ID
int64 1
21k
| TITLE
stringlengths 7
239
| ABSTRACT
stringlengths 7
2.76k
| Computer Science
int64 0
1
| Physics
int64 0
1
| Mathematics
int64 0
1
| Statistics
int64 0
1
| Quantitative Biology
int64 0
1
| Quantitative Finance
int64 0
1
|
---|---|---|---|---|---|---|---|---|
16,901 | Exploring cosmic origins with CORE: mitigation of systematic effects | We present an analysis of the main systematic effects that could impact the
measurement of CMB polarization with the proposed CORE space mission. We employ
timeline-to-map simulations to verify that the CORE instrumental set-up and
scanning strategy allow us to measure sky polarization to a level of accuracy
adequate to the mission science goals. We also show how the CORE observations
can be processed to mitigate the level of contamination by potentially worrying
systematics, including intensity-to-polarization leakage due to bandpass
mismatch, asymmetric main beams, pointing errors and correlated noise. We use
analysis techniques that are well validated on data from current missions such
as Planck to demonstrate how the residual contamination of the measurements by
these effects can be brought to a level low enough not to hamper the scientific
capability of the mission, nor significantly increase the overall error budget.
We also present a prototype of the CORE photometric calibration pipeline, based
on that used for Planck, and discuss its robustness to systematics, showing how
CORE can achieve its calibration requirements. While a fine-grained assessment
of the impact of systematics requires a level of knowledge of the system that
can only be achieved in a future study phase, the analysis presented here
strongly suggests that the main areas of concern for the CORE mission can be
addressed using existing knowledge, techniques and algorithms.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,902 | A non-ordinary peridynamics implementation for anisotropic materials | Peridynamics (PD) represents a new approach for modelling fracture mechanics,
where a continuum domain is modelled through particles connected via physical
bonds. This formulation allows us to model crack initiation, propagation,
branching and coalescence without special assumptions. Up to date, anisotropic
materials were modelled in the PD framework as different isotropic materials
(for instance, fibre and matrix of a composite laminate), where the stiffness
of the bond depends on its orientation. A non-ordinary state-based formulation
will enable the modelling of generally anisotropic materials, where the
material properties are directly embedded in the formulation. Other material
models include rocks, concrete and biomaterials such as bones. In this paper,
we implemented this model and validated it for anisotropic composite materials.
A composite damage criterion has been employed to model the crack propagation
behaviour. Several numerical examples have been used to validate the approach,
and compared to other benchmark solution from the finite element method (FEM)
and experimental results when available.
| 1 | 1 | 0 | 0 | 0 | 0 |
16,903 | Discrete-attractor-like Tracking in Continuous Attractor Neural Networks | Continuous attractor neural networks generate a set of smoothly connected
attractor states. In memory systems of the brain, these attractor states may
represent continuous pieces of information such as spatial locations and head
directions of animals. However, during the replay of previous experiences,
hippocampal neurons show a discontinuous sequence in which discrete transitions
of neural state are phase-locked with the slow-gamma (30-40 Hz) oscillation.
Here, we explored the underlying mechanisms of the discontinuous sequence
generation. We found that a continuous attractor neural network has several
phases depending on the interactions between external input and local
inhibitory feedback. The discrete-attractor-like behavior naturally emerges in
one of these phases without any discreteness assumption. We propose that the
dynamics of continuous attractor neural networks is the key to generate
discontinuous state changes phase-locked to the brain rhythm.
| 0 | 0 | 0 | 0 | 1 | 0 |
16,904 | Framework for an Innovative Perceptive Mobile Network Using Joint Communication and Sensing | In this paper, we develop a framework for an innovative perceptive mobile
(i.e. cellular) network that integrates sensing with communication, and
supports new applications widely in transportation, surveillance and
environmental sensing. Three types of sensing methods implemented in the
base-stations are proposed, using either uplink or downlink multiuser
communication signals. The required changes to system hardware and major
technical challenges are briefly discussed. We also demonstrate the feasibility
of estimating sensing parameters via developing a compressive sensing based
scheme and providing simulation results to validate its effectiveness.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,905 | On the smallest non-abelian quotient of $\mathrm{Aut}(F_n)$ | We show that the smallest non-abelian quotient of $\mathrm{Aut}(F_n)$ is
$\mathrm{PSL}_n(\mathbb{Z}/2\mathbb{Z}) = \mathrm{L}_n(2)$, thus confirming a
conjecture of Mecchia--Zimmermann. In the course of the proof we give an
exponential (in $n$) lower bound for the cardinality of a set on which
$\mathrm{SAut}(F_n)$, the unique index $2$ subgroup of $\mathrm{Aut}(F_n)$, can
act non-trivially. We also offer new results on the representation theory of
$\mathrm{SAut(F_n)}$ in small dimensions over small, positive characteristics,
and on rigidity of maps from $\mathrm{SAut}(F_n)$ to finite groups of Lie type
and algebraic groups in characteristic $2$.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,906 | Property Testing in High Dimensional Ising models | This paper explores the information-theoretic limitations of graph property
testing in zero-field Ising models. Instead of learning the entire graph
structure, sometimes testing a basic graph property such as connectivity, cycle
presence or maximum clique size is a more relevant and attainable objective.
Since property testing is more fundamental than graph recovery, any necessary
conditions for property testing imply corresponding conditions for graph
recovery, while custom property tests can be statistically and/or
computationally more efficient than graph recovery based algorithms.
Understanding the statistical complexity of property testing requires the
distinction of ferromagnetic (i.e., positive interactions only) and general
Ising models. Using combinatorial constructs such as graph packing and strong
monotonicity, we characterize how target properties affect the corresponding
minimax upper and lower bounds within the realm of ferromagnets. On the other
hand, by studying the detection of an antiferromagnetic (i.e., negative
interactions only) Curie-Weiss model buried in Rademacher noise, we show that
property testing is strictly more challenging over general Ising models. In
terms of methodological development, we propose two types of correlation based
tests: computationally efficient screening for ferromagnets, and score type
tests for general models, including a fast cycle presence test. Our correlation
screening tests match the information-theoretic bounds for property testing in
ferromagnets.
| 0 | 0 | 1 | 1 | 0 | 0 |
16,907 | Stratification and duality for homotopical groups | In this paper, we show that the category of module spectra over
$C^*(B\mathcal{G},\mathbb{F}_p)$ is stratified for any $p$-local compact group
$\mathcal{G}$, thereby giving a support-theoretic classification of all
localizing subcategories of this category. To this end, we generalize Quillen's
$F$-isomorphism theorem, Quillen's stratification theorem, Chouinard's theorem,
and the finite generation of cohomology rings from finite groups to homotopical
groups. Moreover, we show that $p$-compact groups admit a homotopical form of
Gorenstein duality.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,908 | Efficiently and easily integrating differential equations with JiTCODE, JiTCDDE, and JiTCSDE | We present a family of Python modules for the numerical integration of
ordinary, delay, or stochastic differential equations. The key features are
that the user enters the derivative symbolically and it is
just-in-time-compiled, allowing the user to efficiently integrate differential
equations from a higher-level interpreted language. The presented modules are
particularly suited for large systems of differential equations such as used to
describe dynamics on complex networks. Through the selected method of input,
the presented modules also allow to almost completely automatize the process of
estimating regular as well as transversal Lyapunov exponents for ordinary and
delay differential equations. We conceptually discuss the modules' design,
analyze their performance, and demonstrate their capabilities by application to
timely problems.
| 1 | 1 | 0 | 0 | 0 | 0 |
16,909 | Adaptive Diffusions for Scalable Learning over Graphs | Diffusion-based classifiers such as those relying on the Personalized
PageRank and the Heat kernel, enjoy remarkable classification accuracy at
modest computational requirements. Their performance however is affected by the
extent to which the chosen diffusion captures a typically unknown label
propagation mechanism, that can be specific to the underlying graph, and
potentially different for each class. The present work introduces a
disciplined, data-efficient approach to learning class-specific diffusion
functions adapted to the underlying network topology. The novel learning
approach leverages the notion of "landing probabilities" of class-specific
random walks, which can be computed efficiently, thereby ensuring scalability
to large graphs. This is supported by rigorous analysis of the properties of
the model as well as the proposed algorithms. Furthermore, a robust version of
the classifier facilitates learning even in noisy environments.
Classification tests on real networks demonstrate that adapting the diffusion
function to the given graph and observed labels, significantly improves the
performance over fixed diffusions; reaching -- and many times surpassing -- the
classification accuracy of computationally heavier state-of-the-art competing
methods, that rely on node embeddings and deep neural networks.
| 0 | 0 | 0 | 1 | 0 | 0 |
16,910 | On the Discrimination Power and Effective Utilization of Active Learning Measures in Version Space Search | Active Learning (AL) methods have proven cost-saving against passive
supervised methods in many application domains. An active learner, aiming to
find some target hypothesis, formulates sequential queries to some oracle. The
set of hypotheses consistent with the already answered queries is called
version space. Several query selection measures (QSMs) for determining the best
query to ask next have been proposed. Assuming binaryoutcome queries, we
analyze various QSMs wrt. to the discrimination power of their selected queries
within the current version space. As a result, we derive superiority and
equivalence relations between these QSMs and introduce improved versions of
existing QSMs to overcome identified issues. The obtained picture gives a hint
about which QSMs should preferably be used in pool-based AL scenarios.
Moreover, we deduce properties optimal queries wrt. QSMs must satisfy. Based on
these, we demonstrate how efficient heuristic search methods for optimal
queries in query synthesis AL scenarios can be devised.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,911 | Torchbearer: A Model Fitting Library for PyTorch | We introduce torchbearer, a model fitting library for pytorch aimed at
researchers working on deep learning or differentiable programming. The
torchbearer library provides a high level metric and callback API that can be
used for a wide range of applications. We also include a series of built in
callbacks that can be used for: model persistence, learning rate decay,
logging, data visualization and more. The extensive documentation includes an
example library for deep learning and dynamic programming problems and can be
found at this http URL. The code is licensed under the MIT
License and available at this https URL.
| 0 | 0 | 0 | 1 | 0 | 0 |
16,912 | On estimation of contamination from hydrogen cyanide in carbon monoxide line intensity mapping | Line-intensity mapping surveys probe large-scale structure through spatial
variations in molecular line emission from a population of unresolved
cosmological sources. Future such surveys of carbon monoxide line emission,
specifically the CO(1-0) line, face potential contamination from a disjoint
population of sources emitting in a hydrogen cyanide emission line, HCN(1-0).
