2021. H. Alamleh (the corresponding author), M. Gogarty, and D. Ruddel are with the Department of Computer Science, University of North Carolina Wilmington, Wilmington, NC, USA, 28403. E-mails: {alamlehh,dr1236,mcg1441}@uncw.edu A. AlQahtani is with the Department of Computer Systems Technology, North Carolina A&T State University, Greensboro, NC, USA, 27411. E-mail: AlQahtani.aasa@gmail.com Member, IEEE Despite their widespread adoption and utility, there remains a conspicuous gap in the comprehensive examination of the security aspects of these BLE trackers. This gap is partly attributed to the multifaceted nature of potential attacks and the sensitivity of the information at risk. In light of this, our paper embarks on a detailed security analysis of BLE trackers, primarily focusing on Apple AirTags and Samsung Galaxy SmartTags. We aim to illuminate the spectrum of potential risks and vulnerabilities these devices harbor, thereby advancing the understanding of their security implications. Our research is pivoted on several critical questions: RQ1: What methods could be employed to compromise BLE tracking systems, and what would be the repercussions of these attacks? • RQ2: How does the BLE tracker designs by apple and samsung impact user privacy and security? • RQ3: What features are anticipated to be incorporated into future BLE trackers to address existing challenges? • To address these queries, we delve into the intricacies of the communication protocols, firmware, and encryption mechanisms deployed in these trackers. Additionally, we assess the broader implications of these systems’ implementations on user privacy and security. In doing so, we contribute to bridging the existing research gap by providing a holistic view of the security landscape surrounding BLE trackers. This investigation is not only crucial for users and manufacturers but also pivotal for the broader field of network security, especially as these devices become increasingly integrated into the fabric of the Internet of Things (IoT). The remainder of this paper is structured as follows: Section II provides a detailed overview of the operational framework of BLE tracking systems, focusing on the roles and interactions of various components such as BLE trackers, owner devices, helper devices, and cloud infrastructure. Section III reviews existing literature and research in the field. This section contextualizes our study within the broader scope of BLE tracker security, highlighting the contributions of previous studies and identifying the gaps our research aims to fill. Section IV presents an in-depth examination of the various potential attack vectors targeting BLE tracking systems. Section V interprets the findings from the previous sections, discussing the broader implications of our analysis for BLE tracker implementations, user privacy, and system security. This section also explores potential future trends and developments in BLE tracking" 2401.13592v1,"RI−Calc: A User Friendly Software and Web Server for Refractive Index Calculation Leandro Benatto †a,∗ , Omar Mesquita a , Lucimara S. Roman b , Marlus Koehler b , Rodrigo B. Capaz a,c , Graziâni Candiotto †a,∗ a Institute of Physics, Federal University of Rio de Janeiro, 21941−909, Rio de Janeiro−RJ, Brazil. b Department of Physics, Federal University of Paraná, 81531−980, Curitiba−PR, Brazil. c Brazilian Nanotechnology National Laboratory (LNNano), Brazilian Center for Research in Energy and Materials (CNPEM), 13083−100, Campinas−SP, Brazil. Abstract The refractive index of an optical medium is essential for studying a variety of physical phenomena. One useful method for determining the refractive index of scalar materials (i.e, materials which are characterized by a scalar dielectric function) is to employ the Kramers−Kronig (K−K) relations. The K−K method is particularly useful in cases where ellipsometric measurements are unavailable, a situation that frequently occurs in many laboratories. Although some packages can perform this calculation, they usually lack a graphical interface and are complex to implement and use. Those deficiencies inhibits their utilization by a plethora of researchers unfamiliar with programming languages. To address the aforementioned gap, we have developed the Refractive Index Calculator (RI−Calc) program that provides an intuitive and user−friendly interface. The RI−Calc program allows users to input the absorption coefficient spectrum and then easily calculate the complex refractive index and the complex relative permittivity of a broad range of thin films, including of molecules, polymers, blends, and perovskites. The program has been thoroughly tested, taking into account the Lorentz oscillator model and experimental data from a materials’ refractive index database, demonstrating consistent outcomes. It is compatible with Windows, Unix, and macOS operating systems. You can download the RI−Calc binaries from our GitHub repository or conveniently access the program through our dedicated web server at nanocalc.org. Keywords: Refractive index, Kramers−Kronig, Absorption coefficient, Lorentz oscillator model. 1. Introduction light absorbed per layer, the external quantum efficiency, among other relevant information. The complex index of refraction (or optical constants, ñ) is an important property that characterizes the interaction of light with matter[1]. ñ is formed by a real (η) and an imaginary (κ) parts that are both functions of the wavelength (λ) so that ñ(λ) = η(λ) + iκ(λ). η(λ) is the ratio of the speed of light in a vacuum compared to the phase velocity of light in the material, whereas κ(λ) is the light extinction (or attenuation) coefficient due to absorption. Several important optical and optoelectronic phenomena are decisively influenced by ñ(λ) [2, 3]. For example, η(λ) is essential to calculate the Förster resonance energy transfer (FRET) rate between molecules that are fluorescent [4–6]. The FRET process is important for photosynthesis [7, 8] and many technological applications like biosensing [9, 10], organic light−emitting diodes [11–13], and organic photovoltaics [14–17], among others [18–22]. Another application example that relies heavily on ñ(λ) is the multilayer optical structure. The matrix method is employed in such devices to compute the reflection and transmission coefficients of the electromagnetic field, where ñ(λ) of each layer is necessary for the calculations [23, 24]. From this method it is possible to obtain the optical electric field distribution inside the devices, the fraction of Considering the progress in materials design to improve device efficiencies [25–30], a quick and efficient way to obtain the refractive index of different materials is essential and very welcomed. In many situations the ellipsometry apparatus (that can be used to measure ñ(λ)) is not easily available so that the alternative is to employ theoretical approaches. One convenient theoretical method is the application of the Kramers−Kronig (K−K) relation [31]. ∗ Corresponding authors: lb08@fisica.ufpr.br and gcandiotto@iq.ufrj.br † These authors contributed equally to this work Preprint submitted to Computer Physics Communications There are some packages that apply the K−K coefficients to calculate ñ(λ). Some of them are not user friendly and demand some knowledge of code development to be useful [32]. Others of them that have a graphical interface (only for Windows) also have many integrated features and fitting options that make their use non−trivial [33, 34]. In addition, it is worth noting that there are instances in which utilizing the software incurs a usage fee [35]. It is important to mention that some programs employ alternative approaches to compute the refractive index, one of which is the envelope method [36]. This context motivated us to developed a software, Refractive Index Calculator (RI−Calc) to evaluate ñ(λ) using the K−K method. RI−Calc was developed in Python programming language. Compared to other software, it features a simple and intuitive graphic interface, making it very easy to handle. With a focus on investigating novel materials, RI−Calc allows users to input the absorption coefficient spectrum and then easily calculate the complex refractive index and the complex relative per- January 25, 2024" 2401.13593v2,"Enhanced quantum control of individual ultracold molecules using optical tweezer arrays Daniel K. Ruttley, Alexander Guttridge, Tom R. Hepworth, and Simon L. Cornish ∗ Department of Physics, Durham University, South Road, Durham, DH1 3LE, United Kingdom and Joint Quantum Centre Durham-Newcastle, Durham University, South Road, Durham, DH1 3LE, United Kingdom (Dated: January 26, 2024) Control over the quantum states of individual molecules is crucial in the quest to harness their rich internal structure and dipolar interactions for applications in quantum science. In this paper, we develop a toolbox of techniques for the control and readout of individually trapped polar molecules in an array of optical tweezers. Starting with arrays of up to eight Rb and eight Cs atoms, we assemble arrays of RbCs molecules in their rovibrational and hyperfine ground state with an overall efficiency of 48(2)%. We demonstrate global microwave control of multiple rotational states of the molecules and use an auxiliary tweezer array to implement site-resolved addressing and state control. We show how the rotational state of the molecule can be mapped onto the position of Rb atoms and use this capability to readout multiple rotational states in a single experimental run. Further, using a scheme for the mid-sequence detection of molecule formation errors, we perform rearrangement of assembled molecules to prepare small defect-free arrays. Finally, we discuss a feasible route to scaling to larger arrays of molecules. I. INTRODUCTION Ultracold molecules offer a versatile platform for quantum science [1–3], with applications spanning quantum simulation [4–9] and quantum information processing [10–16] to ultracold chemistry [17–19] and precision measurement [20–24]. Molecules feature a rich internal structure, constituting a ladder of rotational states with long radiative lifetimes. Preparing molecules in a superposition of rotational states engineers dipole-dipole interactions that can be controlled using microwave fields. These properties make rotational states well-suited for applications as qubits [25, 26] or pseudo-spins in a quantum simulator [27–29]. Moreover, the abundance of longlived rotational states unlocks possibilities such as synthetic dimensions in the rotational degree of freedom [30], realization of qudits [16] or the implementation of quantum error-correcting codes in the molecule’s internal states [15]. Realization of many of these theoretical proposals demands a high level of control of the quantum states of individual molecules. Attaining such control is pivotal to exploit the wide array of tools offered by ultracold molecules for quantum science. Significant progress has been made in preparing and manipulating internal and external states of molecules [31, 32] but control and detection of individual molecules in a single internal and external quantum state is an ongoing challenge. Optical tweezer arrays are a powerful platform for the trapping, control, and readout of single ultracold particles [33–35]. Arrays of tweezers are dynamically reconfigurable, allowing flexible connectivity [36] and enabling the preparation of states with low configurational entropy through rearrangement of particles [37–39]. In this ∗ s.l.cornish@durham.ac.uk tweezer array platform, long-range interactions between trapped particles have been utilized to simulate complex quantum systems [40–42]. The platform’s inherent scalability [43] provides a promising avenue for constructing arrays with an even greater number of particles. The extension of tweezer arrays to ultracold molecules has been realized recently for both laser-cooled [44–46] and assembled molecules [47, 48]. However, the full toolbox of techniques developed for ultracold atoms in optical tweezers has yet to be extended to the more complex molecular systems. In this paper, we address this gap by extending established experimental techniques demonstrated in neutral-atom tweezer arrays, which include rearrangement [38, 39], erasure conversion [49] and mid-circuit operations [50–53], to apply them to ultracold bialkali molecules. Specifically, we globally and locally control multiple rotational states of individually-trapped ultracold molecules. We introduce a technique for the readout of multiple rotational states in a single iteration of the experiment, achieved by mapping onto atomic states, and demonstrate rearrangement of molecules using mid-sequence detection of formation errors. The structure of the paper is as follows. Section II gives an overview of our experimental platform. Section III describes our procedure for the assembly of molecules in optical tweezers and reports the efficiency of this process. Section IV demonstrates global control of the rotational states of molecules in our optical tweezer array using microwave fields to perform coherent multi-photon excitation. Section V describes the detection of multiple rotational states of molecules in a single experimental run. Section VI demonstrates local control of rotational states using an addressing tweezer in combination with microwave fields to selectively excite specific molecules in the array. Section VII describes the detection of molecule formation errors and rearrangement of molecules to prepare a defect-free array. Finally, Section VIII examines the prospects for scaling the techniques described in this" 2401.13656v1,"Ernesto Colacrai Federico Cinus Politecnico di Torino, Turin, Italy ernesto.colacrai@gmail.com Sapienza University, Rome, Italy CENTAI, Turin, Italy federico.cinus@centai.eu Gianmarco De Francisci Morales Michele Starnini CENTAI, Turin, Italy gdfm@acm.org Universitat Politecnica de Catalunya, Barcelona, Spain CENTAI, Turin, Italy michele.starnini@gmail.com ABSTRACT KEYWORDS The prevalent perspective in quantitative research on opinion dynamics flattens the landscape of the online political discourse into a traditional left–right dichotomy. While this approach helps simplify the analysis and modeling effort, it also neglects the intrinsic multidimensional richness of ideologies. In this study, we analyze social interactions on Reddit, under the lens of a multi-dimensional ideological framework: the political compass. We examine over 8 million comments posted on the subreddits /r/PoliticalCompass and /r/PoliticalCompassMemes during 2020–2022. By leveraging their self-declarations, we disentangle the ideological dimensions of users into economic (left–right) and social (libertarian– authoritarian) axes. In addition, we characterize users by their demographic attributes (age, gender, and affluence). We find significant homophily for interactions along the social axis of the political compass and demographic attributes. Compared to a null model, interactions among individuals of similar ideology surpass expectations by 6%. In contrast, we uncover a significant heterophily along the economic axis: left/right interactions exceed expectations by 10%. Furthermore, heterophilic interactions are characterized by a higher language toxicity than homophilic interactions, which hints at a conflictual discourse between every opposite ideology. Our results help reconcile apparent contradictions in recent literature, which found a superposition of homophilic and heterophilic interactions in online political discussions. By disentangling such interactions into the economic and social axes we pave the way for a deeper understanding of opinion dynamics on social media. Homophily, Polarization, Socio-Demographic, Reddit CCS CONCEPTS • Applied computing → Sociology; • Human-centered computing → Social networks; • Information systems → Social networks. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. WWW ’24, May 13-17, 2024, Singapore © 2024 Association for Computing Machinery. ACM ISBN 978-1-4503-XXXX-X/18/06. . . $15.00 https://doi.org/XXXXXXX.XXXXXXX ACM Reference Format: Ernesto Colacrai, Federico Cinus, Gianmarco De Francisci Morales, and Michele Starnini. 2024. Navigating Multidimensional Ideologies with Reddit’s Political Compass: Economic Conflict and Social Affinity. In Proceedings of The Web Conference (WWW ’24). ACM, New York, NY, USA, 13 pages. https://doi.org/XXXXXXX.XXXXXXX Authoritarian Authoritarian Left Authoritarian Right Left economic axis Libertarian Left social axis Navigating Multidimensional Ideologies with Reddit’s Political Compass: Economic Conflict and Social Affinity Right Libertarian Right Libertarian Figure 1: The political compass [41]: the horizontal axis delineates the economic ideologies, moving from left (equalityfocused) to right (liberty-focused), and represents views on resource allocation. The vertical axis delineates the social ideologies, from libertarian at the bottom to authoritarian at the top, and represents views on personal freedom. 1 INTRODUCTION AND BACKGROUND Understanding the dynamics of opinion formation in a population is a goal shared by researchers from different disciplines, from social and computer science to physics. Numerous studies have revealed the presence of opinion polarization in political discussions [43]: The phenomenon whereby two distinct groups tend to have opposite and potentially extreme views on a specific controversial topic, spanning religion, race, political stance, and more [32, 38, 44, 55, 64]. When social interactions among individuals are taken into account, we observe homophily: individuals prefer to interact with peers that hold similar opinions [14, 15, 32]. The combination of" 2401.13663v1,"JLAB-THY-24-3986 Analytic Solutions of the DGLAP Evolution and Theoretical Uncertainties Andrea Simonelli ∗ Department of Physics, Old Dominion University, Norfolk, VA 23529, USA and Theory Center, Jefferson Lab, Newport News, Virginia 23606, USA The energy dependence for the singlet sector of Parton Distributions Functions (PDFs) is described by an entangled pair of ordinary linear differential equations. Although there are no closed analytic solutions, it is possible to provide approximated results depending on the assumptions and the methodology adopted. These results differ in their sub-leading, neglected terms and ultimately they are associated with different treatments of the theoretical uncertainties. In this work, a novel analytic approach in Mellin space is presented and different analytic results for the DGLAP evolution at Next-Lowest-Order are compared. Advantages and disadvantages for each solution are discussed and generalizations to higher orders are addressed. CONTENTS I. Introduction 1 II. Singlet Evolution II.1. Evolution in 2 Dimensions II.2. Solutions at Next-Lowest-Order 2 3 5 III. Theoretical uncertainties and Violation of the Evolution Equations 7 IV. Logarithmic Accuracy 9 V. Conclusions 11 Acknowledgments 12 A. Results for matrix representations in two dimensions References 12 13 I. INTRODUCTION Parton densities have played a central role in the investigations of the strong force since the early days of QCD. During the years, they have been deeply studied, leading to a thriving literature and to many successes in the phenomenology of hard processes. Starting from the seminal works by Gribov and Lipatov [1], Altarelli and Parisi [2] and Dokshitzer [3] (DGLAP), it soon became clear that the parton distribution functions (PDFs) are solutions of a set of integro-differential equations, with proper boundary conditions. Specifically, the DGLAP evolution is:  z  X Z 1 dz ∂ f (x, Q) = P (z, a (Q)) f ,Q (1) S i/h i/j j/h ∂ log Q 2 x x z j where the indices i, j represent any parton species inside the hadron h, meaning any available flavor of quarks and antiquarks at the energy scale Q, and the gluon. Within this picture, they carry a fraction x of the overall momentum of the hadron. The kernels P i/j can be expanded in powers of α S and the coefficients of such expansion are now completely known up to next-to-next-leading-order (NNLO) [4–6] and some estimates are available for the N 3 LO [7– 12]. The higher is the energy scale Q, the more such expansion is trustful. Realistically, the support of Eq. (1) where perturbative QCD can be safely applied roughly corresponds to values of Q greater then ≈ 1 GeV. This lower ∗ andsim@jlab.org" 2401.13702v1,"Open Source Prover in the Attic Zoltán Kovács The Private University College of Education of the Diocese of Linz, Austria zoltan.kovacs@ph-linz.at Alexander Vujic The Private University College of Education of the Diocese of Linz, Austria alexander.vujic@ph-linz.at The well known JGEX program became open source a few years ago, but seemingly, further development of the program can only be done without the original authors. In our project, we are looking at whether it is possible to continue such a large project as a newcomer without the involvement of the original authors. Is there a way to internationalize, fix bugs, improve the code base, add new features? In other words, to save a relic found in the attic and polish it into a useful everyday tool. Keywords: JGEX, Java development, open source, education, Dynamics Geometry Systems. 1 Introduction Wide access to computers in education opens a new horizon in applying automated reasoning tools in the classroom. Many software tools exist already, that are of different levels of maturity, and several issues can be found that prevent direct use of them in education. One of the most mature tools is Java Geometry Expert (JGEX, [11–13]), which has its roots in Wichita State University and was developed by the automated geometry reasoning school, led by Chou and Gao, and programmed (mostly) by Ye. JGEX is a remarkable summary of several decades of pioneering work [2]. It consists of more than 108,000 lines of Java code in more than 230 files. It has been open-sourced, however, just a couple of years ago (in 2016), and it was published on GitHub. 1 Since then, more than 80 forks were created and the project was starred by more than 400 users. These numbers clearly show the popularity of JGEX, even if the original authors discontinued their work: Ye’s latest (very minor) change was committed in July 2018. Therefore, in our work, we raise the question, if it is still possible to contribute to this project significantly. Why are further contributions necessary? First of all, the software tool supports only a couple of languages. For educational use, a translation for native speakers seems unavoidable: young learners may have difficulties with languages. Second, a modern user interface may be more appealing for the new generation of users. Third, science is clearly at a more mature state-of-the-art now, so some updates in the used algorithms seem important after a while. Fourth, it turned out that some minor, annoying bugs still exist in the program – they should be fixed someday: it is very important for a tool that is expected to be error-free in all matters when it is about theorem proving. In our paper we discuss the possibility of continuing an existing tool for automated proving without the possibility to contact the original authors. Our discussion focuses on translating JGEX into German and Serbian, and on extending its capabilities to provide a better user experience. Also, we discuss how 1 https://github.com/yezheng1981/Java-Geometry-Expert P. Quaresma and Z. Kovács (Ed.): Automated Deduction in Geometry 2023 (ADG 2023). EPTCS 398, 2024, pp. 53–61, doi:10.4204/EPTCS.398.9 © Z. Kovács & A. Vujic This work is licensed under the Creative Commons Attribution License." 2401.13703v1,"Solving Some Geometry Problems of the Náboj 2023 Contest with Automated Deduction in GeoGebra Discovery Amela Hota The Private University College of Education of the Diocese of Linz, Austria amela.hota@ph-linz.at Zoltán Kovács The Private University College of Education of the Diocese of Linz, Austria zoltan.kovacs@ph-linz.at Alexander Vujic The Private University College of Education of the Diocese of Linz, Austria alexander.vujic@ph-linz.at In this article, we solve some of the geometry problems of the Náboj 2023 competition with the help of a computer, using examples that the software tool GeoGebra Discovery can calculate. In each case, the calculation requires symbolic computations. We analyze the difficulty of feeding the problem into the machine and set further goals to make the problems of this type of contests even more tractable in the future. 1 Introduction With the everyday rise of Artificial Intelligence (AI), the power of computers has become tangible for the masses. Yes, it can do your homework (not just in maths), but it can also pass your A-level exams. 1 A long series of ad-hoc studies have shed light on what the present can offer: often instant and perfect answers to questions that take years of learning to solve by human means. This raises a number of research questions, such as whether the current school system is still needed, whether teachers are still needed, or whether it is enough to have AI. 2 Of course, alongside the praise, there are also many criticisms: AI sometimes makes mistakes, especially in textual problem settings where the question is formulated in a challenging way. Automatic geometrical derivations, on the other hand, are perfect and, as such, there is no such a major possibility of error. The answer is not derived from a statistically computed result (as is so often the case with AI-based algorithms), but a verifiable derivation is given in each case. We do not claim that the two directions cannot meet once, and indeed, ultimately, AI should refer to, i.e. use, the ADG algorithm as a subroutine. There are already prototypes working in this direction, e.g. the WolframAlpha system has been successfully coupled with an AI frontend. 3 1 See https://telex.hu/tech/2023/05/09/chatgpt-bing-mesterseges-intelligencia-matematika-erett segi. 2 See Bill Gates’ notes at https://www.gatesnotes.com/ASU-and-GSV?WT.mc_id=20230419100000_ASU-GSV-202 3_BG-EM_. 3 See Stephen Wolfram’s notes at https://writings.stephenwolfram.com/2023/03/chatgpt-gets-its-wolfram -superpowers/. P. Quaresma and Z. Kovács (Ed.): Automated Deduction in Geometry 2023 (ADG 2023). EPTCS 398, 2024, pp. 110–123, doi:10.4204/EPTCS.398.14 © A. Hota et al. This work is licensed under the Creative Commons Attribution License." 2401.13704v1,"Using Java Geometry Expert as Guide in the Preparations for Math Contests Ines Ganglmayr The Private University College of Education of the Diocese of Linz, Austria ines.ganglmayr@ph-linz.at Zoltán Kovács The Private University College of Education of the Diocese of Linz, Austria zoltan.kovacs@ph-linz.at We give an insight into Java Geometry Expert (JGEX) in use in a school context, focusing on the Austrian school system. JGEX can offer great support in some classroom situations, especially for solving mathematical competition tasks. Also, we discuss some limitations of the program. 1 Introduction The use of technical media in Austrian mathematics lessons is largely limited to the GeoGebra medium. GeoGebra [5] proved to be a great tool to visualize and analyze classroom problems, but certain tasks like proving geometric facts rigorously by using a visual explanation is not supported by GeoGebra. As an alternative approach, we focus on introducing JGEX [6] as opposed to GeoGebra, specifically in the area of competition tasks. Geometric proofs are no longer an important part of secondary school curriculum in Austria and many other countries. Formerly, however, Euclidean plane geometry and proving more complicated facts was a part of the expected knowledge of secondary level. There are, however, some initiatives, that call for rethinking school curriculum, by focusing on structured thinking again. According to the Ministry of Education and Science in Portugal, for example, structured thinking is one of the main goals for teaching mathematics. It is also anchored in Austrian curricula that the qualitative development of tasks requires various dimensions of content, dimensions of action and dimensions of complexity, which hierarchically structure the understanding and learning of students. Analytically consistent thinking and the acquisition of mathematical skills are in the foreground. A central concern of mathematics is learning processes and techniques to acquire connections as well as insights and to solve problems [3]. 1 One method to achieve this can be done by examining properties of certain structures. To achieve this, a concept of hierarchical structures is developed, and a systematic investigation is attempted. This form of working out is part of hypothetical-deductive thinking, which can be equated with mathematical thinking. But beyond that, inductive reasoning is also part of mathematical understanding, since it enables assumptions and conclusions [2]. According to Duval, three cognitive processes are involved in learning geometry. These are visualization, construction and reasoning. Those can be activated separately but also together. They may or 1 New version of the curriculum from Portugal: https://eurydice.eacea.ec.europa.eu/national-education-s ystems/portugal/national-reforms-school-education. P. Quaresma and Z. Kovács (Ed.): Automated Deduction in Geometry 2023 (ADG 2023). EPTCS 398, 2024, pp. 124–131, doi:10.4204/EPTCS.398.15 © I. Ganglmayr & Z. Kovács This work is licensed under the Creative Commons Attribution License." 