This paper explores the potential range of the strength of HCN emission and its
effect on the CO auto power spectrum, using simulations with an empirical model
of the CO/HCN--halo connection. We find that effects on the observed CO power
spectrum depend on modeling assumptions but are very small for our fiducial
model based on our understanding of the galaxy--halo connection, with the bias
in overall CO detection significance due to HCN expected to be less than 1%.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,913 | Training Well-Generalizing Classifiers for Fairness Metrics and Other Data-Dependent Constraints | Classifiers can be trained with data-dependent constraints to satisfy
fairness goals, reduce churn, achieve a targeted false positive rate, or other
policy goals. We study the generalization performance for such constrained
optimization problems, in terms of how well the constraints are satisfied at
evaluation time, given that they are satisfied at training time. To improve
generalization performance, we frame the problem as a two-player game where one
player optimizes the model parameters on a training dataset, and the other
player enforces the constraints on an independent validation dataset. We build
on recent work in two-player constrained optimization to show that if one uses
this two-dataset approach, then constraint generalization can be significantly
improved. As we illustrate experimentally, this approach works not only in
theory, but also in practice.
| 0 | 0 | 0 | 1 | 0 | 0 |
16,914 | Automated Website Fingerprinting through Deep Learning | Several studies have shown that the network traffic that is generated by a
visit to a website over Tor reveals information specific to the website through
the timing and sizes of network packets. By capturing traffic traces between
users and their Tor entry guard, a network eavesdropper can leverage this
meta-data to reveal which website Tor users are visiting. The success of such
attacks heavily depends on the particular set of traffic features that are used
to construct the fingerprint. Typically, these features are manually engineered
and, as such, any change introduced to the Tor network can render these
carefully constructed features ineffective. In this paper, we show that an
adversary can automate the feature engineering process, and thus automatically
deanonymize Tor traffic by applying our novel method based on deep learning. We
collect a dataset comprised of more than three million network traces, which is
the largest dataset of web traffic ever used for website fingerprinting, and
find that the performance achieved by our deep learning approaches is
comparable to known methods which include various research efforts spanning
over multiple years. The obtained success rate exceeds 96% for a closed world
of 100 websites and 94% for our biggest closed world of 900 classes. In our
open world evaluation, the most performant deep learning model is 2% more
accurate than the state-of-the-art attack. Furthermore, we show that the
implicit features automatically learned by our approach are far more resilient
to dynamic changes of web content over time. We conclude that the ability to
automatically construct the most relevant traffic features and perform accurate
traffic recognition makes our deep learning based approach an efficient,
flexible and robust technique for website fingerprinting.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,915 | DataCite as a novel bibliometric source: Coverage, strengths and limitations | This paper explores the characteristics of DataCite to determine its
possibilities and potential as a new bibliometric data source to analyze the
scholarly production of open data. Open science and the increasing data sharing
requirements from governments, funding bodies, institutions and scientific
journals has led to a pressing demand for the development of data metrics. As a
very first step towards reliable data metrics, we need to better comprehend the
limitations and caveats of the information provided by sources of open data. In
this paper, we critically examine records downloaded from the DataCite's OAI
API and elaborate a series of recommendations regarding the use of this source
for bibliometric analyses of open data. We highlight issues related to metadata
incompleteness, lack of standardization, and ambiguous definitions of several
fields. Despite these limitations, we emphasize DataCite's value and potential
to become one of the main sources for data metrics development.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,916 | Parameter Estimation of Complex Fractional Ornstein-Uhlenbeck Processes with Fractional Noise | We obtain strong consistency and asymptotic normality of a least squares
estimator of the drift coefficient for complex-valued Ornstein-Uhlenbeck
processes disturbed by fractional noise, extending the result of Y. Hu and D.
Nualart, [Statist. Probab. Lett., 80 (2010), 1030-1038] to a special
2-dimensions. The strategy is to exploit the Garsia-Rodemich-Rumsey inequality
and complex fourth moment theorems. The main ingredients of this paper are the
sample path regularity of a multiple Wiener-Ito integral and two equivalent
conditions of complex fourth moment theorems in terms of the contractions of
integral kernels and complex Malliavin derivatives.
| 0 | 0 | 1 | 1 | 0 | 0 |
16,917 | E-learning Information Technology Based on an Ontology Driven Learning Engine | In the article, proposed is a new e-learning information technology based on
an ontology driven learning engine, which is matched with modern pedagogical
technologies. With the help of proposed engine and developed question database
we have conducted an experiment, where students were tested. The developed
ontology driven system of e-learning facilitates the creation of favorable
conditions for the development of personal qualities and creation of a holistic
understanding of the subject area among students throughout the educational
process.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,918 | Global regularity for 1D Eulerian dynamics with singular interaction forces | The Euler-Poisson-Alignment (EPA) system appears in mathematical biology and
is used to model, in a hydrodynamic limit, a set agents interacting through
mutual attraction/repulsion as well as alignment forces. We consider
one-dimensional EPA system with a class of singular alignment terms as well as
natural attraction/repulsion terms. The singularity of the alignment kernel
produces an interesting effect regularizing the solutions of the equation and
leading to global regularity for wide range of initial data. This was recently
observed in the paper by Do, Kiselev, Ryzhik and Tan. Our goal in this paper is
to generalize the result and to incorporate the attractive/repulsive potential.
We prove that global regularity persists for these more general models.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,919 | A $q$-generalization of the para-Racah polynomials | New bispectral orthogonal polynomials are obtained from an unconventional
truncation of the Askey-Wilson polynomials. In the limit $q \to 1$, they reduce
to the para-Racah polynomials which are orthogonal with respect to a quadratic
bi-lattice. The three term recurrence relation and q-difference equation are
obtained through limits of those of the Askey-Wilson polynomials. An explicit
expression in terms of hypergeometric series and the orthogonality relation are
provided. A $q$-generalization of the para-Krawtchouk polynomials is obtained
as a special case. Connections with the $q$-Racah and dual-Hahn polynomials are
also presented.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,920 | Data Poisoning Attack against Unsupervised Node Embedding Methods | Unsupervised node embedding methods (e.g., DeepWalk, LINE, and node2vec) have
attracted growing interests given their simplicity and effectiveness. However,
although these methods have been proved effective in a variety of applications,
none of the existing work has analyzed the robustness of them. This could be
very risky if these methods are attacked by an adversarial party. In this
paper, we take the task of link prediction as an example, which is one of the
most fundamental problems for graph analysis, and introduce a data positioning
attack to node embedding methods. We give a complete characterization of
attacker's utilities and present efficient solutions to adversarial attacks for
two popular node embedding methods: DeepWalk and LINE. We evaluate our proposed
attack model on multiple real-world graphs. Experimental results show that our
proposed model can significantly affect the results of link prediction by
slightly changing the graph structures (e.g., adding or removing a few edges).
We also show that our proposed model is very general and can be transferable
across different embedding methods. Finally, we conduct a case study on a
coauthor network to better understand our attack method.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,921 | Entanglement properties of the two-dimensional SU(3) AKLT state | Two-dimensional (spin-$2$) Affleck-Kennedy-Lieb-Tasaki (AKLT) type valence
bond solids on the square lattice are known to be symmetry protected
topological (SPT) gapped spin liquids [Shintaro Takayoshi, Pierre Pujol, and
Akihiro Tanaka Phys. Rev. B ${\bf 94}$, 235159 (2016)]. Using the projected
entangled pair state (PEPS) framework, we extend the construction of the AKLT
state to the case of $SU(3)$, relevant for cold atom systems. The entanglement
spectrum is shown to be described by an alternating $SU(3)$ chain of "quarks"
and "antiquarks", subject to exponentially decaying (with distance) Heisenberg
interactions, in close similarity with its $SU(2)$ analog. We discuss the SPT
feature of the state.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,922 | Heart Rate Variability during Periods of Low Blood Pressure as a Predictor of Short-Term Outcome in Preterms | Efficient management of low blood pressure (BP) in preterm neonates remains
challenging with a considerable variability in clinical practice. The ability
to assess preterm wellbeing during episodes of low BP will help to decide when
and whether hypotension treatment should be initiated. This work aims to
investigate the relationship between heart rate variability (HRV), BP and the
short-term neurological outcome in preterm infants less than 32 weeks
gestational age (GA). The predictive power of common HRV features with respect
to the outcome is assessed and shown to improve when HRV is observed during
episodes of low mean arterial pressure (MAP) - with a single best feature
leading to an AUC of 0.87. Combining multiple features with a boosted decision
tree classifier achieves an AUC of 0.97. The work presents a promising step
towards the use of multimodal data in building an objective decision support
tool for clinical prediction of short-term outcome in preterms who suffer
episodes of low BP.
| 0 | 0 | 0 | 1 | 0 | 0 |
16,923 | Understanding News Outlets' Audience-Targeting Patterns | The power of the press to shape the informational landscape of a population
is unparalleled, even now in the era of democratic access to all information
outlets. However, it is known that news outlets (particularly more traditional
ones) tend to discriminate who they want to reach, and who to leave aside. In
this work, we attempt to shed some light on the audience targeting patterns of
newspapers, using the Chilean media ecosystem. First, we use the gravity model
to analyze geography as a factor in explaining audience reachability. This
shows that some newspapers are indeed driven by geographical factors (mostly
local news outlets) but some others are not (national-distribution outlets).
For those which are not, we use a regression model to study the influence of
socioeconomic and political characteristics in news outlets adoption. We
conclude that indeed larger, national-distribution news outlets target
populations based on these factors, rather than on geography or immediacy.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,924 | Deriving a Representative Vector for Ontology Classes with Instance Word Vector Embeddings | Selecting a representative vector for a set of vectors is a very common
requirement in many algorithmic tasks. Traditionally, the mean or median vector
is selected. Ontology classes are sets of homogeneous instance objects that can
be converted to a vector space by word vector embeddings. This study proposes a
methodology to derive a representative vector for ontology classes whose
instances were converted to the vector space. We start by deriving five
candidate vectors which are then used to train a machine learning model that
would calculate a representative vector for the class. We show that our
methodology out-performs the traditional mean and median vector
representations.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,925 | The ESA Gaia Archive: Data Release 1 | ESA Gaia mission is producing the more accurate source catalogue in astronomy
up to now. That represents a challenge on the archiving area to make accessible
this information to the astronomers in an efficient way. Also, new astronomical
missions have reinforced the change on the development of archives. Archives,
as simple applications to access the data are being evolving into complex data
center structures where computing power services are available for users and
data mining tools are integrated into the server side. In the case of astronomy
science that involves the use of big catalogues, as in Gaia (or Euclid to
come), the common ways to work on the data need to be changed to a new paradigm
"move code close to the data", what implies that data mining functionalities
are becoming a must to allow the science exploitation. To enable these
capabilities, a TAP+ interface, crossmatch capabilities, full catalogue
histograms, serialisation of intermediate results in cloud resources like
VOSpace, etc have been implemented for the Gaia DR1, to enable the exploitation
of these science resources by the community without the bottlenecks on the
connection bandwidth. We present the architecture, infrastructure and tools
already available in the Gaia Archive Data Release 1
(this http URL) and we describe capabilities and
infrastructure.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,926 | Efficient algorithm for large spectral partitions | We present an amelioration of current known algorithms for optimal spectral
partitioning problems. The idea is to use the advantage of a representation
using density functions while decreasing the computational time. This is done
by restricting the computation to neighbourhoods of regions where the
associated densities are above a certain threshold. The algorithm extends and
improves known methods in the plane and on surfaces in dimension 3. It also
makes possible to make some of the first computations of volumic 3D spectral
partitions on sufficiently large discretizations.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,927 | A Martian Origin for the Mars Trojan Asteroids | Seven of the nine known Mars Trojan asteroids belong to an orbital cluster
named after its largest member 5261 Eureka. Eureka is likely the progenitor of
the whole cluster, which formed at least 1 Gyr ago. It was suggested that the
thermal YORP effect spun-up Eureka resulting with fragments being ejected by
the rotational-fission mechanism. Eureka's spectrum exhibits a broad and deep
absorption band around 1 {\mu}m, indicating an olivine-rich composition. Here
we show evidence that the Trojan Eureka cluster progenitor could have
originated as impact debris excavated from the Martian mantle. We present new
near-infrared observations of two Trojans (311999 2007 NS2 and 385250 2001
DH47) and find that both exhibit an olivine-rich reflectance spectrum similar
to Eureka's. These measurements confirm that the progenitor of the cluster has
an achondritic composition. Olivine-rich reflectance spectra are rare amongst
asteroids but are seen around the largest basins on Mars. They are also
consistent with some Martian meteorites (e.g. Chassigny), and with the material
comprising much of the Martian mantle. Using numerical simulations, we show
that the Mars Trojans are more likely to be impact ejecta from Mars than
captured olivine-rich asteroids transported from the main belt. This result
links directly specific asteroids to debris from the forming planets.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,928 | Far-infrared metallicity diagnostics: Application to local ultraluminous infrared galaxies | The abundance of metals in galaxies is a key parameter which permits to
distinguish between different galaxy formation and evolution models. Most of
the metallicity determinations are based on optical line ratios. However, the
optical spectral range is subject to dust extinction and, for high-z objects (z
> 3), some of the lines used in optical metallicity diagnostics are shifted to
wavelengths not accessible to ground based observatories. For this reason, we
explore metallicity diagnostics using far-infrared (IR) line ratios which can
provide a suitable alternative in such situations. To investigate these far-IR
line ratios, we modeled the emission of a starburst with the photoionization
code CLOUDY. The most sensitive far-IR ratios to measure metallicities are the
[OIII]52$\mu$m and 88$\mu$m to [NIII]57$\mu$m ratios. We show that this ratio
produces robust metallicities in the presence of an AGN and is insensitive to
changes in the age of the ionizing stellar. Another metallicity sensitive ratio
is the [OIII]88$\mu$m/[NII]122$\mu$m ratio, although it depends on the
ionization parameter. We propose various mid- and far-IR line ratios to break
this dependency. Finally, we apply these far-IR diagnostics to a sample of 19
local ultraluminous IR galaxies (ULIRGs) observed with Herschel and Spitzer. We
find that the gas-phase metallicity in these local ULIRGs is in the range 0.7 <
Z_gas/Z_sun < 1.5, which corresponds to 8.5 < 12 + log (O/H) < 8.9. The
inferred metallicities agree well with previous estimates for local ULIRGs and
this confirms that they lie below the local mass-metallicity relation.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,929 | Quantum communication by means of collapse of the wave function | We show that quantum communication by means of collapse of the wave function
is possible. In this study, quantum communication does not mean quantum
teleportation or quantum cryptography, but transmission of information itself.