2401.13759v1,"Astronomy & Astrophysics manuscript no. main January 26, 2024 ©ESO 2024 Dark lens candidates from Gaia Data Release 3 K. Kruszyńska 1, 2,⋆ , Ł. Wyrzykowski 1 , K. A. Rybicki 3 , K. Howil 1 , M. Jabłońska 1, 4 , Z. Kaczmarek 5 , N. Ihanec 1 , M. Maskoliūnas 6 , M. Bronikowski 7 , and U. Pylypenko 1 1 Astronomical Observatory, University of Warsaw, Al. Ujazdowskie 4, 00-478 Warszawa, Poland Las Cumbres Observatory, 6740 Cortona Drive, Suite 102, Goleta, CA 93117, USA 3 Department of Particle Physics and Astrophysics, Weizmann Institute of Science, Rehovot 76100, Israel 4 Research School of Astronomy and Astrophysics, Australian National University, Mount Stromlo Observatory, Cotter Road Weston Creek, ACT 2611, Australia 5 Zentrum für Astronomie der Universität Heidelberg, Astronomisches Rechen-Institut, Mönchhofstr. 12-14, 69120 Heidelberg, Germany 6 Institute of Theoretical Physics and Astronomy, Vilnius University, Saulėtekio al. 3, Vilnius, LT-10257, Lithuania 7 Center for Astrophysics and Cosmology, University of Nova Gorica, Vipavska 11c, SI-5270 Ajdovščina, Slovenia 2 Received xxxx; accepted xxxx ABSTRACT Gravitational microlensing is a phenomenon that allows us to observe dark remnants of stellar evolution even if they no longer emit electromagnetic radiation. In particular, it can be useful to observe solitary neutron stars or stellar-mass black holes, providing a unique window through which to understand stellar evolution. Obtaining direct mass measurements with this technique requires precise observations of both the change in brightness and the position of the microlensed star and the European Space Agency’s Gaia satellite can provide both. We analysed events published in the Gaia Data Release 3 (Gaia DR3) microlensing catalogue using publicly available data from different surveys. Here we describe our selection of candidate dark lenses, where we suspect the lens is a white dwarf (WD), a neutron star (NS), a black hole (BH), or a mass-gap object, with a mass in a range between the heaviest NS and the least massive BH. We estimated the mass of the lenses using information obtained from the best-fitting microlensing models, the Galactic model and the expected distribution of the parameters. We found eight candidates for WDs or NS and two mass-gap objects. Key words. Gravitational lensing: micro – Techniques: photometric – white dwarfs – Stars: neutron – Stars: black holes 1. Introduction There are still many outstanding questions connected with the remnants of stellar evolution. The most common stellar remnant is a white dwarf, and more than 95 per cent will become one by the end of their life (Fontaine et al. 2001). Our understanding of white dwarfs was expanded in recent years by Gaia and its superb parallaxes. The largest catalogue consists of over 350’000 high-confidence WD candidates, expanding almost ten times the amount of known WDs before Gaia (Gentile Fusillo et al. 2021). The best catalogue of known pulsars is two orders of magnitude smaller than the one we have for WDs in our Galaxy (Manchester et al. 2005). Our most limited observational material is on BHs, in particular solitary ones. Most of the known BHs are linked to binary systems found either through X-ray emission due to accretion of their companions (e.g. Corral-Santana et al. 2016) or as gravitational wave sources due to their merger (e.g. Abbott et al. 2019). Additionally, gravitational wave mergers are detected most frequently in distant galaxies. Recently, Shenar et al. (2022), El-Badry et al. (2023b), and El-Badry et al. (2023a) have reported on BH candidates also detected as noninteracting binary systems. However, the only known direct mass measurement for a solitary stellar-mass BH was recently presented for OGLE-2011-BLG-0462/MOA-2011-BLG-191 (Sahu et al. 2022; Lam et al. 2022; Mróz et al. 2022; Lam & Lu 2023) using the gravitational microlensing phenomenon. ⋆ e-mail: kkruszynska@lco.global Gravitational microlensing is an effect of Einstein’s General Relativity, which occurs when a massive object passes in front of a distant star within the Milky Way or its neighbourhood (Einstein 1936; Paczynski 1986). In contrast to strong gravitational lensing, here the separated, deformed images of the source are typically impossible to spatially resolve unless the world’s largest telescopes are used, and only in case of very bright events (Dong et al. 2019; Cassan et al. 2022). Instead, what can be observed is a brightening of the source occurring during the event. Images of the source, though difficult to resolve, are unequally magnified and change position. This causes a distinctive shift in the centroid of light called astrometric microlensing (Dominik & Sahu 2000; Belokurov & Evans 2002). This effect can be measured with precise enough observatories like Hubble Space Telescope (HST) (Sahu et al. 2017), or Gaia 1 . Combining both effects allows the mass of the lens M L to be measured following Gould (2000): M L = θ E , κπ E (1) where κ = 4G/c 2 au ≈ 8.144mas/M ⊙ , θ E is the angular Einstein Radius, which can be measured with astrometric microlensing, and π E is the microlensing parallax obtained from modelling the time-series photometry. A combination of these two effects was used to detect a stellar-mass BH for the first time in Sahu et al. 1 https://www.cosmos.esa.int/web/gaia/iow_20210924 Article number, page 1 of 16" 2401.13762v1,"Fast System Level Synthesis: Robust Model Predictive Control using Riccati Recursions ⋆ Antoine P. Leeman ∗ Johannes Köhler ∗ Florian Messerer ∗∗ Amon Lahr ∗ Moritz Diehl ∗∗,∗∗∗ Melanie N. Zeilinger ∗ ∗ Institute for Dynamic Systems and Control, ETH Zurich, Zurich 8053, Switzerland (e-mail:{aleeman; jkoehle; amlahr; mzeilinger}@ethz.ch) ∗∗ Department of Microsystems Engineering (IMTEK), University of Freiburg, 79110 Freiburg, Germany (e-mail: {florian.messerer; moritz.diehl}@imtek.uni-freiburg.de) ∗∗∗ Department of Mathematics, University of Freiburg, 79104 Freiburg, Germany Abstract: System level synthesis (SLS) enables improved robust MPC formulations by allowing for joint optimization of the nominal trajectory and controller. This paper introduces a tailored algorithm for solving the corresponding disturbance feedback optimization problem. The proposed algorithm builds on a recently proposed joint optimization scheme and iterates between optimizing the controller and the nominal trajectory while converging q-linearly to an optimal solution. We show that the controller optimization can be solved through Riccati recursions leading to a horizon-length, state, and input scalability of O(N 2 (n 3x + n 3u )) for each iterate. On a numerical example, the proposed algorithm exhibits computational speedups of order 10 to 10 3 compared to general-purpose commercial solvers. Keywords: Optimization and Model Predictive Control, Robust Model Predictive Control, Real-Time Implementation of Model Predictive Control 1. INTRODUCTION The ability to plan safe trajectories in real-time, despite model mismatch and external disturbances, is a key enabler for high-performance control of autonomous systems (Majumdar and Tedrake, 2017; Schulman et al., 2014). iLQR (Li and Todorov, 2004; Giftthaler et al., 2018) methods have shown great practical benefits (Neunert et al., 2016; Howell et al., 2019) by producing a feedback controller based on the optimal nominal trajectory. However, robust stability and robust constraint satisfaction are generally only addressed heuristically (Manchester and Kuindersma, 2017). Model predictive control (MPC) (Rawlings et al., 2017) has emerged as a key technology for control subject to (safety) constraints. Real-time feasibility of MPC, even in fast-sampled systems, is largely due to advancements in numerical optimization (Frison, 2016; Domahidi et al., 2012). These tailored algorithms exploit the stage-wise structure of the nominal trajectory optimization problem, utilizing, e.g., efficient Riccati recursions. Robust MPC approaches can account for model mismatch and external ⋆ This work has been supported by the European Space Agency under OSIP 4000133352, the Swiss Space Center, the Swiss National Science Foundation under NCCR Automation (grant agreement 51NF40 180545), by DFG via project 424107692, and by the European Union’s Horizon 2020 research and innovation programme, Marie Sk lodowska-Curie grant agreement No. 953348, ELO-X. disturbances by propagating them over the prediction horizon. While few robust MPC approaches optimize a feedback policy (Scokaert and Mayne, 1998; Villanueva et al., 2017; Messerer and Diehl, 2021; Kim et al., 2022), most robust MPC designs use an offline-fixed controller (Mayne et al., 2005; Köhler et al., 2020; Zanelli et al., 2021) for computational efficiency. Disturbance feedback (Goulart et al., 2006; Ben-Tal et al., 2004) overcomes this limitation by using a convex controller parametrization. Building on this parametrization, system level synthesis (SLS) (Anderson et al., 2019; Tseng et al., 2020; Li et al., 2023) facilitates the consideration of constraints on the closed-loop response. SLS has also been proposed within an MPC formulation (Sieber et al., 2021; Chen et al., 2022; Leeman et al., 2023a,b). However, the large number of decision variables in SLS poses a major obstacle for real-time implementation. Asynchronous updates (Sieber et al., 2023) or GPU parallelization (Alonso and Tseng, 2022) can reduce the computational time. Goulart et al. (2008) derived a structure-exploiting solver for disturbance feedback optimization, reducing the scalability of a naive interior-point method implementation from O(N 6 ) to O(N 3 ) per iteration. In this work, we leverage results in numerical optimization (Wright et al., 1999; Messerer and Diehl, 2021) to propose a customized optimization solver for SLS with O(N 2 ) scalability, significantly improving the computation times." 2401.13772v1,"Hybrid programming-model strategies for GPU offloading of electronic structure calculation kernels Jean-Luc Fattebert Computational Sciences and Engineering Division, Oak Ridge National Laboratory Christian F. A. Negre, Joshua Finkelstein, and Yu Zhang Theoretical Division, Los Alamos National Laboratory Jamaludin Mohd-Yusof, Michael E. Wall, and Susan M. Mniszewski Computer, Computational, and Statistical Sciences Division, Los Alamos National Laboratory Daniel Osei-Kuffuor Center for Applied Scientific Computing, Lawrence Livermore National Laboratory Nicolas Bock Canonical Ltd. (*Electronic address: fattebertj@ornl.gov) (Dated: January 26, 2024) To address the challenge of performance portability, and facilitate the implementation of electronic structure solvers, we developed the Basic Matrix Library (BML) and Parallel, Rapid O(N) and Graph-based Recursive Electronic Structure Solver (PROGRESS) libraries. BML implements linear algebra operations necessary for electronic structure kernels using a unified user interface for various matrix formats (dense, sparse) and architectures (CPUs, GPUs). Focusing on Density Functional Theory (DFT) and Tight-Binding (TB) models, PROGRESS implements several solvers for computing the single-particle density matrix and relies on BML. In this paper, we describe the general strategies used for these implementations on various computer architectures, using OpenMP target functionalities on GPUs, in conjunction with third-party libraries to handle performance critical numerical kernels. We demonstrate the portability of this approach and its performance on benchmark problems. I. INTRODUCTION Performance portability is a significant challenge for application programs that are run on modern HPC resources. For example, software solutions targeting portability such as OpenMP sometimes can have a hard time delivering performance, either due to the lack of maturity of compilers or the fine granularity of control needed for some specific kernels. On the other hand, writing kernels in a vendor specific language targeting one specific GPU may not be portable and can lead to software maintenance difficulties. Recent trends in HPC only make this problem more acute, as many leadership computing facilities have adopted hardware composed of heterogeneous compute nodes containing CPUs and GPUs, where a majority of the acceleration is provided by the GPUs [1–3]. In practice, it is usually best to use existing libraries when possible if those libraries implement the numerical kernels one needs. For electronic structure applications, linear algebra libraries are the most common dependency. For dense linear algebra on CPUs, standard interfaces developed for BLAS[4–6] and Lapack[7] have facilitated the use and development of these libraries, and several well optimized solutions exist. On GPUs, the situation is more complicated. Vendors offer optimized implementations of BLAS and Lapack in platform specific libraries such as cuBLAS, cuSolver (Nvidia), rocBLAS, rocSolver (AMD) and MKL (Intel). There is however no common interface to these libraries. As a consequence, application codes need to have platform specific wrappers around the functions they intend to use. In addition, application developers need to understand the details of all these interfaces. There are several reasons why the GPU situation is not as user friendly as it is on CPUs. First, there is the choice of having two possible locations for data arrays passed as arguments, either allocated on the host or the device, as well as for the return value, when there is one. Then there is also the option of enabling several kernels to execute asynchronously on the device, using for instance GPU streams. When writing platform specific GPU kernels, there also can be extra kernel arguments depending on the architecture to ensure optimality such as, for instance, different hardware/run time parameters, different thread-block grid sizes or user controlled cache (shared memory) sizes. As a result of these various issues and GPU technology changes, user interfaces are not as stable as one would like. For sparse linear algebra, the situation is also complicated. Unlike the dense format for which there are not too many ways of laying out the data, there are several sparse formats including compressed sparse row (CSR), compressed sparse column (CSC), coordinate list (COO), and ELLPACK just to mention a few. In addition, even for a given format such as CSR, there are variants, as some libraries may or may" 2401.13831v1,"Scalarization via utility functions in multi-objective optimization Lorenzo Lampariello ∗1 , Simone Sagratella †2 , Valerio Giuseppe Sasso ‡2 , and Vladimir Shikhman §3 1 Roma Tre University, Italy Sapienza University of Rome, Italy 3 Chemnitz University of Technology, Germany 2 January 26, 2024 Abstract We study a general scalarization approach via utility functions in multi-objective optimization. It consists of maximizing utility which is obtained from the objectives’ bargaining with regard to a disagreement reference point. The theoretical framework for a broad class of utility functions from microeconomics is developed. For that, we associate a utility-dependent single-objective optimization problem with the given multi-objective optimization problem. We show that Pareto optimal points of the latter can be recovered by solving the former. In particular, Cobb-Douglas, Leontief, and CES utility functions are considered. We prove that any Pareto optimal point can be obtained as a solution of scalarization via one of the mentioned utility functions. Further, we propose a numerical scheme to solve utility-dependent single-objective optimization problems. Here, the main difficulty comes from the necessity to address constraints which are associated with a disagreement reference point. Our crucial observation is that the explicit treatment of these additional constraints may be avoided. This is the case if the Slater condition is satisfied and the utility function under consideration has the so-called barrier property. Under these assumptions, we prove the convergence of our scheme to Pareto optimal points. Numerical experiments on real-world financial datasets in a portfolio selection context confirm the efficiency of our scalarization approach via utility functions. 1 Introduction In multi-objective optimization, the scalarization approach has meanwhile become standard for trying to find (weak) Pareto optimal points. Usually, the weighted sum scalarization is applied to tackle a multi-objective optimization problem. This is to optimize a linear combination of the objectives with properly adjusted nonnegative or positive weights. More sophisticated scalarization techniques have been introduced in analogy. We mention the weighted t-th power and the weighted quadratic approaches. The whole branch of scalarization techniques successfully incorporates constraints into the single-objective optimization problem to solve. These are the elastic constraint method and the Benson’s method to name a few. The family of reference point approaches includes a variety of methods in which a properly chosen reference point in the space of objectives is used. Most prominent of them is the distance function approach. Here, the distance from a utopia ∗ lorenzo.lampariello@uniroma3.it † sagratella@diag.uniroma1.it ‡ sasso@diag.uniroma1.it § vladimir.shikhman@mathematik.tu-chemnitz.de 1" 2401.13836v1,"Machine learning for industrial sensing and control: A survey and practical perspective ⋆ Nathan P. Lawrence a , Seshu Kumar Damarla c , Jong Woo Kim f , Aditya Tulsyan c , Faraz Amjad c , Kai Wang g , Benoit Chachuat d , Jong Min Lee e , Biao Huang c , R. Bhushan Gopaluni b a Department of Mathematics, University of British Columbia, Canada Department of Chemical and Biological Engineering, University of British Columbia, Canada c Department of Chemical and Materials Engineering, University of Alberta, Canada d The Sargent Centre for Process Systems Engineering, Department of Chemical Engineering, Imperial College London, London SW7 2AZ, UK e School of Chemical and Biological Engineering, Institute of Chemical Processes, Seoul National University, 1, Gwanak-ro, Gwanak-gu, Seoul 08826, Republic of Korea f Department of Energy and Chemical Engineering, Incheon National University, Incheon 22012, Republic of Korea g School of Automation, Central South University, Changsha, 410083, China b Abstract With the rise of deep learning, there has been renewed interest within the process industries to utilize data on large-scale nonlinear sensing and control problems. We identify key statistical and machine learning techniques that have seen practical success in the process industries. To do so, we start with hybrid modeling to provide a methodological framework underlying core application areas: soft sensing, process optimization, and control. Soft sensing contains a wealth of industrial applications of statistical and machine learning methods. We quantitatively identify research trends, allowing insight into the most successful techniques in practice. We consider two distinct flavors for data-driven optimization and control: hybrid modeling in conjunction with mathematical programming techniques and reinforcement learning. Throughout these application areas, we discuss their respective ⋆ Please cite the journal version in Control Engineering Practice: https://doi.org/10.1 016/j.conengprac.2024.105841 Email addresses: input@nplawrence.com (Nathan P. Lawrence), bhushan.gopaluni@ubc.ca (R. Bhushan Gopaluni) Preprint submitted to arXiv January 26, 2024" 2401.13848v1,"1 A V2X-based Privacy Preserving Federated Measuring and Learning System Levente Alekszejenkó, Tadeusz P. Dobrowiecki Abstract—Future autonomous vehicles (AVs) will use a variety of sensors that generate a vast amount of data. Naturally, this data not only serves self-driving algorithms; but can also assist other vehicles or the infrastructure in real-time decisionmaking. Consequently, vehicles shall exchange their measurement data over Vehicle-to-Everything (V2X) technologies. Moreover, predicting the state of the road network might be beneficial too. With such a prediction, we might mitigate road congestion, balance parking lot usage, or optimize the traffic flow. That would decrease transportation costs as well as reduce its environmental impact. In this paper, we propose a federated measurement and learning system that provides real-time data to fellow vehicles over Vehicle-to-Vehicle (V2V) communication while also operating a federated learning (FL) scheme over the Vehicleto-Network (V2N) link to create a predictive model of the transportation network. As we are yet to have real-world AV data, we model it with a non-IID (independent and identically distributed) dataset to evaluate the capabilities of the proposed system in terms of performance and privacy. Results indicate that the proposed FL scheme improves learning performance and prevents eavesdropping at the aggregator server side. Index Terms—federated learning, privacy-preserving, V2X application information sharing, I. I NTRODUCTION While navigating through cities, autonomous vehicles (AVs) will be required to collect and process enormous amounts of data. This data contains raw measurement values (e.g., following distance) and derived observations (e.g., number of empty parking spaces on the spot). As these kinds of data further away from the trajectory of a vehicle might be hard to obtain, it is natural to exchange such knowledge among vehicles. The Vehicle-to-Vehicle (V2V) communication techniques can provide a channel for this information change. The received information might help the AVs in real-time operational (e.g., finding an empty parking lot) or tactical decision-making (e.g., heading towards an area that is supposed to offer many free parking spaces). As the collected data, especially the derived ones, describes the actual traffic situation, AVs or even road operators shall access and process it. This data might support strategic planning that mitigates traffic congestion and optimizes the traffic flow (e.g., by building new parking lots or adjusting their pricing). Consequently, we might minimize the environmental impact of transportation. However, exchanging such enormous datasets over Vehicle-to-Everything (V2X) networks is challenging. We Department of Measurement and Information Systems, Faculty of Electrical Engineering and Informatics, Budapest University of Technology and Economics, Műegyetem rkp. 3., H-1111 Budapest, Hungary e-mail: alelevente@mit.bme.hu, dobrowiecki@mit.bme.hu assume that this knowledge will be represented and distributed among the stakeholders (e.g., among AVs and road operators) as a machine learning model, e.g., the weight matrix of a neural network. Such representation has numerous benefits: it is a compressed extract of the data collected by the AVs, has predictive power, and can adapt to the changes in the road network. On a Vehicle-to-Network (V2N) channel, AVs can download the actual model from a central server and use its predictions for tactical planning (e.g., inferring the current parking lot occupancy rate in a neighborhood). AVs can also contribute to the training process of this model by participating in a federated learning (FL) system. Unfortunately, AVs only have data about a relatively small area as they can only sense phenomena (e.g., parking lot occupancy) along their routes. Such data necessarily forms a not independent or identically distributed (non-IID) dataset. Non-IID data can cause performance issues and open the way for privacy threats for the FL system. In this paper, our essential contribution is addressing the problem of non-IID datasets by incorporating raw data sharing into the traditional FL scheme for intelligent vehicles. As a proof of concept, we model the data of AVs by partitioning a well-known benchmark dataset MNIST [1]. We assume raw data sharing is through a trusted (V2V) channel, while the participants access the FL server through a separate, untrusted (V2N) line. Based on this assumption, we demonstrate how raw data sharing improves learning speed and mitigates privacy issues. A. Related Works It will be vital to use V2X communication to exploit the merits of AVs. Connected vehicles can implement platoons and minimize the following distance [2], [3], or make it possible to improve intersection management [4]. As the V2X channel bandwidth is limited, we shall consider how to reduce the number of exchanged data packages. According to [5], channel usage can be optimized by estimating and maximizing the information gains over the observations. This approach is theoretically related to the one described in this paper, but here, we aim to balance the datasets of the AVs to mitigate the effects of non-IID data. Despite the numerous security mechanisms of V2X communication [6], handling non-IID data on the application level is still an important issue. The non-IID nature of the data might disclose information about a vehicle’s route revealing the origins and destinations of the passengers. In the case of commercial vehicles, that would mean that the whole supply chain of a company might be exposed. To mitigate" 2401.13861v1,"Topological characterization of the continuum of allosteric response Jason W. Rocks a,b , Eleni Katifori b , and Andrea J. Liu b,1 a Department of Physics, Boston University, Boston, MA 02215, USA; b Department of Physics and Astronomy, University of Pennsylvania, Philadelphia, PA 19104, USA allostery | mechanical metamaterials | proteins | topological data analysis A T known to exhibit a wide range of conformational deformations including shear, hinge and twist mechanisms (17), along with more exotic mechanical deformations that utilize low energy edge modes to amplify input responses (16). To systematically explore this zoo of conformational changes, we first generate a large statistical ensemble of networks tuned to exhibit similar allosteric responses. We then analyze the topological structure of the deformation of each network using persistent homology, obtaining a host of features that fall into two topologicallyderived families. One family consists of many candidate hinge domains while the other consists of strain pathways connecting every pair of nodes. By design, these two families align with two key structural features that have long been associated with allosteric deformations: hinge domains and allosteric pathways. A key feature of our analysis is that it provides quantitative measures of the topological significance, or scale, of each feature in both families. For each system, we focus on the hinge domain and strain pathway of highest significance and show that these two features and their scales characterize the allosteric response. We find that conformational changes associated with allostery lie on a continuum in terms of these measures of hinge domain and allosteric pathway significance, rather than falling into distinct clusters with each cluster corresponding to a different archetypal mechanism. In particular, hinge domains and allosteric pathways can exist simultaneously, with allosteric pathways often lying along the boundaries between hinge domains. Furthermore, we show that these features can be used RA F Allosteric regulation in proteins is often accompanied by conformational changes that facilitate transmission of mechanical signals between distant ligand binding sites. Typically, these deformations are classified in terms of specific archetypes, including various types of hinge mechanisms or allosteric pathways localized to sequences of amino acids. However, many allosteric deformations resist such strict categorization. Here, we introduce a quantitative topological description of allosteric deformation, unifying all archetypal mechanisms into a single framework. The topological description aligns with two key structural features often associated with allosteric deformations, namely hinge domains and allosteric pathways, enabling us to quantify the significance of each of these features. To develop the analysis, we tune computer-generated mechanical networks to perform allostery-like functions, obtaining an ensemble of networks that establish a range of possible allosteric deformations. The analysis shows that these networks’ allosteric mechanisms cannot be described in terms of discrete archetypes – they fall on a continuum. We then apply the same analysis to a collection of allosteric proteins with similar results, showing that our framework encompasses these proteins as well as designed allosteric networks. Our results provide a new picture for allostery, demonstrating not only how it can be described quantitatively, but also giving insight into how it emerges as a collective property. llosteric Allosteric regulation of a protein occurs when a molecule binding to one site affects the activity at a second distant binding site (1–3). In many proteins, this intra-molecular communication is transmitted mechanically via specific conformational changes (4). Currently, numerous methods exist to analyze these deformations and identify key structural features responsible for allosteric function. However, most of these analyses limit their focus to a single class of archetypal motions, with prominent examples of such archetypes including hinge domains (5–7), shear mechanisms (7, 8), and allosteric pathways (9, 10). As a result, it remains unclear whether such archetypes span the full range of conformational deformations involved in allostery, or even whether such deformations can be neatly classified according to a set of discrete archetypes. D This manuscript was compiled on January 26, 2024 Here, we introduce a unifying framework to quantify the deformations that accompany allostery in proteins. Based on persistent homology, this framework characterizes allosteric motion in terms of topologically significant structural features. Recently, a similar approach was developed to understand similar behavior in flow networks, revealing the key structures responsible for function (11, 12). In this work, we generalize that approach to three-dimensional mechanical networks. In particular, we focus on central-force spring networks tuned to perform analogous allostery-like functions (13–18), which are Significance Statement Allostery is a common regulatory mechanism in proteins where a ligand binding to one site controls the activity at a second distant binding site. Allostery is frequently characterized by mechanical signals transmitted by conformational changes that vary dramatically between different proteins. Here, we introduce a quantitative topological description that unifies all allosteric deformations into a single framework. Our analysis identifies and quantifies the significance of both hinge domains and allosteric pathways, key structural features long associated with allostery. To develop and test the analysis, we use ensembles of networks designed with allostery-like functions and then apply the framework to a variety of allosteric proteins. We show that allosteric deformations fall on a continuum and cannot be classified into distinct archetypes. Author Contributions: J.W.R., E.K., and A.J.L. designed research and wrote the paper. J.W.R. performed research, contributed new analytic tools, performed numerical calculations, and analyzed data. The authors declare no conflict of interest. 1 To whom correspondence should be addressed. E-mail: ajliu@upenn.edu" 2401.13868v1,"Shell topology optimization based on level set method Hiroki Kobayashi 1* , Katsuya Nomura 1† , Yuqing Zhou 2 , Masato Tanaka 2,1 , Atsushi Kawamoto 1 and Tsuyoshi Nomura 1 1 Toyota Central R&D Labs, Inc., 1-4-14 Koraku, Bunkyo-ku, 112-0004, Tokyo, Japan. 2 Toyota Research Institute of North America, Toyota Motor North America, 1555 Woodridge Ave., Ann Arbor, 48105, MI, USA. *Corresponding author(s). E-mail(s): hiroki.kobayashi@mosk.tytlabs.co.jp; † Present address: School of Engineering, Kwansei Gakuin University, 1 Gakuen Uegahara, Sanda, 669-1330, Hyogo, Japan Abstract This paper proposes a level set-based method for optimizing shell structures with large design changes in shape and topology. Conventional shell optimization methods, whether parametric or nonparametric, often only allow limited design changes in shape. In the proposed method, the shell structure is defined as the isosurface of a level set function. The level set function is iteratively updated based on the shape sensitivity on the surface mesh. Therefore, the proposed method can represent an arbitrary manifold surface while dealing with topological changes, for example, from a spherical surface to a toroidal surface. We applied the proposed method to the mean compliance minimization problems of 3D shell structural designs for dome, bending plate and cantilever beam examples to demonstrate its efficacy of the proposed method. Keywords: shell structures, level set method, topology optimization, shell elements 1 Introduction Shell structures are used for a variety of industrial purposes including automobiles, aircraft, and buildings, because of their ease of economic mass production and lightweight. A thin curved shell, which is stiff against in-plane forces can be easily deformed against out-of-plane bending. Such thin shell structures must be appropriately designed to avoid large bending while effectively supporting the prescribed loads, which is difficult to achieve using only intuitive or empirical methods. For problems involving such challenges, structural optimization can be a powerful method for a wide variety of problems. 1 In structural optimization methods, numerical analysis methods, such as finite element method (FEM), play an important role in accurately analyzing the performance of designs. In terms of mesh, analysis of the shells can be divided into two main types: volume mesh and surface mesh. The volume mesh-based methods, which discretize an analysis domain into finite volume elements, are widely used in structural optimization. Specifically, the topology optimization method has the advantage of optimizing structures with a high degree of freedom. After the pioneering work by Bendsøe and Kikuchi (1988), topology optimization has been applied to various applications in the structural mechanics field, for example, aeroplane" 2401.13876v1,"Prepared for submission to JCAP GammaBayes: a Bayesian pipeline for dark matter detection with CTA Liam Pinchbeck a Eric Thrane a,b Csaba Balazs a a School of Physics and Astronomy, Monash University, VIC 3800, Australia b OzGrav: The ARC Centre of Excellence for Gravitational-Wave Discovery, Clayton, VIC 3800, Australia E-mail: Liam.Pinchbeck@monash.edu Abstract. We present GammaBayes, a Bayesian Python package for dark matter detection with the Cherenkov Telescope Array (CTA). GammaBayes takes as input the CTA measurements of gamma rays and a user-specified dark-matter particle model. It outputs the posterior distribution for parameters of the dark-matter model including the velocity-averaged cross section for dark-matter self interactions ⟨σv⟩ and the dark-matter mass m χ . It also outputs the Bayesian evidence, which can be used for model selection. We demonstrate GammaBayes using 525 hours of simulated data, corresponding to 10 8 observed gamma-ray events. The vast majority of this simulated data consists of noise, but 100000 events arise from the annihilation of scalar singlet dark matter with m χ = 10 TeV. We recover the dark matter mass within a 95% credible interval of m χ ∼ 5.9−11.2 TeV. Meanwhile, the velocity averaged cross section is constrained to ⟨σv⟩ ∼ 1.3 − 2.3 × 10 −25 cm 3 s −1 (95% credibility). This is equiva- 5 lent to measuring the number of dark-matter annihilation events to be N S ∼ 1.0 +0.2 −0.2 × 10 . The no-signal hypothesis ⟨σv⟩ = 0 is ruled out with about 5σ credibility. We discuss how GammaBayes can be extended to include more sophisticated signal and background models and the computational challenges that must be addressed to facilitate these upgrades. The source code is publicly available here." 2401.13879v1,"Enhancing Weak magnetic field sensing of cavity-magnon system with dual frequency modulation Zheng Liu, Yu-qiang Liu, Zi-yi Mai, Yi-jia Yang, Nan-nan Zhou and Chang-shui Yu 1, ∗ 1 School of Physics, Dalian University of Technology, Dalian 116024, P.R. China (Dated: January 26, 2024) The crucial limitation of improving the sensitivity of the detection of weak magnetic fields is the unavoidable measurement noise. In this paper, we propose a scheme to achieve precise sensing robust against additional noise by employing a dual-frequency bias field modulation within a cavity magnon system. We find that the anti-rotating wave term can amplify the signal of the detected magnetic field, but this amplification effect must coexist with the rotating wave term. In particular, by the bias field modulation, we find the robustness against cavity field thermal noise is substantially enhanced, quantum noise and cavity field thermal noise is greatly reduced, and the external magnetic field signal is amplified, thereby improving the weak magnetic field sensing system’s sensitivity. Compared with the previous scheme, our scheme requires neither an ultra- or deep-strong coupling mechanism nor the suppression of the additional noise by increasing the electromagnetic cooperativity. Our scheme could provide a valuable candidate for weak magnetic field sensing. I. INTRODUCTION The precise measurement of weak magnetic fields is currently a major topic of interest in both theory and experiment [1–7] which is widely applied in geophysics [8], biology [9, 10], and dark matter search [11]. Many magnetometers with certain operating frequencies and environments, such as superconducting quantum interference magnetometers (SQUIDs) [12], atomic magnetometers [13], and nitrogen-vacancy centers magnetometers [14], have been extensively studied. How to realize a weak magnetic field sensing with high sensitivity, wide frequency range, and noise immunity is attracting increasing interest. Additional noise is the core factor limiting the detection sensitivity in quantum sensing [15], which, distinguished from probe noise, includes the quantum noise and thermal noise of the whole system except the probe. Over the past decade, many approaches are proposed to reduce the quantum noise without thermal noise explicitly taken into account. For example, quantum noise is reduced in precision measurement and break the standard quantum limit (SQL) in optomechanical force sensing such as coherent quantum noise cancellation (CQNC) [16–21], non-Markovian regime [22], and squeezed cavity field [23–27], and so on. The mechanical oscillator’s sensitivity to external forces and the unique optical readout in the cavity optomechanical system enables it to naturally detect weak force signals [28, 29]. Therefore, if some systems have highly sensitive probes to measure external magnetic fields and the corresponding readout device, these systems can also be used for magnetic field sensing. and the above scheme for reducing quantum noise is also applicable to weak magnetic sensing. Cavity magnon systems, composed of microwave cavity and yttrium iron garnet (YIG) sphere, have recently gained significant attention in addition to the cavity optomechanical systems [11, 30–35]. The cavity-magnon system can serve as a feasible platform to investigate quantum magnetic field sensing in the field of quantum precision measurement. The ∗ Electronic address: ycs@dlut.edu.cn reason is, on one hand, the YIG sphere is an excellent ferromagnetic material that produces a low excitation Magnon mode (Kittel mode) [36] with high spin density, low decay rate [37], and high-frequency tuning [38], which is beneficial to highly sensitive magnetic field sensing, and the microwave cavity, on the other hand, facilitates microwave readout and can achieve strong coupling or even ultra-strong coupling with the YIG sphere [39–42], making them ideal for various quantum information processing applications, such as the preparation of macroscopic Schrödinger cat states [43], steady-state magnon entanglement [44–48], and blockade of magnon [49, 50]. However, the sensing of weak magnetic fields using the cavity-magnon system remains challenged due to the presence of additional noise, i.e., quantum noise and microwave cavity field thermal noise. Even though the ultrastrong or deep-strong coupling allows the interaction of the anti-rotating wave, which can effectively suppress quantum noise and cavity field thermal noise below the SQL and amplify the signal [7], realizing the ultra-strong or deep-strong coupling per se is also more challenging than the realization of the strong coupling, and additionally, what role the rotating wave and anti-rotating wave interactions play in weak magnetic field sensing remains unclear. In this paper, to sense weak magnetic field signal we introduce a dual-frequency bias magnetic field modulation to the cavity magnon system with the YIG sphere coupling with a microwave cavity through dipole-dipole interaction [51]. The external magnetic field interacting with the YIG sphere affects the microwave output spectrum which can be measured by the cavity field phase quadrature detection method. It is shown that the dual-frequency bias magnetic field modulation can realize the anti-rotating wave interaction through strong coupling regime instead of ultra-strong or deep-strong coupling regime. It can especially control the proportion of rotating and anti-rotating wave terms in the system which can reveal the roles of each type of interaction, by which we find that the anti-rotating wave term can amplify the detected field signal, but this amplification effect must coexist with the rotating wave term. We show that in our scheme, there exists a noise-resistant frequency band tolerating additional noise if selecting appropriate parameters. In particular, the sensitivity can be improved and the system’s response to weak magnetic" 2401.13912v1,"A Survey of Deep Learning and Foundation Models for Time Series Forecasting JOHN A. MILLER, MOHAMMED ALDOSARI, FARAH SAEED, NASID HABIB BARNA, SUBAS RANA, I. BUDAK ARPINAR, and NINGHAO LIU Deep Learning has been successfully applied to many application domains, yet its advantages have been slow to emerge for time series forecasting. For example, in the well-known Makridakis (M) Competitions, hybrids of traditional statistical or machine learning techniques have only recently become the top performers. With the recent architectural advances in deep learning being applied to time series forecasting (e.g., encoder-decoders with attention, transformers, and graph neural networks), deep learning has begun to show significant advantages. Still, in the area of pandemic prediction, there remain challenges for deep learning models: the time series is not long enough for effective training, unawareness of accumulated scientific knowledge, and interpretability of the model. To this end, the development of foundation models (large deep learning models with extensive pre-training) allows models to understand patterns and acquire knowledge that can be applied to new related problems before extensive training data becomes available. Furthermore, there is a vast amount of knowledge available that deep learning models can tap into, including Knowledge Graphs and Large Language Models fine-tuned with scientific domain knowledge. There is ongoing research examining how to utilize or inject such knowledge into deep learning models. In this survey, several state-of-the-art modeling techniques are reviewed, and suggestions for further work are provided. ACM Reference Format: John A. Miller, Mohammed Aldosari, Farah Saeed, Nasid Habib Barna, Subas Rana, I. Budak Arpinar, and Ninghao Liu. 2024. A Survey of Deep Learning and Foundation Models for Time Series Forecasting. 1, 1 (January 2024), 35 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION The experience with COVID-19 over the past four years has made it clear to organizations such as the National Science Foundation (NSF) and the Centers for Disease and Prevention (CDC) that we need to be better prepared for the next pandemic. COVID-19 has had huge impacts with 6,727,163 hospitalizations and 1,169,666 deaths as of Saturday, January 13, 2024, in the United States alone (first US case 1/15/2020, first US death 2/29/2020). The next one could be more virulent with greater impacts. There were some remarkable successes such as the use of messenger RNA vaccines that could be developed much more rapidly than prior approaches. However, the track record for detecting the start of a pandemic and the forecasting of its trajectory leaves room for improvement. Pandemic Preparedness encapsulates the need for continuous monitoring. Predicting rare events in complex, stochastic systems is very difficult. Transitions from pre-emergence to epidemic to pandemic are easy to see only after the fact. Pandemic prediction using models is critically important Authors’ address: John A. Miller, jamill@uga.edu; Mohammed Aldosari, maa25321@uga.edu; Farah Saeed, farah.saeed@ug a.edu; Nasid Habib Barna, nasidhabib.barna@uga.edu; Subas Rana, subas.rana@uga.edu; I. Budak Arpinar, budak@uga.edu; Ninghao Liu, ninghao.liu@uga.edu. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM XXXX-XXXX/2024/1-ART https://doi.org/10.1145/nnnnnnn.nnnnnnn , Vol. 1, No. 1, Article . Publication date: January 2024." 2401.13928v1,"Image based Crop Monitoring Technologies in Protected Horticulture: A Review Namal Jayasuriya 1* , Yi Guo 2 , Wen Hu 3 , Oula Ghannoum 1 1 Hawkesbury Institute for the Environment, Hawkesbury Campus, Western Sydney University, Richmond, NSW 2753, Australia 2 Centre for Research in Mathematics and Data Science, School of Computer, Data and Mathematical Sciences, Western Sydney University, Parramatta, NSW 2150, Australia 3 School of Computer Science and Engineering, The University of New South Wales, Sydney, NSW 2052, Australia * Correspondence: Namal Jayasuriya N.Jayasuriya@westernsydney.edu.au Keywords: Protected Cropping, Non-destructive Phenotyping, Crop Growth monitoring, Phenotyping Systems, Imaging, Cameras for Phenotyping. Abstract Future food security is a major concern of the 21 st century with the growing global population and climate changes. In addressing these challenges, protected cropping ensures food production yearround and increases crop production per land area by controlling environment conditions. Maintaining the growth and health of crops in these facilities is essential to ensure optimum food production. However, this is a laborious work and is currently done manually. Image-based nondestructive plant phenotyping is an emerging research area that reduces the skilled labour cost while enhancing the monitoring of crop growth, health, and identifying phenotype-genotype relations for plant breeding. With the proliferations of protected infrastructures and targeted plants, different technologies and sensor setups are needed for image-based crop monitoring. Conveyor-type plant-tosensor systems, bench-top or gantry-based systems are commonly found in research facilities focussing on phenotyping of small, relatively short, or movable model plants. This review examines the literature on crop monitoring and phenotyping platforms in both field and protected facilities and explains different camera technologies and their ability to extract different plant traits. The review highlights the future research directions of image-based monitoring of commercial scale protected crops where crops can be relatively tall or vertically supported under semi controlled environments, which presents new challenges and is rarely covered in the literature. 1 Introduction The global population, projected to reach 9.3 billion by 2050 according to the Department of Economic & Social Affairs of the United Nations (2022), presents a profound challenge for food" 2401.13937v1,"Self-supervised Video Object Segmentation with Distillation Learning of Deformable Attention Quang-Trung Truong 1 , Duc Thanh Nguyen 2 , Binh-Son Hua 3 , Sai-Kit Yeung 1 Hong Kong University of Science and Technology 1 , Deakin University 2 , Trinity College Dublin 3 Abstract designing an architecture that can well learn features of an object of interest adaptively to temporal changes while maintaining optimal memory usage is still an open research problem. Literature has shown a substantial body of work dedicated to developing deep learning models towards this goal [15]. Among these, the Vision Transformer (ViT) in [13] has been commonly adopted in recent VOS research, and made significant progress. Examples include the works in [14, 17, 52, 53, 56]. The reason for this success is the ability of the attention mechanism in the ViT in object representation learning. Specifically, unlike convolutional neural networks (CNNs) which obtain a global receptive field for an object by a pooling operator [40], the ViT captures global context via self-attention layers. Despite such progress, there still exist issues in the current research. First, we found that attention layers are not well adapted to temporal changes, causing accumulated errors in processing of long-term video sequences. To mitigate this issue, several methods, e.g., [44, 54], have utilised optical flows in the attention module and achieved promising results. Additional motion information from optical flows is a useful guideline to define an object in the query of the attention module. In particular, optical flows within the same object should be smooth while flows across the object boundaries should be disruptive. Similarly, if an object moves differently from the background, the motion boundaries would be indicative of the object boundaries. Hence, optical flows would facilitate precise locating of object boundaries and vice versa. However, these methods require an accurate motion estimation model to be given in advance. Unfortunately, this requirement is not always fulfilled, especially when VOS is applied to challenging scenarios such as underwater applications. Second, another major challenge in VOS is object forgetting in long-term video processing. The issue gets more critical in segmenting objects under severe occlusion. Several methods have been developed to tackle this challenge, e.g., [30, 34]. For instance, Park et al. [34] indicated that memory updates in short-term intervals with several frames, also known as clip-wise mask propagation, are more powerful than updates with a nearby frame. However, one has to Video object segmentation is a fundamental research problem in computer vision. Recent techniques have often applied attention mechanism to object representation learning from video sequences. However, due to temporal changes in the video data, attention maps may not well align with the objects of interest across video frames, causing accumulated errors in long-term video processing. In addition, existing techniques have utilised complex architectures, requiring highly computational complexity and hence limiting the ability to integrate video object segmentation into low-powered devices. To address these issues, we propose a new method for self-supervised video object segmentation based on distillation learning of deformable attention. Specifically, we devise a lightweight architecture for video object segmentation that is effectively adapted to temporal changes. This is enabled by deformable attention mechanism, where the keys and values capturing the memory of a video sequence in the attention module have flexible locations updated across frames. The learnt object representations are thus adaptive to both the spatial and temporal dimensions. We train the proposed architecture in a self-supervised fashion through a new knowledge distillation paradigm where deformable attention maps are integrated into the distillation loss. We qualitatively and quantitatively evaluate our method and compare it with existing methods on benchmark datasets including DAVIS 2016/2017 and YouTube-VOS 2018/2019. Experimental results verify the superiority of our method via its achieved state-of-the-art performance and optimal memory usage. 1. Introduction Video object segmentation (VOS) is a fundamental task in computer vision, aiming to segregate object(s) of interest from a background across frames in a video sequence. The task has attracted considerable attention from the research community, resulting in various models developed in recent years [15]. In the perspective of deep learning, 1" 2401.13945v1,"Machine Intelligence Research General Automatic Solution Generation for Social Problems Tong Niu 1 † Haoyu Huang 1 † 1 Yu Du 1 † Weihao Zhang 1 Luping Shi 1,2,3 Rong Zhao 1,2,3* Center for Brain-Inspired Computing Research (CBICR), Optical Memory National Engineering Research Center, and Department of Precision Instrument, Tsinghua University, Beijing 100084, China. 2 IDG/McGovern Institute for Brain Research, Tsinghua University, Beijing 100084, China. 3 THU-CET HIK Joint Research Center for Brain-Inspired Computing † These authors contributed equally: Tong Niu, Haoyu Huang, Yu Du† *e-mail: r_zhao@tsinghua.edu.cn Abstract: Given the escalating intricacy and multifaceted nature of contemporary social systems, manually generating solutions to address pertinent social issues has become a formidable task. In response to this challenge, the rapid development of artificial intelligence has spurred the exploration of computational methodologies aimed at automatically generating solutions. However, current methods for auto-generation of solutions mainly concentrate on local social regulations that pertain to specific scenarios. Here, we report an automatic social operating system (ASOS) designed for general social solution generation, which is built upon agent-based models, enabling both global and local analyses and regulations of social problems across spatial and temporal dimensions. ASOS adopts a hypergraph with extensible social semantics for a comprehensive and structured representation of social dynamics. It also incorporates a generalized protocol for standardized hypergraph operations and a symbolic hybrid framework that delivers interpretable solutions, yielding a balance between regulatory efficacy and function viability. To demonstrate the effectiveness of ASOS, we apply it to the domain of averting extreme events within international oil futures markets. By generating a new trading role supplemented by new mechanisms, ASOS can adeptly discern precarious market conditions and make front-running interventions for non-profit purposes. This study demonstrates that ASOS provides an efficient and systematic approach for generating solutions for enhancing our society. Keywords: general automatic generation, global-local regulation, hypergraph social representation, symbolic hybrid scheme, generalized operation protocol 1 Introduction Providing solutions to social problems or dilemmas is a pivotal objective of social science [1-5] . Depending on the causes and impact of problems, experts propose various solutions ranging from the issuance of singular regulations, such as the frequent adjustments of tax policy, to the creation of comprehensive social forms, such as the socialist society form proposed by Marx. [6-10] . With the rapid advancements in computing sciences and artificial intelligence, the field of computational social science (CSS) [11, 12] has made progress in automatically generating tailored solutions for some scenario-specific social problems, such as welfare allocation through reinforcement learning [10, 13-15] , and public opinion control through cluster analysis [8] . These auto-generated solutions predominantly refine localized social intricacies within the existing social structure. However, the manifestation of a society and its underlying dynamics emerge through a confluence of both global structural and local details [16-18] . The global structure includes the existence of those essentials, such as individuals and attributes that characterize them, and the relationships between these elements. The local details pertain to the specific manifestation and content of these essentials and relationships . Thus, an effective automatic solution generation approach requires the ability to comprehensively analyze and regulate societal intricacies from a panoramic _________________ Research Article Manuscript received date; accepted date; published online date perspective that encompasses global and local aspects. Furthermore, different solution mandates distinct interfaces between algorithms and heterogeneous social descriptions. Presently, prevailing automatic generation approaches tend to be specialized solutions, meticulously tailored to precise requisites, thereby lacking the flexibility and efficiency required for broader applications. Hence, a pressing need exists for a general interface capable of standardizing diverse heterogeneity. The agent-based modeling (ABM) stands as a fundamental research paradigm in CSS [19-21] . It provides a bottom-up perspective for analyzing our society through the computerized simulation of interactions among decisionmakers (agents) and environment objects. In this paper, we report on a general automatic social operating system (ASOS) based on ABM, which is capable of generating social solutions from local to global scales across spatial and temporal dimensions (Fig. 1a) by addressing diverse solving targets of different social problem scenarios. To achieve this, ASOS firstly imitates existing social phenomena through an agent-based model represented by a unified hypergraph [22, 23] . The hypergraph formalizes the social semantics and embeds it in its programming syntax [24-26] , allowing algorithms to explicitly recognize the model’s global structure and local details. The core of these social semantics encapsulates meta-information that latently governs the equilibrium states and their evolutionary trajectories within the intricate fabric of the complex social" 2401.13965v1,"Improving Pseudo-labelling and Enhancing Robustness for Semi-Supervised Domain Generalization Adnan Khan 1 , Mai A. Shaaban 1 and Muhammad Haris Khan 1 1 Mohamed bin Zayed University of Artificial Intelligence, Abu Dhabi, U.A.E {adnan.khan, mai.kassem, muhammad.haris}@mbzuai.ac.ae Keywords: Visual Recognition, Domain Generalization, Semi-Supervised Learning, Transfer Learning. Abstract: Beyond attaining domain generalization (DG), visual recognition models should also be data-efficient during learning by leveraging limited labels. We study the problem of Semi-Supervised Domain Generalization (SSDG) which is crucial for real-world applications like automated healthcare. SSDG requires learning a cross-domain generalizable model when the given training data is only partially labelled. Empirical investigations reveal that the DG methods tend to underperform in SSDG settings, likely because they are unable to exploit the unlabelled data. Semi-supervised learning (SSL) shows improved but still inferior results compared to fully-supervised learning. A key challenge, faced by the best-performing SSL-based SSDG methods, is selecting accurate pseudo-labels under multiple domain shifts and reducing overfitting to source domains under limited labels. In this work, we propose new SSDG approach, which utilizes a novel uncertainty-guided pseudo-labelling with model averaging (UPLM). Our uncertainty-guided pseudo-labelling (UPL) uses model uncertainty to improve pseudo-labelling selection, addressing poor model calibration under multi-source unlabelled data. The UPL technique, enhanced by our novel model averaging (MA) strategy, mitigates overfitting to source domains with limited labels. Extensive experiments on key representative DG datasets suggest that our method demonstrates effectiveness against existing methods. Our code and chosen labelled data seeds are available on GitHub: https://github.com/Adnan-Khan7/UPLM . 