Because of consistency with special relativity, the possibility of the quantum
communication leads to another conclusion that the collapse of the wave
function must propagate at the speed of light or slower.
We show this requirement is consistent with nonlocality in quantum mechanics.
We also demonstrate that the Einstein-Podolsky-Rosen experiment does not
disprove our conclusion.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,930 | DeepTerramechanics: Terrain Classification and Slip Estimation for Ground Robots via Deep Learning | Terramechanics plays a critical role in the areas of ground vehicles and
ground mobile robots since understanding and estimating the variables
influencing the vehicle-terrain interaction may mean the success or the failure
of an entire mission. This research applies state-of-the-art algorithms in deep
learning to two key problems: estimating wheel slip and classifying the terrain
being traversed by a ground robot. Three data sets collected by ground robotic
platforms (MIT single-wheel testbed, MSL Curiosity rover, and tracked robot
Fitorobot) are employed in order to compare the performance of traditional
machine learning methods (i.e. Support Vector Machine (SVM) and Multi-layer
Perceptron (MLP)) against Deep Neural Networks (DNNs) and Convolutional Neural
Networks (CNNs). This work also shows the impact that certain tuning parameters
and the network architecture (MLP, DNN and CNN) play on the performance of
those methods. This paper also contributes a deep discussion with the lessons
learned in the implementation of DNNs and CNNs and how these methods can be
extended to solve other problems.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,931 | Characterizations of multinormality and corresponding tests of fit, including for Garch models | We provide novel characterizations of multivariate normality that incorporate
both the characteristic function and the moment generating function, and we
employ these results to construct a class of affine invariant, consistent and
easy-to-use goodness-of-fit tests for normality. The test statistics are
suitably weighted $L^2$-statistics, and we provide their asymptotic behavior
both for i.i.d. observations as well as in the context of testing that the
innovation distribution of a multivariate GARCH model is Gaussian. We also
study the finite-sample behavior of the new tests and compare the new criteria
with alternative existing tests.
| 0 | 0 | 1 | 1 | 0 | 0 |
16,932 | Grouped Gaussian Processes for Solar Power Prediction | We consider multi-task regression models where the observations are assumed
to be a linear combination of several latent node functions and weight
functions, which are both drawn from Gaussian process priors. Driven by the
problem of developing scalable methods for forecasting distributed solar and
other renewable power generation, we propose coupled priors over groups of
(node or weight) processes to exploit spatial dependence between functions. We
estimate forecast models for solar power at multiple distributed sites and
ground wind speed at multiple proximate weather stations. Our results show that
our approach maintains or improves point-prediction accuracy relative to
competing solar benchmarks and improves over wind forecast benchmark models on
all measures. Our approach consistently dominates the equivalent model without
coupled priors, achieving faster gains in forecast accuracy. At the same time
our approach provides better quantification of predictive uncertainties.
| 0 | 0 | 0 | 1 | 0 | 0 |
16,933 | Modeling epidemics on d-cliqued graphs | Since social interactions have been shown to lead to symmetric clusters, we
propose here that symmetries play a key role in epidemic modeling. Mathematical
models on d-ary tree graphs were recently shown to be particularly effective
for modeling epidemics in simple networks [Seibold & Callender, 2016]. To
account for symmetric relations, we generalize this to a new type of networks
modeled on d-cliqued tree graphs, which are obtained by adding edges to regular
d-trees to form d-cliques. This setting gives a more realistic model for
epidemic outbreaks originating, for example, within a family or classroom and
which could reach a population by transmission via children in schools.
Specifically, we quantify how an infection starting in a clique (e.g. family)
can reach other cliques through the body of the graph (e.g. public places).
Moreover, we propose and study the notion of a safe zone, a subset that has a
negligible probability of infection.
| 1 | 0 | 0 | 0 | 1 | 0 |
16,934 | On the K-theory stable bases of the Springer resolution | Cohomological and K-theoretic stable bases originated from the study of
quantum cohomology and quantum K-theory. Restriction formula for cohomological
stable bases played an important role in computing the quantum connection of
cotangent bundle of partial flag varieties. In this paper we study the
K-theoretic stable bases of cotangent bundles of flag varieties. We describe
these bases in terms of the action of the affine Hecke algebra and the twisted
group algebra of Kostant-Kumar. Using this algebraic description and the method
of root polynomials, we give a restriction formula of the stable bases. We
apply it to obtain the restriction formula for partial flag varieties. We also
build a relation between the stable basis and the Casselman basis in the
principal series representations of the Langlands dual group. As an
application, we give a closed formula for the transition matrix between
Casselman basis and the characteristic functions.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,935 | Recency Bias in the Era of Big Data: The Need to Strengthen the Status of History of Mathematics in Nigerian Schools | The amount of information available to the mathematics teacher is so enormous
that the selection of desirable content is gradually becoming a huge task in
itself. With respect to the inclusion of elements of history of mathematics in
mathematics instruction, the era of Big Data introduces a high likelihood of
Recency Bias, a hitherto unconnected challenge for stakeholders in mathematics
education. This tendency to choose recent information at the expense of
relevant older, composite, historical facts stands to defeat the aims and
objectives of the epistemological and cultural approach to mathematics
instructional delivery. This study is a didactic discourse with focus on this
threat to the history and pedagogy of mathematics, particularly as it affects
mathematics education in Nigeria. The implications for mathematics curriculum
developers, teacher-training programmes, teacher lesson preparation, and
publication of mathematics instructional materials were also deeply considered.
| 1 | 0 | 1 | 0 | 0 | 0 |
16,936 | Convergence Analysis of Deterministic Kernel-Based Quadrature Rules in Misspecified Settings | This paper presents a convergence analysis of kernel-based quadrature rules
in misspecified settings, focusing on deterministic quadrature in Sobolev
spaces. In particular, we deal with misspecified settings where a test
integrand is less smooth than a Sobolev RKHS based on which a quadrature rule
is constructed. We provide convergence guarantees based on two different
assumptions on a quadrature rule: one on quadrature weights, and the other on
design points. More precisely, we show that convergence rates can be derived
(i) if the sum of absolute weights remains constant (or does not increase
quickly), or (ii) if the minimum distance between design points does not
decrease very quickly. As a consequence of the latter result, we derive a rate
of convergence for Bayesian quadrature in misspecified settings. We reveal a
condition on design points to make Bayesian quadrature robust to
misspecification, and show that, under this condition, it may adaptively
achieve the optimal rate of convergence in the Sobolev space of a lesser order
(i.e., of the unknown smoothness of a test integrand), under a slightly
stronger regularity condition on the integrand.
| 1 | 0 | 0 | 1 | 0 | 0 |
16,937 | The toric Frobenius morphism and a conjecture of Orlov | We combine the Bondal-Uehara method for producing exceptional collections on
toric varieties with a result of the first author and Favero to expand the set
of varieties satisfying Orlov's Conjecture on derived dimension.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,938 | Friendship Maintenance and Prediction in Multiple Social Networks | Due to the proliferation of online social networks (OSNs), users find
themselves participating in multiple OSNs. These users leave their activity
traces as they maintain friendships and interact with other users in these
OSNs. In this work, we analyze how users maintain friendship in multiple OSNs
by studying users who have accounts in both Twitter and Instagram.
Specifically, we study the similarity of a user's friendship and the evenness
of friendship distribution in multiple OSNs. Our study shows that most users in
Twitter and Instagram prefer to maintain different friendships in the two OSNs,
keeping only a small clique of common friends in across the OSNs. Based upon
our empirical study, we conduct link prediction experiments to predict missing
friendship links in multiple OSNs using the neighborhood features, neighborhood
friendship maintenance features and cross-link features. Our link prediction
experiments shows that un- supervised methods can yield good accuracy in
predicting links in one OSN using another OSN data and the link prediction
accuracy can be further improved using supervised method with friendship
maintenance and others measures as features.
| 1 | 1 | 0 | 0 | 0 | 0 |
16,939 | Learning to Generate Music with BachProp | As deep learning advances, algorithms of music composition increase in
performance. However, most of the successful models are designed for specific
musical structures. Here, we present BachProp, an algorithmic composer that can
generate music scores in many styles given sufficient training data. To adapt
BachProp to a broad range of musical styles, we propose a novel representation
of music and train a deep network to predict the note transition probabilities
of a given music corpus. In this paper, new music scores generated by BachProp
are compared with the original corpora as well as with different network
architectures and other related models. We show that BachProp captures
important features of the original datasets better than other models and invite
the reader to a qualitative comparison on a large collection of generated
songs.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,940 | How to Quantize $n$ Outputs of a Binary Symmetric Channel to $n-1$ Bits? | Suppose that $Y^n$ is obtained by observing a uniform Bernoulli random vector
$X^n$ through a binary symmetric channel with crossover probability $\alpha$.