1 INTRODUCTION Domain shift (Tzeng et al., 2015) (Hoffman et al., 2017) is an important challenge for several computer vision tasks e.g., object recognition (Krizhevsky et al., 2017). Among others, domain generalization (DG) has emerged as a relatively practical paradigm for handling domain shifts and it has received increasing attention in the recent past (Li et al., 2017) (Zhou et al., 2021b) (Khan et al., 2021). The goal is to train a model from the data available from multiple source domains that can generalize well to an unseen target domain. We have seen several DG approaches (Huang et al., 2020) (Wang et al., 2020) that have displayed promising performance across various benchmarks (Li et al., 2017) (Venkateswara et al., 2017). However, the performance of many DG methods is sensitive to the availability of sufficiently annotated quality data from available source domains. As such, this requirement is difficult to meet in several real-world applications of these models e.g., healthcare, autonomous driving and satellite imagery (Khan et al., 2022b). Besides attaining generalization, it is desirable for the learning algorithms to be efficient in their use of data. This means that the model can be trained using a minimal amount of labelled data to reduce development costs. This concept is closely related to semi-supervised learning (SSL) (Grandvalet and Bengio, 2004) (Tarvainen and Valpola, 2017) which seeks to make use of large amounts of unlabelled data along with a limited amount of labelled data for model training. To this end, this paper studies the relatively unexplored problem of semi-supervised domain generalization (SSDG). It aims to tackle both the challenges of model generalization as well as data-efficiency within a unified framework. Both DG and SSDG share the common goal of training models capable of performing well on unseen target domain using only source domain data for training. However, DG is based on the assumption that all data from source domains is fully labelled, while SSDG operates under the SSL setting, where only few images within each source domain have labels and large number of images are unlabelled. Figure 1 shows the visual comparison among the settings of three related paradigms." 2401.13972v1,"Charged Strange Star Model with Stringy Quark Matter in Rainbow Gravity Wasib Ali ∗ and Umber Sheikh † Department of Mathematics, Division of Science and Technology, University of Education, Lahore, Pakistan. This study deals with the formation and evolution of a strange star in the Krori Barua Rainbow spacetime from collapsing charged stringy quark matter. The dynamical variables are explored from the field equations, taking into account the effects of particle’s energy on the mass density, pressure, and string tension. The electric field is also computed using the MIT Bag model. The real time data of SAX J1808.4 − 3658 is used to analyzed the physical properties including gradients, energy conditions, anisotropy, stability, Tolman Oppenheimer Volkoff equation, mass function, compactness, and red-shift. The graphical analysis has been made according to both the theories of rainbow gravity and general relativity. The energy conditions and anisotropy are found to be satisfied, indicating the physical existence of suggested model. Tolman Oppenheimer Volkoff equation is satisfied indicating equilibrium of forces and stability of the compact object. Overall, our model is consistent with the observational information of SAX J1808.4 − 3658. PACS numbers: 04.20.Jb, 04.50.Kd, 04.40.Dg Keywords: Strange Star; Rainbow Gravity; Krori Barua Spacetime; Charged Stringy Quark Matter; Dynamical Variables. I. INTRODUCTION Compact stars are astrophysical objects that captivate researchers due to their intriguing properties and their potential to shed light on the fundamental physics of matter and gravity. These celestial objects, characterized by their high mass and compactness, possess immense gravitational fields that challenge our current understanding of the laws governing the universe. They provide a unique laboratory for studying matter under extreme conditions and exploring the nature of gravity itself. Among the various types of compact stars, strange stars have attracted significant attention. Strange stars are objects composed primarily of up, down, and strange quark matter. These exotic objects are believed to exist in the universe and have been proposed as an alternative to neutron stars or black holes. The existence of uncharged and charged strange stars is analyzed in the background of torsion based f (T ) modified gravity with the discussion on maximum mass limit [1, 2]. The physical properties and existence of charged anisotropic strange stars are investigated within the Rastall framework [3]. The presence of strange stars within the f (T, T ) gravity reveals the properties under the influence of torsion [4]. A unique anisotropic solution for the strange star model in the context of 5D Einstein-Gauss-Bonnet gravity is examined considering the implications of higher-dimensional gravitational theories [5]. Solving the field equations within the context of f (R, T ) gravity and the discoveries contributed significantly to the theoretical understanding of strange stars [6]. A comprehensive analysis is conducted of various candidates for strange stars, including EXO1785− 248, LM CX − 4, SM CX − 1, SAXJ1808.4 − 3658, 4U 1538 − 52, and HerX − 1. The physical features of these candidates, considering them as uncharged and charged, static, spherically symmetric, and isotropic fluid spheres, thus valuable insights are provided into their unique characteristics [7–11]. Krori Barua (KB) metric is exemplary to present a compact star as this metric does not contain any singularity. It is found to be feasible to present the famous neutron, strange, and quark stars using this metric in different theories of gravity. The physical properties and stability of anisotropic compact stellar objects in energy-momentum squared gravity using KB metric are verified for HerX − 1, 4U 1538 − 52, and SAXJ1808.4 − 3658 compact stars [12]. The values of the Rastall parameter for SAXJ1808.4 − 3658, V elaX − 12, and HerX − 1 are investigated for their physical existence using KB metric [13]. The real-time data for P SRJ1614 − 2230, 4U 1608 − 52, CenX − 3, EXO1785 − 248, and SM CX − 1 has been verified using KB metric in f (T, T ) theory [14]. The physical properties of Her − 1, SAXJ1808.4 − 3658, 4U 1820 − 30, P SRJ1614 − 2230, V elaX − 1, and CenX − 3 are verified using KB metric with Hu-Sawicki and logarithmic model in f (G, R) gravity [15]. The same has been done for generic data in higher-order torsion theory [16]. ∗ Electronic address: msf2100636@ue.edu.pk † Electronic address: umber.sheikh@ue.edu.pk" 2401.13979v1,"Leeroo Orchestrator: Elevating LLMs Performance Through Model Integration Alireza Mohammadshahi ∗ A.Ali Shaikh ∗ Majid Yazdani ∗ Leeroo {alireza,my}@leeroo.com Abstract In this paper, we propose an architecture to harness the collective knowledge of multiple trained LLMs to create a new state-of-the-art. At the core of this framework is a LLM-based orchestrator that is adept at picking the right underlying LLM experts for optimal task execution. Inspired by self-play in reinforcement learning, we created a loop of query generation, orchestration, and evaluation to generate training data for the orchestrator. Our evaluation focused on the MMLU benchmark, employing models with 7B, 13B, and 34B parameters available on Hugging Face. The results demonstrate new state-of-the-art open-source models: Our Leeroo orchestrator achieves performance on par with the Mixtral model while incurring only two-thirds of its cost. Moreover, increasing the allowed cost surpasses Mixtral’s accuracy by over 5% at the same cost level, reaching an accuracy of 75.9%. Further enhancements were observed when integrating GPT4 into the underlying model pool. The Leeroo orchestrator nearly matches GPT4’s performance at half the cost and even exceeds GPT4’s results with a 25%cost reduction. These findings illustrate the potential of our architecture in creating state-of-the-art and cost-effective LLMs by optimizing the synergy between multiple LLMs to achieve superior performance outcomes. 1 1 Introduction Developing foundational models is capitalintensive, necessitating vast computational resources and extensive high-quality data. Furthermore, the field is nearing the upper bounds of network size and data capacity, resulting in progressively marginal enhancements over existing models. This scenario echoes a critical juncture in human advancement, where the ’divide and conquer’ ∗ All authors contributed equally to this work. The implementation and detailed results are available at https://github.com/Leeroo-AI/leeroo_orchestrator. 1 methodology emerges as a viable and scalable alternative. This approach entails cultivating domainspecific experts and judiciously harnessing them to forge a composite, high-performance model. The capabilities of existing LLMs appear to be complementary to a significant degree. An illustrative case is the MMLU benchmark (Hendrycks et al., 2021), where selecting the optimal opensource model for each question hypothetically yields an accuracy of 98%, at a computational cost akin to a model with 13 billion parameters. In contrast, GPT4 (OpenAI et al., 2023) achieves an accuracy of 86.4%, while Mixtral (Jiang et al., 2024), as the leading open-source model, reaches 70%. These figures suggest a considerable scope for optimization and growth in the field. Additionally, it is noteworthy that many practical tasks do not require intricate reasoning and can be efficiently addressed by models of moderate complexity; only a minority of tasks demand the advanced capabilities of a model like GPT4. The landscape of open-source models, with approximately 450,000 entries on Hugging Face, 2 is both dynamic and expansive. The rapid proliferation of new models, particularly smaller, domain-focused ones, poses a challenge in tracking and leveraging the latest advancements effectively. We propose an architecture to learn to leverage many LLMs automatically and dynamically. At the heart of our innovation lies the Leeroo Orchestrator (Leeroo-orch ). This architecture is designed to intelligently identify the most suitable ’expert’ for each input while considering other optimization criteria to produce accurate responses. A key aspect of our Leeroo-orch is its strategic optimization based on predefined criteria such as speed, cost, and accuracy. For instance, when faced with a task that could be performed nearly equally well by a 7 billion parameter model or a more extensive 70 billion parameter model, the model will opt for the former 2 https://huggingface.co." 2401.13982v1,"Buffer-layer-controlled Nickeline vs Zinc-Blende/Wurtzite-type MnTe growths on c-plane Al 2 O 3 substrates Deepti Jain 1 , Hee Taek Yi 1 , Alessandro R. Mazza 2,3 , Kim Kisslinger 4 , Myung-Geun Han 5 , Matthew Brahlek 2 and Seongshik Oh 1,6,* 1 Department of Physics and Astronomy, Rutgers, The State University of New Jersey, Piscataway, NJ 08854, USA 2 Materials Science and Technology Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831, USA 3 Present address: Center for Integrated Nanotechnologies, Los Alamos National Laboratory, Los Alamos, New Mexico 87545, USA 4 Center for Functional Nanomaterials, Brookhaven National Laboratory, Upton, NY 11973, USA 5 Condensed Matter Physics and Materials Science, Brookhaven National Laboratory, Upton, NY 11973, USA 6 Center for Quantum Materials Synthesis, Rutgers, The State University of New Jersey, Piscataway, NJ 08854, USA * Correspondence should be addressed to ohsean@physics.rutgers.edu Abstract In the recent past, MnTe has proven to be a crucial component of the intrinsic magnetic topological insulator (IMTI) family [MnTe] m [Bi 2 Te 3 ] n , which hosts a wide range of magneto-topological properties depending on the choice of m and n. However, bulk crystal growth allows only a few combinations of m and n for these IMTIs due to the strict limitations of the thermodynamic growth conditions. One way to overcome this challenge is to utilize atomic layer-by-layer molecular beam epitaxy (MBE) technique, which allows arbitrary sequences of [MnTe] m and [Bi 2 Te 3 ] n to be formed beyond the thermodynamic limit. For such MBE growth, finding optimal growth templates and conditions for the parent building block, MnTe, is a key requirement. Here, we report that two different hexagonal phases of MnTe - nickeline (NC) and zinc-" 2401.14014v1,"JOURNAL OF L A TEX CLASS FILES, 1 Theoretical Analysis of Explicit Averaging and Novel Sign Averaging in Comparison-Based Search Daiki Morinaga, Youhei Akimoto Abstract—In black-box optimization, noise in the objective function is inevitable. Noise disrupts the ranking of candidate solutions in comparison-based optimization, possibly deteriorating the search performance compared with a noiseless scenario. Explicit averaging takes the sample average of noisy objective function values and is widely used as a simple and versatile noise-handling technique. Although it is suitable for various applications, it is ineffective if the mean is not finite. We theoretically reveal that explicit averaging has a negative effect on the estimation of ground-truth rankings when assuming stably distributed noise without a finite mean. Alternatively, sign averaging is proposed as a simple but robust noise-handling technique. We theoretically prove that the sign averaging estimates the order of the medians of the noisy objective function values of a pair of points with arbitrarily high probability as the number of samples increases. Its advantages over explicit averaging and its robustness are also confirmed through numerical experiments. Index Terms—comparison-based algorithm, explicit averaging, rank-based mechanism, sign averaging, stochastic black-box optimization. I. I NTRODUCTION Evolutionary computation approaches in the continuous domain are intended to approximate the optimal solution that minimizes objective function f : R D → R through queries x 7→ f (x) computed by (possibly expensive) numerical simulations for each design variable x. With the rapid development of computational performance, such approaches have been increasingly exploited in practical and industrial applications, such as geoscience [25], topology optimization [16], and machine learning [15]. A major characteristic of most evolutionary computation approaches, such as the evolution strategy with covariance matrix adaptation (CMA-ES) [20], and some deterministic approaches, such as the Nelder–Mead method [26], is their comparison-based principle. Instead of relying on the objective function values, these approaches use the order of these values from the population of design variables. Although the direct use of the objective function value has been widely studied (e.g., in stochastic zerothorder optimization [18]), comparison-based approaches provide invariance against the strictly increasing transformations of the objective function [8]. Under invariance, any convergence statement for a single function can be generalized, This study was partially supported by JSPS KAKENHI under Grant Number 19H04179. D. Morinaga is with the Department of Computer Science, University of Tsukuba, Tsukuba, Japan; RIKEN AIP, Japan (e-mail: morinaga@bbo.cs.tsukuba.ac.jp). Y. Akimoto is with the Institute of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan; RIKEN AIP, Japan (e-mail: akimoto@cs.tsukuba.ac.jp). both theoretically and experimentally, to a class of functions that are transformations of the original function. Furthermore, while the non-differentiability or discontinuity of the objective function is often troublesome for value-based approaches, it may be avoided if a strictly increasing transformation exists for converting a troublesome problem into a feasible one. Real-world applications often entail the presence of noise in the f values. Consequently, each query x 7→ f (x; ε ) returns the objective function value corrupted by noise ε ∈ R M , which is independently sampled per query but remains concealed. Thus, the optimization objective must consider the noise distribution, which is often defined as argmin A [ f (x; ε )], (1) x∈R D where A denotes an optimization index. The choice of A depends on measures such as the expectation, percentile, or conditional value at risk [17], [29]. In comparison-based search, the uncertainty of the objective function affects the population rankings. Therefore, given a population of design variables, {x i } λ i=1 , the search algorithms must determine the population rankings with respect to the ground-truth objective value, {A [ f (x i ; ε )]} λ i=1 . However, because search algorithms observe noisy objective function values, ground-truth ranking cannot be achieved, thereby deteriorating the algorithm performance. Various noise-handling techniques have been proposed to address uncertainty in evolutionary computation. These techniques can be classified into five groups [29]: 1) estimating the ground truth by resampling and averaging the queries (i.e., explicit averaging), 2) estimating the ground truth without using explicit averaging, 3) enlarging the population size (implicit averaging), 4) improving the search strategy, and 5) modifying the selection strategy. Although no existing technique is predominant [4], [6], [7], [12], [24], [28], explicit averaging is often employed in practice because it can be seamlessly incorporated into most evolutionary computation approaches. Explicit averaging resamples the noisy objective function values over K ⩾ 1 times per x i and determines the population rankings,  {x i } λ i=1 , based on the average objective function values, K 1 ∑ Kk=1 f (x i ; ε i,k ) . Considering the strong law of large numbers, the averaged values converge to {E[ f (x i ; ε )]} λ i=1 almost surely if the distribution of the noisy objective function values has a finite mean. Therefore, explicit averaging seems reasonable for handling noise in the" 2401.14016v1,"Towards Uncertainty-Aware Language Agent Jiuzhou Han 1 Wray Buntine 2 Ehsan Shareghi 1 Abstract tions and knowledge collected from the external world (i.e., via tools and APIs), overlooking the potential of LLMs to tackle numerous tasks without depending on any external tool and resource (Shinn et al., 2023; Lu et al., 2023; Yin et al., 2023; Patil et al., 2023). While exploiting external mechanisms has an advantage in terms of verifiability of outputs (e.g., output extracted from a retrieved Wikipedia article provides a verifiable reference) or improvement on accuracy (e.g., using a Python program to do mathematical calculation instead of relying on the LLM), this design is inherently wasteful in how it utilises the LLM’s internal implicit knowledge. In fact, the field of NLP has shown great interest in probing pretrained language models to highlight various types of knowledge they embody directly in their weights (e.g., see Petroni et al. (2019); Collier et al. (2022); Shu et al. (2023) and references therein). While Language Agents have achieved promising success by placing Large Language Models at the core of a more versatile design that dynamically interacts with the external world, the existing approaches neglect the notion of uncertainty during these interactions. We present the Uncertainty- Aware Language Agent (UALA), a framework that orchestrates the interaction between the agent and the external world using uncertainty quantification. Compared with other well-known counterparts like ReAct, our extensive experiments across 3 representative tasks (HotpotQA, StrategyQA, MMLU) and various LLM sizes demonstrates that UALA brings a significant improvement of performance, while having a substantially lower reliance on the external world (i.e., reduced number of tool calls and tokens). Our analyses provide various insights including the great potential of UALA compared with agent fine-tuning, and underscoring the unreliably of verbalised confidence of LLMs as a proxy for uncertainty. 1 We postulate that a more effective design for language agents should have a better interplay between the implicit knowledge encoded in LLM’s weight and the explicit knowledge of the external world. Drawing upon principles from the decision theory, an intelligent agent should possess a reliable mechanism for measuring uncertainty of its own action or the observations from the environment (Bacchus et al., 1996). We build on this, and move towards equipping language agents (as a special case of intelligent agents) with the means of measuring uncertainty to regulate their use of external help (e.g., tools, knowledge bases) more efficiently. 1. Introduction Language Agents (Sumers et al., 2023; Zhou et al., 2023; Xi et al., 2023) utilise Large Language Models (OpenAI, 2023; Touvron et al., 2023; Anil et al., 2023) to interact with the external world (e.g., through tools) and to process collected observations towards solving a task. Having achieved improvements in previously challenging reasoning tasks (Yao et al., 2023; Gao et al., 2023; Lin et al., 2023a), these agents autonomously obtain new knowledge from the world, and leverage memory or self-refinement mechanisms to iteratively improve their reasoning trajectories (Shinn et al., 2023; Gou et al., 2023; Majumder et al., 2023). In NLP, in general, there has been a great amount of research on uncertainty estimation for generative tasks such as Machine Translation (Ott et al., 2018), Summarization (Zablotskaia et al., 2023; Xu et al., 2020), and data-to-text generation (Xiao & Wang, 2021). Recently, a dedicated space emerged to study the intersection of LLMs and Uncertainty. This space can be divided into approaches applicable to open-box LLMs which rely on token-level logits (Malinin & Gales, 2021; Kuhn et al., 2023), and those applicable to black-box LLMs leveraging multiple response generation as a proxy for model’s confidence (Lin et al., 2023b), or relying on LLM’s verbal self-awareness of confidence (Tian et al., 2023). Nonetheless, uncertainty in the context of language agents is an under-explored space, with our work being the first in this direction. Current language agent designs primarily define the role of an LLM as the planner, moderator, or aggregator of observa- 1 Department of Data Science & AI, Monash University College of Engineering and Computer Science, VinUniversity. Correspondence to: Jiuzhou Han . 2 1 We propose an Uncertainty-Aware Language Agent frame- For code and data: https://uala-agent.github.io 1" 2401.14025v1,"DNA Sequence Classification with Compressors Şükrü Ozan digiMOST GmbH, Dieselstraße 7, Marl, 45770, Nordrhein-Westfalen, Deutschland Email: sukruozan@digimost.de January 26, 2024 Abstract Recent studies in DNA sequence classification have leveraged sophisticated machine learning techniques, achieving notable accuracy in categorizing complex genomic data. Among these, methods such as k-mer counting have proven effective in distinguishing sequences from varied species like chimpanzees, dogs, and humans, becoming a staple in contemporary genomic research. However, these approaches often demand extensive computational resources, posing a challenge in terms of scalability and efficiency. Addressing this issue, our study introduces a novel adaptation of Jiang et al.’s compressor-based, parameterfree classification method, specifically tailored for DNA sequence analysis. This innovative approach utilizes a variety of compression algorithms, such as Gzip, Brotli, and LZMA, to efficiently process and classify genomic sequences. Not only does this method align with the current state-of-the-art in terms of accuracy, but it also offers a more resource-efficient alternative to traditional machine learning methods. Our comprehensive evaluation demonstrates the proposed method’s effectiveness in accurately classifying DNA sequences from multiple species. We present a detailed analysis of the performance of each algorithm used, highlighting the strengths and limitations of our approach in various genomic contexts. Furthermore, we discuss the broader implications of our findings for bioinformatics, particularly in genomic data processing and analysis. The results of our study pave 1" 2401.14032v1,"GauU-Scene: A Scene Reconstruction Benchmark on Large Scale 3D Reconstruction Dataset Using Gaussian Splatting Butian Xiong 1 , Zhuo Li 2 , Zhen Li 3 The Chinese University of Hong Kong, Shenzhen {butianxiong,zhuoli}@link.cuhk.edu.cn, zhenli@cuhk.edu.cn, Abstract We introduce a novel large-scale scene reconstruction benchmark using the newly developed 3D representation approach, Gaussian Splatting, on our expansive U-Scene dataset. U-Scene encompasses over one and a half square kilometres, featuring a comprehensive RGB dataset coupled with Li- DAR ground truth. For data acquisition, we employed the Matrix 300 drone equipped with the high-accuracy Zenmuse L1 LiDAR, enabling precise rooftop data collection. This dataset, offers a unique blend of urban and academic environments for advanced spatial analysis convers more than 1.5 km 2 . Our evaluation of U-Scene with Gaussian Splatting includes a detailed analysis across various novel viewpoints. We also juxtapose these results with those derived from our accurate point cloud dataset, highlighting significant differences that underscore the importance of combine multi-modal information. 