The "most informative Boolean function" conjecture postulates that the maximal
mutual information between $Y^n$ and any Boolean function $\mathrm{b}(X^n)$ is
attained by a dictator function. In this paper, we consider the "complementary"
case in which the Boolean function is replaced by
$f:\left\{0,1\right\}^n\to\left\{0,1\right\}^{n-1}$, namely, an $n-1$ bit
quantizer, and show that $I(f(X^n);Y^n)\leq (n-1)\cdot\left(1-h(\alpha)\right)$
for any such $f$. Thus, in this case, the optimal function is of the form
$f(x^n)=(x_1,\ldots,x_{n-1})$.
| 1 | 0 | 1 | 0 | 0 | 0 |
16,941 | Semi-Supervised Deep Learning for Monocular Depth Map Prediction | Supervised deep learning often suffers from the lack of sufficient training
data. Specifically in the context of monocular depth map prediction, it is
barely possible to determine dense ground truth depth images in realistic
dynamic outdoor environments. When using LiDAR sensors, for instance, noise is
present in the distance measurements, the calibration between sensors cannot be
perfect, and the measurements are typically much sparser than the camera
images. In this paper, we propose a novel approach to depth map prediction from
monocular images that learns in a semi-supervised way. While we use sparse
ground-truth depth for supervised learning, we also enforce our deep network to
produce photoconsistent dense depth maps in a stereo setup using a direct image
alignment loss. In experiments we demonstrate superior performance in depth map
prediction from single images compared to the state-of-the-art methods.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,942 | Approximation Schemes for Clustering with Outliers | Clustering problems are well-studied in a variety of fields such as data
science, operations research, and computer science. Such problems include
variants of centre location problems, $k$-median, and $k$-means to name a few.
In some cases, not all data points need to be clustered; some may be discarded
for various reasons.
We study clustering problems with outliers. More specifically, we look at
Uncapacitated Facility Location (UFL), $k$-Median, and $k$-Means. In UFL with
outliers, we have to open some centres, discard up to $z$ points of $\cal X$
and assign every other point to the nearest open centre, minimizing the total
assignment cost plus centre opening costs. In $k$-Median and $k$-Means, we have
to open up to $k$ centres but there are no opening costs. In $k$-Means, the
cost of assigning $j$ to $i$ is $\delta^2(j,i)$. We present several results.
Our main focus is on cases where $\delta$ is a doubling metric or is the
shortest path metrics of graphs from a minor-closed family of graphs. For
uniform-cost UFL with outliers on such metrics we show that a multiswap simple
local search heuristic yields a PTAS. With a bit more work, we extend this to
bicriteria approximations for the $k$-Median and $k$-Means problems in the same
metrics where, for any constant $\epsilon > 0$, we can find a solution using
$(1+\epsilon)k$ centres whose cost is at most a $(1+\epsilon)$-factor of the
optimum and uses at most $z$ outliers. We also show that natural local search
heuristics that do not violate the number of clusters and outliers for
$k$-Median (or $k$-Means) will have unbounded gap even in Euclidean metrics.
Furthermore, we show how our analysis can be extended to general metrics for
$k$-Means with outliers to obtain a $(25+\epsilon,1+\epsilon)$ bicriteria.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,943 | Order preserving pattern matching on trees and DAGs | The order preserving pattern matching (OPPM) problem is, given a pattern
string $p$ and a text string $t$, find all substrings of $t$ which have the
same relative orders as $p$. In this paper, we consider two variants of the
OPPM problem where a set of text strings is given as a tree or a DAG. We show
that the OPPM problem for a single pattern $p$ of length $m$ and a text tree
$T$ of size $N$ can be solved in $O(m+N)$ time if the characters of $p$ are
drawn from an integer alphabet of polynomial size. The time complexity becomes
$O(m \log m + N)$ if the pattern $p$ is over a general ordered alphabet. We
then show that the OPPM problem for a single pattern and a text DAG is
NP-complete.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,944 | Categorical Probabilistic Theories | We present a simple categorical framework for the treatment of probabilistic
theories, with the aim of reconciling the fields of Categorical Quantum
Mechanics (CQM) and Operational Probabilistic Theories (OPTs). In recent years,
both CQM and OPTs have found successful application to a number of areas in
quantum foundations and information theory: they present many similarities,
both in spirit and in formalism, but they remain separated by a number of
subtle yet important differences. We attempt to bridge this gap, by adopting a
minimal number of operationally motivated axioms which provide clean
categorical foundations, in the style of CQM, for the treatment of the problems
that OPTs are concerned with.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,945 | Maximal polynomial modulations of singular integrals | Let $K$ be a standard Hölder continuous Calderón--Zygmund kernel on
$\mathbb{R}^{\mathbf{d}}$ whose truncations define $L^2$ bounded operators. We
show that the maximal operator obtained by modulating $K$ by polynomial phases
of a fixed degree is bounded on $L^p(\mathbb{R}^{\mathbf{d}})$ for $1 < p <
\infty$. This extends Sjölin's multidimensional Carleson theorem and Lie's
polynomial Carleson theorem.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,946 | Effects of Hubbard term correction on the structural parameters and electronic properties of wurtzite Zn | The effects of including the Hubbard on-site Coulombic correction to the
structural parameters and valence energy states of wurtzite ZnO was explored.
Due to the changes in the structural parameters caused by correction of
hybridization between Zn d states and O p states, suitable parameters of
Hubbard terms have to be determined for an accurate prediction of ZnO
properties. Using the LDA+${U}$ method by applying Hubbard corrections $U_p$ to
Zn 3d states and $U_p$ to O 2p states, the lattice constants were
underestimated for all tested Hubbard parameters. The combination of both $U_d$
and $U_p$ correction terms managed to widen the band gap of wurtzite ZnO to the
experimental value. Pairs of $U_p$ and $U_p$ parameters with the correct
positioning of d-band and accurate bandwidths were selected, in addition to
predicting an accurate band gap value. Inspection of vibrational properties,
however, revealed mismatches between the estimated gamma phonon frequencies and
experimental values. The selection of Hubbard terms based on electronic band
properties alone cannot ensure an accurate vibrational description in LDA+${U}$
calculation.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,947 | A multi-scale Gaussian beam parametrix for the wave equation: the Dirichlet boundary value problem | We present a construction of a multi-scale Gaussian beam parametrix for the
Dirichlet boundary value problem associated with the wave equation, and study
its convergence rate to the true solution in the highly oscillatory regime. The
construction elaborates on the wave-atom parametrix of Bao, Qian, Ying, and
Zhang and extends to a multi-scale setting the technique of Gaussian beam
propagation from a boundary of Katchalov, Kurylev and Lassas.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,948 | Uncertainty and sensitivity analysis of functional risk curves based on Gaussian processes | A functional risk curve gives the probability of an undesirable event as a
function of the value of a critical parameter of a considered physical system.
In several applicative situations, this curve is built using phenomenological
numerical models which simulate complex physical phenomena. To avoid cpu-time
expensive numerical models, we propose to use Gaussian process regression to
build functional risk curves. An algorithm is given to provide confidence
bounds due to this approximation. Two methods of global sensitivity analysis of
the models' random input parameters on the functional risk curve are also
studied. In particular, the PLI sensitivity indices allow to understand the
effect of misjudgment on the input parameters' probability density functions.
| 0 | 0 | 1 | 1 | 0 | 0 |
16,949 | Global optimization for low-dimensional switching linear regression and bounded-error estimation | The paper provides global optimization algorithms for two particularly
difficult nonconvex problems raised by hybrid system identification: switching
linear regression and bounded-error estimation. While most works focus on local
optimization heuristics without global optimality guarantees or with guarantees
valid only under restrictive conditions, the proposed approach always yields a
solution with a certificate of global optimality. This approach relies on a
branch-and-bound strategy for which we devise lower bounds that can be
efficiently computed. In order to obtain scalable algorithms with respect to
the number of data, we directly optimize the model parameters in a continuous
optimization setting without involving integer variables. Numerical experiments
show that the proposed algorithms offer a higher accuracy than convex
relaxations with a reasonable computational burden for hybrid system
identification. In addition, we discuss how bounded-error estimation is related
to robust estimation in the presence of outliers and exact recovery under
sparse noise, for which we also obtain promising numerical results.
| 1 | 0 | 0 | 1 | 0 | 0 |
16,950 | An Incremental Self-Organizing Architecture for Sensorimotor Learning and Prediction | During visuomotor tasks, robots must compensate for temporal delays inherent
in their sensorimotor processing systems. Delay compensation becomes crucial in
a dynamic environment where the visual input is constantly changing, e.g.,
during the interacting with a human demonstrator. For this purpose, the robot
must be equipped with a prediction mechanism for using the acquired perceptual
experience to estimate possible future motor commands. In this paper, we
present a novel neural network architecture that learns prototypical visuomotor
representations and provides reliable predictions on the basis of the visual
input. These predictions are used to compensate for the delayed motor behavior
in an online manner. We investigate the performance of our method with a set of
experiments comprising a humanoid robot that has to learn and generate visually
perceived arm motion trajectories. We evaluate the accuracy in terms of mean
prediction error and analyze the response of the network to novel movement
demonstrations. Additionally, we report experiments with incomplete data
sequences, showing the robustness of the proposed architecture in the case of a
noisy and faulty visual sensor.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,951 | A CutFEM method for two-phase flow problems | In this article, we present a cut finite element method for two-phase
Navier-Stokes flows. The main feature of the method is the formulation of a
unified continuous interior penalty stabilisation approach for, on the one
hand, stabilising advection and the pressure-velocity coupling and, on the
other hand, stabilising the cut region. The accuracy of the algorithm is
enhanced by the development of extended fictitious domains to guarantee a well
defined velocity from previous time steps in the current geometry. Finally, the
robustness of the moving-interface algorithm is further improved by the
introduction of a curvature smoothing technique that reduces spurious
velocities. The algorithm is shown to perform remarkably well for low capillary
number flows, and is a first step towards flexible and robust CutFEM algorithms
for the simulation of microfluidic devices.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,952 | Learning under selective labels in the presence of expert consistency | We explore the problem of learning under selective labels in the context of
algorithm-assisted decision making. Selective labels is a pervasive selection
bias problem that arises when historical decision making blinds us to the true
outcome for certain instances. Examples of this are common in many
applications, ranging from predicting recidivism using pre-trial release data
to diagnosing patients. In this paper we discuss why selective labels often
cannot be effectively tackled by standard methods for adjusting for sample
selection bias, even if there are no unobservables. We propose a data
augmentation approach that can be used to either leverage expert consistency to
mitigate the partial blindness that results from selective labels, or to
empirically validate whether learning under such framework may lead to
unreliable models prone to systemic discrimination.
| 0 | 0 | 0 | 1 | 0 | 0 |
16,953 | Opacity limit for supermassive protostars | We present a model for the evolution of supermassive protostars from their
formation at $M_\star \simeq 0.1\,\text{M}_\odot$ until their growth to
$M_\star \simeq 10^5\,\text{M}_\odot$. To calculate the initial properties of
the object in the optically thick regime we follow two approaches: based on
idealized thermodynamic considerations, and on a more detailed one-zone model.
Both methods derive a similar value of $n_{\rm F} \simeq 2 \times 10^{17}
\,\text{cm}^{-3}$ for the density of the object when opacity becomes important,
i.e. the opacity limit. The subsequent evolution of the growing protostar is
determined by the accretion of gas onto the object and can be described by a
mass-radius relation of the form $R_\star \propto M_\star^{1/3}$ during the
early stages, and of the form $R_\star \propto M_\star^{1/2}$ when internal
luminosity becomes important. For the case of a supermassive protostar, this
implies that the radius of the star grows from $R_\star \simeq 0.65 \,{\rm AU}$
to $R_\star \simeq 250 \,{\rm AU}$ during its evolution. Finally, we use this
model to construct a sub-grid recipe for accreting sink particles in numerical
simulations. A prime ingredient thereof is a physically motivated prescription
for the accretion radius and the effective temperature of the growing protostar
embedded inside it. From the latter, we can conclude that photo-ionization
feedback can be neglected until very late in the assembly process of the
supermassive object.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,954 | Learning to Imagine Manipulation Goals for Robot Task Planning | Prospection is an important part of how humans come up with new task plans,
but has not been explored in depth in robotics. Predicting multiple task-level
is a challenging problem that involves capturing both task semantics and
continuous variability over the state of the world. Ideally, we would combine
the ability of machine learning to leverage big data for learning the semantics
of a task, while using techniques from task planning to reliably generalize to
new environment. In this work, we propose a method for learning a model
encoding just such a representation for task planning. We learn a neural net
that encodes the $k$ most likely outcomes from high level actions from a given
world. Our approach creates comprehensible task plans that allow us to predict
changes to the environment many time steps into the future. We demonstrate this
approach via application to a stacking task in a cluttered environment, where
the robot must select between different colored blocks while avoiding
obstacles, in order to perform a task. We also show results on a simple
navigation task. Our algorithm generates realistic image and pose predictions
at multiple points in a given task.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,955 | On the Combinatorial Power of the Weisfeiler-Lehman Algorithm | The classical Weisfeiler-Lehman method WL[2] uses edge colors to produce a
powerful graph invariant. It is at least as powerful in its ability to
distinguish non-isomorphic graphs as the most prominent algebraic graph
invariants. It determines not only the spectrum of a graph, and the angles
between standard basis vectors and the eigenspaces, but even the angles between
projections of standard basis vectors into the eigenspaces. Here, we
investigate the combinatorial power of WL[2]. For sufficiently large k, WL[k]
determines all combinatorial properties of a graph. Many traditionally used
combinatorial invariants are determined by WL[k] for small k. We focus on two
fundamental invariants, the num- ber of cycles Cp of length p, and the number
of cliques Kp of size p. We show that WL[2] determines the number of cycles of
lengths up to 6, but not those of length 8. Also, WL[2] does not determine the
number of 4-cliques.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,956 | Learning to Generate Reviews and Discovering Sentiment | We explore the properties of byte-level recurrent language models. When given
sufficient amounts of capacity, training data, and compute time, the
representations learned by these models include disentangled features
corresponding to high-level concepts. Specifically, we find a single unit which
performs sentiment analysis. These representations, learned in an unsupervised
manner, achieve state of the art on the binary subset of the Stanford Sentiment
Treebank. They are also very data efficient. When using only a handful of
labeled examples, our approach matches the performance of strong baselines
trained on full datasets. We also demonstrate the sentiment unit has a direct
influence on the generative process of the model. Simply fixing its value to be
positive or negative generates samples with the corresponding positive or
negative sentiment.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,957 | Designing magnetism in Fe-based Heusler alloys: a machine learning approach | Combining material informatics and high-throughput electronic structure
calculations offers the possibility of a rapid characterization of complex
magnetic materials. Here we demonstrate that datasets of electronic properties
calculated at the ab initio level can be effectively used to identify and
understand physical trends in magnetic materials, thus opening new avenues for
accelerated materials discovery. Following a data-centric approach, we utilize
a database of Heusler alloys calculated at the density functional theory level
to identify the ideal ions neighbouring Fe in the $X_2$Fe$Z$ Heusler prototype.
The hybridization of Fe with the nearest neighbour $X$ ion is found to cause
redistribution of the on-site Fe charge and a net increase of its magnetic
moment proportional to the valence of $X$. Thus, late transition metals are
ideal Fe neighbours for producing high-moment Fe-based Heusler magnets. At the
same time a thermodynamic stability analysis is found to restrict $Z$ to main
group elements. Machine learning regressors, trained to predict magnetic moment
and volume of Heusler alloys, are used to determine the magnetization for all
materials belonging to the proposed prototype. We find that Co$_2$Fe$Z$ alloys,
and in particular Co$_2$FeSi, maximize the magnetization, which reaches values
up to 1.2T. This is in good agreement with both ab initio and experimental
data. Furthermore, we identify the Cu$_2$Fe$Z$ family to be a cost-effective
materials class, offering a magnetization of approximately 0.65T.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,958 | On a diffuse interface model for tumour growth with non-local interactions and degenerate mobilities | We study a non-local variant of a diffuse interface model proposed by
Hawkins--Darrud et al. (2012) for tumour growth in the presence of a chemical
species acting as nutrient. The system consists of a Cahn--Hilliard equation
coupled to a reaction-diffusion equation. For non-degenerate mobilities and
smooth potentials, we derive well-posedness results, which are the non-local
analogue of those obtained in Frigeri et al. (European J. Appl. Math. 2015).
Furthermore, we establish existence of weak solutions for the case of
degenerate mobilities and singular potentials, which serves to confine the
order parameter to its physically relevant interval. Due to the non-local
nature of the equations, under additional assumptions continuous dependence on
initial data can also be shown.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,959 | Gradient Descent Can Take Exponential Time to Escape Saddle Points | Although gradient descent (GD) almost always escapes saddle points
asymptotically [Lee et al., 2016], this paper shows that even with fairly
natural random initialization schemes and non-pathological functions, GD can be
significantly slowed down by saddle points, taking exponential time to escape.
On the other hand, gradient descent with perturbations [Ge et al., 2015, Jin et
al., 2017] is not slowed down by saddle points - it can find an approximate
local minimizer in polynomial time. This result implies that GD is inherently
slower than perturbed GD, and justifies the importance of adding perturbations
for efficient non-convex optimization. While our focus is theoretical, we also
present experiments that illustrate our theoretical findings.
| 1 | 0 | 1 | 1 | 0 | 0 |
16,960 | Spectral parameter power series for arbitrary order linear differential equations | Let $L$ be the $n$-th order linear differential operator $Ly = \phi_0y^{(n)}
+ \phi_1y^{(n-1)} + \cdots + \phi_ny$ with variable coefficients. A
representation is given for $n$ linearly independent solutions of $Ly=\lambda r
y$ as power series in $\lambda$, generalizing the SPPS (spectral parameter
power series) solution which has been previously developed for $n=2$. The
coefficient functions in these series are obtained by recursively iterating a
simple integration process, begining with a solution system for $\lambda=0$. It
is shown how to obtain such an initializing system working upwards from
equations of lower order. The values of the successive derivatives of the power
series solutions at the basepoint of integration are given, which provides a
technique for numerical solution of $n$-th order initial value problems and
spectral problems.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,961 | Antropologia de la Informatica Social: Teoria de la Convergencia Tecno-Social | The traditional humanism of the twentieth century, inspired by the culture of
the book, systematically distanced itself from the new society of digital
information; the Internet and tools of information processing revolutionized
the world, society during this period developed certain adaptive
characteristics based on coexistence (Human - Machine), this transformation
sets based on the impact of three technology segments: devices, applications
and infrastructure of social communication, which are involved in various
physical, behavioural and cognitive changes of the human being; and the
emergence of new models of influence and social control through the new
ubiquitous communication; however in this new process of conviviality new
models like the "collaborative thinking" and "InfoSharing" develop; managing
social information under three Human ontological dimensions (h) - Information
(i) - Machine (m), which is the basis of a new physical-cyber ecosystem, where
they coexist and develop new social units called "virtual communities ". This
new communication infrastructure and social management of information given
discovered areas of vulnerability "social perspective of risk", impacting all
social units through massive impact vector (i); The virtual environment "H + i
+ M"; and its components, as well as the life cycle management of social
information allows us to understand the path of integration "Techno - Social"
and setting a new contribution to cybernetics, within the convergence of
technology with society and the new challenges of coexistence, aimed at a new
holistic and not pragmatic vision, as the human component (h) in the virtual
environment is the precursor of the future and needs to be studied not as an
application, but as the hub of a new society.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,962 | A Deterministic Approach to Avoid Saddle Points | Loss functions with a large number of saddle points are one of the main
obstacles to training many modern machine learning models. Gradient descent
(GD) is a fundamental algorithm for machine learning and converges to a saddle
point for certain initial data. We call the region formed by these initial
values the "attraction region." For quadratic functions, GD converges to a
saddle point if the initial data is in a subspace of up to n-1 dimensions. In
this paper, we prove that a small modification of the recently proposed
Laplacian smoothing gradient descent (LSGD) [Osher, et al., arXiv:1806.06317]
contributes to avoiding saddle points without sacrificing the convergence rate
of GD. In particular, we show that the dimension of the LSGD's attraction
region is at most floor((n-1)/2) for a class of quadratic functions which is
significantly smaller than GD's (n-1)-dimensional attraction region.
| 1 | 0 | 0 | 1 | 0 | 0 |
16,963 | Automatic Generation of Typographic Font from a Small Font Subset | This paper addresses the automatic generation of a typographic font from a
subset of characters. Specifically, we use a subset of a typographic font to
extrapolate additional characters. Consequently, we obtain a complete font
containing a number of characters sufficient for daily use. The automated
generation of Japanese fonts is in high demand because a Japanese font requires
over 1,000 characters. Unfortunately, professional typographers create most
fonts, resulting in significant financial and time investments for font
generation. The proposed method can be a great aid for font creation because
designers do not need to create the majority of the characters for a new font.
The proposed method uses strokes from given samples for font generation. The
strokes, from which we construct characters, are extracted by exploiting a
character skeleton dataset. This study makes three main contributions: a novel
method of extracting strokes from characters, which is applicable to both
standard fonts and their variations; a fully automated approach for
constructing characters; and a selection method for sample characters. We
demonstrate our proposed method by generating 2,965 characters in 47 fonts.
Objective and subjective evaluations verify that the generated characters are
similar to handmade characters.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,964 | The Second Postulate of Euclid and the Hyperbolic Geometry | The article deals with the connection between the second postulate of Euclid
and non-Euclidean geometry. It is shown that the violation of the second
postulate of Euclid inevitably leads to hyperbolic geometry. This eliminates
misunderstandings about the sums of some divergent series. The connection
between hyperbolic geometry and relativistic computations is noted.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,965 | Transkernel: An Executor for Commodity Kernels on Peripheral Cores | Modern mobile and embedded platforms see a large number of ephemeral tasks
driven by background activities. In order to execute such a task, the OS kernel
wakes up the platform beforehand and puts it back to sleep afterwards. In doing
so, the kernel operates various IO devices and orchestrates their power state
transitions. Such kernel execution phases are lengthy, having high energy cost,
and yet difficult to optimize. We advocate for relieving the CPU from these
kernel phases by executing them on a low-power, microcontroller-like core,
dubbed peripheral core, hence leaving the CPU off. Yet, for a peripheral core
to execute phases in a complex commodity kernel (e.g. Linux), existing
approaches either incur high engineering effort or high runtime overhead. We
take a radical approach with a new executor model called transkernel. Running
on a peripheral core, a transkernel executes the binary of the commodity kernel
through cross-ISA, dynamic binary translation (DBT). The transkernel translates
stateful kernel code while emulating a small set of stateless kernel services;
it sets a narrow, stable binary interface for emulated services; it specializes
for kernel's beaten paths; it exploits ISA similarities for low DBT cost. With
a concrete implementation on a heterogeneous ARM SoC, we demonstrate the
feasibility and benefit of transkernel. Our result contributes a new OS
structure that combines cross-ISA DBT and emulation for harnessing a
heterogeneous SoC. Our result demonstrates that while cross-ISA DBT is
typically used under the assumption of efficiency loss, it can be used for
efficiency gain, even atop off-the-shelf hardware.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,966 | No iterated identities satisfied by all finite groups | We show that there is no iterated identity satisfied by all finite groups.