1 Introduction 3D reconstruction is a transformative technology, enabling the conversion of real-world scenes into digital threedimensional models. This technology, often involving the transformation of multiple 2D images into 3D models, fosters applications in urban planning, virtual reality (VR), and augmented reality (AR). Various techniques have been employed to enhance the accuracy and efficiency of 3D reconstruction. Among them, Structure from Motion (SfM) has been notably prominent, as extensively studied by [Snavely et al., 2006]. This photogrammetric technique uses 2D images captured from different angles to reconstruct three-dimensional structures. A recent innovation in 3D reconstruction is the advent of Neural Radiance Fields (NeRF), which predicts volumetric scene representations from sparse 2D images using a fully connected neural network [Mildenhall et al., 2021]. Despite initial challenges such as training difficulty and limitations in scale and complexity, rapid advancements have been made. Meta-learning techniques [Chen et al., 2021], sparsity exploitation [Zhang et al., 2022], data structure integration [Martel et al., 2021], [Granskog et al., 2021], and eigen- value usage [Chen et al., 2022] have significantly improved NeRF’s performance. The current state-of-the-art method in addressing aliasing issues has also been proposed [Barron et al., 2022]. NeRF models have been successful in synthesizing novel views of scenes, but the Gaussian Splatting Representation [Kerbl et al., 2023] has emerged as a more recent 3D representation, combining rasterization with novel view synthesis for large-scale scenarios. While effective from a distance, Gaussian Splatting exhibits limitations such as blurring at closer inspection, which we analyze in detail in this study. We also explore the discrepancies between ground truth point cloud data and novel views generated by Gaussian Splatting. In the following section, we will focus on Gaussian Splatting and point out the drawback of Gaussian Splatting on the large-scale scene reconstruction. Adapting different deep representation to large-scale environments, such as cityscapes, has been an emerging research area [Xiangli et al., 2022] [Tancik et al., 2022]. The challenge of city-scale reconstruction extends beyond the model to the dataset. Existing city-scale datasets [Xiangli et al., 2022] [Yang et al., 2023] [Tancik et al., 2022] have limitations, either lacking accurate ground truth data or being focused on scene understanding rather than reconstruction. To address this, we employ the DJI Matrix 300 drone with Zenmuse L1 Lidar for capturing highly accurate 3D RGB point clouds. This approach enables us to venture beyond traditional indoor scenes, undertaking large city-scale outdoor scene reconstructions. Our dataset covers an area larger than 1.5 km 2 , surpassing the scale of existing datasets like Urban- BIS [Yang et al., 2023] and comparable to CityNeRF’s RGB dataset [Xiangli et al., 2022]. Additionally, we also provide a simple yet effective method to combine Lidar prior together with Gaussian-Splatting. The result by using this algorithm shows a boost to the accuracy of reconstruction result both quantitatively and qualitatively. Our contributions are the following four: • Provision of a large dataset covering over 1.5 km 2 with a dense point cloud using Lidar as illustrated in the 1. • Establishment of a concrete benchmark on our dataset using state-of-the-art Gaussian Splatting. • Propose a Lidar-Image Fusion method that combine the prior obtained by lidar together with Gaussian Splatting" 2401.14034v1,"Unsupervised Spatial-Temporal Feature Enrichment and Fidelity Preservation Network for Skeleton based Action Recognition Chuankun Li a , Shuai Li b,∗ , Yanbo Gao b , Ping Chen a , Jian Li a , Wanqing Li c a School of Information and Communication Engineering, North University of China b School of Control Science and Engineering and School of Software, Shandong University, Jinan 250100, China. c Advanced Multimedia Research Lab, University of Wollongong, Australia Abstract Unsupervised skeleton based action recognition has achieved remarkable progress recently. Existing unsupervised learning methods suffer from severe overfitting problem, and thus small networks are used, significantly reducing the representation capability. To address this problem, the overfitting mechanism behind the unsupervised learning for skeleton based action recognition is first investigated. It is observed that the skeleton is already a relatively high-level and low-dimension feature, but not in the same manifold as the features for action recognition. Simply applying the existing unsupervised learning method may tend to produce features that discriminate the different samples instead of action classes, resulting in the overfitting problem. To solve this problem, this paper presents an Unsupervised spatial-temporal Feature Enrichment and Fidelity Preservation framework (U- FEFP) to generate rich distributed features that contain all the information of the skeleton sequence. A spatial-temporal feature transformation subnetwork is developed using spatial-temporal graph convolutional network and graph convolutional gate recurrent unit network as the basic feature extraction network. The unsupervised Bootstrap Your Own Latent based learning is used to generate rich distributed features and the unsupervised pretext task based learning is used to preserve the information of the skeleton sequence. The two unsupervised learning ways are collaborated as U-FEFP to produce robust and discriminative representations. Experimental results on three widely used benchmarks, namely NTU-RGB+D-60, NTU-RGB+D-120 and PKU-MMD dataset, demonstrate that the proposed U-FEFP achieves the best performance compared with the state-of-the-art unsupervised learning methods. t-SNE illustrations further validate that U-FEFP can learn more discriminative features for unsupervised skeleton based action recognition. Keywords: Skeleton, Action recognition, Graph convolutional network, Unsupervised learning 1. Introduction Action recognition using different modalities (Sun et al., 2022; Özyer et al., 2021) (e.g., video, skeleton) (Li et al., 2023; Song et al., 2021; Yang et al., 2021; Hu et al., 2020; Zhang et al., 2020b; Wang et al., 2018) has been widely studied due to its wide use in many potential applications such as autonomous driving and video surveillance. Compared with the conventional RGB video, 3D skeleton owning high-level representation is light-weight and robust to both view differences and complicated background. Therefore, 3D skeleton based action recognition has been widely investigated with methods based on handcrafted features (Weng et al., 2017; Xia et al., 2012), Convolutional Neural Networks (CNNs) (Ke et al., 2017a,b; Li et al., 2017; Hou et al., 2018; Li et al., 2019a; Xu et al., 2018; Li et al., 2022), Recurrent Neural Networks (RNNs) (Li et al., 2018, 2019b; Liu et al., 2018; Song et al., 2017) and Graph Convolutional Networks (GCNs) (Yan et al., 2018; Shi et al., ∗ Corresponding author Email addresses: chuankun@nuc.edu.cn (Chuankun Li), shuaili@sdu.edu.cn (Shuai Li), ybgao@sdu.edu.cn (Yanbo Gao), chenping@nuc.edu.cn (Ping Chen), lijian@nuc.edu.cn (Jian Li), wanqing@uow.edu.au (Wanqing Li) Preprint submitted to arXiv 2019b; Ye et al., 2020; Zhang et al., 2020a; Shi et al., 2019a; Kong et al., 2022; Gao et al., 2021; Liu et al., 2022; Peng et al., 2021). However, these methods are developed in a fully supervised manner and require extensive annotated labels, which is expensive and time-consuming. Learning general features from unlabelled data for 3D skeleton based action recognition is still an open problem and highly desired. There are two main approaches for unsupervised skeleton based action recognition. One is to utilize an encoder-decoder network and generate useful features by pretext tasks such as auto-regression (Su et al., 2020), reconstruction (Zheng et al., 2018) and jigsaw puzzle (Lin et al., 2020). This approach exploits low-level feature representation, and the performance of the downstream task is dependent on the design of pretext tasks. Existing methods (Su et al., 2020; Zheng et al., 2018; Lin et al., 2020) usually take advantage of the RNNs to encode the input skeleton sequence and then regressively predict them. The second approach is to utilize the contrastive learning such as Bootstrap Your Own Latent (BYOL) (Grill et al., 2020), Momentum contrast (He et al., 2020) and exploit the discriminative features among samples in latent space. The methods (Rao et al., 2021; Li et al., 2021; Thoker et al., 2021; Wang et al., 2022) learn features by pulling or pushing the features of different samples as January 26, 2024" 2401.14041v1,"Single-stage optimization for permanent magnet stellarators Guodong Yu 1 , Ke Liu 1 , Tianyi Qian 2 , Yidong Xie 1 , Xianyi Nie 1 , Caoxiang Zhu 1,∗ 1 School of Nuclear Science and Technology, University of Science and Technology of China, Hefei 230027, China 2 Princeton University, Princeton, New Jersey 08544, USA E-mail: caoxiangzhu@ustc.edu.cn January 2024 Abstract. Advanced stellarators are typically optimized in two stages. The plasma equilibrium is optimized first, followed by the design of coils/permanent magnets. However, the coils/permanent magnets in the second stage may become too complex to achieve the desired equilibrium. To address this problem, single-stage optimization methods have been proposed. In this paper, we introduce a novel single-stage optimization method for designing permanent magnet (PM) stellarators. This approach combines straightforward PM metrics to penalize the maximum required PM thickness and the mismatch between the fixed-boundary equilibrium and the free-boundary one, along with typical physical targets. We apply this single-stage optimization method to find a new quasi-axisymmetric PM design. The new design starts from MUSE, which was initially designed using a two-stage optimization approach. The resulting design, MUSE++, exhibits an order of magnitude lower quasi-symmetric error and a one-order reduction in normal field error. We show that MUSE++ has approximately 30% fewer magnets compared to a proxy model “MUSE-0” that uses the same FAMUS optimization without the benefit of a singlestage equilibrium optimization. These results demonstrate that the new singlestage optimization method can concurrently improve plasma properties and simplify permanent magnet complexity. Keywords: stellarator, single-stage optimization, permanent magnet, quasi-symmetry 1. Introduction Stellarators are three-dimensional (3D) magnetic confinement fusion devices to accommodate high-temperature plasmas without driving plasma currents [1]. Stellarators were projected to have worse confinement than tokamaks and thus encountered a long period of overlook. The concept of advanced stellarators opens up a new path for the development of stellarators [2]. The remarkable experimental records of W7-X prove that meticulously optimized stellarators possess as good confinement performance as tokamaks at the same experimental scale [3]. Stellarators have become" 2401.14056v1,"Model CBOR Serialization for Federated Learning Koen Zandberg Mayank Gulati Gerhard Wunder Emmanuel Baccelli Freie Universität Berlin koen.zandberg@fu-berlin.de Freie Universität Berlin mayank.gulati@fu-berlin.de Freie Universität Berlin g.wunder@fu-berlin.de Inria emmanuel.baccelli@inria.fr Abstract—The typical federated learning workflow requires communication between a central server and a large set of clients synchronizing model parameters between each other. The current frameworks use communication protocols not suitable for resource-constrained devices and are either hard to deploy or require high-throughput links not available on these devices. In this paper, we present a generic message framework using CBOR for communication with existing federated learning frameworks optimised for use with resource-constrained devices and low power and lossy network links. We evaluate the resulting message sizes against JSON serialized messages where compare both with model parameters resulting in optimal and worst case serialization length, and with a real-world LeNet-5 model. Our benchmarks show that with our approach, messages are up to 75 % smaller in size when compared to the JSON alternative. I. I NTRODUCTION Artificial intelligence (AI), and in particular machine learning (ML) using deep neural networks (DNN) have seen a spectacular development over the last decade. In this context, nearly all verticals are substantially impacted by ML, typically based on a data pipeline requiring the use of a model, i.e. a layered structure of algorithms which interpret data and make decisions based on that data. This model must first be trained in the learning phase, before it can be used for inference and put in production. Recently, the TinyML community has been demonstrating the feasibility of executing model inference even on small microcontrollers, after these models have been trained and compressed on more powerful machines, as the learning phase typically requires enormous amounts of data and computing capacity. Even more recently, however, the TinyML community explores the potential of learning on low-power microcontrollers [1]. In this context, a trend is federated learning (FL) a machine learning paradigm where a model is trained across multiple decentralized devices without directly sharing their data with a central server. FL and on-device training is attractive because of reasons including privacy, as raw privacy sensitive data does not leave the edge device, and customization with fine-tuning happening on-premises. A. Federated Learning Communication The typical workflow of FL involves: (1) selecting participating devices; (2) sending a global model to each device; (3) training the model on local data; (4) sending local updates to a central server; (5) aggregating the updates to obtain a new global model; and (6) repeating the process until convergence. The resulting model is then sent back to the participating devices for inference. Throughout the FL process, communication is crucial for managing the exchange of model updates between the central server and the clients. It enables the synchronization of models, preserves privacy, and facilitates collaborative learning across distributed devices. Efficient and secure communication protocols are essential for successful FL implementation. Typical FL frameworks such as TensorFlow Federated [2], Flower [3], etc. commonly rely on JSON [4] or gRPC [5] as part of their communication stack. gRPC utilizes Protocol Buffers (Protobuf) [6] as its message structure for data serialization and transmission. Protobuf is a languageagnostic format that allows to define message types, fields, and optional values in a concise and efficient manner for serializing, deserializing, and manipulating the message objects. However, setting up gRPC dependencies on severely resourceconstrained devices can be challenging and human-readable JSON encoding is not optimized for embedded machine-tomachine communication. To address this, alternative communication protocols are often used. For instance, WebSockets [7] present a lightweight and real-time communication solution that is well-suited for such devices. MQTT [8], specifically designed for resource-constrained environments, minimizes network bandwidth and power consumption while ensuring reliable FL communication. Furthermore, the widely supported HTTP/HTTPS protocols offer a standardized and user-friendly option for transmitting model updates in FL workflows. However with severely constrained devices these protocols are still too resource-intensive and not available. Edge devices such as microcontrollers used in smart appliances have severely limited processing capabilities and memory, between 10 MHz to 100 MHz and 16 KiB to 256 KiB. Furthermore the network link used by these devices is not optimized for the low latency and high throughput required by most protocols. The typical stack of combining TCP and HTTPS with JSON or gRPC payloads puts a too heavy burden on these devices. While MQTT is already used with FL, other lightweight alternatives for these protocols used in the constrained device space such as MQTT-SN [9], CoAP [10] and CBOR [11] are readily available, but have not been applied to the FL space yet. B. Contributions In this paper, the work we present mainly consists in the following:" 2401.14064v1,"Quantum Treatment of the Current through Plasma-Metal Junction: Fundamentals Muthukumar Balasundaram a) and Suraj Kumar Sinha b) Department of Physics, Pondicherry University, Kalapet, Pondicherry-605014, India. (*Electronic mail: muthukbs@pondiuni.ac.in) (Dated: 26 January 2024) We study the quantum nature of current through plasma-probe junction from the viewpoint of the metal probe. The intrinsic material properties of the metal and their influence on the nature of the observed current are theoretically worked out. The novel idea is that the plasma-sheath at the plasma-probe junction is treated as a potential barrier, and in analogy with the current conduction through a metal-metal junction, the current through the plasma-sheath is treated as a quantum barrier penetration problem. Essentially, we obtain an expression for the electron-current as a function of the bias voltage in its full range, thereby unlocking the intricate dependency of the current on the material properties of the probe. I. INTRODUCTION When an electrically isolated metal is brought into contact with a plasma, the electrons in the metal and in the plasma attain a thermal equilibrium. This phenomenon can be explained based on a key idea introduced in 1 . The idea in 1 attributes a Fermi energy level to the plasma electrons, but in this article we adopt a different interpretation to that energy level since the plasma electrons are not considered to obey the Fermi-Dirac statistics. At the plasma-metal (PM) junction, where quasi-neutrality of plasma-ions and electrons is lost due to much more mobile electrons, the surface of the metal tends to get negatively charged. Any accumulated charge on a conductor creates an electrostatic potential inside the conductor, and this potential must be constant throughout the metal conductor in order for electrostatic equilibrium to be possible 2 . For a negatively charged metal that is placed in an air medium, the constant value of such a potential is equal to its value at the surface 2 . The effect of this surface charge is to increase the amount of work done to extract an electron from the metal surface 3 . II. FLOATING METAL In the following we consider the metal probe to be a onedimensional rod coated by a thick dielectric material on its cylindrical sides, and the only direction at which it makes direct contact with the plasma is at a tip where it is not covered by the dielectric material. The conduction of electrons is assumed to take place either way only through this tip. The plasma is assumed to be non-magnetized, cold and weakly ionized obeying the Maxwellian velocity distribution. Since plasma is an electrically conducting medium, the electrons in the metal and in the plasma can tunnel through the sheath barrier at the tip and attain an electrical and thermal equilibrium state. Therefore, following 1 , we propose the following ideal a) https://www.pondiuni.edu.in/faculy_profiles/dr-b-muthukumar/ b) https://www.pondiuni.edu.in/faculy_profiles/dr-suraj-kumar-sinha/ energy-band diagram for the plasma-metal junction at equilibrium in the case of the floating metal with all the electrons at the absolute zero temperature: The surface charge den- FIG. 1. Equilibrium configuration of floating metal sity is actually more at the tip and so the conduction band of the metal is bent downward with a downward-cusp inside the metal at x = 0 (see for example 3 ). Since negative charges tend to get settled down even along the rod above the dielectric coating, the surface along the rod also tends to get charged and so we are approximating the conduction band as a straight band at x = 0 for the ease of later calculations. Therefore, the work function eφ m of the floating metal is taken to pick-up the same correction eφ f all along the rod. The effective work function e(φ m + φ f ) should be seen as the work done in extracting a metal electron from the surface of the metal. The plasma (space) potential V sp and the energy line E = 0 are chosen in such a way that an electron at rest in the plasma has the potential energy E sp = −eV sp which is the minimum energy a plasma electron can have. To occupy any energy level lower than this potential energy, a plasma electron will have to have an imaginary momentum which is unphysical. At equilibrium, the Fermi energy level corresponding to the Fermi energy E Fm of the metal should be in line with the space potential energy line E sp . This is because if the Fermi level of the metal is lower than the space potential energy line, then the electrons on the plasma side would tunnel through the barrier into the metal to occupy a lower energy state, and if the space potential energy line is lower than the Fermi level of the" 2401.14067v1,"T A ’ KEED : T HE F IRST G ENERATIVE F ACT - C HECKING S YSTEM FOR A RABIC C LAIMS Saud Althabiti 1,2,3 , Mohammad Ammar Alsalka 1,4 , and Eric Atwell 1,5 1 2 School of Computing, University of Leeds, Leeds, United Kingdom Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia 3 scssal@leeds.ac.uk , salthabiti@kau.edu.sa 4 M.A.Alsalka@leeds.ac.uk 5 E.S.Atwell@leeds.ac.uk A BSTRACT This paper introduces Ta’keed, an explainable Arabic automatic fact-checking system. While existing research often focuses on classifying claims as ""True"" or ""False,"" there is a limited exploration of generating explanations for claim credibility, particularly in Arabic. Ta’keed addresses this gap by assessing claim truthfulness based on retrieved snippets, utilizing two main components: information retrieval and LLM-based claim verification. We compiled the ArFactEx, a testing gold-labelled dataset with manually justified references, to evaluate the system. The initial model achieved a promising F1 score of 0.72 in the classification task. Meanwhile, the system's generated explanations are compared with goldstandard explanations syntactically and semantically. The study recommends evaluating using semantic similarities, resulting in an average cosine similarity score of 0.76. Additionally, we explored the impact of varying snippet quantities on claim classification accuracy, revealing a potential correlation, with the model using the top seven hits outperforming others with an F1 score of 0.77. K EYWORDS Ta’keed, Generative Fact-checker, Arabic Fact-Checking, Claims Verification, LLMs-based Fact- Checking, ArFactEx 1. I NTRODUCTION Misinformation is false information that could be purposely shared on platforms like Twitter [1]. Users usually create it to influence what others think for political, economic, or any other reasons [2]–[4]. It can be distributed by not only individual users but also organizations and governments to negate competitors or advertise their interests [4]–[6]. Misinformation can result in significant harm, provoking confusion, causing conflict among various groups, and initiating violence [7], [8]. Therefore, it is important to remain alert and critical of the news we receive from social media and other online sources. This highlights the necessity of developing automatic fact-checking systems to ensure accuracy and reliability in the information we encounter. Arabic Fact-checking websites, such as Fatabyyano and Misbar, verify and support claims through manual examinations and justifications to users to ensure the authenticity of some information available to the public. In contrast, most automatic Arabic fact-checking systems are developed for classification tasks, and there is a noticeable lack of studies investigating the process of providing justifications while fact-checking. Accordingly, we aim to build an interactive tool to help users identify misinformation with clear justification. Therefore, this paper presents the Ta’keed automatic fact-checking system, which uses an LLM-based model to classify and explain a given tweet based on evidence retrieved from Google" 2401.14068v1,"Diffusion of light in structurally anisotropic media with uniaxial symmetry Ernesto Pini, 1, 2, ∗ Fabrizio Martelli, 1 Alexander Gatto, 3 Henrik Schäfer, 3 Diederik S. Wiersma, 1, 2, 4 and Lorenzo Pattelli 2, 4, 5, † 1 Department of Physics and Astronomy, Università di Firenze, Sesto Fiorentino, Italy 2 European Laboratory for Non-linear Spectroscopy (LENS), Sesto Fiorentino, Italy 3 Sony Europe B.V., Stuttgart Technology Center, Stuttgart, Germany 4 Istituto Nazionale di Ricerca Metrologica (INRiM), Turin, Italy 5 National Research Council – National Institute of Optics (CNR-INO), Sesto Fiorentino, Italy (Dated: January 26, 2024) Anisotropic light transport is extremely common among scattering materials, yet a comprehensive picture of how macroscopic diffusion is determined by microscopic tensor scattering coefficients is not fully established yet. In this work, we present a theoretical and experimental study of diffusion in structurally anisotropic media with uniaxially symmetric scattering coefficients. Exact analytical relations are derived in the case of index-matched turbid media, unveiling the general relation between microscopic scattering coefficients and the resulting macroscopic diffusion tensor along different directions. Excellent agreement is found against anisotropic Monte Carlo simulations up to high degrees of anisotropy, in contrast with previously proposed approaches. The obtained solutions are used to analyze experimental measurements of anisotropic light transport in polystyrene foam samples under different degrees of uniaxial compression, providing a practical example of their applicability. I. INTRODUCTION Anisotropic light transport is a ubiquitous feature of many scattering media, ranging from biological materials as wood [1], tendons [2–4], teeth [5], skin [6] and bone [7], to several types of plastics [8] and isotropic materials under mechanical deformations [9]. Despite their relevance for many applications, however, anisotropic light transport properties are often overlooked or disregarded altogether, due to our incomplete understanding of how they arise from the structural features of a material. In principle, for large scattering materials in the diffusive regime, a general Anisotropic Diffusion Equation (ADE) can be easily cast by replacing the scalar diffusion coefficient D with a diffusion tensor D containing the diffusive rates along different directions. In contrast with the isotropic case, however, the exact relation between the anisotropic diffusive coefficients and their corresponding microscopic scattering properties remains unknown, as well as the expression for the effective boundary conditions required to describe diffusion in finite media. Despite the significance of structurally anisotropic materials and the need for accurate physical models to describe their light transport regime, a surprisingly small number of works exist which attempt to address this issue, with inconclusive results. Up to date, the agreement between solutions to the radiative transfer equation and anisotropic diffusion has been mostly qualitative[10], with large discrepancies between Monte Carlo (MC) simulations and ADE which seemed to imply a fundamental irreducible incompatibility between anisotropic disorder and the core ∗ pinie@lens.unifi.it † l.pattelli@inrim.it assumptions of diffusion theory [11]. Attempts have been made to reconcile the two approaches, by suggesting a different relationship between scattering cross-sections and the components of the diffusion tensor [9], which however did not resolve the discrepancies with numerical Monte Carlo simulations [12]. In 2014, Alerstam showed that the observed deviations were due to the use of oversimplified assumptions on the interdependence of both the diffusion rates and the extrapolated boundary condition on the microscopic scattering coefficients [13], proposing a numerical recipe to compute all relevant transport quantities starting from a single anisotropic trajectory. When using the so obtained coefficients, excellent agreement was finally recovered between ADE and a general anisotropic Monte Carlo framework, albeit only up to a moderate degree of anisotropy. After this important milestone, only sporadic attempts were made towards the development of an analytical framework to connect microscopic and macroscopic transport parameters, without success [14]. In this work, we lay the foundation for an analytical description of anisotropic diffusion parameters based on microscopic scattering coefficients for materials characterized by uniaxial structural anisotropy. Closed-form relationships are derived in case of index-matched boundaries and no scattering asymmetry, which are found in excellent agreement with anisotropic Monte Carlo simulations up to very high degrees of anisotropy. Results are presented in the context of radiative transport, however, their derivation is general and could be seamlessly applied to other fields such as neutron transport in pebbled bed reactor cores [15] or particles in fluids [16], to name a few. The paper is organized as follows: a theoretical background to anisotropic transport theory is provided in Section II, introducing the parameters of interest and the problem at hand. Section III presents the derivation of analytical solutions in the case of an index-matched" 2401.14081v1,"Accelerating Fractional PINNs using Operational Matrices of Derivative Tayebeh Taheri ∗1 , Alireza Afzal Aghaei ∗1 , and Kourosh Parand †1,2,3 1 Department of Computer and Data Sciences, Faculty of Mathematical Sciences, Shahid Beheshti University, G.C. Tehran, Iran 2 Department of Cognitive Modeling, Institute for Cognitive and Brain Sciences, Shahid Beheshti University, G.C. Tehran, Iran 3 Department of Statistics and Actuarial Science, University of Waterloo, Waterloo, Canada January 26, 2024 Abstract This paper presents a novel operational matrix method to accelerate the training of fractional Physics-Informed Neural Networks (fPINNs). Our approach involves a non-uniform discretization of the fractional Caputo operator, facilitating swift computation of fractional derivatives within Caputo-type fractional differential problems with 0 < α < 1. In this methodology, the operational matrix is precomputed, and during the training phase, automatic differentiation is replaced with a matrix-vector product. While our methodology is compatible with any network, we particularly highlight its successful implementation in PINNs, emphasizing the enhanced accuracy achieved when utilizing the Legendre Neural Block (LNB) architecture. LNB incorporates Legendre polynomials into the PINN structure, providing a significant boost in accuracy. The effectiveness of our proposed method is validated across diverse differential equations, including Delay Differential Equations (DDEs) and Systems of Differential Algebraic Equations (DAEs). To demonstrate its versatility, we extend the application of the method to systems of differential equations, specifically addressing nonlinear Pantograph fractional-order DDEs/DAEs. The results are supported by a comprehensive analysis of numerical outcomes. Keywords— Physics-informed neural networks, nonlinear differential equations, Fractional derivative, Operational matrix 1 Introduction Fractional calculus (FC) [1], a specialized field in mathematical analysis, expands traditional differentiation and integration by embracing non-integer orders. Fractional calculus has gained substantial prominence over four decades. As an evolving arena, FC anticipates the introduction of numerous models for real-world applications in science and engineering, particularly in areas where nonlocality plays a crucial role. This burgeoning field demonstrates profound applications across diverse scientific disciplines, extending its reach into the dynamics of the complex real world, with new ideas implemented and tested using real data. Here, some of these applications are mentioned. In the domain of underwater sediment and biomedical applications, fractional derivative models prove valuable for better understanding wave propagation, providing insights into absorption mechanisms ∗ Email: {ttaherii1401, alirezaafzalaghaei}@gmail.com † Email: k parand@sbu.ac.ir, Corresponding author 1" 2401.14107v1,"Learning under Label Noise through Few-Shot Human-in-the-Loop Refinement 1 Aaqib Saeed 1∗ , Dimitris Spathis 2,3 , Jungwoo Oh 4 , Edward Choi 4 , Ali Etemad 5 Eindhoven University of Technology, 2 Nokia Bell Labs, 3 University of Cambridge, 4 KAIST, 5 Queen’s University Abstract Wearable technologies enable continuous monitoring of various health metrics, such as physical activity, heart rate, sleep, and stress levels. A key challenge with wearable data is obtaining quality labels. Unlike modalities like video where the videos themselves can be effectively used to label objects or events, wearable data do not contain obvious cues about the physical manifestation of the users and usually require rich metadata. As a result, label noise can become an increasingly thorny issue when labeling such data. In this paper, we propose a novel solution to address noisy label learning, entitled Few-Shot Human-in-the-Loop Refinement (FHLR). Our method initially learns a seed model using weak labels. Next, it fine-tunes the seed model using a handful of expert corrections. Finally, it achieves better generalizability and robustness by merging the seed and fine-tuned models via weighted parameter averaging. We evaluate our approach on four challenging tasks and datasets, and compare it against eight competitive baselines designed to deal with noisy labels. We show that FHLR achieves significantly better performance when learning from noisy labels and achieves state-of-the-art by a large margin, with up to 19% accuracy improvement under symmetric and asymmetric noise. Notably, we find that FHLR is particularly robust to increased label noise, unlike prior works that suffer from severe performance degradation. Our work not only achieves better generalization in high-stakes health sensing benchmarks but also sheds light on how noise affects commonly-used models. 