For $w$ being a non-trivial word of length $l$, we show that there exists a
finite group $G$ of cardinality at most $\exp(l^C)$ which does not satisfy the
iterated identity $w$. The proof uses the approach of Borisov and Sapir, who
used dynamics of polynomial mappings for the proof of non residual finiteness
of some groups.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,967 | Optimization Methods for Supervised Machine Learning: From Linear Models to Deep Learning | The goal of this tutorial is to introduce key models, algorithms, and open
questions related to the use of optimization methods for solving problems
arising in machine learning. It is written with an INFORMS audience in mind,
specifically those readers who are familiar with the basics of optimization
algorithms, but less familiar with machine learning. We begin by deriving a
formulation of a supervised learning problem and show how it leads to various
optimization problems, depending on the context and underlying assumptions. We
then discuss some of the distinctive features of these optimization problems,
focusing on the examples of logistic regression and the training of deep neural
networks. The latter half of the tutorial focuses on optimization algorithms,
first for convex logistic regression, for which we discuss the use of
first-order methods, the stochastic gradient method, variance reducing
stochastic methods, and second-order methods. Finally, we discuss how these
approaches can be employed to the training of deep neural networks, emphasizing
the difficulties that arise from the complex, nonconvex structure of these
models.
| 1 | 0 | 0 | 1 | 0 | 0 |
16,968 | A Unified Parallel Algorithm for Regularized Group PLS Scalable to Big Data | Partial Least Squares (PLS) methods have been heavily exploited to analyse
the association between two blocs of data. These powerful approaches can be
applied to data sets where the number of variables is greater than the number
of observations and in presence of high collinearity between variables.
Different sparse versions of PLS have been developed to integrate multiple data
sets while simultaneously selecting the contributing variables. Sparse
modelling is a key factor in obtaining better estimators and identifying
associations between multiple data sets. The cornerstone of the sparsity
version of PLS methods is the link between the SVD of a matrix (constructed
from deflated versions of the original matrices of data) and least squares
minimisation in linear regression. We present here an accurate description of
the most popular PLS methods, alongside their mathematical proofs. A unified
algorithm is proposed to perform all four types of PLS including their
regularised versions. Various approaches to decrease the computation time are
offered, and we show how the whole procedure can be scalable to big data sets.
| 0 | 0 | 0 | 1 | 0 | 0 |
16,969 | Asymptotic behaviour of the fifth Painlevé transcendents in the space of initial values | We study the asymptotic behaviour of the solutions of the fifth Painlevé
equation as the independent variable approaches zero and infinity in the space
of initial values. We show that the limit set of each solution is compact and
connected and, moreover, that any solution with the essential singularity at
zero has an infinite number of poles and zeroes, and any solution with the
essential singularity at infinity has infinite number of poles and takes value
$1$ infinitely many times.
| 0 | 1 | 1 | 0 | 0 | 0 |
16,970 | Hidden Treasures - Recycling Large-Scale Internet Measurements to Study the Internet's Control Plane | Internet-wide scans are a common active measurement approach to study the
Internet, e.g., studying security properties or protocol adoption. They involve
probing large address ranges (IPv4 or parts of IPv6) for specific ports or
protocols. Besides their primary use for probing (e.g., studying protocol
adoption), we show that - at the same time - they provide valuable insights
into the Internet control plane informed by ICMP responses to these probes - a
currently unexplored secondary use. We collect one week of ICMP responses
(637.50M messages) to several Internet-wide ZMap scans covering multiple TCP
and UDP ports as well as DNS-based scans covering > 50% of the domain name
space. This perspective enables us to study the Internet's control plane as a
by-product of Internet measurements. We receive ICMP messages from ~171M
different IPs in roughly 53K different autonomous systems. Additionally, we
uncover multiple control plane problems, e.g., we detect a plethora of outdated
and misconfigured routers and uncover the presence of large-scale persistent
routing loops in IPv4.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,971 | Image Registration and Predictive Modeling: Learning the Metric on the Space of Diffeomorphisms | We present a method for metric optimization in the Large Deformation
Diffeomorphic Metric Mapping (LDDMM) framework, by treating the induced
Riemannian metric on the space of diffeomorphisms as a kernel in a machine
learning context. For simplicity, we choose the kernel Fischer Linear
Discriminant Analysis (KLDA) as the framework. Optimizing the kernel parameters
in an Expectation-Maximization framework, we define model fidelity via the
hinge loss of the decision function. The resulting algorithm optimizes the
parameters of the LDDMM norm-inducing differential operator as a solution to a
group-wise registration and classification problem. In practice, this may lead
to a biology-aware registration, focusing its attention on the predictive task
at hand such as identifying the effects of disease. We first tested our
algorithm on a synthetic dataset, showing that our parameter selection improves
registration quality and classification accuracy. We then tested the algorithm
on 3D subcortical shapes from the Schizophrenia cohort Schizconnect. Our
Schizpohrenia-Control predictive model showed significant improvement in ROC
AUC compared to baseline parameters.
| 0 | 0 | 0 | 1 | 0 | 0 |
16,972 | On a direct algorithm for constructing recursion operators and Lax pairs for integrable models | We suggested an algorithm for searching the recursion operators for nonlinear
integrable equations. It was observed that the recursion operator $R$ can be
represented as a ratio of the form $R=L_1^{-1}L_2$ where the linear
differential operators $L_1$ and $L_2$ are chosen in such a way that the
ordinary differential equation $(L_2-\lambda L_1)U=0$ is consistent with the
linearization of the given nonlinear integrable equation for any value of the
parameter $\lambda\in \textbf{C}$. For constructing the operator $L_1$ we use
the concept of the invariant manifold which is a generalization of the
symmetry. Then for searching $L_2$ we take an auxiliary linear equation
connected with the linearized equation by the Darboux transformation.
Connection of the invariant manifold with the Lax pairs and the
Dubrovin-Weierstrass equations is discussed.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,973 | Network Classification and Categorization | To the best of our knowledge, this paper presents the first large-scale study
that tests whether network categories (e.g., social networks vs. web graphs)
are distinguishable from one another (using both categories of real-world
networks and synthetic graphs). A classification accuracy of $94.2\%$ was
achieved using a random forest classifier with both real and synthetic
networks. This work makes two important findings. First, real-world networks
from various domains have distinct structural properties that allow us to
predict with high accuracy the category of an arbitrary network. Second,
classifying synthetic networks is trivial as our models can easily distinguish
between synthetic graphs and the real-world networks they are supposed to
model.
| 1 | 0 | 0 | 1 | 0 | 0 |
16,974 | A Polynomial-Time Algorithm for Solving the Minimal Observability Problem in Conjunctive Boolean Networks | Many complex systems in biology, physics, and engineering include a large
number of state-variables, and measuring the full state of the system is often
impossible. Typically, a set of sensors is used to measure part of the
state-variables. A system is called observable if these measurements allow to
reconstruct the entire state of the system. When the system is not observable,
an important and practical problem is how to add a \emph{minimal} number of
sensors so that the system becomes observable. This minimal observability
problem is practically useful and theoretically interesting, as it pinpoints
the most informative nodes in the system. We consider the minimal observability
problem for an important special class of Boolean networks, called conjunctive
Boolean networks (CBNs). Using a graph-theoretic approach, we provide a
necessary and sufficient condition for observability of a CBN with $n$
state-variables, and an efficient~$O(n^2)$-time algorithm for solving the
minimal observability problem. We demonstrate the usefulness of these results
by studying the properties of a class of random CBNs.
| 1 | 0 | 1 | 0 | 0 | 0 |
16,975 | The Description and Scaling Behavior for the Inner Region of the Boundary Layer for 2-D Wall-bounded Flows | A second derivative-based moment method is proposed for describing the
thickness and shape of the region where viscous forces are dominant in
turbulent boundary layer flows. Rather than the fixed location sublayer model
presently employed, the new method defines thickness and shape parameters that
are experimentally accessible without differentiation. It is shown
theoretically that one of the new length parameters used as a scaling parameter
is also a similarity parameter for the velocity profile. In fact, we show that
this new length scale parameter removes one of the theoretical inconsistencies
present in the traditional Prandtl Plus scalings. Furthermore, the new length
parameter and the Prandtl Plus scaling parameters perform identically when
operating on experimental datasets. This means that many of the past successes
ascribed to the Prandtl Plus scaling also apply to the new parameter set but
without one of the theoretical inconsistencies. Examples are offered to show
how the new description method is useful in exploring the actual physics of the
boundary layer.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,976 | Completely Sidon sets in $C^*$-algebras (New title) | A sequence in a $C^*$-algebra $A$ is called completely Sidon if its span in
$A$ is completely isomorphic to the operator space version of the space
$\ell_1$ (i.e. $\ell_1$ equipped with its maximal operator space structure).
The latter can also be described as the span of the free unitary generators in
the (full) $C^*$-algebra of the free group $\F_\infty$ with countably
infinitely many generators. Our main result is a generalization to this context
of Drury's classical theorem stating that Sidon sets are stable under finite
unions. In the particular case when $A=C^*(G)$ the (maximal) $C^*$-algebra of a
discrete group $G$, we recover the non-commutative (operator space) version of
Drury's theorem that we recently proved. We also give several non-commutative
generalizations of our recent work on uniformly bounded orthonormal systems to
the case of von Neumann algebras equipped with normal faithful tracial states.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,977 | Conflict-Free Coloring of Planar Graphs | A conflict-free k-coloring of a graph assigns one of k different colors to
some of the vertices such that, for every vertex v, there is a color that is
assigned to exactly one vertex among v and v's neighbors. Such colorings have
applications in wireless networking, robotics, and geometry, and are
well-studied in graph theory. Here we study the natural problem of the
conflict-free chromatic number chi_CF(G) (the smallest k for which
conflict-free k-colorings exist). We provide results both for closed
neighborhoods N[v], for which a vertex v is a member of its neighborhood, and
for open neighborhoods N(v), for which vertex v is not a member of its
neighborhood.
For closed neighborhoods, we prove the conflict-free variant of the famous
Hadwiger Conjecture: If an arbitrary graph G does not contain K_{k+1} as a
minor, then chi_CF(G) <= k. For planar graphs, we obtain a tight worst-case
bound: three colors are sometimes necessary and always sufficient. We also give
a complete characterization of the computational complexity of conflict-free
coloring. Deciding whether chi_CF(G)<= 1 is NP-complete for planar graphs G,
but polynomial for outerplanar graphs. Furthermore, deciding whether
chi_CF(G)<= 2 is NP-complete for planar graphs G, but always true for
outerplanar graphs. For the bicriteria problem of minimizing the number of
colored vertices subject to a given bound k on the number of colors, we give a
full algorithmic characterization in terms of complexity and approximation for
outerplanar and planar graphs.