1 Introduction The increasing adoption of wearable technology has enabled continuous monitoring of various health metrics, such as physical activity, heart rate, sleep, and stress levels. This has spurred interest in gleaning insights into health and wellness from the data collected by these ubiquitous devices, for instance by detecting potential complications and promoting healthy behaviors. Beyond personal use, data coming from wearables also have promising medical applications. Physicians can monitor the health of patients remotely, especially those with chronic conditions, and track their progress over time. This is particularly useful for detecting changes that require prompt medical attention. Moreover, the continuous physiological data from wearables along with other devices can help doctors make more accurate diagnoses and develop personalized treatment plans. The abundance of data generated from wearable sensors has paved the way for developing deep learning models to tap into these insights. However, deep models rely on large volumes of high-quality, clean, and labeled data, which can be difficult to obtain in the context of wearable signals. Data labels are not always accurate due to factors like users’ subjective interpretations, lack of domain expertise, and annotation cost. Inconsistent labels can undermine the generalizability of deep learning models, especially for health monitoring where misdiagnosis can have grave consequences. Therefore, developing techniques to mitigate the effects of noisy labels is crucial to fully realize the potential of deep learning for wearable time-series. While there has been significant research on mitigating label noise in deep learning (see Section 2) in the context of language and vision, to the best of our knowledge, there has been no rigorous attempt at ∗ Correspondence: a.saeed@tue.nl 1" 2401.14135v1,"Convolutional Neural Networks can achieve binary bail judgement classification Amit Barman 1† , Devangan Roy 2† , Debapriya Paul 3‡∗ , Indranil Dutta , Shouvik Kumar Guha 5⋄ , Samir Karmakar 6† , Sudip Kumar Naskar 7† † Jadavpur University, Kolkata, India ‡ Indian Institute of Engineering Science and Technology, Shibpur, India ⋄ West Bengal National University of Juridical Sciences, Kolkata, India { 1 amitbarman811, 7 sudip.naskar}@gmail.com, { 2 devanganr.sll.rs, 4 indranildutta.lnl , 6 samir.karmakar }@jadavpuruniversity.in, 3 debapriya.rs2023@cs.iiests.ac.in, 5 shouvikkumarguha@nujs.edu with a great deal of caution, use cases where they Abstract 4† There is an evident lack of implementation of Machine Learning (ML) in the legal domain in India, and any research that does take place in this domain is usually based on data from the higher courts of law and works with English data. The lower courts and data from the different regional languages of India are often overlooked. In this paper, we deploy a Convolutional Neural Network (CNN) architecture on a corpus of Hindi legal documents. We perform a bail Prediction task with the help of a CNN model and achieve an overall accuracy of 93% which is an improvement on the benchmark accuracy, set by Kapoor et al. (2022), albeit in data from 20 districts of the Indian state of Uttar Pradesh. 1 Natural Language processing in the legal domain District and subordinate courts in India have a preponderance of denied bail pleas. In addition, Indian courts persistently have close to 40 million cases in pendency (National-Judicial-Data-Grid, 2021). In this paper, we report on the use of a convolutional neural network (CNN) architecture to train on judgments from the Hindi Legal Documents Corpus (HLDC) and predict the outcome of bail pleas into two categories - bail granted or bail denied. In a seminal article, pretty much at the early onset of machine intelligence, (Berman and Hafner, 1989) highlights the importance of the need to employ artificial intelligence, albeit in the context of the American legal system, to address crises that are both processual and financial that they observe are responsible for the lack of confidence that citizens have in the legal system. They propose a diagnostic model for sentencing that is true to the technology of the time decision tree. In recent times, (Medvedeva et al., 2018, 2023) have employed, ∗ The work was carried out when the author was in Jadavpur University. outline the need to look into three key areas of the use of artificial intelligence in law, namely, outcome identification, outcome-based judgement categorization and outcome forecasting. What emerges in the literature are two crucial threads; caution in the use of artificial intelligence in Law (Cofone, 2022) and the qualitative importance of training data in building reasonably well-argued outcomes (Medvedeva et al., 2018). In the specific context of the use of NLP in the legal domain, there are arguably two issues: language resources consist of data from higher courts and they tend almost exclusively to be in English (but see Chalkidis et al. (2021)). This is as true globally, as it is in India, where the challenges are compounded due to the use of regional languages and the lack of development of NLP tools specific to the legal domain. In this paper, we report on successfully improving upon the benchmark prediction of Hindi bail plea outcomes as established in Kapoor et al. (2022)(Hindi Legal Documents Corpus (HLDC)). Given the high number of cases in certain districts of Uttar Pradesh (UP), India compared to others, we deploy our CNN models on a set of 10 districts with higher numbers of cases and another set of 10 districts with lower number of cases. In the following section, we provide a brief description of the HLDC and the pre-processing routines followed by us. Section 3 details the experiments and the results. In section 4, we briefly summarize our results. 2 Data The HLDC corpus was created by collecting data from the e-Courts website Kapoor et al. (2022). This corpus contains judgments from district courts of 71 districts in the state of Uttar Pradesh for a duration of 2 years from May 01, 2019, to May 01, 2021. We have used this corpus for" 2401.14157v1,"RAA Vol.0 (20xx) No.0, 000–000 © 2019 National Astronomical Observatories, CAS and IOP Publishing Ltd. http://www.raa-journal.org http://iopscience.iop.org/raa R esearch in A stronomy and A strophysics From ultraluminous X-ray pulsar to supermassive neutron star H. Tong School of Physics and Materials Science, Guangzhou University, Guangzhou 510006, China; tonghao@gzhu.edu.cn Abstract The formation of a 2.7 M ⊙ supermassive neutron star is explored, as the possible companion of PSR J0514–4002E. Magnetars may experience super-Eddington accretion. Observationally they may manifest themselves as ultraluminous X-ray pulsars. We propose that supermassive neutron stars may be formed through ultraluminous X-ray pulsar phase, if the ultraluminous X-ray pulsar phase can last for 10 5 –10 6 yr. The accreted material will also bury the magnetic field of the neutron star. Assuming accretion equilibrium, the final output may be a millisecond supermassive neutron star. In order for the ultraluminous X-ray pulsar phase to last long enough, a magnetic field configuration of the low magnetic field magnetar is required. The mass, magnetic field and rotational evolution of super-Eddington accreting neutron stars are rather robust against different assumptions, although many of the model details are yet to be determined. Key words: accretion–stars: magnetars – pulsars: individual (PSR J0514-4002E) 1 INTRODUCTION Recently, a possible supermassive neutron star with a mass of 2.7 M ⊙ is reported (Barr et al. 2024). According to the observations, the compact star can be either a light black hole or a supermassive neutron star. Irrespective of its nature, it may be formed through the merger of a double neutron star system (Barr et al. 2024). The mass of the compact object ranges from 2.09 to 2.71 M ⊙ (95% confidence level, Barr et al. 2024). Here we explore the most extreme possible value and assuming a compact star of mass 2.7 M ⊙ . Instead of the merger origin proposed in the observational paper, we assume the compact to be a neutron star and investigate how such a supermassive neutron star can be formed. It is commonly assumed that a neutron star is born with a typical mass about 1.4 M ⊙ (Shapiro & Teukolsky 1983). If the neutron star is in a binary system, during the accretion process, it may accrete about a mass of ∼ 0.2 M ⊙ (Zhang et al. 2011). The accreted material will also spin-up the neutron star, to make it a millisecond pulsar (Alpar et al. 1982). Therefore during the accretion process, the mass, magnetic field, and rotational period all evolve with time (Zhang & Kojima 2006). For a massive neutron star with mass of 2 M ⊙ (Demorect et al. 2010; Antoniadis et al. 2013; Cromartie et al. 2020; Fonseca et al. 2021), it may born a little bit more massive or accreted a little bit more material (Tauris et al. 2011; Zhang et al. 2011; Antonoadis et al. 2016). However, the formation of a 2.7 M ⊙ neutron star is challenging to previous understandings. If only 0.2 M ⊙ is accreted during the accretion process, then the neutron star will born with a mass of 2.5 M ⊙ . This is at odd with our previous measured neutron star masses in binaries (Zhang et al. 2011; Antonoadis et al. 2016). Therefore, we prefer to think that the 2.7 M ⊙ neutron star is born with a mass about 1.4 M ⊙ , not atypical with others. The initial mass can also be 1.8 M ⊙ if the initial neutron star mass is bimodal (Antonoadis et al. 2016). It is during the accretion process that the neutron star accretes more material than previously thought. And super- Eddington accretion may allow the neutron star to accrete more material. Among the isolated neutron star population, magnetars may be young neutron stars with magnetic field as high as 10 14 -10 15 G (Duncan & Thompson 1992). This high magnetic field will suppress the scattering cross section between photons and electrons (Herold 1979). This will result in a higher limiting luminosity (Paczynski 1992). The limiting luminosity can be as high as 10 42 erg s −1 , whose exact value depends on the magnetic field strength. This explains why magnetars have 10 4 times super-Eddington luminosity during the" 2401.14168v1,"Vivim: a Video Vision Mamba for Medical Video Object Segmentation Yijun Yang 1 , Zhaohu Xing 1 , and Lei Zhu 1,2( 1 ) The Hong Kong University of Science and Technology (Guangzhou) yyang018@connect.hkust-gz.edu.cn 2 The Hong Kong University of Science and Technology Abstract. Traditional convolutional neural networks have a limited receptive field while transformer-based networks are mediocre in constructing long-term dependency from the perspective of computational complexity. Such the bottleneck poses a significant challenge when processing long video sequences in video analysis tasks. Very recently, the state space models (SSMs) with efficient hardware-aware designs, famous by Mamba, have exhibited impressive achievements in long sequence modeling, which facilitates the development of deep neural networks on many vision tasks. To better capture available cues in video frames, this paper presents a generic Video Vision Mamba-based framework for medical video object segmentation tasks, named Vivim. Our Vivim can effectively compress the long-term spatiotemporal representation into sequences at varying scales by our designed Temporal Mamba Block. Compared to existing video-level Transformer-based methods, our model maintains excellent segmentation results with better speed performance. Extensive experiments on the breast US dataset demonstrate the effectiveness and efficiency of our Vivim. The code for Vivim is available at: https://github.com/scott-yjyang/Vivim. Keywords: State space model · Mamba · Transformer · Video object segmentation. 1 Introduction Automatic segmentation of lesions and tissues in medical videos is essential for computer-aided clinical examination and treatment [6], such as ultrasound breast lesion segmentation, polyp segmentation. Expanding the model’s receptive field in the spatiotemporal dimension is a critical aspect of advancing such video object segmentation tasks. Traditional convolutional neural networks [13,19,5,4] often struggle to effectively capture global spatial information compared to recent transformer-based architectures. The transformer architecture, which utilizes the Multi-Head Self Attention (MSA) [14] to extract global information, has attracted much attention from the community of video object segmentation [18,1,11,9]. Considering that past frames offer a beneficial hint to the segmentation, these methods usually introduce some elaborated modules to model" 2401.14169v1,"A finite volume method preserving the invariant region property for the quasimonotone reaction-diffusion systems Huifang Zhou 1, * , Yuchen, Sun 1 , Fuchang Huo 1 , 1 School of Mathematics, Jilin University, Changchun 130012, P.R. China Abstract. We present a finite volume method preserving the invariant region property (IRP) for the reaction-diffusion systems with quasimonotone functions, including nondecreasing, decreasing, and mixed quasimonotone systems. The diffusion terms and time derivatives are discretized by a finite volume method satisfying the discrete maximum principle (DMP) and the backward Euler method, respectively. The discretization leads to an implicit and nonlinear scheme, and it is proved to preserve the invariant region property unconditionally. We construct an iterative algorithm and prove the invariant region property ar each iteration step. Numerical examples are shown to confirm the accuracy and invariant region property of our scheme. AMS subject classifications: 65M08, 35K59 Key words: Reaction-diffusion systems, quasimonotone, nonlinear finite volume scheme, invariant region, distorted meshes. 1 Introduction Reaction-diffusion systems are mathematical models that describe the behaviors of a large range of physical, biological, chemical and electrical phenomena [1, 2, 9, 12, 18]. They are utilized to mimic the variations in chemical substance concentrations caused by local reactions and diffusions in the field of chemistry, as well as the spread of infectious diseases and population growth [10] in biology; the neutron diffusion theory and the Ginzburg–Landau equations for modeling superconductivity [4] in physics; and the FitzHugh-Nagumo model for simulating the transmission of electrical impulses in neurology and so on. It is of great importance for the numerical methods to preserve the IRP. The IRP refers to the property of reaction-diffusion systems that the solution lies in the range of the ∗ Corresponding author. Email addresses: zhouhuifang@jlu.edu.cn (H. Zhou), sunyc21@mails.jlu.edu.cn (Y. Sun), huofc22@mails.jlu.edu.cn (F. Huo) http://www.global-sci.com/ Global Science Preprint" 2401.14176v1,"Copilot Refinement: Addressing Code Smells in Copilot-Generated Python Code Beiqi Zhang Peng Liang Qiong Feng School of Computer Science Wuhan University Wuhan, China zhangbeiqi@whu.edu.cn School of Computer Science Wuhan University Wuhan, China liangp@whu.edu.cn School of Computer Science Nanjing University of Science and Technology Nanjing, China qiongfeng@njust.edu.cn Yujia Fu Zengyang Li School of Computer Science Wuhan University Wuhan, China yujia_fu@whu.edu.cn School of Computer Science Central China Normal University Wuhan, China zengyangli@ccnu.edu.cn ABSTRACT KEYWORDS As one of the most popular dynamic languages, Python experiences a decrease in readability and maintainability when code smells are present. Recent advancements in Large Language Models have sparked growing interest in AI-enabled tools for both code generation and refactoring. GitHub Copilot is one such tool that has gained widespread usage. Copilot Chat, released on September 2023, functions as an interactive tool aims at facilitating natural language-powered coding. However, limited attention has been given to understanding code smells in Copilot-generated Python code and Copilot’s ability to fix the code smells it generates. To this end, we built a dataset comprising 102 code smells in Copilotgenerated Python code. Our aim is to first explore the occurrence of code smells in Copilot-generated Python code and then evaluate the effectiveness of Copilot in fixing these code smells employing different prompts. The results show that 8 out of 10 types of Python smells can be detected in Copilot-generated Python code, among which Multiply-Nested Container is the most common one. For these code smells, Copilot Chat achieves a highest fixing rate of 87.1%, showing promise in fixing Python code smells generated by Copilot itself. Besides, the effectiveness of Copilot Chat in fixing these smells can be improved with the provision of more detailed prompts. However, using Copilot Chat to fix these smells might introduce new code smells. Code Smell, Code Quality, Code Refactoring, GitHub Copilot CCS CONCEPTS • Software and its engineering → Software maintenance tools. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. Conference’17, July 2017, Washington, DC, USA © 2024 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn ACM Reference Format: Beiqi Zhang, Peng Liang, Qiong Feng, Yujia Fu, and Zengyang Li. 2024. Copilot Refinement: Addressing Code Smells in Copilot-Generated Python Code. In Proceedings of ACM Conference (Conference’17). ACM, New York, NY, USA, 5 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Code smells refer to the symptoms of poor design and implementation decisions according to the definition by Martin Fowler in his book [11]. Code smells negatively affect the internal quality of software systems, hindering comprehensibility and maintainability [18, 22] and increasing error proneness [14, 17]. The identification of code smells suggests the potential need for code refactoring, pinpointing when and what refactoring can be applied to code [11]. Python, consistently ranked as one of the most popular programming languages [4], is increasingly used in various software development tasks. Python is a high-level, interpreted, and dynamic language that provides a simple but effective approach to objectoriented programming [25]. Due to Python’s nature of flexibility and dynamism, developers often find it challenging both to write and maintain Python code [8], and abusing the short constructs of Python can expose code to bad patterns and reduce code readability [5, 15], leading to the occurrence of code smells in Python [9]. Recent advancements in Large Language Models (LLMs) have unveiled impressive capabilities in solving various Natural Language Processing (NLP) tasks [27, 32], showcasing their effectiveness in e.g., code generation [7] and refactoring[21, 24]. Released in June 2021, GitHub Copilot powered by LLM (i.e., OpenAI Codex) has been widely embraced by developers for code auto-completion, and it has evolved into the world’s most widely adopted AI developer tool [3]. However, concerns arose regarding the quality of code generated by Copilot [28, 30]. Subsequently, in September 2023, a public beta of GitHub Copilot Chat has been released as an interactive tool for Copilot, aiming to enable natural language-powered coding [31]. Developers can utilize Copilot Chat for tasks such as code analysis and fixing security issues, democratizing software" 2401.14177v1,"ARTICLE https://doi.org/10.1038/s41467-020-16110-1 OPEN Multilayer hazes over Saturn’s hexagon from Cassini ISS limb images 1234567890():,; A. Sánchez-Lavega J. F. Sanz-Requena 1 ✉ , A. García-Muñoz 2 , T. del Río-Gaztelurrutia 3 , R. Hueso 1 , S. Guerlet 4 & J. Peralta 1 , S. Pérez-Hoyos 1 , 5 In June 2015, Cassini high-resolution images of Saturn’s limb southwards of the planet’s hexagonal wave revealed a system of at least six stacked haze layers above the upper cloud deck. Here, we characterize those haze layers and discuss their nature. Vertical thickness of layers ranged from 7 to 18 km, and they extended in altitude ∼130 km, from pressure level 0.5 bar to 0.01 bar. Above them, a thin but extended aerosol layer reached altitude ∼340 km (0.4 mbar). Radiative transfer modeling of spectral reflectivity shows that haze properties are consistent with particles of diameter 0.07–1.4 μm and number density 100–500 cm −3 . The nature of the hazes is compatible with their formation by condensation of hydrocarbon ices, including acetylene and benzene at higher altitudes. Their vertical distribution could be due to upward propagating gravity waves generated by dynamical forcing by the hexagon and its associated eastward jet. 1 Departamento Física Aplicada I, Escuela de Ingeniería de Bilbao, Universidad del País Vasco UPV/EHU, Bilbao, Spain. 2 Zentrum für Astronomie und Astrophysik, Technische Universität Berlin, Berlin, Germany. 3 Departamento de Física Teórica, Atómica y Optica, Universidad de Valladolid, Valladolid, Spain. 4 Laboratoire de Meteorologie Dynamique/Institut Pierre-Simon Laplace (LMD/IPSL), Sorbonne Universite, Centre National de la Recherche Scientifique (CNRS), Ecole Polytechnique, Ecole Normale Superieure (ENS), Paris, France. 5 Institute of Space and Astronautical Science, Japan Aerospace Exploration Agency, Kanagawa, Japan. ✉ email: agustin.sanchez@ehu.eus NATURE COMMUNICATIONS | (2020) 11:2281 | https://doi.org/10.1038/s41467-020-16110-1 | www.nature.com/naturecommunications 1" 2401.14199v1,"MTRGL: EFFECTIVE TEMPORAL CORRELATION DISCERNING THROUGH MULTI-MODAL TEMPORAL RELATIONAL GRAPH LEARNING Junwei Su 2 , Shan Wu 1,∗ , Jinhui Li 3 Hefei University of Technology, 2 The University of Hong Kong, 3 The University of Toronto Close short trade ABSTRACT In this study, we explore the synergy of deep learning and financial market applications, focusing on pair trading. This market-neutral strategy is integral to quantitative finance and is apt for advanced deep-learning techniques. A pivotal challenge in pair trading is discerning temporal correlations among entities, necessitating the integration of diverse data modalities. Addressing this, we introduce a novel framework, Multi-modal Temporal Relation Graph Learning (MTRGL). MTRGL combines time series data and discrete features into a temporal graph and employs a memory-based temporal graph neural network. This approach reframes temporal correlation identification as a temporal graph link prediction task, which has shown empirical success. Our experiments on real-world datasets confirm the superior performance of MTRGL, emphasizing its promise in refining automated pair trading strategies. Index Terms— Graph, finance, multimodal 1. INTRODUCTION Pair trading, a pivotal investment strategy, capitalizes on price disparities between related assets or markets [1]. Traders identify temporary price variances, executing simultaneous long and short positions on correlated assets. In a long position, a trader anticipates a price rise, while in a short position, they expect a decline, aiming to repurchase the asset at a reduced price later. This strategy, illustrated in Figure 1, leverages market inefficiencies, enabling traders to profit from transient price deviations. By doing so, pair trading not only enhances market efficiency but also fosters improved returns and risk management in portfolios. The essence of pair trading lies in identifying temporal correlations among assets or markets. Recognizing pairs with synchronized price movements, which tend to converge or diverge, is complex due to the market’s dynamic nature and the vast number of potential pairs. This complexity demands robust quantitative analysis and advanced statistical techniques, further complicated by the evolving nature of asset relationships influenced by market shifts, regulations, and macroeconomic events. Historically, experts manually identified these correlations. While traditional methods focused on statistical inferences, they often captured only basic data trends. The rise of machine learning has ushered in a new era, demonstrating its prowess in handling vast datasets, recognizing non-linear relationships, and outperforming traditional methods. However, the potential of machine learning in pair trading remains underexplored, necessitating further research. Applying machine learning to pair trading introduces challenges. Firstly, while abundant data exists in finance, its simplicity *Corresponding author: Shan Wu, wus@hfut.edu.cn Short Price 1 Long Entity A Entity B Close long trade Time Fig. 1. Illustration of the Pair Trading Strategy. Entities A and B are two correlated entities whose price tends to move together. The circled section indicates a temporal divergence of the price of the two entities due to market fluctuation or inefficiency. During the divergent period, the trader can simultaneously take a long position on entity B and a short position on entity A, and benefit from the divergence period when the movement of A and B converge again. can limit machine learning optimization. Advanced models thrive on complex, multi-dimensional inputs, surpassing traditional methods. Thus, integrating diverse data modalities is crucial. Secondly, the ever-changing financial markets, influenced by various factors, can drastically alter asset relationships. This demands models that can adapt to these temporal correlations, requiring advanced algorithms. In this study, we examine the role of machine learning in the stock market by focusing on pair trading, introducing a novel framework, the multi-modal temporal relation graph learning (MTRGL). The contributions of this paper are highlighted as follows: • We probe the challenges associated with the application of machine learning in finance. We highlight the pivotal importance of integrating information from diverse modalities. • The introduction of MTRGL, a framework that seamlessly integrates various modalities. It features two key components: a mechanism for constructing a dynamic graph encapsulating both time series data (e.g., price trends) and discrete feature information (e.g., sector classifications), and a neural model powered by a memorybased dynamic graph neural network, an efficacious tool in temporal graph learning [2]. • Empirical analysis on real-world data, showcasing MTRGL’s superiority in identifying temporal correlations. An ablation study further validates its effectiveness, offering insights for future machine learning applications in finance. 2. RELATED WORK The rise in computational capabilities has enabled neural-networkbased machine learning models to derive insights from complex datasets, including images [3, 4, 5], languages [6, 7, 8], and networks [9, 10, 11, 12]. Financial markets, with their intricate dynam-" 2401.14251v1,"On quasi-local angular momentum and the construction of axial vector fields István Rácz ∗ Wigner RCP, H-1121 Budapest, Konkoly Thege Miklós út 29-33, Hungary January 26, 2024 Abstract A method is introduced which, for the first time, allows us to construct axial vector fields without which formal definitions of quasi-local angular momentum, in general, would remain empty. The introduced method is practical, it can be used to construct all such axial vector fields, and it allows the quasi-local angular momentum to be represented by a triple vector in three-dimensional Euclidean space. We also derive balance relations which allow us to monitor the variation of the magnitude and direction of this vector, and also to monitor the angular momentum transports in generic spacetimes without symmetries. 1 Preliminaries It is widely believed that a complete analytical description of truly dynamical processes is inconceivable without the use of appropriate quasi-local quantities such as mass, energy, linear and angular momentum [1, 2, 3, 4]. On the other hand, since general relativity is a metric theory of gravity, even the definition of such quantities is not self-evident, not to mention our natural desire that they should be defined in a form that is easy to apply in practice. While there are still debates about the definitions of energy and mass [5], there is surprisingly almost complete agreement about the definition of the quasi-local angular momentum (see [5, 6, 7, 8, 9, 10, 11] and references therein). Notably, if we knew how to define the so-called ‘axial’ vector fields at the boundary of finite domains, we could determine the angular momentum ∗ E-mail address:racz.istvan@wigner.hu 1" 2401.14256v1,"Producing Plankton Classifiers that are Robust to Dataset Shift C. Chen, ∗ S. Kyathanahally, M. Reyes, S. Merkli, E. Merz, E. Francazi, M. Hoege, F. Pomati, and M. Baity-Jesi † Eawag, Überlandstrasse 133, CH-8600, Switzerland (Dated: January 26, 2024) Modern plankton high-throughput monitoring relies on deep learning classifiers for species recognition in water ecosystems. Despite satisfactory nominal performances, a significant challenge arises from Dataset Shift, which causes performances to drop during deployment. In our study, we integrate the ZooLake dataset, which consists of dark-field images of lake plankton [1], with manuallyannotated images from 10 independent days of deployment, serving as test cells to benchmark Out-Of-Dataset (OOD) performances. Our analysis reveals instances where classifiers, initially performing well in In-Dataset conditions, encounter notable failures in practical scenarios. For example, a MobileNet with a 92% nominal test accuracy shows a 77% OOD accuracy. We systematically investigate conditions leading to OOD performance drops and propose a preemptive assessment method to identify potential pitfalls when classifying new data, and pinpoint features in OOD images that adversely impact classification. We present a three-step pipeline: (i) identifying OOD degradation compared to nominal test performance, (ii) conducting a diagnostic analysis of degradation causes, and (iii) providing solutions. We find that ensembles of BEiT vision transformers, with targeted augmentations addressing OOD robustness, geometric ensembling, and rotation-based test-time augmentation, constitute the most robust model, which we call BEsT . It achieves an 83% OOD accuracy, with errors concentrated on container classes. Moreover, it exhibits lower sensitivity to dataset shift, and reproduces well the plankton abundances. Our proposed pipeline is applicable to generic plankton classifiers, contingent on the availability of suitable test cells. By identifying critical shortcomings and offering practical procedures to fortify models against dataset shift, our study contributes to the development of more reliable plankton classification technologies. I. INTRODUCTION Plankton are a fundamental element of water ecosystems. They are responsible for carbon and nutrient upcycling and are used in water treatment plants and fisheries [2, 3]; they are a robust indicator of the health of ecosystems [4]; and they also are a paradigm of complex ecosystem which is studied as a model system for understanding community composition and dynamics [5–7]. Additionally, algal blooms, which are sudden increases in the abundance of specific phytoplankton species, can have disruptive effects on water ecosystems. Consequently, there is an ongoing effort to develop forecasting methods for predicting the abundances of plankton taxa at future times [8]. For these and various other reasons, high-throughput in-situ monitoring systems have been increasingly deployed in recent years [9–13], generating vast amounts of data [14]. These systems often employ underwater cameras, producing an overwhelming volume of images that makes manual annotation unapproachable. This challenge is addressed through the usage of deep learning classifiers, which use state-of-the-art methods, ranging from convolutional networks [1, 15–19] to vision transformers [20–22]. The results seem promising, exhibiting test accuracies and F1 scores well above 90% [23]. As a result, ecological studies have commenced leveraging data from these classifiers [13, 24, 25]. ∗ cheng.chen@eawag.ch † marco.baityjesi@eawag.ch However, already in the early attempts at plankton classification, a mismatch between the nominal performance and that at deployment time was noticed [26, 27]. In fact, it was pointed out that plankton systems are very likely to be subject to dataset shift (DS) [12, 28–30]. In simple terms, DS means that the train/test dataset can be so different from the data encountered once the model is deployed, that the declared test performances are not meaningful [31, 32]. When the difference between testing and deployment are in terms of taxon abundances, we talk of distributional DS. In plankton monitoring, not only the relatives abundances can change, but also the way images from a same taxon appear, in which case we talk of compositional DS. Factors which can induce compositional DS include changes in the species traits, in environmental factors such as water turbidity, and in instrument conditions like lens cleanliness. In the presence of DS, it becomes crucial that machine learning models not only perform well on the test set (which we call in-dataset, ID), but also that they generalize well on outof-dataset (OOD) images that may come from a different data distribution than the original dataset. One way to address this is to adopt an out-of-domain detection approach, in which one tries to infer which images come from a different data distribution, with the intention of abstaining from classifying those images [33]. One approach with such an intent, applied to plankton, is based on discarding the examples for which the classifier has a low confidence [34, 35]. Otherwise, out-of-domain methods are often used with the aim of improving the generalization to a target domain. There is a large number of existing strategies for this [36], but they mostly rely on the availability of more than one training do-" 2401.14266v1,"JLAB-THY-24-3987 Phenomenology of TMD parton distributions in Drell-Yan and Z 0 boson production in a hadron structure oriented approach F. Aslan ∗ Department of Physics, University of Connecticut, Storrs, CT 06269, U.S.A. and Jefferson Lab, 12000 Jefferson Avenue, Newport News, VA 23606, USA M. Boglione † and J. O. Gonzalez-Hernandez ‡ Dipartimento di Fisica, Università degli Studi di Torino, Via P. Giuria 1, I-10125, Torino, Italy and INFN, Sezione di Torino, Via P. Giuria 1, Torino, I-10125, Italy T. Rainaldi § Department of Physics, Old Dominion University, Norfolk, VA 23529, USA T. C. Rogers ¶ and A. Simonelli ∗∗ Department of Physics, Old Dominion University, Norfolk, VA 23529, USA and Jefferson Lab, 12000 Jefferson Avenue, Newport News, VA 23606, USA (Dated: January 25, 2024) We present a first practical implementation of a recently proposed hadron structure oriented (HSO) approach to TMD phenomenology applied to Drell-Yan like processes, including lepton pair production at moderate Q 2 and Z 0 boson production. We compare and contrast general features of our methodology with other common practices and emphasize the improvements derived from our approach that we view as essential for applications where extracting details of nonperturbative transverse hadron structure is a major goal. These include the HSO’s preservation of a basic TMD parton-model-like framework even while accounting for full TMD factorization and evolution, explicit preservation of the integral relationship between TMD and collinear pdfs, and the ability to meaningfully compare different theoretical models of nonperturbative TMD parton distributions. In our examples, we show that there is significant sensitivity at moderate Q 2 to both the form of the nonperturbative transverse momentum dependence and the parametrization of collinear parton densities. However, we also find that evolving to Q 2 = M Z 2 , without fitting, results in a satisfactory postdiction of existing data for Z 0 production, nearly independently of the modeling of nonperturbative transverse momentum behavior. We argue that this demonstrates that moderate Q measurements should be given greater weight than high Q measurements in extractions of nonperturbative transverse momentum dependence. We also obtain new extractions of the nonperturbative Collins-Soper kernel within the HSO approach. We discuss its features and compare with some earlier extractions. I. INTRODUCTION The techniques of transverse momentum dependent (TMD) factorization and evolution have found applications both in very high energy phenomenology and in studies of nonperturbative hadron structure. However, phenomenological treatments that merge the two types of applications in a coherent way that preserves the desired features of both a hadron structure viewpoint and a high energy evolution viewpoint have remained elusive. To address this, recent work by three of us reformulated the details of the steps for applying TMD factorization in a way that is simultaneously optimized for phenomenological studies of hadron structure at moderate-to-low Q and for evolution to the very large scales relevant to high energy phenomenology [1, 2]. Reference [1] referred to this as a “bottom up” approach while in Ref. [2] it was called a “hadron structure oriented” (HSO) approach. The HSO strategy is to construct phenomenological parametrizations for the TMD correlation functions, the TMD parton density functions (pdfs) and the TMD fragmentation functions (ffs), while strictly adhering to the logic of the TMD factorization and evolution ∗ Electronic address: fpaslan@jlab.org † Electronic address: boglione@to.infn.it ‡ Electronic address: joseosvaldo.gonzalezhernandez@unito.it § Electronic address: train005@odu.edu ¶ Electronic address: trogers@odu.edu ∗∗ Electronic address: andsim@jlab.org" 2401.14283v1,"Information Leakage Detection through Approximate Bayes-optimal Prediction Pritha Gupta prithag@mail.uni-paderborn.de Department of Computer Science, Paderborn University Paderborn, Germany Marcel Wever marcel.wever@ifi.lmu.de MCML, LMU Munich Munich, Germany Eyke Hüllermeier eyke@lmu.de MCML, LMU Munich Munich, Germany Editor: Leslie Pack Kaelbling Abstract In today’s data-driven world, the proliferation of publicly available information intensifies the challenge of information leakage (IL), raising security concerns. IL involves unintentionally exposing secret (sensitive) information to unauthorized parties via systems observable information. Conventional statistical approaches rely on estimating mutual information (MI) between observable and secret information for detecting IL, facing challenges such as the curse of dimensionality, convergence, computational complexity, and MI misestimation. Furthermore, though proven effective, emerging supervised machine learning (ML) methods are limited to binary system sensitive information and lack a comprehensive theoretical framework. To address these limitations, we establish a theoretical framework using statistical learning theory and information theory to quantify and detect IL accurately. We demonstrate that MI can be accurately estimated by approximating the log-loss and accuracy of the Bayes predictor. As in practice, the Bayes predictor is typically unknown, and we propose to approximate it with the help of automated machine learning (AutoML). First, we compare our MI estimation approaches against current baselines, using synthetic data sets generated using the multivariate normal (MVN) distribution with known MI. Second, we introduce a cut-off technique using one-sided statistical tests to detect IL and employ the Holm-Bonferroni correction to increase confidence in detection decisions. Our study evaluates IL detection performance on real-world data sets, highlighting the effectiveness of Bayes predictor’s log-loss’s estimation, and finds our proposed method to effectively estimate MI on synthetic data sets and thus detect ILs accurately. Keywords: Information Leakage Detection, Mutual Information, Bayes-optimal Predictor, AutoML, Statistical Tests, Holm-Bonferroni, Privacy 1 Introduction Information leakage (IL) has become a significant and complex challenge in today’s datadriven world (Shabtai et al., 2012). The rapid proliferation of publicly available data, coupled with the increasing use of Internet of Things (IoT) technologies, has magnified the 1" 2401.14285v1,"1 POUR-Net: A Population-Prior-Aided Over-Under-Representation Network for Low-Count PET Attenuation Map Generation Bo Zhou, Jun Hou, Tianqi Chen, Yinchi Zhou, Xiongchao Chen, Huidong Xie, Qiong Liu, Xueqi Guo, Yu-Jung Tsai, Vladimir Y. Panin, Takuya Toyonaga, James S. Duncan, Chi Liu Low-dose PET offers a valuable means of minimizing radiation exposure in PET imaging. However, the prevalent practice of employing additional CT scans for generating attenuation maps (µ-map) for PET attenuation correction significantly elevates radiation doses. To address this concern and further mitigate radiation exposure in low-dose PET exams, we propose POUR-Net - an innovative population-prior-aided over-under-representation network that aims for high-quality attenuation map generation from low-dose PET. First, POUR-Net incorporates an over-under-representation network (OUR-Net) to facilitate efficient feature extraction, encompassing both low-resolution abstracted and fine-detail features, for assisting deep generation on the full-resolution level. Second, complementing OUR-Net, a population prior generation machine (PPGM) utilizing a comprehensive CT-derived µ- map dataset, provides additional prior information to aid OUR-Net generation. The integration of OUR-Net and PPGM within a cascade framework enables iterative refinement of µ-map generation, resulting in the production of high-quality µ-maps. Experimental results underscore the effectiveness of POUR-Net, showing it as a promising solution for accurate CT-free low-count PET attenuation correction, which also surpasses the performance of previous baseline methods. Index Terms—Low-count PET, Attenuation Correction, Population Prior, Deep Learning, Attenuation Map Generation I. I NTRODUCTION P OSITRON emission tomography (PET) is an important functional imaging modality with wide clinical applications in oncology, cardiology, and neurology. To perform PET imaging, a small amount of radioactive tracer is injected into the patient, which inevitably introduces radiation exposure to both patient and healthcare providers, thus raising concerns. By reducing the administered injection dose, lowdose/count PET (referred to as low-count PET hereafter) is of great interest per the As Low As Reasonably, Achievable concept (ALARA) [1], in particular for clinical applications that require serial PET scanning, e.g. therapy response evaluation [2], or patient population with limited tolerance to radiation, e.g. pediatric PET [3]. Even though low-count PET with conventional reconstruction methods, e.g. OSEM [4], suffer from low image quality, recent developments of statistical-based [5]–[7] and deep learning (DL)-based PET denoising/reconstruction methods [8]–[18] have shown great potential to reconstruct high-quality PET image from lowcount data, and could provide highly consistent quantification when comparing to standard-count PET. On the other hand, accurate PET quantification also relies on accurate Attenuation Correction (AC) during PET reconstruction. In PET/CT scans, B. Zhou and X. Chen and H. Xie and Q. Liu and X. Guo are with the Department of Biomedical Engineering, Yale University, New Haven, CT, 06511, USA. J. Hou and T. Chen are with the Department of Radiology and Biomedical Imaging, Yale University, New Haven, CT, 06511, USA, and the Department of Computer Science, University of California Irvine, Irvine, CA, 92697, USA. Y. Tasi was with the Department of Radiology and Biomedical Imaging, Yale University, New Haven, CT, 06511, USA, and is currently with Canon Medical Research USA Inc., Vernon Hills, IL, 60061, USA. V. Y. Panin is with the Siemens Medical Solutions Inc., Knoxville, TN, 37932, USA. T. Toyonaga is with the Department of Radiology and Biomedical Imaging, Yale University, New Haven, CT, 06511, USA. J. S. Duncan and C. Liu are with the Department of Biomedical Engineering and the Department of Radiology and Biomedical Imaging, Yale University, New Haven, CT, 06511, USA. Corresponding email: bo.zhou@yale.edu and chi.liu@yale.edu This work was supported by funding from the National Institutes of Health (NIH) under grant numbers R01EB025468, R01CA224140, and R01CA275188. the CT imaging component aims to provide a high-quality attenuation map, i.e. µ-map, for AC. However, this AC protocol not only introduces additional radiation for PET imaging procedures but may cause various artifacts in the reconstructed PET. For example, these artifacts can originate from PET-CT misalignments [19], [20], or CT itself [21], e.g. due to beam hardening, metal artifact, and count-starving, and low-dose CT may exacerbate those artifacts [22]–[24]. To further reduce the radiation in PET scans and improve the PET image quality, it is desirable to develop CT-free AC methods and generate a high-quality µ-map directly from low-count PET for AC. In fact, for time-of-flight (TOF) PET, Maximum Likelihood Reconstruction of Activity and Attenuation (MLAA) algorithms [25] were first developed to simultaneously reconstruct the tracer activity (λ-MLAA) and the attenuation map (µ- MLAA), based on the TOF PET raw data only, i.e. without CT. Ideally, MLAA would solve the AC problem for TOF PET. However, the direct use of µ-MLAA still suffers from significant quantification error as compared to the CT-based (µ-CT) OSEM reconstruction [25]–[27], even in the standardcount PET. With recent advancements in deep learning and computer vision, DL-based approaches have been extensively studied to address this challenge [28], [29]. The previous DL- based AC methods can be summarized into three classes. The first category of methods uses either non-attenuation corrected (NAC) PET or MLAA reconstructions as deep network input to generate pseudo-CT or CT-based µ-map [26], [30]–[34]. Then, AC is performed based on the generated µ-map. Similarly, the second category of methods also uses either NAC PET or MLAA reconstructions as deep network input, but to directly generate attenuation-corrected PET [35]–[37]. The above two classes of methods are easy to implement and can be applied to all PET modalities, i.e. PET-alone, PET/CT, or PET/MRI, which however suffer from quantification errors given the relatively low amount of information if input is from the NAC PET only. The third category of methods was mainly for PET/MRI, where deep networks were developed" 2401.14304v1,"Constraint–Aware Mesh Refinement Method by Reachability Set Envelope of Curvature Bounded Paths ⋆ Juho Bae a , Ji Hoon Bai b,1 , Byung–Yoon Lee b , Jun–Yong Lee b a Korea Advanced Institute of Science and Technology, Daejeon, 34141, Republic of Korea b Nearthlab, Seoul, 06246, Republic of Korea Abstract This paper presents an enhanced direct-method-based approach for the real-time solution of optimal control problems to handle path constraints, such as obstacles. The principal contributions of this work are twofold: first, the existing methods for constructing reachability sets in the literature are extended to derive the envelope of these sets, which determines the region swept by all feasible trajectories between adjacent sample points. Second, we propose a novel method to guarantee constraint violation–free between discrete states in two dimensions through mesh refinement approach. To illustrate the effectiveness of the proposed methodology, numerical simulations are conducted on real-time path planning for fixed–wing unmanned aerial vehicles. Key words: Reachability Set; Envelope; Direct Collocation Method; Inter–Sample Collision–Avoidance; Mesh Refinement; Sequential Convex Programming. 1 Introduction Over the past decade, the need for rapid and efficient real–time algorithms to solve optimal control problems has intensified, particularly for onboard guidance problems such as the powered descent landing problem in [2], [27], and [25], the re–entry guidance problem in [15], [32], [33], and [3], and planning of unmanned–aerial vehicle(UAV) trajectories in [21] and [30]. Recent advancements in real–time optimal control involve direct methods combined with sequential convex programming (SCP) [2], [15], [28], [19], [29], and [3]. The direct method partitions the domain into multiple intervals separated by sample points, or nodes. Subsequently, polynomial interpolation is employed to determine the values of state and control variables between these nodes, with the specific interpolation method chosen based on the circumstances. In a typical optimal control problem(OCP) that involves path constraints, the forbidden ⋆ This paper was not presented at any conference. Email addresses: johnbae1901@kaist.ac.kr (Juho Bae), jihoon.bai@nearthlab.com (Ji Hoon Bai), byungyoon.lee@nearthlab.com (Byung–Yoon Lee), junyong.lee@nearthlab.com (Jun–Yong Lee). 1 Corresponding author at: Nearthlab, Seoul, 06246, Republic of Korea. Tel +821063088045. Preprint submitted to Automatica regions, where the path constraint restrains the state variables to enter, is a key focus of our study. Obstacles from the UAV trajectory planning problems, dynamics pressure bound from the re–entry guidance problem are specific examples of such forbidden regions. Direct method formulation applies path constraints at each mesh points, preventing state variables from entering forbidden regions. However, the generated trajectory in between the mesh points may trespass the forbidden regions. This is commonly known as the inter– sample collision problem [7]. Not only confined in the SCP framework based approaches, it is seriously considered as one of the most critical difficulties in practical application of the general direct method based algorithms [30]. Despite the term collision, path constraints extend beyond collision avoidance, as seen in re-entry guidance problem in [15] and [3]. In this context, we will refer such an issue as the problem of obtaining a path constraint violation–free trajectory. To address this challenge, a method for implementing path constraints involving cylindrical obstacles was proposed in [7]. The core idea involved estimating the shortest distance between an obstacle’s center and the path connecting two adjacent nodes. By ensuring that this minimum distance exceeds the obstacle’s radius, a collision-free constraint was established. However, this 26 January 2024" 2401.14332v1,"SunBlock: Cloudless Protection for IoT Systems Vadim Safronov 1 , Anna Maria Mandalari 2 , Daniel J. Dubois 3 , David Choffnes 3 , and Hamed Haddadi 1 1 Imperial College London, London, UK {v.safronov,h.haddadi}@imperial.ac.uk 2 University College London, London, UK a.mandalari@ucl.ac.uk 3 Northeastern University, Boston, US choffnes@ccs.neu.edu, d.dubois@northeastern.edu Abstract. With an increasing number of Internet of Things (IoT) devices present in homes, there is a rise in the number of potential information leakage channels and their associated security threats and privacy risks. Despite a long history of attacks on IoT devices in unprotected home networks, the problem of accurate, rapid detection and prevention of such attacks remains open. Many existing IoT protection solutions are cloud-based, sometimes ineffective, and might share consumer data with unknown third parties. This paper investigates the potential for effective IoT threat detection locally, on a home router, using AI tools combined with classic rule-based traffic-filtering algorithms. Our results show that with a slight rise of router hardware resources caused by machine learning and traffic filtering logic, a typical home router instrumented with our solution is able to effectively detect risks and protect a typical home IoT network, equaling or outperforming existing popular solutions, without any effects on benign IoT functionality, and without relying on cloud services and third parties. 