For open neighborhoods, we show that every planar bipartite graph has a
conflict-free coloring with at most four colors; on the other hand, we prove
that for k in {1,2,3}, it is NP-complete to decide whether a planar bipartite
graph has a conflict-free k-coloring. Moreover, we establish that any general}
planar graph has a conflict-free coloring with at most eight colors.
| 1 | 0 | 1 | 0 | 0 | 0 |
16,978 | Explicit solutions to utility maximization problems in a regime-switching market model via Laplace transforms | We study the problem of utility maximization from terminal wealth in which an
agent optimally builds her portfolio by investing in a bond and a risky asset.
The asset price dynamics follow a diffusion process with regime-switching
coefficients modeled by a continuous-time finite-state Markov chain. We
consider an investor with a Constant Relative Risk Aversion (CRRA) utility
function. We deduce the associated Hamilton-Jacobi-Bellman equation to
construct the solution and the optimal trading strategy and verify optimality
by showing that the value function is the unique constrained viscosity solution
of the HJB equation. By means of a Laplace transform method, we show how to
explicitly compute the value function and illustrate the method with the two-
and three-states cases. This method is interesting in its own right and can be
adapted in other applications involving hybrid systems and using other types of
transforms with basic properties similar to the Laplace transform.
| 0 | 0 | 0 | 0 | 0 | 1 |
16,979 | Spectroscopic study of the elusive globular cluster ESO452-SC11 and its surroundings | Globular clusters (GCs) are amongst the oldest objects in the Galaxy and play
a pivotal role in deciphering its early history. We present the first
spectroscopic study of the GC ESO452-SC11 using the AAOmega spectrograph at
medium resolution. Given the sparsity of this object and high degree of
foreground contamination due to its location toward the bulge, few details are
known for this cluster: there is no consensus of its age, metallicity, or its
association with the disk or bulge. We identify 5 members based on radial
velocity, metallicity, and position within the GC. Using spectral synthesis,
accurate abundances of Fe and several $\alpha$-, Fe-peak, neutron-capture
elements (Si,Ca,Ti,Cr,Co,Ni,Sr,Eu) were measured. Two of the 5 cluster
candidates are likely non-members, as they have deviant Fe abundances and
[$\alpha$/Fe] ratios. The mean radial velocity is 19$\pm$2 km s$^{-1}$ with a
low dispersion of 2.8$\pm$3.4 km s$^{-1}$, in line with its low mass. The mean
Fe-abundance from spectral fitting is $-0.88\pm0.03$, with a spread driven by
observational errors. The $\alpha$-elements of the GC candidates are marginally
lower than expected for the bulge at similar metallicities. As spectra of
hundreds of stars were collected in a 2 degree field around ESO452-SC11,
detailed abundances in the surrounding field were measured. Most non-members
have higher [$\alpha$/Fe] ratios, typical of the nearby bulge population. Stars
with measured Fe-peak abundances show a large scatter around Solar values,
though with large uncertainties. Our study provides the first systematic
measurement of Sr in a Galactic bulge GC. The Eu and Sr abundances of the GC
candidates are consistent with a disk or bulge association. Our calculations
place ESO452 on an elliptical orbit in the central 3 kpc of the bulge. We find
no evidence of extratidal stars in our data. (Abridged)
| 0 | 1 | 0 | 0 | 0 | 0 |
16,980 | The Fundamental Infinity-Groupoid of a Parametrized Family | Given an infinity-category C, one can naturally construct an
infinity-category Fam(C) of families of objects in C indexed by
infinity-groupoids. An ordinary categorical version of this construction was
used by Borceux and Janelidze in the study of generalized covering maps in
categorical Galois theory. In this paper, we develop the homotopy theory of
such "parametrized families" as generalization of the classical homotopy theory
of spaces. In particular, we study homotopy-theoretical constructions that
arise from the fundamental infinity-groupoids of families in an
infinity-category. In the same spirit, we show that Fam(C) admits a
Grothendieck topology which generalizes the canonical/epimorphism topology on
the infinity-topos of infinity-groupoids in the sense of Carchedi.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,981 | Leveraging Pre-Trained 3D Object Detection Models For Fast Ground Truth Generation | Training 3D object detectors for autonomous driving has been limited to small
datasets due to the effort required to generate annotations. Reducing both task
complexity and the amount of task switching done by annotators is key to
reducing the effort and time required to generate 3D bounding box annotations.
This paper introduces a novel ground truth generation method that combines
human supervision with pretrained neural networks to generate per-instance 3D
point cloud segmentation, 3D bounding boxes, and class annotations. The
annotators provide object anchor clicks which behave as a seed to generate
instance segmentation results in 3D. The points belonging to each instance are
then used to regress object centroids, bounding box dimensions, and object
orientation. Our proposed annotation scheme requires 30x lower human annotation
time. We use the KITTI 3D object detection dataset to evaluate the efficiency
and the quality of our annotation scheme. We also test the the proposed scheme
on previously unseen data from the Autonomoose self-driving vehicle to
demonstrate generalization capabilities of the network.
| 0 | 0 | 0 | 1 | 0 | 0 |
16,982 | Epidemic spreading in multiplex networks influenced by opinion exchanges on vaccination | We study the changes of opinions about vaccination together with the
evolution of a disease. In our model we consider a multiplex network consisting
of two layers. One of the layers corresponds to a social network where people
share their opinions and influence others opinions. The social model that rules
the dynamic is the M-model, which takes into account two different processes
that occurs in a society: persuasion and compromise. This two processes are
related through a parameter $r$, $r<1$ describes a moderate and committed
society, for $r>1$ the society tends to have extremist opinions, while $r=1$
represents a neutral society. This social network may be of real or virtual
contacts. On the other hand, the second layer corresponds to a network of
physical contacts where the disease spreading is described by the SIR-Model. In
this model the individuals may be in one of the following four states:
Susceptible ($S$), Infected($I$), Recovered ($R$) or Vaccinated ($V$). A
Susceptible individual can: i) get vaccinated, if his opinion in the other
layer is totally in favor of the vaccine, ii) get infected, with probability
$\beta$ if he is in contact with an infected neighbor. Those $I$ individuals
recover after a certain period $t_r=6$. Vaccinated individuals have an
extremist positive opinion that does not change. We consider that the vaccine
has a certain effectiveness $\omega$ and as a consequence vaccinated nodes can
be infected with probability $\beta (1 - \omega)$ if they are in contact with
an infected neighbor. In this case, if the infection process is successful, the
new infected individual changes his opinion from extremist positive to totally
against the vaccine. We find that depending on the trend in the opinion of the
society, which depends on $r$, different behaviors in the spread of the
epidemic occurs. An epidemic threshold was found.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,983 | CASP Solutions for Planning in Hybrid Domains | CASP is an extension of ASP that allows for numerical constraints to be added
in the rules. PDDL+ is an extension of the PDDL standard language of automated
planning for modeling mixed discrete-continuous dynamics.
In this paper, we present CASP solutions for dealing with PDDL+ problems,
i.e., encoding from PDDL+ to CASP, and extensions to the algorithm of the EZCSP
CASP solver in order to solve CASP programs arising from PDDL+ domains. An
experimental analysis, performed on well-known linear and non-linear variants
of PDDL+ domains, involving various configurations of the EZCSP solver, other
CASP solvers, and PDDL+ planners, shows the viability of our solution.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,984 | Primordial black holes from inflaton and spectator field perturbations in a matter-dominated era | We study production of primordial black holes (PBHs) during an early
matter-dominated phase. As a source of perturbations, we consider either the
inflaton field with a running spectral index or a spectator field that has a
blue spectrum and thus provides a significant contribution to the PBH
production at small scales. First, we identify the region of the parameter
space where a significant fraction of the observed dark matter can be produced,
taking into account all current PBH constraints. Then, we present constraints
on the amplitude and spectral index of the spectator field as a function of the
reheating temperature. We also derive constraints on the running of the
inflaton spectral index, ${\rm d}n/{\rm d}{\rm ln}k \lesssim -0.002$, which are
comparable to those from the Planck satellite for a scenario where the
spectator field is absent.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,985 | State Space Decomposition and Subgoal Creation for Transfer in Deep Reinforcement Learning | Typical reinforcement learning (RL) agents learn to complete tasks specified
by reward functions tailored to their domain. As such, the policies they learn
do not generalize even to similar domains. To address this issue, we develop a
framework through which a deep RL agent learns to generalize policies from
smaller, simpler domains to more complex ones using a recurrent attention
mechanism. The task is presented to the agent as an image and an instruction
specifying the goal. This meta-controller guides the agent towards its goal by
designing a sequence of smaller subtasks on the part of the state space within
the attention, effectively decomposing it. As a baseline, we consider a setup
without attention as well. Our experiments show that the meta-controller learns
to create subgoals within the attention.
| 1 | 0 | 0 | 1 | 0 | 0 |
16,986 | Robust Imitation of Diverse Behaviors | Deep generative models have recently shown great promise in imitation
learning for motor control. Given enough data, even supervised approaches can
do one-shot imitation learning; however, they are vulnerable to cascading
failures when the agent trajectory diverges from the demonstrations. Compared
to purely supervised methods, Generative Adversarial Imitation Learning (GAIL)
can learn more robust controllers from fewer demonstrations, but is inherently
mode-seeking and more difficult to train. In this paper, we show how to combine
the favourable aspects of these two approaches. The base of our model is a new
type of variational autoencoder on demonstration trajectories that learns
semantic policy embeddings. We show that these embeddings can be learned on a 9
DoF Jaco robot arm in reaching tasks, and then smoothly interpolated with a
resulting smooth interpolation of reaching behavior. Leveraging these policy
representations, we develop a new version of GAIL that (1) is much more robust
than the purely-supervised controller, especially with few demonstrations, and
(2) avoids mode collapse, capturing many diverse behaviors when GAIL on its own
does not. We demonstrate our approach on learning diverse gaits from
demonstration on a 2D biped and a 62 DoF 3D humanoid in the MuJoCo physics
environment.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,987 | Efficient Measurement of the Vibrational Rogue Waves by Compressive Sampling Based Wavelet Analysis | In this paper we discuss the possible usage of the compressive sampling based
wavelet analysis for the efficient measurement and for the early detection of
one dimensional (1D) vibrational rogue waves. We study the construction of the
triangular (V-shaped) wavelet spectra using compressive samples of rogue waves
that can be modeled as Peregrine and Akhmediev-Peregrine solitons. We show that
triangular wavelet spectra can be sensed by compressive measurements at the
early stages of the development of vibrational rogue waves. Our results may
lead to development of the efficient vibrational rogue wave measurement and
early sensing systems with reduced memory requirements which use the
compressive sampling algorithms. In typical solid mechanics applications,
compressed measurements can be acquired by randomly positioning single sensor
and multisensors.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,988 | SceneCut: Joint Geometric and Object Segmentation for Indoor Scenes | This paper presents SceneCut, a novel approach to jointly discover previously
unseen objects and non-object surfaces using a single RGB-D image. SceneCut's
joint reasoning over scene semantics and geometry allows a robot to detect and
segment object instances in complex scenes where modern deep learning-based
methods either fail to separate object instances, or fail to detect objects
that were not seen during training. SceneCut automatically decomposes a scene
into meaningful regions which either represent objects or scene surfaces. The
decomposition is qualified by an unified energy function over objectness and
geometric fitting. We show how this energy function can be optimized
efficiently by utilizing hierarchical segmentation trees. Moreover, we leverage
a pre-trained convolutional oriented boundary network to predict accurate
boundaries from images, which are used to construct high-quality region
hierarchies. We evaluate SceneCut on several different indoor environments, and
the results show that SceneCut significantly outperforms all the existing
methods.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,989 | An Invariant Model of the Significance of Different Body Parts in Recognizing Different Actions | In this paper, we show that different body parts do not play equally
important roles in recognizing a human action in video data. We investigate to
what extent a body part plays a role in recognition of different actions and
hence propose a generic method of assigning weights to different body points.