1 Introduction Internet of Things (IoT) devices are increasingly popular, pervasive, and promise a wide range of functionality including remote health monitoring, adaptive climate and lighting, automated control of various appliances and assets within smart spaces. The heterogeneity of IoT device types, functionality, and their applications lead to major security and privacy threats for smart home users. IoT devices are manufactured all over the world, send data globally, may be updated over-the-air, and use a myriad of third-party software libraries [47]. A single vulnerability in one part of the IoT supply chain can have broad security and privacy impacts for IoT users. For example, compromised IoT devices can compromise user privacy, e.g., exposing sensitive user activities on personal computers by reading power consumption from a compromised smart plug [27], among many other serious threats described in recent literature [32, 48, 49, 51]. Also, the combination of IoT device sensors with Internet connectivity poses substantial risks of personally identifiable information (PII) exposure [47]. To address such risks, several IoT protection solutions have been proposed so far, but they pose several issues, including their lack of completeness. Evidence" 2401.14334v1,"This draft was prepared using the LaTeX style file belonging to the Journal of Fluid Mechanics 1 Momentum, energy and vorticity balances in deep-water surface gravity waves Aidan Blaser 1 , Raphaël Benamran 2 , A. Bia Villas Bôas 3 , Luc Lenain 1 , Nick Pizzo 4 † 1 Scripps Institution of Oceanography, University of California San Diego, La Jolla, CA 92037, USA 2 Department of Physics, Brown University, Providence, RI 02912, USA. 3 Geophysics Department, Colorado School of Mines, Golden, CO 80401 4 Graduate School of Oceanography, University of Rhode Island, Kingston, RI 02881, USA (Received xx; revised xx; accepted xx) The particle trajectories in irrotational, incompressible and inviscid deep-water surface gravity waves are open, leading to a net drift in the direction of wave propagation commonly referred to as the Stokes Drift, which is responsible for catalysing surface wave-induced mixing in the ocean and transporting marine debris. A balance between phase-averaged momentum density, kinetic energy density and vorticity for irrotational, monochromatic and periodic two-dimensional water waves is derived by working directly within the Lagrangian reference frame, which tracks particle trajectories as a function of their labels and time. This balance should be expected as all three of these quantities are conserved following particles in this system. Vorticity in particular is always conserved along particles in two-dimensional inviscid flow, and as such even in its absence it is the value of the vorticity which fundamentally sets the drift, which in the Lagrangian frame is identified as the phase-averaged momentum density of the system. A relationship between the drift and the geometric mean water level of particles is found at the surface and applications for potential new ways of inferring drift are discussed. Finally, an example of an initially quiescent fluid driven by a wavelike pressure disturbance is considered, showing how the net momentum and energy from the surface disturbance transfer to the wave field, recognizing the source of the mean Lagrangian drift as the net momentum required to generate an irrotational surface wave by any conservative force. Key words: 1. Introduction Deep water surface gravity waves are ubiquitous in the global oceans, and affect the transport of heat, momentum and mass both along and across the air-sea interface (Melville 1996; Deike 2022). One crucial property of irrotational deep water waves is that the particle trajectories are not closed leading to a net drift in the direction of wave propagation commonly referred to as Stokes Drift (Stokes 1847). Formally, the Stokes drift is defined as the difference between the mean Lagrangian and mean Eulerian † Email address for correspondence: nicholas.pizzo@uri.edu" 2401.14343v1,"Class-attribute Priors: Adapting Optimization to Heterogeneity and Fairness Objective Xuechen Zhang 1 , Mingchen Li 2 , Jiasi Chen 2 , Christos Thrampoulidis 3 , Samet Oymak 2 1 University of California, Riverside University of Michigan, Ann Arbor 3 University of British Columbia xzhan394@ucr.edu, milii@umich.edu, jiasi@umich.edu, cthrampo@ece.ubc.ca, oymak@umich.edu 2 Abstract Modern classification problems exhibit heterogeneities across individual classes: Each class may have unique attributes, such as sample size, label quality, or predictability (easy vs difficult), and variable importance at test-time. Without care, these heterogeneities impede the learning process, most notably, when optimizing fairness objectives. Confirming this, under a gaussian mixture setting, we show that the optimal SVM classifier for balanced accuracy needs to be adaptive to the class attributes. This motivates us to propose CAP: An effective and general method that generates a class-specific learning strategy (e.g. hyperparameter) based on the attributes of that class. This way, optimization process better adapts to heterogeneities. CAP leads to substantial improvements over the naive approach of assigning separate hyperparameters to each class. We instantiate CAP for loss function design and post-hoc logit adjustment, with emphasis on label-imbalanced problems. We show that CAP is competitive with prior art and its flexibility unlocks clear benefits for fairness objectives beyond balanced accuracy. Finally, we evaluate CAP on problems with label noise as well as weighted test objectives to showcase how CAP can jointly adapt to different heterogeneities. 1 Introduction Contemporary machine learning problems arising in natural language processing and computer vision often involve large number of classes to predict. Collecting high-quality training datasets for all of these classes is not always possible, and realistic datasets (Menon et al. 2020; Feldman 2020; Hardt, Price, and Srebro 2016) suffer from class-imbalances, missing or noisy labels (among other application-specific considerations). Optimizing desired accuracy objectives with such heterogeneities poses a significant challenge and motivates the contemporary research on imbalanced classification, fairness, and weak-supervision. Additionally, besides distributional heterogeneities, we might have objective heterogeneity. For instance, the target test accuracy may be a particular weighted combination of individual classes, where important classes are upweighted. A plausible approach to address these distributional and objective heterogeneities is designing optimization strategies that are tailored to individual classes. A classical example is Copyright © 2024, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. assigning individual weights to classes during optimization. The recent proposals on imbalanced classification (Li et al. 2021; Chawla et al. 2002) can be viewed as generalization of weighting and can be interpreted as developing unique loss functions for individual classes. More generally, one can use class-specific data augmentation schemes, regularization or even optimizers (e.g. Adam, SGD, etc) to improve target test objective. While promising, this approach suffers when there are a large number of classes K: naively learning class-specific strategies would require O(K) hyperparameters (O(1) strategy hyperparameter per class). This not only creates computational bottlenecks but also raises concerns of overfitting for tail classes with small sample size. To overcome such bottlenecks, we introduce the Classattribute Priors (CAP) approach. Rather than treating hyperparameters as free variables, CAP is a meta-approach that treats them as a function of the class attributes. As we discuss later, example attributes A of a class include its frequency, label-noise level, training difficulty, similarity to other classes, test-time importance, and more. Our primary goal with CAP is building an attribute-to-hyperparameter function A2H that generates class-specific hyperparameters based on the attributes associated with that class. This process infuses high-level information about the dataset to accelerate the design of class-specific strategies. The A2H maps the attributes A to a class-specific strategy S. The primary advantage is robustness and sample efficiency of A2H, as it requires O(1) hyperparameters to generate O(K) strategies. The main contribution of this work is proposing CAP framework and instantiating it for loss function design and post-hoc optimization which reveals its empirical benefits. Specifically, we make the following contributions: 1. Introducing Class-attribute Priors (Sec 3). We first provide theoretical evidence on the benefits of using multiple attributes (see Fig 2). This motivates CAP: A meta approach that utilizes the high-level attributes of individual classes to personalize the optimization process. Importantly, CAP is particularly favorable to tail classes which contain too few examples to optimize individually. 2. CAP improves existing approaches (Sec 4). By integrating CAP within existing label-imbalanced training methods, CAP not only improves their performance but also increases their stability, notably, AutoBalance (Li et al. 2021) and logit-adjustment loss (Menon et al. 2020)." 2401.14346v1,"The Comma Sequence: A Simple Sequence With Bizarre Properties Éric Angelini 32 drève de Linkebeek, 1640 Rhode-Saint-Genèse, BELGIUM Email: eric.angelini@skynet.be Michael S. Branicky University of Kansas, 1520 W 15th St., Lawrence, KS 66045, USA Email: msb@ku.edu Giovanni Resta Istituto di Informatica e Telematica del CNR, via Moruzzi 1, 56124 Pisa, ITALY Email: g.resta@iit.cnr.it N. J. A. Sloane 1 The OEIS Foundation Inc., 11 South Adelaide Ave., Highland Park, NJ 08904, USA Email: njasloane@gmail.com David W. Wilson 3 West St., Apt. 1, Lebanon, NH 03766, USA Email: davidwwilson710@gmail.com Abstract The “comma sequence” starts with 1 and is defined by the property that if k and k ′ are consecutive terms, the two-digit number formed from the last digit of k and the first digit of k ′ is equal to the difference k ′ − k. If there is more than one such k ′ , choose the smallest, but if there is no such k ′ the sequence terminates. The sequence begins 1, 12, 35, 94, 135, . . ., and, surprisingly, ends at term 2137453, which is 99999945. The paper analyzes the sequence and its generalizations to other starting values and other bases. A slight change in the rules allows infinitely long comma sequences to exist. 1 Introduction In the sequence named after the father of this journal 2 the next term depends on the current term and the previous term. That is so old hat, so Twelfth Century! In the comma sequence the next term depends on the current term and on the next term itself, and may not even exist. The definition says that if the current term k has decimal expansion b . . . cd and the next term has decimal expansion k ′ = e . . . f g, then k ′ − k must be equal to the one- or two-digit decimal number de (= 10d + e). We call de the comma-number associated with the comma separating k and k ′ , and k ′ the comma-successor to k. The sequence starts with 1, and if there is a choice for k ′ , pick the smallest, and if no such k ′ exists, the sequence terminates. That’s the definition. (We give a more formal definition in §2.) 1 2 To whom correspondence should be addressed. We intend to submit this paper to the Fibonacci Quarterly. 1" 2401.14355v1,"M ULTIPLY R OBUST E STIMATION OF C AUSAL E FFECT C URVES FOR D IFFERENCE - IN -D IFFERENCES D ESIGNS A P REPRINT Gary Hettinger Department of Biostatistics, Epidemiology, and Informatics University of Pennsylvania Philadelphia, PA, U.S.A. ghetting@pennmedicine.upenn.edu Youjin Lee Department of Biostatistics Brown University Providence, RI, U.S.A. Nandita Mitra Department of Biostatistics, Epidemiology, and Informatics University of Pennsylvania Philadelphia, PA U.S.A. January 26, 2024 A BSTRACT Researchers commonly use difference-in-differences (DiD) designs to evaluate public policy interventions. While established methodologies exist for estimating effects in the context of binary interventions, policies often result in varied exposures across regions implementing the policy. Yet, existing approaches for incorporating continuous exposures face substantial limitations in addressing confounding variables associated with intervention status, exposure levels, and outcome trends. These limitations significantly constrain policymakers’ ability to fully comprehend policy impacts and design future interventions. In this study, we propose innovative estimators for causal effect curves within the DiD framework, accounting for multiple sources of confounding. Our approach accommodates misspecification of a subset of treatment, exposure, and outcome models while avoiding any parametric assumptions on the effect curve. We present the statistical properties of the proposed methods and illustrate their application through simulations and a study investigating the diverse effects of a nutritional excise tax. Keywords Dose Response · Doubly Robust · Health Policy · Semiparametric 1 Introduction Public policies wield significant influence on a broad spectrum of population outcomes, including those related to public health and economics.[Pollack Porter et al., 2018] Accordingly, decision-makers require rigorous evaluation of such policies to comprehend their effectiveness and inform the design of subsequent policy initiatives. Complicating the comprehensive assessment of policy effects, units within a study may be differentially exposed to a policy for various reasons. For example, exposure to an excise tax policy may depend on the ease in which a buyer can evade the tax (e.g., geographic proximity to cross-border shopping) or responsive price adjustments made by the seller which may diminish the actual tax rate seen by consumers.[Chaloupka et al., 2019] These differential exposures can lead to effect heterogeneity that, if understood, can help identify affected populations and inspire future interventions that may generate a different exposure distribution.[Cintron et al., 2022] When evaluating effects of binary policy interventions, researchers commonly use difference-in-differences (DiD) approaches, which exploit the so-called counterfactual parallel trends assumption to utilize outcomes from a control group, measured before and after the intervention, to impute what would have happened in the treated group in the" 2401.14362v1,"The Typing Cure: Experiences with Large Language Model Chatbots for Mental Health Support INHWA SONG ∗ , KAIST, Republic of Korea SACHIN R. PENDSE ∗ , Georgia Institute of Technology, USA NEHA KUMAR, Georgia Institute of Technology, USA MUNMUN DE CHOUDHURY, Georgia Institute of Technology, USA People experiencing severe distress increasingly use Large Language Model (LLM) chatbots as mental health support tools. Discussions on social media have described how engagements were lifesaving for some, but evidence suggests that general-purpose LLM chatbots also have notable risks that could endanger the welfare of users if not designed responsibly. In this study, we investigate the lived experiences of people who have used LLM chatbots for mental health support. We build on interviews with 21 individuals from globally diverse backgrounds to analyze how users create unique support roles for their chatbots, fill in gaps in everyday care, and navigate associated cultural limitations when seeking support from chatbots. We ground our analysis in psychotherapy literature around effective support, and introduce the concept of therapeutic alignment, or aligning AI with therapeutic values for mental health contexts. Our study offers recommendations for how designers can approach the ethical and effective use of LLM chatbots and other AI mental health support tools in mental health care. Additional Key Words and Phrases: human-AI interaction, mental health support, large language models, chatbots 1 INTRODUCTION One in two people globally will experience a mental health disorder over the course of their lifetime [34]. The vast majority of these individuals will not find accessible care care [15, 68], and many of these individuals will die early and preventable deaths as a result [33]. Research from the field of Computer-Supported Cooperative Work (CSCW), including the emergent area of Human-AI interaction, has increasingly examined the societal gaps that prevent people in need from accessing care, and analyzed how people turn to technology-mediated support to fill those gaps [14, 27, 44]. Large Language Model (LLM) chatbots have quickly become one such tool, quickly appropriated for mental health support by people experiencing severe distress and nowhere else to turn. Recent work has discussed how people in distress have turned to LLM chatbots (such as OpenAI’s ChatGPT [8, 10] and Replika [28]) for mental health support, and social media users have described how LLM chatbots saved their lives [10, 47]. Following Freud and Breuer’s [19] description of the beneficial nature of psychoanalysis as a “talking cure,” some have called engagements with technologies for mental health a typing cure [22, 40, 51]. However, others have cautioned against the use of LLM chatbots for mental health support, noting that the outputs of LLM chatbots are less constrained than the rule-based chatbots of the past, with potential for harmful advice or recommendations. For example, the National Eating Disorder Association was forced to shut down their support chatbot in July 2023 after the chatbot provided harmful recommendations to users, including weight loss and dieting advice to users who may already have been struggling with disordered eating [10, 25, 75]. These harms have been demonstrated to have real-life and lethal consequences, with the confirmed death by suicide of a man who was encouraged to end ∗ The first two authors contributed equally to this research. Authors’ addresses: Inhwa Song, KAIST, Daejeon, Republic of Korea, igreen0485@kaist.ac.kr; Sachin R. Pendse, Georgia Institute of Technology, Atlanta, GA, USA, sachin.r.pendse@gatech.edu; Neha Kumar, Georgia Institute of Technology, Atlanta, GA, USA, neha.kumar@gatech.edu; Munmun De Choudhury, Georgia Institute of Technology, Atlanta, GA, USA, munmund@gatech.edu." 2401.14371v1,"Efficient Optimisation of Physical Reservoir Computers using only a Delayed Input E NRICO P ICCO 1,* , L INA J AURIGUE 2 , K ATHY L ÜDGE 2 AND S ERGE M ASSAR 1 1 Laboratoire d’Information Quantique CP224, Université libre de Bruxelles (ULB), Av. F. D. Roosevelt 50, 1050 Bruxelles, Belgium 2 Institute of Physics, Technische Universität Ilmenau, Weimarer Straße 25, 98693 Ilmenau, Germany * enrico.picco@ulb.be Abstract: We present an experimental validation of a recently proposed optimization technique for reservoir computing, using an optoelectronic setup. Reservoir computing is a robust framework for signal processing applications, and the development of efficient optimization approaches remains a key challenge. The technique we address leverages solely a delayed version of the input signal to identify the optimal operational region of the reservoir, simplifying the traditionally time-consuming task of hyperparameter tuning. We verify the effectiveness of this approach on different benchmark tasks and reservoir operating conditions. 1. Introduction In recent years, the quest for efficient and powerful machine learning paradigms has led researchers to explore unconventional computational architectures inspired by the dynamics of physical systems. Reservoir Computing (RC) [1] is a possible promising approach. RC diverges from conventional neural networks by introducing a distinct architecture characterized by a fixed, randomly initialized recurrent layer, called ""reservoir"", coupled with a simple linear readout layer: its characteristic structure reduces the training computational complexity, and consequently, the energy consumption. RC possesses a remarkable capacity to process temporal data, distinguishing itself across a large variety of tasks, such as equalization of distorted nonlinear communication channels [1, 2], audio processing [3, 4], weather prediction [5], image [6, 7] and video [8, 9] classification. RC has also gathered attention for its feasibility to being implemented on a wide range of physical substrates [10, 11]. In particular, photonic RC stands out as one of the most promising hardware platforms, thanks to its advantages in parallelization [12,13], high speed [14] and minimal hardware requirements [15]. Hyperparameter optimisation is a crucial aspect of tuning reservoir computers, aiming to enhance their performance across various tasks. Various optimization techniques are employed to search for the most effective hyperparameter values. Grid search, random search, and more sophisticated methods like Bayesian optimization [16, 17] and genetic algorithms [18, 19] have been proposed. Nonetheless, the optimization of hyperparameters remains a critical challenge to the widespread adoption of RC [20]. The challenge lies in exploring the vast hyperparameter space to find configurations that yield optimal results for a given task, and the sensitivity of the reservoir to hyperparameters. The high-dimensional nature of the hyperparameter space can make the search process computationally expensive and time-consuming, even more so in the case of slow experimental reservoirs that require more hyperparameters and for which one iteration of the grid search takes up to several hours [8]. In this work we study a novel approach, first introduced in [21] in numerical simulations, based on the use of a delayed input. In [21] and later in [22], Jaurige at al. show that adding a time-delayed version of the input can considerably improve the performance of a reservoir whose hyperparameters are not adjusted. This powerful approach requires to tune only two parameters instead of the many hyperparameters usually associated to a reservoir, thus allowing the optimisation with little computational cost. More recently, the use of time delayed inputs was" 2401.14375v1,"The GraphTempo Framework for Exploring the Evolution of a Graph through Pattern Aggregation Evangelia Tsoukanara Department of Applied Informatics, University of Macedonia, Greece etsoukanara@uom.edu.gr Evaggelia Pitoura Department of Computer Science & Engineering, University of Ioannina, Greece pitoura@cse.uoi.gr Abstract When the focus is on the relationships or interactions between entities, graphs offer an intuitive model for many real-world data. Such graphs are usually large and change over time, thus, requiring models and strategies that explore their evolution. We study the evolution of aggregated graphs and introduce the GraphTempo model that allows temporal and attribute aggregation not only on node level by grouping individual nodes, but on a pattern level as well, where subgraphs are grouped together. Furthermore, We propose an efficient strategy for exploring the evolution of the graph based on identifying time intervals of significant growth, shrinkage or stability. Finally, we evaluate the efficiency and effectiveness of the proposed approach using three real graphs. 1 Introduction Graphs provide an intuitive model for representing relationships and interactions between entities. Their use expands a variety of domains ranging from social and contact networks to road and biological networks. Most such graphs are usually large and dynamic, thus requiring efficient models to capture their evolution Georgia Koloniari Department of Applied Informatics, University of Macedonia, Greece gkoloniari@uom.edu.gr Peter Triantafillou Department of Computer Science, University of Warwick, Coventry, UK pitoura@cse.uoi.gr and identify trends or events of interest. Instead of studying the evolution of individual graph nodes, we consider aggregate graphs that offer a summarized view of the network and allow us to study evolution at a global level. There has been a lot of work on aggregation of static graphs e.g., [28, 4], and more recently on dynamic graphs, where problems such as alternative temporal graph models [11], [18], [1], temporal paths evaluation [5], graph analytics [14] and visualization [22] have been addressed. In this paper, we focus on aggregate graph evolution and propose novel strategies for detecting periods of significant stability, growth or shrinkage. We consider temporal attributed graphs where nodes have properties whose values may or not change with time, and introduce the GraphTempo model for aggregating such graphs and exploring their evolution. Our model supports three types of aggregation: temporal aggregation that enables us to study a graph at different levels of temporal resolution, attribute aggregation that groups nodes that share common attribute values and, pattern aggregation that extends attribute aggregation by grouping together subgraphs. To motivate our work, consider a contact network modeling the interactions of students and teachers to study the spread of an infectious disease [10]. As stu-" 2401.14382v1,"An Orthogonal Polynomial Kernel-Based Machine Learning Model for Differential-Algebraic Equations Tayebeh Taheri ∗1 , Alireza Afzal Aghaei ∗1 , and Kourosh Parand †1,2,3 1 Department of Computer and Data Sciences, Faculty of Mathematical Sciences, Shahid Beheshti University, G.C. Tehran, Iran 2 Department of Cognitive Modeling, Institute for Cognitive and Brain Sciences, Shahid Beheshti University, G.C. Tehran, Iran 3 Department of Statistics and Actuarial Science, University of Waterloo, Waterloo, Canada January 26, 2024 Abstract The recent introduction of the Least-Squares Support Vector Regression (LS-SVR) algorithm for solving differential and integral equations has sparked interest. In this study, we expand the application of this algorithm to address systems of differential-algebraic equations (DAEs). Our work presents a novel approach to solving general DAEs in an operator format by establishing connections between the LS-SVR machine learning model, weighted residual methods, and Legendre orthogonal polynomials. To assess the effectiveness of our proposed method, we conduct simulations involving various DAE scenarios, such as nonlinear systems, fractional-order derivatives, integro-differential, and partial DAEs. Finally, we carry out comparisons between our proposed method and currently established state-of-the-art approaches, demonstrating its reliability and effectiveness. Keywords— Least-squares support vector regression, Differential-algebraic equations, Fractional derivative, Machine learning methods, Weighted residual methods 1 Introduction A system of differential-algebraic equations (DAEs) is a combination of differential equations and algebraic equations, in which the differential equations are related to the dynamical evolution of the system, and the algebraic equations are responsible for constraining the solutions that satisfy the differential and algebraic equations. DAEs serve as essential models for a wide array of physical phenomena. They find applications across various domains such as mechanical systems, electrical circuit simulations, chemical process modeling, dynamic system control, biological simulations, and control systems. Consequently, solving these intricate differential equations has remained a significant challenge for researchers. To address this, a range of techniques including numerical, analytical, and semi-analytical methods have been employed to tackle the complexities inherent in solving DAEs. Examples of these techniques include Adomian Decomposition Method (ADM) [7], Pade series [6], Runge-Kutta [4], variational iteration [18], homotopy perturbation [19], power series method [3], homotopy analysis method [23], spectral methods [2], and so on. Table 1 presents a comparison of properties among spectral, deep learning, and LS-SVR methods. ∗ Email: {ttaherii1401, alirezaafzalaghaei}@gmail.com † Email: k parand@sbu.ac.ir, Corresponding author 1" 2401.14383v1,"A Sum-of-Squares Hierarchy in the Absence of Pointwise Proofs I: Energy Certificates * Juspreet Singh Sandhu † Jonathan Shi ‡ January 26, 2024 Abstract We devise a parameterized family of distributions—the high-entropy step (HES) distributions—which are expressive enough to capture near-optima of spherical spin glass models (i.e. random polynomials over the sphere) in the so-called full Replica Symmetry Breaking (fRSB) regime, yet are well-behaved enough that there exist low-degree Sum-of- Squares (SoS) certificates that no HES distribution can achieve value even slightly larger than the true optimum. As a consequence, we obtain a SoS optimization program and rounding scheme that attains near-optimal solutions of the spherical spin glass in the fRSB regime. Outside of the fRSB regime, the same results occur at the ALG threshold [HS22]—a conjectured best value attainable by any polynomial-time algorithm [HS22, JMSS23]—instead of the true optimum. To express this algorithm, we formulate SoS programs that optimize over families of distributions of possible solutions, rather than optimizing directly over the possible solutions themselves. This adds low-degree information previously missing from the SoS framework, in the form of moments of replicas. These programs circumvent the oft-cited impossibility of providing a low-degree SoS proof of concentration of measure [BS16, Lec. 1.2, Marley Paradigm] by instead proving the same bounds only in expectation on solution distributions that are capable of being produced by the chosen rounding algorithm. The result is a new hierarchy of semidefinite programs, and as this new hierarchy does not make any specific reference to the spherical spin glass problem, we conjecture that it can be applied to a broad range of average-case problems to obtain value that is optimal among polynomial-time algorithms—even without knowing which average-case ensemble the problem instance came from. We give evidence for this conjecture with examples of ensembles that provably fool local iterative algorithms (such as direct Hessian ascent [Sub21]) but for which there is either proof or evidence that the SoS program does better. This opens the door to addressing a question posed by Barak [Bar14, Chapter 9, Pg. 105] about the possible optimality of SoS on average-case optimization problems, and by Schramm [Sch, Sch20] about reductions between different families of algorithms on large ensembles of average-case problems. In this paper, we give low-degree SoS proofs certifying key properties about HES distributions as well as the ALG threshold for spherical spin glasses. The rounding algorithm is introduced and analyzed in a companion paper [SS24]. * This project has received funding from the European Research Council (ERC) award No. 834861 (“SO-ReCoDi”). † School of Engineering & Applied Sciences, Harvard University, Cambridge, Massachusetts, USA. Supported by a Simons Investigator Fellowship, NSF grant DMS-2134157, NSF STAQ award PHY-1818914, DARPA grant W911NF2010021, DARPA ONISQ program award HR001120C0068 and DOE grant DE-SC0022199. Email: jus065@g.harvard.edu. ‡ Halıcıoğlu Data Science Institute, University of California San Diego, USA. Supported by NSF TRIPODS. Email: joshi@ucsd.edu."