The approach is inspired by the strong evidence in the applied perception
community that humans perform recognition in a foveated manner, that is they
recognize events or objects by only focusing on visually significant aspects.
An important contribution of our method is that the computation of the weights
assigned to body parts is invariant to viewing directions and camera parameters
in the input data. We have performed extensive experiments to validate the
proposed approach and demonstrate its significance. In particular, results show
that considerable improvement in performance is gained by taking into account
the relative importance of different body parts as defined by our approach.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,990 | Forecasting Crime with Deep Learning | The objective of this work is to take advantage of deep neural networks in
order to make next day crime count predictions in a fine-grain city partition.
We make predictions using Chicago and Portland crime data, which is augmented
with additional datasets covering weather, census data, and public
transportation. The crime counts are broken into 10 bins and our model predicts
the most likely bin for a each spatial region at a daily level. We train this
data using increasingly complex neural network structures, including variations
that are suited to the spatial and temporal aspects of the crime prediction
problem. With our best model we are able to predict the correct bin for overall
crime count with 75.6% and 65.3% accuracy for Chicago and Portland,
respectively. The results show the efficacy of neural networks for the
prediction problem and the value of using external datasets in addition to
standard crime data.
| 0 | 0 | 0 | 1 | 0 | 0 |
16,991 | A family of compact semitoric systems with two focus-focus singularities | About 6 years ago, semitoric systems were classified by Pelayo & Vu Ngoc by
means of five invariants. Standard examples are the coupled spin oscillator on
$\mathbb{S}^2 \times \mathbb{R}^2$ and coupled angular momenta on $\mathbb{S}^2
\times \mathbb{S}^2$, both having exactly one focus-focus singularity. But so
far there were no explicit examples of systems with more than one focus-focus
singularity which are semitoric in the sense of that classification. This paper
introduces a 6-parameter family of integrable systems on $\mathbb{S}^2 \times
\mathbb{S}^2$ and proves that, for certain ranges of the parameters, it is a
compact semitoric system with precisely two focus-focus singularities. Since
the twisting index (one of the semitoric invariants) is related to the
relationship between different focus-focus points, this paper provides systems
for the future study of the twisting index.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,992 | Mixed Threefolds Isogenous to a Product | In this paper we study \emph{threefolds isogenous to a product of mixed type}
i.e. quotients of a product of three compact Riemann surfaces $C_i$ of genus at
least two by the action of a finite group $G$, which is free, but not diagonal.
In particular, we are interested in the systematic construction and
classification of these varieties. Our main result is the full classification
of threefolds isogenous to a product of mixed type with $\chi(\mathcal O_X)=-1$
assuming that any automorphism in $G$, which restricts to the trivial element
in $Aut(C_i)$ for some $C_i$, is the identity on the product. Since the
holomorphic Euler-Poincaré-characteristic of a smooth threefold of general
type with ample canonical class is always negative, these examples lie on the
boundary, in the sense of threefold geography. To achieve our result we use
techniques from computational group theory. Indeed, we develop a MAGMA
algorithm to classify these threefolds for any given value of $\chi(\mathcal
O_X)$.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,993 | Discriminatory Transfer | We observe standard transfer learning can improve prediction accuracies of
target tasks at the cost of lowering their prediction fairness -- a phenomenon
we named discriminatory transfer. We examine prediction fairness of a standard
hypothesis transfer algorithm and a standard multi-task learning algorithm, and
show they both suffer discriminatory transfer on the real-world Communities and
Crime data set. The presented case study introduces an interaction between
fairness and transfer learning, as an extension of existing fairness studies
that focus on single task learning.
| 1 | 0 | 0 | 1 | 0 | 0 |
16,994 | Ultrafast relaxation of hot phonons in Graphene-hBN Heterostructures | Fast carrier cooling is important for high power graphene based devices.
Strongly Coupled Optical Phonons (SCOPs) play a major role in the relaxation of
photoexcited carriers in graphene. Heterostructures of graphene and hexagonal
boron nitride (hBN) have shown exceptional mobility and high saturation
current, which makes them ideal for applications, but the effect of the hBN
substrate on carrier cooling mechanisms is not understood. We track the cooling
of hot photo-excited carriers in graphene-hBN heterostructures using ultrafast
pump-probe spectroscopy. We find that the carriers cool down four times faster
in the case of graphene on hBN than on a silicon oxide substrate thus
overcoming the hot phonon (HP) bottleneck that plagues cooling in graphene
devices.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,995 | Non-linear Associative-Commutative Many-to-One Pattern Matching with Sequence Variables | Pattern matching is a powerful tool which is part of many functional
programming languages as well as computer algebra systems such as Mathematica.
Among the existing systems, Mathematica offers the most expressive pattern
matching. Unfortunately, no open source alternative has comparable pattern
matching capabilities. Notably, these features include support for associative
and/or commutative function symbols and sequence variables. While those
features have individually been subject of previous research, their
comprehensive combination has not yet been investigated. Furthermore, in many
applications, a fixed set of patterns is matched repeatedly against different
subjects. This many-to-one matching can be sped up by exploiting similarities
between patterns. Discrimination nets are the state-of-the-art solution for
many-to-one matching. In this thesis, a generalized discrimination net which
supports the full feature set is presented. All algorithms have been
implemented as an open-source library for Python. In experiments on real world
examples, significant speedups of many-to-one over one-to-one matching have
been observed.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,996 | Pair Background Envelopes in the SiD Detector | The beams at the ILC produce electron positron pairs due to beam-beam
interactions. This note presents for the first time a study of these processes
in a detailed simulation, which shows that these pair background particles
appear at angles that extend to the inner layers of the detector. The full data
set of pairs produced in one bunch crossing was used to calculate the helix
tracks, which the particles form in the solenoid field of the SiD detector. The
results suggest to further study the reduction of the beam pipe radius and
therefore to either add another SiD vertex detector layer, or reduce the radius
of the existing vertex detector layers, without increasing the detector
occupancy significantly. This has to go along with additional studies whether
the improvement in physics reconstruction methods, like c-tagging, is worth the
increased background level at smaller radii.
| 0 | 1 | 0 | 0 | 0 | 0 |
16,997 | Expansion of percolation critical points for Hamming graphs | The Hamming graph $H(d,n)$ is the Cartesian product of $d$ complete graphs on
$n$ vertices. Let $m=d(n-1)$ be the degree and $V = n^d$ be the number of
vertices of $H(d,n)$. Let $p_c^{(d)}$ be the critical point for bond
percolation on $H(d,n)$. We show that, for $d \in \mathbb N$ fixed and $n \to
\infty$,
\begin{equation*}
p_c^{(d)}= \dfrac{1}{m} + \dfrac{2d^2-1}{2(d-1)^2}\dfrac{1}{m^2}
+ O(m^{-3}) + O(m^{-1}V^{-1/3}),
\end{equation*} which extends the asymptotics found in
\cite{BorChaHofSlaSpe05b} by one order. The term $O(m^{-1}V^{-1/3})$ is the
width of the critical window. For $d=4,5,6$ we have $m^{-3} =
O(m^{-1}V^{-1/3})$, and so the above formula represents the full asymptotic
expansion of $p_c^{(d)}$. In \cite{FedHofHolHul16a} \st{we show that} this
formula is a crucial ingredient in the study of critical bond percolation on
$H(d,n)$ for $d=2,3,4$. The proof uses a lace expansion for the upper bound and
a novel comparison with a branching random walk for the lower bound. The proof
of the lower bound also yields a refined asymptotics for the susceptibility of
a subcritical Erdős-Rényi random graph.
| 0 | 0 | 1 | 0 | 0 | 0 |
16,998 | Efficiently Manifesting Asynchronous Programming Errors in Android Apps | Android, the #1 mobile app framework, enforces the single-GUI-thread model,
in which a single UI thread manages GUI rendering and event dispatching. Due to
this model, it is vital to avoid blocking the UI thread for responsiveness. One
common practice is to offload long-running tasks into async threads. To achieve
this, Android provides various async programming constructs, and leaves
developers themselves to obey the rules implied by the model. However, as our
study reveals, more than 25% apps violate these rules and introduce
hard-to-detect, fail-stop errors, which we term as aysnc programming errors
(APEs). To this end, this paper introduces APEChecker, a technique to
automatically and efficiently manifest APEs. The key idea is to characterize
APEs as specific fault patterns, and synergistically combine static analysis
and dynamic UI exploration to detect and verify such errors. Among the 40
real-world Android apps, APEChecker unveils and processes 61 APEs, of which 51
are confirmed (83.6% hit rate). Specifically, APEChecker detects 3X more APEs
than the state-of-art testing tools (Monkey, Sapienz and Stoat), and reduces
testing time from half an hour to a few minutes. On a specific type of APEs,
APEChecker confirms 5X more errors than the data race detection tool,
EventRacer, with very few false alarms.
| 1 | 0 | 0 | 0 | 0 | 0 |
16,999 | AI Challenges in Human-Robot Cognitive Teaming | Among the many anticipated roles for robots in the future is that of being a
human teammate. Aside from all the technological hurdles that have to be
overcome with respect to hardware and control to make robots fit to work with
humans, the added complication here is that humans have many conscious and
subconscious expectations of their teammates - indeed, we argue that teaming is
mostly a cognitive rather than physical coordination activity. This introduces
new challenges for the AI and robotics community and requires fundamental
changes to the traditional approach to the design of autonomy. With this in
mind, we propose an update to the classical view of the intelligent agent
architecture, highlighting the requirements for mental modeling of the human in
the deliberative process of the autonomous agent. In this article, we outline
briefly the recent efforts of ours, and others in the community, towards
developing cognitive teammates along these guidelines.
| 1 | 0 | 0 | 0 | 0 | 0 |
17,000 | Generalizing the MVW involution, and the contragredient | For certain quasi-split reductive groups $G$ over a general field $F$, we
construct an automorphism $\iota_G$ of $G$ over $F$, well-defined as an element
of ${\rm Aut}(G)(F)/jG(F)$ where $j:G(F) \rightarrow {\rm Aut}(G)(F)$ is the
inner-conjugation action of $G(F)$ on $G$. The automorphism $\iota_G$
generalizes (although only for quasi-split groups) an involution due to
Moeglin-Vigneras-Waldspurger in [MVW] for classical groups which takes any
irreducible admissible representation $\pi$ of $G(F)$ for $G$ a classical group
and $F$ a local field, to its contragredient $\pi^\vee$. The paper also
formulates a conjecture on the contragredient of an irreducible admissible
representation of $G(F)$ for $G$ a reductive algebraic group over a local field
$F$ in terms of the (enhanced) Langlands parameter of the representation.
| 0 | 0 | 1 | 0 | 0 | 0 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.